]> git.ipfire.org Git - thirdparty/hostap.git/blob - src/ap/gas_serv.c
DPP2: hostapd as TCP Relay
[thirdparty/hostap.git] / src / ap / gas_serv.c
1 /*
2 * Generic advertisement service (GAS) server
3 * Copyright (c) 2011-2014, Qualcomm Atheros, Inc.
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "common/gas.h"
14 #include "common/wpa_ctrl.h"
15 #include "utils/eloop.h"
16 #include "hostapd.h"
17 #include "ap_config.h"
18 #include "ap_drv_ops.h"
19 #include "dpp_hostapd.h"
20 #include "sta_info.h"
21 #include "gas_serv.h"
22
23
24 #ifdef CONFIG_DPP
25 static void gas_serv_write_dpp_adv_proto(struct wpabuf *buf)
26 {
27 wpabuf_put_u8(buf, WLAN_EID_ADV_PROTO);
28 wpabuf_put_u8(buf, 8); /* Length */
29 wpabuf_put_u8(buf, 0x7f);
30 wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
31 wpabuf_put_u8(buf, 5);
32 wpabuf_put_be24(buf, OUI_WFA);
33 wpabuf_put_u8(buf, DPP_OUI_TYPE);
34 wpabuf_put_u8(buf, 0x01);
35 }
36 #endif /* CONFIG_DPP */
37
38
39 static void convert_to_protected_dual(struct wpabuf *msg)
40 {
41 u8 *categ = wpabuf_mhead_u8(msg);
42 *categ = WLAN_ACTION_PROTECTED_DUAL;
43 }
44
45
46 static struct gas_dialog_info *
47 gas_dialog_create(struct hostapd_data *hapd, const u8 *addr, u8 dialog_token)
48 {
49 struct sta_info *sta;
50 struct gas_dialog_info *dia = NULL;
51 int i, j;
52
53 sta = ap_get_sta(hapd, addr);
54 if (!sta) {
55 /*
56 * We need a STA entry to be able to maintain state for
57 * the GAS query.
58 */
59 wpa_printf(MSG_DEBUG, "ANQP: Add a temporary STA entry for "
60 "GAS query");
61 sta = ap_sta_add(hapd, addr);
62 if (!sta) {
63 wpa_printf(MSG_DEBUG, "Failed to add STA " MACSTR
64 " for GAS query", MAC2STR(addr));
65 return NULL;
66 }
67 sta->flags |= WLAN_STA_GAS;
68 /*
69 * The default inactivity is 300 seconds. We don't need
70 * it to be that long. Use five second timeout and increase this
71 * with the comeback_delay for testing cases.
72 */
73 ap_sta_session_timeout(hapd, sta,
74 hapd->conf->gas_comeback_delay / 1024 +
75 5);
76 } else {
77 ap_sta_replenish_timeout(hapd, sta, 5);
78 }
79
80 if (sta->gas_dialog == NULL) {
81 sta->gas_dialog = os_calloc(GAS_DIALOG_MAX,
82 sizeof(struct gas_dialog_info));
83 if (sta->gas_dialog == NULL)
84 return NULL;
85 }
86
87 for (i = sta->gas_dialog_next, j = 0; j < GAS_DIALOG_MAX; i++, j++) {
88 if (i == GAS_DIALOG_MAX)
89 i = 0;
90 if (sta->gas_dialog[i].valid)
91 continue;
92 dia = &sta->gas_dialog[i];
93 dia->valid = 1;
94 dia->dialog_token = dialog_token;
95 sta->gas_dialog_next = (++i == GAS_DIALOG_MAX) ? 0 : i;
96 return dia;
97 }
98
99 wpa_msg(hapd->msg_ctx, MSG_ERROR, "ANQP: Could not create dialog for "
100 MACSTR " dialog_token %u. Consider increasing "
101 "GAS_DIALOG_MAX.", MAC2STR(addr), dialog_token);
102
103 return NULL;
104 }
105
106
107 struct gas_dialog_info *
108 gas_serv_dialog_find(struct hostapd_data *hapd, const u8 *addr,
109 u8 dialog_token)
110 {
111 struct sta_info *sta;
112 int i;
113
114 sta = ap_get_sta(hapd, addr);
115 if (!sta) {
116 wpa_printf(MSG_DEBUG, "ANQP: could not find STA " MACSTR,
117 MAC2STR(addr));
118 return NULL;
119 }
120 for (i = 0; sta->gas_dialog && i < GAS_DIALOG_MAX; i++) {
121 if (sta->gas_dialog[i].dialog_token != dialog_token ||
122 !sta->gas_dialog[i].valid)
123 continue;
124 ap_sta_replenish_timeout(hapd, sta, 5);
125 return &sta->gas_dialog[i];
126 }
127 wpa_printf(MSG_DEBUG, "ANQP: Could not find dialog for "
128 MACSTR " dialog_token %u", MAC2STR(addr), dialog_token);
129 return NULL;
130 }
131
132
133 void gas_serv_dialog_clear(struct gas_dialog_info *dia)
134 {
135 wpabuf_free(dia->sd_resp);
136 os_memset(dia, 0, sizeof(*dia));
137 }
138
139
140 static void gas_serv_free_dialogs(struct hostapd_data *hapd,
141 const u8 *sta_addr)
142 {
143 struct sta_info *sta;
144 int i;
145
146 sta = ap_get_sta(hapd, sta_addr);
147 if (sta == NULL || sta->gas_dialog == NULL)
148 return;
149
150 for (i = 0; i < GAS_DIALOG_MAX; i++) {
151 if (sta->gas_dialog[i].valid)
152 return;
153 }
154
155 os_free(sta->gas_dialog);
156 sta->gas_dialog = NULL;
157 }
158
159
160 #ifdef CONFIG_HS20
161 static void anqp_add_hs_capab_list(struct hostapd_data *hapd,
162 struct wpabuf *buf)
163 {
164 u8 *len;
165
166 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
167 wpabuf_put_be24(buf, OUI_WFA);
168 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
169 wpabuf_put_u8(buf, HS20_STYPE_CAPABILITY_LIST);
170 wpabuf_put_u8(buf, 0); /* Reserved */
171 wpabuf_put_u8(buf, HS20_STYPE_CAPABILITY_LIST);
172 if (hapd->conf->hs20_oper_friendly_name)
173 wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_FRIENDLY_NAME);
174 if (hapd->conf->hs20_wan_metrics)
175 wpabuf_put_u8(buf, HS20_STYPE_WAN_METRICS);
176 if (hapd->conf->hs20_connection_capability)
177 wpabuf_put_u8(buf, HS20_STYPE_CONNECTION_CAPABILITY);
178 if (hapd->conf->nai_realm_data)
179 wpabuf_put_u8(buf, HS20_STYPE_NAI_HOME_REALM_QUERY);
180 if (hapd->conf->hs20_operating_class)
181 wpabuf_put_u8(buf, HS20_STYPE_OPERATING_CLASS);
182 if (hapd->conf->hs20_osu_providers_count)
183 wpabuf_put_u8(buf, HS20_STYPE_OSU_PROVIDERS_LIST);
184 if (hapd->conf->hs20_osu_providers_nai_count)
185 wpabuf_put_u8(buf, HS20_STYPE_OSU_PROVIDERS_NAI_LIST);
186 if (hapd->conf->hs20_icons_count)
187 wpabuf_put_u8(buf, HS20_STYPE_ICON_REQUEST);
188 if (hapd->conf->hs20_operator_icon_count)
189 wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_ICON_METADATA);
190 gas_anqp_set_element_len(buf, len);
191 }
192 #endif /* CONFIG_HS20 */
193
194
195 static struct anqp_element * get_anqp_elem(struct hostapd_data *hapd,
196 u16 infoid)
197 {
198 struct anqp_element *elem;
199
200 dl_list_for_each(elem, &hapd->conf->anqp_elem, struct anqp_element,
201 list) {
202 if (elem->infoid == infoid)
203 return elem;
204 }
205
206 return NULL;
207 }
208
209
210 static void anqp_add_elem(struct hostapd_data *hapd, struct wpabuf *buf,
211 u16 infoid)
212 {
213 struct anqp_element *elem;
214
215 elem = get_anqp_elem(hapd, infoid);
216 if (!elem)
217 return;
218 if (wpabuf_tailroom(buf) < 2 + 2 + wpabuf_len(elem->payload)) {
219 wpa_printf(MSG_DEBUG, "ANQP: No room for InfoID %u payload",
220 infoid);
221 return;
222 }
223
224 wpabuf_put_le16(buf, infoid);
225 wpabuf_put_le16(buf, wpabuf_len(elem->payload));
226 wpabuf_put_buf(buf, elem->payload);
227 }
228
229
230 static int anqp_add_override(struct hostapd_data *hapd, struct wpabuf *buf,
231 u16 infoid)
232 {
233 if (get_anqp_elem(hapd, infoid)) {
234 anqp_add_elem(hapd, buf, infoid);
235 return 1;
236 }
237
238 return 0;
239 }
240
241
242 static void anqp_add_capab_list(struct hostapd_data *hapd,
243 struct wpabuf *buf)
244 {
245 u8 *len;
246 u16 id;
247
248 if (anqp_add_override(hapd, buf, ANQP_CAPABILITY_LIST))
249 return;
250
251 len = gas_anqp_add_element(buf, ANQP_CAPABILITY_LIST);
252 wpabuf_put_le16(buf, ANQP_CAPABILITY_LIST);
253 if (hapd->conf->venue_name || get_anqp_elem(hapd, ANQP_VENUE_NAME))
254 wpabuf_put_le16(buf, ANQP_VENUE_NAME);
255 if (get_anqp_elem(hapd, ANQP_EMERGENCY_CALL_NUMBER))
256 wpabuf_put_le16(buf, ANQP_EMERGENCY_CALL_NUMBER);
257 if (hapd->conf->network_auth_type ||
258 get_anqp_elem(hapd, ANQP_NETWORK_AUTH_TYPE))
259 wpabuf_put_le16(buf, ANQP_NETWORK_AUTH_TYPE);
260 if (hapd->conf->roaming_consortium ||
261 get_anqp_elem(hapd, ANQP_ROAMING_CONSORTIUM))
262 wpabuf_put_le16(buf, ANQP_ROAMING_CONSORTIUM);
263 if (hapd->conf->ipaddr_type_configured ||
264 get_anqp_elem(hapd, ANQP_IP_ADDR_TYPE_AVAILABILITY))
265 wpabuf_put_le16(buf, ANQP_IP_ADDR_TYPE_AVAILABILITY);
266 if (hapd->conf->nai_realm_data ||
267 get_anqp_elem(hapd, ANQP_NAI_REALM))
268 wpabuf_put_le16(buf, ANQP_NAI_REALM);
269 if (hapd->conf->anqp_3gpp_cell_net ||
270 get_anqp_elem(hapd, ANQP_3GPP_CELLULAR_NETWORK))
271 wpabuf_put_le16(buf, ANQP_3GPP_CELLULAR_NETWORK);
272 if (get_anqp_elem(hapd, ANQP_AP_GEOSPATIAL_LOCATION))
273 wpabuf_put_le16(buf, ANQP_AP_GEOSPATIAL_LOCATION);
274 if (get_anqp_elem(hapd, ANQP_AP_CIVIC_LOCATION))
275 wpabuf_put_le16(buf, ANQP_AP_CIVIC_LOCATION);
276 if (get_anqp_elem(hapd, ANQP_AP_LOCATION_PUBLIC_URI))
277 wpabuf_put_le16(buf, ANQP_AP_LOCATION_PUBLIC_URI);
278 if (hapd->conf->domain_name || get_anqp_elem(hapd, ANQP_DOMAIN_NAME))
279 wpabuf_put_le16(buf, ANQP_DOMAIN_NAME);
280 if (get_anqp_elem(hapd, ANQP_EMERGENCY_ALERT_URI))
281 wpabuf_put_le16(buf, ANQP_EMERGENCY_ALERT_URI);
282 if (get_anqp_elem(hapd, ANQP_TDLS_CAPABILITY))
283 wpabuf_put_le16(buf, ANQP_TDLS_CAPABILITY);
284 if (get_anqp_elem(hapd, ANQP_EMERGENCY_NAI))
285 wpabuf_put_le16(buf, ANQP_EMERGENCY_NAI);
286 if (get_anqp_elem(hapd, ANQP_NEIGHBOR_REPORT))
287 wpabuf_put_le16(buf, ANQP_NEIGHBOR_REPORT);
288 #ifdef CONFIG_FILS
289 if (!dl_list_empty(&hapd->conf->fils_realms) ||
290 get_anqp_elem(hapd, ANQP_FILS_REALM_INFO))
291 wpabuf_put_le16(buf, ANQP_FILS_REALM_INFO);
292 #endif /* CONFIG_FILS */
293 if (get_anqp_elem(hapd, ANQP_CAG))
294 wpabuf_put_le16(buf, ANQP_CAG);
295 if (hapd->conf->venue_url || get_anqp_elem(hapd, ANQP_VENUE_URL))
296 wpabuf_put_le16(buf, ANQP_VENUE_URL);
297 if (get_anqp_elem(hapd, ANQP_ADVICE_OF_CHARGE))
298 wpabuf_put_le16(buf, ANQP_ADVICE_OF_CHARGE);
299 if (get_anqp_elem(hapd, ANQP_LOCAL_CONTENT))
300 wpabuf_put_le16(buf, ANQP_LOCAL_CONTENT);
301 for (id = 280; id < 300; id++) {
302 if (get_anqp_elem(hapd, id))
303 wpabuf_put_le16(buf, id);
304 }
305 #ifdef CONFIG_HS20
306 anqp_add_hs_capab_list(hapd, buf);
307 #endif /* CONFIG_HS20 */
308 gas_anqp_set_element_len(buf, len);
309 }
310
311
312 static void anqp_add_venue_name(struct hostapd_data *hapd, struct wpabuf *buf)
313 {
314 if (anqp_add_override(hapd, buf, ANQP_VENUE_NAME))
315 return;
316
317 if (hapd->conf->venue_name) {
318 u8 *len;
319 unsigned int i;
320 len = gas_anqp_add_element(buf, ANQP_VENUE_NAME);
321 wpabuf_put_u8(buf, hapd->conf->venue_group);
322 wpabuf_put_u8(buf, hapd->conf->venue_type);
323 for (i = 0; i < hapd->conf->venue_name_count; i++) {
324 struct hostapd_lang_string *vn;
325 vn = &hapd->conf->venue_name[i];
326 wpabuf_put_u8(buf, 3 + vn->name_len);
327 wpabuf_put_data(buf, vn->lang, 3);
328 wpabuf_put_data(buf, vn->name, vn->name_len);
329 }
330 gas_anqp_set_element_len(buf, len);
331 }
332 }
333
334
335 static void anqp_add_venue_url(struct hostapd_data *hapd, struct wpabuf *buf)
336 {
337 if (anqp_add_override(hapd, buf, ANQP_VENUE_URL))
338 return;
339
340 if (hapd->conf->venue_url) {
341 u8 *len;
342 unsigned int i;
343
344 len = gas_anqp_add_element(buf, ANQP_VENUE_URL);
345 for (i = 0; i < hapd->conf->venue_url_count; i++) {
346 struct hostapd_venue_url *url;
347
348 url = &hapd->conf->venue_url[i];
349 wpabuf_put_u8(buf, 1 + url->url_len);
350 wpabuf_put_u8(buf, url->venue_number);
351 wpabuf_put_data(buf, url->url, url->url_len);
352 }
353 gas_anqp_set_element_len(buf, len);
354 }
355 }
356
357
358 static void anqp_add_network_auth_type(struct hostapd_data *hapd,
359 struct wpabuf *buf)
360 {
361 if (anqp_add_override(hapd, buf, ANQP_NETWORK_AUTH_TYPE))
362 return;
363
364 if (hapd->conf->network_auth_type) {
365 wpabuf_put_le16(buf, ANQP_NETWORK_AUTH_TYPE);
366 wpabuf_put_le16(buf, hapd->conf->network_auth_type_len);
367 wpabuf_put_data(buf, hapd->conf->network_auth_type,
368 hapd->conf->network_auth_type_len);
369 }
370 }
371
372
373 static void anqp_add_roaming_consortium(struct hostapd_data *hapd,
374 struct wpabuf *buf)
375 {
376 unsigned int i;
377 u8 *len;
378
379 if (anqp_add_override(hapd, buf, ANQP_ROAMING_CONSORTIUM))
380 return;
381
382 len = gas_anqp_add_element(buf, ANQP_ROAMING_CONSORTIUM);
383 for (i = 0; i < hapd->conf->roaming_consortium_count; i++) {
384 struct hostapd_roaming_consortium *rc;
385 rc = &hapd->conf->roaming_consortium[i];
386 wpabuf_put_u8(buf, rc->len);
387 wpabuf_put_data(buf, rc->oi, rc->len);
388 }
389 gas_anqp_set_element_len(buf, len);
390 }
391
392
393 static void anqp_add_ip_addr_type_availability(struct hostapd_data *hapd,
394 struct wpabuf *buf)
395 {
396 if (anqp_add_override(hapd, buf, ANQP_IP_ADDR_TYPE_AVAILABILITY))
397 return;
398
399 if (hapd->conf->ipaddr_type_configured) {
400 wpabuf_put_le16(buf, ANQP_IP_ADDR_TYPE_AVAILABILITY);
401 wpabuf_put_le16(buf, 1);
402 wpabuf_put_u8(buf, hapd->conf->ipaddr_type_availability);
403 }
404 }
405
406
407 static void anqp_add_nai_realm_eap(struct wpabuf *buf,
408 struct hostapd_nai_realm_data *realm)
409 {
410 unsigned int i, j;
411
412 wpabuf_put_u8(buf, realm->eap_method_count);
413
414 for (i = 0; i < realm->eap_method_count; i++) {
415 struct hostapd_nai_realm_eap *eap = &realm->eap_method[i];
416 wpabuf_put_u8(buf, 2 + (3 * eap->num_auths));
417 wpabuf_put_u8(buf, eap->eap_method);
418 wpabuf_put_u8(buf, eap->num_auths);
419 for (j = 0; j < eap->num_auths; j++) {
420 wpabuf_put_u8(buf, eap->auth_id[j]);
421 wpabuf_put_u8(buf, 1);
422 wpabuf_put_u8(buf, eap->auth_val[j]);
423 }
424 }
425 }
426
427
428 static void anqp_add_nai_realm_data(struct wpabuf *buf,
429 struct hostapd_nai_realm_data *realm,
430 unsigned int realm_idx)
431 {
432 u8 *realm_data_len;
433
434 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
435 (int) os_strlen(realm->realm[realm_idx]));
436 realm_data_len = wpabuf_put(buf, 2);
437 wpabuf_put_u8(buf, realm->encoding);
438 wpabuf_put_u8(buf, os_strlen(realm->realm[realm_idx]));
439 wpabuf_put_str(buf, realm->realm[realm_idx]);
440 anqp_add_nai_realm_eap(buf, realm);
441 gas_anqp_set_element_len(buf, realm_data_len);
442 }
443
444
445 static int hs20_add_nai_home_realm_matches(struct hostapd_data *hapd,
446 struct wpabuf *buf,
447 const u8 *home_realm,
448 size_t home_realm_len)
449 {
450 unsigned int i, j, k;
451 u8 num_realms, num_matching = 0, encoding, realm_len, *realm_list_len;
452 struct hostapd_nai_realm_data *realm;
453 const u8 *pos, *realm_name, *end;
454 struct {
455 unsigned int realm_data_idx;
456 unsigned int realm_idx;
457 } matches[10];
458
459 pos = home_realm;
460 end = pos + home_realm_len;
461 if (end - pos < 1) {
462 wpa_hexdump(MSG_DEBUG, "Too short NAI Home Realm Query",
463 home_realm, home_realm_len);
464 return -1;
465 }
466 num_realms = *pos++;
467
468 for (i = 0; i < num_realms && num_matching < 10; i++) {
469 if (end - pos < 2) {
470 wpa_hexdump(MSG_DEBUG,
471 "Truncated NAI Home Realm Query",
472 home_realm, home_realm_len);
473 return -1;
474 }
475 encoding = *pos++;
476 realm_len = *pos++;
477 if (realm_len > end - pos) {
478 wpa_hexdump(MSG_DEBUG,
479 "Truncated NAI Home Realm Query",
480 home_realm, home_realm_len);
481 return -1;
482 }
483 realm_name = pos;
484 for (j = 0; j < hapd->conf->nai_realm_count &&
485 num_matching < 10; j++) {
486 const u8 *rpos, *rend;
487 realm = &hapd->conf->nai_realm_data[j];
488 if (encoding != realm->encoding)
489 continue;
490
491 rpos = realm_name;
492 while (rpos < realm_name + realm_len &&
493 num_matching < 10) {
494 for (rend = rpos;
495 rend < realm_name + realm_len; rend++) {
496 if (*rend == ';')
497 break;
498 }
499 for (k = 0; k < MAX_NAI_REALMS &&
500 realm->realm[k] &&
501 num_matching < 10; k++) {
502 if ((int) os_strlen(realm->realm[k]) !=
503 rend - rpos ||
504 os_strncmp((char *) rpos,
505 realm->realm[k],
506 rend - rpos) != 0)
507 continue;
508 matches[num_matching].realm_data_idx =
509 j;
510 matches[num_matching].realm_idx = k;
511 num_matching++;
512 }
513 rpos = rend + 1;
514 }
515 }
516 pos += realm_len;
517 }
518
519 realm_list_len = gas_anqp_add_element(buf, ANQP_NAI_REALM);
520 wpabuf_put_le16(buf, num_matching);
521
522 /*
523 * There are two ways to format. 1. each realm in a NAI Realm Data unit
524 * 2. all realms that share the same EAP methods in a NAI Realm Data
525 * unit. The first format is likely to be bigger in size than the
526 * second, but may be easier to parse and process by the receiver.
527 */
528 for (i = 0; i < num_matching; i++) {
529 wpa_printf(MSG_DEBUG, "realm_idx %d, realm_data_idx %d",
530 matches[i].realm_data_idx, matches[i].realm_idx);
531 realm = &hapd->conf->nai_realm_data[matches[i].realm_data_idx];
532 anqp_add_nai_realm_data(buf, realm, matches[i].realm_idx);
533 }
534 gas_anqp_set_element_len(buf, realm_list_len);
535 return 0;
536 }
537
538
539 static void anqp_add_nai_realm(struct hostapd_data *hapd, struct wpabuf *buf,
540 const u8 *home_realm, size_t home_realm_len,
541 int nai_realm, int nai_home_realm)
542 {
543 if (nai_realm && !nai_home_realm &&
544 anqp_add_override(hapd, buf, ANQP_NAI_REALM))
545 return;
546
547 if (nai_realm && hapd->conf->nai_realm_data) {
548 u8 *len;
549 unsigned int i, j;
550 len = gas_anqp_add_element(buf, ANQP_NAI_REALM);
551 wpabuf_put_le16(buf, hapd->conf->nai_realm_count);
552 for (i = 0; i < hapd->conf->nai_realm_count; i++) {
553 u8 *realm_data_len, *realm_len;
554 struct hostapd_nai_realm_data *realm;
555
556 realm = &hapd->conf->nai_realm_data[i];
557 realm_data_len = wpabuf_put(buf, 2);
558 wpabuf_put_u8(buf, realm->encoding);
559 realm_len = wpabuf_put(buf, 1);
560 for (j = 0; realm->realm[j]; j++) {
561 if (j > 0)
562 wpabuf_put_u8(buf, ';');
563 wpabuf_put_str(buf, realm->realm[j]);
564 }
565 *realm_len = (u8 *) wpabuf_put(buf, 0) - realm_len - 1;
566 anqp_add_nai_realm_eap(buf, realm);
567 gas_anqp_set_element_len(buf, realm_data_len);
568 }
569 gas_anqp_set_element_len(buf, len);
570 } else if (nai_home_realm && hapd->conf->nai_realm_data && home_realm) {
571 hs20_add_nai_home_realm_matches(hapd, buf, home_realm,
572 home_realm_len);
573 }
574 }
575
576
577 static void anqp_add_3gpp_cellular_network(struct hostapd_data *hapd,
578 struct wpabuf *buf)
579 {
580 if (anqp_add_override(hapd, buf, ANQP_3GPP_CELLULAR_NETWORK))
581 return;
582
583 if (hapd->conf->anqp_3gpp_cell_net) {
584 wpabuf_put_le16(buf, ANQP_3GPP_CELLULAR_NETWORK);
585 wpabuf_put_le16(buf,
586 hapd->conf->anqp_3gpp_cell_net_len);
587 wpabuf_put_data(buf, hapd->conf->anqp_3gpp_cell_net,
588 hapd->conf->anqp_3gpp_cell_net_len);
589 }
590 }
591
592
593 static void anqp_add_domain_name(struct hostapd_data *hapd, struct wpabuf *buf)
594 {
595 if (anqp_add_override(hapd, buf, ANQP_DOMAIN_NAME))
596 return;
597
598 if (hapd->conf->domain_name) {
599 wpabuf_put_le16(buf, ANQP_DOMAIN_NAME);
600 wpabuf_put_le16(buf, hapd->conf->domain_name_len);
601 wpabuf_put_data(buf, hapd->conf->domain_name,
602 hapd->conf->domain_name_len);
603 }
604 }
605
606
607 #ifdef CONFIG_FILS
608 static void anqp_add_fils_realm_info(struct hostapd_data *hapd,
609 struct wpabuf *buf)
610 {
611 size_t count;
612
613 if (anqp_add_override(hapd, buf, ANQP_FILS_REALM_INFO))
614 return;
615
616 count = dl_list_len(&hapd->conf->fils_realms);
617 if (count > 10000)
618 count = 10000;
619 if (count) {
620 struct fils_realm *realm;
621
622 wpabuf_put_le16(buf, ANQP_FILS_REALM_INFO);
623 wpabuf_put_le16(buf, 2 * count);
624
625 dl_list_for_each(realm, &hapd->conf->fils_realms,
626 struct fils_realm, list) {
627 if (count == 0)
628 break;
629 wpabuf_put_data(buf, realm->hash, 2);
630 count--;
631 }
632 }
633 }
634 #endif /* CONFIG_FILS */
635
636
637 #ifdef CONFIG_HS20
638
639 static void anqp_add_operator_friendly_name(struct hostapd_data *hapd,
640 struct wpabuf *buf)
641 {
642 if (hapd->conf->hs20_oper_friendly_name) {
643 u8 *len;
644 unsigned int i;
645 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
646 wpabuf_put_be24(buf, OUI_WFA);
647 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
648 wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_FRIENDLY_NAME);
649 wpabuf_put_u8(buf, 0); /* Reserved */
650 for (i = 0; i < hapd->conf->hs20_oper_friendly_name_count; i++)
651 {
652 struct hostapd_lang_string *vn;
653 vn = &hapd->conf->hs20_oper_friendly_name[i];
654 wpabuf_put_u8(buf, 3 + vn->name_len);
655 wpabuf_put_data(buf, vn->lang, 3);
656 wpabuf_put_data(buf, vn->name, vn->name_len);
657 }
658 gas_anqp_set_element_len(buf, len);
659 }
660 }
661
662
663 static void anqp_add_wan_metrics(struct hostapd_data *hapd,
664 struct wpabuf *buf)
665 {
666 if (hapd->conf->hs20_wan_metrics) {
667 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
668 wpabuf_put_be24(buf, OUI_WFA);
669 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
670 wpabuf_put_u8(buf, HS20_STYPE_WAN_METRICS);
671 wpabuf_put_u8(buf, 0); /* Reserved */
672 wpabuf_put_data(buf, hapd->conf->hs20_wan_metrics, 13);
673 gas_anqp_set_element_len(buf, len);
674 }
675 }
676
677
678 static void anqp_add_connection_capability(struct hostapd_data *hapd,
679 struct wpabuf *buf)
680 {
681 if (hapd->conf->hs20_connection_capability) {
682 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
683 wpabuf_put_be24(buf, OUI_WFA);
684 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
685 wpabuf_put_u8(buf, HS20_STYPE_CONNECTION_CAPABILITY);
686 wpabuf_put_u8(buf, 0); /* Reserved */
687 wpabuf_put_data(buf, hapd->conf->hs20_connection_capability,
688 hapd->conf->hs20_connection_capability_len);
689 gas_anqp_set_element_len(buf, len);
690 }
691 }
692
693
694 static void anqp_add_operating_class(struct hostapd_data *hapd,
695 struct wpabuf *buf)
696 {
697 if (hapd->conf->hs20_operating_class) {
698 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
699 wpabuf_put_be24(buf, OUI_WFA);
700 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
701 wpabuf_put_u8(buf, HS20_STYPE_OPERATING_CLASS);
702 wpabuf_put_u8(buf, 0); /* Reserved */
703 wpabuf_put_data(buf, hapd->conf->hs20_operating_class,
704 hapd->conf->hs20_operating_class_len);
705 gas_anqp_set_element_len(buf, len);
706 }
707 }
708
709
710 static void anqp_add_icon(struct wpabuf *buf, struct hostapd_bss_config *bss,
711 const char *name)
712 {
713 size_t j;
714 struct hs20_icon *icon = NULL;
715
716 for (j = 0; j < bss->hs20_icons_count && !icon; j++) {
717 if (os_strcmp(name, bss->hs20_icons[j].name) == 0)
718 icon = &bss->hs20_icons[j];
719 }
720 if (!icon)
721 return; /* icon info not found */
722
723 wpabuf_put_le16(buf, icon->width);
724 wpabuf_put_le16(buf, icon->height);
725 wpabuf_put_data(buf, icon->language, 3);
726 wpabuf_put_u8(buf, os_strlen(icon->type));
727 wpabuf_put_str(buf, icon->type);
728 wpabuf_put_u8(buf, os_strlen(icon->name));
729 wpabuf_put_str(buf, icon->name);
730 }
731
732
733 static void anqp_add_osu_provider(struct wpabuf *buf,
734 struct hostapd_bss_config *bss,
735 struct hs20_osu_provider *p)
736 {
737 u8 *len, *len2, *count;
738 unsigned int i;
739
740 len = wpabuf_put(buf, 2); /* OSU Provider Length to be filled */
741
742 /* OSU Friendly Name Duples */
743 len2 = wpabuf_put(buf, 2);
744 for (i = 0; i < p->friendly_name_count; i++) {
745 struct hostapd_lang_string *s = &p->friendly_name[i];
746 wpabuf_put_u8(buf, 3 + s->name_len);
747 wpabuf_put_data(buf, s->lang, 3);
748 wpabuf_put_data(buf, s->name, s->name_len);
749 }
750 WPA_PUT_LE16(len2, (u8 *) wpabuf_put(buf, 0) - len2 - 2);
751
752 /* OSU Server URI */
753 if (p->server_uri) {
754 wpabuf_put_u8(buf, os_strlen(p->server_uri));
755 wpabuf_put_str(buf, p->server_uri);
756 } else
757 wpabuf_put_u8(buf, 0);
758
759 /* OSU Method List */
760 count = wpabuf_put(buf, 1);
761 for (i = 0; p->method_list && p->method_list[i] >= 0; i++)
762 wpabuf_put_u8(buf, p->method_list[i]);
763 *count = i;
764
765 /* Icons Available */
766 len2 = wpabuf_put(buf, 2);
767 for (i = 0; i < p->icons_count; i++)
768 anqp_add_icon(buf, bss, p->icons[i]);
769 WPA_PUT_LE16(len2, (u8 *) wpabuf_put(buf, 0) - len2 - 2);
770
771 /* OSU_NAI */
772 if (p->osu_nai) {
773 wpabuf_put_u8(buf, os_strlen(p->osu_nai));
774 wpabuf_put_str(buf, p->osu_nai);
775 } else
776 wpabuf_put_u8(buf, 0);
777
778 /* OSU Service Description Duples */
779 len2 = wpabuf_put(buf, 2);
780 for (i = 0; i < p->service_desc_count; i++) {
781 struct hostapd_lang_string *s = &p->service_desc[i];
782 wpabuf_put_u8(buf, 3 + s->name_len);
783 wpabuf_put_data(buf, s->lang, 3);
784 wpabuf_put_data(buf, s->name, s->name_len);
785 }
786 WPA_PUT_LE16(len2, (u8 *) wpabuf_put(buf, 0) - len2 - 2);
787
788 WPA_PUT_LE16(len, (u8 *) wpabuf_put(buf, 0) - len - 2);
789 }
790
791
792 static void anqp_add_osu_providers_list(struct hostapd_data *hapd,
793 struct wpabuf *buf)
794 {
795 if (hapd->conf->hs20_osu_providers_count) {
796 size_t i;
797 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
798 wpabuf_put_be24(buf, OUI_WFA);
799 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
800 wpabuf_put_u8(buf, HS20_STYPE_OSU_PROVIDERS_LIST);
801 wpabuf_put_u8(buf, 0); /* Reserved */
802
803 /* OSU SSID */
804 wpabuf_put_u8(buf, hapd->conf->osu_ssid_len);
805 wpabuf_put_data(buf, hapd->conf->osu_ssid,
806 hapd->conf->osu_ssid_len);
807
808 /* Number of OSU Providers */
809 wpabuf_put_u8(buf, hapd->conf->hs20_osu_providers_count);
810
811 for (i = 0; i < hapd->conf->hs20_osu_providers_count; i++) {
812 anqp_add_osu_provider(
813 buf, hapd->conf,
814 &hapd->conf->hs20_osu_providers[i]);
815 }
816
817 gas_anqp_set_element_len(buf, len);
818 }
819 }
820
821
822 static void anqp_add_osu_provider_nai(struct wpabuf *buf,
823 struct hs20_osu_provider *p)
824 {
825 /* OSU_NAI for shared BSS (Single SSID) */
826 if (p->osu_nai2) {
827 wpabuf_put_u8(buf, os_strlen(p->osu_nai2));
828 wpabuf_put_str(buf, p->osu_nai2);
829 } else {
830 wpabuf_put_u8(buf, 0);
831 }
832 }
833
834
835 static void anqp_add_osu_providers_nai_list(struct hostapd_data *hapd,
836 struct wpabuf *buf)
837 {
838 if (hapd->conf->hs20_osu_providers_nai_count) {
839 size_t i;
840 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
841 wpabuf_put_be24(buf, OUI_WFA);
842 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
843 wpabuf_put_u8(buf, HS20_STYPE_OSU_PROVIDERS_NAI_LIST);
844 wpabuf_put_u8(buf, 0); /* Reserved */
845
846 for (i = 0; i < hapd->conf->hs20_osu_providers_count; i++) {
847 anqp_add_osu_provider_nai(
848 buf, &hapd->conf->hs20_osu_providers[i]);
849 }
850
851 gas_anqp_set_element_len(buf, len);
852 }
853 }
854
855
856 static void anqp_add_icon_binary_file(struct hostapd_data *hapd,
857 struct wpabuf *buf,
858 const u8 *name, size_t name_len)
859 {
860 struct hs20_icon *icon;
861 size_t i;
862 u8 *len;
863
864 wpa_hexdump_ascii(MSG_DEBUG, "HS 2.0: Requested Icon Filename",
865 name, name_len);
866 for (i = 0; i < hapd->conf->hs20_icons_count; i++) {
867 icon = &hapd->conf->hs20_icons[i];
868 if (name_len == os_strlen(icon->name) &&
869 os_memcmp(name, icon->name, name_len) == 0)
870 break;
871 }
872
873 if (i < hapd->conf->hs20_icons_count)
874 icon = &hapd->conf->hs20_icons[i];
875 else
876 icon = NULL;
877
878 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
879 wpabuf_put_be24(buf, OUI_WFA);
880 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
881 wpabuf_put_u8(buf, HS20_STYPE_ICON_BINARY_FILE);
882 wpabuf_put_u8(buf, 0); /* Reserved */
883
884 if (icon) {
885 char *data;
886 size_t data_len;
887
888 data = os_readfile(icon->file, &data_len);
889 if (data == NULL || data_len > 65535) {
890 wpabuf_put_u8(buf, 2); /* Download Status:
891 * Unspecified file error */
892 wpabuf_put_u8(buf, 0);
893 wpabuf_put_le16(buf, 0);
894 } else {
895 wpabuf_put_u8(buf, 0); /* Download Status: Success */
896 wpabuf_put_u8(buf, os_strlen(icon->type));
897 wpabuf_put_str(buf, icon->type);
898 wpabuf_put_le16(buf, data_len);
899 wpabuf_put_data(buf, data, data_len);
900 }
901 os_free(data);
902 } else {
903 wpabuf_put_u8(buf, 1); /* Download Status: File not found */
904 wpabuf_put_u8(buf, 0);
905 wpabuf_put_le16(buf, 0);
906 }
907
908 gas_anqp_set_element_len(buf, len);
909 }
910
911
912 static void anqp_add_operator_icon_metadata(struct hostapd_data *hapd,
913 struct wpabuf *buf)
914 {
915 struct hostapd_bss_config *bss = hapd->conf;
916 size_t i;
917 u8 *len;
918
919 if (!bss->hs20_operator_icon_count)
920 return;
921
922 len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
923
924 wpabuf_put_be24(buf, OUI_WFA);
925 wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
926 wpabuf_put_u8(buf, HS20_STYPE_OPERATOR_ICON_METADATA);
927 wpabuf_put_u8(buf, 0); /* Reserved */
928
929 for (i = 0; i < bss->hs20_operator_icon_count; i++)
930 anqp_add_icon(buf, bss, bss->hs20_operator_icon[i]);
931
932 gas_anqp_set_element_len(buf, len);
933 }
934
935 #endif /* CONFIG_HS20 */
936
937
938 #ifdef CONFIG_MBO
939 static void anqp_add_mbo_cell_data_conn_pref(struct hostapd_data *hapd,
940 struct wpabuf *buf)
941 {
942 if (hapd->conf->mbo_cell_data_conn_pref >= 0) {
943 u8 *len = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
944 wpabuf_put_be24(buf, OUI_WFA);
945 wpabuf_put_u8(buf, MBO_ANQP_OUI_TYPE);
946 wpabuf_put_u8(buf, MBO_ANQP_SUBTYPE_CELL_CONN_PREF);
947 wpabuf_put_u8(buf, hapd->conf->mbo_cell_data_conn_pref);
948 gas_anqp_set_element_len(buf, len);
949 }
950 }
951 #endif /* CONFIG_MBO */
952
953
954 static size_t anqp_get_required_len(struct hostapd_data *hapd,
955 const u16 *infoid,
956 unsigned int num_infoid)
957 {
958 size_t len = 0;
959 unsigned int i;
960
961 for (i = 0; i < num_infoid; i++) {
962 struct anqp_element *elem = get_anqp_elem(hapd, infoid[i]);
963
964 if (elem)
965 len += 2 + 2 + wpabuf_len(elem->payload);
966 }
967
968 return len;
969 }
970
971
972 static struct wpabuf *
973 gas_serv_build_gas_resp_payload(struct hostapd_data *hapd,
974 unsigned int request,
975 const u8 *home_realm, size_t home_realm_len,
976 const u8 *icon_name, size_t icon_name_len,
977 const u16 *extra_req,
978 unsigned int num_extra_req)
979 {
980 struct wpabuf *buf;
981 size_t len;
982 unsigned int i;
983
984 len = 1400;
985 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
986 len += 1000;
987 if (request & ANQP_REQ_ICON_REQUEST)
988 len += 65536;
989 #ifdef CONFIG_FILS
990 if (request & ANQP_FILS_REALM_INFO)
991 len += 2 * dl_list_len(&hapd->conf->fils_realms);
992 #endif /* CONFIG_FILS */
993 len += anqp_get_required_len(hapd, extra_req, num_extra_req);
994
995 buf = wpabuf_alloc(len);
996 if (buf == NULL)
997 return NULL;
998
999 if (request & ANQP_REQ_CAPABILITY_LIST)
1000 anqp_add_capab_list(hapd, buf);
1001 if (request & ANQP_REQ_VENUE_NAME)
1002 anqp_add_venue_name(hapd, buf);
1003 if (request & ANQP_REQ_EMERGENCY_CALL_NUMBER)
1004 anqp_add_elem(hapd, buf, ANQP_EMERGENCY_CALL_NUMBER);
1005 if (request & ANQP_REQ_NETWORK_AUTH_TYPE)
1006 anqp_add_network_auth_type(hapd, buf);
1007 if (request & ANQP_REQ_ROAMING_CONSORTIUM)
1008 anqp_add_roaming_consortium(hapd, buf);
1009 if (request & ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY)
1010 anqp_add_ip_addr_type_availability(hapd, buf);
1011 if (request & (ANQP_REQ_NAI_REALM | ANQP_REQ_NAI_HOME_REALM))
1012 anqp_add_nai_realm(hapd, buf, home_realm, home_realm_len,
1013 request & ANQP_REQ_NAI_REALM,
1014 request & ANQP_REQ_NAI_HOME_REALM);
1015 if (request & ANQP_REQ_3GPP_CELLULAR_NETWORK)
1016 anqp_add_3gpp_cellular_network(hapd, buf);
1017 if (request & ANQP_REQ_AP_GEOSPATIAL_LOCATION)
1018 anqp_add_elem(hapd, buf, ANQP_AP_GEOSPATIAL_LOCATION);
1019 if (request & ANQP_REQ_AP_CIVIC_LOCATION)
1020 anqp_add_elem(hapd, buf, ANQP_AP_CIVIC_LOCATION);
1021 if (request & ANQP_REQ_AP_LOCATION_PUBLIC_URI)
1022 anqp_add_elem(hapd, buf, ANQP_AP_LOCATION_PUBLIC_URI);
1023 if (request & ANQP_REQ_DOMAIN_NAME)
1024 anqp_add_domain_name(hapd, buf);
1025 if (request & ANQP_REQ_EMERGENCY_ALERT_URI)
1026 anqp_add_elem(hapd, buf, ANQP_EMERGENCY_ALERT_URI);
1027 if (request & ANQP_REQ_TDLS_CAPABILITY)
1028 anqp_add_elem(hapd, buf, ANQP_TDLS_CAPABILITY);
1029 if (request & ANQP_REQ_EMERGENCY_NAI)
1030 anqp_add_elem(hapd, buf, ANQP_EMERGENCY_NAI);
1031
1032 for (i = 0; i < num_extra_req; i++) {
1033 #ifdef CONFIG_FILS
1034 if (extra_req[i] == ANQP_FILS_REALM_INFO) {
1035 anqp_add_fils_realm_info(hapd, buf);
1036 continue;
1037 }
1038 #endif /* CONFIG_FILS */
1039 if (extra_req[i] == ANQP_VENUE_URL) {
1040 anqp_add_venue_url(hapd, buf);
1041 continue;
1042 }
1043 anqp_add_elem(hapd, buf, extra_req[i]);
1044 }
1045
1046 #ifdef CONFIG_HS20
1047 if (request & ANQP_REQ_HS_CAPABILITY_LIST)
1048 anqp_add_hs_capab_list(hapd, buf);
1049 if (request & ANQP_REQ_OPERATOR_FRIENDLY_NAME)
1050 anqp_add_operator_friendly_name(hapd, buf);
1051 if (request & ANQP_REQ_WAN_METRICS)
1052 anqp_add_wan_metrics(hapd, buf);
1053 if (request & ANQP_REQ_CONNECTION_CAPABILITY)
1054 anqp_add_connection_capability(hapd, buf);
1055 if (request & ANQP_REQ_OPERATING_CLASS)
1056 anqp_add_operating_class(hapd, buf);
1057 if (request & ANQP_REQ_OSU_PROVIDERS_LIST)
1058 anqp_add_osu_providers_list(hapd, buf);
1059 if (request & ANQP_REQ_ICON_REQUEST)
1060 anqp_add_icon_binary_file(hapd, buf, icon_name, icon_name_len);
1061 if (request & ANQP_REQ_OPERATOR_ICON_METADATA)
1062 anqp_add_operator_icon_metadata(hapd, buf);
1063 if (request & ANQP_REQ_OSU_PROVIDERS_NAI_LIST)
1064 anqp_add_osu_providers_nai_list(hapd, buf);
1065 #endif /* CONFIG_HS20 */
1066
1067 #ifdef CONFIG_MBO
1068 if (request & ANQP_REQ_MBO_CELL_DATA_CONN_PREF)
1069 anqp_add_mbo_cell_data_conn_pref(hapd, buf);
1070 #endif /* CONFIG_MBO */
1071
1072 return buf;
1073 }
1074
1075
1076 #define ANQP_MAX_EXTRA_REQ 20
1077
1078 struct anqp_query_info {
1079 unsigned int request;
1080 const u8 *home_realm_query;
1081 size_t home_realm_query_len;
1082 const u8 *icon_name;
1083 size_t icon_name_len;
1084 int p2p_sd;
1085 u16 extra_req[ANQP_MAX_EXTRA_REQ];
1086 unsigned int num_extra_req;
1087 };
1088
1089
1090 static void set_anqp_req(unsigned int bit, const char *name, int local,
1091 struct anqp_query_info *qi)
1092 {
1093 qi->request |= bit;
1094 if (local) {
1095 wpa_printf(MSG_DEBUG, "ANQP: %s (local)", name);
1096 } else {
1097 wpa_printf(MSG_DEBUG, "ANQP: %s not available", name);
1098 }
1099 }
1100
1101
1102 static void rx_anqp_query_list_id(struct hostapd_data *hapd, u16 info_id,
1103 struct anqp_query_info *qi)
1104 {
1105 switch (info_id) {
1106 case ANQP_CAPABILITY_LIST:
1107 set_anqp_req(ANQP_REQ_CAPABILITY_LIST, "Capability List", 1,
1108 qi);
1109 break;
1110 case ANQP_VENUE_NAME:
1111 set_anqp_req(ANQP_REQ_VENUE_NAME, "Venue Name",
1112 hapd->conf->venue_name != NULL, qi);
1113 break;
1114 case ANQP_EMERGENCY_CALL_NUMBER:
1115 set_anqp_req(ANQP_REQ_EMERGENCY_CALL_NUMBER,
1116 "Emergency Call Number",
1117 get_anqp_elem(hapd, info_id) != NULL, qi);
1118 break;
1119 case ANQP_NETWORK_AUTH_TYPE:
1120 set_anqp_req(ANQP_REQ_NETWORK_AUTH_TYPE, "Network Auth Type",
1121 hapd->conf->network_auth_type != NULL, qi);
1122 break;
1123 case ANQP_ROAMING_CONSORTIUM:
1124 set_anqp_req(ANQP_REQ_ROAMING_CONSORTIUM, "Roaming Consortium",
1125 hapd->conf->roaming_consortium != NULL, qi);
1126 break;
1127 case ANQP_IP_ADDR_TYPE_AVAILABILITY:
1128 set_anqp_req(ANQP_REQ_IP_ADDR_TYPE_AVAILABILITY,
1129 "IP Addr Type Availability",
1130 hapd->conf->ipaddr_type_configured, qi);
1131 break;
1132 case ANQP_NAI_REALM:
1133 set_anqp_req(ANQP_REQ_NAI_REALM, "NAI Realm",
1134 hapd->conf->nai_realm_data != NULL, qi);
1135 break;
1136 case ANQP_3GPP_CELLULAR_NETWORK:
1137 set_anqp_req(ANQP_REQ_3GPP_CELLULAR_NETWORK,
1138 "3GPP Cellular Network",
1139 hapd->conf->anqp_3gpp_cell_net != NULL, qi);
1140 break;
1141 case ANQP_AP_GEOSPATIAL_LOCATION:
1142 set_anqp_req(ANQP_REQ_AP_GEOSPATIAL_LOCATION,
1143 "AP Geospatial Location",
1144 get_anqp_elem(hapd, info_id) != NULL, qi);
1145 break;
1146 case ANQP_AP_CIVIC_LOCATION:
1147 set_anqp_req(ANQP_REQ_AP_CIVIC_LOCATION,
1148 "AP Civic Location",
1149 get_anqp_elem(hapd, info_id) != NULL, qi);
1150 break;
1151 case ANQP_AP_LOCATION_PUBLIC_URI:
1152 set_anqp_req(ANQP_REQ_AP_LOCATION_PUBLIC_URI,
1153 "AP Location Public URI",
1154 get_anqp_elem(hapd, info_id) != NULL, qi);
1155 break;
1156 case ANQP_DOMAIN_NAME:
1157 set_anqp_req(ANQP_REQ_DOMAIN_NAME, "Domain Name",
1158 hapd->conf->domain_name != NULL, qi);
1159 break;
1160 case ANQP_EMERGENCY_ALERT_URI:
1161 set_anqp_req(ANQP_REQ_EMERGENCY_ALERT_URI,
1162 "Emergency Alert URI",
1163 get_anqp_elem(hapd, info_id) != NULL, qi);
1164 break;
1165 case ANQP_TDLS_CAPABILITY:
1166 set_anqp_req(ANQP_REQ_TDLS_CAPABILITY,
1167 "TDLS Capability",
1168 get_anqp_elem(hapd, info_id) != NULL, qi);
1169 break;
1170 case ANQP_EMERGENCY_NAI:
1171 set_anqp_req(ANQP_REQ_EMERGENCY_NAI,
1172 "Emergency NAI",
1173 get_anqp_elem(hapd, info_id) != NULL, qi);
1174 break;
1175 default:
1176 #ifdef CONFIG_FILS
1177 if (info_id == ANQP_FILS_REALM_INFO &&
1178 !dl_list_empty(&hapd->conf->fils_realms)) {
1179 wpa_printf(MSG_DEBUG,
1180 "ANQP: FILS Realm Information (local)");
1181 } else
1182 #endif /* CONFIG_FILS */
1183 if (info_id == ANQP_VENUE_URL && hapd->conf->venue_url) {
1184 wpa_printf(MSG_DEBUG,
1185 "ANQP: Venue URL (local)");
1186 } else if (!get_anqp_elem(hapd, info_id)) {
1187 wpa_printf(MSG_DEBUG, "ANQP: Unsupported Info Id %u",
1188 info_id);
1189 break;
1190 }
1191 if (qi->num_extra_req == ANQP_MAX_EXTRA_REQ) {
1192 wpa_printf(MSG_DEBUG,
1193 "ANQP: No more room for extra requests - ignore Info Id %u",
1194 info_id);
1195 break;
1196 }
1197 wpa_printf(MSG_DEBUG, "ANQP: Info Id %u (local)", info_id);
1198 qi->extra_req[qi->num_extra_req] = info_id;
1199 qi->num_extra_req++;
1200 break;
1201 }
1202 }
1203
1204
1205 static void rx_anqp_query_list(struct hostapd_data *hapd,
1206 const u8 *pos, const u8 *end,
1207 struct anqp_query_info *qi)
1208 {
1209 wpa_printf(MSG_DEBUG, "ANQP: %u Info IDs requested in Query list",
1210 (unsigned int) (end - pos) / 2);
1211
1212 while (end - pos >= 2) {
1213 rx_anqp_query_list_id(hapd, WPA_GET_LE16(pos), qi);
1214 pos += 2;
1215 }
1216 }
1217
1218
1219 #ifdef CONFIG_HS20
1220
1221 static void rx_anqp_hs_query_list(struct hostapd_data *hapd, u8 subtype,
1222 struct anqp_query_info *qi)
1223 {
1224 switch (subtype) {
1225 case HS20_STYPE_CAPABILITY_LIST:
1226 set_anqp_req(ANQP_REQ_HS_CAPABILITY_LIST, "HS Capability List",
1227 1, qi);
1228 break;
1229 case HS20_STYPE_OPERATOR_FRIENDLY_NAME:
1230 set_anqp_req(ANQP_REQ_OPERATOR_FRIENDLY_NAME,
1231 "Operator Friendly Name",
1232 hapd->conf->hs20_oper_friendly_name != NULL, qi);
1233 break;
1234 case HS20_STYPE_WAN_METRICS:
1235 set_anqp_req(ANQP_REQ_WAN_METRICS, "WAN Metrics",
1236 hapd->conf->hs20_wan_metrics != NULL, qi);
1237 break;
1238 case HS20_STYPE_CONNECTION_CAPABILITY:
1239 set_anqp_req(ANQP_REQ_CONNECTION_CAPABILITY,
1240 "Connection Capability",
1241 hapd->conf->hs20_connection_capability != NULL,
1242 qi);
1243 break;
1244 case HS20_STYPE_OPERATING_CLASS:
1245 set_anqp_req(ANQP_REQ_OPERATING_CLASS, "Operating Class",
1246 hapd->conf->hs20_operating_class != NULL, qi);
1247 break;
1248 case HS20_STYPE_OSU_PROVIDERS_LIST:
1249 set_anqp_req(ANQP_REQ_OSU_PROVIDERS_LIST, "OSU Providers list",
1250 hapd->conf->hs20_osu_providers_count, qi);
1251 break;
1252 case HS20_STYPE_OPERATOR_ICON_METADATA:
1253 set_anqp_req(ANQP_REQ_OPERATOR_ICON_METADATA,
1254 "Operator Icon Metadata",
1255 hapd->conf->hs20_operator_icon_count, qi);
1256 break;
1257 case HS20_STYPE_OSU_PROVIDERS_NAI_LIST:
1258 set_anqp_req(ANQP_REQ_OSU_PROVIDERS_NAI_LIST,
1259 "OSU Providers NAI List",
1260 hapd->conf->hs20_osu_providers_nai_count, qi);
1261 break;
1262 default:
1263 wpa_printf(MSG_DEBUG, "ANQP: Unsupported HS 2.0 subtype %u",
1264 subtype);
1265 break;
1266 }
1267 }
1268
1269
1270 static void rx_anqp_hs_nai_home_realm(struct hostapd_data *hapd,
1271 const u8 *pos, const u8 *end,
1272 struct anqp_query_info *qi)
1273 {
1274 qi->request |= ANQP_REQ_NAI_HOME_REALM;
1275 qi->home_realm_query = pos;
1276 qi->home_realm_query_len = end - pos;
1277 if (hapd->conf->nai_realm_data != NULL) {
1278 wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 NAI Home Realm Query "
1279 "(local)");
1280 } else {
1281 wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 NAI Home Realm Query not "
1282 "available");
1283 }
1284 }
1285
1286
1287 static void rx_anqp_hs_icon_request(struct hostapd_data *hapd,
1288 const u8 *pos, const u8 *end,
1289 struct anqp_query_info *qi)
1290 {
1291 qi->request |= ANQP_REQ_ICON_REQUEST;
1292 qi->icon_name = pos;
1293 qi->icon_name_len = end - pos;
1294 if (hapd->conf->hs20_icons_count) {
1295 wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 Icon Request Query "
1296 "(local)");
1297 } else {
1298 wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 Icon Request Query not "
1299 "available");
1300 }
1301 }
1302
1303
1304 static void rx_anqp_vendor_specific_hs20(struct hostapd_data *hapd,
1305 const u8 *pos, const u8 *end,
1306 struct anqp_query_info *qi)
1307 {
1308 u8 subtype;
1309
1310 if (end - pos <= 1)
1311 return;
1312
1313 subtype = *pos++;
1314 pos++; /* Reserved */
1315 switch (subtype) {
1316 case HS20_STYPE_QUERY_LIST:
1317 wpa_printf(MSG_DEBUG, "ANQP: HS 2.0 Query List");
1318 while (pos < end) {
1319 rx_anqp_hs_query_list(hapd, *pos, qi);
1320 pos++;
1321 }
1322 break;
1323 case HS20_STYPE_NAI_HOME_REALM_QUERY:
1324 rx_anqp_hs_nai_home_realm(hapd, pos, end, qi);
1325 break;
1326 case HS20_STYPE_ICON_REQUEST:
1327 rx_anqp_hs_icon_request(hapd, pos, end, qi);
1328 break;
1329 default:
1330 wpa_printf(MSG_DEBUG, "ANQP: Unsupported HS 2.0 query subtype "
1331 "%u", subtype);
1332 break;
1333 }
1334 }
1335
1336 #endif /* CONFIG_HS20 */
1337
1338
1339 #ifdef CONFIG_P2P
1340 static void rx_anqp_vendor_specific_p2p(struct hostapd_data *hapd,
1341 struct anqp_query_info *qi)
1342 {
1343 /*
1344 * This is for P2P SD and will be taken care of by the P2P
1345 * implementation. This query needs to be ignored in the generic
1346 * GAS server to avoid duplicated response.
1347 */
1348 wpa_printf(MSG_DEBUG,
1349 "ANQP: Ignore WFA vendor type %u (P2P SD) in generic GAS server",
1350 P2P_OUI_TYPE);
1351 qi->p2p_sd = 1;
1352 return;
1353 }
1354 #endif /* CONFIG_P2P */
1355
1356
1357 #ifdef CONFIG_MBO
1358
1359 static void rx_anqp_mbo_query_list(struct hostapd_data *hapd, u8 subtype,
1360 struct anqp_query_info *qi)
1361 {
1362 switch (subtype) {
1363 case MBO_ANQP_SUBTYPE_CELL_CONN_PREF:
1364 set_anqp_req(ANQP_REQ_MBO_CELL_DATA_CONN_PREF,
1365 "Cellular Data Connection Preference",
1366 hapd->conf->mbo_cell_data_conn_pref >= 0, qi);
1367 break;
1368 default:
1369 wpa_printf(MSG_DEBUG, "ANQP: Unsupported MBO subtype %u",
1370 subtype);
1371 break;
1372 }
1373 }
1374
1375
1376 static void rx_anqp_vendor_specific_mbo(struct hostapd_data *hapd,
1377 const u8 *pos, const u8 *end,
1378 struct anqp_query_info *qi)
1379 {
1380 u8 subtype;
1381
1382 if (end - pos < 1)
1383 return;
1384
1385 subtype = *pos++;
1386 switch (subtype) {
1387 case MBO_ANQP_SUBTYPE_QUERY_LIST:
1388 wpa_printf(MSG_DEBUG, "ANQP: MBO Query List");
1389 while (pos < end) {
1390 rx_anqp_mbo_query_list(hapd, *pos, qi);
1391 pos++;
1392 }
1393 break;
1394 default:
1395 wpa_printf(MSG_DEBUG, "ANQP: Unsupported MBO query subtype %u",
1396 subtype);
1397 break;
1398 }
1399 }
1400
1401 #endif /* CONFIG_MBO */
1402
1403
1404 static void rx_anqp_vendor_specific(struct hostapd_data *hapd,
1405 const u8 *pos, const u8 *end,
1406 struct anqp_query_info *qi)
1407 {
1408 u32 oui;
1409
1410 if (end - pos < 4) {
1411 wpa_printf(MSG_DEBUG, "ANQP: Too short vendor specific ANQP "
1412 "Query element");
1413 return;
1414 }
1415
1416 oui = WPA_GET_BE24(pos);
1417 pos += 3;
1418 if (oui != OUI_WFA) {
1419 wpa_printf(MSG_DEBUG, "ANQP: Unsupported vendor OUI %06x",
1420 oui);
1421 return;
1422 }
1423
1424 switch (*pos) {
1425 #ifdef CONFIG_P2P
1426 case P2P_OUI_TYPE:
1427 rx_anqp_vendor_specific_p2p(hapd, qi);
1428 break;
1429 #endif /* CONFIG_P2P */
1430 #ifdef CONFIG_HS20
1431 case HS20_ANQP_OUI_TYPE:
1432 rx_anqp_vendor_specific_hs20(hapd, pos + 1, end, qi);
1433 break;
1434 #endif /* CONFIG_HS20 */
1435 #ifdef CONFIG_MBO
1436 case MBO_ANQP_OUI_TYPE:
1437 rx_anqp_vendor_specific_mbo(hapd, pos + 1, end, qi);
1438 break;
1439 #endif /* CONFIG_MBO */
1440 default:
1441 wpa_printf(MSG_DEBUG, "ANQP: Unsupported WFA vendor type %u",
1442 *pos);
1443 break;
1444 }
1445 }
1446
1447
1448 static void gas_serv_req_local_processing(struct hostapd_data *hapd,
1449 const u8 *sa, u8 dialog_token,
1450 struct anqp_query_info *qi, int prot,
1451 int std_addr3)
1452 {
1453 struct wpabuf *buf, *tx_buf;
1454
1455 buf = gas_serv_build_gas_resp_payload(hapd, qi->request,
1456 qi->home_realm_query,
1457 qi->home_realm_query_len,
1458 qi->icon_name, qi->icon_name_len,
1459 qi->extra_req, qi->num_extra_req);
1460 wpa_hexdump_buf(MSG_MSGDUMP, "ANQP: Locally generated ANQP responses",
1461 buf);
1462 if (!buf)
1463 return;
1464 #ifdef CONFIG_P2P
1465 if (wpabuf_len(buf) == 0 && qi->p2p_sd) {
1466 wpa_printf(MSG_DEBUG,
1467 "ANQP: Do not send response to P2P SD from generic GAS service (P2P SD implementation will process this)");
1468 wpabuf_free(buf);
1469 return;
1470 }
1471 #endif /* CONFIG_P2P */
1472
1473 if (wpabuf_len(buf) > hapd->conf->gas_frag_limit ||
1474 hapd->conf->gas_comeback_delay) {
1475 struct gas_dialog_info *di;
1476 u16 comeback_delay = 1;
1477
1478 if (hapd->conf->gas_comeback_delay) {
1479 /* Testing - allow overriding of the delay value */
1480 comeback_delay = hapd->conf->gas_comeback_delay;
1481 }
1482
1483 wpa_printf(MSG_DEBUG, "ANQP: Too long response to fit in "
1484 "initial response - use GAS comeback");
1485 di = gas_dialog_create(hapd, sa, dialog_token);
1486 if (!di) {
1487 wpa_printf(MSG_INFO, "ANQP: Could not create dialog "
1488 "for " MACSTR " (dialog token %u)",
1489 MAC2STR(sa), dialog_token);
1490 wpabuf_free(buf);
1491 tx_buf = gas_anqp_build_initial_resp_buf(
1492 dialog_token, WLAN_STATUS_UNSPECIFIED_FAILURE,
1493 0, NULL);
1494 } else {
1495 di->prot = prot;
1496 di->sd_resp = buf;
1497 di->sd_resp_pos = 0;
1498 tx_buf = gas_anqp_build_initial_resp_buf(
1499 dialog_token, WLAN_STATUS_SUCCESS,
1500 comeback_delay, NULL);
1501 }
1502 } else {
1503 wpa_printf(MSG_DEBUG, "ANQP: Initial response (no comeback)");
1504 tx_buf = gas_anqp_build_initial_resp_buf(
1505 dialog_token, WLAN_STATUS_SUCCESS, 0, buf);
1506 wpabuf_free(buf);
1507 }
1508 if (!tx_buf)
1509 return;
1510 if (prot)
1511 convert_to_protected_dual(tx_buf);
1512 if (std_addr3)
1513 hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
1514 wpabuf_head(tx_buf),
1515 wpabuf_len(tx_buf));
1516 else
1517 hostapd_drv_send_action_addr3_ap(hapd, hapd->iface->freq, 0, sa,
1518 wpabuf_head(tx_buf),
1519 wpabuf_len(tx_buf));
1520 wpabuf_free(tx_buf);
1521 }
1522
1523
1524 #ifdef CONFIG_DPP
1525 void gas_serv_req_dpp_processing(struct hostapd_data *hapd,
1526 const u8 *sa, u8 dialog_token,
1527 int prot, struct wpabuf *buf)
1528 {
1529 struct wpabuf *tx_buf;
1530
1531 if (wpabuf_len(buf) > hapd->conf->gas_frag_limit ||
1532 hapd->conf->gas_comeback_delay) {
1533 struct gas_dialog_info *di;
1534 u16 comeback_delay = 1;
1535
1536 if (hapd->conf->gas_comeback_delay) {
1537 /* Testing - allow overriding of the delay value */
1538 comeback_delay = hapd->conf->gas_comeback_delay;
1539 }
1540
1541 wpa_printf(MSG_DEBUG,
1542 "DPP: Too long response to fit in initial response - use GAS comeback");
1543 di = gas_dialog_create(hapd, sa, dialog_token);
1544 if (!di) {
1545 wpa_printf(MSG_INFO, "DPP: Could not create dialog for "
1546 MACSTR " (dialog token %u)",
1547 MAC2STR(sa), dialog_token);
1548 wpabuf_free(buf);
1549 tx_buf = gas_build_initial_resp(
1550 dialog_token, WLAN_STATUS_UNSPECIFIED_FAILURE,
1551 0, 10);
1552 if (tx_buf)
1553 gas_serv_write_dpp_adv_proto(tx_buf);
1554 } else {
1555 di->prot = prot;
1556 di->sd_resp = buf;
1557 di->sd_resp_pos = 0;
1558 tx_buf = gas_build_initial_resp(
1559 dialog_token, WLAN_STATUS_SUCCESS,
1560 comeback_delay, 10);
1561 if (tx_buf)
1562 gas_serv_write_dpp_adv_proto(tx_buf);
1563 }
1564 } else {
1565 wpa_printf(MSG_DEBUG,
1566 "DPP: GAS Initial response (no comeback)");
1567 tx_buf = gas_build_initial_resp(
1568 dialog_token, WLAN_STATUS_SUCCESS, 0,
1569 10 + 2 + wpabuf_len(buf));
1570 if (tx_buf) {
1571 gas_serv_write_dpp_adv_proto(tx_buf);
1572 wpabuf_put_le16(tx_buf, wpabuf_len(buf));
1573 wpabuf_put_buf(tx_buf, buf);
1574 hostapd_dpp_gas_status_handler(hapd, 1);
1575 }
1576 wpabuf_free(buf);
1577 }
1578 if (!tx_buf)
1579 return;
1580 if (prot)
1581 convert_to_protected_dual(tx_buf);
1582 hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
1583 wpabuf_head(tx_buf),
1584 wpabuf_len(tx_buf));
1585 wpabuf_free(tx_buf);
1586 }
1587 #endif /* CONFIG_DPP */
1588
1589
1590 static void gas_serv_rx_gas_initial_req(struct hostapd_data *hapd,
1591 const u8 *sa,
1592 const u8 *data, size_t len, int prot,
1593 int std_addr3)
1594 {
1595 const u8 *pos = data;
1596 const u8 *end = data + len;
1597 const u8 *next;
1598 u8 dialog_token;
1599 u16 slen;
1600 struct anqp_query_info qi;
1601 const u8 *adv_proto;
1602 #ifdef CONFIG_DPP
1603 int dpp = 0;
1604 #endif /* CONFIG_DPP */
1605
1606 if (len < 1 + 2)
1607 return;
1608
1609 os_memset(&qi, 0, sizeof(qi));
1610
1611 dialog_token = *pos++;
1612 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
1613 "GAS: GAS Initial Request from " MACSTR " (dialog token %u) ",
1614 MAC2STR(sa), dialog_token);
1615
1616 if (*pos != WLAN_EID_ADV_PROTO) {
1617 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
1618 "GAS: Unexpected IE in GAS Initial Request: %u", *pos);
1619 return;
1620 }
1621 adv_proto = pos++;
1622
1623 slen = *pos++;
1624 if (slen > end - pos || slen < 2) {
1625 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
1626 "GAS: Invalid IE in GAS Initial Request");
1627 return;
1628 }
1629 next = pos + slen;
1630 pos++; /* skip QueryRespLenLimit and PAME-BI */
1631
1632 #ifdef CONFIG_DPP
1633 if (slen == 8 && *pos == WLAN_EID_VENDOR_SPECIFIC &&
1634 pos[1] == 5 && WPA_GET_BE24(&pos[2]) == OUI_WFA &&
1635 pos[5] == DPP_OUI_TYPE && pos[6] == 0x01) {
1636 wpa_printf(MSG_DEBUG, "DPP: Configuration Request");
1637 dpp = 1;
1638 } else
1639 #endif /* CONFIG_DPP */
1640
1641 if (*pos != ACCESS_NETWORK_QUERY_PROTOCOL) {
1642 struct wpabuf *buf;
1643 wpa_msg(hapd->msg_ctx, MSG_DEBUG,
1644 "GAS: Unsupported GAS advertisement protocol id %u",
1645 *pos);
1646 if (sa[0] & 0x01)
1647 return; /* Invalid source address - drop silently */
1648 buf = gas_build_initial_resp(
1649 dialog_token, WLAN_STATUS_GAS_ADV_PROTO_NOT_SUPPORTED,
1650 0, 2 + slen + 2);
1651 if (buf == NULL)
1652 return;
1653 wpabuf_put_data(buf, adv_proto, 2 + slen);
1654 wpabuf_put_le16(buf, 0); /* Query Response Length */
1655 if (prot)
1656 convert_to_protected_dual(buf);
1657 if (std_addr3)
1658 hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
1659 wpabuf_head(buf),
1660 wpabuf_len(buf));
1661 else
1662 hostapd_drv_send_action_addr3_ap(hapd,
1663 hapd->iface->freq, 0,
1664 sa, wpabuf_head(buf),
1665 wpabuf_len(buf));
1666 wpabuf_free(buf);
1667 return;
1668 }
1669
1670 pos = next;
1671 /* Query Request */
1672 if (end - pos < 2)
1673 return;
1674 slen = WPA_GET_LE16(pos);
1675 pos += 2;
1676 if (slen > end - pos)
1677 return;
1678 end = pos + slen;
1679
1680 #ifdef CONFIG_DPP
1681 if (dpp) {
1682 struct wpabuf *msg;
1683
1684 msg = hostapd_dpp_gas_req_handler(hapd, sa, pos, slen,
1685 data, len);
1686 if (!msg)
1687 return;
1688 gas_serv_req_dpp_processing(hapd, sa, dialog_token, prot, msg);
1689 return;
1690 }
1691 #endif /* CONFIG_DPP */
1692
1693 /* ANQP Query Request */
1694 while (pos < end) {
1695 u16 info_id, elen;
1696
1697 if (end - pos < 4)
1698 return;
1699
1700 info_id = WPA_GET_LE16(pos);
1701 pos += 2;
1702 elen = WPA_GET_LE16(pos);
1703 pos += 2;
1704
1705 if (elen > end - pos) {
1706 wpa_printf(MSG_DEBUG, "ANQP: Invalid Query Request");
1707 return;
1708 }
1709
1710 switch (info_id) {
1711 case ANQP_QUERY_LIST:
1712 rx_anqp_query_list(hapd, pos, pos + elen, &qi);
1713 break;
1714 case ANQP_VENDOR_SPECIFIC:
1715 rx_anqp_vendor_specific(hapd, pos, pos + elen, &qi);
1716 break;
1717 default:
1718 wpa_printf(MSG_DEBUG, "ANQP: Unsupported Query "
1719 "Request element %u", info_id);
1720 break;
1721 }
1722
1723 pos += elen;
1724 }
1725
1726 gas_serv_req_local_processing(hapd, sa, dialog_token, &qi, prot,
1727 std_addr3);
1728 }
1729
1730
1731 static void gas_serv_rx_gas_comeback_req(struct hostapd_data *hapd,
1732 const u8 *sa,
1733 const u8 *data, size_t len, int prot,
1734 int std_addr3)
1735 {
1736 struct gas_dialog_info *dialog;
1737 struct wpabuf *buf, *tx_buf;
1738 u8 dialog_token;
1739 size_t frag_len;
1740 int more = 0;
1741
1742 wpa_hexdump(MSG_DEBUG, "GAS: RX GAS Comeback Request", data, len);
1743 if (len < 1)
1744 return;
1745 dialog_token = *data;
1746 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Dialog Token: %u",
1747 dialog_token);
1748
1749 dialog = gas_serv_dialog_find(hapd, sa, dialog_token);
1750 if (!dialog) {
1751 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: No pending SD "
1752 "response fragment for " MACSTR " dialog token %u",
1753 MAC2STR(sa), dialog_token);
1754
1755 if (sa[0] & 0x01)
1756 return; /* Invalid source address - drop silently */
1757 tx_buf = gas_anqp_build_comeback_resp_buf(
1758 dialog_token, WLAN_STATUS_NO_OUTSTANDING_GAS_REQ, 0, 0,
1759 0, NULL);
1760 if (tx_buf == NULL)
1761 return;
1762 goto send_resp;
1763 }
1764
1765 frag_len = wpabuf_len(dialog->sd_resp) - dialog->sd_resp_pos;
1766 if (frag_len > hapd->conf->gas_frag_limit) {
1767 frag_len = hapd->conf->gas_frag_limit;
1768 more = 1;
1769 }
1770 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: resp frag_len %u",
1771 (unsigned int) frag_len);
1772 buf = wpabuf_alloc_copy(wpabuf_head_u8(dialog->sd_resp) +
1773 dialog->sd_resp_pos, frag_len);
1774 if (buf == NULL) {
1775 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Failed to allocate "
1776 "buffer");
1777 gas_serv_dialog_clear(dialog);
1778 return;
1779 }
1780 #ifdef CONFIG_DPP
1781 if (dialog->dpp) {
1782 tx_buf = gas_build_comeback_resp(dialog_token,
1783 WLAN_STATUS_SUCCESS,
1784 dialog->sd_frag_id, more, 0,
1785 10 + frag_len);
1786 if (tx_buf) {
1787 gas_serv_write_dpp_adv_proto(tx_buf);
1788 wpabuf_put_buf(tx_buf, buf);
1789 }
1790 } else
1791 #endif /* CONFIG_DPP */
1792 tx_buf = gas_anqp_build_comeback_resp_buf(dialog_token,
1793 WLAN_STATUS_SUCCESS,
1794 dialog->sd_frag_id,
1795 more, 0, buf);
1796 wpabuf_free(buf);
1797 if (tx_buf == NULL) {
1798 gas_serv_dialog_clear(dialog);
1799 return;
1800 }
1801 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: Tx GAS Comeback Response "
1802 "(frag_id %d more=%d frag_len=%d)",
1803 dialog->sd_frag_id, more, (int) frag_len);
1804 dialog->sd_frag_id++;
1805 dialog->sd_resp_pos += frag_len;
1806
1807 if (more) {
1808 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: %d more bytes remain "
1809 "to be sent",
1810 (int) (wpabuf_len(dialog->sd_resp) -
1811 dialog->sd_resp_pos));
1812 } else {
1813 wpa_msg(hapd->msg_ctx, MSG_DEBUG, "GAS: All fragments of "
1814 "SD response sent");
1815 #ifdef CONFIG_DPP
1816 if (dialog->dpp)
1817 hostapd_dpp_gas_status_handler(hapd, 1);
1818 #endif /* CONFIG_DPP */
1819 gas_serv_dialog_clear(dialog);
1820 gas_serv_free_dialogs(hapd, sa);
1821 }
1822
1823 send_resp:
1824 if (prot)
1825 convert_to_protected_dual(tx_buf);
1826 if (std_addr3)
1827 hostapd_drv_send_action(hapd, hapd->iface->freq, 0, sa,
1828 wpabuf_head(tx_buf),
1829 wpabuf_len(tx_buf));
1830 else
1831 hostapd_drv_send_action_addr3_ap(hapd, hapd->iface->freq, 0, sa,
1832 wpabuf_head(tx_buf),
1833 wpabuf_len(tx_buf));
1834 wpabuf_free(tx_buf);
1835 }
1836
1837
1838 static void gas_serv_rx_public_action(void *ctx, const u8 *buf, size_t len,
1839 int freq)
1840 {
1841 struct hostapd_data *hapd = ctx;
1842 const struct ieee80211_mgmt *mgmt;
1843 const u8 *sa, *data;
1844 int prot, std_addr3;
1845
1846 mgmt = (const struct ieee80211_mgmt *) buf;
1847 if (len < IEEE80211_HDRLEN + 2)
1848 return;
1849 if (mgmt->u.action.category != WLAN_ACTION_PUBLIC &&
1850 mgmt->u.action.category != WLAN_ACTION_PROTECTED_DUAL)
1851 return;
1852 /*
1853 * Note: Public Action and Protected Dual of Public Action frames share
1854 * the same payload structure, so it is fine to use definitions of
1855 * Public Action frames to process both.
1856 */
1857 prot = mgmt->u.action.category == WLAN_ACTION_PROTECTED_DUAL;
1858 sa = mgmt->sa;
1859 if (hapd->conf->gas_address3 == 1)
1860 std_addr3 = 1;
1861 else if (hapd->conf->gas_address3 == 2)
1862 std_addr3 = 0;
1863 else
1864 std_addr3 = is_broadcast_ether_addr(mgmt->bssid);
1865 len -= IEEE80211_HDRLEN + 1;
1866 data = buf + IEEE80211_HDRLEN + 1;
1867 switch (data[0]) {
1868 case WLAN_PA_GAS_INITIAL_REQ:
1869 gas_serv_rx_gas_initial_req(hapd, sa, data + 1, len - 1, prot,
1870 std_addr3);
1871 break;
1872 case WLAN_PA_GAS_COMEBACK_REQ:
1873 gas_serv_rx_gas_comeback_req(hapd, sa, data + 1, len - 1, prot,
1874 std_addr3);
1875 break;
1876 }
1877 }
1878
1879
1880 int gas_serv_init(struct hostapd_data *hapd)
1881 {
1882 hapd->public_action_cb2 = gas_serv_rx_public_action;
1883 hapd->public_action_cb2_ctx = hapd;
1884 return 0;
1885 }
1886
1887
1888 void gas_serv_deinit(struct hostapd_data *hapd)
1889 {
1890 }