|
@@ -3957,6 +3957,122 @@ static int get_anqp(struct wpa_supplicant *wpa_s, char *dst)
|
|
|
|
|
|
return anqp_send_req(wpa_s, dst_addr, id, num_id);
|
|
|
}
|
|
|
+
|
|
|
+
|
|
|
+static int gas_request(struct wpa_supplicant *wpa_s, char *cmd)
|
|
|
+{
|
|
|
+ u8 dst_addr[ETH_ALEN];
|
|
|
+ struct wpabuf *advproto, *query = NULL;
|
|
|
+ int used, ret = -1;
|
|
|
+ char *pos, *end;
|
|
|
+ size_t len;
|
|
|
+
|
|
|
+ used = hwaddr_aton2(cmd, dst_addr);
|
|
|
+ if (used < 0)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = cmd + used;
|
|
|
+ while (*pos == ' ')
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ /* Advertisement Protocol ID */
|
|
|
+ end = os_strchr(pos, ' ');
|
|
|
+ if (end)
|
|
|
+ len = end - pos;
|
|
|
+ else
|
|
|
+ len = os_strlen(pos);
|
|
|
+ if (len & 0x01)
|
|
|
+ return -1;
|
|
|
+ len /= 2;
|
|
|
+ if (len == 0)
|
|
|
+ return -1;
|
|
|
+ advproto = wpabuf_alloc(len);
|
|
|
+ if (advproto == NULL)
|
|
|
+ return -1;
|
|
|
+ if (hexstr2bin(pos, wpabuf_put(advproto, len), len) < 0)
|
|
|
+ goto fail;
|
|
|
+
|
|
|
+ if (end) {
|
|
|
+ /* Optional Query Request */
|
|
|
+ pos = end + 1;
|
|
|
+ while (*pos == ' ')
|
|
|
+ pos++;
|
|
|
+
|
|
|
+ len = os_strlen(pos);
|
|
|
+ if (len) {
|
|
|
+ if (len & 0x01)
|
|
|
+ goto fail;
|
|
|
+ len /= 2;
|
|
|
+ if (len == 0)
|
|
|
+ goto fail;
|
|
|
+ query = wpabuf_alloc(len);
|
|
|
+ if (query == NULL)
|
|
|
+ goto fail;
|
|
|
+ if (hexstr2bin(pos, wpabuf_put(query, len), len) < 0)
|
|
|
+ goto fail;
|
|
|
+ }
|
|
|
+ }
|
|
|
+
|
|
|
+ ret = gas_send_request(wpa_s, dst_addr, advproto, query);
|
|
|
+
|
|
|
+fail:
|
|
|
+ wpabuf_free(advproto);
|
|
|
+ wpabuf_free(query);
|
|
|
+
|
|
|
+ return ret;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
+static int gas_response_get(struct wpa_supplicant *wpa_s, char *cmd, char *buf,
|
|
|
+ size_t buflen)
|
|
|
+{
|
|
|
+ u8 addr[ETH_ALEN];
|
|
|
+ int dialog_token;
|
|
|
+ int used;
|
|
|
+ char *pos;
|
|
|
+ size_t resp_len, start, requested_len;
|
|
|
+
|
|
|
+ if (!wpa_s->last_gas_resp)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ used = hwaddr_aton2(cmd, addr);
|
|
|
+ if (used < 0)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ pos = cmd + used;
|
|
|
+ while (*pos == ' ')
|
|
|
+ pos++;
|
|
|
+ dialog_token = atoi(pos);
|
|
|
+
|
|
|
+ if (os_memcmp(addr, wpa_s->last_gas_addr, ETH_ALEN) != 0 ||
|
|
|
+ dialog_token != wpa_s->last_gas_dialog_token)
|
|
|
+ return -1;
|
|
|
+
|
|
|
+ resp_len = wpabuf_len(wpa_s->last_gas_resp);
|
|
|
+ start = 0;
|
|
|
+ requested_len = resp_len;
|
|
|
+
|
|
|
+ pos = os_strchr(pos, ' ');
|
|
|
+ if (pos) {
|
|
|
+ start = atoi(pos);
|
|
|
+ if (start > resp_len)
|
|
|
+ return os_snprintf(buf, buflen, "FAIL-Invalid range");
|
|
|
+ pos = os_strchr(pos, ',');
|
|
|
+ if (pos == NULL)
|
|
|
+ return -1;
|
|
|
+ pos++;
|
|
|
+ requested_len = atoi(pos);
|
|
|
+ if (start + requested_len > resp_len)
|
|
|
+ return os_snprintf(buf, buflen, "FAIL-Invalid range");
|
|
|
+ }
|
|
|
+
|
|
|
+ if (requested_len * 2 + 1 > buflen)
|
|
|
+ return os_snprintf(buf, buflen, "FAIL-Too long response");
|
|
|
+
|
|
|
+ return wpa_snprintf_hex(buf, buflen,
|
|
|
+ wpabuf_head_u8(wpa_s->last_gas_resp) + start,
|
|
|
+ requested_len);
|
|
|
+}
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
|
|
|
@@ -4432,6 +4548,12 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
|
|
|
} else if (os_strncmp(buf, "ANQP_GET ", 9) == 0) {
|
|
|
if (get_anqp(wpa_s, buf + 9) < 0)
|
|
|
reply_len = -1;
|
|
|
+ } else if (os_strncmp(buf, "GAS_REQUEST ", 12) == 0) {
|
|
|
+ if (gas_request(wpa_s, buf + 12) < 0)
|
|
|
+ reply_len = -1;
|
|
|
+ } else if (os_strncmp(buf, "GAS_RESPONSE_GET ", 17) == 0) {
|
|
|
+ reply_len = gas_response_get(wpa_s, buf + 17, reply,
|
|
|
+ reply_size);
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
#ifdef CONFIG_HS20
|
|
|
} else if (os_strncmp(buf, "HS20_ANQP_GET ", 14) == 0) {
|