2 * hostapd / IEEE 802.11 Management
3 * Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
9 #include "utils/includes.h"
11 #include "utils/common.h"
12 #include "common/ieee802_11_defs.h"
15 #include "ap_config.h"
16 #include "ap_drv_ops.h"
17 #include "ieee802_11.h"
20 #ifdef CONFIG_IEEE80211W
22 u8
* hostapd_eid_assoc_comeback_time(struct hostapd_data
*hapd
,
23 struct sta_info
*sta
, u8
*eid
)
27 struct os_time now
, passed
;
29 *pos
++ = WLAN_EID_TIMEOUT_INTERVAL
;
31 *pos
++ = WLAN_TIMEOUT_ASSOC_COMEBACK
;
33 os_time_sub(&now
, &sta
->sa_query_start
, &passed
);
34 tu
= (passed
.sec
* 1000000 + passed
.usec
) / 1024;
35 if (hapd
->conf
->assoc_sa_query_max_timeout
> tu
)
36 timeout
= hapd
->conf
->assoc_sa_query_max_timeout
- tu
;
39 if (timeout
< hapd
->conf
->assoc_sa_query_max_timeout
)
40 timeout
++; /* add some extra time for local timers */
41 WPA_PUT_LE32(pos
, timeout
);
48 /* MLME-SAQuery.request */
49 void ieee802_11_send_sa_query_req(struct hostapd_data
*hapd
,
50 const u8
*addr
, const u8
*trans_id
)
52 struct ieee80211_mgmt mgmt
;
55 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Sending SA Query Request to "
56 MACSTR
, MAC2STR(addr
));
57 wpa_hexdump(MSG_DEBUG
, "IEEE 802.11: SA Query Transaction ID",
58 trans_id
, WLAN_SA_QUERY_TR_ID_LEN
);
60 os_memset(&mgmt
, 0, sizeof(mgmt
));
61 mgmt
.frame_control
= IEEE80211_FC(WLAN_FC_TYPE_MGMT
,
62 WLAN_FC_STYPE_ACTION
);
63 os_memcpy(mgmt
.da
, addr
, ETH_ALEN
);
64 os_memcpy(mgmt
.sa
, hapd
->own_addr
, ETH_ALEN
);
65 os_memcpy(mgmt
.bssid
, hapd
->own_addr
, ETH_ALEN
);
66 mgmt
.u
.action
.category
= WLAN_ACTION_SA_QUERY
;
67 mgmt
.u
.action
.u
.sa_query_req
.action
= WLAN_SA_QUERY_REQUEST
;
68 os_memcpy(mgmt
.u
.action
.u
.sa_query_req
.trans_id
, trans_id
,
69 WLAN_SA_QUERY_TR_ID_LEN
);
70 end
= mgmt
.u
.action
.u
.sa_query_req
.trans_id
+ WLAN_SA_QUERY_TR_ID_LEN
;
71 if (hostapd_drv_send_mlme(hapd
, &mgmt
, end
- (u8
*) &mgmt
, 0) < 0)
72 perror("ieee802_11_send_sa_query_req: send");
76 static void ieee802_11_send_sa_query_resp(struct hostapd_data
*hapd
,
77 const u8
*sa
, const u8
*trans_id
)
80 struct ieee80211_mgmt resp
;
83 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Received SA Query Request from "
85 wpa_hexdump(MSG_DEBUG
, "IEEE 802.11: SA Query Transaction ID",
86 trans_id
, WLAN_SA_QUERY_TR_ID_LEN
);
88 sta
= ap_get_sta(hapd
, sa
);
89 if (sta
== NULL
|| !(sta
->flags
& WLAN_STA_ASSOC
)) {
90 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Ignore SA Query Request "
91 "from unassociated STA " MACSTR
, MAC2STR(sa
));
95 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Sending SA Query Response to "
98 os_memset(&resp
, 0, sizeof(resp
));
99 resp
.frame_control
= IEEE80211_FC(WLAN_FC_TYPE_MGMT
,
100 WLAN_FC_STYPE_ACTION
);
101 os_memcpy(resp
.da
, sa
, ETH_ALEN
);
102 os_memcpy(resp
.sa
, hapd
->own_addr
, ETH_ALEN
);
103 os_memcpy(resp
.bssid
, hapd
->own_addr
, ETH_ALEN
);
104 resp
.u
.action
.category
= WLAN_ACTION_SA_QUERY
;
105 resp
.u
.action
.u
.sa_query_req
.action
= WLAN_SA_QUERY_RESPONSE
;
106 os_memcpy(resp
.u
.action
.u
.sa_query_req
.trans_id
, trans_id
,
107 WLAN_SA_QUERY_TR_ID_LEN
);
108 end
= resp
.u
.action
.u
.sa_query_req
.trans_id
+ WLAN_SA_QUERY_TR_ID_LEN
;
109 if (hostapd_drv_send_mlme(hapd
, &resp
, end
- (u8
*) &resp
, 0) < 0)
110 perror("ieee80211_mgmt_sa_query_request: send");
114 void ieee802_11_sa_query_action(struct hostapd_data
*hapd
, const u8
*sa
,
115 const u8 action_type
, const u8
*trans_id
)
117 struct sta_info
*sta
;
120 if (action_type
== WLAN_SA_QUERY_REQUEST
) {
121 ieee802_11_send_sa_query_resp(hapd
, sa
, trans_id
);
125 if (action_type
!= WLAN_SA_QUERY_RESPONSE
) {
126 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Unexpected SA Query "
127 "Action %d", action_type
);
131 wpa_printf(MSG_DEBUG
, "IEEE 802.11: Received SA Query Response from "
132 MACSTR
, MAC2STR(sa
));
133 wpa_hexdump(MSG_DEBUG
, "IEEE 802.11: SA Query Transaction ID",
134 trans_id
, WLAN_SA_QUERY_TR_ID_LEN
);
136 /* MLME-SAQuery.confirm */
138 sta
= ap_get_sta(hapd
, sa
);
139 if (sta
== NULL
|| sta
->sa_query_trans_id
== NULL
) {
140 wpa_printf(MSG_DEBUG
, "IEEE 802.11: No matching STA with "
141 "pending SA Query request found");
145 for (i
= 0; i
< sta
->sa_query_count
; i
++) {
146 if (os_memcmp(sta
->sa_query_trans_id
+
147 i
* WLAN_SA_QUERY_TR_ID_LEN
,
148 trans_id
, WLAN_SA_QUERY_TR_ID_LEN
) == 0)
152 if (i
>= sta
->sa_query_count
) {
153 wpa_printf(MSG_DEBUG
, "IEEE 802.11: No matching SA Query "
154 "transaction identifier found");
158 hostapd_logger(hapd
, sta
->addr
, HOSTAPD_MODULE_IEEE80211
,
160 "Reply to pending SA Query received");
161 ap_sta_stop_sa_query(hapd
, sta
);
164 #endif /* CONFIG_IEEE80211W */
167 u8
* hostapd_eid_ext_capab(struct hostapd_data
*hapd
, u8
*eid
)
172 if (hapd
->conf
->tdls
& (TDLS_PROHIBIT
| TDLS_PROHIBIT_CHAN_SWITCH
))
174 if (len
< 4 && hapd
->conf
->interworking
)
176 if (len
< 3 && hapd
->conf
->wnm_sleep_mode
)
178 if (len
< 7 && hapd
->conf
->ssid
.utf8_ssid
)
183 #endif /* CONFIG_WNM */
187 *pos
++ = WLAN_EID_EXT_CAPAB
;
193 if (hapd
->conf
->wnm_sleep_mode
)
194 *pos
|= 0x02; /* Bit 17 - WNM-Sleep Mode */
201 *pos
|= 0x02; /* Bit 25 - SSID List */
202 #endif /* CONFIG_WNM */
203 if (hapd
->conf
->time_advertisement
== 2)
204 *pos
|= 0x08; /* Bit 27 - UTC TSF Offset */
205 if (hapd
->conf
->interworking
)
206 *pos
|= 0x80; /* Bit 31 - Interworking */
212 if (hapd
->conf
->tdls
& TDLS_PROHIBIT
)
213 *pos
|= 0x40; /* Bit 38 - TDLS Prohibited */
214 if (hapd
->conf
->tdls
& TDLS_PROHIBIT_CHAN_SWITCH
)
215 *pos
|= 0x80; /* Bit 39 - TDLS Channel Switching Prohibited */
226 if (hapd
->conf
->ssid
.utf8_ssid
)
227 *pos
|= 0x01; /* Bit 48 - UTF-8 SSID */
234 u8
* hostapd_eid_interworking(struct hostapd_data
*hapd
, u8
*eid
)
237 #ifdef CONFIG_INTERWORKING
240 if (!hapd
->conf
->interworking
)
243 *pos
++ = WLAN_EID_INTERWORKING
;
246 *pos
= hapd
->conf
->access_network_type
;
247 if (hapd
->conf
->internet
)
248 *pos
|= INTERWORKING_ANO_INTERNET
;
249 if (hapd
->conf
->asra
)
250 *pos
|= INTERWORKING_ANO_ASRA
;
252 *pos
|= INTERWORKING_ANO_ESR
;
253 if (hapd
->conf
->uesa
)
254 *pos
|= INTERWORKING_ANO_UESA
;
257 if (hapd
->conf
->venue_info_set
) {
258 *pos
++ = hapd
->conf
->venue_group
;
259 *pos
++ = hapd
->conf
->venue_type
;
262 if (!is_zero_ether_addr(hapd
->conf
->hessid
)) {
263 os_memcpy(pos
, hapd
->conf
->hessid
, ETH_ALEN
);
267 *len
= pos
- len
- 1;
268 #endif /* CONFIG_INTERWORKING */
274 u8
* hostapd_eid_adv_proto(struct hostapd_data
*hapd
, u8
*eid
)
277 #ifdef CONFIG_INTERWORKING
279 /* TODO: Separate configuration for ANQP? */
280 if (!hapd
->conf
->interworking
)
283 *pos
++ = WLAN_EID_ADV_PROTO
;
285 *pos
++ = 0x7F; /* Query Response Length Limit | PAME-BI */
286 *pos
++ = ACCESS_NETWORK_QUERY_PROTOCOL
;
287 #endif /* CONFIG_INTERWORKING */
293 u8
* hostapd_eid_roaming_consortium(struct hostapd_data
*hapd
, u8
*eid
)
296 #ifdef CONFIG_INTERWORKING
298 unsigned int i
, count
;
300 if (!hapd
->conf
->interworking
||
301 hapd
->conf
->roaming_consortium
== NULL
||
302 hapd
->conf
->roaming_consortium_count
== 0)
305 *pos
++ = WLAN_EID_ROAMING_CONSORTIUM
;
308 /* Number of ANQP OIs (in addition to the max 3 listed here) */
309 if (hapd
->conf
->roaming_consortium_count
> 3 + 255)
311 else if (hapd
->conf
->roaming_consortium_count
> 3)
312 *pos
++ = hapd
->conf
->roaming_consortium_count
- 3;
316 /* OU #1 and #2 Lengths */
317 *pos
= hapd
->conf
->roaming_consortium
[0].len
;
318 if (hapd
->conf
->roaming_consortium_count
> 1)
319 *pos
|= hapd
->conf
->roaming_consortium
[1].len
<< 4;
322 if (hapd
->conf
->roaming_consortium_count
> 3)
325 count
= hapd
->conf
->roaming_consortium_count
;
327 for (i
= 0; i
< count
; i
++) {
328 os_memcpy(pos
, hapd
->conf
->roaming_consortium
[i
].oi
,
329 hapd
->conf
->roaming_consortium
[i
].len
);
330 pos
+= hapd
->conf
->roaming_consortium
[i
].len
;
333 *len
= pos
- len
- 1;
334 #endif /* CONFIG_INTERWORKING */
340 u8
* hostapd_eid_time_adv(struct hostapd_data
*hapd
, u8
*eid
)
342 if (hapd
->conf
->time_advertisement
!= 2)
345 if (hapd
->time_adv
== NULL
&&
346 hostapd_update_time_adv(hapd
) < 0)
349 if (hapd
->time_adv
== NULL
)
352 os_memcpy(eid
, wpabuf_head(hapd
->time_adv
),
353 wpabuf_len(hapd
->time_adv
));
354 eid
+= wpabuf_len(hapd
->time_adv
);
360 u8
* hostapd_eid_time_zone(struct hostapd_data
*hapd
, u8
*eid
)
364 if (hapd
->conf
->time_advertisement
!= 2)
367 len
= os_strlen(hapd
->conf
->time_zone
);
369 *eid
++ = WLAN_EID_TIME_ZONE
;
371 os_memcpy(eid
, hapd
->conf
->time_zone
, len
);
378 int hostapd_update_time_adv(struct hostapd_data
*hapd
)
380 const int elen
= 2 + 1 + 10 + 5 + 1;
385 if (hapd
->conf
->time_advertisement
!= 2)
388 if (os_get_time(&t
) < 0 || os_gmtime(t
.sec
, &tm
) < 0)
391 if (!hapd
->time_adv
) {
392 hapd
->time_adv
= wpabuf_alloc(elen
);
393 if (hapd
->time_adv
== NULL
)
395 pos
= wpabuf_put(hapd
->time_adv
, elen
);
397 pos
= wpabuf_mhead_u8(hapd
->time_adv
);
399 *pos
++ = WLAN_EID_TIME_ADVERTISEMENT
;
400 *pos
++ = 1 + 10 + 5 + 1;
402 *pos
++ = 2; /* UTC time at which the TSF timer is 0 */
404 /* Time Value at TSF 0 */
405 /* FIX: need to calculate this based on the current TSF value */
406 WPA_PUT_LE16(pos
, tm
.year
); /* Year */
408 *pos
++ = tm
.month
; /* Month */
409 *pos
++ = tm
.day
; /* Day of month */
410 *pos
++ = tm
.hour
; /* Hours */
411 *pos
++ = tm
.min
; /* Minutes */
412 *pos
++ = tm
.sec
; /* Seconds */
413 WPA_PUT_LE16(pos
, 0); /* Milliseconds (not used) */
415 *pos
++ = 0; /* Reserved */
418 /* TODO: fill in an estimate on the error */
425 *pos
++ = hapd
->time_update_counter
++;
431 u8
* hostapd_eid_bss_max_idle_period(struct hostapd_data
*hapd
, u8
*eid
)
436 if (hapd
->conf
->ap_max_inactivity
> 0) {
438 *pos
++ = WLAN_EID_BSS_MAX_IDLE_PERIOD
;
440 val
= hapd
->conf
->ap_max_inactivity
;
449 WPA_PUT_LE16(pos
, val
);
451 *pos
++ = 0x00; /* TODO: Protected Keep-Alive Required */
453 #endif /* CONFIG_WNM */