123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089409040914092409340944095409640974098409941004101410241034104410541064107410841094110411141124113411441154116411741184119412041214122412341244125412641274128412941304131413241334134413541364137413841394140414141424143414441454146414741484149415041514152415341544155415641574158415941604161416241634164416541664167416841694170417141724173417441754176417741784179418041814182418341844185418641874188418941904191419241934194419541964197419841994200420142024203420442054206420742084209421042114212421342144215421642174218421942204221422242234224422542264227422842294230423142324233423442354236423742384239424042414242424342444245424642474248424942504251425242534254425542564257425842594260426142624263426442654266426742684269427042714272427342744275427642774278427942804281428242834284428542864287428842894290429142924293429442954296429742984299430043014302430343044305430643074308430943104311431243134314431543164317431843194320432143224323432443254326432743284329433043314332433343344335433643374338433943404341434243434344434543464347434843494350435143524353435443554356435743584359436043614362436343644365436643674368436943704371437243734374437543764377437843794380438143824383438443854386438743884389439043914392439343944395439643974398439944004401440244034404440544064407440844094410441144124413441444154416441744184419442044214422442344244425442644274428442944304431443244334434443544364437443844394440444144424443444444454446444744484449445044514452445344544455445644574458445944604461446244634464446544664467446844694470447144724473447444754476447744784479448044814482448344844485448644874488448944904491449244934494449544964497449844994500450145024503450445054506450745084509451045114512451345144515451645174518451945204521452245234524452545264527452845294530453145324533453445354536453745384539454045414542454345444545454645474548454945504551455245534554455545564557455845594560456145624563456445654566456745684569457045714572457345744575457645774578457945804581458245834584458545864587458845894590459145924593459445954596459745984599460046014602460346044605460646074608460946104611461246134614461546164617461846194620462146224623462446254626462746284629463046314632463346344635463646374638463946404641464246434644464546464647464846494650465146524653465446554656465746584659466046614662466346644665466646674668466946704671467246734674467546764677467846794680468146824683468446854686468746884689469046914692469346944695469646974698469947004701470247034704470547064707470847094710471147124713471447154716471747184719472047214722472347244725472647274728472947304731473247334734473547364737473847394740474147424743474447454746474747484749475047514752475347544755475647574758475947604761476247634764476547664767476847694770477147724773477447754776477747784779478047814782478347844785478647874788478947904791479247934794479547964797479847994800480148024803480448054806480748084809481048114812481348144815481648174818481948204821482248234824482548264827482848294830483148324833483448354836483748384839484048414842484348444845484648474848484948504851485248534854485548564857485848594860486148624863486448654866486748684869487048714872487348744875487648774878487948804881488248834884488548864887488848894890489148924893489448954896489748984899490049014902490349044905490649074908490949104911491249134914491549164917491849194920492149224923492449254926492749284929493049314932493349344935493649374938493949404941494249434944494549464947494849494950495149524953495449554956495749584959496049614962496349644965496649674968496949704971497249734974497549764977497849794980498149824983498449854986498749884989499049914992499349944995499649974998499950005001500250035004500550065007500850095010501150125013501450155016501750185019502050215022502350245025502650275028502950305031503250335034503550365037503850395040504150425043504450455046504750485049505050515052505350545055505650575058505950605061506250635064506550665067506850695070507150725073507450755076507750785079508050815082508350845085508650875088508950905091509250935094509550965097509850995100510151025103510451055106510751085109511051115112511351145115511651175118511951205121512251235124512551265127512851295130513151325133513451355136513751385139514051415142514351445145514651475148514951505151515251535154515551565157515851595160516151625163516451655166516751685169517051715172517351745175517651775178517951805181518251835184518551865187518851895190519151925193519451955196519751985199520052015202520352045205520652075208520952105211521252135214521552165217521852195220522152225223522452255226522752285229523052315232523352345235523652375238523952405241524252435244524552465247524852495250525152525253525452555256525752585259526052615262526352645265526652675268526952705271527252735274527552765277527852795280528152825283528452855286528752885289529052915292529352945295529652975298529953005301530253035304530553065307530853095310531153125313531453155316531753185319532053215322532353245325532653275328532953305331533253335334533553365337533853395340534153425343534453455346534753485349535053515352535353545355535653575358535953605361536253635364536553665367536853695370537153725373537453755376537753785379538053815382538353845385538653875388538953905391539253935394539553965397539853995400540154025403540454055406540754085409541054115412541354145415541654175418541954205421542254235424542554265427542854295430543154325433543454355436543754385439544054415442544354445445544654475448544954505451545254535454545554565457545854595460546154625463546454655466546754685469547054715472547354745475547654775478547954805481548254835484548554865487548854895490549154925493549454955496549754985499550055015502550355045505550655075508550955105511551255135514551555165517551855195520552155225523552455255526552755285529553055315532553355345535553655375538553955405541554255435544554555465547554855495550555155525553555455555556555755585559556055615562556355645565556655675568556955705571557255735574557555765577557855795580558155825583558455855586558755885589559055915592559355945595559655975598559956005601560256035604560556065607560856095610561156125613561456155616561756185619562056215622562356245625562656275628562956305631563256335634563556365637563856395640564156425643564456455646564756485649565056515652565356545655565656575658565956605661566256635664566556665667566856695670567156725673567456755676567756785679568056815682568356845685568656875688568956905691569256935694569556965697569856995700570157025703570457055706570757085709571057115712571357145715571657175718571957205721572257235724572557265727572857295730573157325733573457355736573757385739574057415742574357445745574657475748574957505751575257535754575557565757575857595760576157625763576457655766576757685769577057715772577357745775577657775778577957805781578257835784578557865787578857895790579157925793579457955796579757985799580058015802580358045805580658075808580958105811581258135814581558165817581858195820582158225823582458255826582758285829583058315832583358345835583658375838583958405841584258435844584558465847584858495850585158525853585458555856585758585859586058615862586358645865586658675868586958705871587258735874587558765877587858795880588158825883588458855886588758885889589058915892589358945895589658975898589959005901590259035904590559065907590859095910591159125913591459155916591759185919592059215922592359245925592659275928592959305931593259335934593559365937593859395940594159425943594459455946594759485949595059515952595359545955595659575958595959605961596259635964596559665967596859695970597159725973597459755976597759785979598059815982598359845985598659875988598959905991599259935994599559965997599859996000600160026003600460056006600760086009601060116012601360146015601660176018601960206021602260236024602560266027602860296030603160326033603460356036603760386039604060416042604360446045604660476048604960506051605260536054605560566057605860596060606160626063606460656066606760686069607060716072607360746075607660776078607960806081608260836084608560866087608860896090609160926093609460956096609760986099610061016102610361046105610661076108610961106111611261136114611561166117611861196120612161226123612461256126612761286129613061316132613361346135613661376138613961406141614261436144614561466147614861496150615161526153615461556156615761586159616061616162616361646165616661676168616961706171617261736174617561766177617861796180618161826183618461856186618761886189619061916192619361946195619661976198619962006201620262036204620562066207620862096210621162126213621462156216621762186219622062216222622362246225622662276228622962306231623262336234623562366237623862396240624162426243624462456246624762486249625062516252625362546255625662576258625962606261626262636264626562666267626862696270627162726273627462756276627762786279628062816282628362846285628662876288628962906291629262936294629562966297629862996300630163026303630463056306630763086309631063116312631363146315631663176318631963206321632263236324632563266327632863296330633163326333633463356336633763386339634063416342634363446345634663476348634963506351635263536354635563566357635863596360636163626363636463656366636763686369637063716372637363746375637663776378637963806381638263836384638563866387638863896390639163926393639463956396639763986399640064016402640364046405640664076408640964106411641264136414641564166417641864196420642164226423642464256426642764286429643064316432643364346435643664376438643964406441644264436444644564466447644864496450645164526453645464556456645764586459646064616462646364646465646664676468646964706471647264736474647564766477647864796480648164826483648464856486648764886489649064916492649364946495649664976498649965006501650265036504650565066507650865096510651165126513651465156516651765186519652065216522652365246525652665276528652965306531653265336534653565366537653865396540654165426543654465456546654765486549655065516552655365546555655665576558655965606561656265636564656565666567656865696570657165726573657465756576657765786579658065816582658365846585658665876588658965906591659265936594659565966597659865996600660166026603660466056606660766086609661066116612661366146615661666176618661966206621662266236624662566266627662866296630663166326633663466356636663766386639664066416642664366446645664666476648664966506651665266536654665566566657665866596660666166626663666466656666666766686669667066716672667366746675667666776678667966806681668266836684668566866687668866896690669166926693669466956696669766986699670067016702670367046705670667076708670967106711671267136714671567166717671867196720672167226723672467256726672767286729673067316732673367346735673667376738673967406741674267436744674567466747674867496750675167526753675467556756675767586759676067616762676367646765676667676768676967706771677267736774677567766777677867796780678167826783678467856786678767886789679067916792679367946795679667976798679968006801680268036804680568066807680868096810681168126813681468156816681768186819682068216822682368246825682668276828682968306831683268336834683568366837683868396840684168426843684468456846684768486849685068516852685368546855685668576858685968606861686268636864686568666867686868696870687168726873687468756876687768786879688068816882688368846885688668876888688968906891689268936894689568966897689868996900690169026903690469056906690769086909691069116912691369146915691669176918691969206921692269236924692569266927692869296930693169326933693469356936693769386939694069416942694369446945694669476948694969506951695269536954695569566957695869596960696169626963696469656966696769686969697069716972697369746975697669776978697969806981698269836984698569866987698869896990699169926993699469956996699769986999700070017002700370047005700670077008700970107011701270137014701570167017701870197020702170227023702470257026702770287029703070317032703370347035703670377038 |
- /*
- * WPA Supplicant
- * Copyright (c) 2003-2017, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- *
- * This file implements functions for registering and unregistering
- * %wpa_supplicant interfaces. In addition, this file contains number of
- * functions for managing network connections.
- */
- #include "includes.h"
- #ifdef CONFIG_MATCH_IFACE
- #include <net/if.h>
- #include <fnmatch.h>
- #endif /* CONFIG_MATCH_IFACE */
- #include "common.h"
- #include "crypto/random.h"
- #include "crypto/sha1.h"
- #include "eapol_supp/eapol_supp_sm.h"
- #include "eap_peer/eap.h"
- #include "eap_peer/eap_proxy.h"
- #include "eap_server/eap_methods.h"
- #include "rsn_supp/wpa.h"
- #include "eloop.h"
- #include "config.h"
- #include "utils/ext_password.h"
- #include "l2_packet/l2_packet.h"
- #include "wpa_supplicant_i.h"
- #include "driver_i.h"
- #include "ctrl_iface.h"
- #include "pcsc_funcs.h"
- #include "common/version.h"
- #include "rsn_supp/preauth.h"
- #include "rsn_supp/pmksa_cache.h"
- #include "common/wpa_ctrl.h"
- #include "common/ieee802_11_defs.h"
- #include "common/hw_features_common.h"
- #include "common/gas_server.h"
- #include "p2p/p2p.h"
- #include "fst/fst.h"
- #include "blacklist.h"
- #include "wpas_glue.h"
- #include "wps_supplicant.h"
- #include "ibss_rsn.h"
- #include "sme.h"
- #include "gas_query.h"
- #include "ap.h"
- #include "p2p_supplicant.h"
- #include "wifi_display.h"
- #include "notify.h"
- #include "bgscan.h"
- #include "autoscan.h"
- #include "bss.h"
- #include "scan.h"
- #include "offchannel.h"
- #include "hs20_supplicant.h"
- #include "wnm_sta.h"
- #include "wpas_kay.h"
- #include "mesh.h"
- #include "dpp_supplicant.h"
- #ifdef CONFIG_MESH
- #include "ap/ap_config.h"
- #include "ap/hostapd.h"
- #endif /* CONFIG_MESH */
- const char *const wpa_supplicant_version =
- "wpa_supplicant v" VERSION_STR "\n"
- "Copyright (c) 2003-2017, Jouni Malinen <j@w1.fi> and contributors";
- const char *const wpa_supplicant_license =
- "This software may be distributed under the terms of the BSD license.\n"
- "See README for more details.\n"
- #ifdef EAP_TLS_OPENSSL
- "\nThis product includes software developed by the OpenSSL Project\n"
- "for use in the OpenSSL Toolkit (http://www.openssl.org/)\n"
- #endif /* EAP_TLS_OPENSSL */
- ;
- #ifndef CONFIG_NO_STDOUT_DEBUG
- /* Long text divided into parts in order to fit in C89 strings size limits. */
- const char *const wpa_supplicant_full_license1 =
- "";
- const char *const wpa_supplicant_full_license2 =
- "This software may be distributed under the terms of the BSD license.\n"
- "\n"
- "Redistribution and use in source and binary forms, with or without\n"
- "modification, are permitted provided that the following conditions are\n"
- "met:\n"
- "\n";
- const char *const wpa_supplicant_full_license3 =
- "1. Redistributions of source code must retain the above copyright\n"
- " notice, this list of conditions and the following disclaimer.\n"
- "\n"
- "2. Redistributions in binary form must reproduce the above copyright\n"
- " notice, this list of conditions and the following disclaimer in the\n"
- " documentation and/or other materials provided with the distribution.\n"
- "\n";
- const char *const wpa_supplicant_full_license4 =
- "3. Neither the name(s) of the above-listed copyright holder(s) nor the\n"
- " names of its contributors may be used to endorse or promote products\n"
- " derived from this software without specific prior written permission.\n"
- "\n"
- "THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n"
- "\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n"
- "LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\n"
- "A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\n";
- const char *const wpa_supplicant_full_license5 =
- "OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n"
- "SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\n"
- "LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\n"
- "DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\n"
- "THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n"
- "(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\n"
- "OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n"
- "\n";
- #endif /* CONFIG_NO_STDOUT_DEBUG */
- static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx);
- #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
- static void wpas_update_fils_connect_params(struct wpa_supplicant *wpa_s);
- #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
- /* Configure default/group WEP keys for static WEP */
- int wpa_set_wep_keys(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
- {
- int i, set = 0;
- for (i = 0; i < NUM_WEP_KEYS; i++) {
- if (ssid->wep_key_len[i] == 0)
- continue;
- set = 1;
- wpa_drv_set_key(wpa_s, WPA_ALG_WEP, NULL,
- i, i == ssid->wep_tx_keyidx, NULL, 0,
- ssid->wep_key[i], ssid->wep_key_len[i]);
- }
- return set;
- }
- int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- u8 key[32];
- size_t keylen;
- enum wpa_alg alg;
- u8 seq[6] = { 0 };
- int ret;
- /* IBSS/WPA-None uses only one key (Group) for both receiving and
- * sending unicast and multicast packets. */
- if (ssid->mode != WPAS_MODE_IBSS) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
- "IBSS/ad-hoc) for WPA-None", ssid->mode);
- return -1;
- }
- if (!ssid->psk_set) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
- "WPA-None");
- return -1;
- }
- switch (wpa_s->group_cipher) {
- case WPA_CIPHER_CCMP:
- os_memcpy(key, ssid->psk, 16);
- keylen = 16;
- alg = WPA_ALG_CCMP;
- break;
- case WPA_CIPHER_GCMP:
- os_memcpy(key, ssid->psk, 16);
- keylen = 16;
- alg = WPA_ALG_GCMP;
- break;
- case WPA_CIPHER_TKIP:
- /* WPA-None uses the same Michael MIC key for both TX and RX */
- os_memcpy(key, ssid->psk, 16 + 8);
- os_memcpy(key + 16 + 8, ssid->psk + 16, 8);
- keylen = 32;
- alg = WPA_ALG_TKIP;
- break;
- default:
- wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
- "WPA-None", wpa_s->group_cipher);
- return -1;
- }
- /* TODO: should actually remember the previously used seq#, both for TX
- * and RX from each STA.. */
- ret = wpa_drv_set_key(wpa_s, alg, NULL, 0, 1, seq, 6, key, keylen);
- os_memset(key, 0, sizeof(key));
- return ret;
- }
- static void wpa_supplicant_timeout(void *eloop_ctx, void *timeout_ctx)
- {
- struct wpa_supplicant *wpa_s = eloop_ctx;
- const u8 *bssid = wpa_s->bssid;
- if (!is_zero_ether_addr(wpa_s->pending_bssid) &&
- (wpa_s->wpa_state == WPA_AUTHENTICATING ||
- wpa_s->wpa_state == WPA_ASSOCIATING))
- bssid = wpa_s->pending_bssid;
- wpa_msg(wpa_s, MSG_INFO, "Authentication with " MACSTR " timed out.",
- MAC2STR(bssid));
- wpa_blacklist_add(wpa_s, bssid);
- wpa_sm_notify_disassoc(wpa_s->wpa);
- wpa_supplicant_deauthenticate(wpa_s, WLAN_REASON_DEAUTH_LEAVING);
- wpa_s->reassociate = 1;
- /*
- * If we timed out, the AP or the local radio may be busy.
- * So, wait a second until scanning again.
- */
- wpa_supplicant_req_scan(wpa_s, 1, 0);
- }
- /**
- * wpa_supplicant_req_auth_timeout - Schedule a timeout for authentication
- * @wpa_s: Pointer to wpa_supplicant data
- * @sec: Number of seconds after which to time out authentication
- * @usec: Number of microseconds after which to time out authentication
- *
- * This function is used to schedule a timeout for the current authentication
- * attempt.
- */
- void wpa_supplicant_req_auth_timeout(struct wpa_supplicant *wpa_s,
- int sec, int usec)
- {
- if (wpa_s->conf->ap_scan == 0 &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED))
- return;
- wpa_dbg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec "
- "%d usec", sec, usec);
- eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
- eloop_register_timeout(sec, usec, wpa_supplicant_timeout, wpa_s, NULL);
- }
- /**
- * wpa_supplicant_cancel_auth_timeout - Cancel authentication timeout
- * @wpa_s: Pointer to wpa_supplicant data
- *
- * This function is used to cancel authentication timeout scheduled with
- * wpa_supplicant_req_auth_timeout() and it is called when authentication has
- * been completed.
- */
- void wpa_supplicant_cancel_auth_timeout(struct wpa_supplicant *wpa_s)
- {
- wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout");
- eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
- wpa_blacklist_del(wpa_s, wpa_s->bssid);
- }
- /**
- * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
- * @wpa_s: Pointer to wpa_supplicant data
- *
- * This function is used to configure EAPOL state machine based on the selected
- * authentication mode.
- */
- void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s)
- {
- #ifdef IEEE8021X_EAPOL
- struct eapol_config eapol_conf;
- struct wpa_ssid *ssid = wpa_s->current_ssid;
- #ifdef CONFIG_IBSS_RSN
- if (ssid->mode == WPAS_MODE_IBSS &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_NONE &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_WPA_NONE) {
- /*
- * RSN IBSS authentication is per-STA and we can disable the
- * per-BSSID EAPOL authentication.
- */
- eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
- eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
- eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
- return;
- }
- #endif /* CONFIG_IBSS_RSN */
- eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
- eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE)
- eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
- else
- eapol_sm_notify_portControl(wpa_s->eapol, Auto);
- os_memset(&eapol_conf, 0, sizeof(eapol_conf));
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
- eapol_conf.accept_802_1x_keys = 1;
- eapol_conf.required_keys = 0;
- if (ssid->eapol_flags & EAPOL_FLAG_REQUIRE_KEY_UNICAST) {
- eapol_conf.required_keys |= EAPOL_REQUIRE_KEY_UNICAST;
- }
- if (ssid->eapol_flags & EAPOL_FLAG_REQUIRE_KEY_BROADCAST) {
- eapol_conf.required_keys |=
- EAPOL_REQUIRE_KEY_BROADCAST;
- }
- if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED)
- eapol_conf.required_keys = 0;
- }
- eapol_conf.fast_reauth = wpa_s->conf->fast_reauth;
- eapol_conf.workaround = ssid->eap_workaround;
- eapol_conf.eap_disabled =
- !wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_WPS;
- eapol_conf.external_sim = wpa_s->conf->external_sim;
- #ifdef CONFIG_WPS
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
- eapol_conf.wps |= EAPOL_LOCAL_WPS_IN_USE;
- if (wpa_s->current_bss) {
- struct wpabuf *ie;
- ie = wpa_bss_get_vendor_ie_multi(wpa_s->current_bss,
- WPS_IE_VENDOR_TYPE);
- if (ie) {
- if (wps_is_20(ie))
- eapol_conf.wps |=
- EAPOL_PEER_IS_WPS20_AP;
- wpabuf_free(ie);
- }
- }
- }
- #endif /* CONFIG_WPS */
- eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
- #ifdef CONFIG_MACSEC
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE && ssid->mka_psk_set)
- ieee802_1x_create_preshared_mka(wpa_s, ssid);
- else
- ieee802_1x_alloc_kay_sm(wpa_s, ssid);
- #endif /* CONFIG_MACSEC */
- #endif /* IEEE8021X_EAPOL */
- }
- /**
- * wpa_supplicant_set_non_wpa_policy - Set WPA parameters to non-WPA mode
- * @wpa_s: Pointer to wpa_supplicant data
- * @ssid: Configuration data for the network
- *
- * This function is used to configure WPA state machine and related parameters
- * to a mode where WPA is not enabled. This is called as part of the
- * authentication configuration when the selected network does not use WPA.
- */
- void wpa_supplicant_set_non_wpa_policy(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- int i;
- if (ssid->key_mgmt & WPA_KEY_MGMT_WPS)
- wpa_s->key_mgmt = WPA_KEY_MGMT_WPS;
- else if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA)
- wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA;
- else
- wpa_s->key_mgmt = WPA_KEY_MGMT_NONE;
- wpa_sm_set_ap_wpa_ie(wpa_s->wpa, NULL, 0);
- wpa_sm_set_ap_rsn_ie(wpa_s->wpa, NULL, 0);
- wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
- wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
- wpa_s->group_cipher = WPA_CIPHER_NONE;
- wpa_s->mgmt_group_cipher = 0;
- for (i = 0; i < NUM_WEP_KEYS; i++) {
- if (ssid->wep_key_len[i] > 5) {
- wpa_s->pairwise_cipher = WPA_CIPHER_WEP104;
- wpa_s->group_cipher = WPA_CIPHER_WEP104;
- break;
- } else if (ssid->wep_key_len[i] > 0) {
- wpa_s->pairwise_cipher = WPA_CIPHER_WEP40;
- wpa_s->group_cipher = WPA_CIPHER_WEP40;
- break;
- }
- }
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_RSN_ENABLED, 0);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_KEY_MGMT, wpa_s->key_mgmt);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PAIRWISE,
- wpa_s->pairwise_cipher);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_GROUP, wpa_s->group_cipher);
- #ifdef CONFIG_IEEE80211W
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MGMT_GROUP,
- wpa_s->mgmt_group_cipher);
- #endif /* CONFIG_IEEE80211W */
- pmksa_cache_clear_current(wpa_s->wpa);
- }
- void free_hw_features(struct wpa_supplicant *wpa_s)
- {
- int i;
- if (wpa_s->hw.modes == NULL)
- return;
- for (i = 0; i < wpa_s->hw.num_modes; i++) {
- os_free(wpa_s->hw.modes[i].channels);
- os_free(wpa_s->hw.modes[i].rates);
- }
- os_free(wpa_s->hw.modes);
- wpa_s->hw.modes = NULL;
- }
- static void free_bss_tmp_disallowed(struct wpa_supplicant *wpa_s)
- {
- struct wpa_bss_tmp_disallowed *bss, *prev;
- dl_list_for_each_safe(bss, prev, &wpa_s->bss_tmp_disallowed,
- struct wpa_bss_tmp_disallowed, list) {
- eloop_cancel_timeout(wpa_bss_tmp_disallow_timeout, wpa_s, bss);
- dl_list_del(&bss->list);
- os_free(bss);
- }
- }
- void wpas_flush_fils_hlp_req(struct wpa_supplicant *wpa_s)
- {
- struct fils_hlp_req *req;
- while ((req = dl_list_first(&wpa_s->fils_hlp_req, struct fils_hlp_req,
- list)) != NULL) {
- dl_list_del(&req->list);
- wpabuf_free(req->pkt);
- os_free(req);
- }
- }
- static void wpa_supplicant_cleanup(struct wpa_supplicant *wpa_s)
- {
- int i;
- bgscan_deinit(wpa_s);
- autoscan_deinit(wpa_s);
- scard_deinit(wpa_s->scard);
- wpa_s->scard = NULL;
- wpa_sm_set_scard_ctx(wpa_s->wpa, NULL);
- eapol_sm_register_scard_ctx(wpa_s->eapol, NULL);
- l2_packet_deinit(wpa_s->l2);
- wpa_s->l2 = NULL;
- if (wpa_s->l2_br) {
- l2_packet_deinit(wpa_s->l2_br);
- wpa_s->l2_br = NULL;
- }
- #ifdef CONFIG_TESTING_OPTIONS
- l2_packet_deinit(wpa_s->l2_test);
- wpa_s->l2_test = NULL;
- os_free(wpa_s->get_pref_freq_list_override);
- wpa_s->get_pref_freq_list_override = NULL;
- wpabuf_free(wpa_s->last_assoc_req_wpa_ie);
- wpa_s->last_assoc_req_wpa_ie = NULL;
- #endif /* CONFIG_TESTING_OPTIONS */
- if (wpa_s->conf != NULL) {
- struct wpa_ssid *ssid;
- for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
- wpas_notify_network_removed(wpa_s, ssid);
- }
- os_free(wpa_s->confname);
- wpa_s->confname = NULL;
- os_free(wpa_s->confanother);
- wpa_s->confanother = NULL;
- wpa_sm_set_eapol(wpa_s->wpa, NULL);
- eapol_sm_deinit(wpa_s->eapol);
- wpa_s->eapol = NULL;
- rsn_preauth_deinit(wpa_s->wpa);
- #ifdef CONFIG_TDLS
- wpa_tdls_deinit(wpa_s->wpa);
- #endif /* CONFIG_TDLS */
- wmm_ac_clear_saved_tspecs(wpa_s);
- pmksa_candidate_free(wpa_s->wpa);
- wpa_sm_deinit(wpa_s->wpa);
- wpa_s->wpa = NULL;
- wpa_blacklist_clear(wpa_s);
- wpa_bss_deinit(wpa_s);
- wpa_supplicant_cancel_delayed_sched_scan(wpa_s);
- wpa_supplicant_cancel_scan(wpa_s);
- wpa_supplicant_cancel_auth_timeout(wpa_s);
- eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
- #ifdef CONFIG_DELAYED_MIC_ERROR_REPORT
- eloop_cancel_timeout(wpa_supplicant_delayed_mic_error_report,
- wpa_s, NULL);
- #endif /* CONFIG_DELAYED_MIC_ERROR_REPORT */
- eloop_cancel_timeout(wpas_network_reenabled, wpa_s, NULL);
- wpas_wps_deinit(wpa_s);
- wpabuf_free(wpa_s->pending_eapol_rx);
- wpa_s->pending_eapol_rx = NULL;
- #ifdef CONFIG_IBSS_RSN
- ibss_rsn_deinit(wpa_s->ibss_rsn);
- wpa_s->ibss_rsn = NULL;
- #endif /* CONFIG_IBSS_RSN */
- sme_deinit(wpa_s);
- #ifdef CONFIG_AP
- wpa_supplicant_ap_deinit(wpa_s);
- #endif /* CONFIG_AP */
- wpas_p2p_deinit(wpa_s);
- #ifdef CONFIG_OFFCHANNEL
- offchannel_deinit(wpa_s);
- #endif /* CONFIG_OFFCHANNEL */
- wpa_supplicant_cancel_sched_scan(wpa_s);
- os_free(wpa_s->next_scan_freqs);
- wpa_s->next_scan_freqs = NULL;
- os_free(wpa_s->manual_scan_freqs);
- wpa_s->manual_scan_freqs = NULL;
- os_free(wpa_s->select_network_scan_freqs);
- wpa_s->select_network_scan_freqs = NULL;
- os_free(wpa_s->manual_sched_scan_freqs);
- wpa_s->manual_sched_scan_freqs = NULL;
- wpas_mac_addr_rand_scan_clear(wpa_s, MAC_ADDR_RAND_ALL);
- /*
- * Need to remove any pending gas-query radio work before the
- * gas_query_deinit() call because gas_query::work has not yet been set
- * for works that have not been started. gas_query_free() will be unable
- * to cancel such pending radio works and once the pending gas-query
- * radio work eventually gets removed, the deinit notification call to
- * gas_query_start_cb() would result in dereferencing freed memory.
- */
- if (wpa_s->radio)
- radio_remove_works(wpa_s, "gas-query", 0);
- gas_query_deinit(wpa_s->gas);
- wpa_s->gas = NULL;
- gas_server_deinit(wpa_s->gas_server);
- wpa_s->gas_server = NULL;
- free_hw_features(wpa_s);
- ieee802_1x_dealloc_kay_sm(wpa_s);
- os_free(wpa_s->bssid_filter);
- wpa_s->bssid_filter = NULL;
- os_free(wpa_s->disallow_aps_bssid);
- wpa_s->disallow_aps_bssid = NULL;
- os_free(wpa_s->disallow_aps_ssid);
- wpa_s->disallow_aps_ssid = NULL;
- wnm_bss_keep_alive_deinit(wpa_s);
- #ifdef CONFIG_WNM
- wnm_deallocate_memory(wpa_s);
- #endif /* CONFIG_WNM */
- ext_password_deinit(wpa_s->ext_pw);
- wpa_s->ext_pw = NULL;
- wpabuf_free(wpa_s->last_gas_resp);
- wpa_s->last_gas_resp = NULL;
- wpabuf_free(wpa_s->prev_gas_resp);
- wpa_s->prev_gas_resp = NULL;
- os_free(wpa_s->last_scan_res);
- wpa_s->last_scan_res = NULL;
- #ifdef CONFIG_HS20
- if (wpa_s->drv_priv)
- wpa_drv_configure_frame_filters(wpa_s, 0);
- hs20_deinit(wpa_s);
- #endif /* CONFIG_HS20 */
- for (i = 0; i < NUM_VENDOR_ELEM_FRAMES; i++) {
- wpabuf_free(wpa_s->vendor_elem[i]);
- wpa_s->vendor_elem[i] = NULL;
- }
- wmm_ac_notify_disassoc(wpa_s);
- wpa_s->sched_scan_plans_num = 0;
- os_free(wpa_s->sched_scan_plans);
- wpa_s->sched_scan_plans = NULL;
- #ifdef CONFIG_MBO
- wpa_s->non_pref_chan_num = 0;
- os_free(wpa_s->non_pref_chan);
- wpa_s->non_pref_chan = NULL;
- #endif /* CONFIG_MBO */
- free_bss_tmp_disallowed(wpa_s);
- wpabuf_free(wpa_s->lci);
- wpa_s->lci = NULL;
- wpas_clear_beacon_rep_data(wpa_s);
- #ifdef CONFIG_PMKSA_CACHE_EXTERNAL
- #ifdef CONFIG_MESH
- {
- struct external_pmksa_cache *entry;
- while ((entry = dl_list_last(&wpa_s->mesh_external_pmksa_cache,
- struct external_pmksa_cache,
- list)) != NULL) {
- dl_list_del(&entry->list);
- os_free(entry->pmksa_cache);
- os_free(entry);
- }
- }
- #endif /* CONFIG_MESH */
- #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
- wpas_flush_fils_hlp_req(wpa_s);
- wpabuf_free(wpa_s->ric_ies);
- wpa_s->ric_ies = NULL;
- #ifdef CONFIG_DPP
- wpas_dpp_deinit(wpa_s);
- #endif /* CONFIG_DPP */
- }
- /**
- * wpa_clear_keys - Clear keys configured for the driver
- * @wpa_s: Pointer to wpa_supplicant data
- * @addr: Previously used BSSID or %NULL if not available
- *
- * This function clears the encryption keys that has been previously configured
- * for the driver.
- */
- void wpa_clear_keys(struct wpa_supplicant *wpa_s, const u8 *addr)
- {
- int i, max;
- #ifdef CONFIG_IEEE80211W
- max = 6;
- #else /* CONFIG_IEEE80211W */
- max = 4;
- #endif /* CONFIG_IEEE80211W */
- /* MLME-DELETEKEYS.request */
- for (i = 0; i < max; i++) {
- if (wpa_s->keys_cleared & BIT(i))
- continue;
- wpa_drv_set_key(wpa_s, WPA_ALG_NONE, NULL, i, 0, NULL, 0,
- NULL, 0);
- }
- if (!(wpa_s->keys_cleared & BIT(0)) && addr &&
- !is_zero_ether_addr(addr)) {
- wpa_drv_set_key(wpa_s, WPA_ALG_NONE, addr, 0, 0, NULL, 0, NULL,
- 0);
- /* MLME-SETPROTECTION.request(None) */
- wpa_drv_mlme_setprotection(
- wpa_s, addr,
- MLME_SETPROTECTION_PROTECT_TYPE_NONE,
- MLME_SETPROTECTION_KEY_TYPE_PAIRWISE);
- }
- wpa_s->keys_cleared = (u32) -1;
- }
- /**
- * wpa_supplicant_state_txt - Get the connection state name as a text string
- * @state: State (wpa_state; WPA_*)
- * Returns: The state name as a printable text string
- */
- const char * wpa_supplicant_state_txt(enum wpa_states state)
- {
- switch (state) {
- case WPA_DISCONNECTED:
- return "DISCONNECTED";
- case WPA_INACTIVE:
- return "INACTIVE";
- case WPA_INTERFACE_DISABLED:
- return "INTERFACE_DISABLED";
- case WPA_SCANNING:
- return "SCANNING";
- case WPA_AUTHENTICATING:
- return "AUTHENTICATING";
- case WPA_ASSOCIATING:
- return "ASSOCIATING";
- case WPA_ASSOCIATED:
- return "ASSOCIATED";
- case WPA_4WAY_HANDSHAKE:
- return "4WAY_HANDSHAKE";
- case WPA_GROUP_HANDSHAKE:
- return "GROUP_HANDSHAKE";
- case WPA_COMPLETED:
- return "COMPLETED";
- default:
- return "UNKNOWN";
- }
- }
- #ifdef CONFIG_BGSCAN
- static void wpa_supplicant_start_bgscan(struct wpa_supplicant *wpa_s)
- {
- const char *name;
- if (wpa_s->current_ssid && wpa_s->current_ssid->bgscan)
- name = wpa_s->current_ssid->bgscan;
- else
- name = wpa_s->conf->bgscan;
- if (name == NULL || name[0] == '\0')
- return;
- if (wpas_driver_bss_selection(wpa_s))
- return;
- if (wpa_s->current_ssid == wpa_s->bgscan_ssid)
- return;
- #ifdef CONFIG_P2P
- if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE)
- return;
- #endif /* CONFIG_P2P */
- bgscan_deinit(wpa_s);
- if (wpa_s->current_ssid) {
- if (bgscan_init(wpa_s, wpa_s->current_ssid, name)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize "
- "bgscan");
- /*
- * Live without bgscan; it is only used as a roaming
- * optimization, so the initial connection is not
- * affected.
- */
- } else {
- struct wpa_scan_results *scan_res;
- wpa_s->bgscan_ssid = wpa_s->current_ssid;
- scan_res = wpa_supplicant_get_scan_results(wpa_s, NULL,
- 0);
- if (scan_res) {
- bgscan_notify_scan(wpa_s, scan_res);
- wpa_scan_results_free(scan_res);
- }
- }
- } else
- wpa_s->bgscan_ssid = NULL;
- }
- static void wpa_supplicant_stop_bgscan(struct wpa_supplicant *wpa_s)
- {
- if (wpa_s->bgscan_ssid != NULL) {
- bgscan_deinit(wpa_s);
- wpa_s->bgscan_ssid = NULL;
- }
- }
- #endif /* CONFIG_BGSCAN */
- static void wpa_supplicant_start_autoscan(struct wpa_supplicant *wpa_s)
- {
- if (autoscan_init(wpa_s, 0))
- wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize autoscan");
- }
- static void wpa_supplicant_stop_autoscan(struct wpa_supplicant *wpa_s)
- {
- autoscan_deinit(wpa_s);
- }
- void wpa_supplicant_reinit_autoscan(struct wpa_supplicant *wpa_s)
- {
- if (wpa_s->wpa_state == WPA_DISCONNECTED ||
- wpa_s->wpa_state == WPA_SCANNING) {
- autoscan_deinit(wpa_s);
- wpa_supplicant_start_autoscan(wpa_s);
- }
- }
- /**
- * wpa_supplicant_set_state - Set current connection state
- * @wpa_s: Pointer to wpa_supplicant data
- * @state: The new connection state
- *
- * This function is called whenever the connection state changes, e.g.,
- * association is completed for WPA/WPA2 4-Way Handshake is started.
- */
- void wpa_supplicant_set_state(struct wpa_supplicant *wpa_s,
- enum wpa_states state)
- {
- enum wpa_states old_state = wpa_s->wpa_state;
- wpa_dbg(wpa_s, MSG_DEBUG, "State: %s -> %s",
- wpa_supplicant_state_txt(wpa_s->wpa_state),
- wpa_supplicant_state_txt(state));
- if (state == WPA_INTERFACE_DISABLED) {
- /* Assure normal scan when interface is restored */
- wpa_s->normal_scans = 0;
- }
- if (state == WPA_COMPLETED) {
- wpas_connect_work_done(wpa_s);
- /* Reinitialize normal_scan counter */
- wpa_s->normal_scans = 0;
- }
- #ifdef CONFIG_P2P
- /*
- * P2PS client has to reply to Probe Request frames received on the
- * group operating channel. Enable Probe Request frame reporting for
- * P2P connected client in case p2p_cli_probe configuration property is
- * set to 1.
- */
- if (wpa_s->conf->p2p_cli_probe && wpa_s->current_ssid &&
- wpa_s->current_ssid->mode == WPAS_MODE_INFRA &&
- wpa_s->current_ssid->p2p_group) {
- if (state == WPA_COMPLETED && !wpa_s->p2p_cli_probe) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "P2P: Enable CLI Probe Request RX reporting");
- wpa_s->p2p_cli_probe =
- wpa_drv_probe_req_report(wpa_s, 1) >= 0;
- } else if (state != WPA_COMPLETED && wpa_s->p2p_cli_probe) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "P2P: Disable CLI Probe Request RX reporting");
- wpa_s->p2p_cli_probe = 0;
- wpa_drv_probe_req_report(wpa_s, 0);
- }
- }
- #endif /* CONFIG_P2P */
- if (state != WPA_SCANNING)
- wpa_supplicant_notify_scanning(wpa_s, 0);
- if (state == WPA_COMPLETED && wpa_s->new_connection) {
- struct wpa_ssid *ssid = wpa_s->current_ssid;
- int fils_hlp_sent = 0;
- #ifdef CONFIG_SME
- if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
- wpa_auth_alg_fils(wpa_s->sme.auth_alg))
- fils_hlp_sent = 1;
- #endif /* CONFIG_SME */
- if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
- wpa_auth_alg_fils(wpa_s->auth_alg))
- fils_hlp_sent = 1;
- #if defined(CONFIG_CTRL_IFACE) || !defined(CONFIG_NO_STDOUT_DEBUG)
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_CONNECTED "- Connection to "
- MACSTR " completed [id=%d id_str=%s%s]",
- MAC2STR(wpa_s->bssid),
- ssid ? ssid->id : -1,
- ssid && ssid->id_str ? ssid->id_str : "",
- fils_hlp_sent ? " FILS_HLP_SENT" : "");
- #endif /* CONFIG_CTRL_IFACE || !CONFIG_NO_STDOUT_DEBUG */
- wpas_clear_temp_disabled(wpa_s, ssid, 1);
- wpa_blacklist_clear(wpa_s);
- wpa_s->extra_blacklist_count = 0;
- wpa_s->new_connection = 0;
- wpa_drv_set_operstate(wpa_s, 1);
- #ifndef IEEE8021X_EAPOL
- wpa_drv_set_supp_port(wpa_s, 1);
- #endif /* IEEE8021X_EAPOL */
- wpa_s->after_wps = 0;
- wpa_s->known_wps_freq = 0;
- wpas_p2p_completed(wpa_s);
- sme_sched_obss_scan(wpa_s, 1);
- #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
- if (!fils_hlp_sent && ssid && ssid->eap.erp)
- wpas_update_fils_connect_params(wpa_s);
- #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
- } else if (state == WPA_DISCONNECTED || state == WPA_ASSOCIATING ||
- state == WPA_ASSOCIATED) {
- wpa_s->new_connection = 1;
- wpa_drv_set_operstate(wpa_s, 0);
- #ifndef IEEE8021X_EAPOL
- wpa_drv_set_supp_port(wpa_s, 0);
- #endif /* IEEE8021X_EAPOL */
- sme_sched_obss_scan(wpa_s, 0);
- }
- wpa_s->wpa_state = state;
- #ifdef CONFIG_BGSCAN
- if (state == WPA_COMPLETED)
- wpa_supplicant_start_bgscan(wpa_s);
- else if (state < WPA_ASSOCIATED)
- wpa_supplicant_stop_bgscan(wpa_s);
- #endif /* CONFIG_BGSCAN */
- if (state == WPA_AUTHENTICATING)
- wpa_supplicant_stop_autoscan(wpa_s);
- if (state == WPA_DISCONNECTED || state == WPA_INACTIVE)
- wpa_supplicant_start_autoscan(wpa_s);
- if (old_state >= WPA_ASSOCIATED && wpa_s->wpa_state < WPA_ASSOCIATED)
- wmm_ac_notify_disassoc(wpa_s);
- if (wpa_s->wpa_state != old_state) {
- wpas_notify_state_changed(wpa_s, wpa_s->wpa_state, old_state);
- /*
- * Notify the P2P Device interface about a state change in one
- * of the interfaces.
- */
- wpas_p2p_indicate_state_change(wpa_s);
- if (wpa_s->wpa_state == WPA_COMPLETED ||
- old_state == WPA_COMPLETED)
- wpas_notify_auth_changed(wpa_s);
- }
- }
- void wpa_supplicant_terminate_proc(struct wpa_global *global)
- {
- int pending = 0;
- #ifdef CONFIG_WPS
- struct wpa_supplicant *wpa_s = global->ifaces;
- while (wpa_s) {
- struct wpa_supplicant *next = wpa_s->next;
- if (wpas_wps_terminate_pending(wpa_s) == 1)
- pending = 1;
- #ifdef CONFIG_P2P
- if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE ||
- (wpa_s->current_ssid && wpa_s->current_ssid->p2p_group))
- wpas_p2p_disconnect(wpa_s);
- #endif /* CONFIG_P2P */
- wpa_s = next;
- }
- #endif /* CONFIG_WPS */
- if (pending)
- return;
- eloop_terminate();
- }
- static void wpa_supplicant_terminate(int sig, void *signal_ctx)
- {
- struct wpa_global *global = signal_ctx;
- wpa_supplicant_terminate_proc(global);
- }
- void wpa_supplicant_clear_status(struct wpa_supplicant *wpa_s)
- {
- enum wpa_states old_state = wpa_s->wpa_state;
- wpa_s->pairwise_cipher = 0;
- wpa_s->group_cipher = 0;
- wpa_s->mgmt_group_cipher = 0;
- wpa_s->key_mgmt = 0;
- if (wpa_s->wpa_state != WPA_INTERFACE_DISABLED)
- wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
- if (wpa_s->wpa_state != old_state)
- wpas_notify_state_changed(wpa_s, wpa_s->wpa_state, old_state);
- }
- /**
- * wpa_supplicant_reload_configuration - Reload configuration data
- * @wpa_s: Pointer to wpa_supplicant data
- * Returns: 0 on success or -1 if configuration parsing failed
- *
- * This function can be used to request that the configuration data is reloaded
- * (e.g., after configuration file change). This function is reloading
- * configuration only for one interface, so this may need to be called multiple
- * times if %wpa_supplicant is controlling multiple interfaces and all
- * interfaces need reconfiguration.
- */
- int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s)
- {
- struct wpa_config *conf;
- int reconf_ctrl;
- int old_ap_scan;
- if (wpa_s->confname == NULL)
- return -1;
- conf = wpa_config_read(wpa_s->confname, NULL);
- if (conf == NULL) {
- wpa_msg(wpa_s, MSG_ERROR, "Failed to parse the configuration "
- "file '%s' - exiting", wpa_s->confname);
- return -1;
- }
- if (wpa_s->confanother &&
- !wpa_config_read(wpa_s->confanother, conf)) {
- wpa_msg(wpa_s, MSG_ERROR,
- "Failed to parse the configuration file '%s' - exiting",
- wpa_s->confanother);
- return -1;
- }
- conf->changed_parameters = (unsigned int) -1;
- reconf_ctrl = !!conf->ctrl_interface != !!wpa_s->conf->ctrl_interface
- || (conf->ctrl_interface && wpa_s->conf->ctrl_interface &&
- os_strcmp(conf->ctrl_interface,
- wpa_s->conf->ctrl_interface) != 0);
- if (reconf_ctrl && wpa_s->ctrl_iface) {
- wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface);
- wpa_s->ctrl_iface = NULL;
- }
- eapol_sm_invalidate_cached_session(wpa_s->eapol);
- if (wpa_s->current_ssid) {
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
- wpa_s->own_disconnect_req = 1;
- wpa_supplicant_deauthenticate(wpa_s,
- WLAN_REASON_DEAUTH_LEAVING);
- }
- /*
- * TODO: should notify EAPOL SM about changes in opensc_engine_path,
- * pkcs11_engine_path, pkcs11_module_path, openssl_ciphers.
- */
- if (wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_OWE ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_DPP) {
- /*
- * Clear forced success to clear EAP state for next
- * authentication.
- */
- eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
- }
- eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
- wpa_sm_set_config(wpa_s->wpa, NULL);
- wpa_sm_pmksa_cache_flush(wpa_s->wpa, NULL);
- wpa_sm_set_fast_reauth(wpa_s->wpa, wpa_s->conf->fast_reauth);
- rsn_preauth_deinit(wpa_s->wpa);
- old_ap_scan = wpa_s->conf->ap_scan;
- wpa_config_free(wpa_s->conf);
- wpa_s->conf = conf;
- if (old_ap_scan != wpa_s->conf->ap_scan)
- wpas_notify_ap_scan_changed(wpa_s);
- if (reconf_ctrl)
- wpa_s->ctrl_iface = wpa_supplicant_ctrl_iface_init(wpa_s);
- wpa_supplicant_update_config(wpa_s);
- wpa_supplicant_clear_status(wpa_s);
- if (wpa_supplicant_enabled_networks(wpa_s)) {
- wpa_s->reassociate = 1;
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "Reconfiguration completed");
- return 0;
- }
- static void wpa_supplicant_reconfig(int sig, void *signal_ctx)
- {
- struct wpa_global *global = signal_ctx;
- struct wpa_supplicant *wpa_s;
- for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Signal %d received - reconfiguring",
- sig);
- if (wpa_supplicant_reload_configuration(wpa_s) < 0) {
- wpa_supplicant_terminate_proc(global);
- }
- }
- if (wpa_debug_reopen_file() < 0) {
- /* Ignore errors since we cannot really do much to fix this */
- wpa_printf(MSG_DEBUG, "Could not reopen debug log file");
- }
- }
- static int wpa_supplicant_suites_from_ai(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid,
- struct wpa_ie_data *ie)
- {
- int ret = wpa_sm_parse_own_wpa_ie(wpa_s->wpa, ie);
- if (ret) {
- if (ret == -2) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Failed to parse WPA IE "
- "from association info");
- }
- return -1;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set "
- "cipher suites");
- if (!(ie->group_cipher & ssid->group_cipher)) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled group "
- "cipher 0x%x (mask 0x%x) - reject",
- ie->group_cipher, ssid->group_cipher);
- return -1;
- }
- if (!(ie->pairwise_cipher & ssid->pairwise_cipher)) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled pairwise "
- "cipher 0x%x (mask 0x%x) - reject",
- ie->pairwise_cipher, ssid->pairwise_cipher);
- return -1;
- }
- if (!(ie->key_mgmt & ssid->key_mgmt)) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled key "
- "management 0x%x (mask 0x%x) - reject",
- ie->key_mgmt, ssid->key_mgmt);
- return -1;
- }
- #ifdef CONFIG_IEEE80211W
- if (!(ie->capabilities & WPA_CAPABILITY_MFPC) &&
- wpas_get_ssid_pmf(wpa_s, ssid) == MGMT_FRAME_PROTECTION_REQUIRED) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Driver associated with an AP "
- "that does not support management frame protection - "
- "reject");
- return -1;
- }
- #endif /* CONFIG_IEEE80211W */
- return 0;
- }
- /**
- * wpa_supplicant_set_suites - Set authentication and encryption parameters
- * @wpa_s: Pointer to wpa_supplicant data
- * @bss: Scan results for the selected BSS, or %NULL if not available
- * @ssid: Configuration data for the selected network
- * @wpa_ie: Buffer for the WPA/RSN IE
- * @wpa_ie_len: Maximum wpa_ie buffer size on input. This is changed to be the
- * used buffer length in case the functions returns success.
- * Returns: 0 on success or -1 on failure
- *
- * This function is used to configure authentication and encryption parameters
- * based on the network configuration and scan result for the selected BSS (if
- * available).
- */
- int wpa_supplicant_set_suites(struct wpa_supplicant *wpa_s,
- struct wpa_bss *bss, struct wpa_ssid *ssid,
- u8 *wpa_ie, size_t *wpa_ie_len)
- {
- struct wpa_ie_data ie;
- int sel, proto;
- const u8 *bss_wpa, *bss_rsn, *bss_osen;
- if (bss) {
- bss_wpa = wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE);
- bss_rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
- bss_osen = wpa_bss_get_vendor_ie(bss, OSEN_IE_VENDOR_TYPE);
- } else
- bss_wpa = bss_rsn = bss_osen = NULL;
- if (bss_rsn && (ssid->proto & WPA_PROTO_RSN) &&
- wpa_parse_wpa_ie(bss_rsn, 2 + bss_rsn[1], &ie) == 0 &&
- (ie.group_cipher & ssid->group_cipher) &&
- (ie.pairwise_cipher & ssid->pairwise_cipher) &&
- (ie.key_mgmt & ssid->key_mgmt)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
- proto = WPA_PROTO_RSN;
- } else if (bss_wpa && (ssid->proto & WPA_PROTO_WPA) &&
- wpa_parse_wpa_ie(bss_wpa, 2 + bss_wpa[1], &ie) == 0 &&
- (ie.group_cipher & ssid->group_cipher) &&
- (ie.pairwise_cipher & ssid->pairwise_cipher) &&
- (ie.key_mgmt & ssid->key_mgmt)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0");
- proto = WPA_PROTO_WPA;
- #ifdef CONFIG_HS20
- } else if (bss_osen && (ssid->proto & WPA_PROTO_OSEN)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using OSEN");
- /* TODO: parse OSEN element */
- os_memset(&ie, 0, sizeof(ie));
- ie.group_cipher = WPA_CIPHER_CCMP;
- ie.pairwise_cipher = WPA_CIPHER_CCMP;
- ie.key_mgmt = WPA_KEY_MGMT_OSEN;
- proto = WPA_PROTO_OSEN;
- #endif /* CONFIG_HS20 */
- } else if (bss) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN");
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: ssid proto=0x%x pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
- ssid->proto, ssid->pairwise_cipher, ssid->group_cipher,
- ssid->key_mgmt);
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: BSS " MACSTR " ssid='%s'%s%s%s",
- MAC2STR(bss->bssid),
- wpa_ssid_txt(bss->ssid, bss->ssid_len),
- bss_wpa ? " WPA" : "",
- bss_rsn ? " RSN" : "",
- bss_osen ? " OSEN" : "");
- if (bss_rsn) {
- wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]);
- if (wpa_parse_wpa_ie(bss_rsn, 2 + bss_rsn[1], &ie)) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Could not parse RSN element");
- } else {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
- ie.pairwise_cipher, ie.group_cipher,
- ie.key_mgmt);
- }
- }
- if (bss_wpa) {
- wpa_hexdump(MSG_DEBUG, "WPA", bss_wpa, 2 + bss_wpa[1]);
- if (wpa_parse_wpa_ie(bss_wpa, 2 + bss_wpa[1], &ie)) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Could not parse WPA element");
- } else {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
- ie.pairwise_cipher, ie.group_cipher,
- ie.key_mgmt);
- }
- }
- return -1;
- } else {
- if (ssid->proto & WPA_PROTO_OSEN)
- proto = WPA_PROTO_OSEN;
- else if (ssid->proto & WPA_PROTO_RSN)
- proto = WPA_PROTO_RSN;
- else
- proto = WPA_PROTO_WPA;
- if (wpa_supplicant_suites_from_ai(wpa_s, ssid, &ie) < 0) {
- os_memset(&ie, 0, sizeof(ie));
- ie.group_cipher = ssid->group_cipher;
- ie.pairwise_cipher = ssid->pairwise_cipher;
- ie.key_mgmt = ssid->key_mgmt;
- #ifdef CONFIG_IEEE80211W
- ie.mgmt_group_cipher = 0;
- if (ssid->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
- if (ssid->group_mgmt_cipher &
- WPA_CIPHER_BIP_GMAC_256)
- ie.mgmt_group_cipher =
- WPA_CIPHER_BIP_GMAC_256;
- else if (ssid->group_mgmt_cipher &
- WPA_CIPHER_BIP_CMAC_256)
- ie.mgmt_group_cipher =
- WPA_CIPHER_BIP_CMAC_256;
- else if (ssid->group_mgmt_cipher &
- WPA_CIPHER_BIP_GMAC_128)
- ie.mgmt_group_cipher =
- WPA_CIPHER_BIP_GMAC_128;
- else
- ie.mgmt_group_cipher =
- WPA_CIPHER_AES_128_CMAC;
- }
- #endif /* CONFIG_IEEE80211W */
- #ifdef CONFIG_OWE
- if ((ssid->key_mgmt & WPA_KEY_MGMT_OWE) &&
- !ssid->owe_only &&
- !bss_wpa && !bss_rsn && !bss_osen) {
- wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
- wpa_s->wpa_proto = 0;
- *wpa_ie_len = 0;
- return 0;
- }
- #endif /* CONFIG_OWE */
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Set cipher suites "
- "based on configuration");
- } else
- proto = ie.proto;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected cipher suites: group %d "
- "pairwise %d key_mgmt %d proto %d",
- ie.group_cipher, ie.pairwise_cipher, ie.key_mgmt, proto);
- #ifdef CONFIG_IEEE80211W
- if (ssid->ieee80211w) {
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected mgmt group cipher %d",
- ie.mgmt_group_cipher);
- }
- #endif /* CONFIG_IEEE80211W */
- wpa_s->wpa_proto = proto;
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, proto);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_RSN_ENABLED,
- !!(ssid->proto & (WPA_PROTO_RSN | WPA_PROTO_OSEN)));
- if (bss || !wpa_s->ap_ies_from_associnfo) {
- if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, bss_wpa,
- bss_wpa ? 2 + bss_wpa[1] : 0) ||
- wpa_sm_set_ap_rsn_ie(wpa_s->wpa, bss_rsn,
- bss_rsn ? 2 + bss_rsn[1] : 0))
- return -1;
- }
- #ifdef CONFIG_NO_WPA
- wpa_s->group_cipher = WPA_CIPHER_NONE;
- wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
- #else /* CONFIG_NO_WPA */
- sel = ie.group_cipher & ssid->group_cipher;
- wpa_s->group_cipher = wpa_pick_group_cipher(sel);
- if (wpa_s->group_cipher < 0) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select group "
- "cipher");
- return -1;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using GTK %s",
- wpa_cipher_txt(wpa_s->group_cipher));
- sel = ie.pairwise_cipher & ssid->pairwise_cipher;
- wpa_s->pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1);
- if (wpa_s->pairwise_cipher < 0) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select pairwise "
- "cipher");
- return -1;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using PTK %s",
- wpa_cipher_txt(wpa_s->pairwise_cipher));
- #endif /* CONFIG_NO_WPA */
- sel = ie.key_mgmt & ssid->key_mgmt;
- #ifdef CONFIG_SAE
- if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SAE))
- sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_FT_SAE);
- #endif /* CONFIG_SAE */
- if (0) {
- #ifdef CONFIG_SUITEB192
- } else if (sel & WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B_192;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: using KEY_MGMT 802.1X with Suite B (192-bit)");
- #endif /* CONFIG_SUITEB192 */
- #ifdef CONFIG_SUITEB
- } else if (sel & WPA_KEY_MGMT_IEEE8021X_SUITE_B) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: using KEY_MGMT 802.1X with Suite B");
- #endif /* CONFIG_SUITEB */
- #ifdef CONFIG_FILS
- #ifdef CONFIG_IEEE80211R
- } else if (sel & WPA_KEY_MGMT_FT_FILS_SHA384) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FT_FILS_SHA384;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT-FILS-SHA384");
- } else if (sel & WPA_KEY_MGMT_FT_FILS_SHA256) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FT_FILS_SHA256;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT-FILS-SHA256");
- #endif /* CONFIG_IEEE80211R */
- } else if (sel & WPA_KEY_MGMT_FILS_SHA384) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FILS_SHA384;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FILS-SHA384");
- } else if (sel & WPA_KEY_MGMT_FILS_SHA256) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FILS_SHA256;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FILS-SHA256");
- #endif /* CONFIG_FILS */
- #ifdef CONFIG_IEEE80211R
- } else if (sel & WPA_KEY_MGMT_FT_IEEE8021X) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/802.1X");
- } else if (sel & WPA_KEY_MGMT_FT_PSK) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FT_PSK;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK");
- #endif /* CONFIG_IEEE80211R */
- #ifdef CONFIG_SAE
- } else if (sel & WPA_KEY_MGMT_SAE) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_SAE;
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT SAE");
- } else if (sel & WPA_KEY_MGMT_FT_SAE) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_FT_SAE;
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT FT/SAE");
- #endif /* CONFIG_SAE */
- #ifdef CONFIG_IEEE80211W
- } else if (sel & WPA_KEY_MGMT_IEEE8021X_SHA256) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SHA256;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: using KEY_MGMT 802.1X with SHA256");
- } else if (sel & WPA_KEY_MGMT_PSK_SHA256) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_PSK_SHA256;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "WPA: using KEY_MGMT PSK with SHA256");
- #endif /* CONFIG_IEEE80211W */
- } else if (sel & WPA_KEY_MGMT_IEEE8021X) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT 802.1X");
- } else if (sel & WPA_KEY_MGMT_PSK) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_PSK;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK");
- } else if (sel & WPA_KEY_MGMT_WPA_NONE) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_WPA_NONE;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-NONE");
- #ifdef CONFIG_HS20
- } else if (sel & WPA_KEY_MGMT_OSEN) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_OSEN;
- wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using KEY_MGMT OSEN");
- #endif /* CONFIG_HS20 */
- #ifdef CONFIG_OWE
- } else if (sel & WPA_KEY_MGMT_OWE) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_OWE;
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT OWE");
- #endif /* CONFIG_OWE */
- #ifdef CONFIG_DPP
- } else if (sel & WPA_KEY_MGMT_DPP) {
- wpa_s->key_mgmt = WPA_KEY_MGMT_DPP;
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT DPP");
- #endif /* CONFIG_DPP */
- } else {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select "
- "authenticated key management type");
- return -1;
- }
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_KEY_MGMT, wpa_s->key_mgmt);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PAIRWISE,
- wpa_s->pairwise_cipher);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_GROUP, wpa_s->group_cipher);
- #ifdef CONFIG_IEEE80211W
- sel = ie.mgmt_group_cipher;
- if (ssid->group_mgmt_cipher)
- sel &= ssid->group_mgmt_cipher;
- if (wpas_get_ssid_pmf(wpa_s, ssid) == NO_MGMT_FRAME_PROTECTION ||
- !(ie.capabilities & WPA_CAPABILITY_MFPC))
- sel = 0;
- if (sel & WPA_CIPHER_AES_128_CMAC) {
- wpa_s->mgmt_group_cipher = WPA_CIPHER_AES_128_CMAC;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
- "AES-128-CMAC");
- } else if (sel & WPA_CIPHER_BIP_GMAC_128) {
- wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_GMAC_128;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
- "BIP-GMAC-128");
- } else if (sel & WPA_CIPHER_BIP_GMAC_256) {
- wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_GMAC_256;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
- "BIP-GMAC-256");
- } else if (sel & WPA_CIPHER_BIP_CMAC_256) {
- wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_CMAC_256;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
- "BIP-CMAC-256");
- } else {
- wpa_s->mgmt_group_cipher = 0;
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: not using MGMT group cipher");
- }
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MGMT_GROUP,
- wpa_s->mgmt_group_cipher);
- wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MFP,
- wpas_get_ssid_pmf(wpa_s, ssid));
- #endif /* CONFIG_IEEE80211W */
- if (wpa_sm_set_assoc_wpa_ie_default(wpa_s->wpa, wpa_ie, wpa_ie_len)) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to generate WPA IE");
- return -1;
- }
- if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt)) {
- int psk_set = 0;
- if (ssid->psk_set) {
- wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN, NULL,
- NULL);
- psk_set = 1;
- }
- if (wpa_key_mgmt_sae(ssid->key_mgmt) && ssid->sae_password)
- psk_set = 1;
- #ifndef CONFIG_NO_PBKDF2
- if (bss && ssid->bssid_set && ssid->ssid_len == 0 &&
- ssid->passphrase) {
- u8 psk[PMK_LEN];
- pbkdf2_sha1(ssid->passphrase, bss->ssid, bss->ssid_len,
- 4096, psk, PMK_LEN);
- wpa_hexdump_key(MSG_MSGDUMP, "PSK (from passphrase)",
- psk, PMK_LEN);
- wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, NULL);
- psk_set = 1;
- os_memset(psk, 0, sizeof(psk));
- }
- #endif /* CONFIG_NO_PBKDF2 */
- #ifdef CONFIG_EXT_PASSWORD
- if (ssid->ext_psk) {
- struct wpabuf *pw = ext_password_get(wpa_s->ext_pw,
- ssid->ext_psk);
- char pw_str[64 + 1];
- u8 psk[PMK_LEN];
- if (pw == NULL) {
- wpa_msg(wpa_s, MSG_INFO, "EXT PW: No PSK "
- "found from external storage");
- return -1;
- }
- if (wpabuf_len(pw) < 8 || wpabuf_len(pw) > 64) {
- wpa_msg(wpa_s, MSG_INFO, "EXT PW: Unexpected "
- "PSK length %d in external storage",
- (int) wpabuf_len(pw));
- ext_password_free(pw);
- return -1;
- }
- os_memcpy(pw_str, wpabuf_head(pw), wpabuf_len(pw));
- pw_str[wpabuf_len(pw)] = '\0';
- #ifndef CONFIG_NO_PBKDF2
- if (wpabuf_len(pw) >= 8 && wpabuf_len(pw) < 64 && bss)
- {
- pbkdf2_sha1(pw_str, bss->ssid, bss->ssid_len,
- 4096, psk, PMK_LEN);
- os_memset(pw_str, 0, sizeof(pw_str));
- wpa_hexdump_key(MSG_MSGDUMP, "PSK (from "
- "external passphrase)",
- psk, PMK_LEN);
- wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL,
- NULL);
- psk_set = 1;
- os_memset(psk, 0, sizeof(psk));
- } else
- #endif /* CONFIG_NO_PBKDF2 */
- if (wpabuf_len(pw) == 2 * PMK_LEN) {
- if (hexstr2bin(pw_str, psk, PMK_LEN) < 0) {
- wpa_msg(wpa_s, MSG_INFO, "EXT PW: "
- "Invalid PSK hex string");
- os_memset(pw_str, 0, sizeof(pw_str));
- ext_password_free(pw);
- return -1;
- }
- wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL,
- NULL);
- psk_set = 1;
- os_memset(psk, 0, sizeof(psk));
- } else {
- wpa_msg(wpa_s, MSG_INFO, "EXT PW: No suitable "
- "PSK available");
- os_memset(pw_str, 0, sizeof(pw_str));
- ext_password_free(pw);
- return -1;
- }
- os_memset(pw_str, 0, sizeof(pw_str));
- ext_password_free(pw);
- }
- #endif /* CONFIG_EXT_PASSWORD */
- if (!psk_set) {
- wpa_msg(wpa_s, MSG_INFO,
- "No PSK available for association");
- return -1;
- }
- #ifdef CONFIG_OWE
- } else if (wpa_s->key_mgmt == WPA_KEY_MGMT_OWE) {
- /* OWE Diffie-Hellman exchange in (Re)Association
- * Request/Response frames set the PMK, so do not override it
- * here. */
- #endif /* CONFIG_OWE */
- } else
- wpa_sm_set_pmk_from_pmksa(wpa_s->wpa);
- return 0;
- }
- static void wpas_ext_capab_byte(struct wpa_supplicant *wpa_s, u8 *pos, int idx)
- {
- *pos = 0x00;
- switch (idx) {
- case 0: /* Bits 0-7 */
- break;
- case 1: /* Bits 8-15 */
- break;
- case 2: /* Bits 16-23 */
- #ifdef CONFIG_WNM
- *pos |= 0x02; /* Bit 17 - WNM-Sleep Mode */
- *pos |= 0x08; /* Bit 19 - BSS Transition */
- #endif /* CONFIG_WNM */
- break;
- case 3: /* Bits 24-31 */
- #ifdef CONFIG_WNM
- *pos |= 0x02; /* Bit 25 - SSID List */
- #endif /* CONFIG_WNM */
- #ifdef CONFIG_INTERWORKING
- if (wpa_s->conf->interworking)
- *pos |= 0x80; /* Bit 31 - Interworking */
- #endif /* CONFIG_INTERWORKING */
- break;
- case 4: /* Bits 32-39 */
- #ifdef CONFIG_INTERWORKING
- if (wpa_s->drv_flags / WPA_DRIVER_FLAGS_QOS_MAPPING)
- *pos |= 0x01; /* Bit 32 - QoS Map */
- #endif /* CONFIG_INTERWORKING */
- break;
- case 5: /* Bits 40-47 */
- #ifdef CONFIG_HS20
- if (wpa_s->conf->hs20)
- *pos |= 0x40; /* Bit 46 - WNM-Notification */
- #endif /* CONFIG_HS20 */
- #ifdef CONFIG_MBO
- *pos |= 0x40; /* Bit 46 - WNM-Notification */
- #endif /* CONFIG_MBO */
- break;
- case 6: /* Bits 48-55 */
- break;
- case 7: /* Bits 56-63 */
- break;
- case 8: /* Bits 64-71 */
- if (wpa_s->conf->ftm_responder)
- *pos |= 0x40; /* Bit 70 - FTM responder */
- if (wpa_s->conf->ftm_initiator)
- *pos |= 0x80; /* Bit 71 - FTM initiator */
- break;
- case 9: /* Bits 72-79 */
- #ifdef CONFIG_FILS
- if (!wpa_s->disable_fils)
- *pos |= 0x01;
- #endif /* CONFIG_FILS */
- break;
- }
- }
- int wpas_build_ext_capab(struct wpa_supplicant *wpa_s, u8 *buf, size_t buflen)
- {
- u8 *pos = buf;
- u8 len = 10, i;
- if (len < wpa_s->extended_capa_len)
- len = wpa_s->extended_capa_len;
- if (buflen < (size_t) len + 2) {
- wpa_printf(MSG_INFO,
- "Not enough room for building extended capabilities element");
- return -1;
- }
- *pos++ = WLAN_EID_EXT_CAPAB;
- *pos++ = len;
- for (i = 0; i < len; i++, pos++) {
- wpas_ext_capab_byte(wpa_s, pos, i);
- if (i < wpa_s->extended_capa_len) {
- *pos &= ~wpa_s->extended_capa_mask[i];
- *pos |= wpa_s->extended_capa[i];
- }
- }
- while (len > 0 && buf[1 + len] == 0) {
- len--;
- buf[1] = len;
- }
- if (len == 0)
- return 0;
- return 2 + len;
- }
- static int wpas_valid_bss(struct wpa_supplicant *wpa_s,
- struct wpa_bss *test_bss)
- {
- struct wpa_bss *bss;
- dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
- if (bss == test_bss)
- return 1;
- }
- return 0;
- }
- static int wpas_valid_ssid(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *test_ssid)
- {
- struct wpa_ssid *ssid;
- for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
- if (ssid == test_ssid)
- return 1;
- }
- return 0;
- }
- int wpas_valid_bss_ssid(struct wpa_supplicant *wpa_s, struct wpa_bss *test_bss,
- struct wpa_ssid *test_ssid)
- {
- if (test_bss && !wpas_valid_bss(wpa_s, test_bss))
- return 0;
- return test_ssid == NULL || wpas_valid_ssid(wpa_s, test_ssid);
- }
- void wpas_connect_work_free(struct wpa_connect_work *cwork)
- {
- if (cwork == NULL)
- return;
- os_free(cwork);
- }
- void wpas_connect_work_done(struct wpa_supplicant *wpa_s)
- {
- struct wpa_connect_work *cwork;
- struct wpa_radio_work *work = wpa_s->connect_work;
- if (!work)
- return;
- wpa_s->connect_work = NULL;
- cwork = work->ctx;
- work->ctx = NULL;
- wpas_connect_work_free(cwork);
- radio_work_done(work);
- }
- int wpas_update_random_addr(struct wpa_supplicant *wpa_s, int style)
- {
- struct os_reltime now;
- u8 addr[ETH_ALEN];
- os_get_reltime(&now);
- if (wpa_s->last_mac_addr_style == style &&
- wpa_s->last_mac_addr_change.sec != 0 &&
- !os_reltime_expired(&now, &wpa_s->last_mac_addr_change,
- wpa_s->conf->rand_addr_lifetime)) {
- wpa_msg(wpa_s, MSG_DEBUG,
- "Previously selected random MAC address has not yet expired");
- return 0;
- }
- switch (style) {
- case 1:
- if (random_mac_addr(addr) < 0)
- return -1;
- break;
- case 2:
- os_memcpy(addr, wpa_s->perm_addr, ETH_ALEN);
- if (random_mac_addr_keep_oui(addr) < 0)
- return -1;
- break;
- default:
- return -1;
- }
- if (wpa_drv_set_mac_addr(wpa_s, addr) < 0) {
- wpa_msg(wpa_s, MSG_INFO,
- "Failed to set random MAC address");
- return -1;
- }
- os_get_reltime(&wpa_s->last_mac_addr_change);
- wpa_s->mac_addr_changed = 1;
- wpa_s->last_mac_addr_style = style;
- if (wpa_supplicant_update_mac_addr(wpa_s) < 0) {
- wpa_msg(wpa_s, MSG_INFO,
- "Could not update MAC address information");
- return -1;
- }
- wpa_msg(wpa_s, MSG_DEBUG, "Using random MAC address " MACSTR,
- MAC2STR(addr));
- return 0;
- }
- int wpas_update_random_addr_disassoc(struct wpa_supplicant *wpa_s)
- {
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING ||
- !wpa_s->conf->preassoc_mac_addr)
- return 0;
- return wpas_update_random_addr(wpa_s, wpa_s->conf->preassoc_mac_addr);
- }
- static void wpas_start_assoc_cb(struct wpa_radio_work *work, int deinit);
- /**
- * wpa_supplicant_associate - Request association
- * @wpa_s: Pointer to wpa_supplicant data
- * @bss: Scan results for the selected BSS, or %NULL if not available
- * @ssid: Configuration data for the selected network
- *
- * This function is used to request %wpa_supplicant to associate with a BSS.
- */
- void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
- struct wpa_bss *bss, struct wpa_ssid *ssid)
- {
- struct wpa_connect_work *cwork;
- int rand_style;
- wpa_s->own_disconnect_req = 0;
- /*
- * If we are starting a new connection, any previously pending EAPOL
- * RX cannot be valid anymore.
- */
- wpabuf_free(wpa_s->pending_eapol_rx);
- wpa_s->pending_eapol_rx = NULL;
- if (ssid->mac_addr == -1)
- rand_style = wpa_s->conf->mac_addr;
- else
- rand_style = ssid->mac_addr;
- wmm_ac_clear_saved_tspecs(wpa_s);
- wpa_s->reassoc_same_bss = 0;
- wpa_s->reassoc_same_ess = 0;
- #ifdef CONFIG_TESTING_OPTIONS
- wpa_s->testing_resend_assoc = 0;
- #endif /* CONFIG_TESTING_OPTIONS */
- if (wpa_s->last_ssid == ssid) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Re-association to the same ESS");
- wpa_s->reassoc_same_ess = 1;
- if (wpa_s->current_bss && wpa_s->current_bss == bss) {
- wmm_ac_save_tspecs(wpa_s);
- wpa_s->reassoc_same_bss = 1;
- }
- }
- if (rand_style > 0 && !wpa_s->reassoc_same_ess) {
- if (wpas_update_random_addr(wpa_s, rand_style) < 0)
- return;
- wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
- } else if (rand_style == 0 && wpa_s->mac_addr_changed) {
- if (wpa_drv_set_mac_addr(wpa_s, NULL) < 0) {
- wpa_msg(wpa_s, MSG_INFO,
- "Could not restore permanent MAC address");
- return;
- }
- wpa_s->mac_addr_changed = 0;
- if (wpa_supplicant_update_mac_addr(wpa_s) < 0) {
- wpa_msg(wpa_s, MSG_INFO,
- "Could not update MAC address information");
- return;
- }
- wpa_msg(wpa_s, MSG_DEBUG, "Using permanent MAC address");
- }
- wpa_s->last_ssid = ssid;
- #ifdef CONFIG_IBSS_RSN
- ibss_rsn_deinit(wpa_s->ibss_rsn);
- wpa_s->ibss_rsn = NULL;
- #else /* CONFIG_IBSS_RSN */
- if (ssid->mode == WPAS_MODE_IBSS &&
- !(ssid->key_mgmt & (WPA_KEY_MGMT_NONE | WPA_KEY_MGMT_WPA_NONE))) {
- wpa_msg(wpa_s, MSG_INFO,
- "IBSS RSN not supported in the build");
- return;
- }
- #endif /* CONFIG_IBSS_RSN */
- if (ssid->mode == WPAS_MODE_AP || ssid->mode == WPAS_MODE_P2P_GO ||
- ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION) {
- #ifdef CONFIG_AP
- if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_AP)) {
- wpa_msg(wpa_s, MSG_INFO, "Driver does not support AP "
- "mode");
- return;
- }
- if (wpa_supplicant_create_ap(wpa_s, ssid) < 0) {
- wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
- if (ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION)
- wpas_p2p_ap_setup_failed(wpa_s);
- return;
- }
- wpa_s->current_bss = bss;
- #else /* CONFIG_AP */
- wpa_msg(wpa_s, MSG_ERROR, "AP mode support not included in "
- "the build");
- #endif /* CONFIG_AP */
- return;
- }
- if (ssid->mode == WPAS_MODE_MESH) {
- #ifdef CONFIG_MESH
- if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_MESH)) {
- wpa_msg(wpa_s, MSG_INFO,
- "Driver does not support mesh mode");
- return;
- }
- if (bss)
- ssid->frequency = bss->freq;
- if (wpa_supplicant_join_mesh(wpa_s, ssid) < 0) {
- wpa_msg(wpa_s, MSG_ERROR, "Could not join mesh");
- return;
- }
- wpa_s->current_bss = bss;
- wpa_msg(wpa_s, MSG_INFO, MESH_GROUP_STARTED "ssid=\"%s\" id=%d",
- wpa_ssid_txt(ssid->ssid, ssid->ssid_len),
- ssid->id);
- wpas_notify_mesh_group_started(wpa_s, ssid);
- #else /* CONFIG_MESH */
- wpa_msg(wpa_s, MSG_ERROR,
- "mesh mode support not included in the build");
- #endif /* CONFIG_MESH */
- return;
- }
- /*
- * Set WPA state machine configuration to match the selected network now
- * so that the information is available before wpas_start_assoc_cb()
- * gets called. This is needed at least for RSN pre-authentication where
- * candidate APs are added to a list based on scan result processing
- * before completion of the first association.
- */
- wpa_supplicant_rsn_supp_set_config(wpa_s, ssid);
- #ifdef CONFIG_DPP
- if (wpas_dpp_check_connect(wpa_s, ssid, bss) != 0)
- return;
- #endif /* CONFIG_DPP */
- #ifdef CONFIG_TDLS
- if (bss)
- wpa_tdls_ap_ies(wpa_s->wpa, (const u8 *) (bss + 1),
- bss->ie_len);
- #endif /* CONFIG_TDLS */
- if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
- ssid->mode == IEEE80211_MODE_INFRA) {
- sme_authenticate(wpa_s, bss, ssid);
- return;
- }
- if (wpa_s->connect_work) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Reject wpa_supplicant_associate() call since connect_work exist");
- return;
- }
- if (radio_work_pending(wpa_s, "connect")) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Reject wpa_supplicant_associate() call since pending work exist");
- return;
- }
- #ifdef CONFIG_SME
- if (ssid->mode == WPAS_MODE_IBSS || ssid->mode == WPAS_MODE_MESH) {
- /* Clear possibly set auth_alg, if any, from last attempt. */
- wpa_s->sme.auth_alg = WPA_AUTH_ALG_OPEN;
- }
- #endif /* CONFIG_SME */
- wpas_abort_ongoing_scan(wpa_s);
- cwork = os_zalloc(sizeof(*cwork));
- if (cwork == NULL)
- return;
- cwork->bss = bss;
- cwork->ssid = ssid;
- if (radio_add_work(wpa_s, bss ? bss->freq : 0, "connect", 1,
- wpas_start_assoc_cb, cwork) < 0) {
- os_free(cwork);
- }
- }
- static int bss_is_ibss(struct wpa_bss *bss)
- {
- return (bss->caps & (IEEE80211_CAP_ESS | IEEE80211_CAP_IBSS)) ==
- IEEE80211_CAP_IBSS;
- }
- static int drv_supports_vht(struct wpa_supplicant *wpa_s,
- const struct wpa_ssid *ssid)
- {
- enum hostapd_hw_mode hw_mode;
- struct hostapd_hw_modes *mode = NULL;
- u8 channel;
- int i;
- hw_mode = ieee80211_freq_to_chan(ssid->frequency, &channel);
- if (hw_mode == NUM_HOSTAPD_MODES)
- return 0;
- for (i = 0; wpa_s->hw.modes && i < wpa_s->hw.num_modes; i++) {
- if (wpa_s->hw.modes[i].mode == hw_mode) {
- mode = &wpa_s->hw.modes[i];
- break;
- }
- }
- if (!mode)
- return 0;
- return mode->vht_capab != 0;
- }
- void ibss_mesh_setup_freq(struct wpa_supplicant *wpa_s,
- const struct wpa_ssid *ssid,
- struct hostapd_freq_params *freq)
- {
- enum hostapd_hw_mode hw_mode;
- struct hostapd_hw_modes *mode = NULL;
- int ht40plus[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157,
- 184, 192 };
- int vht80[] = { 36, 52, 100, 116, 132, 149 };
- struct hostapd_channel_data *pri_chan = NULL, *sec_chan = NULL;
- u8 channel;
- int i, chan_idx, ht40 = -1, res, obss_scan = 1;
- unsigned int j, k;
- struct hostapd_freq_params vht_freq;
- int chwidth, seg0, seg1;
- u32 vht_caps = 0;
- freq->freq = ssid->frequency;
- for (j = 0; j < wpa_s->last_scan_res_used; j++) {
- struct wpa_bss *bss = wpa_s->last_scan_res[j];
- if (ssid->mode != WPAS_MODE_IBSS)
- break;
- /* Don't adjust control freq in case of fixed_freq */
- if (ssid->fixed_freq)
- break;
- if (!bss_is_ibss(bss))
- continue;
- if (ssid->ssid_len == bss->ssid_len &&
- os_memcmp(ssid->ssid, bss->ssid, bss->ssid_len) == 0) {
- wpa_printf(MSG_DEBUG,
- "IBSS already found in scan results, adjust control freq: %d",
- bss->freq);
- freq->freq = bss->freq;
- obss_scan = 0;
- break;
- }
- }
- /* For IBSS check HT_IBSS flag */
- if (ssid->mode == WPAS_MODE_IBSS &&
- !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_HT_IBSS))
- return;
- if (wpa_s->group_cipher == WPA_CIPHER_WEP40 ||
- wpa_s->group_cipher == WPA_CIPHER_WEP104 ||
- wpa_s->pairwise_cipher == WPA_CIPHER_TKIP) {
- wpa_printf(MSG_DEBUG,
- "IBSS: WEP/TKIP detected, do not try to enable HT");
- return;
- }
- hw_mode = ieee80211_freq_to_chan(freq->freq, &channel);
- for (i = 0; wpa_s->hw.modes && i < wpa_s->hw.num_modes; i++) {
- if (wpa_s->hw.modes[i].mode == hw_mode) {
- mode = &wpa_s->hw.modes[i];
- break;
- }
- }
- if (!mode)
- return;
- #ifdef CONFIG_HT_OVERRIDES
- if (ssid->disable_ht) {
- freq->ht_enabled = 0;
- return;
- }
- #endif /* CONFIG_HT_OVERRIDES */
- freq->ht_enabled = ht_supported(mode);
- if (!freq->ht_enabled)
- return;
- /* Setup higher BW only for 5 GHz */
- if (mode->mode != HOSTAPD_MODE_IEEE80211A)
- return;
- for (chan_idx = 0; chan_idx < mode->num_channels; chan_idx++) {
- pri_chan = &mode->channels[chan_idx];
- if (pri_chan->chan == channel)
- break;
- pri_chan = NULL;
- }
- if (!pri_chan)
- return;
- /* Check primary channel flags */
- if (pri_chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
- return;
- #ifdef CONFIG_HT_OVERRIDES
- if (ssid->disable_ht40)
- return;
- #endif /* CONFIG_HT_OVERRIDES */
- /* Check/setup HT40+/HT40- */
- for (j = 0; j < ARRAY_SIZE(ht40plus); j++) {
- if (ht40plus[j] == channel) {
- ht40 = 1;
- break;
- }
- }
- /* Find secondary channel */
- for (i = 0; i < mode->num_channels; i++) {
- sec_chan = &mode->channels[i];
- if (sec_chan->chan == channel + ht40 * 4)
- break;
- sec_chan = NULL;
- }
- if (!sec_chan)
- return;
- /* Check secondary channel flags */
- if (sec_chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
- return;
- freq->channel = pri_chan->chan;
- if (ht40 == -1) {
- if (!(pri_chan->flag & HOSTAPD_CHAN_HT40MINUS))
- return;
- } else {
- if (!(pri_chan->flag & HOSTAPD_CHAN_HT40PLUS))
- return;
- }
- freq->sec_channel_offset = ht40;
- if (obss_scan) {
- struct wpa_scan_results *scan_res;
- scan_res = wpa_supplicant_get_scan_results(wpa_s, NULL, 0);
- if (scan_res == NULL) {
- /* Back to HT20 */
- freq->sec_channel_offset = 0;
- return;
- }
- res = check_40mhz_5g(mode, scan_res, pri_chan->chan,
- sec_chan->chan);
- switch (res) {
- case 0:
- /* Back to HT20 */
- freq->sec_channel_offset = 0;
- break;
- case 1:
- /* Configuration allowed */
- break;
- case 2:
- /* Switch pri/sec channels */
- freq->freq = hw_get_freq(mode, sec_chan->chan);
- freq->sec_channel_offset = -freq->sec_channel_offset;
- freq->channel = sec_chan->chan;
- break;
- default:
- freq->sec_channel_offset = 0;
- break;
- }
- wpa_scan_results_free(scan_res);
- }
- wpa_printf(MSG_DEBUG,
- "IBSS/mesh: setup freq channel %d, sec_channel_offset %d",
- freq->channel, freq->sec_channel_offset);
- if (!drv_supports_vht(wpa_s, ssid))
- return;
- /* For IBSS check VHT_IBSS flag */
- if (ssid->mode == WPAS_MODE_IBSS &&
- !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_VHT_IBSS))
- return;
- vht_freq = *freq;
- #ifdef CONFIG_VHT_OVERRIDES
- if (ssid->disable_vht) {
- freq->vht_enabled = 0;
- return;
- }
- #endif /* CONFIG_VHT_OVERRIDES */
- vht_freq.vht_enabled = vht_supported(mode);
- if (!vht_freq.vht_enabled)
- return;
- /* setup center_freq1, bandwidth */
- for (j = 0; j < ARRAY_SIZE(vht80); j++) {
- if (freq->channel >= vht80[j] &&
- freq->channel < vht80[j] + 16)
- break;
- }
- if (j == ARRAY_SIZE(vht80))
- return;
- for (i = vht80[j]; i < vht80[j] + 16; i += 4) {
- struct hostapd_channel_data *chan;
- chan = hw_get_channel_chan(mode, i, NULL);
- if (!chan)
- return;
- /* Back to HT configuration if channel not usable */
- if (chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
- return;
- }
- chwidth = VHT_CHANWIDTH_80MHZ;
- seg0 = vht80[j] + 6;
- seg1 = 0;
- if (ssid->max_oper_chwidth == VHT_CHANWIDTH_80P80MHZ) {
- /* setup center_freq2, bandwidth */
- for (k = 0; k < ARRAY_SIZE(vht80); k++) {
- /* Only accept 80 MHz segments separated by a gap */
- if (j == k || abs(vht80[j] - vht80[k]) == 16)
- continue;
- for (i = vht80[k]; i < vht80[k] + 16; i += 4) {
- struct hostapd_channel_data *chan;
- chan = hw_get_channel_chan(mode, i, NULL);
- if (!chan)
- continue;
- if (chan->flag & (HOSTAPD_CHAN_DISABLED |
- HOSTAPD_CHAN_NO_IR |
- HOSTAPD_CHAN_RADAR))
- continue;
- /* Found a suitable second segment for 80+80 */
- chwidth = VHT_CHANWIDTH_80P80MHZ;
- vht_caps |=
- VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ;
- seg1 = vht80[k] + 6;
- }
- if (chwidth == VHT_CHANWIDTH_80P80MHZ)
- break;
- }
- } else if (ssid->max_oper_chwidth == VHT_CHANWIDTH_160MHZ) {
- if (freq->freq == 5180) {
- chwidth = VHT_CHANWIDTH_160MHZ;
- vht_caps |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
- seg0 = 50;
- } else if (freq->freq == 5520) {
- chwidth = VHT_CHANWIDTH_160MHZ;
- vht_caps |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
- seg0 = 114;
- }
- }
- if (hostapd_set_freq_params(&vht_freq, mode->mode, freq->freq,
- freq->channel, freq->ht_enabled,
- vht_freq.vht_enabled,
- freq->sec_channel_offset,
- chwidth, seg0, seg1, vht_caps) != 0)
- return;
- *freq = vht_freq;
- wpa_printf(MSG_DEBUG, "IBSS: VHT setup freq cf1 %d, cf2 %d, bw %d",
- freq->center_freq1, freq->center_freq2, freq->bandwidth);
- }
- #ifdef CONFIG_FILS
- static size_t wpas_add_fils_hlp_req(struct wpa_supplicant *wpa_s, u8 *ie_buf,
- size_t ie_buf_len)
- {
- struct fils_hlp_req *req;
- size_t rem_len, hdr_len, hlp_len, len, ie_len = 0;
- const u8 *pos;
- u8 *buf = ie_buf;
- dl_list_for_each(req, &wpa_s->fils_hlp_req, struct fils_hlp_req,
- list) {
- rem_len = ie_buf_len - ie_len;
- pos = wpabuf_head(req->pkt);
- hdr_len = 1 + 2 * ETH_ALEN + 6;
- hlp_len = wpabuf_len(req->pkt);
- if (rem_len < 2 + hdr_len + hlp_len) {
- wpa_printf(MSG_ERROR,
- "FILS: Cannot fit HLP - rem_len=%lu to_fill=%lu",
- (unsigned long) rem_len,
- (unsigned long) (2 + hdr_len + hlp_len));
- break;
- }
- len = (hdr_len + hlp_len) > 255 ? 255 : hdr_len + hlp_len;
- /* Element ID */
- *buf++ = WLAN_EID_EXTENSION;
- /* Length */
- *buf++ = len;
- /* Element ID Extension */
- *buf++ = WLAN_EID_EXT_FILS_HLP_CONTAINER;
- /* Destination MAC address */
- os_memcpy(buf, req->dst, ETH_ALEN);
- buf += ETH_ALEN;
- /* Source MAC address */
- os_memcpy(buf, wpa_s->own_addr, ETH_ALEN);
- buf += ETH_ALEN;
- /* LLC/SNAP Header */
- os_memcpy(buf, "\xaa\xaa\x03\x00\x00\x00", 6);
- buf += 6;
- /* HLP Packet */
- os_memcpy(buf, pos, len - hdr_len);
- buf += len - hdr_len;
- pos += len - hdr_len;
- hlp_len -= len - hdr_len;
- ie_len += 2 + len;
- rem_len -= 2 + len;
- while (hlp_len) {
- len = (hlp_len > 255) ? 255 : hlp_len;
- if (rem_len < 2 + len)
- break;
- *buf++ = WLAN_EID_FRAGMENT;
- *buf++ = len;
- os_memcpy(buf, pos, len);
- buf += len;
- pos += len;
- hlp_len -= len;
- ie_len += 2 + len;
- rem_len -= 2 + len;
- }
- }
- return ie_len;
- }
- #endif /* CONFIG_FILS */
- static u8 * wpas_populate_assoc_ies(
- struct wpa_supplicant *wpa_s,
- struct wpa_bss *bss, struct wpa_ssid *ssid,
- struct wpa_driver_associate_params *params,
- enum wpa_drv_update_connect_params_mask *mask)
- {
- u8 *wpa_ie;
- size_t max_wpa_ie_len = 500;
- size_t wpa_ie_len;
- int algs = WPA_AUTH_ALG_OPEN;
- #ifdef CONFIG_FILS
- const u8 *realm, *username, *rrk;
- size_t realm_len, username_len, rrk_len;
- u16 next_seq_num;
- struct fils_hlp_req *req;
- dl_list_for_each(req, &wpa_s->fils_hlp_req, struct fils_hlp_req,
- list) {
- max_wpa_ie_len += 3 + 2 * ETH_ALEN + 6 + wpabuf_len(req->pkt) +
- 2 + 2 * wpabuf_len(req->pkt) / 255;
- }
- #endif /* CONFIG_FILS */
- wpa_ie = os_malloc(max_wpa_ie_len);
- if (!wpa_ie) {
- wpa_printf(MSG_ERROR,
- "Failed to allocate connect IE buffer for %lu bytes",
- (unsigned long) max_wpa_ie_len);
- return NULL;
- }
- if (bss && (wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) ||
- wpa_bss_get_ie(bss, WLAN_EID_RSN)) &&
- wpa_key_mgmt_wpa(ssid->key_mgmt)) {
- int try_opportunistic;
- const u8 *cache_id = NULL;
- try_opportunistic = (ssid->proactive_key_caching < 0 ?
- wpa_s->conf->okc :
- ssid->proactive_key_caching) &&
- (ssid->proto & WPA_PROTO_RSN);
- #ifdef CONFIG_FILS
- if (wpa_key_mgmt_fils(ssid->key_mgmt))
- cache_id = wpa_bss_get_fils_cache_id(bss);
- #endif /* CONFIG_FILS */
- if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
- ssid, try_opportunistic,
- cache_id) == 0)
- eapol_sm_notify_pmkid_attempt(wpa_s->eapol);
- wpa_ie_len = max_wpa_ie_len;
- if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
- wpa_ie, &wpa_ie_len)) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to set WPA "
- "key management and encryption suites");
- os_free(wpa_ie);
- return NULL;
- }
- } else if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) && bss &&
- wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt)) {
- /*
- * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
- * use non-WPA since the scan results did not indicate that the
- * AP is using WPA or WPA2.
- */
- wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
- wpa_ie_len = 0;
- wpa_s->wpa_proto = 0;
- } else if (wpa_key_mgmt_wpa_any(ssid->key_mgmt)) {
- wpa_ie_len = max_wpa_ie_len;
- if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
- wpa_ie, &wpa_ie_len)) {
- wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to set WPA "
- "key management and encryption suites (no "
- "scan results)");
- os_free(wpa_ie);
- return NULL;
- }
- #ifdef CONFIG_WPS
- } else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) {
- struct wpabuf *wps_ie;
- wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid));
- if (wps_ie && wpabuf_len(wps_ie) <= max_wpa_ie_len) {
- wpa_ie_len = wpabuf_len(wps_ie);
- os_memcpy(wpa_ie, wpabuf_head(wps_ie), wpa_ie_len);
- } else
- wpa_ie_len = 0;
- wpabuf_free(wps_ie);
- wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
- if (!bss || (bss->caps & IEEE80211_CAP_PRIVACY))
- params->wps = WPS_MODE_PRIVACY;
- else
- params->wps = WPS_MODE_OPEN;
- wpa_s->wpa_proto = 0;
- #endif /* CONFIG_WPS */
- } else {
- wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
- wpa_ie_len = 0;
- wpa_s->wpa_proto = 0;
- }
- #ifdef IEEE8021X_EAPOL
- if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
- if (ssid->leap) {
- if (ssid->non_leap == 0)
- algs = WPA_AUTH_ALG_LEAP;
- else
- algs |= WPA_AUTH_ALG_LEAP;
- }
- }
- #ifdef CONFIG_FILS
- /* Clear FILS association */
- wpa_sm_set_reset_fils_completed(wpa_s->wpa, 0);
- if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_FILS_SK_OFFLOAD) &&
- ssid->eap.erp && wpa_key_mgmt_fils(wpa_s->key_mgmt) &&
- eapol_sm_get_erp_info(wpa_s->eapol, &ssid->eap, &username,
- &username_len, &realm, &realm_len,
- &next_seq_num, &rrk, &rrk_len) == 0) {
- algs = WPA_AUTH_ALG_FILS;
- params->fils_erp_username = username;
- params->fils_erp_username_len = username_len;
- params->fils_erp_realm = realm;
- params->fils_erp_realm_len = realm_len;
- params->fils_erp_next_seq_num = next_seq_num;
- params->fils_erp_rrk = rrk;
- params->fils_erp_rrk_len = rrk_len;
- if (mask)
- *mask |= WPA_DRV_UPDATE_FILS_ERP_INFO;
- }
- #endif /* CONFIG_FILS */
- #endif /* IEEE8021X_EAPOL */
- #ifdef CONFIG_SAE
- if (wpa_s->key_mgmt & (WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_FT_SAE))
- algs = WPA_AUTH_ALG_SAE;
- #endif /* CONFIG_SAE */
- wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs);
- if (ssid->auth_alg) {
- algs = ssid->auth_alg;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Overriding auth_alg selection: 0x%x", algs);
- }
- #ifdef CONFIG_P2P
- if (wpa_s->global->p2p) {
- u8 *pos;
- size_t len;
- int res;
- pos = wpa_ie + wpa_ie_len;
- len = max_wpa_ie_len - wpa_ie_len;
- res = wpas_p2p_assoc_req_ie(wpa_s, bss, pos, len,
- ssid->p2p_group);
- if (res >= 0)
- wpa_ie_len += res;
- }
- wpa_s->cross_connect_disallowed = 0;
- if (bss) {
- struct wpabuf *p2p;
- p2p = wpa_bss_get_vendor_ie_multi(bss, P2P_IE_VENDOR_TYPE);
- if (p2p) {
- wpa_s->cross_connect_disallowed =
- p2p_get_cross_connect_disallowed(p2p);
- wpabuf_free(p2p);
- wpa_dbg(wpa_s, MSG_DEBUG, "P2P: WLAN AP %s cross "
- "connection",
- wpa_s->cross_connect_disallowed ?
- "disallows" : "allows");
- }
- }
- os_memset(wpa_s->p2p_ip_addr_info, 0, sizeof(wpa_s->p2p_ip_addr_info));
- #endif /* CONFIG_P2P */
- if (bss) {
- wpa_ie_len += wpas_supp_op_class_ie(wpa_s, bss->freq,
- wpa_ie + wpa_ie_len,
- max_wpa_ie_len -
- wpa_ie_len);
- }
- /*
- * Workaround: Add Extended Capabilities element only if the AP
- * included this element in Beacon/Probe Response frames. Some older
- * APs seem to have interoperability issues if this element is
- * included, so while the standard may require us to include the
- * element in all cases, it is justifiable to skip it to avoid
- * interoperability issues.
- */
- if (ssid->p2p_group)
- wpa_drv_get_ext_capa(wpa_s, WPA_IF_P2P_CLIENT);
- else
- wpa_drv_get_ext_capa(wpa_s, WPA_IF_STATION);
- if (!bss || wpa_bss_get_ie(bss, WLAN_EID_EXT_CAPAB)) {
- u8 ext_capab[18];
- int ext_capab_len;
- ext_capab_len = wpas_build_ext_capab(wpa_s, ext_capab,
- sizeof(ext_capab));
- if (ext_capab_len > 0 &&
- wpa_ie_len + ext_capab_len <= max_wpa_ie_len) {
- u8 *pos = wpa_ie;
- if (wpa_ie_len > 0 && pos[0] == WLAN_EID_RSN)
- pos += 2 + pos[1];
- os_memmove(pos + ext_capab_len, pos,
- wpa_ie_len - (pos - wpa_ie));
- wpa_ie_len += ext_capab_len;
- os_memcpy(pos, ext_capab, ext_capab_len);
- }
- }
- #ifdef CONFIG_HS20
- if (is_hs20_network(wpa_s, ssid, bss)) {
- struct wpabuf *hs20;
- hs20 = wpabuf_alloc(20);
- if (hs20) {
- int pps_mo_id = hs20_get_pps_mo_id(wpa_s, ssid);
- size_t len;
- wpas_hs20_add_indication(hs20, pps_mo_id);
- len = max_wpa_ie_len - wpa_ie_len;
- if (wpabuf_len(hs20) <= len) {
- os_memcpy(wpa_ie + wpa_ie_len,
- wpabuf_head(hs20), wpabuf_len(hs20));
- wpa_ie_len += wpabuf_len(hs20);
- }
- wpabuf_free(hs20);
- hs20_configure_frame_filters(wpa_s);
- }
- }
- #endif /* CONFIG_HS20 */
- if (wpa_s->vendor_elem[VENDOR_ELEM_ASSOC_REQ]) {
- struct wpabuf *buf = wpa_s->vendor_elem[VENDOR_ELEM_ASSOC_REQ];
- size_t len;
- len = max_wpa_ie_len - wpa_ie_len;
- if (wpabuf_len(buf) <= len) {
- os_memcpy(wpa_ie + wpa_ie_len,
- wpabuf_head(buf), wpabuf_len(buf));
- wpa_ie_len += wpabuf_len(buf);
- }
- }
- #ifdef CONFIG_FST
- if (wpa_s->fst_ies) {
- int fst_ies_len = wpabuf_len(wpa_s->fst_ies);
- if (wpa_ie_len + fst_ies_len <= max_wpa_ie_len) {
- os_memcpy(wpa_ie + wpa_ie_len,
- wpabuf_head(wpa_s->fst_ies), fst_ies_len);
- wpa_ie_len += fst_ies_len;
- }
- }
- #endif /* CONFIG_FST */
- #ifdef CONFIG_MBO
- if (bss && wpa_bss_get_vendor_ie(bss, MBO_IE_VENDOR_TYPE)) {
- int len;
- len = wpas_mbo_ie(wpa_s, wpa_ie + wpa_ie_len,
- max_wpa_ie_len - wpa_ie_len);
- if (len >= 0)
- wpa_ie_len += len;
- }
- #endif /* CONFIG_MBO */
- #ifdef CONFIG_FILS
- if (algs == WPA_AUTH_ALG_FILS) {
- size_t len;
- len = wpas_add_fils_hlp_req(wpa_s, wpa_ie + wpa_ie_len,
- max_wpa_ie_len - wpa_ie_len);
- wpa_ie_len += len;
- }
- #endif /* CONFIG_FILS */
- #ifdef CONFIG_OWE
- #ifdef CONFIG_TESTING_OPTIONS
- if (get_ie_ext(wpa_ie, wpa_ie_len, WLAN_EID_EXT_OWE_DH_PARAM)) {
- wpa_printf(MSG_INFO, "TESTING: Override OWE DH element");
- } else
- #endif /* CONFIG_TESTING_OPTIONS */
- if (algs == WPA_AUTH_ALG_OPEN &&
- ssid->key_mgmt == WPA_KEY_MGMT_OWE) {
- struct wpabuf *owe_ie;
- u16 group;
- if (ssid->owe_group) {
- group = ssid->owe_group;
- } else {
- if (wpa_s->last_owe_group == 19)
- group = 20;
- else if (wpa_s->last_owe_group == 20)
- group = 21;
- else
- group = OWE_DH_GROUP;
- }
- wpa_s->last_owe_group = group;
- wpa_printf(MSG_DEBUG, "OWE: Try to use group %u", group);
- owe_ie = owe_build_assoc_req(wpa_s->wpa, group);
- if (owe_ie &&
- wpabuf_len(owe_ie) <= max_wpa_ie_len - wpa_ie_len) {
- os_memcpy(wpa_ie + wpa_ie_len,
- wpabuf_head(owe_ie), wpabuf_len(owe_ie));
- wpa_ie_len += wpabuf_len(owe_ie);
- wpabuf_free(owe_ie);
- }
- }
- #endif /* CONFIG_OWE */
- params->wpa_ie = wpa_ie;
- params->wpa_ie_len = wpa_ie_len;
- params->auth_alg = algs;
- if (mask)
- *mask |= WPA_DRV_UPDATE_ASSOC_IES | WPA_DRV_UPDATE_AUTH_TYPE;
- return wpa_ie;
- }
- #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
- static void wpas_update_fils_connect_params(struct wpa_supplicant *wpa_s)
- {
- struct wpa_driver_associate_params params;
- enum wpa_drv_update_connect_params_mask mask = 0;
- u8 *wpa_ie;
- if (wpa_s->auth_alg != WPA_AUTH_ALG_OPEN)
- return; /* nothing to do */
- os_memset(¶ms, 0, sizeof(params));
- wpa_ie = wpas_populate_assoc_ies(wpa_s, wpa_s->current_bss,
- wpa_s->current_ssid, ¶ms, &mask);
- if (!wpa_ie)
- return;
- if (params.auth_alg != WPA_AUTH_ALG_FILS) {
- os_free(wpa_ie);
- return;
- }
- wpa_s->auth_alg = params.auth_alg;
- wpa_drv_update_connect_params(wpa_s, ¶ms, mask);
- os_free(wpa_ie);
- }
- #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
- static void wpas_start_assoc_cb(struct wpa_radio_work *work, int deinit)
- {
- struct wpa_connect_work *cwork = work->ctx;
- struct wpa_bss *bss = cwork->bss;
- struct wpa_ssid *ssid = cwork->ssid;
- struct wpa_supplicant *wpa_s = work->wpa_s;
- u8 *wpa_ie;
- int use_crypt, ret, i, bssid_changed;
- unsigned int cipher_pairwise, cipher_group, cipher_group_mgmt;
- struct wpa_driver_associate_params params;
- int wep_keys_set = 0;
- int assoc_failed = 0;
- struct wpa_ssid *old_ssid;
- u8 prev_bssid[ETH_ALEN];
- #ifdef CONFIG_HT_OVERRIDES
- struct ieee80211_ht_capabilities htcaps;
- struct ieee80211_ht_capabilities htcaps_mask;
- #endif /* CONFIG_HT_OVERRIDES */
- #ifdef CONFIG_VHT_OVERRIDES
- struct ieee80211_vht_capabilities vhtcaps;
- struct ieee80211_vht_capabilities vhtcaps_mask;
- #endif /* CONFIG_VHT_OVERRIDES */
- if (deinit) {
- if (work->started) {
- wpa_s->connect_work = NULL;
- /* cancel possible auth. timeout */
- eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s,
- NULL);
- }
- wpas_connect_work_free(cwork);
- return;
- }
- wpa_s->connect_work = work;
- if (cwork->bss_removed || !wpas_valid_bss_ssid(wpa_s, bss, ssid) ||
- wpas_network_disabled(wpa_s, ssid)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "BSS/SSID entry for association not valid anymore - drop connection attempt");
- wpas_connect_work_done(wpa_s);
- return;
- }
- os_memcpy(prev_bssid, wpa_s->bssid, ETH_ALEN);
- os_memset(¶ms, 0, sizeof(params));
- wpa_s->reassociate = 0;
- wpa_s->eap_expected_failure = 0;
- if (bss &&
- (!wpas_driver_bss_selection(wpa_s) || wpas_wps_searching(wpa_s))) {
- #ifdef CONFIG_IEEE80211R
- const u8 *ie, *md = NULL;
- #endif /* CONFIG_IEEE80211R */
- wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR
- " (SSID='%s' freq=%d MHz)", MAC2STR(bss->bssid),
- wpa_ssid_txt(bss->ssid, bss->ssid_len), bss->freq);
- bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
- os_memset(wpa_s->bssid, 0, ETH_ALEN);
- os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
- if (bssid_changed)
- wpas_notify_bssid_changed(wpa_s);
- #ifdef CONFIG_IEEE80211R
- ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
- if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
- md = ie + 2;
- wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
- if (md) {
- /* Prepare for the next transition */
- wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
- }
- #endif /* CONFIG_IEEE80211R */
- #ifdef CONFIG_WPS
- } else if ((ssid->ssid == NULL || ssid->ssid_len == 0) &&
- wpa_s->conf->ap_scan == 2 &&
- (ssid->key_mgmt & WPA_KEY_MGMT_WPS)) {
- /* Use ap_scan==1 style network selection to find the network
- */
- wpas_connect_work_done(wpa_s);
- wpa_s->scan_req = MANUAL_SCAN_REQ;
- wpa_s->reassociate = 1;
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- return;
- #endif /* CONFIG_WPS */
- } else {
- wpa_msg(wpa_s, MSG_INFO, "Trying to associate with SSID '%s'",
- wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
- if (bss)
- os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
- else
- os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
- }
- if (!wpa_s->pno)
- wpa_supplicant_cancel_sched_scan(wpa_s);
- wpa_supplicant_cancel_scan(wpa_s);
- /* Starting new association, so clear the possibly used WPA IE from the
- * previous association. */
- wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
- wpa_ie = wpas_populate_assoc_ies(wpa_s, bss, ssid, ¶ms, NULL);
- if (!wpa_ie) {
- wpas_connect_work_done(wpa_s);
- return;
- }
- wpa_clear_keys(wpa_s, bss ? bss->bssid : NULL);
- use_crypt = 1;
- cipher_pairwise = wpa_s->pairwise_cipher;
- cipher_group = wpa_s->group_cipher;
- cipher_group_mgmt = wpa_s->mgmt_group_cipher;
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE)
- use_crypt = 0;
- if (wpa_set_wep_keys(wpa_s, ssid)) {
- use_crypt = 1;
- wep_keys_set = 1;
- }
- }
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPS)
- use_crypt = 0;
- #ifdef IEEE8021X_EAPOL
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
- if ((ssid->eapol_flags &
- (EAPOL_FLAG_REQUIRE_KEY_UNICAST |
- EAPOL_FLAG_REQUIRE_KEY_BROADCAST)) == 0 &&
- !wep_keys_set) {
- use_crypt = 0;
- } else {
- /* Assume that dynamic WEP-104 keys will be used and
- * set cipher suites in order for drivers to expect
- * encryption. */
- cipher_pairwise = cipher_group = WPA_CIPHER_WEP104;
- }
- }
- #endif /* IEEE8021X_EAPOL */
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
- /* Set the key before (and later after) association */
- wpa_supplicant_set_wpa_none_key(wpa_s, ssid);
- }
- wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING);
- if (bss) {
- params.ssid = bss->ssid;
- params.ssid_len = bss->ssid_len;
- if (!wpas_driver_bss_selection(wpa_s) || ssid->bssid_set ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
- wpa_printf(MSG_DEBUG, "Limit connection to BSSID "
- MACSTR " freq=%u MHz based on scan results "
- "(bssid_set=%d wps=%d)",
- MAC2STR(bss->bssid), bss->freq,
- ssid->bssid_set,
- wpa_s->key_mgmt == WPA_KEY_MGMT_WPS);
- params.bssid = bss->bssid;
- params.freq.freq = bss->freq;
- }
- params.bssid_hint = bss->bssid;
- params.freq_hint = bss->freq;
- params.pbss = bss_is_pbss(bss);
- } else {
- if (ssid->bssid_hint_set)
- params.bssid_hint = ssid->bssid_hint;
- params.ssid = ssid->ssid;
- params.ssid_len = ssid->ssid_len;
- params.pbss = (ssid->pbss != 2) ? ssid->pbss : 0;
- }
- if (ssid->mode == WPAS_MODE_IBSS && ssid->bssid_set &&
- wpa_s->conf->ap_scan == 2) {
- params.bssid = ssid->bssid;
- params.fixed_bssid = 1;
- }
- /* Initial frequency for IBSS/mesh */
- if ((ssid->mode == WPAS_MODE_IBSS || ssid->mode == WPAS_MODE_MESH) &&
- ssid->frequency > 0 && params.freq.freq == 0)
- ibss_mesh_setup_freq(wpa_s, ssid, ¶ms.freq);
- if (ssid->mode == WPAS_MODE_IBSS) {
- params.fixed_freq = ssid->fixed_freq;
- if (ssid->beacon_int)
- params.beacon_int = ssid->beacon_int;
- else
- params.beacon_int = wpa_s->conf->beacon_int;
- }
- params.pairwise_suite = cipher_pairwise;
- params.group_suite = cipher_group;
- params.mgmt_group_suite = cipher_group_mgmt;
- params.key_mgmt_suite = wpa_s->key_mgmt;
- params.wpa_proto = wpa_s->wpa_proto;
- wpa_s->auth_alg = params.auth_alg;
- params.mode = ssid->mode;
- params.bg_scan_period = ssid->bg_scan_period;
- for (i = 0; i < NUM_WEP_KEYS; i++) {
- if (ssid->wep_key_len[i])
- params.wep_key[i] = ssid->wep_key[i];
- params.wep_key_len[i] = ssid->wep_key_len[i];
- }
- params.wep_tx_keyidx = ssid->wep_tx_keyidx;
- if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE) &&
- (params.key_mgmt_suite == WPA_KEY_MGMT_PSK ||
- params.key_mgmt_suite == WPA_KEY_MGMT_FT_PSK)) {
- params.passphrase = ssid->passphrase;
- if (ssid->psk_set)
- params.psk = ssid->psk;
- }
- if (wpa_s->conf->key_mgmt_offload) {
- if (params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
- params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
- params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
- params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
- params.req_key_mgmt_offload =
- ssid->proactive_key_caching < 0 ?
- wpa_s->conf->okc : ssid->proactive_key_caching;
- else
- params.req_key_mgmt_offload = 1;
- if ((params.key_mgmt_suite == WPA_KEY_MGMT_PSK ||
- params.key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
- params.key_mgmt_suite == WPA_KEY_MGMT_FT_PSK) &&
- ssid->psk_set)
- params.psk = ssid->psk;
- }
- params.drop_unencrypted = use_crypt;
- #ifdef CONFIG_IEEE80211W
- params.mgmt_frame_protection = wpas_get_ssid_pmf(wpa_s, ssid);
- if (params.mgmt_frame_protection != NO_MGMT_FRAME_PROTECTION && bss) {
- const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
- struct wpa_ie_data ie;
- if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ie) == 0 &&
- ie.capabilities &
- (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected AP supports "
- "MFP: require MFP");
- params.mgmt_frame_protection =
- MGMT_FRAME_PROTECTION_REQUIRED;
- }
- }
- #endif /* CONFIG_IEEE80211W */
- params.p2p = ssid->p2p_group;
- if (wpa_s->p2pdev->set_sta_uapsd)
- params.uapsd = wpa_s->p2pdev->sta_uapsd;
- else
- params.uapsd = -1;
- #ifdef CONFIG_HT_OVERRIDES
- os_memset(&htcaps, 0, sizeof(htcaps));
- os_memset(&htcaps_mask, 0, sizeof(htcaps_mask));
- params.htcaps = (u8 *) &htcaps;
- params.htcaps_mask = (u8 *) &htcaps_mask;
- wpa_supplicant_apply_ht_overrides(wpa_s, ssid, ¶ms);
- #endif /* CONFIG_HT_OVERRIDES */
- #ifdef CONFIG_VHT_OVERRIDES
- os_memset(&vhtcaps, 0, sizeof(vhtcaps));
- os_memset(&vhtcaps_mask, 0, sizeof(vhtcaps_mask));
- params.vhtcaps = &vhtcaps;
- params.vhtcaps_mask = &vhtcaps_mask;
- wpa_supplicant_apply_vht_overrides(wpa_s, ssid, ¶ms);
- #endif /* CONFIG_VHT_OVERRIDES */
- #ifdef CONFIG_P2P
- /*
- * If multi-channel concurrency is not supported, check for any
- * frequency conflict. In case of any frequency conflict, remove the
- * least prioritized connection.
- */
- if (wpa_s->num_multichan_concurrent < 2) {
- int freq, num;
- num = get_shared_radio_freqs(wpa_s, &freq, 1);
- if (num > 0 && freq > 0 && freq != params.freq.freq) {
- wpa_printf(MSG_DEBUG,
- "Assoc conflicting freq found (%d != %d)",
- freq, params.freq.freq);
- if (wpas_p2p_handle_frequency_conflicts(
- wpa_s, params.freq.freq, ssid) < 0) {
- wpas_connect_work_done(wpa_s);
- os_free(wpa_ie);
- return;
- }
- }
- }
- #endif /* CONFIG_P2P */
- if (wpa_s->reassoc_same_ess && !is_zero_ether_addr(prev_bssid) &&
- wpa_s->current_ssid)
- params.prev_bssid = prev_bssid;
- ret = wpa_drv_associate(wpa_s, ¶ms);
- os_free(wpa_ie);
- if (ret < 0) {
- wpa_msg(wpa_s, MSG_INFO, "Association request to the driver "
- "failed");
- if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SANE_ERROR_CODES) {
- /*
- * The driver is known to mean what is saying, so we
- * can stop right here; the association will not
- * succeed.
- */
- wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
- wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
- os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
- return;
- }
- /* try to continue anyway; new association will be tried again
- * after timeout */
- assoc_failed = 1;
- }
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
- /* Set the key after the association just in case association
- * cleared the previously configured key. */
- wpa_supplicant_set_wpa_none_key(wpa_s, ssid);
- /* No need to timeout authentication since there is no key
- * management. */
- wpa_supplicant_cancel_auth_timeout(wpa_s);
- wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
- #ifdef CONFIG_IBSS_RSN
- } else if (ssid->mode == WPAS_MODE_IBSS &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_NONE &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_WPA_NONE) {
- /*
- * RSN IBSS authentication is per-STA and we can disable the
- * per-BSSID authentication.
- */
- wpa_supplicant_cancel_auth_timeout(wpa_s);
- #endif /* CONFIG_IBSS_RSN */
- } else {
- /* Timeout for IEEE 802.11 authentication and association */
- int timeout = 60;
- if (assoc_failed) {
- /* give IBSS a bit more time */
- timeout = ssid->mode == WPAS_MODE_IBSS ? 10 : 5;
- } else if (wpa_s->conf->ap_scan == 1) {
- /* give IBSS a bit more time */
- timeout = ssid->mode == WPAS_MODE_IBSS ? 20 : 10;
- }
- wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0);
- }
- if (wep_keys_set &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC)) {
- /* Set static WEP keys again */
- wpa_set_wep_keys(wpa_s, ssid);
- }
- if (wpa_s->current_ssid && wpa_s->current_ssid != ssid) {
- /*
- * Do not allow EAP session resumption between different
- * network configurations.
- */
- eapol_sm_invalidate_cached_session(wpa_s->eapol);
- }
- old_ssid = wpa_s->current_ssid;
- wpa_s->current_ssid = ssid;
- if (!wpas_driver_bss_selection(wpa_s) || ssid->bssid_set) {
- wpa_s->current_bss = bss;
- #ifdef CONFIG_HS20
- hs20_configure_frame_filters(wpa_s);
- #endif /* CONFIG_HS20 */
- }
- wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
- wpa_supplicant_initiate_eapol(wpa_s);
- if (old_ssid != wpa_s->current_ssid)
- wpas_notify_network_changed(wpa_s);
- }
- static void wpa_supplicant_clear_connection(struct wpa_supplicant *wpa_s,
- const u8 *addr)
- {
- struct wpa_ssid *old_ssid;
- wpas_connect_work_done(wpa_s);
- wpa_clear_keys(wpa_s, addr);
- old_ssid = wpa_s->current_ssid;
- wpa_supplicant_mark_disassoc(wpa_s);
- wpa_sm_set_config(wpa_s->wpa, NULL);
- eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
- if (old_ssid != wpa_s->current_ssid)
- wpas_notify_network_changed(wpa_s);
- eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
- }
- /**
- * wpa_supplicant_deauthenticate - Deauthenticate the current connection
- * @wpa_s: Pointer to wpa_supplicant data
- * @reason_code: IEEE 802.11 reason code for the deauthenticate frame
- *
- * This function is used to request %wpa_supplicant to deauthenticate from the
- * current AP.
- */
- void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s,
- int reason_code)
- {
- u8 *addr = NULL;
- union wpa_event_data event;
- int zero_addr = 0;
- wpa_dbg(wpa_s, MSG_DEBUG, "Request to deauthenticate - bssid=" MACSTR
- " pending_bssid=" MACSTR " reason=%d state=%s",
- MAC2STR(wpa_s->bssid), MAC2STR(wpa_s->pending_bssid),
- reason_code, wpa_supplicant_state_txt(wpa_s->wpa_state));
- if (!is_zero_ether_addr(wpa_s->pending_bssid) &&
- (wpa_s->wpa_state == WPA_AUTHENTICATING ||
- wpa_s->wpa_state == WPA_ASSOCIATING))
- addr = wpa_s->pending_bssid;
- else if (!is_zero_ether_addr(wpa_s->bssid))
- addr = wpa_s->bssid;
- else if (wpa_s->wpa_state == WPA_ASSOCIATING) {
- /*
- * When using driver-based BSS selection, we may not know the
- * BSSID with which we are currently trying to associate. We
- * need to notify the driver of this disconnection even in such
- * a case, so use the all zeros address here.
- */
- addr = wpa_s->bssid;
- zero_addr = 1;
- }
- #ifdef CONFIG_TDLS
- wpa_tdls_teardown_peers(wpa_s->wpa);
- #endif /* CONFIG_TDLS */
- #ifdef CONFIG_MESH
- if (wpa_s->ifmsh) {
- struct mesh_conf *mconf;
- mconf = wpa_s->ifmsh->mconf;
- wpa_msg(wpa_s, MSG_INFO, MESH_GROUP_REMOVED "%s",
- wpa_s->ifname);
- wpas_notify_mesh_group_removed(wpa_s, mconf->meshid,
- mconf->meshid_len, reason_code);
- wpa_supplicant_leave_mesh(wpa_s);
- }
- #endif /* CONFIG_MESH */
- if (addr) {
- wpa_drv_deauthenticate(wpa_s, addr, reason_code);
- os_memset(&event, 0, sizeof(event));
- event.deauth_info.reason_code = (u16) reason_code;
- event.deauth_info.locally_generated = 1;
- wpa_supplicant_event(wpa_s, EVENT_DEAUTH, &event);
- if (zero_addr)
- addr = NULL;
- }
- wpa_supplicant_clear_connection(wpa_s, addr);
- }
- static void wpa_supplicant_enable_one_network(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- if (!ssid || !ssid->disabled || ssid->disabled == 2)
- return;
- ssid->disabled = 0;
- wpas_clear_temp_disabled(wpa_s, ssid, 1);
- wpas_notify_network_enabled_changed(wpa_s, ssid);
- /*
- * Try to reassociate since there is no current configuration and a new
- * network was made available.
- */
- if (!wpa_s->current_ssid && !wpa_s->disconnected)
- wpa_s->reassociate = 1;
- }
- /**
- * wpa_supplicant_add_network - Add a new network
- * @wpa_s: wpa_supplicant structure for a network interface
- * Returns: The new network configuration or %NULL if operation failed
- *
- * This function performs the following operations:
- * 1. Adds a new network.
- * 2. Send network addition notification.
- * 3. Marks the network disabled.
- * 4. Set network default parameters.
- */
- struct wpa_ssid * wpa_supplicant_add_network(struct wpa_supplicant *wpa_s)
- {
- struct wpa_ssid *ssid;
- ssid = wpa_config_add_network(wpa_s->conf);
- if (!ssid)
- return NULL;
- wpas_notify_network_added(wpa_s, ssid);
- ssid->disabled = 1;
- wpa_config_set_network_defaults(ssid);
- return ssid;
- }
- /**
- * wpa_supplicant_remove_network - Remove a configured network based on id
- * @wpa_s: wpa_supplicant structure for a network interface
- * @id: Unique network id to search for
- * Returns: 0 on success, or -1 if the network was not found, -2 if the network
- * could not be removed
- *
- * This function performs the following operations:
- * 1. Removes the network.
- * 2. Send network removal notification.
- * 3. Update internal state machines.
- * 4. Stop any running sched scans.
- */
- int wpa_supplicant_remove_network(struct wpa_supplicant *wpa_s, int id)
- {
- struct wpa_ssid *ssid;
- int was_disabled;
- ssid = wpa_config_get_network(wpa_s->conf, id);
- if (!ssid)
- return -1;
- wpas_notify_network_removed(wpa_s, ssid);
- if (wpa_s->last_ssid == ssid)
- wpa_s->last_ssid = NULL;
- if (ssid == wpa_s->current_ssid || !wpa_s->current_ssid) {
- #ifdef CONFIG_SME
- wpa_s->sme.prev_bssid_set = 0;
- #endif /* CONFIG_SME */
- /*
- * Invalidate the EAP session cache if the current or
- * previously used network is removed.
- */
- eapol_sm_invalidate_cached_session(wpa_s->eapol);
- }
- if (ssid == wpa_s->current_ssid) {
- wpa_sm_set_config(wpa_s->wpa, NULL);
- eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
- wpa_s->own_disconnect_req = 1;
- wpa_supplicant_deauthenticate(wpa_s,
- WLAN_REASON_DEAUTH_LEAVING);
- }
- was_disabled = ssid->disabled;
- if (wpa_config_remove_network(wpa_s->conf, id) < 0)
- return -2;
- if (!was_disabled && wpa_s->sched_scanning) {
- wpa_printf(MSG_DEBUG,
- "Stop ongoing sched_scan to remove network from filters");
- wpa_supplicant_cancel_sched_scan(wpa_s);
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- }
- return 0;
- }
- /**
- * wpa_supplicant_enable_network - Mark a configured network as enabled
- * @wpa_s: wpa_supplicant structure for a network interface
- * @ssid: wpa_ssid structure for a configured network or %NULL
- *
- * Enables the specified network or all networks if no network specified.
- */
- void wpa_supplicant_enable_network(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- if (ssid == NULL) {
- for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
- wpa_supplicant_enable_one_network(wpa_s, ssid);
- } else
- wpa_supplicant_enable_one_network(wpa_s, ssid);
- if (wpa_s->reassociate && !wpa_s->disconnected &&
- (!wpa_s->current_ssid ||
- wpa_s->wpa_state == WPA_DISCONNECTED ||
- wpa_s->wpa_state == WPA_SCANNING)) {
- if (wpa_s->sched_scanning) {
- wpa_printf(MSG_DEBUG, "Stop ongoing sched_scan to add "
- "new network to scan filters");
- wpa_supplicant_cancel_sched_scan(wpa_s);
- }
- if (wpa_supplicant_fast_associate(wpa_s) != 1) {
- wpa_s->scan_req = NORMAL_SCAN_REQ;
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- }
- }
- }
- /**
- * wpa_supplicant_disable_network - Mark a configured network as disabled
- * @wpa_s: wpa_supplicant structure for a network interface
- * @ssid: wpa_ssid structure for a configured network or %NULL
- *
- * Disables the specified network or all networks if no network specified.
- */
- void wpa_supplicant_disable_network(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- struct wpa_ssid *other_ssid;
- int was_disabled;
- if (ssid == NULL) {
- if (wpa_s->sched_scanning)
- wpa_supplicant_cancel_sched_scan(wpa_s);
- for (other_ssid = wpa_s->conf->ssid; other_ssid;
- other_ssid = other_ssid->next) {
- was_disabled = other_ssid->disabled;
- if (was_disabled == 2)
- continue; /* do not change persistent P2P group
- * data */
- other_ssid->disabled = 1;
- if (was_disabled != other_ssid->disabled)
- wpas_notify_network_enabled_changed(
- wpa_s, other_ssid);
- }
- if (wpa_s->current_ssid) {
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
- wpa_s->own_disconnect_req = 1;
- wpa_supplicant_deauthenticate(
- wpa_s, WLAN_REASON_DEAUTH_LEAVING);
- }
- } else if (ssid->disabled != 2) {
- if (ssid == wpa_s->current_ssid) {
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
- wpa_s->own_disconnect_req = 1;
- wpa_supplicant_deauthenticate(
- wpa_s, WLAN_REASON_DEAUTH_LEAVING);
- }
- was_disabled = ssid->disabled;
- ssid->disabled = 1;
- if (was_disabled != ssid->disabled) {
- wpas_notify_network_enabled_changed(wpa_s, ssid);
- if (wpa_s->sched_scanning) {
- wpa_printf(MSG_DEBUG, "Stop ongoing sched_scan "
- "to remove network from filters");
- wpa_supplicant_cancel_sched_scan(wpa_s);
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- }
- }
- }
- }
- /**
- * wpa_supplicant_select_network - Attempt association with a network
- * @wpa_s: wpa_supplicant structure for a network interface
- * @ssid: wpa_ssid structure for a configured network or %NULL for any network
- */
- void wpa_supplicant_select_network(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid)
- {
- struct wpa_ssid *other_ssid;
- int disconnected = 0;
- if (ssid && ssid != wpa_s->current_ssid && wpa_s->current_ssid) {
- if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
- wpa_s->own_disconnect_req = 1;
- wpa_supplicant_deauthenticate(
- wpa_s, WLAN_REASON_DEAUTH_LEAVING);
- disconnected = 1;
- }
- if (ssid)
- wpas_clear_temp_disabled(wpa_s, ssid, 1);
- /*
- * Mark all other networks disabled or mark all networks enabled if no
- * network specified.
- */
- for (other_ssid = wpa_s->conf->ssid; other_ssid;
- other_ssid = other_ssid->next) {
- int was_disabled = other_ssid->disabled;
- if (was_disabled == 2)
- continue; /* do not change persistent P2P group data */
- other_ssid->disabled = ssid ? (ssid->id != other_ssid->id) : 0;
- if (was_disabled && !other_ssid->disabled)
- wpas_clear_temp_disabled(wpa_s, other_ssid, 0);
- if (was_disabled != other_ssid->disabled)
- wpas_notify_network_enabled_changed(wpa_s, other_ssid);
- }
- if (ssid && ssid == wpa_s->current_ssid && wpa_s->current_ssid &&
- wpa_s->wpa_state >= WPA_AUTHENTICATING) {
- /* We are already associated with the selected network */
- wpa_printf(MSG_DEBUG, "Already associated with the "
- "selected network - do nothing");
- return;
- }
- if (ssid) {
- wpa_s->current_ssid = ssid;
- eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
- wpa_s->connect_without_scan =
- (ssid->mode == WPAS_MODE_MESH) ? ssid : NULL;
- /*
- * Don't optimize next scan freqs since a new ESS has been
- * selected.
- */
- os_free(wpa_s->next_scan_freqs);
- wpa_s->next_scan_freqs = NULL;
- } else {
- wpa_s->connect_without_scan = NULL;
- }
- wpa_s->disconnected = 0;
- wpa_s->reassociate = 1;
- wpa_s->last_owe_group = 0;
- if (wpa_s->connect_without_scan ||
- wpa_supplicant_fast_associate(wpa_s) != 1) {
- wpa_s->scan_req = NORMAL_SCAN_REQ;
- wpas_scan_reset_sched_scan(wpa_s);
- wpa_supplicant_req_scan(wpa_s, 0, disconnected ? 100000 : 0);
- }
- if (ssid)
- wpas_notify_network_selected(wpa_s, ssid);
- }
- /**
- * wpas_set_pkcs11_engine_and_module_path - Set PKCS #11 engine and module path
- * @wpa_s: wpa_supplicant structure for a network interface
- * @pkcs11_engine_path: PKCS #11 engine path or NULL
- * @pkcs11_module_path: PKCS #11 module path or NULL
- * Returns: 0 on success; -1 on failure
- *
- * Sets the PKCS #11 engine and module path. Both have to be NULL or a valid
- * path. If resetting the EAPOL state machine with the new PKCS #11 engine and
- * module path fails the paths will be reset to the default value (NULL).
- */
- int wpas_set_pkcs11_engine_and_module_path(struct wpa_supplicant *wpa_s,
- const char *pkcs11_engine_path,
- const char *pkcs11_module_path)
- {
- char *pkcs11_engine_path_copy = NULL;
- char *pkcs11_module_path_copy = NULL;
- if (pkcs11_engine_path != NULL) {
- pkcs11_engine_path_copy = os_strdup(pkcs11_engine_path);
- if (pkcs11_engine_path_copy == NULL)
- return -1;
- }
- if (pkcs11_module_path != NULL) {
- pkcs11_module_path_copy = os_strdup(pkcs11_module_path);
- if (pkcs11_module_path_copy == NULL) {
- os_free(pkcs11_engine_path_copy);
- return -1;
- }
- }
- os_free(wpa_s->conf->pkcs11_engine_path);
- os_free(wpa_s->conf->pkcs11_module_path);
- wpa_s->conf->pkcs11_engine_path = pkcs11_engine_path_copy;
- wpa_s->conf->pkcs11_module_path = pkcs11_module_path_copy;
- wpa_sm_set_eapol(wpa_s->wpa, NULL);
- eapol_sm_deinit(wpa_s->eapol);
- wpa_s->eapol = NULL;
- if (wpa_supplicant_init_eapol(wpa_s)) {
- /* Error -> Reset paths to the default value (NULL) once. */
- if (pkcs11_engine_path != NULL && pkcs11_module_path != NULL)
- wpas_set_pkcs11_engine_and_module_path(wpa_s, NULL,
- NULL);
- return -1;
- }
- wpa_sm_set_eapol(wpa_s->wpa, wpa_s->eapol);
- return 0;
- }
- /**
- * wpa_supplicant_set_ap_scan - Set AP scan mode for interface
- * @wpa_s: wpa_supplicant structure for a network interface
- * @ap_scan: AP scan mode
- * Returns: 0 if succeed or -1 if ap_scan has an invalid value
- *
- */
- int wpa_supplicant_set_ap_scan(struct wpa_supplicant *wpa_s, int ap_scan)
- {
- int old_ap_scan;
- if (ap_scan < 0 || ap_scan > 2)
- return -1;
- if (ap_scan == 2 && os_strcmp(wpa_s->driver->name, "nl80211") == 0) {
- wpa_printf(MSG_INFO,
- "Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures");
- }
- #ifdef ANDROID
- if (ap_scan == 2 && ap_scan != wpa_s->conf->ap_scan &&
- wpa_s->wpa_state >= WPA_ASSOCIATING &&
- wpa_s->wpa_state < WPA_COMPLETED) {
- wpa_printf(MSG_ERROR, "ap_scan = %d (%d) rejected while "
- "associating", wpa_s->conf->ap_scan, ap_scan);
- return 0;
- }
- #endif /* ANDROID */
- old_ap_scan = wpa_s->conf->ap_scan;
- wpa_s->conf->ap_scan = ap_scan;
- if (old_ap_scan != wpa_s->conf->ap_scan)
- wpas_notify_ap_scan_changed(wpa_s);
- return 0;
- }
- /**
- * wpa_supplicant_set_bss_expiration_age - Set BSS entry expiration age
- * @wpa_s: wpa_supplicant structure for a network interface
- * @expire_age: Expiration age in seconds
- * Returns: 0 if succeed or -1 if expire_age has an invalid value
- *
- */
- int wpa_supplicant_set_bss_expiration_age(struct wpa_supplicant *wpa_s,
- unsigned int bss_expire_age)
- {
- if (bss_expire_age < 10) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid bss expiration age %u",
- bss_expire_age);
- return -1;
- }
- wpa_msg(wpa_s, MSG_DEBUG, "Setting bss expiration age: %d sec",
- bss_expire_age);
- wpa_s->conf->bss_expiration_age = bss_expire_age;
- return 0;
- }
- /**
- * wpa_supplicant_set_bss_expiration_count - Set BSS entry expiration scan count
- * @wpa_s: wpa_supplicant structure for a network interface
- * @expire_count: number of scans after which an unseen BSS is reclaimed
- * Returns: 0 if succeed or -1 if expire_count has an invalid value
- *
- */
- int wpa_supplicant_set_bss_expiration_count(struct wpa_supplicant *wpa_s,
- unsigned int bss_expire_count)
- {
- if (bss_expire_count < 1) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid bss expiration count %u",
- bss_expire_count);
- return -1;
- }
- wpa_msg(wpa_s, MSG_DEBUG, "Setting bss expiration scan count: %u",
- bss_expire_count);
- wpa_s->conf->bss_expiration_scan_count = bss_expire_count;
- return 0;
- }
- /**
- * wpa_supplicant_set_scan_interval - Set scan interval
- * @wpa_s: wpa_supplicant structure for a network interface
- * @scan_interval: scan interval in seconds
- * Returns: 0 if succeed or -1 if scan_interval has an invalid value
- *
- */
- int wpa_supplicant_set_scan_interval(struct wpa_supplicant *wpa_s,
- int scan_interval)
- {
- if (scan_interval < 0) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid scan interval %d",
- scan_interval);
- return -1;
- }
- wpa_msg(wpa_s, MSG_DEBUG, "Setting scan interval: %d sec",
- scan_interval);
- wpa_supplicant_update_scan_int(wpa_s, scan_interval);
- return 0;
- }
- /**
- * wpa_supplicant_set_debug_params - Set global debug params
- * @global: wpa_global structure
- * @debug_level: debug level
- * @debug_timestamp: determines if show timestamp in debug data
- * @debug_show_keys: determines if show keys in debug data
- * Returns: 0 if succeed or -1 if debug_level has wrong value
- */
- int wpa_supplicant_set_debug_params(struct wpa_global *global, int debug_level,
- int debug_timestamp, int debug_show_keys)
- {
- int old_level, old_timestamp, old_show_keys;
- /* check for allowed debuglevels */
- if (debug_level != MSG_EXCESSIVE &&
- debug_level != MSG_MSGDUMP &&
- debug_level != MSG_DEBUG &&
- debug_level != MSG_INFO &&
- debug_level != MSG_WARNING &&
- debug_level != MSG_ERROR)
- return -1;
- old_level = wpa_debug_level;
- old_timestamp = wpa_debug_timestamp;
- old_show_keys = wpa_debug_show_keys;
- wpa_debug_level = debug_level;
- wpa_debug_timestamp = debug_timestamp ? 1 : 0;
- wpa_debug_show_keys = debug_show_keys ? 1 : 0;
- if (wpa_debug_level != old_level)
- wpas_notify_debug_level_changed(global);
- if (wpa_debug_timestamp != old_timestamp)
- wpas_notify_debug_timestamp_changed(global);
- if (wpa_debug_show_keys != old_show_keys)
- wpas_notify_debug_show_keys_changed(global);
- return 0;
- }
- #ifdef CONFIG_OWE
- static int owe_trans_ssid_match(struct wpa_supplicant *wpa_s, const u8 *bssid,
- const u8 *entry_ssid, size_t entry_ssid_len)
- {
- const u8 *owe, *pos, *end;
- u8 ssid_len;
- struct wpa_bss *bss;
- /* Check network profile SSID aganst the SSID in the
- * OWE Transition Mode element. */
- bss = wpa_bss_get_bssid_latest(wpa_s, bssid);
- if (!bss)
- return 0;
- owe = wpa_bss_get_vendor_ie(bss, OWE_IE_VENDOR_TYPE);
- if (!owe)
- return 0;
- pos = owe + 6;
- end = owe + 2 + owe[1];
- if (end - pos < ETH_ALEN + 1)
- return 0;
- pos += ETH_ALEN;
- ssid_len = *pos++;
- if (end - pos < ssid_len || ssid_len > SSID_MAX_LEN)
- return 0;
- return entry_ssid_len == ssid_len &&
- os_memcmp(pos, entry_ssid, ssid_len) == 0;
- }
- #endif /* CONFIG_OWE */
- /**
- * wpa_supplicant_get_ssid - Get a pointer to the current network structure
- * @wpa_s: Pointer to wpa_supplicant data
- * Returns: A pointer to the current network structure or %NULL on failure
- */
- struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s)
- {
- struct wpa_ssid *entry;
- u8 ssid[SSID_MAX_LEN];
- int res;
- size_t ssid_len;
- u8 bssid[ETH_ALEN];
- int wired;
- res = wpa_drv_get_ssid(wpa_s, ssid);
- if (res < 0) {
- wpa_msg(wpa_s, MSG_WARNING, "Could not read SSID from "
- "driver");
- return NULL;
- }
- ssid_len = res;
- if (wpa_drv_get_bssid(wpa_s, bssid) < 0) {
- wpa_msg(wpa_s, MSG_WARNING, "Could not read BSSID from "
- "driver");
- return NULL;
- }
- wired = wpa_s->conf->ap_scan == 0 &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED);
- entry = wpa_s->conf->ssid;
- while (entry) {
- if (!wpas_network_disabled(wpa_s, entry) &&
- ((ssid_len == entry->ssid_len &&
- os_memcmp(ssid, entry->ssid, ssid_len) == 0) || wired) &&
- (!entry->bssid_set ||
- os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
- return entry;
- #ifdef CONFIG_WPS
- if (!wpas_network_disabled(wpa_s, entry) &&
- (entry->key_mgmt & WPA_KEY_MGMT_WPS) &&
- (entry->ssid == NULL || entry->ssid_len == 0) &&
- (!entry->bssid_set ||
- os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
- return entry;
- #endif /* CONFIG_WPS */
- #ifdef CONFIG_OWE
- if (!wpas_network_disabled(wpa_s, entry) &&
- owe_trans_ssid_match(wpa_s, bssid, entry->ssid,
- entry->ssid_len) &&
- (!entry->bssid_set ||
- os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
- return entry;
- #endif /* CONFIG_OWE */
- if (!wpas_network_disabled(wpa_s, entry) && entry->bssid_set &&
- entry->ssid_len == 0 &&
- os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0)
- return entry;
- entry = entry->next;
- }
- return NULL;
- }
- static int select_driver(struct wpa_supplicant *wpa_s, int i)
- {
- struct wpa_global *global = wpa_s->global;
- if (wpa_drivers[i]->global_init && global->drv_priv[i] == NULL) {
- global->drv_priv[i] = wpa_drivers[i]->global_init(global);
- if (global->drv_priv[i] == NULL) {
- wpa_printf(MSG_ERROR, "Failed to initialize driver "
- "'%s'", wpa_drivers[i]->name);
- return -1;
- }
- }
- wpa_s->driver = wpa_drivers[i];
- wpa_s->global_drv_priv = global->drv_priv[i];
- return 0;
- }
- static int wpa_supplicant_set_driver(struct wpa_supplicant *wpa_s,
- const char *name)
- {
- int i;
- size_t len;
- const char *pos, *driver = name;
- if (wpa_s == NULL)
- return -1;
- if (wpa_drivers[0] == NULL) {
- wpa_msg(wpa_s, MSG_ERROR, "No driver interfaces build into "
- "wpa_supplicant");
- return -1;
- }
- if (name == NULL) {
- /* default to first driver in the list */
- return select_driver(wpa_s, 0);
- }
- do {
- pos = os_strchr(driver, ',');
- if (pos)
- len = pos - driver;
- else
- len = os_strlen(driver);
- for (i = 0; wpa_drivers[i]; i++) {
- if (os_strlen(wpa_drivers[i]->name) == len &&
- os_strncmp(driver, wpa_drivers[i]->name, len) ==
- 0) {
- /* First driver that succeeds wins */
- if (select_driver(wpa_s, i) == 0)
- return 0;
- }
- }
- driver = pos + 1;
- } while (pos);
- wpa_msg(wpa_s, MSG_ERROR, "Unsupported driver '%s'", name);
- return -1;
- }
- /**
- * wpa_supplicant_rx_eapol - Deliver a received EAPOL frame to wpa_supplicant
- * @ctx: Context pointer (wpa_s); this is the ctx variable registered
- * with struct wpa_driver_ops::init()
- * @src_addr: Source address of the EAPOL frame
- * @buf: EAPOL data starting from the EAPOL header (i.e., no Ethernet header)
- * @len: Length of the EAPOL data
- *
- * This function is called for each received EAPOL frame. Most driver
- * interfaces rely on more generic OS mechanism for receiving frames through
- * l2_packet, but if such a mechanism is not available, the driver wrapper may
- * take care of received EAPOL frames and deliver them to the core supplicant
- * code by calling this function.
- */
- void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
- const u8 *buf, size_t len)
- {
- struct wpa_supplicant *wpa_s = ctx;
- wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR, MAC2STR(src_addr));
- wpa_hexdump(MSG_MSGDUMP, "RX EAPOL", buf, len);
- #ifdef CONFIG_TESTING_OPTIONS
- if (wpa_s->ignore_auth_resp) {
- wpa_printf(MSG_INFO, "RX EAPOL - ignore_auth_resp active!");
- return;
- }
- #endif /* CONFIG_TESTING_OPTIONS */
- if (wpa_s->wpa_state < WPA_ASSOCIATED ||
- (wpa_s->last_eapol_matches_bssid &&
- #ifdef CONFIG_AP
- !wpa_s->ap_iface &&
- #endif /* CONFIG_AP */
- os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) != 0)) {
- /*
- * There is possible race condition between receiving the
- * association event and the EAPOL frame since they are coming
- * through different paths from the driver. In order to avoid
- * issues in trying to process the EAPOL frame before receiving
- * association information, lets queue it for processing until
- * the association event is received. This may also be needed in
- * driver-based roaming case, so also use src_addr != BSSID as a
- * trigger if we have previously confirmed that the
- * Authenticator uses BSSID as the src_addr (which is not the
- * case with wired IEEE 802.1X).
- */
- wpa_dbg(wpa_s, MSG_DEBUG, "Not associated - Delay processing "
- "of received EAPOL frame (state=%s bssid=" MACSTR ")",
- wpa_supplicant_state_txt(wpa_s->wpa_state),
- MAC2STR(wpa_s->bssid));
- wpabuf_free(wpa_s->pending_eapol_rx);
- wpa_s->pending_eapol_rx = wpabuf_alloc_copy(buf, len);
- if (wpa_s->pending_eapol_rx) {
- os_get_reltime(&wpa_s->pending_eapol_rx_time);
- os_memcpy(wpa_s->pending_eapol_rx_src, src_addr,
- ETH_ALEN);
- }
- return;
- }
- wpa_s->last_eapol_matches_bssid =
- os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) == 0;
- #ifdef CONFIG_AP
- if (wpa_s->ap_iface) {
- wpa_supplicant_ap_rx_eapol(wpa_s, src_addr, buf, len);
- return;
- }
- #endif /* CONFIG_AP */
- if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Ignored received EAPOL frame since "
- "no key management is configured");
- return;
- }
- if (wpa_s->eapol_received == 0 &&
- (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE) ||
- !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
- wpa_s->wpa_state != WPA_COMPLETED) &&
- (wpa_s->current_ssid == NULL ||
- wpa_s->current_ssid->mode != IEEE80211_MODE_IBSS)) {
- /* Timeout for completing IEEE 802.1X and WPA authentication */
- int timeout = 10;
- if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA ||
- wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
- /* Use longer timeout for IEEE 802.1X/EAP */
- timeout = 70;
- }
- #ifdef CONFIG_WPS
- if (wpa_s->current_ssid && wpa_s->current_bss &&
- (wpa_s->current_ssid->key_mgmt & WPA_KEY_MGMT_WPS) &&
- eap_is_wps_pin_enrollee(&wpa_s->current_ssid->eap)) {
- /*
- * Use shorter timeout if going through WPS AP iteration
- * for PIN config method with an AP that does not
- * advertise Selected Registrar.
- */
- struct wpabuf *wps_ie;
- wps_ie = wpa_bss_get_vendor_ie_multi(
- wpa_s->current_bss, WPS_IE_VENDOR_TYPE);
- if (wps_ie &&
- !wps_is_addr_authorized(wps_ie, wpa_s->own_addr, 1))
- timeout = 10;
- wpabuf_free(wps_ie);
- }
- #endif /* CONFIG_WPS */
- wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0);
- }
- wpa_s->eapol_received++;
- if (wpa_s->countermeasures) {
- wpa_msg(wpa_s, MSG_INFO, "WPA: Countermeasures - dropped "
- "EAPOL packet");
- return;
- }
- #ifdef CONFIG_IBSS_RSN
- if (wpa_s->current_ssid &&
- wpa_s->current_ssid->mode == WPAS_MODE_IBSS) {
- ibss_rsn_rx_eapol(wpa_s->ibss_rsn, src_addr, buf, len);
- return;
- }
- #endif /* CONFIG_IBSS_RSN */
- /* Source address of the incoming EAPOL frame could be compared to the
- * current BSSID. However, it is possible that a centralized
- * Authenticator could be using another MAC address than the BSSID of
- * an AP, so just allow any address to be used for now. The replies are
- * still sent to the current BSSID (if available), though. */
- os_memcpy(wpa_s->last_eapol_src, src_addr, ETH_ALEN);
- if (!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_OWE &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_DPP &&
- eapol_sm_rx_eapol(wpa_s->eapol, src_addr, buf, len) > 0)
- return;
- wpa_drv_poll(wpa_s);
- if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE))
- wpa_sm_rx_eapol(wpa_s->wpa, src_addr, buf, len);
- else if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt)) {
- /*
- * Set portValid = TRUE here since we are going to skip 4-way
- * handshake processing which would normally set portValid. We
- * need this to allow the EAPOL state machines to be completed
- * without going through EAPOL-Key handshake.
- */
- eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
- }
- }
- int wpa_supplicant_update_mac_addr(struct wpa_supplicant *wpa_s)
- {
- if ((!wpa_s->p2p_mgmt ||
- !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)) &&
- !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE)) {
- l2_packet_deinit(wpa_s->l2);
- wpa_s->l2 = l2_packet_init(wpa_s->ifname,
- wpa_drv_get_mac_addr(wpa_s),
- ETH_P_EAPOL,
- wpa_supplicant_rx_eapol, wpa_s, 0);
- if (wpa_s->l2 == NULL)
- return -1;
- } else {
- const u8 *addr = wpa_drv_get_mac_addr(wpa_s);
- if (addr)
- os_memcpy(wpa_s->own_addr, addr, ETH_ALEN);
- }
- if (wpa_s->l2 && l2_packet_get_own_addr(wpa_s->l2, wpa_s->own_addr)) {
- wpa_msg(wpa_s, MSG_ERROR, "Failed to get own L2 address");
- return -1;
- }
- wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr);
- return 0;
- }
- static void wpa_supplicant_rx_eapol_bridge(void *ctx, const u8 *src_addr,
- const u8 *buf, size_t len)
- {
- struct wpa_supplicant *wpa_s = ctx;
- const struct l2_ethhdr *eth;
- if (len < sizeof(*eth))
- return;
- eth = (const struct l2_ethhdr *) buf;
- if (os_memcmp(eth->h_dest, wpa_s->own_addr, ETH_ALEN) != 0 &&
- !(eth->h_dest[0] & 0x01)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR " to " MACSTR
- " (bridge - not for this interface - ignore)",
- MAC2STR(src_addr), MAC2STR(eth->h_dest));
- return;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR " to " MACSTR
- " (bridge)", MAC2STR(src_addr), MAC2STR(eth->h_dest));
- wpa_supplicant_rx_eapol(wpa_s, src_addr, buf + sizeof(*eth),
- len - sizeof(*eth));
- }
- /**
- * wpa_supplicant_driver_init - Initialize driver interface parameters
- * @wpa_s: Pointer to wpa_supplicant data
- * Returns: 0 on success, -1 on failure
- *
- * This function is called to initialize driver interface parameters.
- * wpa_drv_init() must have been called before this function to initialize the
- * driver interface.
- */
- int wpa_supplicant_driver_init(struct wpa_supplicant *wpa_s)
- {
- static int interface_count = 0;
- if (wpa_supplicant_update_mac_addr(wpa_s) < 0)
- return -1;
- wpa_dbg(wpa_s, MSG_DEBUG, "Own MAC address: " MACSTR,
- MAC2STR(wpa_s->own_addr));
- os_memcpy(wpa_s->perm_addr, wpa_s->own_addr, ETH_ALEN);
- wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr);
- if (wpa_s->bridge_ifname[0]) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Receiving packets from bridge "
- "interface '%s'", wpa_s->bridge_ifname);
- wpa_s->l2_br = l2_packet_init_bridge(
- wpa_s->bridge_ifname, wpa_s->ifname, wpa_s->own_addr,
- ETH_P_EAPOL, wpa_supplicant_rx_eapol_bridge, wpa_s, 1);
- if (wpa_s->l2_br == NULL) {
- wpa_msg(wpa_s, MSG_ERROR, "Failed to open l2_packet "
- "connection for the bridge interface '%s'",
- wpa_s->bridge_ifname);
- return -1;
- }
- }
- if (wpa_s->conf->ap_scan == 2 &&
- os_strcmp(wpa_s->driver->name, "nl80211") == 0) {
- wpa_printf(MSG_INFO,
- "Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures");
- }
- wpa_clear_keys(wpa_s, NULL);
- /* Make sure that TKIP countermeasures are not left enabled (could
- * happen if wpa_supplicant is killed during countermeasures. */
- wpa_drv_set_countermeasures(wpa_s, 0);
- wpa_dbg(wpa_s, MSG_DEBUG, "RSN: flushing PMKID list in the driver");
- wpa_drv_flush_pmkid(wpa_s);
- wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
- wpa_s->prev_scan_wildcard = 0;
- if (wpa_supplicant_enabled_networks(wpa_s)) {
- if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) {
- wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
- interface_count = 0;
- }
- #ifndef ANDROID
- if (!wpa_s->p2p_mgmt &&
- wpa_supplicant_delayed_sched_scan(wpa_s,
- interface_count % 3,
- 100000))
- wpa_supplicant_req_scan(wpa_s, interface_count % 3,
- 100000);
- #endif /* ANDROID */
- interface_count++;
- } else
- wpa_supplicant_set_state(wpa_s, WPA_INACTIVE);
- return 0;
- }
- static int wpa_supplicant_daemon(const char *pid_file)
- {
- wpa_printf(MSG_DEBUG, "Daemonize..");
- return os_daemonize(pid_file);
- }
- static struct wpa_supplicant *
- wpa_supplicant_alloc(struct wpa_supplicant *parent)
- {
- struct wpa_supplicant *wpa_s;
- wpa_s = os_zalloc(sizeof(*wpa_s));
- if (wpa_s == NULL)
- return NULL;
- wpa_s->scan_req = INITIAL_SCAN_REQ;
- wpa_s->scan_interval = 5;
- wpa_s->new_connection = 1;
- wpa_s->parent = parent ? parent : wpa_s;
- wpa_s->p2pdev = wpa_s->parent;
- wpa_s->sched_scanning = 0;
- dl_list_init(&wpa_s->bss_tmp_disallowed);
- dl_list_init(&wpa_s->fils_hlp_req);
- return wpa_s;
- }
- #ifdef CONFIG_HT_OVERRIDES
- static int wpa_set_htcap_mcs(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- const char *ht_mcs)
- {
- /* parse ht_mcs into hex array */
- int i;
- const char *tmp = ht_mcs;
- char *end = NULL;
- /* If ht_mcs is null, do not set anything */
- if (!ht_mcs)
- return 0;
- /* This is what we are setting in the kernel */
- os_memset(&htcaps->supported_mcs_set, 0, IEEE80211_HT_MCS_MASK_LEN);
- wpa_msg(wpa_s, MSG_DEBUG, "set_htcap, ht_mcs -:%s:-", ht_mcs);
- for (i = 0; i < IEEE80211_HT_MCS_MASK_LEN; i++) {
- long v;
- errno = 0;
- v = strtol(tmp, &end, 16);
- if (errno == 0) {
- wpa_msg(wpa_s, MSG_DEBUG,
- "htcap value[%i]: %ld end: %p tmp: %p",
- i, v, end, tmp);
- if (end == tmp)
- break;
- htcaps->supported_mcs_set[i] = v;
- tmp = end;
- } else {
- wpa_msg(wpa_s, MSG_ERROR,
- "Failed to parse ht-mcs: %s, error: %s\n",
- ht_mcs, strerror(errno));
- return -1;
- }
- }
- /*
- * If we were able to parse any values, then set mask for the MCS set.
- */
- if (i) {
- os_memset(&htcaps_mask->supported_mcs_set, 0xff,
- IEEE80211_HT_MCS_MASK_LEN - 1);
- /* skip the 3 reserved bits */
- htcaps_mask->supported_mcs_set[IEEE80211_HT_MCS_MASK_LEN - 1] =
- 0x1f;
- }
- return 0;
- }
- static int wpa_disable_max_amsdu(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int disabled)
- {
- le16 msk;
- wpa_msg(wpa_s, MSG_DEBUG, "set_disable_max_amsdu: %d", disabled);
- if (disabled == -1)
- return 0;
- msk = host_to_le16(HT_CAP_INFO_MAX_AMSDU_SIZE);
- htcaps_mask->ht_capabilities_info |= msk;
- if (disabled)
- htcaps->ht_capabilities_info &= msk;
- else
- htcaps->ht_capabilities_info |= msk;
- return 0;
- }
- static int wpa_set_ampdu_factor(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int factor)
- {
- wpa_msg(wpa_s, MSG_DEBUG, "set_ampdu_factor: %d", factor);
- if (factor == -1)
- return 0;
- if (factor < 0 || factor > 3) {
- wpa_msg(wpa_s, MSG_ERROR, "ampdu_factor: %d out of range. "
- "Must be 0-3 or -1", factor);
- return -EINVAL;
- }
- htcaps_mask->a_mpdu_params |= 0x3; /* 2 bits for factor */
- htcaps->a_mpdu_params &= ~0x3;
- htcaps->a_mpdu_params |= factor & 0x3;
- return 0;
- }
- static int wpa_set_ampdu_density(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int density)
- {
- wpa_msg(wpa_s, MSG_DEBUG, "set_ampdu_density: %d", density);
- if (density == -1)
- return 0;
- if (density < 0 || density > 7) {
- wpa_msg(wpa_s, MSG_ERROR,
- "ampdu_density: %d out of range. Must be 0-7 or -1.",
- density);
- return -EINVAL;
- }
- htcaps_mask->a_mpdu_params |= 0x1C;
- htcaps->a_mpdu_params &= ~(0x1C);
- htcaps->a_mpdu_params |= (density << 2) & 0x1C;
- return 0;
- }
- static int wpa_set_disable_ht40(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int disabled)
- {
- wpa_msg(wpa_s, MSG_DEBUG, "set_disable_ht40: %d", disabled);
- set_disable_ht40(htcaps, disabled);
- set_disable_ht40(htcaps_mask, 0);
- return 0;
- }
- static int wpa_set_disable_sgi(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int disabled)
- {
- /* Masking these out disables SGI */
- le16 msk = host_to_le16(HT_CAP_INFO_SHORT_GI20MHZ |
- HT_CAP_INFO_SHORT_GI40MHZ);
- wpa_msg(wpa_s, MSG_DEBUG, "set_disable_sgi: %d", disabled);
- if (disabled)
- htcaps->ht_capabilities_info &= ~msk;
- else
- htcaps->ht_capabilities_info |= msk;
- htcaps_mask->ht_capabilities_info |= msk;
- return 0;
- }
- static int wpa_set_disable_ldpc(struct wpa_supplicant *wpa_s,
- struct ieee80211_ht_capabilities *htcaps,
- struct ieee80211_ht_capabilities *htcaps_mask,
- int disabled)
- {
- /* Masking these out disables LDPC */
- le16 msk = host_to_le16(HT_CAP_INFO_LDPC_CODING_CAP);
- wpa_msg(wpa_s, MSG_DEBUG, "set_disable_ldpc: %d", disabled);
- if (disabled)
- htcaps->ht_capabilities_info &= ~msk;
- else
- htcaps->ht_capabilities_info |= msk;
- htcaps_mask->ht_capabilities_info |= msk;
- return 0;
- }
- void wpa_supplicant_apply_ht_overrides(
- struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
- struct wpa_driver_associate_params *params)
- {
- struct ieee80211_ht_capabilities *htcaps;
- struct ieee80211_ht_capabilities *htcaps_mask;
- if (!ssid)
- return;
- params->disable_ht = ssid->disable_ht;
- if (!params->htcaps || !params->htcaps_mask)
- return;
- htcaps = (struct ieee80211_ht_capabilities *) params->htcaps;
- htcaps_mask = (struct ieee80211_ht_capabilities *) params->htcaps_mask;
- wpa_set_htcap_mcs(wpa_s, htcaps, htcaps_mask, ssid->ht_mcs);
- wpa_disable_max_amsdu(wpa_s, htcaps, htcaps_mask,
- ssid->disable_max_amsdu);
- wpa_set_ampdu_factor(wpa_s, htcaps, htcaps_mask, ssid->ampdu_factor);
- wpa_set_ampdu_density(wpa_s, htcaps, htcaps_mask, ssid->ampdu_density);
- wpa_set_disable_ht40(wpa_s, htcaps, htcaps_mask, ssid->disable_ht40);
- wpa_set_disable_sgi(wpa_s, htcaps, htcaps_mask, ssid->disable_sgi);
- wpa_set_disable_ldpc(wpa_s, htcaps, htcaps_mask, ssid->disable_ldpc);
- if (ssid->ht40_intolerant) {
- le16 bit = host_to_le16(HT_CAP_INFO_40MHZ_INTOLERANT);
- htcaps->ht_capabilities_info |= bit;
- htcaps_mask->ht_capabilities_info |= bit;
- }
- }
- #endif /* CONFIG_HT_OVERRIDES */
- #ifdef CONFIG_VHT_OVERRIDES
- void wpa_supplicant_apply_vht_overrides(
- struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
- struct wpa_driver_associate_params *params)
- {
- struct ieee80211_vht_capabilities *vhtcaps;
- struct ieee80211_vht_capabilities *vhtcaps_mask;
- if (!ssid)
- return;
- params->disable_vht = ssid->disable_vht;
- vhtcaps = (void *) params->vhtcaps;
- vhtcaps_mask = (void *) params->vhtcaps_mask;
- if (!vhtcaps || !vhtcaps_mask)
- return;
- vhtcaps->vht_capabilities_info = host_to_le32(ssid->vht_capa);
- vhtcaps_mask->vht_capabilities_info = host_to_le32(ssid->vht_capa_mask);
- #ifdef CONFIG_HT_OVERRIDES
- /* if max ampdu is <= 3, we have to make the HT cap the same */
- if (ssid->vht_capa_mask & VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX) {
- int max_ampdu;
- max_ampdu = (ssid->vht_capa &
- VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX) >>
- VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX_SHIFT;
- max_ampdu = max_ampdu < 3 ? max_ampdu : 3;
- wpa_set_ampdu_factor(wpa_s,
- (void *) params->htcaps,
- (void *) params->htcaps_mask,
- max_ampdu);
- }
- #endif /* CONFIG_HT_OVERRIDES */
- #define OVERRIDE_MCS(i) \
- if (ssid->vht_tx_mcs_nss_ ##i >= 0) { \
- vhtcaps_mask->vht_supported_mcs_set.tx_map |= \
- host_to_le16(3 << 2 * (i - 1)); \
- vhtcaps->vht_supported_mcs_set.tx_map |= \
- host_to_le16(ssid->vht_tx_mcs_nss_ ##i << \
- 2 * (i - 1)); \
- } \
- if (ssid->vht_rx_mcs_nss_ ##i >= 0) { \
- vhtcaps_mask->vht_supported_mcs_set.rx_map |= \
- host_to_le16(3 << 2 * (i - 1)); \
- vhtcaps->vht_supported_mcs_set.rx_map |= \
- host_to_le16(ssid->vht_rx_mcs_nss_ ##i << \
- 2 * (i - 1)); \
- }
- OVERRIDE_MCS(1);
- OVERRIDE_MCS(2);
- OVERRIDE_MCS(3);
- OVERRIDE_MCS(4);
- OVERRIDE_MCS(5);
- OVERRIDE_MCS(6);
- OVERRIDE_MCS(7);
- OVERRIDE_MCS(8);
- }
- #endif /* CONFIG_VHT_OVERRIDES */
- static int pcsc_reader_init(struct wpa_supplicant *wpa_s)
- {
- #ifdef PCSC_FUNCS
- size_t len;
- if (!wpa_s->conf->pcsc_reader)
- return 0;
- wpa_s->scard = scard_init(wpa_s->conf->pcsc_reader);
- if (!wpa_s->scard)
- return 1;
- if (wpa_s->conf->pcsc_pin &&
- scard_set_pin(wpa_s->scard, wpa_s->conf->pcsc_pin) < 0) {
- scard_deinit(wpa_s->scard);
- wpa_s->scard = NULL;
- wpa_msg(wpa_s, MSG_ERROR, "PC/SC PIN validation failed");
- return -1;
- }
- len = sizeof(wpa_s->imsi) - 1;
- if (scard_get_imsi(wpa_s->scard, wpa_s->imsi, &len)) {
- scard_deinit(wpa_s->scard);
- wpa_s->scard = NULL;
- wpa_msg(wpa_s, MSG_ERROR, "Could not read IMSI");
- return -1;
- }
- wpa_s->imsi[len] = '\0';
- wpa_s->mnc_len = scard_get_mnc_len(wpa_s->scard);
- wpa_printf(MSG_DEBUG, "SCARD: IMSI %s (MNC length %d)",
- wpa_s->imsi, wpa_s->mnc_len);
- wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
- eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
- #endif /* PCSC_FUNCS */
- return 0;
- }
- int wpas_init_ext_pw(struct wpa_supplicant *wpa_s)
- {
- char *val, *pos;
- ext_password_deinit(wpa_s->ext_pw);
- wpa_s->ext_pw = NULL;
- eapol_sm_set_ext_pw_ctx(wpa_s->eapol, NULL);
- if (!wpa_s->conf->ext_password_backend)
- return 0;
- val = os_strdup(wpa_s->conf->ext_password_backend);
- if (val == NULL)
- return -1;
- pos = os_strchr(val, ':');
- if (pos)
- *pos++ = '\0';
- wpa_printf(MSG_DEBUG, "EXT PW: Initialize backend '%s'", val);
- wpa_s->ext_pw = ext_password_init(val, pos);
- os_free(val);
- if (wpa_s->ext_pw == NULL) {
- wpa_printf(MSG_DEBUG, "EXT PW: Failed to initialize backend");
- return -1;
- }
- eapol_sm_set_ext_pw_ctx(wpa_s->eapol, wpa_s->ext_pw);
- return 0;
- }
- #ifdef CONFIG_FST
- static const u8 * wpas_fst_get_bssid_cb(void *ctx)
- {
- struct wpa_supplicant *wpa_s = ctx;
- return (is_zero_ether_addr(wpa_s->bssid) ||
- wpa_s->wpa_state != WPA_COMPLETED) ? NULL : wpa_s->bssid;
- }
- static void wpas_fst_get_channel_info_cb(void *ctx,
- enum hostapd_hw_mode *hw_mode,
- u8 *channel)
- {
- struct wpa_supplicant *wpa_s = ctx;
- if (wpa_s->current_bss) {
- *hw_mode = ieee80211_freq_to_chan(wpa_s->current_bss->freq,
- channel);
- } else if (wpa_s->hw.num_modes) {
- *hw_mode = wpa_s->hw.modes[0].mode;
- } else {
- WPA_ASSERT(0);
- *hw_mode = 0;
- }
- }
- static int wpas_fst_get_hw_modes(void *ctx, struct hostapd_hw_modes **modes)
- {
- struct wpa_supplicant *wpa_s = ctx;
- *modes = wpa_s->hw.modes;
- return wpa_s->hw.num_modes;
- }
- static void wpas_fst_set_ies_cb(void *ctx, const struct wpabuf *fst_ies)
- {
- struct wpa_supplicant *wpa_s = ctx;
- wpa_hexdump_buf(MSG_DEBUG, "FST: Set IEs", fst_ies);
- wpa_s->fst_ies = fst_ies;
- }
- static int wpas_fst_send_action_cb(void *ctx, const u8 *da, struct wpabuf *data)
- {
- struct wpa_supplicant *wpa_s = ctx;
- if (os_memcmp(wpa_s->bssid, da, ETH_ALEN) != 0) {
- wpa_printf(MSG_INFO, "FST:%s:bssid=" MACSTR " != da=" MACSTR,
- __func__, MAC2STR(wpa_s->bssid), MAC2STR(da));
- return -1;
- }
- return wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
- wpa_s->own_addr, wpa_s->bssid,
- wpabuf_head(data), wpabuf_len(data),
- 0);
- }
- static const struct wpabuf * wpas_fst_get_mb_ie_cb(void *ctx, const u8 *addr)
- {
- struct wpa_supplicant *wpa_s = ctx;
- WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
- return wpa_s->received_mb_ies;
- }
- static void wpas_fst_update_mb_ie_cb(void *ctx, const u8 *addr,
- const u8 *buf, size_t size)
- {
- struct wpa_supplicant *wpa_s = ctx;
- struct mb_ies_info info;
- WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
- if (!mb_ies_info_by_ies(&info, buf, size)) {
- wpabuf_free(wpa_s->received_mb_ies);
- wpa_s->received_mb_ies = mb_ies_by_info(&info);
- }
- }
- static const u8 * wpas_fst_get_peer_first(void *ctx,
- struct fst_get_peer_ctx **get_ctx,
- Boolean mb_only)
- {
- struct wpa_supplicant *wpa_s = ctx;
- *get_ctx = NULL;
- if (!is_zero_ether_addr(wpa_s->bssid))
- return (wpa_s->received_mb_ies || !mb_only) ?
- wpa_s->bssid : NULL;
- return NULL;
- }
- static const u8 * wpas_fst_get_peer_next(void *ctx,
- struct fst_get_peer_ctx **get_ctx,
- Boolean mb_only)
- {
- return NULL;
- }
- void fst_wpa_supplicant_fill_iface_obj(struct wpa_supplicant *wpa_s,
- struct fst_wpa_obj *iface_obj)
- {
- iface_obj->ctx = wpa_s;
- iface_obj->get_bssid = wpas_fst_get_bssid_cb;
- iface_obj->get_channel_info = wpas_fst_get_channel_info_cb;
- iface_obj->get_hw_modes = wpas_fst_get_hw_modes;
- iface_obj->set_ies = wpas_fst_set_ies_cb;
- iface_obj->send_action = wpas_fst_send_action_cb;
- iface_obj->get_mb_ie = wpas_fst_get_mb_ie_cb;
- iface_obj->update_mb_ie = wpas_fst_update_mb_ie_cb;
- iface_obj->get_peer_first = wpas_fst_get_peer_first;
- iface_obj->get_peer_next = wpas_fst_get_peer_next;
- }
- #endif /* CONFIG_FST */
- static int wpas_set_wowlan_triggers(struct wpa_supplicant *wpa_s,
- const struct wpa_driver_capa *capa)
- {
- struct wowlan_triggers *triggers;
- int ret = 0;
- if (!wpa_s->conf->wowlan_triggers)
- return 0;
- triggers = wpa_get_wowlan_triggers(wpa_s->conf->wowlan_triggers, capa);
- if (triggers) {
- ret = wpa_drv_wowlan(wpa_s, triggers);
- os_free(triggers);
- }
- return ret;
- }
- enum wpa_radio_work_band wpas_freq_to_band(int freq)
- {
- if (freq < 3000)
- return BAND_2_4_GHZ;
- if (freq > 50000)
- return BAND_60_GHZ;
- return BAND_5_GHZ;
- }
- unsigned int wpas_get_bands(struct wpa_supplicant *wpa_s, const int *freqs)
- {
- int i;
- unsigned int band = 0;
- if (freqs) {
- /* freqs are specified for the radio work */
- for (i = 0; freqs[i]; i++)
- band |= wpas_freq_to_band(freqs[i]);
- } else {
- /*
- * freqs are not specified, implies all
- * the supported freqs by HW
- */
- for (i = 0; i < wpa_s->hw.num_modes; i++) {
- if (wpa_s->hw.modes[i].num_channels != 0) {
- if (wpa_s->hw.modes[i].mode ==
- HOSTAPD_MODE_IEEE80211B ||
- wpa_s->hw.modes[i].mode ==
- HOSTAPD_MODE_IEEE80211G)
- band |= BAND_2_4_GHZ;
- else if (wpa_s->hw.modes[i].mode ==
- HOSTAPD_MODE_IEEE80211A)
- band |= BAND_5_GHZ;
- else if (wpa_s->hw.modes[i].mode ==
- HOSTAPD_MODE_IEEE80211AD)
- band |= BAND_60_GHZ;
- else if (wpa_s->hw.modes[i].mode ==
- HOSTAPD_MODE_IEEE80211ANY)
- band = BAND_2_4_GHZ | BAND_5_GHZ |
- BAND_60_GHZ;
- }
- }
- }
- return band;
- }
- static struct wpa_radio * radio_add_interface(struct wpa_supplicant *wpa_s,
- const char *rn)
- {
- struct wpa_supplicant *iface = wpa_s->global->ifaces;
- struct wpa_radio *radio;
- while (rn && iface) {
- radio = iface->radio;
- if (radio && os_strcmp(rn, radio->name) == 0) {
- wpa_printf(MSG_DEBUG, "Add interface %s to existing radio %s",
- wpa_s->ifname, rn);
- dl_list_add(&radio->ifaces, &wpa_s->radio_list);
- return radio;
- }
- iface = iface->next;
- }
- wpa_printf(MSG_DEBUG, "Add interface %s to a new radio %s",
- wpa_s->ifname, rn ? rn : "N/A");
- radio = os_zalloc(sizeof(*radio));
- if (radio == NULL)
- return NULL;
- if (rn)
- os_strlcpy(radio->name, rn, sizeof(radio->name));
- dl_list_init(&radio->ifaces);
- dl_list_init(&radio->work);
- dl_list_add(&radio->ifaces, &wpa_s->radio_list);
- return radio;
- }
- static void radio_work_free(struct wpa_radio_work *work)
- {
- if (work->wpa_s->scan_work == work) {
- /* This should not really happen. */
- wpa_dbg(work->wpa_s, MSG_INFO, "Freeing radio work '%s'@%p (started=%d) that is marked as scan_work",
- work->type, work, work->started);
- work->wpa_s->scan_work = NULL;
- }
- #ifdef CONFIG_P2P
- if (work->wpa_s->p2p_scan_work == work) {
- /* This should not really happen. */
- wpa_dbg(work->wpa_s, MSG_INFO, "Freeing radio work '%s'@%p (started=%d) that is marked as p2p_scan_work",
- work->type, work, work->started);
- work->wpa_s->p2p_scan_work = NULL;
- }
- #endif /* CONFIG_P2P */
- if (work->started) {
- work->wpa_s->radio->num_active_works--;
- wpa_dbg(work->wpa_s, MSG_DEBUG,
- "radio_work_free('%s'@%p): num_active_works --> %u",
- work->type, work,
- work->wpa_s->radio->num_active_works);
- }
- dl_list_del(&work->list);
- os_free(work);
- }
- static int radio_work_is_connect(struct wpa_radio_work *work)
- {
- return os_strcmp(work->type, "sme-connect") == 0 ||
- os_strcmp(work->type, "connect") == 0;
- }
- static int radio_work_is_scan(struct wpa_radio_work *work)
- {
- return os_strcmp(work->type, "scan") == 0 ||
- os_strcmp(work->type, "p2p-scan") == 0;
- }
- static struct wpa_radio_work * radio_work_get_next_work(struct wpa_radio *radio)
- {
- struct wpa_radio_work *active_work = NULL;
- struct wpa_radio_work *tmp;
- /* Get the active work to know the type and band. */
- dl_list_for_each(tmp, &radio->work, struct wpa_radio_work, list) {
- if (tmp->started) {
- active_work = tmp;
- break;
- }
- }
- if (!active_work) {
- /* No active work, start one */
- radio->num_active_works = 0;
- dl_list_for_each(tmp, &radio->work, struct wpa_radio_work,
- list) {
- if (os_strcmp(tmp->type, "scan") == 0 &&
- radio->external_scan_running &&
- (((struct wpa_driver_scan_params *)
- tmp->ctx)->only_new_results ||
- tmp->wpa_s->clear_driver_scan_cache))
- continue;
- return tmp;
- }
- return NULL;
- }
- if (radio_work_is_connect(active_work)) {
- /*
- * If the active work is either connect or sme-connect,
- * do not parallelize them with other radio works.
- */
- wpa_dbg(active_work->wpa_s, MSG_DEBUG,
- "Do not parallelize radio work with %s",
- active_work->type);
- return NULL;
- }
- dl_list_for_each(tmp, &radio->work, struct wpa_radio_work, list) {
- if (tmp->started)
- continue;
- /*
- * If connect or sme-connect are enqueued, parallelize only
- * those operations ahead of them in the queue.
- */
- if (radio_work_is_connect(tmp))
- break;
- /* Serialize parallel scan and p2p_scan operations on the same
- * interface since the driver_nl80211 mechanism for tracking
- * scan cookies does not yet have support for this. */
- if (active_work->wpa_s == tmp->wpa_s &&
- radio_work_is_scan(active_work) &&
- radio_work_is_scan(tmp)) {
- wpa_dbg(active_work->wpa_s, MSG_DEBUG,
- "Do not start work '%s' when another work '%s' is already scheduled",
- tmp->type, active_work->type);
- continue;
- }
- /*
- * Check that the radio works are distinct and
- * on different bands.
- */
- if (os_strcmp(active_work->type, tmp->type) != 0 &&
- (active_work->bands != tmp->bands)) {
- /*
- * If a scan has to be scheduled through nl80211 scan
- * interface and if an external scan is already running,
- * do not schedule the scan since it is likely to get
- * rejected by kernel.
- */
- if (os_strcmp(tmp->type, "scan") == 0 &&
- radio->external_scan_running &&
- (((struct wpa_driver_scan_params *)
- tmp->ctx)->only_new_results ||
- tmp->wpa_s->clear_driver_scan_cache))
- continue;
- wpa_dbg(active_work->wpa_s, MSG_DEBUG,
- "active_work:%s new_work:%s",
- active_work->type, tmp->type);
- return tmp;
- }
- }
- /* Did not find a radio work to schedule in parallel. */
- return NULL;
- }
- static void radio_start_next_work(void *eloop_ctx, void *timeout_ctx)
- {
- struct wpa_radio *radio = eloop_ctx;
- struct wpa_radio_work *work;
- struct os_reltime now, diff;
- struct wpa_supplicant *wpa_s;
- work = dl_list_first(&radio->work, struct wpa_radio_work, list);
- if (work == NULL) {
- radio->num_active_works = 0;
- return;
- }
- wpa_s = dl_list_first(&radio->ifaces, struct wpa_supplicant,
- radio_list);
- if (!(wpa_s &&
- wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS)) {
- if (work->started)
- return; /* already started and still in progress */
- if (wpa_s && wpa_s->radio->external_scan_running) {
- wpa_printf(MSG_DEBUG, "Delay radio work start until externally triggered scan completes");
- return;
- }
- } else {
- work = NULL;
- if (radio->num_active_works < MAX_ACTIVE_WORKS) {
- /* get the work to schedule next */
- work = radio_work_get_next_work(radio);
- }
- if (!work)
- return;
- }
- wpa_s = work->wpa_s;
- os_get_reltime(&now);
- os_reltime_sub(&now, &work->time, &diff);
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Starting radio work '%s'@%p after %ld.%06ld second wait",
- work->type, work, diff.sec, diff.usec);
- work->started = 1;
- work->time = now;
- radio->num_active_works++;
- work->cb(work, 0);
- if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS) &&
- radio->num_active_works < MAX_ACTIVE_WORKS)
- radio_work_check_next(wpa_s);
- }
- /*
- * This function removes both started and pending radio works running on
- * the provided interface's radio.
- * Prior to the removal of the radio work, its callback (cb) is called with
- * deinit set to be 1. Each work's callback is responsible for clearing its
- * internal data and restoring to a correct state.
- * @wpa_s: wpa_supplicant data
- * @type: type of works to be removed
- * @remove_all: 1 to remove all the works on this radio, 0 to remove only
- * this interface's works.
- */
- void radio_remove_works(struct wpa_supplicant *wpa_s,
- const char *type, int remove_all)
- {
- struct wpa_radio_work *work, *tmp;
- struct wpa_radio *radio = wpa_s->radio;
- dl_list_for_each_safe(work, tmp, &radio->work, struct wpa_radio_work,
- list) {
- if (type && os_strcmp(type, work->type) != 0)
- continue;
- /* skip other ifaces' works */
- if (!remove_all && work->wpa_s != wpa_s)
- continue;
- wpa_dbg(wpa_s, MSG_DEBUG, "Remove radio work '%s'@%p%s",
- work->type, work, work->started ? " (started)" : "");
- work->cb(work, 1);
- radio_work_free(work);
- }
- /* in case we removed the started work */
- radio_work_check_next(wpa_s);
- }
- void radio_remove_pending_work(struct wpa_supplicant *wpa_s, void *ctx)
- {
- struct wpa_radio_work *work;
- struct wpa_radio *radio = wpa_s->radio;
- dl_list_for_each(work, &radio->work, struct wpa_radio_work, list) {
- if (work->ctx != ctx)
- continue;
- wpa_dbg(wpa_s, MSG_DEBUG, "Free pending radio work '%s'@%p%s",
- work->type, work, work->started ? " (started)" : "");
- radio_work_free(work);
- break;
- }
- }
- static void radio_remove_interface(struct wpa_supplicant *wpa_s)
- {
- struct wpa_radio *radio = wpa_s->radio;
- if (!radio)
- return;
- wpa_printf(MSG_DEBUG, "Remove interface %s from radio %s",
- wpa_s->ifname, radio->name);
- dl_list_del(&wpa_s->radio_list);
- radio_remove_works(wpa_s, NULL, 0);
- wpa_s->radio = NULL;
- if (!dl_list_empty(&radio->ifaces))
- return; /* Interfaces remain for this radio */
- wpa_printf(MSG_DEBUG, "Remove radio %s", radio->name);
- eloop_cancel_timeout(radio_start_next_work, radio, NULL);
- os_free(radio);
- }
- void radio_work_check_next(struct wpa_supplicant *wpa_s)
- {
- struct wpa_radio *radio = wpa_s->radio;
- if (dl_list_empty(&radio->work))
- return;
- if (wpa_s->ext_work_in_progress) {
- wpa_printf(MSG_DEBUG,
- "External radio work in progress - delay start of pending item");
- return;
- }
- eloop_cancel_timeout(radio_start_next_work, radio, NULL);
- eloop_register_timeout(0, 0, radio_start_next_work, radio, NULL);
- }
- /**
- * radio_add_work - Add a radio work item
- * @wpa_s: Pointer to wpa_supplicant data
- * @freq: Frequency of the offchannel operation in MHz or 0
- * @type: Unique identifier for each type of work
- * @next: Force as the next work to be executed
- * @cb: Callback function for indicating when radio is available
- * @ctx: Context pointer for the work (work->ctx in cb())
- * Returns: 0 on success, -1 on failure
- *
- * This function is used to request time for an operation that requires
- * exclusive radio control. Once the radio is available, the registered callback
- * function will be called. radio_work_done() must be called once the exclusive
- * radio operation has been completed, so that the radio is freed for other
- * operations. The special case of deinit=1 is used to free the context data
- * during interface removal. That does not allow the callback function to start
- * the radio operation, i.e., it must free any resources allocated for the radio
- * work and return.
- *
- * The @freq parameter can be used to indicate a single channel on which the
- * offchannel operation will occur. This may allow multiple radio work
- * operations to be performed in parallel if they apply for the same channel.
- * Setting this to 0 indicates that the work item may use multiple channels or
- * requires exclusive control of the radio.
- */
- int radio_add_work(struct wpa_supplicant *wpa_s, unsigned int freq,
- const char *type, int next,
- void (*cb)(struct wpa_radio_work *work, int deinit),
- void *ctx)
- {
- struct wpa_radio *radio = wpa_s->radio;
- struct wpa_radio_work *work;
- int was_empty;
- work = os_zalloc(sizeof(*work));
- if (work == NULL)
- return -1;
- wpa_dbg(wpa_s, MSG_DEBUG, "Add radio work '%s'@%p", type, work);
- os_get_reltime(&work->time);
- work->freq = freq;
- work->type = type;
- work->wpa_s = wpa_s;
- work->cb = cb;
- work->ctx = ctx;
- if (freq)
- work->bands = wpas_freq_to_band(freq);
- else if (os_strcmp(type, "scan") == 0 ||
- os_strcmp(type, "p2p-scan") == 0)
- work->bands = wpas_get_bands(wpa_s,
- ((struct wpa_driver_scan_params *)
- ctx)->freqs);
- else
- work->bands = wpas_get_bands(wpa_s, NULL);
- was_empty = dl_list_empty(&wpa_s->radio->work);
- if (next)
- dl_list_add(&wpa_s->radio->work, &work->list);
- else
- dl_list_add_tail(&wpa_s->radio->work, &work->list);
- if (was_empty) {
- wpa_dbg(wpa_s, MSG_DEBUG, "First radio work item in the queue - schedule start immediately");
- radio_work_check_next(wpa_s);
- } else if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS)
- && radio->num_active_works < MAX_ACTIVE_WORKS) {
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Try to schedule a radio work (num_active_works=%u)",
- radio->num_active_works);
- radio_work_check_next(wpa_s);
- }
- return 0;
- }
- /**
- * radio_work_done - Indicate that a radio work item has been completed
- * @work: Completed work
- *
- * This function is called once the callback function registered with
- * radio_add_work() has completed its work.
- */
- void radio_work_done(struct wpa_radio_work *work)
- {
- struct wpa_supplicant *wpa_s = work->wpa_s;
- struct os_reltime now, diff;
- unsigned int started = work->started;
- os_get_reltime(&now);
- os_reltime_sub(&now, &work->time, &diff);
- wpa_dbg(wpa_s, MSG_DEBUG, "Radio work '%s'@%p %s in %ld.%06ld seconds",
- work->type, work, started ? "done" : "canceled",
- diff.sec, diff.usec);
- radio_work_free(work);
- if (started)
- radio_work_check_next(wpa_s);
- }
- struct wpa_radio_work *
- radio_work_pending(struct wpa_supplicant *wpa_s, const char *type)
- {
- struct wpa_radio_work *work;
- struct wpa_radio *radio = wpa_s->radio;
- dl_list_for_each(work, &radio->work, struct wpa_radio_work, list) {
- if (work->wpa_s == wpa_s && os_strcmp(work->type, type) == 0)
- return work;
- }
- return NULL;
- }
- static int wpas_init_driver(struct wpa_supplicant *wpa_s,
- struct wpa_interface *iface)
- {
- const char *ifname, *driver, *rn;
- driver = iface->driver;
- next_driver:
- if (wpa_supplicant_set_driver(wpa_s, driver) < 0)
- return -1;
- wpa_s->drv_priv = wpa_drv_init(wpa_s, wpa_s->ifname);
- if (wpa_s->drv_priv == NULL) {
- const char *pos;
- pos = driver ? os_strchr(driver, ',') : NULL;
- if (pos) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize "
- "driver interface - try next driver wrapper");
- driver = pos + 1;
- goto next_driver;
- }
- wpa_msg(wpa_s, MSG_ERROR, "Failed to initialize driver "
- "interface");
- return -1;
- }
- if (wpa_drv_set_param(wpa_s, wpa_s->conf->driver_param) < 0) {
- wpa_msg(wpa_s, MSG_ERROR, "Driver interface rejected "
- "driver_param '%s'", wpa_s->conf->driver_param);
- return -1;
- }
- ifname = wpa_drv_get_ifname(wpa_s);
- if (ifname && os_strcmp(ifname, wpa_s->ifname) != 0) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Driver interface replaced "
- "interface name with '%s'", ifname);
- os_strlcpy(wpa_s->ifname, ifname, sizeof(wpa_s->ifname));
- }
- rn = wpa_driver_get_radio_name(wpa_s);
- if (rn && rn[0] == '\0')
- rn = NULL;
- wpa_s->radio = radio_add_interface(wpa_s, rn);
- if (wpa_s->radio == NULL)
- return -1;
- return 0;
- }
- #ifdef CONFIG_GAS_SERVER
- static void wpas_gas_server_tx_status(struct wpa_supplicant *wpa_s,
- unsigned int freq, const u8 *dst,
- const u8 *src, const u8 *bssid,
- const u8 *data, size_t data_len,
- enum offchannel_send_action_result result)
- {
- wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
- " result=%s",
- freq, MAC2STR(dst),
- result == OFFCHANNEL_SEND_ACTION_SUCCESS ? "SUCCESS" :
- (result == OFFCHANNEL_SEND_ACTION_NO_ACK ? "no-ACK" :
- "FAILED"));
- gas_server_tx_status(wpa_s->gas_server, dst, data, data_len,
- result == OFFCHANNEL_SEND_ACTION_SUCCESS);
- }
- static void wpas_gas_server_tx(void *ctx, int freq, const u8 *da,
- struct wpabuf *buf, unsigned int wait_time)
- {
- struct wpa_supplicant *wpa_s = ctx;
- const u8 broadcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
- if (wait_time > wpa_s->max_remain_on_chan)
- wait_time = wpa_s->max_remain_on_chan;
- offchannel_send_action(wpa_s, freq, da, wpa_s->own_addr, broadcast,
- wpabuf_head(buf), wpabuf_len(buf),
- wait_time, wpas_gas_server_tx_status, 0);
- }
- #endif /* CONFIG_GAS_SERVER */
- static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
- struct wpa_interface *iface)
- {
- struct wpa_driver_capa capa;
- int capa_res;
- u8 dfs_domain;
- wpa_printf(MSG_DEBUG, "Initializing interface '%s' conf '%s' driver "
- "'%s' ctrl_interface '%s' bridge '%s'", iface->ifname,
- iface->confname ? iface->confname : "N/A",
- iface->driver ? iface->driver : "default",
- iface->ctrl_interface ? iface->ctrl_interface : "N/A",
- iface->bridge_ifname ? iface->bridge_ifname : "N/A");
- if (iface->confname) {
- #ifdef CONFIG_BACKEND_FILE
- wpa_s->confname = os_rel2abs_path(iface->confname);
- if (wpa_s->confname == NULL) {
- wpa_printf(MSG_ERROR, "Failed to get absolute path "
- "for configuration file '%s'.",
- iface->confname);
- return -1;
- }
- wpa_printf(MSG_DEBUG, "Configuration file '%s' -> '%s'",
- iface->confname, wpa_s->confname);
- #else /* CONFIG_BACKEND_FILE */
- wpa_s->confname = os_strdup(iface->confname);
- #endif /* CONFIG_BACKEND_FILE */
- wpa_s->conf = wpa_config_read(wpa_s->confname, NULL);
- if (wpa_s->conf == NULL) {
- wpa_printf(MSG_ERROR, "Failed to read or parse "
- "configuration '%s'.", wpa_s->confname);
- return -1;
- }
- wpa_s->confanother = os_rel2abs_path(iface->confanother);
- if (wpa_s->confanother &&
- !wpa_config_read(wpa_s->confanother, wpa_s->conf)) {
- wpa_printf(MSG_ERROR,
- "Failed to read or parse configuration '%s'.",
- wpa_s->confanother);
- return -1;
- }
- /*
- * Override ctrl_interface and driver_param if set on command
- * line.
- */
- if (iface->ctrl_interface) {
- os_free(wpa_s->conf->ctrl_interface);
- wpa_s->conf->ctrl_interface =
- os_strdup(iface->ctrl_interface);
- }
- if (iface->driver_param) {
- os_free(wpa_s->conf->driver_param);
- wpa_s->conf->driver_param =
- os_strdup(iface->driver_param);
- }
- if (iface->p2p_mgmt && !iface->ctrl_interface) {
- os_free(wpa_s->conf->ctrl_interface);
- wpa_s->conf->ctrl_interface = NULL;
- }
- } else
- wpa_s->conf = wpa_config_alloc_empty(iface->ctrl_interface,
- iface->driver_param);
- if (wpa_s->conf == NULL) {
- wpa_printf(MSG_ERROR, "\nNo configuration found.");
- return -1;
- }
- if (iface->ifname == NULL) {
- wpa_printf(MSG_ERROR, "\nInterface name is required.");
- return -1;
- }
- if (os_strlen(iface->ifname) >= sizeof(wpa_s->ifname)) {
- wpa_printf(MSG_ERROR, "\nToo long interface name '%s'.",
- iface->ifname);
- return -1;
- }
- os_strlcpy(wpa_s->ifname, iface->ifname, sizeof(wpa_s->ifname));
- if (iface->bridge_ifname) {
- if (os_strlen(iface->bridge_ifname) >=
- sizeof(wpa_s->bridge_ifname)) {
- wpa_printf(MSG_ERROR, "\nToo long bridge interface "
- "name '%s'.", iface->bridge_ifname);
- return -1;
- }
- os_strlcpy(wpa_s->bridge_ifname, iface->bridge_ifname,
- sizeof(wpa_s->bridge_ifname));
- }
- /* RSNA Supplicant Key Management - INITIALIZE */
- eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
- eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
- /* Initialize driver interface and register driver event handler before
- * L2 receive handler so that association events are processed before
- * EAPOL-Key packets if both become available for the same select()
- * call. */
- if (wpas_init_driver(wpa_s, iface) < 0)
- return -1;
- if (wpa_supplicant_init_wpa(wpa_s) < 0)
- return -1;
- wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname,
- wpa_s->bridge_ifname[0] ? wpa_s->bridge_ifname :
- NULL);
- wpa_sm_set_fast_reauth(wpa_s->wpa, wpa_s->conf->fast_reauth);
- if (wpa_s->conf->dot11RSNAConfigPMKLifetime &&
- wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME,
- wpa_s->conf->dot11RSNAConfigPMKLifetime)) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
- "dot11RSNAConfigPMKLifetime");
- return -1;
- }
- if (wpa_s->conf->dot11RSNAConfigPMKReauthThreshold &&
- wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD,
- wpa_s->conf->dot11RSNAConfigPMKReauthThreshold)) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
- "dot11RSNAConfigPMKReauthThreshold");
- return -1;
- }
- if (wpa_s->conf->dot11RSNAConfigSATimeout &&
- wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT,
- wpa_s->conf->dot11RSNAConfigSATimeout)) {
- wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
- "dot11RSNAConfigSATimeout");
- return -1;
- }
- wpa_s->hw.modes = wpa_drv_get_hw_feature_data(wpa_s,
- &wpa_s->hw.num_modes,
- &wpa_s->hw.flags,
- &dfs_domain);
- if (wpa_s->hw.modes) {
- u16 i;
- for (i = 0; i < wpa_s->hw.num_modes; i++) {
- if (wpa_s->hw.modes[i].vht_capab) {
- wpa_s->hw_capab = CAPAB_VHT;
- break;
- }
- if (wpa_s->hw.modes[i].ht_capab &
- HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET)
- wpa_s->hw_capab = CAPAB_HT40;
- else if (wpa_s->hw.modes[i].ht_capab &&
- wpa_s->hw_capab == CAPAB_NO_HT_VHT)
- wpa_s->hw_capab = CAPAB_HT;
- }
- }
- capa_res = wpa_drv_get_capa(wpa_s, &capa);
- if (capa_res == 0) {
- wpa_s->drv_capa_known = 1;
- wpa_s->drv_flags = capa.flags;
- wpa_s->drv_enc = capa.enc;
- wpa_s->drv_smps_modes = capa.smps_modes;
- wpa_s->drv_rrm_flags = capa.rrm_flags;
- wpa_s->probe_resp_offloads = capa.probe_resp_offloads;
- wpa_s->max_scan_ssids = capa.max_scan_ssids;
- wpa_s->max_sched_scan_ssids = capa.max_sched_scan_ssids;
- wpa_s->max_sched_scan_plans = capa.max_sched_scan_plans;
- wpa_s->max_sched_scan_plan_interval =
- capa.max_sched_scan_plan_interval;
- wpa_s->max_sched_scan_plan_iterations =
- capa.max_sched_scan_plan_iterations;
- wpa_s->sched_scan_supported = capa.sched_scan_supported;
- wpa_s->max_match_sets = capa.max_match_sets;
- wpa_s->max_remain_on_chan = capa.max_remain_on_chan;
- wpa_s->max_stations = capa.max_stations;
- wpa_s->extended_capa = capa.extended_capa;
- wpa_s->extended_capa_mask = capa.extended_capa_mask;
- wpa_s->extended_capa_len = capa.extended_capa_len;
- wpa_s->num_multichan_concurrent =
- capa.num_multichan_concurrent;
- wpa_s->wmm_ac_supported = capa.wmm_ac_supported;
- if (capa.mac_addr_rand_scan_supported)
- wpa_s->mac_addr_rand_supported |= MAC_ADDR_RAND_SCAN;
- if (wpa_s->sched_scan_supported &&
- capa.mac_addr_rand_sched_scan_supported)
- wpa_s->mac_addr_rand_supported |=
- (MAC_ADDR_RAND_SCHED_SCAN | MAC_ADDR_RAND_PNO);
- }
- if (wpa_s->max_remain_on_chan == 0)
- wpa_s->max_remain_on_chan = 1000;
- /*
- * Only take p2p_mgmt parameters when P2P Device is supported.
- * Doing it here as it determines whether l2_packet_init() will be done
- * during wpa_supplicant_driver_init().
- */
- if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)
- wpa_s->p2p_mgmt = iface->p2p_mgmt;
- else
- iface->p2p_mgmt = 1;
- if (wpa_s->num_multichan_concurrent == 0)
- wpa_s->num_multichan_concurrent = 1;
- if (wpa_supplicant_driver_init(wpa_s) < 0)
- return -1;
- #ifdef CONFIG_TDLS
- if ((!iface->p2p_mgmt ||
- !(wpa_s->drv_flags &
- WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)) &&
- wpa_tdls_init(wpa_s->wpa))
- return -1;
- #endif /* CONFIG_TDLS */
- if (wpa_s->conf->country[0] && wpa_s->conf->country[1] &&
- wpa_drv_set_country(wpa_s, wpa_s->conf->country)) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Failed to set country");
- return -1;
- }
- #ifdef CONFIG_FST
- if (wpa_s->conf->fst_group_id) {
- struct fst_iface_cfg cfg;
- struct fst_wpa_obj iface_obj;
- fst_wpa_supplicant_fill_iface_obj(wpa_s, &iface_obj);
- os_strlcpy(cfg.group_id, wpa_s->conf->fst_group_id,
- sizeof(cfg.group_id));
- cfg.priority = wpa_s->conf->fst_priority;
- cfg.llt = wpa_s->conf->fst_llt;
- wpa_s->fst = fst_attach(wpa_s->ifname, wpa_s->own_addr,
- &iface_obj, &cfg);
- if (!wpa_s->fst) {
- wpa_msg(wpa_s, MSG_ERROR,
- "FST: Cannot attach iface %s to group %s",
- wpa_s->ifname, cfg.group_id);
- return -1;
- }
- }
- #endif /* CONFIG_FST */
- if (wpas_wps_init(wpa_s))
- return -1;
- #ifdef CONFIG_GAS_SERVER
- wpa_s->gas_server = gas_server_init(wpa_s, wpas_gas_server_tx);
- if (!wpa_s->gas_server) {
- wpa_printf(MSG_ERROR, "Failed to initialize GAS server");
- return -1;
- }
- #endif /* CONFIG_GAS_SERVER */
- #ifdef CONFIG_DPP
- if (wpas_dpp_init(wpa_s) < 0)
- return -1;
- #endif /* CONFIG_DPP */
- if (wpa_supplicant_init_eapol(wpa_s) < 0)
- return -1;
- wpa_sm_set_eapol(wpa_s->wpa, wpa_s->eapol);
- wpa_s->ctrl_iface = wpa_supplicant_ctrl_iface_init(wpa_s);
- if (wpa_s->ctrl_iface == NULL) {
- wpa_printf(MSG_ERROR,
- "Failed to initialize control interface '%s'.\n"
- "You may have another wpa_supplicant process "
- "already running or the file was\n"
- "left by an unclean termination of wpa_supplicant "
- "in which case you will need\n"
- "to manually remove this file before starting "
- "wpa_supplicant again.\n",
- wpa_s->conf->ctrl_interface);
- return -1;
- }
- wpa_s->gas = gas_query_init(wpa_s);
- if (wpa_s->gas == NULL) {
- wpa_printf(MSG_ERROR, "Failed to initialize GAS query");
- return -1;
- }
- if (iface->p2p_mgmt && wpas_p2p_init(wpa_s->global, wpa_s) < 0) {
- wpa_msg(wpa_s, MSG_ERROR, "Failed to init P2P");
- return -1;
- }
- if (wpa_bss_init(wpa_s) < 0)
- return -1;
- #ifdef CONFIG_PMKSA_CACHE_EXTERNAL
- #ifdef CONFIG_MESH
- dl_list_init(&wpa_s->mesh_external_pmksa_cache);
- #endif /* CONFIG_MESH */
- #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
- /*
- * Set Wake-on-WLAN triggers, if configured.
- * Note: We don't restore/remove the triggers on shutdown (it doesn't
- * have effect anyway when the interface is down).
- */
- if (capa_res == 0 && wpas_set_wowlan_triggers(wpa_s, &capa) < 0)
- return -1;
- #ifdef CONFIG_EAP_PROXY
- {
- size_t len;
- wpa_s->mnc_len = eapol_sm_get_eap_proxy_imsi(wpa_s->eapol, -1,
- wpa_s->imsi, &len);
- if (wpa_s->mnc_len > 0) {
- wpa_s->imsi[len] = '\0';
- wpa_printf(MSG_DEBUG, "eap_proxy: IMSI %s (MNC length %d)",
- wpa_s->imsi, wpa_s->mnc_len);
- } else {
- wpa_printf(MSG_DEBUG, "eap_proxy: IMSI not available");
- }
- }
- #endif /* CONFIG_EAP_PROXY */
- if (pcsc_reader_init(wpa_s) < 0)
- return -1;
- if (wpas_init_ext_pw(wpa_s) < 0)
- return -1;
- wpas_rrm_reset(wpa_s);
- wpas_sched_scan_plans_set(wpa_s, wpa_s->conf->sched_scan_plans);
- #ifdef CONFIG_HS20
- hs20_init(wpa_s);
- #endif /* CONFIG_HS20 */
- #ifdef CONFIG_MBO
- if (wpa_s->conf->oce) {
- if ((wpa_s->conf->oce & OCE_STA) &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OCE_STA))
- wpa_s->enable_oce = OCE_STA;
- if ((wpa_s->conf->oce & OCE_STA_CFON) &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OCE_STA_CFON)) {
- /* TODO: Need to add STA-CFON support */
- wpa_printf(MSG_ERROR,
- "OCE STA-CFON feature is not yet supported");
- }
- }
- wpas_mbo_update_non_pref_chan(wpa_s, wpa_s->conf->non_pref_chan);
- #endif /* CONFIG_MBO */
- wpa_supplicant_set_default_scan_ies(wpa_s);
- return 0;
- }
- static void wpa_supplicant_deinit_iface(struct wpa_supplicant *wpa_s,
- int notify, int terminate)
- {
- struct wpa_global *global = wpa_s->global;
- struct wpa_supplicant *iface, *prev;
- if (wpa_s == wpa_s->parent)
- wpas_p2p_group_remove(wpa_s, "*");
- iface = global->ifaces;
- while (iface) {
- if (iface->p2pdev == wpa_s)
- iface->p2pdev = iface->parent;
- if (iface == wpa_s || iface->parent != wpa_s) {
- iface = iface->next;
- continue;
- }
- wpa_printf(MSG_DEBUG,
- "Remove remaining child interface %s from parent %s",
- iface->ifname, wpa_s->ifname);
- prev = iface;
- iface = iface->next;
- wpa_supplicant_remove_iface(global, prev, terminate);
- }
- wpa_s->disconnected = 1;
- if (wpa_s->drv_priv) {
- wpa_supplicant_deauthenticate(wpa_s,
- WLAN_REASON_DEAUTH_LEAVING);
- wpa_drv_set_countermeasures(wpa_s, 0);
- wpa_clear_keys(wpa_s, NULL);
- }
- wpa_supplicant_cleanup(wpa_s);
- wpas_p2p_deinit_iface(wpa_s);
- wpas_ctrl_radio_work_flush(wpa_s);
- radio_remove_interface(wpa_s);
- #ifdef CONFIG_FST
- if (wpa_s->fst) {
- fst_detach(wpa_s->fst);
- wpa_s->fst = NULL;
- }
- if (wpa_s->received_mb_ies) {
- wpabuf_free(wpa_s->received_mb_ies);
- wpa_s->received_mb_ies = NULL;
- }
- #endif /* CONFIG_FST */
- if (wpa_s->drv_priv)
- wpa_drv_deinit(wpa_s);
- if (notify)
- wpas_notify_iface_removed(wpa_s);
- if (terminate)
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_TERMINATING);
- if (wpa_s->ctrl_iface) {
- wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface);
- wpa_s->ctrl_iface = NULL;
- }
- #ifdef CONFIG_MESH
- if (wpa_s->ifmsh) {
- wpa_supplicant_mesh_iface_deinit(wpa_s, wpa_s->ifmsh);
- wpa_s->ifmsh = NULL;
- }
- #endif /* CONFIG_MESH */
- if (wpa_s->conf != NULL) {
- wpa_config_free(wpa_s->conf);
- wpa_s->conf = NULL;
- }
- os_free(wpa_s->ssids_from_scan_req);
- os_free(wpa_s);
- }
- #ifdef CONFIG_MATCH_IFACE
- /**
- * wpa_supplicant_match_iface - Match an interface description to a name
- * @global: Pointer to global data from wpa_supplicant_init()
- * @ifname: Name of the interface to match
- * Returns: Pointer to the created interface description or %NULL on failure
- */
- struct wpa_interface * wpa_supplicant_match_iface(struct wpa_global *global,
- const char *ifname)
- {
- int i;
- struct wpa_interface *iface, *miface;
- for (i = 0; i < global->params.match_iface_count; i++) {
- miface = &global->params.match_ifaces[i];
- if (!miface->ifname ||
- fnmatch(miface->ifname, ifname, 0) == 0) {
- iface = os_zalloc(sizeof(*iface));
- if (!iface)
- return NULL;
- *iface = *miface;
- iface->ifname = ifname;
- return iface;
- }
- }
- return NULL;
- }
- /**
- * wpa_supplicant_match_existing - Match existing interfaces
- * @global: Pointer to global data from wpa_supplicant_init()
- * Returns: 0 on success, -1 on failure
- */
- static int wpa_supplicant_match_existing(struct wpa_global *global)
- {
- struct if_nameindex *ifi, *ifp;
- struct wpa_supplicant *wpa_s;
- struct wpa_interface *iface;
- ifp = if_nameindex();
- if (!ifp) {
- wpa_printf(MSG_ERROR, "if_nameindex: %s", strerror(errno));
- return -1;
- }
- for (ifi = ifp; ifi->if_name; ifi++) {
- wpa_s = wpa_supplicant_get_iface(global, ifi->if_name);
- if (wpa_s)
- continue;
- iface = wpa_supplicant_match_iface(global, ifi->if_name);
- if (iface) {
- wpa_s = wpa_supplicant_add_iface(global, iface, NULL);
- os_free(iface);
- if (wpa_s)
- wpa_s->matched = 1;
- }
- }
- if_freenameindex(ifp);
- return 0;
- }
- #endif /* CONFIG_MATCH_IFACE */
- /**
- * wpa_supplicant_add_iface - Add a new network interface
- * @global: Pointer to global data from wpa_supplicant_init()
- * @iface: Interface configuration options
- * @parent: Parent interface or %NULL to assign new interface as parent
- * Returns: Pointer to the created interface or %NULL on failure
- *
- * This function is used to add new network interfaces for %wpa_supplicant.
- * This can be called before wpa_supplicant_run() to add interfaces before the
- * main event loop has been started. In addition, new interfaces can be added
- * dynamically while %wpa_supplicant is already running. This could happen,
- * e.g., when a hotplug network adapter is inserted.
- */
- struct wpa_supplicant * wpa_supplicant_add_iface(struct wpa_global *global,
- struct wpa_interface *iface,
- struct wpa_supplicant *parent)
- {
- struct wpa_supplicant *wpa_s;
- struct wpa_interface t_iface;
- struct wpa_ssid *ssid;
- if (global == NULL || iface == NULL)
- return NULL;
- wpa_s = wpa_supplicant_alloc(parent);
- if (wpa_s == NULL)
- return NULL;
- wpa_s->global = global;
- t_iface = *iface;
- if (global->params.override_driver) {
- wpa_printf(MSG_DEBUG, "Override interface parameter: driver "
- "('%s' -> '%s')",
- iface->driver, global->params.override_driver);
- t_iface.driver = global->params.override_driver;
- }
- if (global->params.override_ctrl_interface) {
- wpa_printf(MSG_DEBUG, "Override interface parameter: "
- "ctrl_interface ('%s' -> '%s')",
- iface->ctrl_interface,
- global->params.override_ctrl_interface);
- t_iface.ctrl_interface =
- global->params.override_ctrl_interface;
- }
- if (wpa_supplicant_init_iface(wpa_s, &t_iface)) {
- wpa_printf(MSG_DEBUG, "Failed to add interface %s",
- iface->ifname);
- wpa_supplicant_deinit_iface(wpa_s, 0, 0);
- return NULL;
- }
- if (iface->p2p_mgmt == 0) {
- /* Notify the control interfaces about new iface */
- if (wpas_notify_iface_added(wpa_s)) {
- wpa_supplicant_deinit_iface(wpa_s, 1, 0);
- return NULL;
- }
- for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
- wpas_notify_network_added(wpa_s, ssid);
- }
- wpa_s->next = global->ifaces;
- global->ifaces = wpa_s;
- wpa_dbg(wpa_s, MSG_DEBUG, "Added interface %s", wpa_s->ifname);
- wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
- #ifdef CONFIG_P2P
- if (wpa_s->global->p2p == NULL &&
- !wpa_s->global->p2p_disabled && !wpa_s->conf->p2p_disabled &&
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE) &&
- wpas_p2p_add_p2pdev_interface(
- wpa_s, wpa_s->global->params.conf_p2p_dev) < 0) {
- wpa_printf(MSG_INFO,
- "P2P: Failed to enable P2P Device interface");
- /* Try to continue without. P2P will be disabled. */
- }
- #endif /* CONFIG_P2P */
- return wpa_s;
- }
- /**
- * wpa_supplicant_remove_iface - Remove a network interface
- * @global: Pointer to global data from wpa_supplicant_init()
- * @wpa_s: Pointer to the network interface to be removed
- * Returns: 0 if interface was removed, -1 if interface was not found
- *
- * This function can be used to dynamically remove network interfaces from
- * %wpa_supplicant, e.g., when a hotplug network adapter is ejected. In
- * addition, this function is used to remove all remaining interfaces when
- * %wpa_supplicant is terminated.
- */
- int wpa_supplicant_remove_iface(struct wpa_global *global,
- struct wpa_supplicant *wpa_s,
- int terminate)
- {
- struct wpa_supplicant *prev;
- #ifdef CONFIG_MESH
- unsigned int mesh_if_created = wpa_s->mesh_if_created;
- char *ifname = NULL;
- struct wpa_supplicant *parent = wpa_s->parent;
- #endif /* CONFIG_MESH */
- /* Remove interface from the global list of interfaces */
- prev = global->ifaces;
- if (prev == wpa_s) {
- global->ifaces = wpa_s->next;
- } else {
- while (prev && prev->next != wpa_s)
- prev = prev->next;
- if (prev == NULL)
- return -1;
- prev->next = wpa_s->next;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "Removing interface %s", wpa_s->ifname);
- #ifdef CONFIG_MESH
- if (mesh_if_created) {
- ifname = os_strdup(wpa_s->ifname);
- if (ifname == NULL) {
- wpa_dbg(wpa_s, MSG_ERROR,
- "mesh: Failed to malloc ifname");
- return -1;
- }
- }
- #endif /* CONFIG_MESH */
- if (global->p2p_group_formation == wpa_s)
- global->p2p_group_formation = NULL;
- if (global->p2p_invite_group == wpa_s)
- global->p2p_invite_group = NULL;
- wpa_supplicant_deinit_iface(wpa_s, 1, terminate);
- #ifdef CONFIG_MESH
- if (mesh_if_created) {
- wpa_drv_if_remove(parent, WPA_IF_MESH, ifname);
- os_free(ifname);
- }
- #endif /* CONFIG_MESH */
- return 0;
- }
- /**
- * wpa_supplicant_get_eap_mode - Get the current EAP mode
- * @wpa_s: Pointer to the network interface
- * Returns: Pointer to the eap mode or the string "UNKNOWN" if not found
- */
- const char * wpa_supplicant_get_eap_mode(struct wpa_supplicant *wpa_s)
- {
- const char *eapol_method;
- if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) == 0 &&
- wpa_s->key_mgmt != WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
- return "NO-EAP";
- }
- eapol_method = eapol_sm_get_method_name(wpa_s->eapol);
- if (eapol_method == NULL)
- return "UNKNOWN-EAP";
- return eapol_method;
- }
- /**
- * wpa_supplicant_get_iface - Get a new network interface
- * @global: Pointer to global data from wpa_supplicant_init()
- * @ifname: Interface name
- * Returns: Pointer to the interface or %NULL if not found
- */
- struct wpa_supplicant * wpa_supplicant_get_iface(struct wpa_global *global,
- const char *ifname)
- {
- struct wpa_supplicant *wpa_s;
- for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
- if (os_strcmp(wpa_s->ifname, ifname) == 0)
- return wpa_s;
- }
- return NULL;
- }
- #ifndef CONFIG_NO_WPA_MSG
- static const char * wpa_supplicant_msg_ifname_cb(void *ctx)
- {
- struct wpa_supplicant *wpa_s = ctx;
- if (wpa_s == NULL)
- return NULL;
- return wpa_s->ifname;
- }
- #endif /* CONFIG_NO_WPA_MSG */
- #ifndef WPA_SUPPLICANT_CLEANUP_INTERVAL
- #define WPA_SUPPLICANT_CLEANUP_INTERVAL 10
- #endif /* WPA_SUPPLICANT_CLEANUP_INTERVAL */
- /* Periodic cleanup tasks */
- static void wpas_periodic(void *eloop_ctx, void *timeout_ctx)
- {
- struct wpa_global *global = eloop_ctx;
- struct wpa_supplicant *wpa_s;
- eloop_register_timeout(WPA_SUPPLICANT_CLEANUP_INTERVAL, 0,
- wpas_periodic, global, NULL);
- #ifdef CONFIG_P2P
- if (global->p2p)
- p2p_expire_peers(global->p2p);
- #endif /* CONFIG_P2P */
- for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
- wpa_bss_flush_by_age(wpa_s, wpa_s->conf->bss_expiration_age);
- #ifdef CONFIG_AP
- ap_periodic(wpa_s);
- #endif /* CONFIG_AP */
- }
- }
- /**
- * wpa_supplicant_init - Initialize %wpa_supplicant
- * @params: Parameters for %wpa_supplicant
- * Returns: Pointer to global %wpa_supplicant data, or %NULL on failure
- *
- * This function is used to initialize %wpa_supplicant. After successful
- * initialization, the returned data pointer can be used to add and remove
- * network interfaces, and eventually, to deinitialize %wpa_supplicant.
- */
- struct wpa_global * wpa_supplicant_init(struct wpa_params *params)
- {
- struct wpa_global *global;
- int ret, i;
- if (params == NULL)
- return NULL;
- #ifdef CONFIG_DRIVER_NDIS
- {
- void driver_ndis_init_ops(void);
- driver_ndis_init_ops();
- }
- #endif /* CONFIG_DRIVER_NDIS */
- #ifndef CONFIG_NO_WPA_MSG
- wpa_msg_register_ifname_cb(wpa_supplicant_msg_ifname_cb);
- #endif /* CONFIG_NO_WPA_MSG */
- if (params->wpa_debug_file_path)
- wpa_debug_open_file(params->wpa_debug_file_path);
- else
- wpa_debug_setup_stdout();
- if (params->wpa_debug_syslog)
- wpa_debug_open_syslog();
- if (params->wpa_debug_tracing) {
- ret = wpa_debug_open_linux_tracing();
- if (ret) {
- wpa_printf(MSG_ERROR,
- "Failed to enable trace logging");
- return NULL;
- }
- }
- ret = eap_register_methods();
- if (ret) {
- wpa_printf(MSG_ERROR, "Failed to register EAP methods");
- if (ret == -2)
- wpa_printf(MSG_ERROR, "Two or more EAP methods used "
- "the same EAP type.");
- return NULL;
- }
- global = os_zalloc(sizeof(*global));
- if (global == NULL)
- return NULL;
- dl_list_init(&global->p2p_srv_bonjour);
- dl_list_init(&global->p2p_srv_upnp);
- global->params.daemonize = params->daemonize;
- global->params.wait_for_monitor = params->wait_for_monitor;
- global->params.dbus_ctrl_interface = params->dbus_ctrl_interface;
- if (params->pid_file)
- global->params.pid_file = os_strdup(params->pid_file);
- if (params->ctrl_interface)
- global->params.ctrl_interface =
- os_strdup(params->ctrl_interface);
- if (params->ctrl_interface_group)
- global->params.ctrl_interface_group =
- os_strdup(params->ctrl_interface_group);
- if (params->override_driver)
- global->params.override_driver =
- os_strdup(params->override_driver);
- if (params->override_ctrl_interface)
- global->params.override_ctrl_interface =
- os_strdup(params->override_ctrl_interface);
- #ifdef CONFIG_MATCH_IFACE
- global->params.match_iface_count = params->match_iface_count;
- if (params->match_iface_count) {
- global->params.match_ifaces =
- os_calloc(params->match_iface_count,
- sizeof(struct wpa_interface));
- os_memcpy(global->params.match_ifaces,
- params->match_ifaces,
- params->match_iface_count *
- sizeof(struct wpa_interface));
- }
- #endif /* CONFIG_MATCH_IFACE */
- #ifdef CONFIG_P2P
- if (params->conf_p2p_dev)
- global->params.conf_p2p_dev =
- os_strdup(params->conf_p2p_dev);
- #endif /* CONFIG_P2P */
- wpa_debug_level = global->params.wpa_debug_level =
- params->wpa_debug_level;
- wpa_debug_show_keys = global->params.wpa_debug_show_keys =
- params->wpa_debug_show_keys;
- wpa_debug_timestamp = global->params.wpa_debug_timestamp =
- params->wpa_debug_timestamp;
- wpa_printf(MSG_DEBUG, "wpa_supplicant v" VERSION_STR);
- if (eloop_init()) {
- wpa_printf(MSG_ERROR, "Failed to initialize event loop");
- wpa_supplicant_deinit(global);
- return NULL;
- }
- random_init(params->entropy_file);
- global->ctrl_iface = wpa_supplicant_global_ctrl_iface_init(global);
- if (global->ctrl_iface == NULL) {
- wpa_supplicant_deinit(global);
- return NULL;
- }
- if (wpas_notify_supplicant_initialized(global)) {
- wpa_supplicant_deinit(global);
- return NULL;
- }
- for (i = 0; wpa_drivers[i]; i++)
- global->drv_count++;
- if (global->drv_count == 0) {
- wpa_printf(MSG_ERROR, "No drivers enabled");
- wpa_supplicant_deinit(global);
- return NULL;
- }
- global->drv_priv = os_calloc(global->drv_count, sizeof(void *));
- if (global->drv_priv == NULL) {
- wpa_supplicant_deinit(global);
- return NULL;
- }
- #ifdef CONFIG_WIFI_DISPLAY
- if (wifi_display_init(global) < 0) {
- wpa_printf(MSG_ERROR, "Failed to initialize Wi-Fi Display");
- wpa_supplicant_deinit(global);
- return NULL;
- }
- #endif /* CONFIG_WIFI_DISPLAY */
- eloop_register_timeout(WPA_SUPPLICANT_CLEANUP_INTERVAL, 0,
- wpas_periodic, global, NULL);
- return global;
- }
- /**
- * wpa_supplicant_run - Run the %wpa_supplicant main event loop
- * @global: Pointer to global data from wpa_supplicant_init()
- * Returns: 0 after successful event loop run, -1 on failure
- *
- * This function starts the main event loop and continues running as long as
- * there are any remaining events. In most cases, this function is running as
- * long as the %wpa_supplicant process in still in use.
- */
- int wpa_supplicant_run(struct wpa_global *global)
- {
- struct wpa_supplicant *wpa_s;
- if (global->params.daemonize &&
- (wpa_supplicant_daemon(global->params.pid_file) ||
- eloop_sock_requeue()))
- return -1;
- #ifdef CONFIG_MATCH_IFACE
- if (wpa_supplicant_match_existing(global))
- return -1;
- #endif
- if (global->params.wait_for_monitor) {
- for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
- if (wpa_s->ctrl_iface && !wpa_s->p2p_mgmt)
- wpa_supplicant_ctrl_iface_wait(
- wpa_s->ctrl_iface);
- }
- eloop_register_signal_terminate(wpa_supplicant_terminate, global);
- eloop_register_signal_reconfig(wpa_supplicant_reconfig, global);
- eloop_run();
- return 0;
- }
- /**
- * wpa_supplicant_deinit - Deinitialize %wpa_supplicant
- * @global: Pointer to global data from wpa_supplicant_init()
- *
- * This function is called to deinitialize %wpa_supplicant and to free all
- * allocated resources. Remaining network interfaces will also be removed.
- */
- void wpa_supplicant_deinit(struct wpa_global *global)
- {
- int i;
- if (global == NULL)
- return;
- eloop_cancel_timeout(wpas_periodic, global, NULL);
- #ifdef CONFIG_WIFI_DISPLAY
- wifi_display_deinit(global);
- #endif /* CONFIG_WIFI_DISPLAY */
- while (global->ifaces)
- wpa_supplicant_remove_iface(global, global->ifaces, 1);
- if (global->ctrl_iface)
- wpa_supplicant_global_ctrl_iface_deinit(global->ctrl_iface);
- wpas_notify_supplicant_deinitialized(global);
- eap_peer_unregister_methods();
- #ifdef CONFIG_AP
- eap_server_unregister_methods();
- #endif /* CONFIG_AP */
- for (i = 0; wpa_drivers[i] && global->drv_priv; i++) {
- if (!global->drv_priv[i])
- continue;
- wpa_drivers[i]->global_deinit(global->drv_priv[i]);
- }
- os_free(global->drv_priv);
- random_deinit();
- eloop_destroy();
- if (global->params.pid_file) {
- os_daemonize_terminate(global->params.pid_file);
- os_free(global->params.pid_file);
- }
- os_free(global->params.ctrl_interface);
- os_free(global->params.ctrl_interface_group);
- os_free(global->params.override_driver);
- os_free(global->params.override_ctrl_interface);
- #ifdef CONFIG_MATCH_IFACE
- os_free(global->params.match_ifaces);
- #endif /* CONFIG_MATCH_IFACE */
- #ifdef CONFIG_P2P
- os_free(global->params.conf_p2p_dev);
- #endif /* CONFIG_P2P */
- os_free(global->p2p_disallow_freq.range);
- os_free(global->p2p_go_avoid_freq.range);
- os_free(global->add_psk);
- os_free(global);
- wpa_debug_close_syslog();
- wpa_debug_close_file();
- wpa_debug_close_linux_tracing();
- }
- void wpa_supplicant_update_config(struct wpa_supplicant *wpa_s)
- {
- if ((wpa_s->conf->changed_parameters & CFG_CHANGED_COUNTRY) &&
- wpa_s->conf->country[0] && wpa_s->conf->country[1]) {
- char country[3];
- country[0] = wpa_s->conf->country[0];
- country[1] = wpa_s->conf->country[1];
- country[2] = '\0';
- if (wpa_drv_set_country(wpa_s, country) < 0) {
- wpa_printf(MSG_ERROR, "Failed to set country code "
- "'%s'", country);
- }
- }
- if (wpa_s->conf->changed_parameters & CFG_CHANGED_EXT_PW_BACKEND)
- wpas_init_ext_pw(wpa_s);
- if (wpa_s->conf->changed_parameters & CFG_CHANGED_SCHED_SCAN_PLANS)
- wpas_sched_scan_plans_set(wpa_s, wpa_s->conf->sched_scan_plans);
- if (wpa_s->conf->changed_parameters & CFG_CHANGED_WOWLAN_TRIGGERS) {
- struct wpa_driver_capa capa;
- int res = wpa_drv_get_capa(wpa_s, &capa);
- if (res == 0 && wpas_set_wowlan_triggers(wpa_s, &capa) < 0)
- wpa_printf(MSG_ERROR,
- "Failed to update wowlan_triggers to '%s'",
- wpa_s->conf->wowlan_triggers);
- }
- #ifdef CONFIG_WPS
- wpas_wps_update_config(wpa_s);
- #endif /* CONFIG_WPS */
- wpas_p2p_update_config(wpa_s);
- wpa_s->conf->changed_parameters = 0;
- }
- void add_freq(int *freqs, int *num_freqs, int freq)
- {
- int i;
- for (i = 0; i < *num_freqs; i++) {
- if (freqs[i] == freq)
- return;
- }
- freqs[*num_freqs] = freq;
- (*num_freqs)++;
- }
- static int * get_bss_freqs_in_ess(struct wpa_supplicant *wpa_s)
- {
- struct wpa_bss *bss, *cbss;
- const int max_freqs = 10;
- int *freqs;
- int num_freqs = 0;
- freqs = os_calloc(max_freqs + 1, sizeof(int));
- if (freqs == NULL)
- return NULL;
- cbss = wpa_s->current_bss;
- dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
- if (bss == cbss)
- continue;
- if (bss->ssid_len == cbss->ssid_len &&
- os_memcmp(bss->ssid, cbss->ssid, bss->ssid_len) == 0 &&
- wpa_blacklist_get(wpa_s, bss->bssid) == NULL) {
- add_freq(freqs, &num_freqs, bss->freq);
- if (num_freqs == max_freqs)
- break;
- }
- }
- if (num_freqs == 0) {
- os_free(freqs);
- freqs = NULL;
- }
- return freqs;
- }
- void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
- {
- int timeout;
- int count;
- int *freqs = NULL;
- wpas_connect_work_done(wpa_s);
- /*
- * Remove possible authentication timeout since the connection failed.
- */
- eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
- /*
- * There is no point in blacklisting the AP if this event is
- * generated based on local request to disconnect.
- */
- if (wpa_s->own_disconnect_req) {
- wpa_s->own_disconnect_req = 0;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Ignore connection failure due to local request to disconnect");
- return;
- }
- if (wpa_s->disconnected) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Ignore connection failure "
- "indication since interface has been put into "
- "disconnected state");
- return;
- }
- /*
- * Add the failed BSSID into the blacklist and speed up next scan
- * attempt if there could be other APs that could accept association.
- * The current blacklist count indicates how many times we have tried
- * connecting to this AP and multiple attempts mean that other APs are
- * either not available or has already been tried, so that we can start
- * increasing the delay here to avoid constant scanning.
- */
- count = wpa_blacklist_add(wpa_s, bssid);
- if (count == 1 && wpa_s->current_bss) {
- /*
- * This BSS was not in the blacklist before. If there is
- * another BSS available for the same ESS, we should try that
- * next. Otherwise, we may as well try this one once more
- * before allowing other, likely worse, ESSes to be considered.
- */
- freqs = get_bss_freqs_in_ess(wpa_s);
- if (freqs) {
- wpa_dbg(wpa_s, MSG_DEBUG, "Another BSS in this ESS "
- "has been seen; try it next");
- wpa_blacklist_add(wpa_s, bssid);
- /*
- * On the next scan, go through only the known channels
- * used in this ESS based on previous scans to speed up
- * common load balancing use case.
- */
- os_free(wpa_s->next_scan_freqs);
- wpa_s->next_scan_freqs = freqs;
- }
- }
- /*
- * Add previous failure count in case the temporary blacklist was
- * cleared due to no other BSSes being available.
- */
- count += wpa_s->extra_blacklist_count;
- if (count > 3 && wpa_s->current_ssid) {
- wpa_printf(MSG_DEBUG, "Continuous association failures - "
- "consider temporary network disabling");
- wpas_auth_failed(wpa_s, "CONN_FAILED");
- }
- switch (count) {
- case 1:
- timeout = 100;
- break;
- case 2:
- timeout = 500;
- break;
- case 3:
- timeout = 1000;
- break;
- case 4:
- timeout = 5000;
- break;
- default:
- timeout = 10000;
- break;
- }
- wpa_dbg(wpa_s, MSG_DEBUG, "Blacklist count %d --> request scan in %d "
- "ms", count, timeout);
- /*
- * TODO: if more than one possible AP is available in scan results,
- * could try the other ones before requesting a new scan.
- */
- wpa_supplicant_req_scan(wpa_s, timeout / 1000,
- 1000 * (timeout % 1000));
- }
- int wpas_driver_bss_selection(struct wpa_supplicant *wpa_s)
- {
- return wpa_s->conf->ap_scan == 2 ||
- (wpa_s->drv_flags & WPA_DRIVER_FLAGS_BSS_SELECTION);
- }
- #if defined(CONFIG_CTRL_IFACE) || defined(CONFIG_CTRL_IFACE_DBUS_NEW)
- int wpa_supplicant_ctrl_iface_ctrl_rsp_handle(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid,
- const char *field,
- const char *value)
- {
- #ifdef IEEE8021X_EAPOL
- struct eap_peer_config *eap = &ssid->eap;
- wpa_printf(MSG_DEBUG, "CTRL_IFACE: response handle field=%s", field);
- wpa_hexdump_ascii_key(MSG_DEBUG, "CTRL_IFACE: response value",
- (const u8 *) value, os_strlen(value));
- switch (wpa_supplicant_ctrl_req_from_string(field)) {
- case WPA_CTRL_REQ_EAP_IDENTITY:
- os_free(eap->identity);
- eap->identity = (u8 *) os_strdup(value);
- eap->identity_len = os_strlen(value);
- eap->pending_req_identity = 0;
- if (ssid == wpa_s->current_ssid)
- wpa_s->reassociate = 1;
- break;
- case WPA_CTRL_REQ_EAP_PASSWORD:
- bin_clear_free(eap->password, eap->password_len);
- eap->password = (u8 *) os_strdup(value);
- eap->password_len = os_strlen(value);
- eap->pending_req_password = 0;
- if (ssid == wpa_s->current_ssid)
- wpa_s->reassociate = 1;
- break;
- case WPA_CTRL_REQ_EAP_NEW_PASSWORD:
- bin_clear_free(eap->new_password, eap->new_password_len);
- eap->new_password = (u8 *) os_strdup(value);
- eap->new_password_len = os_strlen(value);
- eap->pending_req_new_password = 0;
- if (ssid == wpa_s->current_ssid)
- wpa_s->reassociate = 1;
- break;
- case WPA_CTRL_REQ_EAP_PIN:
- str_clear_free(eap->pin);
- eap->pin = os_strdup(value);
- eap->pending_req_pin = 0;
- if (ssid == wpa_s->current_ssid)
- wpa_s->reassociate = 1;
- break;
- case WPA_CTRL_REQ_EAP_OTP:
- bin_clear_free(eap->otp, eap->otp_len);
- eap->otp = (u8 *) os_strdup(value);
- eap->otp_len = os_strlen(value);
- os_free(eap->pending_req_otp);
- eap->pending_req_otp = NULL;
- eap->pending_req_otp_len = 0;
- break;
- case WPA_CTRL_REQ_EAP_PASSPHRASE:
- str_clear_free(eap->private_key_passwd);
- eap->private_key_passwd = os_strdup(value);
- eap->pending_req_passphrase = 0;
- if (ssid == wpa_s->current_ssid)
- wpa_s->reassociate = 1;
- break;
- case WPA_CTRL_REQ_SIM:
- str_clear_free(eap->external_sim_resp);
- eap->external_sim_resp = os_strdup(value);
- eap->pending_req_sim = 0;
- break;
- case WPA_CTRL_REQ_PSK_PASSPHRASE:
- if (wpa_config_set(ssid, "psk", value, 0) < 0)
- return -1;
- ssid->mem_only_psk = 1;
- if (ssid->passphrase)
- wpa_config_update_psk(ssid);
- if (wpa_s->wpa_state == WPA_SCANNING && !wpa_s->scanning)
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- break;
- case WPA_CTRL_REQ_EXT_CERT_CHECK:
- if (eap->pending_ext_cert_check != PENDING_CHECK)
- return -1;
- if (os_strcmp(value, "good") == 0)
- eap->pending_ext_cert_check = EXT_CERT_CHECK_GOOD;
- else if (os_strcmp(value, "bad") == 0)
- eap->pending_ext_cert_check = EXT_CERT_CHECK_BAD;
- else
- return -1;
- break;
- default:
- wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown field '%s'", field);
- return -1;
- }
- return 0;
- #else /* IEEE8021X_EAPOL */
- wpa_printf(MSG_DEBUG, "CTRL_IFACE: IEEE 802.1X not included");
- return -1;
- #endif /* IEEE8021X_EAPOL */
- }
- #endif /* CONFIG_CTRL_IFACE || CONFIG_CTRL_IFACE_DBUS_NEW */
- int wpas_network_disabled(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
- {
- int i;
- unsigned int drv_enc;
- if (wpa_s->p2p_mgmt)
- return 1; /* no normal network profiles on p2p_mgmt interface */
- if (ssid == NULL)
- return 1;
- if (ssid->disabled)
- return 1;
- if (wpa_s->drv_capa_known)
- drv_enc = wpa_s->drv_enc;
- else
- drv_enc = (unsigned int) -1;
- for (i = 0; i < NUM_WEP_KEYS; i++) {
- size_t len = ssid->wep_key_len[i];
- if (len == 0)
- continue;
- if (len == 5 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP40))
- continue;
- if (len == 13 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP104))
- continue;
- if (len == 16 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP128))
- continue;
- return 1; /* invalid WEP key */
- }
- if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt) && !ssid->psk_set &&
- (!ssid->passphrase || ssid->ssid_len != 0) && !ssid->ext_psk &&
- !(wpa_key_mgmt_sae(ssid->key_mgmt) && ssid->sae_password) &&
- !ssid->mem_only_psk)
- return 1;
- return 0;
- }
- int wpas_get_ssid_pmf(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
- {
- #ifdef CONFIG_IEEE80211W
- if (ssid == NULL || ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT) {
- if (wpa_s->conf->pmf == MGMT_FRAME_PROTECTION_OPTIONAL &&
- !(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_BIP)) {
- /*
- * Driver does not support BIP -- ignore pmf=1 default
- * since the connection with PMF would fail and the
- * configuration does not require PMF to be enabled.
- */
- return NO_MGMT_FRAME_PROTECTION;
- }
- if (ssid &&
- (ssid->key_mgmt &
- ~(WPA_KEY_MGMT_NONE | WPA_KEY_MGMT_WPS |
- WPA_KEY_MGMT_IEEE8021X_NO_WPA)) == 0) {
- /*
- * Do not use the default PMF value for non-RSN networks
- * since PMF is available only with RSN and pmf=2
- * configuration would otherwise prevent connections to
- * all open networks.
- */
- return NO_MGMT_FRAME_PROTECTION;
- }
- return wpa_s->conf->pmf;
- }
- return ssid->ieee80211w;
- #else /* CONFIG_IEEE80211W */
- return NO_MGMT_FRAME_PROTECTION;
- #endif /* CONFIG_IEEE80211W */
- }
- int wpas_is_p2p_prioritized(struct wpa_supplicant *wpa_s)
- {
- if (wpa_s->global->conc_pref == WPA_CONC_PREF_P2P)
- return 1;
- if (wpa_s->global->conc_pref == WPA_CONC_PREF_STA)
- return 0;
- return -1;
- }
- void wpas_auth_failed(struct wpa_supplicant *wpa_s, char *reason)
- {
- struct wpa_ssid *ssid = wpa_s->current_ssid;
- int dur;
- struct os_reltime now;
- if (ssid == NULL) {
- wpa_printf(MSG_DEBUG, "Authentication failure but no known "
- "SSID block");
- return;
- }
- if (ssid->key_mgmt == WPA_KEY_MGMT_WPS)
- return;
- ssid->auth_failures++;
- #ifdef CONFIG_P2P
- if (ssid->p2p_group &&
- (wpa_s->p2p_in_provisioning || wpa_s->show_group_started)) {
- /*
- * Skip the wait time since there is a short timeout on the
- * connection to a P2P group.
- */
- return;
- }
- #endif /* CONFIG_P2P */
- if (ssid->auth_failures > 50)
- dur = 300;
- else if (ssid->auth_failures > 10)
- dur = 120;
- else if (ssid->auth_failures > 5)
- dur = 90;
- else if (ssid->auth_failures > 3)
- dur = 60;
- else if (ssid->auth_failures > 2)
- dur = 30;
- else if (ssid->auth_failures > 1)
- dur = 20;
- else
- dur = 10;
- if (ssid->auth_failures > 1 &&
- wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt))
- dur += os_random() % (ssid->auth_failures * 10);
- os_get_reltime(&now);
- if (now.sec + dur <= ssid->disabled_until.sec)
- return;
- ssid->disabled_until.sec = now.sec + dur;
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_TEMP_DISABLED
- "id=%d ssid=\"%s\" auth_failures=%u duration=%d reason=%s",
- ssid->id, wpa_ssid_txt(ssid->ssid, ssid->ssid_len),
- ssid->auth_failures, dur, reason);
- }
- void wpas_clear_temp_disabled(struct wpa_supplicant *wpa_s,
- struct wpa_ssid *ssid, int clear_failures)
- {
- if (ssid == NULL)
- return;
- if (ssid->disabled_until.sec) {
- wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_REENABLED
- "id=%d ssid=\"%s\"",
- ssid->id, wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
- }
- ssid->disabled_until.sec = 0;
- ssid->disabled_until.usec = 0;
- if (clear_failures)
- ssid->auth_failures = 0;
- }
- int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid)
- {
- size_t i;
- if (wpa_s->disallow_aps_bssid == NULL)
- return 0;
- for (i = 0; i < wpa_s->disallow_aps_bssid_count; i++) {
- if (os_memcmp(wpa_s->disallow_aps_bssid + i * ETH_ALEN,
- bssid, ETH_ALEN) == 0)
- return 1;
- }
- return 0;
- }
- int disallowed_ssid(struct wpa_supplicant *wpa_s, const u8 *ssid,
- size_t ssid_len)
- {
- size_t i;
- if (wpa_s->disallow_aps_ssid == NULL || ssid == NULL)
- return 0;
- for (i = 0; i < wpa_s->disallow_aps_ssid_count; i++) {
- struct wpa_ssid_value *s = &wpa_s->disallow_aps_ssid[i];
- if (ssid_len == s->ssid_len &&
- os_memcmp(ssid, s->ssid, ssid_len) == 0)
- return 1;
- }
- return 0;
- }
- /**
- * wpas_request_connection - Request a new connection
- * @wpa_s: Pointer to the network interface
- *
- * This function is used to request a new connection to be found. It will mark
- * the interface to allow reassociation and request a new scan to find a
- * suitable network to connect to.
- */
- void wpas_request_connection(struct wpa_supplicant *wpa_s)
- {
- wpa_s->normal_scans = 0;
- wpa_s->scan_req = NORMAL_SCAN_REQ;
- wpa_supplicant_reinit_autoscan(wpa_s);
- wpa_s->extra_blacklist_count = 0;
- wpa_s->disconnected = 0;
- wpa_s->reassociate = 1;
- wpa_s->last_owe_group = 0;
- if (wpa_supplicant_fast_associate(wpa_s) != 1)
- wpa_supplicant_req_scan(wpa_s, 0, 0);
- else
- wpa_s->reattach = 0;
- }
- /**
- * wpas_request_disconnection - Request disconnection
- * @wpa_s: Pointer to the network interface
- *
- * This function is used to request disconnection from the currently connected
- * network. This will stop any ongoing scans and initiate deauthentication.
- */
- void wpas_request_disconnection(struct wpa_supplicant *wpa_s)
- {
- #ifdef CONFIG_SME
- wpa_s->sme.prev_bssid_set = 0;
- #endif /* CONFIG_SME */
- wpa_s->reassociate = 0;
- wpa_s->disconnected = 1;
- wpa_supplicant_cancel_sched_scan(wpa_s);
- wpa_supplicant_cancel_scan(wpa_s);
- wpa_supplicant_deauthenticate(wpa_s, WLAN_REASON_DEAUTH_LEAVING);
- eloop_cancel_timeout(wpas_network_reenabled, wpa_s, NULL);
- }
- void dump_freq_data(struct wpa_supplicant *wpa_s, const char *title,
- struct wpa_used_freq_data *freqs_data,
- unsigned int len)
- {
- unsigned int i;
- wpa_dbg(wpa_s, MSG_DEBUG, "Shared frequencies (len=%u): %s",
- len, title);
- for (i = 0; i < len; i++) {
- struct wpa_used_freq_data *cur = &freqs_data[i];
- wpa_dbg(wpa_s, MSG_DEBUG, "freq[%u]: %d, flags=0x%X",
- i, cur->freq, cur->flags);
- }
- }
- /*
- * Find the operating frequencies of any of the virtual interfaces that
- * are using the same radio as the current interface, and in addition, get
- * information about the interface types that are using the frequency.
- */
- int get_shared_radio_freqs_data(struct wpa_supplicant *wpa_s,
- struct wpa_used_freq_data *freqs_data,
- unsigned int len)
- {
- struct wpa_supplicant *ifs;
- u8 bssid[ETH_ALEN];
- int freq;
- unsigned int idx = 0, i;
- wpa_dbg(wpa_s, MSG_DEBUG,
- "Determining shared radio frequencies (max len %u)", len);
- os_memset(freqs_data, 0, sizeof(struct wpa_used_freq_data) * len);
- dl_list_for_each(ifs, &wpa_s->radio->ifaces, struct wpa_supplicant,
- radio_list) {
- if (idx == len)
- break;
- if (ifs->current_ssid == NULL || ifs->assoc_freq == 0)
- continue;
- if (ifs->current_ssid->mode == WPAS_MODE_AP ||
- ifs->current_ssid->mode == WPAS_MODE_P2P_GO ||
- ifs->current_ssid->mode == WPAS_MODE_MESH)
- freq = ifs->current_ssid->frequency;
- else if (wpa_drv_get_bssid(ifs, bssid) == 0)
- freq = ifs->assoc_freq;
- else
- continue;
- /* Hold only distinct freqs */
- for (i = 0; i < idx; i++)
- if (freqs_data[i].freq == freq)
- break;
- if (i == idx)
- freqs_data[idx++].freq = freq;
- if (ifs->current_ssid->mode == WPAS_MODE_INFRA) {
- freqs_data[i].flags |= ifs->current_ssid->p2p_group ?
- WPA_FREQ_USED_BY_P2P_CLIENT :
- WPA_FREQ_USED_BY_INFRA_STATION;
- }
- }
- dump_freq_data(wpa_s, "completed iteration", freqs_data, idx);
- return idx;
- }
- /*
- * Find the operating frequencies of any of the virtual interfaces that
- * are using the same radio as the current interface.
- */
- int get_shared_radio_freqs(struct wpa_supplicant *wpa_s,
- int *freq_array, unsigned int len)
- {
- struct wpa_used_freq_data *freqs_data;
- int num, i;
- os_memset(freq_array, 0, sizeof(int) * len);
- freqs_data = os_calloc(len, sizeof(struct wpa_used_freq_data));
- if (!freqs_data)
- return -1;
- num = get_shared_radio_freqs_data(wpa_s, freqs_data, len);
- for (i = 0; i < num; i++)
- freq_array[i] = freqs_data[i].freq;
- os_free(freqs_data);
- return num;
- }
- struct wpa_supplicant *
- wpas_vendor_elem(struct wpa_supplicant *wpa_s, enum wpa_vendor_elem_frame frame)
- {
- switch (frame) {
- #ifdef CONFIG_P2P
- case VENDOR_ELEM_PROBE_REQ_P2P:
- case VENDOR_ELEM_PROBE_RESP_P2P:
- case VENDOR_ELEM_PROBE_RESP_P2P_GO:
- case VENDOR_ELEM_BEACON_P2P_GO:
- case VENDOR_ELEM_P2P_PD_REQ:
- case VENDOR_ELEM_P2P_PD_RESP:
- case VENDOR_ELEM_P2P_GO_NEG_REQ:
- case VENDOR_ELEM_P2P_GO_NEG_RESP:
- case VENDOR_ELEM_P2P_GO_NEG_CONF:
- case VENDOR_ELEM_P2P_INV_REQ:
- case VENDOR_ELEM_P2P_INV_RESP:
- case VENDOR_ELEM_P2P_ASSOC_REQ:
- case VENDOR_ELEM_P2P_ASSOC_RESP:
- return wpa_s->p2pdev;
- #endif /* CONFIG_P2P */
- default:
- return wpa_s;
- }
- }
- void wpas_vendor_elem_update(struct wpa_supplicant *wpa_s)
- {
- unsigned int i;
- char buf[30];
- wpa_printf(MSG_DEBUG, "Update vendor elements");
- for (i = 0; i < NUM_VENDOR_ELEM_FRAMES; i++) {
- if (wpa_s->vendor_elem[i]) {
- int res;
- res = os_snprintf(buf, sizeof(buf), "frame[%u]", i);
- if (!os_snprintf_error(sizeof(buf), res)) {
- wpa_hexdump_buf(MSG_DEBUG, buf,
- wpa_s->vendor_elem[i]);
- }
- }
- }
- #ifdef CONFIG_P2P
- if (wpa_s->parent == wpa_s &&
- wpa_s->global->p2p &&
- !wpa_s->global->p2p_disabled)
- p2p_set_vendor_elems(wpa_s->global->p2p, wpa_s->vendor_elem);
- #endif /* CONFIG_P2P */
- }
- int wpas_vendor_elem_remove(struct wpa_supplicant *wpa_s, int frame,
- const u8 *elem, size_t len)
- {
- u8 *ie, *end;
- ie = wpabuf_mhead_u8(wpa_s->vendor_elem[frame]);
- end = ie + wpabuf_len(wpa_s->vendor_elem[frame]);
- for (; ie + 1 < end; ie += 2 + ie[1]) {
- if (ie + len > end)
- break;
- if (os_memcmp(ie, elem, len) != 0)
- continue;
- if (wpabuf_len(wpa_s->vendor_elem[frame]) == len) {
- wpabuf_free(wpa_s->vendor_elem[frame]);
- wpa_s->vendor_elem[frame] = NULL;
- } else {
- os_memmove(ie, ie + len, end - (ie + len));
- wpa_s->vendor_elem[frame]->used -= len;
- }
- wpas_vendor_elem_update(wpa_s);
- return 0;
- }
- return -1;
- }
- struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes,
- u16 num_modes, enum hostapd_hw_mode mode)
- {
- u16 i;
- for (i = 0; i < num_modes; i++) {
- if (modes[i].mode == mode)
- return &modes[i];
- }
- return NULL;
- }
- static struct
- wpa_bss_tmp_disallowed * wpas_get_disallowed_bss(struct wpa_supplicant *wpa_s,
- const u8 *bssid)
- {
- struct wpa_bss_tmp_disallowed *bss;
- dl_list_for_each(bss, &wpa_s->bss_tmp_disallowed,
- struct wpa_bss_tmp_disallowed, list) {
- if (os_memcmp(bssid, bss->bssid, ETH_ALEN) == 0)
- return bss;
- }
- return NULL;
- }
- static int wpa_set_driver_tmp_disallow_list(struct wpa_supplicant *wpa_s)
- {
- struct wpa_bss_tmp_disallowed *tmp;
- unsigned int num_bssid = 0;
- u8 *bssids;
- int ret;
- bssids = os_malloc(dl_list_len(&wpa_s->bss_tmp_disallowed) * ETH_ALEN);
- if (!bssids)
- return -1;
- dl_list_for_each(tmp, &wpa_s->bss_tmp_disallowed,
- struct wpa_bss_tmp_disallowed, list) {
- os_memcpy(&bssids[num_bssid * ETH_ALEN], tmp->bssid,
- ETH_ALEN);
- num_bssid++;
- }
- ret = wpa_drv_set_bssid_blacklist(wpa_s, num_bssid, bssids);
- os_free(bssids);
- return ret;
- }
- static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx)
- {
- struct wpa_supplicant *wpa_s = eloop_ctx;
- struct wpa_bss_tmp_disallowed *tmp, *bss = timeout_ctx;
- /* Make sure the bss is not already freed */
- dl_list_for_each(tmp, &wpa_s->bss_tmp_disallowed,
- struct wpa_bss_tmp_disallowed, list) {
- if (bss == tmp) {
- dl_list_del(&tmp->list);
- os_free(tmp);
- wpa_set_driver_tmp_disallow_list(wpa_s);
- break;
- }
- }
- }
- void wpa_bss_tmp_disallow(struct wpa_supplicant *wpa_s, const u8 *bssid,
- unsigned int sec)
- {
- struct wpa_bss_tmp_disallowed *bss;
- bss = wpas_get_disallowed_bss(wpa_s, bssid);
- if (bss) {
- eloop_cancel_timeout(wpa_bss_tmp_disallow_timeout, wpa_s, bss);
- eloop_register_timeout(sec, 0, wpa_bss_tmp_disallow_timeout,
- wpa_s, bss);
- return;
- }
- bss = os_malloc(sizeof(*bss));
- if (!bss) {
- wpa_printf(MSG_DEBUG,
- "Failed to allocate memory for temp disallow BSS");
- return;
- }
- os_memcpy(bss->bssid, bssid, ETH_ALEN);
- dl_list_add(&wpa_s->bss_tmp_disallowed, &bss->list);
- wpa_set_driver_tmp_disallow_list(wpa_s);
- eloop_register_timeout(sec, 0, wpa_bss_tmp_disallow_timeout,
- wpa_s, bss);
- }
- int wpa_is_bss_tmp_disallowed(struct wpa_supplicant *wpa_s, const u8 *bssid)
- {
- struct wpa_bss_tmp_disallowed *bss = NULL, *tmp, *prev;
- dl_list_for_each_safe(tmp, prev, &wpa_s->bss_tmp_disallowed,
- struct wpa_bss_tmp_disallowed, list) {
- if (os_memcmp(bssid, tmp->bssid, ETH_ALEN) == 0) {
- bss = tmp;
- break;
- }
- }
- if (!bss)
- return 0;
- return 1;
- }
|