|
@@ -124,6 +124,9 @@ struct wpa_tdls_peer {
|
|
|
struct ieee80211_ht_capabilities *ht_capabilities;
|
|
|
|
|
|
u8 qos_info;
|
|
|
+
|
|
|
+ u8 *ext_capab;
|
|
|
+ size_t ext_capab_len;
|
|
|
};
|
|
|
|
|
|
|
|
@@ -617,6 +620,8 @@ static void wpa_tdls_peer_free(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
|
|
|
peer->sm_tmr.buf = NULL;
|
|
|
os_free(peer->ht_capabilities);
|
|
|
peer->ht_capabilities = NULL;
|
|
|
+ os_free(peer->ext_capab);
|
|
|
+ peer->ext_capab = NULL;
|
|
|
peer->rsnie_i_len = peer->rsnie_p_len = 0;
|
|
|
peer->cipher = 0;
|
|
|
peer->tpk_set = peer->tpk_success = 0;
|
|
@@ -1365,6 +1370,30 @@ static int copy_peer_ht_capab(const struct wpa_eapol_ie_parse *kde,
|
|
|
}
|
|
|
|
|
|
|
|
|
+static int copy_peer_ext_capab(const struct wpa_eapol_ie_parse *kde,
|
|
|
+ struct wpa_tdls_peer *peer)
|
|
|
+{
|
|
|
+ if (!kde->ext_capab) {
|
|
|
+ wpa_printf(MSG_DEBUG, "TDLS: No extended capabilities "
|
|
|
+ "received");
|
|
|
+ return 0;
|
|
|
+ }
|
|
|
+
|
|
|
+ if (!peer->ext_capab || peer->ext_capab_len < kde->ext_capab_len - 2) {
|
|
|
+ /* Need to allocate buffer to fit the new information */
|
|
|
+ os_free(peer->ext_capab);
|
|
|
+ peer->ext_capab = os_zalloc(kde->ext_capab_len - 2);
|
|
|
+ if (peer->ext_capab == NULL)
|
|
|
+ return -1;
|
|
|
+ }
|
|
|
+
|
|
|
+ peer->ext_capab_len = kde->ext_capab_len - 2;
|
|
|
+ os_memcpy(peer->ext_capab, kde->ext_capab + 2, peer->ext_capab_len);
|
|
|
+
|
|
|
+ return 0;
|
|
|
+}
|
|
|
+
|
|
|
+
|
|
|
static int wpa_tdls_process_tpk_m1(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
const u8 *buf, size_t len)
|
|
|
{
|
|
@@ -1437,6 +1466,9 @@ static int wpa_tdls_process_tpk_m1(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
if (copy_peer_ht_capab(&kde, peer) < 0)
|
|
|
goto error;
|
|
|
|
|
|
+ if (copy_peer_ext_capab(&kde, peer) < 0)
|
|
|
+ goto error;
|
|
|
+
|
|
|
peer->qos_info = kde.qosinfo;
|
|
|
|
|
|
#ifdef CONFIG_TDLS_TESTING
|
|
@@ -1662,7 +1694,8 @@ skip_rsn:
|
|
|
|
|
|
skip_rsn_check:
|
|
|
/* add the peer to the driver as a "setup in progress" peer */
|
|
|
- wpa_sm_tdls_peer_addset(sm, peer->addr, 1, 0, NULL, 0, NULL, 0);
|
|
|
+ wpa_sm_tdls_peer_addset(sm, peer->addr, 1, 0, NULL, 0, NULL, 0,
|
|
|
+ NULL, 0);
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "TDLS: Sending TDLS Setup Response / TPK M2");
|
|
|
if (wpa_tdls_send_tpk_m2(sm, src_addr, dtoken, lnkid, peer) < 0) {
|
|
@@ -1702,10 +1735,11 @@ static void wpa_tdls_enable_link(struct wpa_sm *sm, struct wpa_tdls_peer *peer)
|
|
|
#endif /* CONFIG_TDLS_TESTING */
|
|
|
}
|
|
|
|
|
|
- /* add supported rates and capabilities to the TDLS peer */
|
|
|
+ /* add supported rates, capabilities, and qos_info to the TDLS peer */
|
|
|
wpa_sm_tdls_peer_addset(sm, peer->addr, 0, peer->capability,
|
|
|
peer->supp_rates, peer->supp_rates_len,
|
|
|
- peer->ht_capabilities, peer->qos_info);
|
|
|
+ peer->ht_capabilities, peer->qos_info,
|
|
|
+ peer->ext_capab, peer->ext_capab_len);
|
|
|
|
|
|
wpa_sm_tdls_oper(sm, TDLS_ENABLE_LINK, peer->addr);
|
|
|
}
|
|
@@ -1804,6 +1838,9 @@ static int wpa_tdls_process_tpk_m2(struct wpa_sm *sm, const u8 *src_addr,
|
|
|
if (copy_peer_ht_capab(&kde, peer) < 0)
|
|
|
goto error;
|
|
|
|
|
|
+ if (copy_peer_ext_capab(&kde, peer) < 0)
|
|
|
+ goto error;
|
|
|
+
|
|
|
peer->qos_info = kde.qosinfo;
|
|
|
|
|
|
if (!wpa_tdls_get_privacy(sm)) {
|
|
@@ -2109,7 +2146,8 @@ int wpa_tdls_start(struct wpa_sm *sm, const u8 *addr)
|
|
|
peer->initiator = 1;
|
|
|
|
|
|
/* add the peer to the driver as a "setup in progress" peer */
|
|
|
- wpa_sm_tdls_peer_addset(sm, peer->addr, 1, 0, NULL, 0, NULL, 0);
|
|
|
+ wpa_sm_tdls_peer_addset(sm, peer->addr, 1, 0, NULL, 0, NULL, 0,
|
|
|
+ NULL, 0);
|
|
|
|
|
|
if (wpa_tdls_send_tpk_m1(sm, peer) < 0) {
|
|
|
wpa_tdls_disable_link(sm, peer->addr);
|