]>
Commit | Line | Data |
---|---|---|
25471fe3 JK |
1 | /* |
2 | * Copyright (c) 2009, Atheros Communications, Inc. | |
1d2215fc | 3 | * Copyright (c) 2011-2013, Qualcomm Atheros, Inc. |
25471fe3 JK |
4 | * |
5 | * This software may be distributed under the terms of the BSD license. | |
6 | * See README for more details. | |
7 | */ | |
8 | ||
9 | #include "includes.h" | |
d10b01d2 | 10 | #include <sys/stat.h> |
25471fe3 JK |
11 | |
12 | #include "common.h" | |
13 | #include "eloop.h" | |
14 | #include "common/ieee802_11_common.h" | |
15 | #include "common/ieee802_11_defs.h" | |
16 | #include "common/gas.h" | |
17 | #include "common/wpa_ctrl.h" | |
7ef69479 | 18 | #include "rsn_supp/wpa.h" |
25471fe3 JK |
19 | #include "wpa_supplicant_i.h" |
20 | #include "driver_i.h" | |
21 | #include "config.h" | |
b572df86 | 22 | #include "scan.h" |
25471fe3 | 23 | #include "bss.h" |
7ef69479 | 24 | #include "blacklist.h" |
25471fe3 JK |
25 | #include "gas_query.h" |
26 | #include "interworking.h" | |
27 | #include "hs20_supplicant.h" | |
8dd5c1b4 | 28 | #include "base64.h" |
25471fe3 JK |
29 | |
30 | ||
b572df86 JM |
31 | #define OSU_MAX_ITEMS 10 |
32 | ||
33 | struct osu_lang_string { | |
34 | char lang[4]; | |
35 | char text[253]; | |
36 | }; | |
37 | ||
38 | struct osu_icon { | |
39 | u16 width; | |
40 | u16 height; | |
41 | char lang[4]; | |
42 | char icon_type[256]; | |
43 | char filename[256]; | |
44 | unsigned int id; | |
45 | unsigned int failed:1; | |
46 | }; | |
47 | ||
48 | struct osu_provider { | |
49 | u8 bssid[ETH_ALEN]; | |
d9d1b952 | 50 | u8 osu_ssid[SSID_MAX_LEN]; |
b572df86 JM |
51 | u8 osu_ssid_len; |
52 | char server_uri[256]; | |
53 | u32 osu_methods; /* bit 0 = OMA-DM, bit 1 = SOAP-XML SPP */ | |
54 | char osu_nai[256]; | |
55 | struct osu_lang_string friendly_name[OSU_MAX_ITEMS]; | |
56 | size_t friendly_name_count; | |
57 | struct osu_lang_string serv_desc[OSU_MAX_ITEMS]; | |
58 | size_t serv_desc_count; | |
59 | struct osu_icon icon[OSU_MAX_ITEMS]; | |
60 | size_t icon_count; | |
61 | }; | |
62 | ||
63 | ||
ece4ac5f MG |
64 | void hs20_configure_frame_filters(struct wpa_supplicant *wpa_s) |
65 | { | |
66 | struct wpa_bss *bss = wpa_s->current_bss; | |
67 | u8 *bssid = wpa_s->bssid; | |
68 | const u8 *ie; | |
69 | const u8 *ext_capa; | |
70 | u32 filter = 0; | |
71 | ||
72 | if (!bss || !is_hs20_network(wpa_s, wpa_s->current_ssid, bss)) { | |
73 | wpa_printf(MSG_DEBUG, | |
74 | "Not configuring frame filtering - BSS " MACSTR | |
75 | " is not a Hotspot 2.0 network", MAC2STR(bssid)); | |
76 | return; | |
77 | } | |
78 | ||
79 | ie = wpa_bss_get_vendor_ie(bss, HS20_IE_VENDOR_TYPE); | |
80 | ||
81 | /* Check if DGAF disabled bit is zero (5th byte in the IE) */ | |
82 | if (!ie || ie[1] < 5) | |
83 | wpa_printf(MSG_DEBUG, | |
84 | "Not configuring frame filtering - Can't extract DGAF bit"); | |
85 | else if (!(ie[6] & HS20_DGAF_DISABLED)) | |
86 | filter |= WPA_DATA_FRAME_FILTER_FLAG_GTK; | |
87 | ||
88 | ext_capa = wpa_bss_get_ie(bss, WLAN_EID_EXT_CAPAB); | |
89 | if (!ext_capa || ext_capa[1] < 2) { | |
90 | wpa_printf(MSG_DEBUG, | |
91 | "Not configuring frame filtering - Can't extract Proxy ARP bit"); | |
92 | return; | |
93 | } | |
94 | ||
95 | /* Check if Proxy ARP is enabled (2nd byte in the IE) */ | |
96 | if (ext_capa[3] & BIT(4)) | |
97 | filter |= WPA_DATA_FRAME_FILTER_FLAG_ARP | | |
98 | WPA_DATA_FRAME_FILTER_FLAG_NA; | |
99 | ||
100 | wpa_drv_configure_frame_filters(wpa_s, filter); | |
101 | } | |
102 | ||
103 | ||
f9cd147d | 104 | void wpas_hs20_add_indication(struct wpabuf *buf, int pps_mo_id) |
c923b8a5 | 105 | { |
f9cd147d JM |
106 | u8 conf; |
107 | ||
c923b8a5 | 108 | wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC); |
f9cd147d | 109 | wpabuf_put_u8(buf, pps_mo_id >= 0 ? 7 : 5); |
c923b8a5 JK |
110 | wpabuf_put_be24(buf, OUI_WFA); |
111 | wpabuf_put_u8(buf, HS20_INDICATION_OUI_TYPE); | |
f9cd147d JM |
112 | conf = HS20_VERSION; |
113 | if (pps_mo_id >= 0) | |
114 | conf |= HS20_PPS_MO_ID_PRESENT; | |
115 | wpabuf_put_u8(buf, conf); | |
116 | if (pps_mo_id >= 0) | |
117 | wpabuf_put_le16(buf, pps_mo_id); | |
c923b8a5 JK |
118 | } |
119 | ||
120 | ||
55a2df43 JM |
121 | int is_hs20_network(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid, |
122 | struct wpa_bss *bss) | |
123 | { | |
124 | if (!wpa_s->conf->hs20 || !ssid) | |
125 | return 0; | |
126 | ||
127 | if (ssid->parent_cred) | |
128 | return 1; | |
129 | ||
130 | if (bss && !wpa_bss_get_vendor_ie(bss, HS20_IE_VENDOR_TYPE)) | |
131 | return 0; | |
132 | ||
133 | /* | |
134 | * This may catch some non-Hotspot 2.0 cases, but it is safer to do that | |
135 | * than cause Hotspot 2.0 connections without indication element getting | |
136 | * added. Non-Hotspot 2.0 APs should ignore the unknown vendor element. | |
137 | */ | |
138 | ||
139 | if (!(ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X)) | |
140 | return 0; | |
141 | if (!(ssid->pairwise_cipher & WPA_CIPHER_CCMP)) | |
142 | return 0; | |
143 | if (ssid->proto != WPA_PROTO_RSN) | |
144 | return 0; | |
145 | ||
146 | return 1; | |
147 | } | |
148 | ||
149 | ||
f9cd147d JM |
150 | int hs20_get_pps_mo_id(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid) |
151 | { | |
152 | struct wpa_cred *cred; | |
153 | ||
e376290c DS |
154 | if (ssid == NULL) |
155 | return 0; | |
156 | ||
157 | if (ssid->update_identifier) | |
158 | return ssid->update_identifier; | |
159 | ||
160 | if (ssid->parent_cred == NULL) | |
f9cd147d JM |
161 | return 0; |
162 | ||
163 | for (cred = wpa_s->conf->cred; cred; cred = cred->next) { | |
164 | if (ssid->parent_cred == cred) | |
165 | return cred->update_identifier; | |
166 | } | |
167 | ||
168 | return 0; | |
169 | } | |
170 | ||
171 | ||
cf28c66b DS |
172 | void hs20_put_anqp_req(u32 stypes, const u8 *payload, size_t payload_len, |
173 | struct wpabuf *buf) | |
25471fe3 | 174 | { |
25471fe3 JK |
175 | u8 *len_pos; |
176 | ||
25471fe3 | 177 | if (buf == NULL) |
cf28c66b | 178 | return; |
25471fe3 JK |
179 | |
180 | len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC); | |
181 | wpabuf_put_be24(buf, OUI_WFA); | |
182 | wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE); | |
183 | if (stypes == BIT(HS20_STYPE_NAI_HOME_REALM_QUERY)) { | |
184 | wpabuf_put_u8(buf, HS20_STYPE_NAI_HOME_REALM_QUERY); | |
185 | wpabuf_put_u8(buf, 0); /* Reserved */ | |
186 | if (payload) | |
187 | wpabuf_put_data(buf, payload, payload_len); | |
184e110c JM |
188 | } else if (stypes == BIT(HS20_STYPE_ICON_REQUEST)) { |
189 | wpabuf_put_u8(buf, HS20_STYPE_ICON_REQUEST); | |
190 | wpabuf_put_u8(buf, 0); /* Reserved */ | |
191 | if (payload) | |
192 | wpabuf_put_data(buf, payload, payload_len); | |
25471fe3 JK |
193 | } else { |
194 | u8 i; | |
195 | wpabuf_put_u8(buf, HS20_STYPE_QUERY_LIST); | |
196 | wpabuf_put_u8(buf, 0); /* Reserved */ | |
197 | for (i = 0; i < 32; i++) { | |
198 | if (stypes & BIT(i)) | |
199 | wpabuf_put_u8(buf, i); | |
200 | } | |
201 | } | |
202 | gas_anqp_set_element_len(buf, len_pos); | |
203 | ||
204 | gas_anqp_set_len(buf); | |
cf28c66b DS |
205 | } |
206 | ||
207 | ||
99a9423c JM |
208 | static struct wpabuf * hs20_build_anqp_req(u32 stypes, const u8 *payload, |
209 | size_t payload_len) | |
cf28c66b DS |
210 | { |
211 | struct wpabuf *buf; | |
212 | ||
213 | buf = gas_anqp_build_initial_req(0, 100 + payload_len); | |
214 | if (buf == NULL) | |
215 | return NULL; | |
216 | ||
217 | hs20_put_anqp_req(stypes, payload, payload_len, buf); | |
25471fe3 JK |
218 | |
219 | return buf; | |
220 | } | |
221 | ||
222 | ||
223 | int hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes, | |
8dd5c1b4 | 224 | const u8 *payload, size_t payload_len, int inmem) |
25471fe3 JK |
225 | { |
226 | struct wpabuf *buf; | |
227 | int ret = 0; | |
228 | int freq; | |
229 | struct wpa_bss *bss; | |
230 | int res; | |
8dd5c1b4 | 231 | struct icon_entry *icon_entry; |
25471fe3 | 232 | |
25471fe3 | 233 | bss = wpa_bss_get_bssid(wpa_s, dst); |
0c280718 MG |
234 | if (!bss) { |
235 | wpa_printf(MSG_WARNING, | |
236 | "ANQP: Cannot send query to unknown BSS " | |
237 | MACSTR, MAC2STR(dst)); | |
25471fe3 | 238 | return -1; |
0c280718 MG |
239 | } |
240 | ||
241 | wpa_bss_anqp_unshare_alloc(bss); | |
242 | freq = bss->freq; | |
25471fe3 JK |
243 | |
244 | wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for " | |
245 | "subtypes 0x%x", MAC2STR(dst), stypes); | |
246 | ||
247 | buf = hs20_build_anqp_req(stypes, payload, payload_len); | |
248 | if (buf == NULL) | |
249 | return -1; | |
250 | ||
251 | res = gas_query_req(wpa_s->gas, dst, freq, buf, anqp_resp_cb, wpa_s); | |
252 | if (res < 0) { | |
253 | wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request"); | |
24c694b4 | 254 | wpabuf_free(buf); |
8dd5c1b4 | 255 | return -1; |
25471fe3 JK |
256 | } else |
257 | wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token " | |
258 | "%u", res); | |
259 | ||
8dd5c1b4 JN |
260 | if (inmem) { |
261 | icon_entry = os_zalloc(sizeof(struct icon_entry)); | |
262 | if (!icon_entry) | |
263 | return -1; | |
264 | os_memcpy(icon_entry->bssid, dst, ETH_ALEN); | |
265 | icon_entry->file_name = os_malloc(payload_len + 1); | |
266 | if (!icon_entry->file_name) { | |
267 | os_free(icon_entry); | |
268 | return -1; | |
269 | } | |
270 | os_memcpy(icon_entry->file_name, payload, payload_len); | |
271 | icon_entry->file_name[payload_len] = '\0'; | |
272 | icon_entry->dialog_token = res; | |
273 | ||
ca9968a0 | 274 | dl_list_add(&wpa_s->icon_head, &icon_entry->list); |
8dd5c1b4 JN |
275 | } |
276 | ||
25471fe3 JK |
277 | return ret; |
278 | } | |
279 | ||
280 | ||
8dd5c1b4 JN |
281 | static struct icon_entry * hs20_find_icon(struct wpa_supplicant *wpa_s, |
282 | const u8 *bssid, | |
283 | const char *file_name) | |
284 | { | |
285 | struct icon_entry *icon; | |
286 | ||
ca9968a0 | 287 | dl_list_for_each(icon, &wpa_s->icon_head, struct icon_entry, list) { |
8dd5c1b4 JN |
288 | if (os_memcmp(icon->bssid, bssid, ETH_ALEN) == 0 && |
289 | os_strcmp(icon->file_name, file_name) == 0 && icon->image) | |
290 | return icon; | |
291 | } | |
292 | ||
293 | return NULL; | |
294 | } | |
295 | ||
296 | ||
297 | int hs20_get_icon(struct wpa_supplicant *wpa_s, const u8 *bssid, | |
298 | const char *file_name, size_t offset, size_t size, | |
299 | char *reply, size_t buf_len) | |
300 | { | |
301 | struct icon_entry *icon; | |
302 | size_t out_size; | |
303 | unsigned char *b64; | |
304 | size_t b64_size; | |
305 | int reply_size; | |
306 | ||
307 | wpa_printf(MSG_DEBUG, "HS20: Get icon " MACSTR " %s @ %u +%u (%u)", | |
308 | MAC2STR(bssid), file_name, (unsigned int) offset, | |
309 | (unsigned int) size, (unsigned int) buf_len); | |
310 | ||
8dd5c1b4 JN |
311 | icon = hs20_find_icon(wpa_s, bssid, file_name); |
312 | if (!icon || !icon->image || offset >= icon->image_len) | |
313 | return -1; | |
314 | if (size > icon->image_len - offset) | |
315 | size = icon->image_len - offset; | |
316 | out_size = buf_len - 3 /* max base64 padding */; | |
317 | if (size * 4 > out_size * 3) | |
318 | size = out_size * 3 / 4; | |
319 | if (size == 0) | |
320 | return -1; | |
321 | ||
322 | b64 = base64_encode(&icon->image[offset], size, &b64_size); | |
75b2a879 | 323 | if (b64 && buf_len >= b64_size) { |
8dd5c1b4 JN |
324 | os_memcpy(reply, b64, b64_size); |
325 | reply_size = b64_size; | |
326 | } else { | |
327 | reply_size = -1; | |
328 | } | |
329 | os_free(b64); | |
330 | return reply_size; | |
331 | } | |
332 | ||
333 | ||
334 | static void hs20_free_icon_entry(struct icon_entry *icon) | |
335 | { | |
336 | wpa_printf(MSG_DEBUG, "HS20: Free stored icon from " MACSTR | |
337 | " dialog_token=%u file_name=%s image_len=%u", | |
338 | MAC2STR(icon->bssid), icon->dialog_token, | |
339 | icon->file_name ? icon->file_name : "N/A", | |
340 | (unsigned int) icon->image_len); | |
341 | os_free(icon->file_name); | |
342 | os_free(icon->image); | |
343 | os_free(icon); | |
344 | } | |
345 | ||
346 | ||
347 | int hs20_del_icon(struct wpa_supplicant *wpa_s, const u8 *bssid, | |
348 | const char *file_name) | |
349 | { | |
ca9968a0 | 350 | struct icon_entry *icon, *tmp; |
8dd5c1b4 JN |
351 | int count = 0; |
352 | ||
353 | if (!bssid) | |
354 | wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons"); | |
355 | else if (!file_name) | |
356 | wpa_printf(MSG_DEBUG, "HS20: Delete all stored icons for " | |
357 | MACSTR, MAC2STR(bssid)); | |
358 | else | |
359 | wpa_printf(MSG_DEBUG, "HS20: Delete stored icons for " | |
360 | MACSTR " file name %s", MAC2STR(bssid), file_name); | |
361 | ||
ca9968a0 JM |
362 | dl_list_for_each_safe(icon, tmp, &wpa_s->icon_head, struct icon_entry, |
363 | list) { | |
364 | if ((!bssid || os_memcmp(icon->bssid, bssid, ETH_ALEN) == 0) && | |
8dd5c1b4 | 365 | (!file_name || |
ca9968a0 JM |
366 | os_strcmp(icon->file_name, file_name) == 0)) { |
367 | dl_list_del(&icon->list); | |
368 | hs20_free_icon_entry(icon); | |
8dd5c1b4 | 369 | count++; |
8dd5c1b4 | 370 | } |
8dd5c1b4 JN |
371 | } |
372 | return count == 0 ? -1 : 0; | |
373 | } | |
374 | ||
375 | ||
d10b01d2 AN |
376 | static void hs20_set_osu_access_permission(const char *osu_dir, |
377 | const char *fname) | |
378 | { | |
379 | struct stat statbuf; | |
380 | ||
381 | /* Get OSU directory information */ | |
382 | if (stat(osu_dir, &statbuf) < 0) { | |
383 | wpa_printf(MSG_WARNING, "Cannot stat the OSU directory %s", | |
384 | osu_dir); | |
385 | return; | |
386 | } | |
387 | ||
388 | if (chmod(fname, statbuf.st_mode) < 0) { | |
389 | wpa_printf(MSG_WARNING, | |
390 | "Cannot change the permissions for %s", fname); | |
391 | return; | |
392 | } | |
393 | ||
394 | if (chown(fname, statbuf.st_uid, statbuf.st_gid) < 0) { | |
395 | wpa_printf(MSG_WARNING, "Cannot change the ownership for %s", | |
396 | fname); | |
397 | } | |
398 | } | |
399 | ||
61f25f80 JM |
400 | |
401 | static void hs20_remove_duplicate_icons(struct wpa_supplicant *wpa_s, | |
402 | struct icon_entry *new_icon) | |
403 | { | |
404 | struct icon_entry *icon, *tmp; | |
405 | ||
406 | dl_list_for_each_safe(icon, tmp, &wpa_s->icon_head, struct icon_entry, | |
407 | list) { | |
408 | if (icon == new_icon) | |
409 | continue; | |
410 | if (os_memcmp(icon->bssid, new_icon->bssid, ETH_ALEN) == 0 && | |
411 | os_strcmp(icon->file_name, new_icon->file_name) == 0) { | |
412 | dl_list_del(&icon->list); | |
413 | hs20_free_icon_entry(icon); | |
414 | } | |
415 | } | |
416 | } | |
417 | ||
418 | ||
b572df86 JM |
419 | static int hs20_process_icon_binary_file(struct wpa_supplicant *wpa_s, |
420 | const u8 *sa, const u8 *pos, | |
8dd5c1b4 | 421 | size_t slen, u8 dialog_token) |
b572df86 JM |
422 | { |
423 | char fname[256]; | |
424 | int png; | |
425 | FILE *f; | |
426 | u16 data_len; | |
8dd5c1b4 JN |
427 | struct icon_entry *icon; |
428 | ||
ca9968a0 | 429 | dl_list_for_each(icon, &wpa_s->icon_head, struct icon_entry, list) { |
8dd5c1b4 JN |
430 | if (icon->dialog_token == dialog_token && !icon->image && |
431 | os_memcmp(icon->bssid, sa, ETH_ALEN) == 0) { | |
a1f11e34 | 432 | icon->image = os_memdup(pos, slen); |
8dd5c1b4 JN |
433 | if (!icon->image) |
434 | return -1; | |
8dd5c1b4 | 435 | icon->image_len = slen; |
61f25f80 | 436 | hs20_remove_duplicate_icons(wpa_s, icon); |
8dd5c1b4 | 437 | wpa_msg(wpa_s, MSG_INFO, |
f465c32d | 438 | RX_HS20_ICON MACSTR " %s %u", |
8dd5c1b4 JN |
439 | MAC2STR(sa), icon->file_name, |
440 | (unsigned int) icon->image_len); | |
441 | return 0; | |
442 | } | |
443 | } | |
b572df86 | 444 | |
f465c32d | 445 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR " Icon Binary File", |
b572df86 JM |
446 | MAC2STR(sa)); |
447 | ||
448 | if (slen < 4) { | |
449 | wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " | |
450 | "value from " MACSTR, MAC2STR(sa)); | |
451 | return -1; | |
452 | } | |
453 | ||
454 | wpa_printf(MSG_DEBUG, "HS 2.0: Download Status Code %u", *pos); | |
455 | if (*pos != 0) | |
456 | return -1; | |
457 | pos++; | |
458 | slen--; | |
459 | ||
460 | if ((size_t) 1 + pos[0] > slen) { | |
461 | wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " | |
462 | "value from " MACSTR, MAC2STR(sa)); | |
463 | return -1; | |
464 | } | |
465 | wpa_hexdump_ascii(MSG_DEBUG, "Icon Type", pos + 1, pos[0]); | |
466 | png = os_strncasecmp((char *) pos + 1, "image/png", 9) == 0; | |
467 | slen -= 1 + pos[0]; | |
468 | pos += 1 + pos[0]; | |
469 | ||
470 | if (slen < 2) { | |
471 | wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " | |
472 | "value from " MACSTR, MAC2STR(sa)); | |
473 | return -1; | |
474 | } | |
475 | data_len = WPA_GET_LE16(pos); | |
476 | pos += 2; | |
477 | slen -= 2; | |
478 | ||
479 | if (data_len > slen) { | |
480 | wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short Icon Binary File " | |
481 | "value from " MACSTR, MAC2STR(sa)); | |
482 | return -1; | |
483 | } | |
484 | ||
485 | wpa_printf(MSG_DEBUG, "Icon Binary Data: %u bytes", data_len); | |
486 | if (wpa_s->conf->osu_dir == NULL) | |
487 | return -1; | |
488 | ||
489 | wpa_s->osu_icon_id++; | |
490 | if (wpa_s->osu_icon_id == 0) | |
491 | wpa_s->osu_icon_id++; | |
492 | snprintf(fname, sizeof(fname), "%s/osu-icon-%u.%s", | |
493 | wpa_s->conf->osu_dir, wpa_s->osu_icon_id, | |
494 | png ? "png" : "icon"); | |
495 | f = fopen(fname, "wb"); | |
496 | if (f == NULL) | |
497 | return -1; | |
d10b01d2 AN |
498 | |
499 | hs20_set_osu_access_permission(wpa_s->conf->osu_dir, fname); | |
500 | ||
b572df86 JM |
501 | if (fwrite(pos, slen, 1, f) != 1) { |
502 | fclose(f); | |
503 | unlink(fname); | |
504 | return -1; | |
505 | } | |
506 | fclose(f); | |
507 | ||
f465c32d | 508 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP_ICON "%s", fname); |
b572df86 JM |
509 | return 0; |
510 | } | |
511 | ||
512 | ||
513 | static void hs20_continue_icon_fetch(void *eloop_ctx, void *sock_ctx) | |
514 | { | |
515 | struct wpa_supplicant *wpa_s = eloop_ctx; | |
516 | if (wpa_s->fetch_osu_icon_in_progress) | |
517 | hs20_next_osu_icon(wpa_s); | |
518 | } | |
519 | ||
520 | ||
521 | static void hs20_osu_icon_fetch_result(struct wpa_supplicant *wpa_s, int res) | |
522 | { | |
523 | size_t i, j; | |
230e3735 JM |
524 | struct os_reltime now, tmp; |
525 | int dur; | |
526 | ||
527 | os_get_reltime(&now); | |
528 | os_reltime_sub(&now, &wpa_s->osu_icon_fetch_start, &tmp); | |
529 | dur = tmp.sec * 1000 + tmp.usec / 1000; | |
530 | wpa_printf(MSG_DEBUG, "HS 2.0: Icon fetch dur=%d ms res=%d", | |
531 | dur, res); | |
532 | ||
b572df86 JM |
533 | for (i = 0; i < wpa_s->osu_prov_count; i++) { |
534 | struct osu_provider *osu = &wpa_s->osu_prov[i]; | |
535 | for (j = 0; j < osu->icon_count; j++) { | |
536 | struct osu_icon *icon = &osu->icon[j]; | |
537 | if (icon->id || icon->failed) | |
538 | continue; | |
539 | if (res < 0) | |
540 | icon->failed = 1; | |
541 | else | |
542 | icon->id = wpa_s->osu_icon_id; | |
543 | return; | |
544 | } | |
545 | } | |
546 | } | |
547 | ||
548 | ||
25471fe3 | 549 | void hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s, |
8266e6c6 | 550 | struct wpa_bss *bss, const u8 *sa, |
8dd5c1b4 | 551 | const u8 *data, size_t slen, u8 dialog_token) |
25471fe3 JK |
552 | { |
553 | const u8 *pos = data; | |
554 | u8 subtype; | |
476aed35 | 555 | struct wpa_bss_anqp *anqp = NULL; |
b572df86 | 556 | int ret; |
25471fe3 JK |
557 | |
558 | if (slen < 2) | |
559 | return; | |
560 | ||
476aed35 JM |
561 | if (bss) |
562 | anqp = bss->anqp; | |
563 | ||
25471fe3 JK |
564 | subtype = *pos++; |
565 | slen--; | |
566 | ||
567 | pos++; /* Reserved */ | |
568 | slen--; | |
569 | ||
570 | switch (subtype) { | |
571 | case HS20_STYPE_CAPABILITY_LIST: | |
f465c32d | 572 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
25471fe3 JK |
573 | " HS Capability List", MAC2STR(sa)); |
574 | wpa_hexdump_ascii(MSG_DEBUG, "HS Capability List", pos, slen); | |
185ada47 AN |
575 | if (anqp) { |
576 | wpabuf_free(anqp->hs20_capability_list); | |
577 | anqp->hs20_capability_list = | |
578 | wpabuf_alloc_copy(pos, slen); | |
579 | } | |
25471fe3 JK |
580 | break; |
581 | case HS20_STYPE_OPERATOR_FRIENDLY_NAME: | |
f465c32d | 582 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
25471fe3 JK |
583 | " Operator Friendly Name", MAC2STR(sa)); |
584 | wpa_hexdump_ascii(MSG_DEBUG, "oper friendly name", pos, slen); | |
476aed35 JM |
585 | if (anqp) { |
586 | wpabuf_free(anqp->hs20_operator_friendly_name); | |
587 | anqp->hs20_operator_friendly_name = | |
25471fe3 JK |
588 | wpabuf_alloc_copy(pos, slen); |
589 | } | |
590 | break; | |
591 | case HS20_STYPE_WAN_METRICS: | |
2edcd504 JM |
592 | wpa_hexdump(MSG_DEBUG, "WAN Metrics", pos, slen); |
593 | if (slen < 13) { | |
594 | wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short WAN " | |
595 | "Metrics value from " MACSTR, MAC2STR(sa)); | |
596 | break; | |
597 | } | |
f465c32d | 598 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
2edcd504 JM |
599 | " WAN Metrics %02x:%u:%u:%u:%u:%u", MAC2STR(sa), |
600 | pos[0], WPA_GET_LE32(pos + 1), WPA_GET_LE32(pos + 5), | |
601 | pos[9], pos[10], WPA_GET_LE16(pos + 11)); | |
476aed35 JM |
602 | if (anqp) { |
603 | wpabuf_free(anqp->hs20_wan_metrics); | |
604 | anqp->hs20_wan_metrics = wpabuf_alloc_copy(pos, slen); | |
25471fe3 JK |
605 | } |
606 | break; | |
607 | case HS20_STYPE_CONNECTION_CAPABILITY: | |
f465c32d | 608 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
25471fe3 JK |
609 | " Connection Capability", MAC2STR(sa)); |
610 | wpa_hexdump_ascii(MSG_DEBUG, "conn capability", pos, slen); | |
476aed35 JM |
611 | if (anqp) { |
612 | wpabuf_free(anqp->hs20_connection_capability); | |
613 | anqp->hs20_connection_capability = | |
25471fe3 JK |
614 | wpabuf_alloc_copy(pos, slen); |
615 | } | |
616 | break; | |
617 | case HS20_STYPE_OPERATING_CLASS: | |
f465c32d | 618 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
25471fe3 JK |
619 | " Operating Class", MAC2STR(sa)); |
620 | wpa_hexdump_ascii(MSG_DEBUG, "Operating Class", pos, slen); | |
476aed35 JM |
621 | if (anqp) { |
622 | wpabuf_free(anqp->hs20_operating_class); | |
623 | anqp->hs20_operating_class = | |
25471fe3 JK |
624 | wpabuf_alloc_copy(pos, slen); |
625 | } | |
626 | break; | |
1d2215fc | 627 | case HS20_STYPE_OSU_PROVIDERS_LIST: |
f465c32d | 628 | wpa_msg(wpa_s, MSG_INFO, RX_HS20_ANQP MACSTR |
1d2215fc | 629 | " OSU Providers list", MAC2STR(sa)); |
a6739e19 | 630 | wpa_s->num_prov_found++; |
1d2215fc JM |
631 | if (anqp) { |
632 | wpabuf_free(anqp->hs20_osu_providers_list); | |
633 | anqp->hs20_osu_providers_list = | |
634 | wpabuf_alloc_copy(pos, slen); | |
635 | } | |
636 | break; | |
184e110c | 637 | case HS20_STYPE_ICON_BINARY_FILE: |
8dd5c1b4 JN |
638 | ret = hs20_process_icon_binary_file(wpa_s, sa, pos, slen, |
639 | dialog_token); | |
b572df86 JM |
640 | if (wpa_s->fetch_osu_icon_in_progress) { |
641 | hs20_osu_icon_fetch_result(wpa_s, ret); | |
642 | eloop_cancel_timeout(hs20_continue_icon_fetch, | |
643 | wpa_s, NULL); | |
644 | eloop_register_timeout(0, 0, hs20_continue_icon_fetch, | |
645 | wpa_s, NULL); | |
646 | } | |
647 | break; | |
648 | default: | |
649 | wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype); | |
650 | break; | |
651 | } | |
652 | } | |
653 | ||
654 | ||
655 | void hs20_notify_parse_done(struct wpa_supplicant *wpa_s) | |
656 | { | |
657 | if (!wpa_s->fetch_osu_icon_in_progress) | |
658 | return; | |
659 | if (eloop_is_timeout_registered(hs20_continue_icon_fetch, wpa_s, NULL)) | |
660 | return; | |
661 | /* | |
662 | * We are going through icon fetch, but no icon response was received. | |
663 | * Assume this means the current AP could not provide an answer to avoid | |
664 | * getting stuck in fetch iteration. | |
665 | */ | |
666 | hs20_icon_fetch_failed(wpa_s); | |
667 | } | |
668 | ||
669 | ||
670 | static void hs20_free_osu_prov_entry(struct osu_provider *prov) | |
671 | { | |
672 | } | |
673 | ||
674 | ||
675 | void hs20_free_osu_prov(struct wpa_supplicant *wpa_s) | |
676 | { | |
677 | size_t i; | |
678 | for (i = 0; i < wpa_s->osu_prov_count; i++) | |
679 | hs20_free_osu_prov_entry(&wpa_s->osu_prov[i]); | |
680 | os_free(wpa_s->osu_prov); | |
681 | wpa_s->osu_prov = NULL; | |
682 | wpa_s->osu_prov_count = 0; | |
683 | } | |
684 | ||
685 | ||
686 | static void hs20_osu_fetch_done(struct wpa_supplicant *wpa_s) | |
687 | { | |
688 | char fname[256]; | |
689 | FILE *f; | |
690 | size_t i, j; | |
691 | ||
692 | wpa_s->fetch_osu_info = 0; | |
693 | wpa_s->fetch_osu_icon_in_progress = 0; | |
184e110c | 694 | |
b572df86 JM |
695 | if (wpa_s->conf->osu_dir == NULL) { |
696 | hs20_free_osu_prov(wpa_s); | |
697 | wpa_s->fetch_anqp_in_progress = 0; | |
698 | return; | |
699 | } | |
700 | ||
701 | snprintf(fname, sizeof(fname), "%s/osu-providers.txt", | |
702 | wpa_s->conf->osu_dir); | |
703 | f = fopen(fname, "w"); | |
704 | if (f == NULL) { | |
9636b07a JM |
705 | wpa_msg(wpa_s, MSG_INFO, |
706 | "Could not write OSU provider information"); | |
b572df86 | 707 | hs20_free_osu_prov(wpa_s); |
cbf8d181 | 708 | wpa_s->fetch_anqp_in_progress = 0; |
b572df86 JM |
709 | return; |
710 | } | |
d10b01d2 AN |
711 | |
712 | hs20_set_osu_access_permission(wpa_s->conf->osu_dir, fname); | |
713 | ||
b572df86 JM |
714 | for (i = 0; i < wpa_s->osu_prov_count; i++) { |
715 | struct osu_provider *osu = &wpa_s->osu_prov[i]; | |
716 | if (i > 0) | |
717 | fprintf(f, "\n"); | |
718 | fprintf(f, "OSU-PROVIDER " MACSTR "\n" | |
719 | "uri=%s\n" | |
720 | "methods=%08x\n", | |
721 | MAC2STR(osu->bssid), osu->server_uri, osu->osu_methods); | |
722 | if (osu->osu_ssid_len) { | |
723 | fprintf(f, "osu_ssid=%s\n", | |
724 | wpa_ssid_txt(osu->osu_ssid, | |
725 | osu->osu_ssid_len)); | |
726 | } | |
727 | if (osu->osu_nai[0]) | |
728 | fprintf(f, "osu_nai=%s\n", osu->osu_nai); | |
729 | for (j = 0; j < osu->friendly_name_count; j++) { | |
730 | fprintf(f, "friendly_name=%s:%s\n", | |
731 | osu->friendly_name[j].lang, | |
732 | osu->friendly_name[j].text); | |
733 | } | |
734 | for (j = 0; j < osu->serv_desc_count; j++) { | |
735 | fprintf(f, "desc=%s:%s\n", | |
736 | osu->serv_desc[j].lang, | |
737 | osu->serv_desc[j].text); | |
738 | } | |
739 | for (j = 0; j < osu->icon_count; j++) { | |
740 | struct osu_icon *icon = &osu->icon[j]; | |
741 | if (icon->failed) | |
742 | continue; /* could not fetch icon */ | |
743 | fprintf(f, "icon=%u:%u:%u:%s:%s:%s\n", | |
744 | icon->id, icon->width, icon->height, icon->lang, | |
745 | icon->icon_type, icon->filename); | |
746 | } | |
747 | } | |
748 | fclose(f); | |
749 | hs20_free_osu_prov(wpa_s); | |
750 | ||
751 | wpa_msg(wpa_s, MSG_INFO, "OSU provider fetch completed"); | |
752 | wpa_s->fetch_anqp_in_progress = 0; | |
753 | } | |
754 | ||
755 | ||
756 | void hs20_next_osu_icon(struct wpa_supplicant *wpa_s) | |
757 | { | |
758 | size_t i, j; | |
759 | ||
760 | wpa_printf(MSG_DEBUG, "HS 2.0: Ready to fetch next icon"); | |
761 | ||
762 | for (i = 0; i < wpa_s->osu_prov_count; i++) { | |
763 | struct osu_provider *osu = &wpa_s->osu_prov[i]; | |
764 | for (j = 0; j < osu->icon_count; j++) { | |
765 | struct osu_icon *icon = &osu->icon[j]; | |
766 | if (icon->id || icon->failed) | |
767 | continue; | |
768 | ||
769 | wpa_printf(MSG_DEBUG, "HS 2.0: Try to fetch icon '%s' " | |
770 | "from " MACSTR, icon->filename, | |
771 | MAC2STR(osu->bssid)); | |
230e3735 | 772 | os_get_reltime(&wpa_s->osu_icon_fetch_start); |
b572df86 JM |
773 | if (hs20_anqp_send_req(wpa_s, osu->bssid, |
774 | BIT(HS20_STYPE_ICON_REQUEST), | |
775 | (u8 *) icon->filename, | |
8dd5c1b4 JN |
776 | os_strlen(icon->filename), |
777 | 0) < 0) { | |
b572df86 JM |
778 | icon->failed = 1; |
779 | continue; | |
780 | } | |
781 | return; | |
782 | } | |
783 | } | |
784 | ||
785 | wpa_printf(MSG_DEBUG, "HS 2.0: No more icons to fetch"); | |
786 | hs20_osu_fetch_done(wpa_s); | |
787 | } | |
788 | ||
789 | ||
790 | static void hs20_osu_add_prov(struct wpa_supplicant *wpa_s, struct wpa_bss *bss, | |
791 | const u8 *osu_ssid, u8 osu_ssid_len, | |
792 | const u8 *pos, size_t len) | |
793 | { | |
794 | struct osu_provider *prov; | |
795 | const u8 *end = pos + len; | |
796 | u16 len2; | |
797 | const u8 *pos2; | |
0570a3ea | 798 | u8 uri_len, osu_method_len, osu_nai_len; |
b572df86 JM |
799 | |
800 | wpa_hexdump(MSG_DEBUG, "HS 2.0: Parsing OSU Provider", pos, len); | |
801 | prov = os_realloc_array(wpa_s->osu_prov, | |
802 | wpa_s->osu_prov_count + 1, | |
803 | sizeof(*prov)); | |
804 | if (prov == NULL) | |
805 | return; | |
806 | wpa_s->osu_prov = prov; | |
807 | prov = &prov[wpa_s->osu_prov_count]; | |
808 | os_memset(prov, 0, sizeof(*prov)); | |
809 | ||
810 | os_memcpy(prov->bssid, bss->bssid, ETH_ALEN); | |
811 | os_memcpy(prov->osu_ssid, osu_ssid, osu_ssid_len); | |
812 | prov->osu_ssid_len = osu_ssid_len; | |
813 | ||
814 | /* OSU Friendly Name Length */ | |
619fdfac | 815 | if (end - pos < 2) { |
b572df86 JM |
816 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU " |
817 | "Friendly Name Length"); | |
818 | return; | |
819 | } | |
820 | len2 = WPA_GET_LE16(pos); | |
821 | pos += 2; | |
0570a3ea | 822 | if (len2 > end - pos) { |
b572df86 JM |
823 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU " |
824 | "Friendly Name Duples"); | |
825 | return; | |
826 | } | |
827 | pos2 = pos; | |
828 | pos += len2; | |
829 | ||
830 | /* OSU Friendly Name Duples */ | |
619fdfac | 831 | while (pos - pos2 >= 4 && prov->friendly_name_count < OSU_MAX_ITEMS) { |
b572df86 | 832 | struct osu_lang_string *f; |
619fdfac | 833 | if (1 + pos2[0] > pos - pos2 || pos2[0] < 3) { |
b572df86 JM |
834 | wpa_printf(MSG_DEBUG, "Invalid OSU Friendly Name"); |
835 | break; | |
836 | } | |
837 | f = &prov->friendly_name[prov->friendly_name_count++]; | |
838 | os_memcpy(f->lang, pos2 + 1, 3); | |
839 | os_memcpy(f->text, pos2 + 1 + 3, pos2[0] - 3); | |
840 | pos2 += 1 + pos2[0]; | |
841 | } | |
842 | ||
843 | /* OSU Server URI */ | |
619fdfac | 844 | if (end - pos < 1) { |
355e17eb JM |
845 | wpa_printf(MSG_DEBUG, |
846 | "HS 2.0: Not enough room for OSU Server URI length"); | |
847 | return; | |
848 | } | |
849 | uri_len = *pos++; | |
850 | if (uri_len > end - pos) { | |
b572df86 JM |
851 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU Server " |
852 | "URI"); | |
853 | return; | |
854 | } | |
355e17eb JM |
855 | os_memcpy(prov->server_uri, pos, uri_len); |
856 | pos += uri_len; | |
b572df86 JM |
857 | |
858 | /* OSU Method list */ | |
619fdfac | 859 | if (end - pos < 1) { |
0570a3ea JM |
860 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU Method " |
861 | "list length"); | |
862 | return; | |
863 | } | |
864 | osu_method_len = pos[0]; | |
865 | if (osu_method_len > end - pos - 1) { | |
b572df86 JM |
866 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU Method " |
867 | "list"); | |
868 | return; | |
869 | } | |
870 | pos2 = pos + 1; | |
0570a3ea | 871 | pos += 1 + osu_method_len; |
b572df86 JM |
872 | while (pos2 < pos) { |
873 | if (*pos2 < 32) | |
874 | prov->osu_methods |= BIT(*pos2); | |
875 | pos2++; | |
876 | } | |
877 | ||
878 | /* Icons Available Length */ | |
619fdfac | 879 | if (end - pos < 2) { |
b572df86 JM |
880 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for Icons " |
881 | "Available Length"); | |
882 | return; | |
883 | } | |
884 | len2 = WPA_GET_LE16(pos); | |
885 | pos += 2; | |
0570a3ea | 886 | if (len2 > end - pos) { |
b572df86 JM |
887 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for Icons " |
888 | "Available"); | |
889 | return; | |
890 | } | |
891 | pos2 = pos; | |
892 | pos += len2; | |
893 | ||
894 | /* Icons Available */ | |
895 | while (pos2 < pos) { | |
896 | struct osu_icon *icon = &prov->icon[prov->icon_count]; | |
0570a3ea JM |
897 | u8 flen; |
898 | ||
619fdfac | 899 | if (2 + 2 + 3 + 1 + 1 > pos - pos2) { |
b572df86 | 900 | wpa_printf(MSG_DEBUG, "HS 2.0: Invalid Icon Metadata"); |
184e110c JM |
901 | break; |
902 | } | |
903 | ||
b572df86 JM |
904 | icon->width = WPA_GET_LE16(pos2); |
905 | pos2 += 2; | |
906 | icon->height = WPA_GET_LE16(pos2); | |
907 | pos2 += 2; | |
908 | os_memcpy(icon->lang, pos2, 3); | |
909 | pos2 += 3; | |
184e110c | 910 | |
619fdfac JM |
911 | flen = *pos2++; |
912 | if (flen > pos - pos2) { | |
b572df86 | 913 | wpa_printf(MSG_DEBUG, "HS 2.0: Not room for Icon Type"); |
184e110c JM |
914 | break; |
915 | } | |
619fdfac JM |
916 | os_memcpy(icon->icon_type, pos2, flen); |
917 | pos2 += flen; | |
184e110c | 918 | |
619fdfac | 919 | if (pos - pos2 < 1) { |
0570a3ea JM |
920 | wpa_printf(MSG_DEBUG, "HS 2.0: Not room for Icon " |
921 | "Filename length"); | |
922 | break; | |
923 | } | |
619fdfac JM |
924 | flen = *pos2++; |
925 | if (flen > pos - pos2) { | |
b572df86 JM |
926 | wpa_printf(MSG_DEBUG, "HS 2.0: Not room for Icon " |
927 | "Filename"); | |
184e110c JM |
928 | break; |
929 | } | |
619fdfac JM |
930 | os_memcpy(icon->filename, pos2, flen); |
931 | pos2 += flen; | |
184e110c | 932 | |
b572df86 JM |
933 | prov->icon_count++; |
934 | } | |
935 | ||
936 | /* OSU_NAI */ | |
619fdfac | 937 | if (end - pos < 1) { |
b572df86 JM |
938 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU_NAI"); |
939 | return; | |
940 | } | |
619fdfac JM |
941 | osu_nai_len = *pos++; |
942 | if (osu_nai_len > end - pos) { | |
0570a3ea JM |
943 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU_NAI"); |
944 | return; | |
945 | } | |
619fdfac JM |
946 | os_memcpy(prov->osu_nai, pos, osu_nai_len); |
947 | pos += osu_nai_len; | |
b572df86 JM |
948 | |
949 | /* OSU Service Description Length */ | |
619fdfac | 950 | if (end - pos < 2) { |
b572df86 JM |
951 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU " |
952 | "Service Description Length"); | |
953 | return; | |
954 | } | |
955 | len2 = WPA_GET_LE16(pos); | |
956 | pos += 2; | |
0570a3ea | 957 | if (len2 > end - pos) { |
b572df86 JM |
958 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for OSU " |
959 | "Service Description Duples"); | |
960 | return; | |
961 | } | |
962 | pos2 = pos; | |
963 | pos += len2; | |
964 | ||
965 | /* OSU Service Description Duples */ | |
619fdfac | 966 | while (pos - pos2 >= 4 && prov->serv_desc_count < OSU_MAX_ITEMS) { |
b572df86 | 967 | struct osu_lang_string *f; |
0570a3ea JM |
968 | u8 descr_len; |
969 | ||
619fdfac JM |
970 | descr_len = *pos2++; |
971 | if (descr_len > pos - pos2 || descr_len < 3) { | |
b572df86 JM |
972 | wpa_printf(MSG_DEBUG, "Invalid OSU Service " |
973 | "Description"); | |
184e110c JM |
974 | break; |
975 | } | |
b572df86 | 976 | f = &prov->serv_desc[prov->serv_desc_count++]; |
619fdfac JM |
977 | os_memcpy(f->lang, pos2, 3); |
978 | os_memcpy(f->text, pos2 + 3, descr_len - 3); | |
979 | pos2 += descr_len; | |
b572df86 | 980 | } |
184e110c | 981 | |
b572df86 JM |
982 | wpa_printf(MSG_DEBUG, "HS 2.0: Added OSU Provider through " MACSTR, |
983 | MAC2STR(bss->bssid)); | |
984 | wpa_s->osu_prov_count++; | |
985 | } | |
986 | ||
987 | ||
988 | void hs20_osu_icon_fetch(struct wpa_supplicant *wpa_s) | |
989 | { | |
990 | struct wpa_bss *bss; | |
991 | struct wpabuf *prov_anqp; | |
992 | const u8 *pos, *end; | |
993 | u16 len; | |
994 | const u8 *osu_ssid; | |
995 | u8 osu_ssid_len; | |
996 | u8 num_providers; | |
997 | ||
998 | hs20_free_osu_prov(wpa_s); | |
999 | ||
1000 | dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) { | |
1001 | if (bss->anqp == NULL) | |
1002 | continue; | |
1003 | prov_anqp = bss->anqp->hs20_osu_providers_list; | |
1004 | if (prov_anqp == NULL) | |
1005 | continue; | |
1006 | wpa_printf(MSG_DEBUG, "HS 2.0: Parsing OSU Providers list from " | |
1007 | MACSTR, MAC2STR(bss->bssid)); | |
1008 | wpa_hexdump_buf(MSG_DEBUG, "HS 2.0: OSU Providers list", | |
1009 | prov_anqp); | |
1010 | pos = wpabuf_head(prov_anqp); | |
1011 | end = pos + wpabuf_len(prov_anqp); | |
1012 | ||
1013 | /* OSU SSID */ | |
619fdfac | 1014 | if (end - pos < 1) |
b572df86 | 1015 | continue; |
619fdfac | 1016 | if (1 + pos[0] > end - pos) { |
b572df86 JM |
1017 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for " |
1018 | "OSU SSID"); | |
1019 | continue; | |
1020 | } | |
1021 | osu_ssid_len = *pos++; | |
d9d1b952 | 1022 | if (osu_ssid_len > SSID_MAX_LEN) { |
b572df86 JM |
1023 | wpa_printf(MSG_DEBUG, "HS 2.0: Invalid OSU SSID " |
1024 | "Length %u", osu_ssid_len); | |
1025 | continue; | |
1026 | } | |
1027 | osu_ssid = pos; | |
1028 | pos += osu_ssid_len; | |
1029 | ||
619fdfac | 1030 | if (end - pos < 1) { |
b572df86 JM |
1031 | wpa_printf(MSG_DEBUG, "HS 2.0: Not enough room for " |
1032 | "Number of OSU Providers"); | |
1033 | continue; | |
1034 | } | |
1035 | num_providers = *pos++; | |
1036 | wpa_printf(MSG_DEBUG, "HS 2.0: Number of OSU Providers: %u", | |
1037 | num_providers); | |
1038 | ||
1039 | /* OSU Providers */ | |
619fdfac | 1040 | while (end - pos > 2 && num_providers > 0) { |
b572df86 JM |
1041 | num_providers--; |
1042 | len = WPA_GET_LE16(pos); | |
1043 | pos += 2; | |
5c58c0ce | 1044 | if (len > (unsigned int) (end - pos)) |
b572df86 JM |
1045 | break; |
1046 | hs20_osu_add_prov(wpa_s, bss, osu_ssid, | |
1047 | osu_ssid_len, pos, len); | |
1048 | pos += len; | |
1049 | } | |
1050 | ||
1051 | if (pos != end) { | |
1052 | wpa_printf(MSG_DEBUG, "HS 2.0: Ignored %d bytes of " | |
1053 | "extra data after OSU Providers", | |
1054 | (int) (end - pos)); | |
1055 | } | |
1056 | } | |
1057 | ||
1058 | wpa_s->fetch_osu_icon_in_progress = 1; | |
1059 | hs20_next_osu_icon(wpa_s); | |
1060 | } | |
1061 | ||
1062 | ||
1063 | static void hs20_osu_scan_res_handler(struct wpa_supplicant *wpa_s, | |
1064 | struct wpa_scan_results *scan_res) | |
1065 | { | |
1066 | wpa_printf(MSG_DEBUG, "OSU provisioning fetch scan completed"); | |
568475b7 JM |
1067 | if (!wpa_s->fetch_osu_waiting_scan) { |
1068 | wpa_printf(MSG_DEBUG, "OSU fetch have been canceled"); | |
1069 | return; | |
1070 | } | |
b572df86 JM |
1071 | wpa_s->network_select = 0; |
1072 | wpa_s->fetch_all_anqp = 1; | |
1073 | wpa_s->fetch_osu_info = 1; | |
1074 | wpa_s->fetch_osu_icon_in_progress = 0; | |
1075 | ||
1076 | interworking_start_fetch_anqp(wpa_s); | |
1077 | } | |
1078 | ||
1079 | ||
dd20eabd | 1080 | int hs20_fetch_osu(struct wpa_supplicant *wpa_s, int skip_scan) |
b572df86 JM |
1081 | { |
1082 | if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) { | |
1083 | wpa_printf(MSG_DEBUG, "HS 2.0: Cannot start fetch_osu - " | |
1084 | "interface disabled"); | |
1085 | return -1; | |
1086 | } | |
1087 | ||
1088 | if (wpa_s->scanning) { | |
1089 | wpa_printf(MSG_DEBUG, "HS 2.0: Cannot start fetch_osu - " | |
1090 | "scanning"); | |
1091 | return -1; | |
25471fe3 | 1092 | } |
b572df86 JM |
1093 | |
1094 | if (wpa_s->conf->osu_dir == NULL) { | |
1095 | wpa_printf(MSG_DEBUG, "HS 2.0: Cannot start fetch_osu - " | |
1096 | "osu_dir not configured"); | |
1097 | return -1; | |
1098 | } | |
1099 | ||
1100 | if (wpa_s->fetch_anqp_in_progress || wpa_s->network_select) { | |
1101 | wpa_printf(MSG_DEBUG, "HS 2.0: Cannot start fetch_osu - " | |
1102 | "fetch in progress (%d, %d)", | |
1103 | wpa_s->fetch_anqp_in_progress, | |
1104 | wpa_s->network_select); | |
1105 | return -1; | |
1106 | } | |
1107 | ||
1108 | wpa_msg(wpa_s, MSG_INFO, "Starting OSU provisioning information fetch"); | |
a6739e19 JM |
1109 | wpa_s->num_osu_scans = 0; |
1110 | wpa_s->num_prov_found = 0; | |
dd20eabd JM |
1111 | if (skip_scan) { |
1112 | wpa_s->network_select = 0; | |
1113 | wpa_s->fetch_all_anqp = 1; | |
1114 | wpa_s->fetch_osu_info = 1; | |
1115 | wpa_s->fetch_osu_icon_in_progress = 0; | |
1116 | ||
1117 | interworking_start_fetch_anqp(wpa_s); | |
1118 | } else { | |
1119 | hs20_start_osu_scan(wpa_s); | |
1120 | } | |
a6739e19 JM |
1121 | |
1122 | return 0; | |
1123 | } | |
1124 | ||
1125 | ||
1126 | void hs20_start_osu_scan(struct wpa_supplicant *wpa_s) | |
1127 | { | |
568475b7 | 1128 | wpa_s->fetch_osu_waiting_scan = 1; |
a6739e19 | 1129 | wpa_s->num_osu_scans++; |
b572df86 JM |
1130 | wpa_s->scan_req = MANUAL_SCAN_REQ; |
1131 | wpa_s->scan_res_handler = hs20_osu_scan_res_handler; | |
1132 | wpa_supplicant_req_scan(wpa_s, 0, 0); | |
b572df86 JM |
1133 | } |
1134 | ||
1135 | ||
1136 | void hs20_cancel_fetch_osu(struct wpa_supplicant *wpa_s) | |
1137 | { | |
1138 | wpa_printf(MSG_DEBUG, "Cancel OSU fetch"); | |
1139 | interworking_stop_fetch_anqp(wpa_s); | |
568475b7 | 1140 | wpa_s->fetch_osu_waiting_scan = 0; |
b572df86 JM |
1141 | wpa_s->network_select = 0; |
1142 | wpa_s->fetch_osu_info = 0; | |
1143 | wpa_s->fetch_osu_icon_in_progress = 0; | |
1144 | } | |
1145 | ||
1146 | ||
1147 | void hs20_icon_fetch_failed(struct wpa_supplicant *wpa_s) | |
1148 | { | |
1149 | hs20_osu_icon_fetch_result(wpa_s, -1); | |
1150 | eloop_cancel_timeout(hs20_continue_icon_fetch, wpa_s, NULL); | |
1151 | eloop_register_timeout(0, 0, hs20_continue_icon_fetch, wpa_s, NULL); | |
25471fe3 | 1152 | } |
95a3ea94 JM |
1153 | |
1154 | ||
1155 | void hs20_rx_subscription_remediation(struct wpa_supplicant *wpa_s, | |
1156 | const char *url, u8 osu_method) | |
1157 | { | |
1158 | if (url) | |
1159 | wpa_msg(wpa_s, MSG_INFO, HS20_SUBSCRIPTION_REMEDIATION "%u %s", | |
1160 | osu_method, url); | |
1161 | else | |
1162 | wpa_msg(wpa_s, MSG_INFO, HS20_SUBSCRIPTION_REMEDIATION); | |
1163 | } | |
7ef69479 JM |
1164 | |
1165 | ||
1166 | void hs20_rx_deauth_imminent_notice(struct wpa_supplicant *wpa_s, u8 code, | |
1167 | u16 reauth_delay, const char *url) | |
1168 | { | |
1169 | if (!wpa_sm_pmf_enabled(wpa_s->wpa)) { | |
1170 | wpa_printf(MSG_DEBUG, "HS 2.0: Ignore deauthentication imminent notice since PMF was not enabled"); | |
1171 | return; | |
1172 | } | |
1173 | ||
1174 | wpa_msg(wpa_s, MSG_INFO, HS20_DEAUTH_IMMINENT_NOTICE "%u %u %s", | |
1175 | code, reauth_delay, url); | |
1176 | ||
1177 | if (code == HS20_DEAUTH_REASON_CODE_BSS) { | |
1178 | wpa_printf(MSG_DEBUG, "HS 2.0: Add BSS to blacklist"); | |
1179 | wpa_blacklist_add(wpa_s, wpa_s->bssid); | |
533536d8 JM |
1180 | /* TODO: For now, disable full ESS since some drivers may not |
1181 | * support disabling per BSS. */ | |
1182 | if (wpa_s->current_ssid) { | |
06c7b7f0 JM |
1183 | struct os_reltime now; |
1184 | os_get_reltime(&now); | |
533536d8 JM |
1185 | if (now.sec + reauth_delay <= |
1186 | wpa_s->current_ssid->disabled_until.sec) | |
1187 | return; | |
1188 | wpa_printf(MSG_DEBUG, "HS 2.0: Disable network for %u seconds (BSS)", | |
1189 | reauth_delay); | |
1190 | wpa_s->current_ssid->disabled_until.sec = | |
1191 | now.sec + reauth_delay; | |
1192 | } | |
7ef69479 JM |
1193 | } |
1194 | ||
1195 | if (code == HS20_DEAUTH_REASON_CODE_ESS && wpa_s->current_ssid) { | |
06c7b7f0 JM |
1196 | struct os_reltime now; |
1197 | os_get_reltime(&now); | |
7ef69479 JM |
1198 | if (now.sec + reauth_delay <= |
1199 | wpa_s->current_ssid->disabled_until.sec) | |
1200 | return; | |
1201 | wpa_printf(MSG_DEBUG, "HS 2.0: Disable network for %u seconds", | |
1202 | reauth_delay); | |
1203 | wpa_s->current_ssid->disabled_until.sec = | |
1204 | now.sec + reauth_delay; | |
1205 | } | |
1206 | } | |
fb2ac53d AC |
1207 | |
1208 | ||
ca9968a0 JM |
1209 | void hs20_init(struct wpa_supplicant *wpa_s) |
1210 | { | |
1211 | dl_list_init(&wpa_s->icon_head); | |
1212 | } | |
1213 | ||
1214 | ||
fb2ac53d AC |
1215 | void hs20_deinit(struct wpa_supplicant *wpa_s) |
1216 | { | |
1217 | eloop_cancel_timeout(hs20_continue_icon_fetch, wpa_s, NULL); | |
1218 | hs20_free_osu_prov(wpa_s); | |
ca9968a0 JM |
1219 | if (wpa_s->icon_head.next) |
1220 | hs20_del_icon(wpa_s, NULL, NULL); | |
fb2ac53d | 1221 | } |