5ce00d09c0
When GAS is used with PMF negotiated, Protected Dual of Public Action frames are expected to be used instead of Public Action frames, i.e., the GAS/ANQP frames are expected to be encrypted. Add support for this different category of Action frames being used for GAS. The payload after the Category field is identical, so the only change is in using the Category field based on what was received in the request frames. For backwards compatibility, do not enforce protected dual to be used on the AP side, i.e., follow what the station does. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
1199 lines
32 KiB
C
1199 lines
32 KiB
C
/*
|
|
* Generic advertisement service (GAS) server
|
|
* Copyright (c) 2011-2014, Qualcomm Atheros, Inc.
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "common.h"
|
|
#include "common/ieee802_11_defs.h"
|
|
#include "common/gas.h"
|
|
#include "utils/eloop.h"
|
|
#include "hostapd.h"
|
|
#include "ap_config.h"
|
|
#include "ap_drv_ops.h"
|
|
#include "sta_info.h"
|
|
#include "gas_serv.h"
|
|
|
|
|
|
static void convert_to_protected_dual(struct wpabuf *msg)
|
|
{
|
|
u8 *categ = wpabuf_mhead_u8(msg);
|
|
*categ = WLAN_ACTION_PROTECTED_DUAL;
|
|
}
|
|
|
|
|
|
static struct gas_dialog_info *
|
|
gas_dialog_create(struct hostapd_data *hapd, const u8 *addr, u8 dialog_token)
|
|
{
|
|
struct sta_info *sta;
|
|
struct gas_dialog_info *dia = NULL;
|
|
int i, j;
|
|
|
|
sta = ap_get_sta(hapd, addr);
|
|
if (!sta) {
|
|
/*
|
|
* We need a STA entry to be able to maintain state for
|
|
* the GAS query.
|
|
*/
|
|
wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
|
|
"GAS query");
|
|
sta = ap_sta_add(hapd, addr);
|
|
if (!sta) {
|
|
wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
|
|
" for GAS query", MAC2STR(addr));
|
|
return NULL;
|
|
}
|
|
sta->flags |= WLAN_STA_GAS;
|
|
/*
|
|
* The default inactivity is 300 seconds. We don't need
|
|
* it to be that long.
|
|
*/
|
|
ap_sta_session_timeout(hapd, sta, 5);
|
|
} else {
|
|
ap_sta_replenish_timeout(hapd, sta, 5);
|
|
}
|
|
|
|
if (sta->gas_dialog == NULL) {
|
|
sta->gas_dialog = os_zalloc(GAS_DIALOG_MAX *
|
|
sizeof(struct gas_dialog_info));
|
|
if (sta->gas_dialog == NULL)
|
|
return NULL;
|
|
}
|
|
|
|
for (i = sta->gas_dialog_next, j = 0; j < GAS_DIALOG_MAX; i++, j++) {
|
|
if (i == GAS_DIALOG_MAX)
|
|
i = 0;
|
|
if (sta->gas_dialog[i].valid)
|
|
continue;
|
|
dia = &sta->gas_dialog[i];
|
|
dia->valid = 1;
|
|
dia->index = i;
|
|
dia->dialog_token = dialog_token;
|
|
sta->gas_dialog_next = (++i == GAS_DIALOG_MAX) ? 0 : i;
|
|
return dia;
|
|
}
|
|
|
|
wpa_msg(hapd->msg_ctx, MSG_ERROR, "ANQP: Could not create dialog for "
|
|
MACSTR " dialog_token %u. Consider increasing "
|
|
"GAS_DIALOG_MAX.", MAC2STR(addr), dialog_token);
|
|
|
|
return NULL;
|
|
}
|
|
|
|
|
|
struct gas_dialog_info *
|
|
gas_serv_dialog_find(struct hostapd_data *hapd, const u8 *addr,
|
|
u8 dialog_token)
|
|
{
|
|
struct sta_info *sta;
|
|
int i;
|
|
|
|
sta = ap_get_sta(hapd, addr);
|
|
if (!sta) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
|
|
MAC2STR(addr));
|
|
return NULL;
|
|
}
|
|
for (i = 0; sta->gas_dialog && i < GAS_DIALOG_MAX; i++) {
|
|
if (sta->gas_dialog[i].dialog_token != dialog_token ||
|
|
!sta->gas_dialog[i].valid)
|
|
continue;
|
|
return &sta->gas_dialog[i];
|
|
}
|
|
wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
|
|
MACSTR " dialog_token %u", MAC2STR(addr), dialog_token);
|
|
return NULL;
|
|
}
|
|
|
|
|
|
void gas_serv_dialog_clear(struct gas_dialog_info *dia)
|
|
{
|
|
wpabuf_free(dia->sd_resp);
|
|
os_memset(dia, 0, sizeof(*dia));
|
|
}
|
|
|
|
|
|
static void gas_serv_free_dialogs(struct hostapd_data *hapd,
|
|
const u8 *sta_addr)
|
|
{
|
|
struct sta_info *sta;
|
|
int i;
|
|
|
|
sta = ap_get_sta(hapd, sta_addr);
|
|
if (sta == NULL || sta->gas_dialog == NULL)
|
|
return;
|
|
|
|
for (i = 0; i < GAS_DIALOG_MAX; i++) {
|
|
if (sta->gas_dialog[i].valid)
|
|
return;
|
|
}
|
|
|
|
os_free(sta->gas_dialog);
|
|
sta->gas_dialog = NULL;
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_HS20
|
|
static void anqp_add_hs_capab_list(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
u8 *len;
|
|
|
|
len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
wpabuf_put_u8(buf, HS20_STYPE_CAPABILITY_LIST);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
wpabuf_put_u8(buf, HS20_STYPE_CAPABILITY_LIST);
|
|
if (hapd->conf->hs20_oper_friendly_name)
|
|
wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_FRIENDLY_NAME);
|
|
if (hapd->conf->hs20_wan_metrics)
|
|
wpabuf_put_u8(buf, HS20_STYPE_WAN_METRICS);
|
|
if (hapd->conf->hs20_connection_capability)
|
|
wpabuf_put_u8(buf, HS20_STYPE_CONNECTION_CAPABILITY);
|
|
if (hapd->conf->nai_realm_data)
|
|
wpabuf_put_u8(buf, HS20_STYPE_NAI_HOME_REALM_QUERY);
|
|
if (hapd->conf->hs20_operating_class)
|
|
wpabuf_put_u8(buf, HS20_STYPE_OPERATING_CLASS);
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
|
static void anqp_add_capab_list(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
u8 *len;
|
|
|
|
len = gas_anqp_add_element(buf, ANQP_CAPABILITY_LIST);
|
|
wpabuf_put_le16(buf, ANQP_CAPABILITY_LIST);
|
|
if (hapd->conf->venue_name)
|
|
wpabuf_put_le16(buf, ANQP_VENUE_NAME);
|
|
if (hapd->conf->network_auth_type)
|
|
wpabuf_put_le16(buf, ANQP_NETWORK_AUTH_TYPE);
|
|
if (hapd->conf->roaming_consortium)
|
|
wpabuf_put_le16(buf, ANQP_ROAMING_CONSORTIUM);
|
|
if (hapd->conf->ipaddr_type_configured)
|
|
wpabuf_put_le16(buf, ANQP_IP_ADDR_TYPE_AVAILABILITY);
|
|
if (hapd->conf->nai_realm_data)
|
|
wpabuf_put_le16(buf, ANQP_NAI_REALM);
|
|
if (hapd->conf->anqp_3gpp_cell_net)
|
|
wpabuf_put_le16(buf, ANQP_3GPP_CELLULAR_NETWORK);
|
|
if (hapd->conf->domain_name)
|
|
wpabuf_put_le16(buf, ANQP_DOMAIN_NAME);
|
|
#ifdef CONFIG_HS20
|
|
anqp_add_hs_capab_list(hapd, buf);
|
|
#endif /* CONFIG_HS20 */
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
|
|
|
|
static void anqp_add_venue_name(struct hostapd_data *hapd, struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->venue_name) {
|
|
u8 *len;
|
|
unsigned int i;
|
|
len = gas_anqp_add_element(buf, ANQP_VENUE_NAME);
|
|
wpabuf_put_u8(buf, hapd->conf->venue_group);
|
|
wpabuf_put_u8(buf, hapd->conf->venue_type);
|
|
for (i = 0; i < hapd->conf->venue_name_count; i++) {
|
|
struct hostapd_lang_string *vn;
|
|
vn = &hapd->conf->venue_name[i];
|
|
wpabuf_put_u8(buf, 3 + vn->name_len);
|
|
wpabuf_put_data(buf, vn->lang, 3);
|
|
wpabuf_put_data(buf, vn->name, vn->name_len);
|
|
}
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_network_auth_type(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->network_auth_type) {
|
|
wpabuf_put_le16(buf, ANQP_NETWORK_AUTH_TYPE);
|
|
wpabuf_put_le16(buf, hapd->conf->network_auth_type_len);
|
|
wpabuf_put_data(buf, hapd->conf->network_auth_type,
|
|
hapd->conf->network_auth_type_len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_roaming_consortium(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
unsigned int i;
|
|
u8 *len;
|
|
|
|
len = gas_anqp_add_element(buf, ANQP_ROAMING_CONSORTIUM);
|
|
for (i = 0; i < hapd->conf->roaming_consortium_count; i++) {
|
|
struct hostapd_roaming_consortium *rc;
|
|
rc = &hapd->conf->roaming_consortium[i];
|
|
wpabuf_put_u8(buf, rc->len);
|
|
wpabuf_put_data(buf, rc->oi, rc->len);
|
|
}
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
|
|
|
|
static void anqp_add_ip_addr_type_availability(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->ipaddr_type_configured) {
|
|
wpabuf_put_le16(buf, ANQP_IP_ADDR_TYPE_AVAILABILITY);
|
|
wpabuf_put_le16(buf, 1);
|
|
wpabuf_put_u8(buf, hapd->conf->ipaddr_type_availability);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_nai_realm_eap(struct wpabuf *buf,
|
|
struct hostapd_nai_realm_data *realm)
|
|
{
|
|
unsigned int i, j;
|
|
|
|
wpabuf_put_u8(buf, realm->eap_method_count);
|
|
|
|
for (i = 0; i < realm->eap_method_count; i++) {
|
|
struct hostapd_nai_realm_eap *eap = &realm->eap_method[i];
|
|
wpabuf_put_u8(buf, 2 + (3 * eap->num_auths));
|
|
wpabuf_put_u8(buf, eap->eap_method);
|
|
wpabuf_put_u8(buf, eap->num_auths);
|
|
for (j = 0; j < eap->num_auths; j++) {
|
|
wpabuf_put_u8(buf, eap->auth_id[j]);
|
|
wpabuf_put_u8(buf, 1);
|
|
wpabuf_put_u8(buf, eap->auth_val[j]);
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_nai_realm_data(struct wpabuf *buf,
|
|
struct hostapd_nai_realm_data *realm,
|
|
unsigned int realm_idx)
|
|
{
|
|
u8 *realm_data_len;
|
|
|
|
wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
|
|
(int) os_strlen(realm->realm[realm_idx]));
|
|
realm_data_len = wpabuf_put(buf, 2);
|
|
wpabuf_put_u8(buf, realm->encoding);
|
|
wpabuf_put_u8(buf, os_strlen(realm->realm[realm_idx]));
|
|
wpabuf_put_str(buf, realm->realm[realm_idx]);
|
|
anqp_add_nai_realm_eap(buf, realm);
|
|
gas_anqp_set_element_len(buf, realm_data_len);
|
|
}
|
|
|
|
|
|
static int hs20_add_nai_home_realm_matches(struct hostapd_data *hapd,
|
|
struct wpabuf *buf,
|
|
const u8 *home_realm,
|
|
size_t home_realm_len)
|
|
{
|
|
unsigned int i, j, k;
|
|
u8 num_realms, num_matching = 0, encoding, realm_len, *realm_list_len;
|
|
struct hostapd_nai_realm_data *realm;
|
|
const u8 *pos, *realm_name, *end;
|
|
struct {
|
|
unsigned int realm_data_idx;
|
|
unsigned int realm_idx;
|
|
} matches[10];
|
|
|
|
pos = home_realm;
|
|
end = pos + home_realm_len;
|
|
if (pos + 1 > end) {
|
|
wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
|
|
home_realm, home_realm_len);
|
|
return -1;
|
|
}
|
|
num_realms = *pos++;
|
|
|
|
for (i = 0; i < num_realms && num_matching < 10; i++) {
|
|
if (pos + 2 > end) {
|
|
wpa_hexdump(MSG_DEBUG,
|
|
"Truncated NAI Home Realm Query",
|
|
home_realm, home_realm_len);
|
|
return -1;
|
|
}
|
|
encoding = *pos++;
|
|
realm_len = *pos++;
|
|
if (pos + realm_len > end) {
|
|
wpa_hexdump(MSG_DEBUG,
|
|
"Truncated NAI Home Realm Query",
|
|
home_realm, home_realm_len);
|
|
return -1;
|
|
}
|
|
realm_name = pos;
|
|
for (j = 0; j < hapd->conf->nai_realm_count &&
|
|
num_matching < 10; j++) {
|
|
const u8 *rpos, *rend;
|
|
realm = &hapd->conf->nai_realm_data[j];
|
|
if (encoding != realm->encoding)
|
|
continue;
|
|
|
|
rpos = realm_name;
|
|
while (rpos < realm_name + realm_len &&
|
|
num_matching < 10) {
|
|
for (rend = rpos;
|
|
rend < realm_name + realm_len; rend++) {
|
|
if (*rend == ';')
|
|
break;
|
|
}
|
|
for (k = 0; k < MAX_NAI_REALMS &&
|
|
realm->realm[k] &&
|
|
num_matching < 10; k++) {
|
|
if ((int) os_strlen(realm->realm[k]) !=
|
|
rend - rpos ||
|
|
os_strncmp((char *) rpos,
|
|
realm->realm[k],
|
|
rend - rpos) != 0)
|
|
continue;
|
|
matches[num_matching].realm_data_idx =
|
|
j;
|
|
matches[num_matching].realm_idx = k;
|
|
num_matching++;
|
|
}
|
|
rpos = rend + 1;
|
|
}
|
|
}
|
|
pos += realm_len;
|
|
}
|
|
|
|
realm_list_len = gas_anqp_add_element(buf, ANQP_NAI_REALM);
|
|
wpabuf_put_le16(buf, num_matching);
|
|
|
|
/*
|
|
* There are two ways to format. 1. each realm in a NAI Realm Data unit
|
|
* 2. all realms that share the same EAP methods in a NAI Realm Data
|
|
* unit. The first format is likely to be bigger in size than the
|
|
* second, but may be easier to parse and process by the receiver.
|
|
*/
|
|
for (i = 0; i < num_matching; i++) {
|
|
wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
|
|
matches[i].realm_data_idx, matches[i].realm_idx);
|
|
realm = &hapd->conf->nai_realm_data[matches[i].realm_data_idx];
|
|
anqp_add_nai_realm_data(buf, realm, matches[i].realm_idx);
|
|
}
|
|
gas_anqp_set_element_len(buf, realm_list_len);
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void anqp_add_nai_realm(struct hostapd_data *hapd, struct wpabuf *buf,
|
|
const u8 *home_realm, size_t home_realm_len,
|
|
int nai_realm, int nai_home_realm)
|
|
{
|
|
if (nai_realm && hapd->conf->nai_realm_data) {
|
|
u8 *len;
|
|
unsigned int i, j;
|
|
len = gas_anqp_add_element(buf, ANQP_NAI_REALM);
|
|
wpabuf_put_le16(buf, hapd->conf->nai_realm_count);
|
|
for (i = 0; i < hapd->conf->nai_realm_count; i++) {
|
|
u8 *realm_data_len, *realm_len;
|
|
struct hostapd_nai_realm_data *realm;
|
|
|
|
realm = &hapd->conf->nai_realm_data[i];
|
|
realm_data_len = wpabuf_put(buf, 2);
|
|
wpabuf_put_u8(buf, realm->encoding);
|
|
realm_len = wpabuf_put(buf, 1);
|
|
for (j = 0; realm->realm[j]; j++) {
|
|
if (j > 0)
|
|
wpabuf_put_u8(buf, ';');
|
|
wpabuf_put_str(buf, realm->realm[j]);
|
|
}
|
|
*realm_len = (u8 *) wpabuf_put(buf, 0) - realm_len - 1;
|
|
anqp_add_nai_realm_eap(buf, realm);
|
|
gas_anqp_set_element_len(buf, realm_data_len);
|
|
}
|
|
gas_anqp_set_element_len(buf, len);
|
|
} else if (nai_home_realm && hapd->conf->nai_realm_data) {
|
|
hs20_add_nai_home_realm_matches(hapd, buf, home_realm,
|
|
home_realm_len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_3gpp_cellular_network(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->anqp_3gpp_cell_net) {
|
|
wpabuf_put_le16(buf, ANQP_3GPP_CELLULAR_NETWORK);
|
|
wpabuf_put_le16(buf,
|
|
hapd->conf->anqp_3gpp_cell_net_len);
|
|
wpabuf_put_data(buf, hapd->conf->anqp_3gpp_cell_net,
|
|
hapd->conf->anqp_3gpp_cell_net_len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_domain_name(struct hostapd_data *hapd, struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->domain_name) {
|
|
wpabuf_put_le16(buf, ANQP_DOMAIN_NAME);
|
|
wpabuf_put_le16(buf, hapd->conf->domain_name_len);
|
|
wpabuf_put_data(buf, hapd->conf->domain_name,
|
|
hapd->conf->domain_name_len);
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
static void anqp_add_operator_friendly_name(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->hs20_oper_friendly_name) {
|
|
u8 *len;
|
|
unsigned int i;
|
|
len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_FRIENDLY_NAME);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
for (i = 0; i < hapd->conf->hs20_oper_friendly_name_count; i++)
|
|
{
|
|
struct hostapd_lang_string *vn;
|
|
vn = &hapd->conf->hs20_oper_friendly_name[i];
|
|
wpabuf_put_u8(buf, 3 + vn->name_len);
|
|
wpabuf_put_data(buf, vn->lang, 3);
|
|
wpabuf_put_data(buf, vn->name, vn->name_len);
|
|
}
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_wan_metrics(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->hs20_wan_metrics) {
|
|
u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
wpabuf_put_u8(buf, HS20_STYPE_WAN_METRICS);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
wpabuf_put_data(buf, hapd->conf->hs20_wan_metrics, 13);
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_connection_capability(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->hs20_connection_capability) {
|
|
u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
wpabuf_put_u8(buf, HS20_STYPE_CONNECTION_CAPABILITY);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
wpabuf_put_data(buf, hapd->conf->hs20_connection_capability,
|
|
hapd->conf->hs20_connection_capability_len);
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
}
|
|
|
|
|
|
static void anqp_add_operating_class(struct hostapd_data *hapd,
|
|
struct wpabuf *buf)
|
|
{
|
|
if (hapd->conf->hs20_operating_class) {
|
|
u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
wpabuf_put_u8(buf, HS20_STYPE_OPERATING_CLASS);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
wpabuf_put_data(buf, hapd->conf->hs20_operating_class,
|
|
hapd->conf->hs20_operating_class_len);
|
|
gas_anqp_set_element_len(buf, len);
|
|
}
|
|
}
|
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
|
static struct wpabuf *
|
|
gas_serv_build_gas_resp_payload(struct hostapd_data *hapd,
|
|
unsigned int request,
|
|
struct gas_dialog_info *di,
|
|
const u8 *home_realm, size_t home_realm_len)
|
|
{
|
|
struct wpabuf *buf;
|
|
|
|
buf = wpabuf_alloc(1400);
|
|
if (buf == NULL)
|
|
return NULL;
|
|
|
|
if (request & ANQP_REQ_CAPABILITY_LIST)
|
|
anqp_add_capab_list(hapd, buf);
|
|
if (request & ANQP_REQ_VENUE_NAME)
|
|
anqp_add_venue_name(hapd, buf);
|
|
if (request & ANQP_REQ_NETWORK_AUTH_TYPE)
|
|
anqp_add_network_auth_type(hapd, buf);
|
|
if (request & ANQP_REQ_ROAMING_CONSORTIUM)
|
|
anqp_add_roaming_consortium(hapd, buf);
|
|
if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY)
|
|
anqp_add_ip_addr_type_availability(hapd, buf);
|
|
if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
|
|
anqp_add_nai_realm(hapd, buf, home_realm, home_realm_len,
|
|
request & ANQP_REQ_NAI_REALM,
|
|
request & ANQP_REQ_NAI_HOME_REALM);
|
|
if (request & ANQP_REQ_3GPP_CELLULAR_NETWORK)
|
|
anqp_add_3gpp_cellular_network(hapd, buf);
|
|
if (request & ANQP_REQ_DOMAIN_NAME)
|
|
anqp_add_domain_name(hapd, buf);
|
|
|
|
#ifdef CONFIG_HS20
|
|
if (request & ANQP_REQ_HS_CAPABILITY_LIST)
|
|
anqp_add_hs_capab_list(hapd, buf);
|
|
if (request & ANQP_REQ_OPERATOR_FRIENDLY_NAME)
|
|
anqp_add_operator_friendly_name(hapd, buf);
|
|
if (request & ANQP_REQ_WAN_METRICS)
|
|
anqp_add_wan_metrics(hapd, buf);
|
|
if (request & ANQP_REQ_CONNECTION_CAPABILITY)
|
|
anqp_add_connection_capability(hapd, buf);
|
|
if (request & ANQP_REQ_OPERATING_CLASS)
|
|
anqp_add_operating_class(hapd, buf);
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
return buf;
|
|
}
|
|
|
|
|
|
static void gas_serv_clear_cached_ies(void *eloop_data, void *user_ctx)
|
|
{
|
|
struct gas_dialog_info *dia = eloop_data;
|
|
|
|
wpa_printf(MSG_DEBUG, "GAS: Timeout triggered, clearing dialog for "
|
|
"dialog token %d", dia->dialog_token);
|
|
|
|
gas_serv_dialog_clear(dia);
|
|
}
|
|
|
|
|
|
struct anqp_query_info {
|
|
unsigned int request;
|
|
unsigned int remote_request;
|
|
const u8 *home_realm_query;
|
|
size_t home_realm_query_len;
|
|
u16 remote_delay;
|
|
};
|
|
|
|
|
|
static void set_anqp_req(unsigned int bit, const char *name, int local,
|
|
unsigned int remote, u16 remote_delay,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
qi->request |= bit;
|
|
if (local) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: %s (local)", name);
|
|
} else if (bit & remote) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: %s (remote)", name);
|
|
qi->remote_request |= bit;
|
|
if (remote_delay > qi->remote_delay)
|
|
qi->remote_delay = remote_delay;
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "ANQP: %s not available", name);
|
|
}
|
|
}
|
|
|
|
|
|
static void rx_anqp_query_list_id(struct hostapd_data *hapd, u16 info_id,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
switch (info_id) {
|
|
case ANQP_CAPABILITY_LIST:
|
|
set_anqp_req(ANQP_REQ_CAPABILITY_LIST, "Capability List", 1, 0,
|
|
0, qi);
|
|
break;
|
|
case ANQP_VENUE_NAME:
|
|
set_anqp_req(ANQP_REQ_VENUE_NAME, "Venue Name",
|
|
hapd->conf->venue_name != NULL, 0, 0, qi);
|
|
break;
|
|
case ANQP_NETWORK_AUTH_TYPE:
|
|
set_anqp_req(ANQP_REQ_NETWORK_AUTH_TYPE, "Network Auth Type",
|
|
hapd->conf->network_auth_type != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case ANQP_ROAMING_CONSORTIUM:
|
|
set_anqp_req(ANQP_REQ_ROAMING_CONSORTIUM, "Roaming Consortium",
|
|
hapd->conf->roaming_consortium != NULL, 0, 0, qi);
|
|
break;
|
|
case ANQP_IP_ADDR_TYPE_AVAILABILITY:
|
|
set_anqp_req(ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY,
|
|
"IP Addr Type Availability",
|
|
hapd->conf->ipaddr_type_configured,
|
|
0, 0, qi);
|
|
break;
|
|
case ANQP_NAI_REALM:
|
|
set_anqp_req(ANQP_REQ_NAI_REALM, "NAI Realm",
|
|
hapd->conf->nai_realm_data != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case ANQP_3GPP_CELLULAR_NETWORK:
|
|
set_anqp_req(ANQP_REQ_3GPP_CELLULAR_NETWORK,
|
|
"3GPP Cellular Network",
|
|
hapd->conf->anqp_3gpp_cell_net != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case ANQP_DOMAIN_NAME:
|
|
set_anqp_req(ANQP_REQ_DOMAIN_NAME, "Domain Name",
|
|
hapd->conf->domain_name != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported Info Id %u",
|
|
info_id);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static void rx_anqp_query_list(struct hostapd_data *hapd,
|
|
const u8 *pos, const u8 *end,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
wpa_printf(MSG_DEBUG, "ANQP: %u Info IDs requested in Query list",
|
|
(unsigned int) (end - pos) / 2);
|
|
|
|
while (pos + 2 <= end) {
|
|
rx_anqp_query_list_id(hapd, WPA_GET_LE16(pos), qi);
|
|
pos += 2;
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
static void rx_anqp_hs_query_list(struct hostapd_data *hapd, u8 subtype,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
switch (subtype) {
|
|
case HS20_STYPE_CAPABILITY_LIST:
|
|
set_anqp_req(ANQP_REQ_HS_CAPABILITY_LIST, "HS Capability List",
|
|
1, 0, 0, qi);
|
|
break;
|
|
case HS20_STYPE_OPERATOR_FRIENDLY_NAME:
|
|
set_anqp_req(ANQP_REQ_OPERATOR_FRIENDLY_NAME,
|
|
"Operator Friendly Name",
|
|
hapd->conf->hs20_oper_friendly_name != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case HS20_STYPE_WAN_METRICS:
|
|
set_anqp_req(ANQP_REQ_WAN_METRICS, "WAN Metrics",
|
|
hapd->conf->hs20_wan_metrics != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case HS20_STYPE_CONNECTION_CAPABILITY:
|
|
set_anqp_req(ANQP_REQ_CONNECTION_CAPABILITY,
|
|
"Connection Capability",
|
|
hapd->conf->hs20_connection_capability != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
case HS20_STYPE_OPERATING_CLASS:
|
|
set_anqp_req(ANQP_REQ_OPERATING_CLASS, "Operating Class",
|
|
hapd->conf->hs20_operating_class != NULL,
|
|
0, 0, qi);
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported HS 2.0 subtype %u",
|
|
subtype);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static void rx_anqp_hs_nai_home_realm(struct hostapd_data *hapd,
|
|
const u8 *pos, const u8 *end,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
qi->request |= ANQP_REQ_NAI_HOME_REALM;
|
|
qi->home_realm_query = pos;
|
|
qi->home_realm_query_len = end - pos;
|
|
if (hapd->conf->nai_realm_data != NULL) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 NAI Home Realm Query "
|
|
"(local)");
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 NAI Home Realm Query not "
|
|
"available");
|
|
}
|
|
}
|
|
|
|
|
|
static void rx_anqp_vendor_specific(struct hostapd_data *hapd,
|
|
const u8 *pos, const u8 *end,
|
|
struct anqp_query_info *qi)
|
|
{
|
|
u32 oui;
|
|
u8 subtype;
|
|
|
|
if (pos + 4 > end) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Too short vendor specific ANQP "
|
|
"Query element");
|
|
return;
|
|
}
|
|
|
|
oui = WPA_GET_BE24(pos);
|
|
pos += 3;
|
|
if (oui != OUI_WFA) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported vendor OUI %06x",
|
|
oui);
|
|
return;
|
|
}
|
|
|
|
if (*pos != HS20_ANQP_OUI_TYPE) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported WFA vendor type %u",
|
|
*pos);
|
|
return;
|
|
}
|
|
pos++;
|
|
|
|
if (pos + 1 >= end)
|
|
return;
|
|
|
|
subtype = *pos++;
|
|
pos++; /* Reserved */
|
|
switch (subtype) {
|
|
case HS20_STYPE_QUERY_LIST:
|
|
wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 Query List");
|
|
while (pos < end) {
|
|
rx_anqp_hs_query_list(hapd, *pos, qi);
|
|
pos++;
|
|
}
|
|
break;
|
|
case HS20_STYPE_NAI_HOME_REALM_QUERY:
|
|
rx_anqp_hs_nai_home_realm(hapd, pos, end, qi);
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported HS 2.0 query subtype "
|
|
"%u", subtype);
|
|
break;
|
|
}
|
|
}
|
|
|
|
#endif /* CONFIG_HS20 */
|
|
|
|
|
|
static void gas_serv_req_local_processing(struct hostapd_data *hapd,
|
|
const u8 *sa, u8 dialog_token,
|
|
struct anqp_query_info *qi, int prot)
|
|
{
|
|
struct wpabuf *buf, *tx_buf;
|
|
|
|
buf = gas_serv_build_gas_resp_payload(hapd, qi->request, NULL,
|
|
qi->home_realm_query,
|
|
qi->home_realm_query_len);
|
|
wpa_hexdump_buf(MSG_MSGDUMP, "ANQP: Locally generated ANQP responses",
|
|
buf);
|
|
if (!buf)
|
|
return;
|
|
|
|
if (wpabuf_len(buf) > hapd->gas_frag_limit ||
|
|
hapd->conf->gas_comeback_delay) {
|
|
struct gas_dialog_info *di;
|
|
u16 comeback_delay = 1;
|
|
|
|
if (hapd->conf->gas_comeback_delay) {
|
|
/* Testing - allow overriding of the delay value */
|
|
comeback_delay = hapd->conf->gas_comeback_delay;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "ANQP: Too long response to fit in "
|
|
"initial response - use GAS comeback");
|
|
di = gas_dialog_create(hapd, sa, dialog_token);
|
|
if (!di) {
|
|
wpa_printf(MSG_INFO, "ANQP: Could not create dialog "
|
|
"for " MACSTR " (dialog token %u)",
|
|
MAC2STR(sa), dialog_token);
|
|
wpabuf_free(buf);
|
|
return;
|
|
}
|
|
di->prot = prot;
|
|
di->sd_resp = buf;
|
|
di->sd_resp_pos = 0;
|
|
tx_buf = gas_anqp_build_initial_resp_buf(
|
|
dialog_token, WLAN_STATUS_SUCCESS, comeback_delay,
|
|
NULL);
|
|
} else {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Initial response (no comeback)");
|
|
tx_buf = gas_anqp_build_initial_resp_buf(
|
|
dialog_token, WLAN_STATUS_SUCCESS, 0, buf);
|
|
wpabuf_free(buf);
|
|
}
|
|
if (!tx_buf)
|
|
return;
|
|
if (prot)
|
|
convert_to_protected_dual(tx_buf);
|
|
hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
|
|
wpabuf_head(tx_buf), wpabuf_len(tx_buf));
|
|
wpabuf_free(tx_buf);
|
|
}
|
|
|
|
|
|
static void gas_serv_rx_gas_initial_req(struct hostapd_data *hapd,
|
|
const u8 *sa,
|
|
const u8 *data, size_t len, int prot)
|
|
{
|
|
const u8 *pos = data;
|
|
const u8 *end = data + len;
|
|
const u8 *next;
|
|
u8 dialog_token;
|
|
u16 slen;
|
|
struct anqp_query_info qi;
|
|
const u8 *adv_proto;
|
|
|
|
if (len < 1 + 2)
|
|
return;
|
|
|
|
os_memset(&qi, 0, sizeof(qi));
|
|
|
|
dialog_token = *pos++;
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG,
|
|
"GAS: GAS Initial Request from " MACSTR " (dialog token %u) ",
|
|
MAC2STR(sa), dialog_token);
|
|
|
|
if (*pos != WLAN_EID_ADV_PROTO) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG,
|
|
"GAS: Unexpected IE in GAS Initial Request: %u", *pos);
|
|
return;
|
|
}
|
|
adv_proto = pos++;
|
|
|
|
slen = *pos++;
|
|
next = pos + slen;
|
|
if (next > end || slen < 2) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG,
|
|
"GAS: Invalid IE in GAS Initial Request");
|
|
return;
|
|
}
|
|
pos++; /* skip QueryRespLenLimit and PAME-BI */
|
|
|
|
if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
|
|
struct wpabuf *buf;
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG,
|
|
"GAS: Unsupported GAS advertisement protocol id %u",
|
|
*pos);
|
|
if (sa[0] & 0x01)
|
|
return; /* Invalid source address - drop silently */
|
|
buf = gas_build_initial_resp(
|
|
dialog_token, WLAN_STATUS_GAS_ADV_PROTO_NOT_SUPPORTED,
|
|
0, 2 + slen + 2);
|
|
if (buf == NULL)
|
|
return;
|
|
wpabuf_put_data(buf, adv_proto, 2 + slen);
|
|
wpabuf_put_le16(buf, 0); /* Query Response Length */
|
|
if (prot)
|
|
convert_to_protected_dual(buf);
|
|
hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
|
|
wpabuf_head(buf), wpabuf_len(buf));
|
|
wpabuf_free(buf);
|
|
return;
|
|
}
|
|
|
|
pos = next;
|
|
/* Query Request */
|
|
if (pos + 2 > end)
|
|
return;
|
|
slen = WPA_GET_LE16(pos);
|
|
pos += 2;
|
|
if (pos + slen > end)
|
|
return;
|
|
end = pos + slen;
|
|
|
|
/* ANQP Query Request */
|
|
while (pos < end) {
|
|
u16 info_id, elen;
|
|
|
|
if (pos + 4 > end)
|
|
return;
|
|
|
|
info_id = WPA_GET_LE16(pos);
|
|
pos += 2;
|
|
elen = WPA_GET_LE16(pos);
|
|
pos += 2;
|
|
|
|
if (pos + elen > end) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Invalid Query Request");
|
|
return;
|
|
}
|
|
|
|
switch (info_id) {
|
|
case ANQP_QUERY_LIST:
|
|
rx_anqp_query_list(hapd, pos, pos + elen, &qi);
|
|
break;
|
|
#ifdef CONFIG_HS20
|
|
case ANQP_VENDOR_SPECIFIC:
|
|
rx_anqp_vendor_specific(hapd, pos, pos + elen, &qi);
|
|
break;
|
|
#endif /* CONFIG_HS20 */
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "ANQP: Unsupported Query "
|
|
"Request element %u", info_id);
|
|
break;
|
|
}
|
|
|
|
pos += elen;
|
|
}
|
|
|
|
gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot);
|
|
}
|
|
|
|
|
|
void gas_serv_tx_gas_response(struct hostapd_data *hapd, const u8 *dst,
|
|
struct gas_dialog_info *dialog)
|
|
{
|
|
struct wpabuf *buf, *tx_buf;
|
|
u8 dialog_token = dialog->dialog_token;
|
|
size_t frag_len;
|
|
|
|
if (dialog->sd_resp == NULL) {
|
|
buf = gas_serv_build_gas_resp_payload(hapd,
|
|
dialog->all_requested,
|
|
dialog, NULL, 0);
|
|
wpa_hexdump_buf(MSG_MSGDUMP, "ANQP: Generated ANQP responses",
|
|
buf);
|
|
if (!buf)
|
|
goto tx_gas_response_done;
|
|
dialog->sd_resp = buf;
|
|
dialog->sd_resp_pos = 0;
|
|
}
|
|
frag_len = wpabuf_len(dialog->sd_resp) - dialog->sd_resp_pos;
|
|
if (frag_len > hapd->gas_frag_limit || dialog->comeback_delay ||
|
|
hapd->conf->gas_comeback_delay) {
|
|
u16 comeback_delay_tus = dialog->comeback_delay +
|
|
GAS_SERV_COMEBACK_DELAY_FUDGE;
|
|
u32 comeback_delay_secs, comeback_delay_usecs;
|
|
|
|
if (hapd->conf->gas_comeback_delay) {
|
|
/* Testing - allow overriding of the delay value */
|
|
comeback_delay_tus = hapd->conf->gas_comeback_delay;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "GAS: Response frag_len %u (frag limit "
|
|
"%u) and comeback delay %u, "
|
|
"requesting comebacks", (unsigned int) frag_len,
|
|
(unsigned int) hapd->gas_frag_limit,
|
|
dialog->comeback_delay);
|
|
tx_buf = gas_anqp_build_initial_resp_buf(dialog_token,
|
|
WLAN_STATUS_SUCCESS,
|
|
comeback_delay_tus,
|
|
NULL);
|
|
if (tx_buf) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG,
|
|
"GAS: Tx GAS Initial Resp (comeback = 10TU)");
|
|
if (dialog->prot)
|
|
convert_to_protected_dual(tx_buf);
|
|
hostapd_drv_send_action(hapd, hapd->iface->freq, 0,
|
|
dst,
|
|
wpabuf_head(tx_buf),
|
|
wpabuf_len(tx_buf));
|
|
}
|
|
wpabuf_free(tx_buf);
|
|
|
|
/* start a timer of 1.5 * comeback-delay */
|
|
comeback_delay_tus = comeback_delay_tus +
|
|
(comeback_delay_tus / 2);
|
|
comeback_delay_secs = (comeback_delay_tus * 1024) / 1000000;
|
|
comeback_delay_usecs = (comeback_delay_tus * 1024) -
|
|
(comeback_delay_secs * 1000000);
|
|
eloop_register_timeout(comeback_delay_secs,
|
|
comeback_delay_usecs,
|
|
gas_serv_clear_cached_ies, dialog,
|
|
NULL);
|
|
goto tx_gas_response_done;
|
|
}
|
|
|
|
buf = wpabuf_alloc_copy(wpabuf_head_u8(dialog->sd_resp) +
|
|
dialog->sd_resp_pos, frag_len);
|
|
if (buf == NULL) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Buffer allocation "
|
|
"failed");
|
|
goto tx_gas_response_done;
|
|
}
|
|
tx_buf = gas_anqp_build_initial_resp_buf(dialog_token,
|
|
WLAN_STATUS_SUCCESS, 0, buf);
|
|
wpabuf_free(buf);
|
|
if (tx_buf == NULL)
|
|
goto tx_gas_response_done;
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Tx GAS Initial "
|
|
"Response (frag_id %d frag_len %d)",
|
|
dialog->sd_frag_id, (int) frag_len);
|
|
dialog->sd_frag_id++;
|
|
|
|
if (dialog->prot)
|
|
convert_to_protected_dual(tx_buf);
|
|
hostapd_drv_send_action(hapd, hapd->iface->freq, 0, dst,
|
|
wpabuf_head(tx_buf), wpabuf_len(tx_buf));
|
|
wpabuf_free(tx_buf);
|
|
tx_gas_response_done:
|
|
gas_serv_clear_cached_ies(dialog, NULL);
|
|
}
|
|
|
|
|
|
static void gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd,
|
|
const u8 *sa,
|
|
const u8 *data, size_t len, int prot)
|
|
{
|
|
struct gas_dialog_info *dialog;
|
|
struct wpabuf *buf, *tx_buf;
|
|
u8 dialog_token;
|
|
size_t frag_len;
|
|
int more = 0;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "GAS: RX GAS Comeback Request", data, len);
|
|
if (len < 1)
|
|
return;
|
|
dialog_token = *data;
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Dialog Token: %u",
|
|
dialog_token);
|
|
|
|
dialog = gas_serv_dialog_find(hapd, sa, dialog_token);
|
|
if (!dialog) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: No pending SD "
|
|
"response fragment for " MACSTR " dialog token %u",
|
|
MAC2STR(sa), dialog_token);
|
|
|
|
if (sa[0] & 0x01)
|
|
return; /* Invalid source address - drop silently */
|
|
tx_buf = gas_anqp_build_comeback_resp_buf(
|
|
dialog_token, WLAN_STATUS_NO_OUTSTANDING_GAS_REQ, 0, 0,
|
|
0, NULL);
|
|
if (tx_buf == NULL)
|
|
return;
|
|
goto send_resp;
|
|
}
|
|
|
|
if (dialog->sd_resp == NULL) {
|
|
wpa_printf(MSG_DEBUG, "GAS: Remote request 0x%x received 0x%x",
|
|
dialog->requested, dialog->received);
|
|
if ((dialog->requested & dialog->received) !=
|
|
dialog->requested) {
|
|
wpa_printf(MSG_DEBUG, "GAS: Did not receive response "
|
|
"from remote processing");
|
|
gas_serv_dialog_clear(dialog);
|
|
tx_buf = gas_anqp_build_comeback_resp_buf(
|
|
dialog_token,
|
|
WLAN_STATUS_GAS_RESP_NOT_RECEIVED, 0, 0, 0,
|
|
NULL);
|
|
if (tx_buf == NULL)
|
|
return;
|
|
goto send_resp;
|
|
}
|
|
|
|
buf = gas_serv_build_gas_resp_payload(hapd,
|
|
dialog->all_requested,
|
|
dialog, NULL, 0);
|
|
wpa_hexdump_buf(MSG_MSGDUMP, "ANQP: Generated ANQP responses",
|
|
buf);
|
|
if (!buf)
|
|
goto rx_gas_comeback_req_done;
|
|
dialog->sd_resp = buf;
|
|
dialog->sd_resp_pos = 0;
|
|
}
|
|
frag_len = wpabuf_len(dialog->sd_resp) - dialog->sd_resp_pos;
|
|
if (frag_len > hapd->gas_frag_limit) {
|
|
frag_len = hapd->gas_frag_limit;
|
|
more = 1;
|
|
}
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: resp frag_len %u",
|
|
(unsigned int) frag_len);
|
|
buf = wpabuf_alloc_copy(wpabuf_head_u8(dialog->sd_resp) +
|
|
dialog->sd_resp_pos, frag_len);
|
|
if (buf == NULL) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Failed to allocate "
|
|
"buffer");
|
|
goto rx_gas_comeback_req_done;
|
|
}
|
|
tx_buf = gas_anqp_build_comeback_resp_buf(dialog_token,
|
|
WLAN_STATUS_SUCCESS,
|
|
dialog->sd_frag_id,
|
|
more, 0, buf);
|
|
wpabuf_free(buf);
|
|
if (tx_buf == NULL)
|
|
goto rx_gas_comeback_req_done;
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Tx GAS Comeback Response "
|
|
"(frag_id %d more=%d frag_len=%d)",
|
|
dialog->sd_frag_id, more, (int) frag_len);
|
|
dialog->sd_frag_id++;
|
|
dialog->sd_resp_pos += frag_len;
|
|
|
|
if (more) {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: %d more bytes remain "
|
|
"to be sent",
|
|
(int) (wpabuf_len(dialog->sd_resp) -
|
|
dialog->sd_resp_pos));
|
|
} else {
|
|
wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: All fragments of "
|
|
"SD response sent");
|
|
gas_serv_dialog_clear(dialog);
|
|
gas_serv_free_dialogs(hapd, sa);
|
|
}
|
|
|
|
send_resp:
|
|
if (prot)
|
|
convert_to_protected_dual(tx_buf);
|
|
hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
|
|
wpabuf_head(tx_buf), wpabuf_len(tx_buf));
|
|
wpabuf_free(tx_buf);
|
|
return;
|
|
|
|
rx_gas_comeback_req_done:
|
|
gas_serv_clear_cached_ies(dialog, NULL);
|
|
}
|
|
|
|
|
|
static void gas_serv_rx_public_action(void *ctx, const u8 *buf, size_t len,
|
|
int freq)
|
|
{
|
|
struct hostapd_data *hapd = ctx;
|
|
const struct ieee80211_mgmt *mgmt;
|
|
size_t hdr_len;
|
|
const u8 *sa, *data;
|
|
int prot;
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) buf;
|
|
hdr_len = (const u8 *) &mgmt->u.action.u.vs_public_action.action - buf;
|
|
if (hdr_len > len)
|
|
return;
|
|
if (mgmt->u.action.category != WLAN_ACTION_PUBLIC &&
|
|
mgmt->u.action.category != WLAN_ACTION_PROTECTED_DUAL)
|
|
return;
|
|
/*
|
|
* Note: Public Action and Protected Dual of Public Action frames share
|
|
* the same payload structure, so it is fine to use definitions of
|
|
* Public Action frames to process both.
|
|
*/
|
|
prot = mgmt->u.action.category == WLAN_ACTION_PROTECTED_DUAL;
|
|
sa = mgmt->sa;
|
|
len -= hdr_len;
|
|
data = &mgmt->u.action.u.public_action.action;
|
|
switch (data[0]) {
|
|
case WLAN_PA_GAS_INITIAL_REQ:
|
|
gas_serv_rx_gas_initial_req(hapd, sa, data + 1, len - 1, prot);
|
|
break;
|
|
case WLAN_PA_GAS_COMEBACK_REQ:
|
|
gas_serv_rx_gas_comeback_req(hapd, sa, data + 1, len - 1, prot);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
int gas_serv_init(struct hostapd_data *hapd)
|
|
{
|
|
hapd->public_action_cb2 = gas_serv_rx_public_action;
|
|
hapd->public_action_cb2_ctx = hapd;
|
|
hapd->gas_frag_limit = 1400;
|
|
if (hapd->conf->gas_frag_limit > 0)
|
|
hapd->gas_frag_limit = hapd->conf->gas_frag_limit;
|
|
return 0;
|
|
}
|
|
|
|
|
|
void gas_serv_deinit(struct hostapd_data *hapd)
|
|
{
|
|
}
|