|
@@ -2283,50 +2283,6 @@ static void wpa_supplicant_event_unprot_disassoc(struct wpa_supplicant *wpa_s,
|
|
|
}
|
|
|
|
|
|
|
|
|
-static void wnm_action_rx(struct wpa_supplicant *wpa_s, struct rx_action *rx)
|
|
|
-{
|
|
|
- u8 action, mode;
|
|
|
- const u8 *pos, *end;
|
|
|
-
|
|
|
- if (rx->data == NULL || rx->len == 0)
|
|
|
- return;
|
|
|
-
|
|
|
- pos = rx->data;
|
|
|
- end = pos + rx->len;
|
|
|
- action = *pos++;
|
|
|
-
|
|
|
- wpa_printf(MSG_DEBUG, "WNM: RX action %u from " MACSTR,
|
|
|
- action, MAC2STR(rx->sa));
|
|
|
- switch (action) {
|
|
|
- case WNM_BSS_TRANS_MGMT_REQ:
|
|
|
- if (pos + 5 > end)
|
|
|
- break;
|
|
|
- wpa_printf(MSG_DEBUG, "WNM: BSS Transition Management "
|
|
|
- "Request: dialog_token=%u request_mode=0x%x "
|
|
|
- "disassoc_timer=%u validity_interval=%u",
|
|
|
- pos[0], pos[1], WPA_GET_LE16(pos + 2), pos[4]);
|
|
|
- mode = pos[1];
|
|
|
- pos += 5;
|
|
|
- if (mode & 0x08)
|
|
|
- pos += 12; /* BSS Termination Duration */
|
|
|
- if (mode & 0x10) {
|
|
|
- char url[256];
|
|
|
- if (pos + 1 > end || pos + 1 + pos[0] > end) {
|
|
|
- wpa_printf(MSG_DEBUG, "WNM: Invalid BSS "
|
|
|
- "Transition Management Request "
|
|
|
- "(URL)");
|
|
|
- break;
|
|
|
- }
|
|
|
- os_memcpy(url, pos + 1, pos[0]);
|
|
|
- url[pos[0]] = '\0';
|
|
|
- wpa_msg(wpa_s, MSG_INFO, "WNM: ESS Disassociation "
|
|
|
- "Imminent - session_info_url=%s", url);
|
|
|
- }
|
|
|
- break;
|
|
|
- }
|
|
|
-}
|
|
|
-
|
|
|
-
|
|
|
void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
|
|
|
union wpa_event_data *data)
|
|
|
{
|
|
@@ -2729,10 +2685,6 @@ void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
|
|
|
data->rx_action.freq) == 0)
|
|
|
break;
|
|
|
#endif /* CONFIG_GAS */
|
|
|
- if (data->rx_action.category == WLAN_ACTION_WNM) {
|
|
|
- wnm_action_rx(wpa_s, &data->rx_action);
|
|
|
- break;
|
|
|
- }
|
|
|
#ifdef CONFIG_TDLS
|
|
|
if (data->rx_action.category == WLAN_ACTION_PUBLIC &&
|
|
|
data->rx_action.len >= 4 &&
|