]> git.ipfire.org Git - thirdparty/hostap.git/blame - wpa_supplicant/bss.h
EAP: Increase the maximum number of message exchanges
[thirdparty/hostap.git] / wpa_supplicant / bss.h
CommitLineData
83922c2d
JM
1/*
2 * BSS table
ed87f6a8 3 * Copyright (c) 2009-2019, Jouni Malinen <j@w1.fi>
83922c2d 4 *
0f3d578e
JM
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
83922c2d
JM
7 */
8
9#ifndef BSS_H
10#define BSS_H
11
a1fd2ce5
JM
12struct wpa_scan_res;
13
83922c2d
JM
14#define WPA_BSS_QUAL_INVALID BIT(0)
15#define WPA_BSS_NOISE_INVALID BIT(1)
16#define WPA_BSS_LEVEL_INVALID BIT(2)
17#define WPA_BSS_LEVEL_DBM BIT(3)
18#define WPA_BSS_AUTHENTICATED BIT(4)
19#define WPA_BSS_ASSOCIATED BIT(5)
afc064fe 20#define WPA_BSS_ANQP_FETCH_TRIED BIT(6)
83922c2d 21
8c4a1026
JM
22struct wpa_bss_anqp_elem {
23 struct dl_list list;
24 u16 infoid;
25 struct wpabuf *payload;
26};
27
2c09af30
JM
28/**
29 * struct wpa_bss_anqp - ANQP data for a BSS entry (struct wpa_bss)
30 */
476aed35 31struct wpa_bss_anqp {
2c09af30 32 /** Number of BSS entries referring to this ANQP data instance */
476aed35
JM
33 unsigned int users;
34#ifdef CONFIG_INTERWORKING
5ce6ac11 35 struct wpabuf *capability_list;
476aed35
JM
36 struct wpabuf *venue_name;
37 struct wpabuf *network_auth_type;
38 struct wpabuf *roaming_consortium;
39 struct wpabuf *ip_addr_type_availability;
40 struct wpabuf *nai_realm;
41 struct wpabuf *anqp_3gpp;
42 struct wpabuf *domain_name;
9cad6186 43 struct wpabuf *fils_realm_info;
8c4a1026 44 struct dl_list anqp_elems; /* list of struct wpa_bss_anqp_elem */
476aed35
JM
45#endif /* CONFIG_INTERWORKING */
46#ifdef CONFIG_HS20
185ada47 47 struct wpabuf *hs20_capability_list;
476aed35
JM
48 struct wpabuf *hs20_operator_friendly_name;
49 struct wpabuf *hs20_wan_metrics;
50 struct wpabuf *hs20_connection_capability;
51 struct wpabuf *hs20_operating_class;
1d2215fc 52 struct wpabuf *hs20_osu_providers_list;
6a8a04d7 53 struct wpabuf *hs20_operator_icon_metadata;
baf4c863 54 struct wpabuf *hs20_osu_providers_nai_list;
476aed35
JM
55#endif /* CONFIG_HS20 */
56};
57
83922c2d
JM
58/**
59 * struct wpa_bss - BSS table
83922c2d
JM
60 *
61 * This structure is used to store information about neighboring BSSes in
62 * generic format. It is mainly updated based on scan results from the driver.
63 */
64struct wpa_bss {
2c09af30 65 /** List entry for struct wpa_supplicant::bss */
83922c2d 66 struct dl_list list;
2c09af30 67 /** List entry for struct wpa_supplicant::bss_id */
d4bf8f13 68 struct dl_list list_id;
2c09af30 69 /** Unique identifier for this BSS entry */
83922c2d 70 unsigned int id;
2c09af30 71 /** Number of counts without seeing this BSS */
83922c2d 72 unsigned int scan_miss_count;
2c09af30 73 /** Index of the last scan update */
83922c2d 74 unsigned int last_update_idx;
2c09af30 75 /** Information flags about the BSS/IBSS (WPA_BSS_*) */
83922c2d 76 unsigned int flags;
2c09af30 77 /** BSSID */
83922c2d 78 u8 bssid[ETH_ALEN];
2c09af30 79 /** HESSID */
c739d7e9 80 u8 hessid[ETH_ALEN];
2c09af30 81 /** SSID */
d9d1b952 82 u8 ssid[SSID_MAX_LEN];
2c09af30 83 /** Length of SSID */
83922c2d 84 size_t ssid_len;
2c09af30 85 /** Frequency of the channel in MHz (e.g., 2412 = channel 1) */
83922c2d 86 int freq;
2c09af30 87 /** Beacon interval in TUs (host byte order) */
83922c2d 88 u16 beacon_int;
2c09af30 89 /** Capability information field in host byte order */
83922c2d 90 u16 caps;
2c09af30 91 /** Signal quality */
83922c2d 92 int qual;
2c09af30 93 /** Noise level */
83922c2d 94 int noise;
2c09af30 95 /** Signal level */
83922c2d 96 int level;
2c09af30 97 /** Timestamp of last Beacon/Probe Response frame */
83922c2d 98 u64 tsf;
2c09af30 99 /** Time of the last update (i.e., Beacon or Probe Response RX) */
acb69cec 100 struct os_reltime last_update;
1d747e2a
JM
101 /** Estimated throughput in kbps */
102 unsigned int est_throughput;
103 /** Signal-to-noise ratio in dB */
104 int snr;
2c09af30 105 /** ANQP data */
476aed35 106 struct wpa_bss_anqp *anqp;
2c09af30 107 /** Length of the following IE field in octets (from Probe Response) */
83922c2d 108 size_t ie_len;
2c09af30 109 /** Length of the following Beacon IE field in octets */
8c090654 110 size_t beacon_ie_len;
83922c2d 111 /* followed by ie_len octets of IEs */
8c090654 112 /* followed by beacon_ie_len octets of IEs */
83922c2d
JM
113};
114
115void wpa_bss_update_start(struct wpa_supplicant *wpa_s);
116void wpa_bss_update_scan_res(struct wpa_supplicant *wpa_s,
c5f10e80 117 struct wpa_scan_res *res,
acb69cec 118 struct os_reltime *fetch_time);
1ac38863
DS
119void wpa_bss_remove(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
120 const char *reason);
8d923a4a
JM
121void wpa_bss_update_end(struct wpa_supplicant *wpa_s, struct scan_info *info,
122 int new_scan);
83922c2d
JM
123int wpa_bss_init(struct wpa_supplicant *wpa_s);
124void wpa_bss_deinit(struct wpa_supplicant *wpa_s);
2b65b30d
SL
125void wpa_bss_flush(struct wpa_supplicant *wpa_s);
126void wpa_bss_flush_by_age(struct wpa_supplicant *wpa_s, int age);
59f2caa9
JM
127struct wpa_bss * wpa_bss_get(struct wpa_supplicant *wpa_s, const u8 *bssid,
128 const u8 *ssid, size_t ssid_len);
d4bf8f13
JM
129struct wpa_bss * wpa_bss_get_bssid(struct wpa_supplicant *wpa_s,
130 const u8 *bssid);
702621e6
JM
131struct wpa_bss * wpa_bss_get_bssid_latest(struct wpa_supplicant *wpa_s,
132 const u8 *bssid);
0a70f34f
JM
133struct wpa_bss * wpa_bss_get_p2p_dev_addr(struct wpa_supplicant *wpa_s,
134 const u8 *dev_addr);
d4bf8f13 135struct wpa_bss * wpa_bss_get_id(struct wpa_supplicant *wpa_s, unsigned int id);
9f42d49c
AS
136struct wpa_bss * wpa_bss_get_id_range(struct wpa_supplicant *wpa_s,
137 unsigned int idf, unsigned int idl);
d4bf8f13
JM
138const u8 * wpa_bss_get_ie(const struct wpa_bss *bss, u8 ie);
139const u8 * wpa_bss_get_vendor_ie(const struct wpa_bss *bss, u32 vendor_type);
bb50ae43
JM
140const u8 * wpa_bss_get_vendor_ie_beacon(const struct wpa_bss *bss,
141 u32 vendor_type);
d4bf8f13
JM
142struct wpabuf * wpa_bss_get_vendor_ie_multi(const struct wpa_bss *bss,
143 u32 vendor_type);
cf8baca6
JM
144struct wpabuf * wpa_bss_get_vendor_ie_multi_beacon(const struct wpa_bss *bss,
145 u32 vendor_type);
99a6a63f 146int wpa_bss_get_max_rate(const struct wpa_bss *bss);
75d328af 147int wpa_bss_get_bit_rates(const struct wpa_bss *bss, u8 **rates);
476aed35 148struct wpa_bss_anqp * wpa_bss_anqp_alloc(void);
485e3a92 149int wpa_bss_anqp_unshare_alloc(struct wpa_bss *bss);
869af307 150const u8 * wpa_bss_get_fils_cache_id(struct wpa_bss *bss);
ed87f6a8 151int wpa_bss_ext_capab(const struct wpa_bss *bss, unsigned int capab);
83922c2d 152
e403ba85
BS
153static inline int bss_is_dmg(const struct wpa_bss *bss)
154{
155 return bss->freq > 45000;
156}
157
b9074912
LD
158/**
159 * Test whether a BSS is a PBSS.
160 * This checks whether a BSS is a DMG-band PBSS. PBSS is used for P2P DMG
161 * network.
162 */
163static inline int bss_is_pbss(struct wpa_bss *bss)
164{
165 return bss_is_dmg(bss) &&
166 (bss->caps & IEEE80211_CAP_DMG_MASK) == IEEE80211_CAP_DMG_PBSS;
167}
168
71d77adb
MM
169static inline void wpa_bss_update_level(struct wpa_bss *bss, int new_level)
170{
171 if (bss != NULL && new_level < 0)
172 bss->level = new_level;
173}
174
d7342014
JM
175void calculate_update_time(const struct os_reltime *fetch_time,
176 unsigned int age_ms,
177 struct os_reltime *update_time);
178
83922c2d 179#endif /* BSS_H */