mbo.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807
  1. /*
  2. * wpa_supplicant - MBO
  3. *
  4. * Copyright(c) 2015 Intel Deutschland GmbH
  5. * Contact Information:
  6. * Intel Linux Wireless <ilw@linux.intel.com>
  7. * Intel Corporation, 5200 N.E. Elam Young Parkway, Hillsboro, OR 97124-6497
  8. *
  9. * This software may be distributed under the terms of the BSD license.
  10. * See README for more details.
  11. */
  12. #include "utils/includes.h"
  13. #include "utils/common.h"
  14. #include "common/ieee802_11_defs.h"
  15. #include "config.h"
  16. #include "wpa_supplicant_i.h"
  17. #include "driver_i.h"
  18. #include "bss.h"
  19. #include "scan.h"
  20. /* type + length + oui + oui type */
  21. #define MBO_IE_HEADER 6
  22. static int wpas_mbo_validate_non_pref_chan(u8 oper_class, u8 chan, u8 reason)
  23. {
  24. if (reason > MBO_NON_PREF_CHAN_REASON_INT_INTERFERENCE)
  25. return -1;
  26. /* Only checking the validity of the channel and oper_class */
  27. if (ieee80211_chan_to_freq(NULL, oper_class, chan) == -1)
  28. return -1;
  29. return 0;
  30. }
  31. const u8 * wpas_mbo_get_bss_attr(struct wpa_bss *bss, enum mbo_attr_id attr)
  32. {
  33. const u8 *mbo, *end;
  34. if (!bss)
  35. return NULL;
  36. mbo = wpa_bss_get_vendor_ie(bss, MBO_IE_VENDOR_TYPE);
  37. if (!mbo)
  38. return NULL;
  39. end = mbo + 2 + mbo[1];
  40. mbo += MBO_IE_HEADER;
  41. return get_ie(mbo, end - mbo, attr);
  42. }
  43. static void wpas_mbo_non_pref_chan_attr_body(struct wpa_supplicant *wpa_s,
  44. struct wpabuf *mbo,
  45. u8 start, u8 end)
  46. {
  47. u8 i;
  48. wpabuf_put_u8(mbo, wpa_s->non_pref_chan[start].oper_class);
  49. for (i = start; i < end; i++)
  50. wpabuf_put_u8(mbo, wpa_s->non_pref_chan[i].chan);
  51. wpabuf_put_u8(mbo, wpa_s->non_pref_chan[start].preference);
  52. wpabuf_put_u8(mbo, wpa_s->non_pref_chan[start].reason);
  53. }
  54. static void wpas_mbo_non_pref_chan_attr(struct wpa_supplicant *wpa_s,
  55. struct wpabuf *mbo, u8 start, u8 end)
  56. {
  57. size_t size = end - start + 3;
  58. if (size + 2 > wpabuf_tailroom(mbo))
  59. return;
  60. wpabuf_put_u8(mbo, MBO_ATTR_ID_NON_PREF_CHAN_REPORT);
  61. wpabuf_put_u8(mbo, size); /* Length */
  62. wpas_mbo_non_pref_chan_attr_body(wpa_s, mbo, start, end);
  63. }
  64. static void wpas_mbo_non_pref_chan_subelem_hdr(struct wpabuf *mbo, u8 len)
  65. {
  66. wpabuf_put_u8(mbo, WLAN_EID_VENDOR_SPECIFIC);
  67. wpabuf_put_u8(mbo, len); /* Length */
  68. wpabuf_put_be24(mbo, OUI_WFA);
  69. wpabuf_put_u8(mbo, MBO_ATTR_ID_NON_PREF_CHAN_REPORT);
  70. }
  71. static void wpas_mbo_non_pref_chan_subelement(struct wpa_supplicant *wpa_s,
  72. struct wpabuf *mbo, u8 start,
  73. u8 end)
  74. {
  75. size_t size = end - start + 7;
  76. if (size + 2 > wpabuf_tailroom(mbo))
  77. return;
  78. wpas_mbo_non_pref_chan_subelem_hdr(mbo, size);
  79. wpas_mbo_non_pref_chan_attr_body(wpa_s, mbo, start, end);
  80. }
  81. static void wpas_mbo_non_pref_chan_attrs(struct wpa_supplicant *wpa_s,
  82. struct wpabuf *mbo, int subelement)
  83. {
  84. u8 i, start = 0;
  85. struct wpa_mbo_non_pref_channel *start_pref;
  86. if (!wpa_s->non_pref_chan || !wpa_s->non_pref_chan_num) {
  87. if (subelement)
  88. wpas_mbo_non_pref_chan_subelem_hdr(mbo, 4);
  89. return;
  90. }
  91. start_pref = &wpa_s->non_pref_chan[0];
  92. for (i = 1; i <= wpa_s->non_pref_chan_num; i++) {
  93. struct wpa_mbo_non_pref_channel *non_pref = NULL;
  94. if (i < wpa_s->non_pref_chan_num)
  95. non_pref = &wpa_s->non_pref_chan[i];
  96. if (!non_pref ||
  97. non_pref->oper_class != start_pref->oper_class ||
  98. non_pref->reason != start_pref->reason ||
  99. non_pref->preference != start_pref->preference) {
  100. if (subelement)
  101. wpas_mbo_non_pref_chan_subelement(wpa_s, mbo,
  102. start, i);
  103. else
  104. wpas_mbo_non_pref_chan_attr(wpa_s, mbo, start,
  105. i);
  106. if (!non_pref)
  107. return;
  108. start = i;
  109. start_pref = non_pref;
  110. }
  111. }
  112. }
  113. int wpas_mbo_ie(struct wpa_supplicant *wpa_s, u8 *buf, size_t len)
  114. {
  115. struct wpabuf *mbo;
  116. int res;
  117. if (len < MBO_IE_HEADER + 3 + 7)
  118. return 0;
  119. /* Leave room for the MBO IE header */
  120. mbo = wpabuf_alloc(len - MBO_IE_HEADER);
  121. if (!mbo)
  122. return 0;
  123. /* Add non-preferred channels attribute */
  124. wpas_mbo_non_pref_chan_attrs(wpa_s, mbo, 0);
  125. /*
  126. * Send cellular capabilities attribute even if AP does not advertise
  127. * cellular capabilities.
  128. */
  129. wpabuf_put_u8(mbo, MBO_ATTR_ID_CELL_DATA_CAPA);
  130. wpabuf_put_u8(mbo, 1);
  131. wpabuf_put_u8(mbo, wpa_s->conf->mbo_cell_capa);
  132. res = mbo_add_ie(buf, len, wpabuf_head_u8(mbo), wpabuf_len(mbo));
  133. if (!res)
  134. wpa_printf(MSG_ERROR, "Failed to add MBO IE");
  135. wpabuf_free(mbo);
  136. return res;
  137. }
  138. static void wpas_mbo_send_wnm_notification(struct wpa_supplicant *wpa_s,
  139. const u8 *data, size_t len)
  140. {
  141. struct wpabuf *buf;
  142. int res;
  143. /*
  144. * Send WNM-Notification Request frame only in case of a change in
  145. * non-preferred channels list during association, if the AP supports
  146. * MBO.
  147. */
  148. if (wpa_s->wpa_state != WPA_COMPLETED || !wpa_s->current_bss ||
  149. !wpa_bss_get_vendor_ie(wpa_s->current_bss, MBO_IE_VENDOR_TYPE))
  150. return;
  151. buf = wpabuf_alloc(4 + len);
  152. if (!buf)
  153. return;
  154. wpabuf_put_u8(buf, WLAN_ACTION_WNM);
  155. wpabuf_put_u8(buf, WNM_NOTIFICATION_REQ);
  156. wpa_s->mbo_wnm_token++;
  157. if (wpa_s->mbo_wnm_token == 0)
  158. wpa_s->mbo_wnm_token++;
  159. wpabuf_put_u8(buf, wpa_s->mbo_wnm_token);
  160. wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC); /* Type */
  161. wpabuf_put_data(buf, data, len);
  162. res = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
  163. wpa_s->own_addr, wpa_s->bssid,
  164. wpabuf_head(buf), wpabuf_len(buf), 0);
  165. if (res < 0)
  166. wpa_printf(MSG_DEBUG,
  167. "Failed to send WNM-Notification Request frame with non-preferred channel list");
  168. wpabuf_free(buf);
  169. }
  170. static void wpas_mbo_non_pref_chan_changed(struct wpa_supplicant *wpa_s)
  171. {
  172. struct wpabuf *buf;
  173. buf = wpabuf_alloc(512);
  174. if (!buf)
  175. return;
  176. wpas_mbo_non_pref_chan_attrs(wpa_s, buf, 1);
  177. wpas_mbo_send_wnm_notification(wpa_s, wpabuf_head_u8(buf),
  178. wpabuf_len(buf));
  179. wpabuf_free(buf);
  180. }
  181. static int wpa_non_pref_chan_is_eq(struct wpa_mbo_non_pref_channel *a,
  182. struct wpa_mbo_non_pref_channel *b)
  183. {
  184. return a->oper_class == b->oper_class && a->chan == b->chan;
  185. }
  186. /*
  187. * wpa_non_pref_chan_cmp - Compare two channels for sorting
  188. *
  189. * In MBO IE non-preferred channel subelement we can put many channels in an
  190. * attribute if they are in the same operating class and have the same
  191. * preference and reason. To make it easy for the functions that build
  192. * the IE attributes and WNM Request subelements, save the channels sorted
  193. * by their oper_class and reason.
  194. */
  195. static int wpa_non_pref_chan_cmp(const void *_a, const void *_b)
  196. {
  197. const struct wpa_mbo_non_pref_channel *a = _a, *b = _b;
  198. if (a->oper_class != b->oper_class)
  199. return a->oper_class - b->oper_class;
  200. if (a->reason != b->reason)
  201. return a->reason - b->reason;
  202. return a->preference - b->preference;
  203. }
  204. int wpas_mbo_update_non_pref_chan(struct wpa_supplicant *wpa_s,
  205. const char *non_pref_chan)
  206. {
  207. char *cmd, *token, *context = NULL;
  208. struct wpa_mbo_non_pref_channel *chans = NULL, *tmp_chans;
  209. size_t num = 0, size = 0;
  210. unsigned i;
  211. wpa_printf(MSG_DEBUG, "MBO: Update non-preferred channels, non_pref_chan=%s",
  212. non_pref_chan ? non_pref_chan : "N/A");
  213. /*
  214. * The shortest channel configuration is 10 characters - commas, 3
  215. * colons, and 4 values that one of them (oper_class) is 2 digits or
  216. * more.
  217. */
  218. if (!non_pref_chan || os_strlen(non_pref_chan) < 10)
  219. goto update;
  220. cmd = os_strdup(non_pref_chan);
  221. if (!cmd)
  222. return -1;
  223. while ((token = str_token(cmd, " ", &context))) {
  224. struct wpa_mbo_non_pref_channel *chan;
  225. int ret;
  226. unsigned int _oper_class;
  227. unsigned int _chan;
  228. unsigned int _preference;
  229. unsigned int _reason;
  230. if (num == size) {
  231. size = size ? size * 2 : 1;
  232. tmp_chans = os_realloc_array(chans, size,
  233. sizeof(*chans));
  234. if (!tmp_chans) {
  235. wpa_printf(MSG_ERROR,
  236. "Couldn't reallocate non_pref_chan");
  237. goto fail;
  238. }
  239. chans = tmp_chans;
  240. }
  241. chan = &chans[num];
  242. ret = sscanf(token, "%u:%u:%u:%u", &_oper_class,
  243. &_chan, &_preference, &_reason);
  244. if (ret != 4 ||
  245. _oper_class > 255 || _chan > 255 ||
  246. _preference > 255 || _reason > 65535 ) {
  247. wpa_printf(MSG_ERROR, "Invalid non-pref chan input %s",
  248. token);
  249. goto fail;
  250. }
  251. chan->oper_class = _oper_class;
  252. chan->chan = _chan;
  253. chan->preference = _preference;
  254. chan->reason = _reason;
  255. if (wpas_mbo_validate_non_pref_chan(chan->oper_class,
  256. chan->chan, chan->reason)) {
  257. wpa_printf(MSG_ERROR,
  258. "Invalid non_pref_chan: oper class %d chan %d reason %d",
  259. chan->oper_class, chan->chan, chan->reason);
  260. goto fail;
  261. }
  262. for (i = 0; i < num; i++)
  263. if (wpa_non_pref_chan_is_eq(chan, &chans[i]))
  264. break;
  265. if (i != num) {
  266. wpa_printf(MSG_ERROR,
  267. "oper class %d chan %d is duplicated",
  268. chan->oper_class, chan->chan);
  269. goto fail;
  270. }
  271. num++;
  272. }
  273. os_free(cmd);
  274. if (chans) {
  275. qsort(chans, num, sizeof(struct wpa_mbo_non_pref_channel),
  276. wpa_non_pref_chan_cmp);
  277. }
  278. update:
  279. os_free(wpa_s->non_pref_chan);
  280. wpa_s->non_pref_chan = chans;
  281. wpa_s->non_pref_chan_num = num;
  282. wpas_mbo_non_pref_chan_changed(wpa_s);
  283. return 0;
  284. fail:
  285. os_free(chans);
  286. os_free(cmd);
  287. return -1;
  288. }
  289. void wpas_mbo_scan_ie(struct wpa_supplicant *wpa_s, struct wpabuf *ie)
  290. {
  291. wpabuf_put_u8(ie, WLAN_EID_VENDOR_SPECIFIC);
  292. wpabuf_put_u8(ie, 7);
  293. wpabuf_put_be24(ie, OUI_WFA);
  294. wpabuf_put_u8(ie, MBO_OUI_TYPE);
  295. wpabuf_put_u8(ie, MBO_ATTR_ID_CELL_DATA_CAPA);
  296. wpabuf_put_u8(ie, 1);
  297. wpabuf_put_u8(ie, wpa_s->conf->mbo_cell_capa);
  298. }
  299. enum chan_allowed {
  300. NOT_ALLOWED, ALLOWED
  301. };
  302. static enum chan_allowed allow_channel(struct hostapd_hw_modes *mode, u8 chan,
  303. unsigned int *flags)
  304. {
  305. int i;
  306. for (i = 0; i < mode->num_channels; i++) {
  307. if (mode->channels[i].chan == chan)
  308. break;
  309. }
  310. if (i == mode->num_channels ||
  311. (mode->channels[i].flag & HOSTAPD_CHAN_DISABLED))
  312. return NOT_ALLOWED;
  313. if (flags)
  314. *flags = mode->channels[i].flag;
  315. return ALLOWED;
  316. }
  317. static int get_center_80mhz(struct hostapd_hw_modes *mode, u8 channel)
  318. {
  319. u8 center_channels[] = {42, 58, 106, 122, 138, 155};
  320. size_t i;
  321. if (mode->mode != HOSTAPD_MODE_IEEE80211A)
  322. return 0;
  323. for (i = 0; i < ARRAY_SIZE(center_channels); i++) {
  324. /*
  325. * In 80 MHz, the bandwidth "spans" 12 channels (e.g., 36-48),
  326. * so the center channel is 6 channels away from the start/end.
  327. */
  328. if (channel >= center_channels[i] - 6 &&
  329. channel <= center_channels[i] + 6)
  330. return center_channels[i];
  331. }
  332. return 0;
  333. }
  334. static enum chan_allowed verify_80mhz(struct hostapd_hw_modes *mode, u8 channel)
  335. {
  336. u8 center_chan;
  337. unsigned int i;
  338. center_chan = get_center_80mhz(mode, channel);
  339. if (!center_chan)
  340. return NOT_ALLOWED;
  341. /* check all the channels are available */
  342. for (i = 0; i < 4; i++) {
  343. unsigned int flags;
  344. u8 adj_chan = center_chan - 6 + i * 4;
  345. if (allow_channel(mode, adj_chan, &flags) == NOT_ALLOWED)
  346. return NOT_ALLOWED;
  347. if ((i == 0 && !(flags & HOSTAPD_CHAN_VHT_10_70)) ||
  348. (i == 1 && !(flags & HOSTAPD_CHAN_VHT_30_50)) ||
  349. (i == 2 && !(flags & HOSTAPD_CHAN_VHT_50_30)) ||
  350. (i == 3 && !(flags & HOSTAPD_CHAN_VHT_70_10)))
  351. return NOT_ALLOWED;
  352. }
  353. return ALLOWED;
  354. }
  355. static int get_center_160mhz(struct hostapd_hw_modes *mode, u8 channel)
  356. {
  357. u8 center_channels[] = { 50, 114 };
  358. unsigned int i;
  359. if (mode->mode != HOSTAPD_MODE_IEEE80211A)
  360. return 0;
  361. for (i = 0; i < ARRAY_SIZE(center_channels); i++) {
  362. /*
  363. * In 160 MHz, the bandwidth "spans" 28 channels (e.g., 36-64),
  364. * so the center channel is 14 channels away from the start/end.
  365. */
  366. if (channel >= center_channels[i] - 14 &&
  367. channel <= center_channels[i] + 14)
  368. return center_channels[i];
  369. }
  370. return 0;
  371. }
  372. static enum chan_allowed verify_160mhz(struct hostapd_hw_modes *mode,
  373. u8 channel)
  374. {
  375. u8 center_chan;
  376. unsigned int i;
  377. center_chan = get_center_160mhz(mode, channel);
  378. if (!center_chan)
  379. return NOT_ALLOWED;
  380. /* Check all the channels are available */
  381. for (i = 0; i < 8; i++) {
  382. unsigned int flags;
  383. u8 adj_chan = center_chan - 14 + i * 4;
  384. if (allow_channel(mode, adj_chan, &flags) == NOT_ALLOWED)
  385. return NOT_ALLOWED;
  386. if ((i == 0 && !(flags & HOSTAPD_CHAN_VHT_10_150)) ||
  387. (i == 1 && !(flags & HOSTAPD_CHAN_VHT_30_130)) ||
  388. (i == 2 && !(flags & HOSTAPD_CHAN_VHT_50_110)) ||
  389. (i == 3 && !(flags & HOSTAPD_CHAN_VHT_70_90)) ||
  390. (i == 4 && !(flags & HOSTAPD_CHAN_VHT_90_70)) ||
  391. (i == 5 && !(flags & HOSTAPD_CHAN_VHT_110_50)) ||
  392. (i == 6 && !(flags & HOSTAPD_CHAN_VHT_130_30)) ||
  393. (i == 7 && !(flags & HOSTAPD_CHAN_VHT_150_10)))
  394. return NOT_ALLOWED;
  395. }
  396. return ALLOWED;
  397. }
  398. static enum chan_allowed verify_channel(struct hostapd_hw_modes *mode,
  399. u8 channel, u8 bw)
  400. {
  401. unsigned int flag = 0;
  402. enum chan_allowed res, res2;
  403. res2 = res = allow_channel(mode, channel, &flag);
  404. if (bw == BW40MINUS) {
  405. if (!(flag & HOSTAPD_CHAN_HT40MINUS))
  406. return NOT_ALLOWED;
  407. res2 = allow_channel(mode, channel - 4, NULL);
  408. } else if (bw == BW40PLUS) {
  409. if (!(flag & HOSTAPD_CHAN_HT40PLUS))
  410. return NOT_ALLOWED;
  411. res2 = allow_channel(mode, channel + 4, NULL);
  412. } else if (bw == BW80) {
  413. /*
  414. * channel is a center channel and as such, not necessarily a
  415. * valid 20 MHz channels. Override earlier allow_channel()
  416. * result and use only the 80 MHz specific version.
  417. */
  418. res2 = res = verify_80mhz(mode, channel);
  419. } else if (bw == BW160) {
  420. /*
  421. * channel is a center channel and as such, not necessarily a
  422. * valid 20 MHz channels. Override earlier allow_channel()
  423. * result and use only the 160 MHz specific version.
  424. */
  425. res2 = res = verify_160mhz(mode, channel);
  426. } else if (bw == BW80P80) {
  427. /*
  428. * channel is a center channel and as such, not necessarily a
  429. * valid 20 MHz channels. Override earlier allow_channel()
  430. * result and use only the 80 MHz specific version.
  431. */
  432. res2 = res = verify_80mhz(mode, channel);
  433. }
  434. if (res == NOT_ALLOWED || res2 == NOT_ALLOWED)
  435. return NOT_ALLOWED;
  436. return ALLOWED;
  437. }
  438. static int wpas_op_class_supported(struct wpa_supplicant *wpa_s,
  439. const struct oper_class_map *op_class)
  440. {
  441. int chan;
  442. size_t i;
  443. struct hostapd_hw_modes *mode;
  444. int found;
  445. mode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes, op_class->mode);
  446. if (!mode)
  447. return 0;
  448. if (op_class->op_class == 128) {
  449. u8 channels[] = { 42, 58, 106, 122, 138, 155 };
  450. for (i = 0; i < ARRAY_SIZE(channels); i++) {
  451. if (verify_channel(mode, channels[i], op_class->bw) ==
  452. ALLOWED)
  453. return 1;
  454. }
  455. return 0;
  456. }
  457. if (op_class->op_class == 129) {
  458. /* Check if either 160 MHz channels is allowed */
  459. return verify_channel(mode, 50, op_class->bw) == ALLOWED ||
  460. verify_channel(mode, 114, op_class->bw) == ALLOWED;
  461. }
  462. if (op_class->op_class == 130) {
  463. /* Need at least two non-contiguous 80 MHz segments */
  464. found = 0;
  465. if (verify_channel(mode, 42, op_class->bw) == ALLOWED ||
  466. verify_channel(mode, 58, op_class->bw) == ALLOWED)
  467. found++;
  468. if (verify_channel(mode, 106, op_class->bw) == ALLOWED ||
  469. verify_channel(mode, 122, op_class->bw) == ALLOWED ||
  470. verify_channel(mode, 138, op_class->bw) == ALLOWED)
  471. found++;
  472. if (verify_channel(mode, 106, op_class->bw) == ALLOWED &&
  473. verify_channel(mode, 138, op_class->bw) == ALLOWED)
  474. found++;
  475. if (verify_channel(mode, 155, op_class->bw) == ALLOWED)
  476. found++;
  477. if (found >= 2)
  478. return 1;
  479. return 0;
  480. }
  481. found = 0;
  482. for (chan = op_class->min_chan; chan <= op_class->max_chan;
  483. chan += op_class->inc) {
  484. if (verify_channel(mode, chan, op_class->bw) == ALLOWED) {
  485. found = 1;
  486. break;
  487. }
  488. }
  489. return found;
  490. }
  491. int wpas_mbo_supp_op_class_ie(struct wpa_supplicant *wpa_s, int freq, u8 *pos,
  492. size_t len)
  493. {
  494. struct wpabuf *buf;
  495. u8 op, current, chan;
  496. u8 *ie_len;
  497. int res;
  498. /*
  499. * Assume 20 MHz channel for now.
  500. * TODO: Use the secondary channel and VHT channel width that will be
  501. * used after association.
  502. */
  503. if (ieee80211_freq_to_channel_ext(freq, 0, VHT_CHANWIDTH_USE_HT,
  504. &current, &chan) == NUM_HOSTAPD_MODES)
  505. return 0;
  506. /*
  507. * Need 3 bytes for EID, length, and current operating class, plus
  508. * 1 byte for every other supported operating class.
  509. */
  510. buf = wpabuf_alloc(global_op_class_size + 3);
  511. if (!buf)
  512. return 0;
  513. wpabuf_put_u8(buf, WLAN_EID_SUPPORTED_OPERATING_CLASSES);
  514. /* Will set the length later, putting a placeholder */
  515. ie_len = wpabuf_put(buf, 1);
  516. wpabuf_put_u8(buf, current);
  517. for (op = 0; global_op_class[op].op_class; op++) {
  518. if (wpas_op_class_supported(wpa_s, &global_op_class[op]))
  519. wpabuf_put_u8(buf, global_op_class[op].op_class);
  520. }
  521. *ie_len = wpabuf_len(buf) - 2;
  522. if (*ie_len < 2 || wpabuf_len(buf) > len) {
  523. wpa_printf(MSG_ERROR,
  524. "Failed to add supported operating classes IE");
  525. res = 0;
  526. } else {
  527. os_memcpy(pos, wpabuf_head(buf), wpabuf_len(buf));
  528. res = wpabuf_len(buf);
  529. wpa_hexdump_buf(MSG_DEBUG,
  530. "MBO: Added supported operating classes IE",
  531. buf);
  532. }
  533. wpabuf_free(buf);
  534. return res;
  535. }
  536. void wpas_mbo_ie_trans_req(struct wpa_supplicant *wpa_s, const u8 *mbo_ie,
  537. size_t len)
  538. {
  539. const u8 *pos, *cell_pref = NULL, *reason = NULL;
  540. u8 id, elen;
  541. u16 disallowed_sec = 0;
  542. if (len <= 4 || WPA_GET_BE24(mbo_ie) != OUI_WFA ||
  543. mbo_ie[3] != MBO_OUI_TYPE)
  544. return;
  545. pos = mbo_ie + 4;
  546. len -= 4;
  547. while (len >= 2) {
  548. id = *pos++;
  549. elen = *pos++;
  550. len -= 2;
  551. if (elen > len)
  552. goto fail;
  553. switch (id) {
  554. case MBO_ATTR_ID_CELL_DATA_PREF:
  555. if (elen != 1)
  556. goto fail;
  557. if (wpa_s->conf->mbo_cell_capa ==
  558. MBO_CELL_CAPA_AVAILABLE)
  559. cell_pref = pos;
  560. else
  561. wpa_printf(MSG_DEBUG,
  562. "MBO: Station does not support Cellular data connection");
  563. break;
  564. case MBO_ATTR_ID_TRANSITION_REASON:
  565. if (elen != 1)
  566. goto fail;
  567. reason = pos;
  568. break;
  569. case MBO_ATTR_ID_ASSOC_RETRY_DELAY:
  570. if (elen != 2)
  571. goto fail;
  572. if (wpa_s->wnm_mode &
  573. WNM_BSS_TM_REQ_BSS_TERMINATION_INCLUDED) {
  574. wpa_printf(MSG_DEBUG,
  575. "MBO: Unexpected association retry delay, BSS is terminating");
  576. goto fail;
  577. } else if (wpa_s->wnm_mode &
  578. WNM_BSS_TM_REQ_DISASSOC_IMMINENT) {
  579. disallowed_sec = WPA_GET_LE16(pos);
  580. } else {
  581. wpa_printf(MSG_DEBUG,
  582. "MBO: Association retry delay attribute not in disassoc imminent mode");
  583. }
  584. break;
  585. case MBO_ATTR_ID_AP_CAPA_IND:
  586. case MBO_ATTR_ID_NON_PREF_CHAN_REPORT:
  587. case MBO_ATTR_ID_CELL_DATA_CAPA:
  588. case MBO_ATTR_ID_ASSOC_DISALLOW:
  589. case MBO_ATTR_ID_TRANSITION_REJECT_REASON:
  590. wpa_printf(MSG_DEBUG,
  591. "MBO: Attribute %d should not be included in BTM Request frame",
  592. id);
  593. break;
  594. default:
  595. wpa_printf(MSG_DEBUG, "MBO: Unknown attribute id %u",
  596. id);
  597. return;
  598. }
  599. pos += elen;
  600. len -= elen;
  601. }
  602. if (cell_pref)
  603. wpa_msg(wpa_s, MSG_INFO, MBO_CELL_PREFERENCE "preference=%u",
  604. *cell_pref);
  605. if (reason)
  606. wpa_msg(wpa_s, MSG_INFO, MBO_TRANSITION_REASON "reason=%u",
  607. *reason);
  608. if (disallowed_sec && wpa_s->current_bss)
  609. wpa_bss_tmp_disallow(wpa_s, wpa_s->current_bss->bssid,
  610. disallowed_sec);
  611. return;
  612. fail:
  613. wpa_printf(MSG_DEBUG, "MBO IE parsing failed (id=%u len=%u left=%zu)",
  614. id, elen, len);
  615. }
  616. size_t wpas_mbo_ie_bss_trans_reject(struct wpa_supplicant *wpa_s, u8 *pos,
  617. size_t len,
  618. enum mbo_transition_reject_reason reason)
  619. {
  620. u8 reject_attr[3];
  621. reject_attr[0] = MBO_ATTR_ID_TRANSITION_REJECT_REASON;
  622. reject_attr[1] = 1;
  623. reject_attr[2] = reason;
  624. return mbo_add_ie(pos, len, reject_attr, sizeof(reject_attr));
  625. }
  626. void wpas_mbo_update_cell_capa(struct wpa_supplicant *wpa_s, u8 mbo_cell_capa)
  627. {
  628. u8 cell_capa[7];
  629. if (wpa_s->conf->mbo_cell_capa == mbo_cell_capa) {
  630. wpa_printf(MSG_DEBUG,
  631. "MBO: Cellular capability already set to %u",
  632. mbo_cell_capa);
  633. return;
  634. }
  635. wpa_s->conf->mbo_cell_capa = mbo_cell_capa;
  636. cell_capa[0] = WLAN_EID_VENDOR_SPECIFIC;
  637. cell_capa[1] = 5; /* Length */
  638. WPA_PUT_BE24(cell_capa + 2, OUI_WFA);
  639. cell_capa[5] = MBO_ATTR_ID_CELL_DATA_CAPA;
  640. cell_capa[6] = mbo_cell_capa;
  641. wpas_mbo_send_wnm_notification(wpa_s, cell_capa, 7);
  642. wpa_supplicant_set_default_scan_ies(wpa_s);
  643. }