interworking.c 21 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907
  1. /*
  2. * Interworking (IEEE 802.11u)
  3. * Copyright (c) 2011, Qualcomm Atheros
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "common/ieee802_11_defs.h"
  17. #include "common/gas.h"
  18. #include "common/wpa_ctrl.h"
  19. #include "drivers/driver.h"
  20. #include "eap_common/eap_defs.h"
  21. #include "eap_peer/eap_methods.h"
  22. #include "wpa_supplicant_i.h"
  23. #include "config.h"
  24. #include "bss.h"
  25. #include "scan.h"
  26. #include "notify.h"
  27. #include "gas_query.h"
  28. #include "interworking.h"
  29. static void interworking_next_anqp_fetch(struct wpa_supplicant *wpa_s);
  30. static struct wpabuf * anqp_build_req(u16 info_ids[], size_t num_ids,
  31. struct wpabuf *extra)
  32. {
  33. struct wpabuf *buf;
  34. size_t i;
  35. u8 *len_pos;
  36. buf = gas_anqp_build_initial_req(0, 4 + num_ids * 2 +
  37. (extra ? wpabuf_len(extra) : 0));
  38. if (buf == NULL)
  39. return NULL;
  40. len_pos = gas_anqp_add_element(buf, ANQP_QUERY_LIST);
  41. for (i = 0; i < num_ids; i++)
  42. wpabuf_put_le16(buf, info_ids[i]);
  43. gas_anqp_set_element_len(buf, len_pos);
  44. if (extra)
  45. wpabuf_put_buf(buf, extra);
  46. gas_anqp_set_len(buf);
  47. return buf;
  48. }
  49. static void interworking_anqp_resp_cb(void *ctx, const u8 *dst,
  50. u8 dialog_token,
  51. enum gas_query_result result,
  52. const struct wpabuf *adv_proto,
  53. const struct wpabuf *resp,
  54. u16 status_code)
  55. {
  56. struct wpa_supplicant *wpa_s = ctx;
  57. anqp_resp_cb(wpa_s, dst, dialog_token, result, adv_proto, resp,
  58. status_code);
  59. interworking_next_anqp_fetch(wpa_s);
  60. }
  61. static int interworking_anqp_send_req(struct wpa_supplicant *wpa_s,
  62. struct wpa_bss *bss)
  63. {
  64. struct wpabuf *buf;
  65. int ret = 0;
  66. int res;
  67. u16 info_ids[] = {
  68. ANQP_CAPABILITY_LIST,
  69. ANQP_VENUE_NAME,
  70. ANQP_NETWORK_AUTH_TYPE,
  71. ANQP_ROAMING_CONSORTIUM,
  72. ANQP_IP_ADDR_TYPE_AVAILABILITY,
  73. ANQP_NAI_REALM,
  74. ANQP_3GPP_CELLULAR_NETWORK,
  75. ANQP_DOMAIN_NAME
  76. };
  77. struct wpabuf *extra = NULL;
  78. wpa_printf(MSG_DEBUG, "Interworking: ANQP Query Request to " MACSTR,
  79. MAC2STR(bss->bssid));
  80. buf = anqp_build_req(info_ids, sizeof(info_ids) / sizeof(info_ids[0]),
  81. extra);
  82. wpabuf_free(extra);
  83. if (buf == NULL)
  84. return -1;
  85. res = gas_query_req(wpa_s->gas, bss->bssid, bss->freq, buf,
  86. interworking_anqp_resp_cb, wpa_s);
  87. if (res < 0) {
  88. wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
  89. ret = -1;
  90. } else
  91. wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
  92. "%u", res);
  93. wpabuf_free(buf);
  94. return ret;
  95. }
  96. struct nai_realm_eap {
  97. u8 method;
  98. u8 inner_method;
  99. enum nai_realm_eap_auth_inner_non_eap inner_non_eap;
  100. u8 cred_type;
  101. u8 tunneled_cred_type;
  102. };
  103. struct nai_realm {
  104. u8 encoding;
  105. char *realm;
  106. u8 eap_count;
  107. struct nai_realm_eap *eap;
  108. };
  109. static void nai_realm_free(struct nai_realm *realms, u16 count)
  110. {
  111. u16 i;
  112. if (realms == NULL)
  113. return;
  114. for (i = 0; i < count; i++) {
  115. os_free(realms[i].eap);
  116. os_free(realms[i].realm);
  117. }
  118. os_free(realms);
  119. }
  120. static const u8 * nai_realm_parse_eap(struct nai_realm_eap *e, const u8 *pos,
  121. const u8 *end)
  122. {
  123. u8 elen, auth_count, a;
  124. const u8 *e_end;
  125. if (pos + 3 > end) {
  126. wpa_printf(MSG_DEBUG, "No room for EAP Method fixed fields");
  127. return NULL;
  128. }
  129. elen = *pos++;
  130. if (pos + elen > end || elen < 2) {
  131. wpa_printf(MSG_DEBUG, "No room for EAP Method subfield");
  132. return NULL;
  133. }
  134. e_end = pos + elen;
  135. e->method = *pos++;
  136. auth_count = *pos++;
  137. wpa_printf(MSG_DEBUG, "EAP Method: len=%u method=%u auth_count=%u",
  138. elen, e->method, auth_count);
  139. for (a = 0; a < auth_count; a++) {
  140. u8 id, len;
  141. if (pos + 2 > end || pos + 2 + pos[1] > end) {
  142. wpa_printf(MSG_DEBUG, "No room for Authentication "
  143. "Parameter subfield");
  144. return NULL;
  145. }
  146. id = *pos++;
  147. len = *pos++;
  148. switch (id) {
  149. case NAI_REALM_EAP_AUTH_NON_EAP_INNER_AUTH:
  150. if (len < 1)
  151. break;
  152. e->inner_non_eap = *pos;
  153. if (e->method != EAP_TYPE_TTLS)
  154. break;
  155. switch (*pos) {
  156. case NAI_REALM_INNER_NON_EAP_PAP:
  157. wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP");
  158. break;
  159. case NAI_REALM_INNER_NON_EAP_CHAP:
  160. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP");
  161. break;
  162. case NAI_REALM_INNER_NON_EAP_MSCHAP:
  163. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP");
  164. break;
  165. case NAI_REALM_INNER_NON_EAP_MSCHAPV2:
  166. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2");
  167. break;
  168. }
  169. break;
  170. case NAI_REALM_EAP_AUTH_INNER_AUTH_EAP_METHOD:
  171. if (len < 1)
  172. break;
  173. e->inner_method = *pos;
  174. wpa_printf(MSG_DEBUG, "Inner EAP method: %u",
  175. e->inner_method);
  176. break;
  177. case NAI_REALM_EAP_AUTH_CRED_TYPE:
  178. if (len < 1)
  179. break;
  180. e->cred_type = *pos;
  181. wpa_printf(MSG_DEBUG, "Credential Type: %u",
  182. e->cred_type);
  183. break;
  184. case NAI_REALM_EAP_AUTH_TUNNELED_CRED_TYPE:
  185. if (len < 1)
  186. break;
  187. e->tunneled_cred_type = *pos;
  188. wpa_printf(MSG_DEBUG, "Tunneled EAP Method Credential "
  189. "Type: %u", e->tunneled_cred_type);
  190. break;
  191. default:
  192. wpa_printf(MSG_DEBUG, "Unsupported Authentication "
  193. "Parameter: id=%u len=%u", id, len);
  194. wpa_hexdump(MSG_DEBUG, "Authentication Parameter "
  195. "Value", pos, len);
  196. break;
  197. }
  198. pos += len;
  199. }
  200. return e_end;
  201. }
  202. static const u8 * nai_realm_parse_realm(struct nai_realm *r, const u8 *pos,
  203. const u8 *end)
  204. {
  205. u16 len;
  206. const u8 *f_end;
  207. u8 realm_len, e;
  208. if (end - pos < 4) {
  209. wpa_printf(MSG_DEBUG, "No room for NAI Realm Data "
  210. "fixed fields");
  211. return NULL;
  212. }
  213. len = WPA_GET_LE16(pos); /* NAI Realm Data field Length */
  214. pos += 2;
  215. if (pos + len > end || len < 3) {
  216. wpa_printf(MSG_DEBUG, "No room for NAI Realm Data "
  217. "(len=%u; left=%u)",
  218. len, (unsigned int) (end - pos));
  219. return NULL;
  220. }
  221. f_end = pos + len;
  222. r->encoding = *pos++;
  223. realm_len = *pos++;
  224. if (pos + realm_len > f_end) {
  225. wpa_printf(MSG_DEBUG, "No room for NAI Realm "
  226. "(len=%u; left=%u)",
  227. realm_len, (unsigned int) (f_end - pos));
  228. return NULL;
  229. }
  230. wpa_hexdump_ascii(MSG_DEBUG, "NAI Realm", pos, realm_len);
  231. r->realm = os_malloc(realm_len + 1);
  232. if (r->realm == NULL)
  233. return NULL;
  234. os_memcpy(r->realm, pos, realm_len);
  235. r->realm[realm_len] = '\0';
  236. pos += realm_len;
  237. if (pos + 1 > f_end) {
  238. wpa_printf(MSG_DEBUG, "No room for EAP Method Count");
  239. return NULL;
  240. }
  241. r->eap_count = *pos++;
  242. wpa_printf(MSG_DEBUG, "EAP Count: %u", r->eap_count);
  243. if (pos + r->eap_count * 3 > f_end) {
  244. wpa_printf(MSG_DEBUG, "No room for EAP Methods");
  245. return NULL;
  246. }
  247. r->eap = os_zalloc(r->eap_count * sizeof(struct nai_realm_eap));
  248. if (r->eap == NULL)
  249. return NULL;
  250. for (e = 0; e < r->eap_count; e++) {
  251. pos = nai_realm_parse_eap(&r->eap[e], pos, f_end);
  252. if (pos == NULL)
  253. return NULL;
  254. }
  255. return f_end;
  256. }
  257. static struct nai_realm * nai_realm_parse(struct wpabuf *anqp, u16 *count)
  258. {
  259. struct nai_realm *realm;
  260. const u8 *pos, *end;
  261. u16 i, num;
  262. if (anqp == NULL || wpabuf_len(anqp) < 2)
  263. return NULL;
  264. pos = wpabuf_head_u8(anqp);
  265. end = pos + wpabuf_len(anqp);
  266. num = WPA_GET_LE16(pos);
  267. wpa_printf(MSG_DEBUG, "NAI Realm Count: %u", num);
  268. pos += 2;
  269. if (num * 5 > end - pos) {
  270. wpa_printf(MSG_DEBUG, "Invalid NAI Realm Count %u - not "
  271. "enough data (%u octets) for that many realms",
  272. num, (unsigned int) (end - pos));
  273. return NULL;
  274. }
  275. realm = os_zalloc(num * sizeof(struct nai_realm));
  276. if (realm == NULL)
  277. return NULL;
  278. for (i = 0; i < num; i++) {
  279. pos = nai_realm_parse_realm(&realm[i], pos, end);
  280. if (pos == NULL) {
  281. nai_realm_free(realm, num);
  282. return NULL;
  283. }
  284. }
  285. *count = num;
  286. return realm;
  287. }
  288. static int nai_realm_match(struct nai_realm *realm, const char *home_realm)
  289. {
  290. char *tmp, *pos, *end;
  291. int match = 0;
  292. if (realm->realm == NULL)
  293. return 0;
  294. if (os_strchr(realm->realm, ';') == NULL)
  295. return os_strcasecmp(realm->realm, home_realm) == 0;
  296. tmp = os_strdup(realm->realm);
  297. if (tmp == NULL)
  298. return 0;
  299. pos = tmp;
  300. while (*pos) {
  301. end = os_strchr(pos, ';');
  302. if (end)
  303. *end = '\0';
  304. if (os_strcasecmp(pos, home_realm) == 0) {
  305. match = 1;
  306. break;
  307. }
  308. if (end == NULL)
  309. break;
  310. pos = end + 1;
  311. }
  312. os_free(tmp);
  313. return match;
  314. }
  315. static int nai_realm_cred_username(struct nai_realm_eap *eap)
  316. {
  317. if (eap_get_name(EAP_VENDOR_IETF, eap->method) == NULL)
  318. return 0; /* method not supported */
  319. if (eap->method != EAP_TYPE_TTLS && eap->method != EAP_TYPE_PEAP) {
  320. /* Only tunneled methods with username/password supported */
  321. return 0;
  322. }
  323. if (eap->method == EAP_TYPE_PEAP &&
  324. eap_get_name(EAP_VENDOR_IETF, eap->inner_method) == NULL)
  325. return 0;
  326. if (eap->method == EAP_TYPE_TTLS) {
  327. if (eap->inner_method == 0 && eap->inner_non_eap == 0)
  328. return 0;
  329. if (eap->inner_method &&
  330. eap_get_name(EAP_VENDOR_IETF, eap->inner_method) == NULL)
  331. return 0;
  332. if (eap->inner_non_eap &&
  333. eap->inner_non_eap != NAI_REALM_INNER_NON_EAP_PAP &&
  334. eap->inner_non_eap != NAI_REALM_INNER_NON_EAP_CHAP &&
  335. eap->inner_non_eap != NAI_REALM_INNER_NON_EAP_MSCHAP &&
  336. eap->inner_non_eap != NAI_REALM_INNER_NON_EAP_MSCHAPV2)
  337. return 0;
  338. }
  339. if (eap->inner_method &&
  340. eap->inner_method != EAP_TYPE_GTC &&
  341. eap->inner_method != EAP_TYPE_MSCHAPV2)
  342. return 0;
  343. return 1;
  344. }
  345. struct nai_realm_eap * nai_realm_find_eap(struct wpa_supplicant *wpa_s,
  346. struct nai_realm *realm)
  347. {
  348. u8 e;
  349. if (wpa_s->conf->home_username == NULL ||
  350. wpa_s->conf->home_username[0] == '\0' ||
  351. wpa_s->conf->home_password == NULL ||
  352. wpa_s->conf->home_password[0] == '\0')
  353. return NULL;
  354. for (e = 0; e < realm->eap_count; e++) {
  355. struct nai_realm_eap *eap = &realm->eap[e];
  356. if (nai_realm_cred_username(eap))
  357. return eap;
  358. }
  359. return NULL;
  360. }
  361. int interworking_connect(struct wpa_supplicant *wpa_s, struct wpa_bss *bss)
  362. {
  363. struct wpa_ssid *ssid;
  364. struct nai_realm *realm;
  365. struct nai_realm_eap *eap = NULL;
  366. u16 count, i;
  367. char buf[100];
  368. const u8 *ie;
  369. if (bss == NULL)
  370. return -1;
  371. ie = wpa_bss_get_ie(bss, WLAN_EID_SSID);
  372. if (ie == NULL || ie[1] == 0) {
  373. wpa_printf(MSG_DEBUG, "Interworking: No SSID known for "
  374. MACSTR, MAC2STR(bss->bssid));
  375. return -1;
  376. }
  377. realm = nai_realm_parse(bss->anqp_nai_realm, &count);
  378. if (realm == NULL) {
  379. wpa_printf(MSG_DEBUG, "Interworking: Could not parse NAI "
  380. "Realm list from " MACSTR, MAC2STR(bss->bssid));
  381. nai_realm_free(realm, count);
  382. return -1;
  383. }
  384. for (i = 0; i < count; i++) {
  385. if (!nai_realm_match(&realm[i], wpa_s->conf->home_realm))
  386. continue;
  387. eap = nai_realm_find_eap(wpa_s, &realm[i]);
  388. if (eap)
  389. break;
  390. }
  391. if (!eap) {
  392. wpa_printf(MSG_DEBUG, "Interworking: No matching credentials "
  393. "and EAP method found for " MACSTR,
  394. MAC2STR(bss->bssid));
  395. nai_realm_free(realm, count);
  396. return -1;
  397. }
  398. wpa_printf(MSG_DEBUG, "Interworking: Connect with " MACSTR,
  399. MAC2STR(bss->bssid));
  400. ssid = wpa_config_add_network(wpa_s->conf);
  401. if (ssid == NULL) {
  402. nai_realm_free(realm, count);
  403. return -1;
  404. }
  405. wpas_notify_network_added(wpa_s, ssid);
  406. wpa_config_set_network_defaults(ssid);
  407. ssid->temporary = 1;
  408. ssid->ssid = os_zalloc(ie[1] + 1);
  409. if (ssid->ssid == NULL)
  410. goto fail;
  411. os_memcpy(ssid->ssid, ie + 2, ie[1]);
  412. ssid->ssid_len = ie[1];
  413. if (wpa_config_set(ssid, "eap", eap_get_name(EAP_VENDOR_IETF,
  414. eap->method), 0) < 0)
  415. goto fail;
  416. if (wpa_s->conf->home_username && wpa_s->conf->home_username[0] &&
  417. wpa_config_set_quoted(ssid, "identity",
  418. wpa_s->conf->home_username) < 0)
  419. goto fail;
  420. if (wpa_s->conf->home_password && wpa_s->conf->home_password[0] &&
  421. wpa_config_set_quoted(ssid, "password", wpa_s->conf->home_password)
  422. < 0)
  423. goto fail;
  424. switch (eap->method) {
  425. case EAP_TYPE_TTLS:
  426. if (eap->inner_method) {
  427. os_snprintf(buf, sizeof(buf), "\"autheap=%s\"",
  428. eap_get_name(EAP_VENDOR_IETF,
  429. eap->inner_method));
  430. if (wpa_config_set(ssid, "phase2", buf, 0) < 0)
  431. goto fail;
  432. break;
  433. }
  434. switch (eap->inner_non_eap) {
  435. case NAI_REALM_INNER_NON_EAP_PAP:
  436. if (wpa_config_set(ssid, "phase2", "\"auth=PAP\"", 0) <
  437. 0)
  438. goto fail;
  439. break;
  440. case NAI_REALM_INNER_NON_EAP_CHAP:
  441. if (wpa_config_set(ssid, "phase2", "\"auth=CHAP\"", 0)
  442. < 0)
  443. goto fail;
  444. break;
  445. case NAI_REALM_INNER_NON_EAP_MSCHAP:
  446. if (wpa_config_set(ssid, "phase2", "\"auth=CHAP\"", 0)
  447. < 0)
  448. goto fail;
  449. break;
  450. case NAI_REALM_INNER_NON_EAP_MSCHAPV2:
  451. if (wpa_config_set(ssid, "phase2", "\"auth=MSCHAPV2\"",
  452. 0) < 0)
  453. goto fail;
  454. break;
  455. }
  456. break;
  457. case EAP_TYPE_PEAP:
  458. os_snprintf(buf, sizeof(buf), "\"auth=%s\"",
  459. eap_get_name(EAP_VENDOR_IETF, eap->inner_method));
  460. if (wpa_config_set(ssid, "phase2", buf, 0) < 0)
  461. goto fail;
  462. break;
  463. }
  464. if (wpa_s->conf->home_ca_cert && wpa_s->conf->home_ca_cert[0] &&
  465. wpa_config_set_quoted(ssid, "ca_cert", wpa_s->conf->home_ca_cert) <
  466. 0)
  467. goto fail;
  468. nai_realm_free(realm, count);
  469. wpa_supplicant_select_network(wpa_s, ssid);
  470. return 0;
  471. fail:
  472. wpas_notify_network_removed(wpa_s, ssid);
  473. wpa_config_remove_network(wpa_s->conf, ssid->id);
  474. nai_realm_free(realm, count);
  475. return -1;
  476. }
  477. static int interworking_credentials_available(struct wpa_supplicant *wpa_s,
  478. struct wpa_bss *bss)
  479. {
  480. struct nai_realm *realm;
  481. u16 count, i;
  482. int found = 0;
  483. if (bss->anqp_nai_realm == NULL)
  484. return 0;
  485. if (wpa_s->conf->home_realm == NULL)
  486. return 0;
  487. wpa_printf(MSG_DEBUG, "Interworking: Parsing NAI Realm list from "
  488. MACSTR, MAC2STR(bss->bssid));
  489. realm = nai_realm_parse(bss->anqp_nai_realm, &count);
  490. if (realm == NULL) {
  491. wpa_printf(MSG_DEBUG, "Interworking: Could not parse NAI "
  492. "Realm list from " MACSTR, MAC2STR(bss->bssid));
  493. return 0;
  494. }
  495. for (i = 0; i < count; i++) {
  496. if (!nai_realm_match(&realm[i], wpa_s->conf->home_realm))
  497. continue;
  498. if (nai_realm_find_eap(wpa_s, &realm[i])) {
  499. found++;
  500. break;
  501. }
  502. }
  503. nai_realm_free(realm, count);
  504. return found;
  505. }
  506. static void interworking_select_network(struct wpa_supplicant *wpa_s)
  507. {
  508. struct wpa_bss *bss, *selected = NULL;
  509. unsigned int count = 0;
  510. wpa_s->network_select = 0;
  511. dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
  512. if (!interworking_credentials_available(wpa_s, bss))
  513. continue;
  514. count++;
  515. wpa_msg(wpa_s, MSG_INFO, INTERWORKING_AP MACSTR,
  516. MAC2STR(bss->bssid));
  517. if (selected == NULL && wpa_s->auto_select)
  518. selected = bss;
  519. }
  520. if (count == 0) {
  521. wpa_msg(wpa_s, MSG_INFO, INTERWORKING_NO_MATCH "No network "
  522. "with matching credentials found");
  523. }
  524. if (selected)
  525. interworking_connect(wpa_s, selected);
  526. }
  527. static void interworking_next_anqp_fetch(struct wpa_supplicant *wpa_s)
  528. {
  529. struct wpa_bss *bss;
  530. int found = 0;
  531. const u8 *ie;
  532. if (!wpa_s->fetch_anqp_in_progress)
  533. return;
  534. dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
  535. if (!(bss->caps & IEEE80211_CAP_ESS))
  536. continue;
  537. ie = wpa_bss_get_ie(bss, WLAN_EID_EXT_CAPAB);
  538. if (ie == NULL || ie[1] < 4 || !(ie[5] & 0x80))
  539. continue; /* AP does not support Interworking */
  540. if (!(bss->flags & WPA_BSS_ANQP_FETCH_TRIED)) {
  541. found++;
  542. bss->flags |= WPA_BSS_ANQP_FETCH_TRIED;
  543. wpa_msg(wpa_s, MSG_INFO, "Starting ANQP fetch for "
  544. MACSTR, MAC2STR(bss->bssid));
  545. interworking_anqp_send_req(wpa_s, bss);
  546. break;
  547. }
  548. }
  549. if (found == 0) {
  550. wpa_msg(wpa_s, MSG_INFO, "ANQP fetch completed");
  551. wpa_s->fetch_anqp_in_progress = 0;
  552. if (wpa_s->network_select)
  553. interworking_select_network(wpa_s);
  554. }
  555. }
  556. static void interworking_start_fetch_anqp(struct wpa_supplicant *wpa_s)
  557. {
  558. struct wpa_bss *bss;
  559. dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list)
  560. bss->flags &= ~WPA_BSS_ANQP_FETCH_TRIED;
  561. wpa_s->fetch_anqp_in_progress = 1;
  562. interworking_next_anqp_fetch(wpa_s);
  563. }
  564. int interworking_fetch_anqp(struct wpa_supplicant *wpa_s)
  565. {
  566. if (wpa_s->fetch_anqp_in_progress || wpa_s->network_select)
  567. return 0;
  568. wpa_s->network_select = 0;
  569. interworking_start_fetch_anqp(wpa_s);
  570. return 0;
  571. }
  572. void interworking_stop_fetch_anqp(struct wpa_supplicant *wpa_s)
  573. {
  574. if (!wpa_s->fetch_anqp_in_progress)
  575. return;
  576. wpa_s->fetch_anqp_in_progress = 0;
  577. }
  578. int anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst,
  579. u16 info_ids[], size_t num_ids)
  580. {
  581. struct wpabuf *buf;
  582. int ret = 0;
  583. int freq;
  584. struct wpa_bss *bss;
  585. int res;
  586. freq = wpa_s->assoc_freq;
  587. bss = wpa_bss_get_bssid(wpa_s, dst);
  588. if (bss)
  589. freq = bss->freq;
  590. if (freq <= 0)
  591. return -1;
  592. wpa_printf(MSG_DEBUG, "ANQP: Query Request to " MACSTR " for %u id(s)",
  593. MAC2STR(dst), (unsigned int) num_ids);
  594. buf = anqp_build_req(info_ids, num_ids, NULL);
  595. if (buf == NULL)
  596. return -1;
  597. res = gas_query_req(wpa_s->gas, dst, freq, buf, anqp_resp_cb, wpa_s);
  598. if (res < 0) {
  599. wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
  600. ret = -1;
  601. } else
  602. wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
  603. "%u", res);
  604. wpabuf_free(buf);
  605. return ret;
  606. }
  607. static void interworking_parse_rx_anqp_resp(struct wpa_supplicant *wpa_s,
  608. const u8 *sa, u16 info_id,
  609. const u8 *data, size_t slen)
  610. {
  611. const u8 *pos = data;
  612. struct wpa_bss *bss = wpa_bss_get_bssid(wpa_s, sa);
  613. switch (info_id) {
  614. case ANQP_CAPABILITY_LIST:
  615. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  616. " ANQP Capability list", MAC2STR(sa));
  617. break;
  618. case ANQP_VENUE_NAME:
  619. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  620. " Venue Name", MAC2STR(sa));
  621. wpa_hexdump_ascii(MSG_DEBUG, "ANQP: Venue Name", pos, slen);
  622. if (bss) {
  623. wpabuf_free(bss->anqp_venue_name);
  624. bss->anqp_venue_name = wpabuf_alloc_copy(pos, slen);
  625. }
  626. break;
  627. case ANQP_NETWORK_AUTH_TYPE:
  628. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  629. " Network Authentication Type information",
  630. MAC2STR(sa));
  631. wpa_hexdump_ascii(MSG_DEBUG, "ANQP: Network Authentication "
  632. "Type", pos, slen);
  633. if (bss) {
  634. wpabuf_free(bss->anqp_network_auth_type);
  635. bss->anqp_network_auth_type =
  636. wpabuf_alloc_copy(pos, slen);
  637. }
  638. break;
  639. case ANQP_ROAMING_CONSORTIUM:
  640. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  641. " Roaming Consortium list", MAC2STR(sa));
  642. wpa_hexdump_ascii(MSG_DEBUG, "ANQP: Roaming Consortium",
  643. pos, slen);
  644. if (bss) {
  645. wpabuf_free(bss->anqp_roaming_consortium);
  646. bss->anqp_roaming_consortium =
  647. wpabuf_alloc_copy(pos, slen);
  648. }
  649. break;
  650. case ANQP_IP_ADDR_TYPE_AVAILABILITY:
  651. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  652. " IP Address Type Availability information",
  653. MAC2STR(sa));
  654. wpa_hexdump(MSG_MSGDUMP, "ANQP: IP Address Availability",
  655. pos, slen);
  656. if (bss) {
  657. wpabuf_free(bss->anqp_ip_addr_type_availability);
  658. bss->anqp_ip_addr_type_availability =
  659. wpabuf_alloc_copy(pos, slen);
  660. }
  661. break;
  662. case ANQP_NAI_REALM:
  663. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  664. " NAI Realm list", MAC2STR(sa));
  665. wpa_hexdump_ascii(MSG_DEBUG, "ANQP: NAI Realm", pos, slen);
  666. if (bss) {
  667. wpabuf_free(bss->anqp_nai_realm);
  668. bss->anqp_nai_realm = wpabuf_alloc_copy(pos, slen);
  669. }
  670. break;
  671. case ANQP_3GPP_CELLULAR_NETWORK:
  672. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  673. " 3GPP Cellular Network information", MAC2STR(sa));
  674. wpa_hexdump_ascii(MSG_DEBUG, "ANQP: 3GPP Cellular Network",
  675. pos, slen);
  676. if (bss) {
  677. wpabuf_free(bss->anqp_3gpp);
  678. bss->anqp_3gpp = wpabuf_alloc_copy(pos, slen);
  679. }
  680. break;
  681. case ANQP_DOMAIN_NAME:
  682. wpa_msg(wpa_s, MSG_INFO, "RX-ANQP " MACSTR
  683. " Domain Name list", MAC2STR(sa));
  684. wpa_hexdump_ascii(MSG_MSGDUMP, "ANQP: Domain Name", pos, slen);
  685. if (bss) {
  686. wpabuf_free(bss->anqp_domain_name);
  687. bss->anqp_domain_name = wpabuf_alloc_copy(pos, slen);
  688. }
  689. break;
  690. case ANQP_VENDOR_SPECIFIC:
  691. if (slen < 3)
  692. return;
  693. switch (WPA_GET_BE24(pos)) {
  694. default:
  695. wpa_printf(MSG_DEBUG, "Interworking: Unsupported "
  696. "vendor-specific ANQP OUI %06x",
  697. WPA_GET_BE24(pos));
  698. return;
  699. }
  700. break;
  701. default:
  702. wpa_printf(MSG_DEBUG, "Interworking: Unsupported ANQP Info ID "
  703. "%u", info_id);
  704. break;
  705. }
  706. }
  707. void anqp_resp_cb(void *ctx, const u8 *dst, u8 dialog_token,
  708. enum gas_query_result result,
  709. const struct wpabuf *adv_proto,
  710. const struct wpabuf *resp, u16 status_code)
  711. {
  712. struct wpa_supplicant *wpa_s = ctx;
  713. const u8 *pos;
  714. const u8 *end;
  715. u16 info_id;
  716. u16 slen;
  717. if (result != GAS_QUERY_SUCCESS)
  718. return;
  719. pos = wpabuf_head(adv_proto);
  720. if (wpabuf_len(adv_proto) < 4 || pos[0] != WLAN_EID_ADV_PROTO ||
  721. pos[1] < 2 || pos[3] != ACCESS_NETWORK_QUERY_PROTOCOL) {
  722. wpa_printf(MSG_DEBUG, "ANQP: Unexpected Advertisement "
  723. "Protocol in response");
  724. return;
  725. }
  726. pos = wpabuf_head(resp);
  727. end = pos + wpabuf_len(resp);
  728. while (pos < end) {
  729. if (pos + 4 > end) {
  730. wpa_printf(MSG_DEBUG, "ANQP: Invalid element");
  731. break;
  732. }
  733. info_id = WPA_GET_LE16(pos);
  734. pos += 2;
  735. slen = WPA_GET_LE16(pos);
  736. pos += 2;
  737. if (pos + slen > end) {
  738. wpa_printf(MSG_DEBUG, "ANQP: Invalid element length "
  739. "for Info ID %u", info_id);
  740. break;
  741. }
  742. interworking_parse_rx_anqp_resp(wpa_s, dst, info_id, pos,
  743. slen);
  744. pos += slen;
  745. }
  746. }
  747. static void interworking_scan_res_handler(struct wpa_supplicant *wpa_s,
  748. struct wpa_scan_results *scan_res)
  749. {
  750. wpa_printf(MSG_DEBUG, "Interworking: Scan results available - start "
  751. "ANQP fetch");
  752. interworking_start_fetch_anqp(wpa_s);
  753. }
  754. int interworking_select(struct wpa_supplicant *wpa_s, int auto_select)
  755. {
  756. interworking_stop_fetch_anqp(wpa_s);
  757. wpa_s->network_select = 1;
  758. wpa_s->auto_select = !!auto_select;
  759. wpa_printf(MSG_DEBUG, "Interworking: Start scan for network "
  760. "selection");
  761. wpa_s->scan_res_handler = interworking_scan_res_handler;
  762. wpa_s->scan_req = 2;
  763. wpa_supplicant_req_scan(wpa_s, 0, 0);
  764. return 0;
  765. }