sme.c revision 2271d3fdd5982d0e5e81cf9999a861bba933eacb
1/*
2 * wpa_supplicant - SME
3 * Copyright (c) 2009-2014, Jouni Malinen <j@w1.fi>
4 *
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
7 */
8
9#include "includes.h"
10
11#include "common.h"
12#include "utils/eloop.h"
13#include "common/ieee802_11_defs.h"
14#include "common/ieee802_11_common.h"
15#include "eapol_supp/eapol_supp_sm.h"
16#include "common/wpa_common.h"
17#include "common/sae.h"
18#include "rsn_supp/wpa.h"
19#include "rsn_supp/pmksa_cache.h"
20#include "config.h"
21#include "wpa_supplicant_i.h"
22#include "driver_i.h"
23#include "wpas_glue.h"
24#include "wps_supplicant.h"
25#include "p2p_supplicant.h"
26#include "notify.h"
27#include "bss.h"
28#include "scan.h"
29#include "sme.h"
30#include "hs20_supplicant.h"
31
32#define SME_AUTH_TIMEOUT 5
33#define SME_ASSOC_TIMEOUT 5
34
35static void sme_auth_timer(void *eloop_ctx, void *timeout_ctx);
36static void sme_assoc_timer(void *eloop_ctx, void *timeout_ctx);
37static void sme_obss_scan_timeout(void *eloop_ctx, void *timeout_ctx);
38#ifdef CONFIG_IEEE80211W
39static void sme_stop_sa_query(struct wpa_supplicant *wpa_s);
40#endif /* CONFIG_IEEE80211W */
41
42
43#ifdef CONFIG_SAE
44
45static int index_within_array(const int *array, int idx)
46{
47	int i;
48	for (i = 0; i < idx; i++) {
49		if (array[i] <= 0)
50			return 0;
51	}
52	return 1;
53}
54
55
56static int sme_set_sae_group(struct wpa_supplicant *wpa_s)
57{
58	int *groups = wpa_s->conf->sae_groups;
59	int default_groups[] = { 19, 20, 21, 25, 26, 0 };
60
61	if (!groups || groups[0] <= 0)
62		groups = default_groups;
63
64	/* Configuration may have changed, so validate current index */
65	if (!index_within_array(groups, wpa_s->sme.sae_group_index))
66		return -1;
67
68	for (;;) {
69		int group = groups[wpa_s->sme.sae_group_index];
70		if (group < 0)
71			break;
72		if (sae_set_group(&wpa_s->sme.sae, group) == 0) {
73			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d",
74				wpa_s->sme.sae.group);
75		       return 0;
76		}
77		wpa_s->sme.sae_group_index++;
78	}
79
80	return -1;
81}
82
83
84static struct wpabuf * sme_auth_build_sae_commit(struct wpa_supplicant *wpa_s,
85						 struct wpa_ssid *ssid,
86						 const u8 *bssid)
87{
88	struct wpabuf *buf;
89	size_t len;
90
91	if (ssid->passphrase == NULL) {
92		wpa_printf(MSG_DEBUG, "SAE: No password available");
93		return NULL;
94	}
95
96	if (sme_set_sae_group(wpa_s) < 0) {
97		wpa_printf(MSG_DEBUG, "SAE: Failed to select group");
98		return NULL;
99	}
100
101	if (sae_prepare_commit(wpa_s->own_addr, bssid,
102			       (u8 *) ssid->passphrase,
103			       os_strlen(ssid->passphrase),
104			       &wpa_s->sme.sae) < 0) {
105		wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
106		return NULL;
107	}
108
109	len = wpa_s->sme.sae_token ? wpabuf_len(wpa_s->sme.sae_token) : 0;
110	buf = wpabuf_alloc(4 + SAE_COMMIT_MAX_LEN + len);
111	if (buf == NULL)
112		return NULL;
113
114	wpabuf_put_le16(buf, 1); /* Transaction seq# */
115	wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS);
116	sae_write_commit(&wpa_s->sme.sae, buf, wpa_s->sme.sae_token);
117
118	return buf;
119}
120
121
122static struct wpabuf * sme_auth_build_sae_confirm(struct wpa_supplicant *wpa_s)
123{
124	struct wpabuf *buf;
125
126	buf = wpabuf_alloc(4 + SAE_CONFIRM_MAX_LEN);
127	if (buf == NULL)
128		return NULL;
129
130	wpabuf_put_le16(buf, 2); /* Transaction seq# */
131	wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS);
132	sae_write_confirm(&wpa_s->sme.sae, buf);
133
134	return buf;
135}
136
137#endif /* CONFIG_SAE */
138
139
140static void sme_send_authentication(struct wpa_supplicant *wpa_s,
141				    struct wpa_bss *bss, struct wpa_ssid *ssid,
142				    int start)
143{
144	struct wpa_driver_auth_params params;
145	struct wpa_ssid *old_ssid;
146#ifdef CONFIG_IEEE80211R
147	const u8 *ie;
148#endif /* CONFIG_IEEE80211R */
149#ifdef CONFIG_IEEE80211R
150	const u8 *md = NULL;
151#endif /* CONFIG_IEEE80211R */
152	int i, bssid_changed;
153	struct wpabuf *resp = NULL;
154	u8 ext_capab[18];
155	int ext_capab_len;
156
157	if (bss == NULL) {
158		wpa_msg(wpa_s, MSG_ERROR, "SME: No scan result available for "
159			"the network");
160		wpas_connect_work_done(wpa_s);
161		return;
162	}
163
164	wpa_s->current_bss = bss;
165
166	os_memset(&params, 0, sizeof(params));
167	wpa_s->reassociate = 0;
168
169	params.freq = bss->freq;
170	params.bssid = bss->bssid;
171	params.ssid = bss->ssid;
172	params.ssid_len = bss->ssid_len;
173	params.p2p = ssid->p2p_group;
174
175	if (wpa_s->sme.ssid_len != params.ssid_len ||
176	    os_memcmp(wpa_s->sme.ssid, params.ssid, params.ssid_len) != 0)
177		wpa_s->sme.prev_bssid_set = 0;
178
179	wpa_s->sme.freq = params.freq;
180	os_memcpy(wpa_s->sme.ssid, params.ssid, params.ssid_len);
181	wpa_s->sme.ssid_len = params.ssid_len;
182
183	params.auth_alg = WPA_AUTH_ALG_OPEN;
184#ifdef IEEE8021X_EAPOL
185	if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
186		if (ssid->leap) {
187			if (ssid->non_leap == 0)
188				params.auth_alg = WPA_AUTH_ALG_LEAP;
189			else
190				params.auth_alg |= WPA_AUTH_ALG_LEAP;
191		}
192	}
193#endif /* IEEE8021X_EAPOL */
194	wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
195		params.auth_alg);
196	if (ssid->auth_alg) {
197		params.auth_alg = ssid->auth_alg;
198		wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: "
199			"0x%x", params.auth_alg);
200	}
201#ifdef CONFIG_SAE
202	if (wpa_key_mgmt_sae(ssid->key_mgmt)) {
203		const u8 *rsn;
204		struct wpa_ie_data ied;
205
206		rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
207		if (rsn &&
208		    wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0) {
209			if (wpa_key_mgmt_sae(ied.key_mgmt)) {
210				wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg");
211				params.auth_alg = WPA_AUTH_ALG_SAE;
212			}
213		}
214	}
215#endif /* CONFIG_SAE */
216
217	for (i = 0; i < NUM_WEP_KEYS; i++) {
218		if (ssid->wep_key_len[i])
219			params.wep_key[i] = ssid->wep_key[i];
220		params.wep_key_len[i] = ssid->wep_key_len[i];
221	}
222	params.wep_tx_keyidx = ssid->wep_tx_keyidx;
223
224	bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
225	os_memset(wpa_s->bssid, 0, ETH_ALEN);
226	os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
227	if (bssid_changed)
228		wpas_notify_bssid_changed(wpa_s);
229
230	if ((wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) ||
231	     wpa_bss_get_ie(bss, WLAN_EID_RSN)) &&
232	    wpa_key_mgmt_wpa(ssid->key_mgmt)) {
233		int try_opportunistic;
234		try_opportunistic = (ssid->proactive_key_caching < 0 ?
235				     wpa_s->conf->okc :
236				     ssid->proactive_key_caching) &&
237			(ssid->proto & WPA_PROTO_RSN);
238		if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
239					    wpa_s->current_ssid,
240					    try_opportunistic) == 0)
241			eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
242		wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
243		if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
244					      wpa_s->sme.assoc_req_ie,
245					      &wpa_s->sme.assoc_req_ie_len)) {
246			wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
247				"key management and encryption suites");
248			wpas_connect_work_done(wpa_s);
249			return;
250		}
251	} else if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) &&
252		   wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt)) {
253		/*
254		 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
255		 * use non-WPA since the scan results did not indicate that the
256		 * AP is using WPA or WPA2.
257		 */
258		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
259		wpa_s->sme.assoc_req_ie_len = 0;
260	} else if (wpa_key_mgmt_wpa_any(ssid->key_mgmt)) {
261		wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
262		if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
263					      wpa_s->sme.assoc_req_ie,
264					      &wpa_s->sme.assoc_req_ie_len)) {
265			wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
266				"key management and encryption suites (no "
267				"scan results)");
268			wpas_connect_work_done(wpa_s);
269			return;
270		}
271#ifdef CONFIG_WPS
272	} else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) {
273		struct wpabuf *wps_ie;
274		wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid));
275		if (wps_ie && wpabuf_len(wps_ie) <=
276		    sizeof(wpa_s->sme.assoc_req_ie)) {
277			wpa_s->sme.assoc_req_ie_len = wpabuf_len(wps_ie);
278			os_memcpy(wpa_s->sme.assoc_req_ie, wpabuf_head(wps_ie),
279				  wpa_s->sme.assoc_req_ie_len);
280		} else
281			wpa_s->sme.assoc_req_ie_len = 0;
282		wpabuf_free(wps_ie);
283		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
284#endif /* CONFIG_WPS */
285	} else {
286		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
287		wpa_s->sme.assoc_req_ie_len = 0;
288	}
289
290#ifdef CONFIG_IEEE80211R
291	ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
292	if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
293		md = ie + 2;
294	wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
295	if (md) {
296		/* Prepare for the next transition */
297		wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
298	}
299
300	if (md && wpa_key_mgmt_ft(ssid->key_mgmt)) {
301		if (wpa_s->sme.assoc_req_ie_len + 5 <
302		    sizeof(wpa_s->sme.assoc_req_ie)) {
303			struct rsn_mdie *mdie;
304			u8 *pos = wpa_s->sme.assoc_req_ie +
305				wpa_s->sme.assoc_req_ie_len;
306			*pos++ = WLAN_EID_MOBILITY_DOMAIN;
307			*pos++ = sizeof(*mdie);
308			mdie = (struct rsn_mdie *) pos;
309			os_memcpy(mdie->mobility_domain, md,
310				  MOBILITY_DOMAIN_ID_LEN);
311			mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN];
312			wpa_s->sme.assoc_req_ie_len += 5;
313		}
314
315		if (wpa_s->sme.ft_used &&
316		    os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 &&
317		    wpa_sm_has_ptk(wpa_s->wpa)) {
318			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
319				"over-the-air");
320			params.auth_alg = WPA_AUTH_ALG_FT;
321			params.ie = wpa_s->sme.ft_ies;
322			params.ie_len = wpa_s->sme.ft_ies_len;
323		}
324	}
325#endif /* CONFIG_IEEE80211R */
326
327#ifdef CONFIG_IEEE80211W
328	wpa_s->sme.mfp = ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT ?
329		wpa_s->conf->pmf : ssid->ieee80211w;
330	if (wpa_s->sme.mfp != NO_MGMT_FRAME_PROTECTION) {
331		const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
332		struct wpa_ie_data _ie;
333		if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &&
334		    _ie.capabilities &
335		    (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) {
336			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports "
337				"MFP: require MFP");
338			wpa_s->sme.mfp = MGMT_FRAME_PROTECTION_REQUIRED;
339		}
340	}
341#endif /* CONFIG_IEEE80211W */
342
343#ifdef CONFIG_P2P
344	if (wpa_s->global->p2p) {
345		u8 *pos;
346		size_t len;
347		int res;
348		pos = wpa_s->sme.assoc_req_ie + wpa_s->sme.assoc_req_ie_len;
349		len = sizeof(wpa_s->sme.assoc_req_ie) -
350			wpa_s->sme.assoc_req_ie_len;
351		res = wpas_p2p_assoc_req_ie(wpa_s, bss, pos, len,
352					    ssid->p2p_group);
353		if (res >= 0)
354			wpa_s->sme.assoc_req_ie_len += res;
355	}
356#endif /* CONFIG_P2P */
357
358#ifdef CONFIG_HS20
359	if (is_hs20_network(wpa_s, ssid, bss)) {
360		struct wpabuf *hs20;
361		hs20 = wpabuf_alloc(20);
362		if (hs20) {
363			int pps_mo_id = hs20_get_pps_mo_id(wpa_s, ssid);
364			wpas_hs20_add_indication(hs20, pps_mo_id);
365			os_memcpy(wpa_s->sme.assoc_req_ie +
366				  wpa_s->sme.assoc_req_ie_len,
367				  wpabuf_head(hs20), wpabuf_len(hs20));
368			wpa_s->sme.assoc_req_ie_len += wpabuf_len(hs20);
369			wpabuf_free(hs20);
370		}
371	}
372#endif /* CONFIG_HS20 */
373
374	ext_capab_len = wpas_build_ext_capab(wpa_s, ext_capab,
375					     sizeof(ext_capab));
376	if (ext_capab_len > 0) {
377		u8 *pos = wpa_s->sme.assoc_req_ie;
378		if (wpa_s->sme.assoc_req_ie_len > 0 && pos[0] == WLAN_EID_RSN)
379			pos += 2 + pos[1];
380		os_memmove(pos + ext_capab_len, pos,
381			   wpa_s->sme.assoc_req_ie_len -
382			   (pos - wpa_s->sme.assoc_req_ie));
383		wpa_s->sme.assoc_req_ie_len += ext_capab_len;
384		os_memcpy(pos, ext_capab, ext_capab_len);
385	}
386
387#ifdef CONFIG_SAE
388	if (params.auth_alg == WPA_AUTH_ALG_SAE) {
389		if (start)
390			resp = sme_auth_build_sae_commit(wpa_s, ssid,
391							 bss->bssid);
392		else
393			resp = sme_auth_build_sae_confirm(wpa_s);
394		if (resp == NULL) {
395			wpas_connect_work_done(wpa_s);
396			return;
397		}
398		params.sae_data = wpabuf_head(resp);
399		params.sae_data_len = wpabuf_len(resp);
400		wpa_s->sme.sae.state = start ? SAE_COMMITTED : SAE_CONFIRMED;
401	}
402#endif /* CONFIG_SAE */
403
404	wpa_supplicant_cancel_sched_scan(wpa_s);
405	wpa_supplicant_cancel_scan(wpa_s);
406
407	wpa_msg(wpa_s, MSG_INFO, "SME: Trying to authenticate with " MACSTR
408		" (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
409		wpa_ssid_txt(params.ssid, params.ssid_len), params.freq);
410
411	wpa_clear_keys(wpa_s, bss->bssid);
412	wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
413	old_ssid = wpa_s->current_ssid;
414	wpa_s->current_ssid = ssid;
415	wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
416	wpa_supplicant_initiate_eapol(wpa_s);
417	if (old_ssid != wpa_s->current_ssid)
418		wpas_notify_network_changed(wpa_s);
419
420#ifdef CONFIG_P2P
421	/*
422	 * If multi-channel concurrency is not supported, check for any
423	 * frequency conflict. In case of any frequency conflict, remove the
424	 * least prioritized connection.
425	 */
426	if (wpa_s->num_multichan_concurrent < 2) {
427		int freq, num;
428		num = get_shared_radio_freqs(wpa_s, &freq, 1);
429		if (num > 0 && freq > 0 && freq != params.freq) {
430			wpa_printf(MSG_DEBUG,
431				   "Conflicting frequency found (%d != %d)",
432				   freq, params.freq);
433			if (wpas_p2p_handle_frequency_conflicts(wpa_s,
434								params.freq,
435								ssid) < 0) {
436				wpas_connection_failed(wpa_s, bss->bssid);
437				wpa_supplicant_mark_disassoc(wpa_s);
438				wpabuf_free(resp);
439				wpas_connect_work_done(wpa_s);
440				return;
441			}
442		}
443	}
444#endif /* CONFIG_P2P */
445
446	wpa_s->sme.auth_alg = params.auth_alg;
447	if (wpa_drv_authenticate(wpa_s, &params) < 0) {
448		wpa_msg(wpa_s, MSG_INFO, "SME: Authentication request to the "
449			"driver failed");
450		wpas_connection_failed(wpa_s, bss->bssid);
451		wpa_supplicant_mark_disassoc(wpa_s);
452		wpabuf_free(resp);
453		wpas_connect_work_done(wpa_s);
454		return;
455	}
456
457	eloop_register_timeout(SME_AUTH_TIMEOUT, 0, sme_auth_timer, wpa_s,
458			       NULL);
459
460	/*
461	 * Association will be started based on the authentication event from
462	 * the driver.
463	 */
464
465	wpabuf_free(resp);
466}
467
468
469static void sme_auth_start_cb(struct wpa_radio_work *work, int deinit)
470{
471	struct wpa_connect_work *cwork = work->ctx;
472	struct wpa_supplicant *wpa_s = work->wpa_s;
473
474	if (deinit) {
475		if (work->started)
476			wpa_s->connect_work = NULL;
477
478		wpas_connect_work_free(cwork);
479		return;
480	}
481
482	wpa_s->connect_work = work;
483
484	if (!wpas_valid_bss_ssid(wpa_s, cwork->bss, cwork->ssid)) {
485		wpa_dbg(wpa_s, MSG_DEBUG, "SME: BSS/SSID entry for authentication not valid anymore - drop connection attempt");
486		wpas_connect_work_done(wpa_s);
487		return;
488	}
489
490	sme_send_authentication(wpa_s, cwork->bss, cwork->ssid, 1);
491}
492
493
494void sme_authenticate(struct wpa_supplicant *wpa_s,
495		      struct wpa_bss *bss, struct wpa_ssid *ssid)
496{
497	struct wpa_connect_work *cwork;
498
499	if (bss == NULL || ssid == NULL)
500		return;
501	if (wpa_s->connect_work) {
502		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Reject sme_authenticate() call since connect_work exist");
503		return;
504	}
505
506	if (radio_work_pending(wpa_s, "sme-connect")) {
507		/*
508		 * The previous sme-connect work might no longer be valid due to
509		 * the fact that the BSS list was updated. In addition, it makes
510		 * sense to adhere to the 'newer' decision.
511		 */
512		wpa_dbg(wpa_s, MSG_DEBUG,
513			"SME: Remove previous pending sme-connect");
514		radio_remove_works(wpa_s, "sme-connect", 0);
515	}
516
517	cwork = os_zalloc(sizeof(*cwork));
518	if (cwork == NULL)
519		return;
520	cwork->bss = bss;
521	cwork->ssid = ssid;
522	cwork->sme = 1;
523
524#ifdef CONFIG_SAE
525	wpa_s->sme.sae.state = SAE_NOTHING;
526	wpa_s->sme.sae.send_confirm = 0;
527	wpa_s->sme.sae_group_index = 0;
528#endif /* CONFIG_SAE */
529
530	if (radio_add_work(wpa_s, bss->freq, "sme-connect", 1,
531			   sme_auth_start_cb, cwork) < 0)
532		wpas_connect_work_free(cwork);
533}
534
535
536#ifdef CONFIG_SAE
537
538static int sme_sae_auth(struct wpa_supplicant *wpa_s, u16 auth_transaction,
539			u16 status_code, const u8 *data, size_t len)
540{
541	wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE authentication transaction %u "
542		"status code %u", auth_transaction, status_code);
543
544	if (auth_transaction == 1 &&
545	    status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ &&
546	    wpa_s->sme.sae.state == SAE_COMMITTED &&
547	    wpa_s->current_bss && wpa_s->current_ssid) {
548		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE anti-clogging token "
549			"requested");
550		wpabuf_free(wpa_s->sme.sae_token);
551		wpa_s->sme.sae_token = wpabuf_alloc_copy(data, len);
552		sme_send_authentication(wpa_s, wpa_s->current_bss,
553					wpa_s->current_ssid, 1);
554		return 0;
555	}
556
557	if (auth_transaction == 1 &&
558	    status_code == WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED &&
559	    wpa_s->sme.sae.state == SAE_COMMITTED &&
560	    wpa_s->current_bss && wpa_s->current_ssid) {
561		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE group not supported");
562		wpa_s->sme.sae_group_index++;
563		if (sme_set_sae_group(wpa_s) < 0)
564			return -1; /* no other groups enabled */
565		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Try next enabled SAE group");
566		sme_send_authentication(wpa_s, wpa_s->current_bss,
567					wpa_s->current_ssid, 1);
568		return 0;
569	}
570
571	if (status_code != WLAN_STATUS_SUCCESS)
572		return -1;
573
574	if (auth_transaction == 1) {
575		int *groups = wpa_s->conf->sae_groups;
576
577		wpa_dbg(wpa_s, MSG_DEBUG, "SME SAE commit");
578		if (wpa_s->current_bss == NULL ||
579		    wpa_s->current_ssid == NULL)
580			return -1;
581		if (wpa_s->sme.sae.state != SAE_COMMITTED)
582			return -1;
583		if (groups && groups[0] <= 0)
584			groups = NULL;
585		if (sae_parse_commit(&wpa_s->sme.sae, data, len, NULL, NULL,
586				     groups) != WLAN_STATUS_SUCCESS)
587			return -1;
588
589		if (sae_process_commit(&wpa_s->sme.sae) < 0) {
590			wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
591				   "commit");
592			return -1;
593		}
594
595		wpabuf_free(wpa_s->sme.sae_token);
596		wpa_s->sme.sae_token = NULL;
597		sme_send_authentication(wpa_s, wpa_s->current_bss,
598					wpa_s->current_ssid, 0);
599		return 0;
600	} else if (auth_transaction == 2) {
601		wpa_dbg(wpa_s, MSG_DEBUG, "SME SAE confirm");
602		if (wpa_s->sme.sae.state != SAE_CONFIRMED)
603			return -1;
604		if (sae_check_confirm(&wpa_s->sme.sae, data, len) < 0)
605			return -1;
606		wpa_s->sme.sae.state = SAE_ACCEPTED;
607		sae_clear_temp_data(&wpa_s->sme.sae);
608		return 1;
609	}
610
611	return -1;
612}
613#endif /* CONFIG_SAE */
614
615
616void sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data)
617{
618	struct wpa_ssid *ssid = wpa_s->current_ssid;
619
620	if (ssid == NULL) {
621		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
622			"when network is not selected");
623		return;
624	}
625
626	if (wpa_s->wpa_state != WPA_AUTHENTICATING) {
627		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
628			"when not in authenticating state");
629		return;
630	}
631
632	if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
633		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication with "
634			"unexpected peer " MACSTR,
635			MAC2STR(data->auth.peer));
636		return;
637	}
638
639	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
640		" auth_type=%d auth_transaction=%d status_code=%d",
641		MAC2STR(data->auth.peer), data->auth.auth_type,
642		data->auth.auth_transaction, data->auth.status_code);
643	wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
644		    data->auth.ies, data->auth.ies_len);
645
646	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
647
648#ifdef CONFIG_SAE
649	if (data->auth.auth_type == WLAN_AUTH_SAE) {
650		int res;
651		res = sme_sae_auth(wpa_s, data->auth.auth_transaction,
652				   data->auth.status_code, data->auth.ies,
653				   data->auth.ies_len);
654		if (res < 0) {
655			wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
656			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
657
658		}
659		if (res != 1)
660			return;
661
662		wpa_printf(MSG_DEBUG, "SME: SAE completed - setting PMK for "
663			   "4-way handshake");
664		wpa_sm_set_pmk(wpa_s->wpa, wpa_s->sme.sae.pmk, PMK_LEN);
665	}
666#endif /* CONFIG_SAE */
667
668	if (data->auth.status_code != WLAN_STATUS_SUCCESS) {
669		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication failed (status "
670			"code %d)", data->auth.status_code);
671
672		if (data->auth.status_code !=
673		    WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG ||
674		    wpa_s->sme.auth_alg == data->auth.auth_type ||
675		    wpa_s->current_ssid->auth_alg == WPA_AUTH_ALG_LEAP) {
676			wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
677			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
678			return;
679		}
680
681		wpas_connect_work_done(wpa_s);
682
683		switch (data->auth.auth_type) {
684		case WLAN_AUTH_OPEN:
685			wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_SHARED;
686
687			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying SHARED auth");
688			wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
689						 wpa_s->current_ssid);
690			return;
691
692		case WLAN_AUTH_SHARED_KEY:
693			wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_LEAP;
694
695			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying LEAP auth");
696			wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
697						 wpa_s->current_ssid);
698			return;
699
700		default:
701			return;
702		}
703	}
704
705#ifdef CONFIG_IEEE80211R
706	if (data->auth.auth_type == WLAN_AUTH_FT) {
707		union wpa_event_data edata;
708		os_memset(&edata, 0, sizeof(edata));
709		edata.ft_ies.ies = data->auth.ies;
710		edata.ft_ies.ies_len = data->auth.ies_len;
711		os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
712		wpa_supplicant_event(wpa_s, EVENT_FT_RESPONSE, &edata);
713	}
714#endif /* CONFIG_IEEE80211R */
715
716	sme_associate(wpa_s, ssid->mode, data->auth.peer,
717		      data->auth.auth_type);
718}
719
720
721void sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode,
722		   const u8 *bssid, u16 auth_type)
723{
724	struct wpa_driver_associate_params params;
725	struct ieee802_11_elems elems;
726#ifdef CONFIG_HT_OVERRIDES
727	struct ieee80211_ht_capabilities htcaps;
728	struct ieee80211_ht_capabilities htcaps_mask;
729#endif /* CONFIG_HT_OVERRIDES */
730#ifdef CONFIG_VHT_OVERRIDES
731	struct ieee80211_vht_capabilities vhtcaps;
732	struct ieee80211_vht_capabilities vhtcaps_mask;
733#endif /* CONFIG_VHT_OVERRIDES */
734
735	os_memset(&params, 0, sizeof(params));
736	params.bssid = bssid;
737	params.ssid = wpa_s->sme.ssid;
738	params.ssid_len = wpa_s->sme.ssid_len;
739	params.freq = wpa_s->sme.freq;
740	params.bg_scan_period = wpa_s->current_ssid ?
741		wpa_s->current_ssid->bg_scan_period : -1;
742	params.wpa_ie = wpa_s->sme.assoc_req_ie_len ?
743		wpa_s->sme.assoc_req_ie : NULL;
744	params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len;
745	params.pairwise_suite = wpa_s->pairwise_cipher;
746	params.group_suite = wpa_s->group_cipher;
747	params.key_mgmt_suite = wpa_s->key_mgmt;
748	params.wpa_proto = wpa_s->wpa_proto;
749#ifdef CONFIG_HT_OVERRIDES
750	os_memset(&htcaps, 0, sizeof(htcaps));
751	os_memset(&htcaps_mask, 0, sizeof(htcaps_mask));
752	params.htcaps = (u8 *) &htcaps;
753	params.htcaps_mask = (u8 *) &htcaps_mask;
754	wpa_supplicant_apply_ht_overrides(wpa_s, wpa_s->current_ssid, &params);
755#endif /* CONFIG_HT_OVERRIDES */
756#ifdef CONFIG_VHT_OVERRIDES
757	os_memset(&vhtcaps, 0, sizeof(vhtcaps));
758	os_memset(&vhtcaps_mask, 0, sizeof(vhtcaps_mask));
759	params.vhtcaps = &vhtcaps;
760	params.vhtcaps_mask = &vhtcaps_mask;
761	wpa_supplicant_apply_vht_overrides(wpa_s, wpa_s->current_ssid, &params);
762#endif /* CONFIG_VHT_OVERRIDES */
763#ifdef CONFIG_IEEE80211R
764	if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) {
765		params.wpa_ie = wpa_s->sme.ft_ies;
766		params.wpa_ie_len = wpa_s->sme.ft_ies_len;
767	}
768#endif /* CONFIG_IEEE80211R */
769	params.mode = mode;
770	params.mgmt_frame_protection = wpa_s->sme.mfp;
771	if (wpa_s->sme.prev_bssid_set)
772		params.prev_bssid = wpa_s->sme.prev_bssid;
773
774	wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR
775		" (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
776		params.ssid ? wpa_ssid_txt(params.ssid, params.ssid_len) : "",
777		params.freq);
778
779	wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING);
780
781	if (params.wpa_ie == NULL ||
782	    ieee802_11_parse_elems(params.wpa_ie, params.wpa_ie_len, &elems, 0)
783	    < 0) {
784		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!");
785		os_memset(&elems, 0, sizeof(elems));
786	}
787	if (elems.rsn_ie) {
788		params.wpa_proto = WPA_PROTO_RSN;
789		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2,
790					elems.rsn_ie_len + 2);
791	} else if (elems.wpa_ie) {
792		params.wpa_proto = WPA_PROTO_WPA;
793		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2,
794					elems.wpa_ie_len + 2);
795	} else if (elems.osen) {
796		params.wpa_proto = WPA_PROTO_OSEN;
797		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.osen - 2,
798					elems.osen_len + 2);
799	} else
800		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
801	if (wpa_s->current_ssid && wpa_s->current_ssid->p2p_group)
802		params.p2p = 1;
803
804	if (wpa_s->parent->set_sta_uapsd)
805		params.uapsd = wpa_s->parent->sta_uapsd;
806	else
807		params.uapsd = -1;
808
809	if (wpa_drv_associate(wpa_s, &params) < 0) {
810		wpa_msg(wpa_s, MSG_INFO, "SME: Association request to the "
811			"driver failed");
812		wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
813		wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
814		os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
815		return;
816	}
817
818	eloop_register_timeout(SME_ASSOC_TIMEOUT, 0, sme_assoc_timer, wpa_s,
819			       NULL);
820}
821
822
823int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md,
824		      const u8 *ies, size_t ies_len)
825{
826	if (md == NULL || ies == NULL) {
827		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Remove mobility domain");
828		os_free(wpa_s->sme.ft_ies);
829		wpa_s->sme.ft_ies = NULL;
830		wpa_s->sme.ft_ies_len = 0;
831		wpa_s->sme.ft_used = 0;
832		return 0;
833	}
834
835	os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LEN);
836	wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len);
837	os_free(wpa_s->sme.ft_ies);
838	wpa_s->sme.ft_ies = os_malloc(ies_len);
839	if (wpa_s->sme.ft_ies == NULL)
840		return -1;
841	os_memcpy(wpa_s->sme.ft_ies, ies, ies_len);
842	wpa_s->sme.ft_ies_len = ies_len;
843	return 0;
844}
845
846
847static void sme_deauth(struct wpa_supplicant *wpa_s)
848{
849	int bssid_changed;
850
851	bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
852
853	if (wpa_drv_deauthenticate(wpa_s, wpa_s->pending_bssid,
854				   WLAN_REASON_DEAUTH_LEAVING) < 0) {
855		wpa_msg(wpa_s, MSG_INFO, "SME: Deauth request to the driver "
856			"failed");
857	}
858	wpa_s->sme.prev_bssid_set = 0;
859
860	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
861	wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
862	os_memset(wpa_s->bssid, 0, ETH_ALEN);
863	os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
864	if (bssid_changed)
865		wpas_notify_bssid_changed(wpa_s);
866}
867
868
869void sme_event_assoc_reject(struct wpa_supplicant *wpa_s,
870			    union wpa_event_data *data)
871{
872	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association with " MACSTR " failed: "
873		"status code %d", MAC2STR(wpa_s->pending_bssid),
874		data->assoc_reject.status_code);
875
876	eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
877
878	/*
879	 * For now, unconditionally terminate the previous authentication. In
880	 * theory, this should not be needed, but mac80211 gets quite confused
881	 * if the authentication is left pending.. Some roaming cases might
882	 * benefit from using the previous authentication, so this could be
883	 * optimized in the future.
884	 */
885	sme_deauth(wpa_s);
886}
887
888
889void sme_event_auth_timed_out(struct wpa_supplicant *wpa_s,
890			      union wpa_event_data *data)
891{
892	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication timed out");
893	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
894	wpa_supplicant_mark_disassoc(wpa_s);
895}
896
897
898void sme_event_assoc_timed_out(struct wpa_supplicant *wpa_s,
899			       union wpa_event_data *data)
900{
901	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association timed out");
902	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
903	wpa_supplicant_mark_disassoc(wpa_s);
904}
905
906
907void sme_event_disassoc(struct wpa_supplicant *wpa_s,
908			struct disassoc_info *info)
909{
910	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Disassociation event received");
911	if (wpa_s->sme.prev_bssid_set) {
912		/*
913		 * cfg80211/mac80211 can get into somewhat confused state if
914		 * the AP only disassociates us and leaves us in authenticated
915		 * state. For now, force the state to be cleared to avoid
916		 * confusing errors if we try to associate with the AP again.
917		 */
918		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Deauthenticate to clear "
919			"driver state");
920		wpa_drv_deauthenticate(wpa_s, wpa_s->sme.prev_bssid,
921				       WLAN_REASON_DEAUTH_LEAVING);
922	}
923}
924
925
926static void sme_auth_timer(void *eloop_ctx, void *timeout_ctx)
927{
928	struct wpa_supplicant *wpa_s = eloop_ctx;
929	if (wpa_s->wpa_state == WPA_AUTHENTICATING) {
930		wpa_msg(wpa_s, MSG_DEBUG, "SME: Authentication timeout");
931		sme_deauth(wpa_s);
932	}
933}
934
935
936static void sme_assoc_timer(void *eloop_ctx, void *timeout_ctx)
937{
938	struct wpa_supplicant *wpa_s = eloop_ctx;
939	if (wpa_s->wpa_state == WPA_ASSOCIATING) {
940		wpa_msg(wpa_s, MSG_DEBUG, "SME: Association timeout");
941		sme_deauth(wpa_s);
942	}
943}
944
945
946void sme_state_changed(struct wpa_supplicant *wpa_s)
947{
948	/* Make sure timers are cleaned up appropriately. */
949	if (wpa_s->wpa_state != WPA_ASSOCIATING)
950		eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
951	if (wpa_s->wpa_state != WPA_AUTHENTICATING)
952		eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
953}
954
955
956void sme_disassoc_while_authenticating(struct wpa_supplicant *wpa_s,
957				       const u8 *prev_pending_bssid)
958{
959	/*
960	 * mac80211-workaround to force deauth on failed auth cmd,
961	 * requires us to remain in authenticating state to allow the
962	 * second authentication attempt to be continued properly.
963	 */
964	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Allow pending authentication "
965		"to proceed after disconnection event");
966	wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
967	os_memcpy(wpa_s->pending_bssid, prev_pending_bssid, ETH_ALEN);
968
969	/*
970	 * Re-arm authentication timer in case auth fails for whatever reason.
971	 */
972	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
973	eloop_register_timeout(SME_AUTH_TIMEOUT, 0, sme_auth_timer, wpa_s,
974			       NULL);
975}
976
977
978void sme_deinit(struct wpa_supplicant *wpa_s)
979{
980	os_free(wpa_s->sme.ft_ies);
981	wpa_s->sme.ft_ies = NULL;
982	wpa_s->sme.ft_ies_len = 0;
983#ifdef CONFIG_IEEE80211W
984	sme_stop_sa_query(wpa_s);
985#endif /* CONFIG_IEEE80211W */
986#ifdef CONFIG_SAE
987	wpabuf_free(wpa_s->sme.sae_token);
988	wpa_s->sme.sae_token = NULL;
989	sae_clear_data(&wpa_s->sme.sae);
990#endif /* CONFIG_SAE */
991
992	eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
993	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
994	eloop_cancel_timeout(sme_obss_scan_timeout, wpa_s, NULL);
995}
996
997
998static void sme_send_2040_bss_coex(struct wpa_supplicant *wpa_s,
999				   const u8 *chan_list, u8 num_channels,
1000				   u8 num_intol)
1001{
1002	struct ieee80211_2040_bss_coex_ie *bc_ie;
1003	struct ieee80211_2040_intol_chan_report *ic_report;
1004	struct wpabuf *buf;
1005
1006	wpa_printf(MSG_DEBUG, "SME: Send 20/40 BSS Coexistence to " MACSTR
1007		   " (num_channels=%u num_intol=%u)",
1008		   MAC2STR(wpa_s->bssid), num_channels, num_intol);
1009	wpa_hexdump(MSG_DEBUG, "SME: 20/40 BSS Intolerant Channels",
1010		    chan_list, num_channels);
1011
1012	buf = wpabuf_alloc(2 + /* action.category + action_code */
1013			   sizeof(struct ieee80211_2040_bss_coex_ie) +
1014			   sizeof(struct ieee80211_2040_intol_chan_report) +
1015			   num_channels);
1016	if (buf == NULL)
1017		return;
1018
1019	wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
1020	wpabuf_put_u8(buf, WLAN_PA_20_40_BSS_COEX);
1021
1022	bc_ie = wpabuf_put(buf, sizeof(*bc_ie));
1023	bc_ie->element_id = WLAN_EID_20_40_BSS_COEXISTENCE;
1024	bc_ie->length = 1;
1025	if (num_intol)
1026		bc_ie->coex_param |= WLAN_20_40_BSS_COEX_20MHZ_WIDTH_REQ;
1027
1028	if (num_channels > 0) {
1029		ic_report = wpabuf_put(buf, sizeof(*ic_report));
1030		ic_report->element_id = WLAN_EID_20_40_BSS_INTOLERANT;
1031		ic_report->length = num_channels + 1;
1032		ic_report->op_class = 0;
1033		os_memcpy(wpabuf_put(buf, num_channels), chan_list,
1034			  num_channels);
1035	}
1036
1037	if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
1038				wpa_s->own_addr, wpa_s->bssid,
1039				wpabuf_head(buf), wpabuf_len(buf), 0) < 0) {
1040		wpa_msg(wpa_s, MSG_INFO,
1041			"SME: Failed to send 20/40 BSS Coexistence frame");
1042	}
1043
1044	wpabuf_free(buf);
1045}
1046
1047
1048int sme_proc_obss_scan(struct wpa_supplicant *wpa_s)
1049{
1050	struct wpa_bss *bss;
1051	const u8 *ie;
1052	u16 ht_cap;
1053	u8 chan_list[P2P_MAX_CHANNELS], channel;
1054	u8 num_channels = 0, num_intol = 0, i;
1055
1056	if (!wpa_s->sme.sched_obss_scan)
1057		return 0;
1058
1059	wpa_s->sme.sched_obss_scan = 0;
1060	if (!wpa_s->current_bss || wpa_s->wpa_state != WPA_COMPLETED)
1061		return 1;
1062
1063	/*
1064	 * Check whether AP uses regulatory triplet or channel triplet in
1065	 * country info. Right now the operating class of the BSS channel
1066	 * width trigger event is "unknown" (IEEE Std 802.11-2012 10.15.12),
1067	 * based on the assumption that operating class triplet is not used in
1068	 * beacon frame. If the First Channel Number/Operating Extension
1069	 * Identifier octet has a positive integer value of 201 or greater,
1070	 * then its operating class triplet.
1071	 *
1072	 * TODO: If Supported Operating Classes element is present in beacon
1073	 * frame, have to lookup operating class in Annex E and fill them in
1074	 * 2040 coex frame.
1075	 */
1076	ie = wpa_bss_get_ie(wpa_s->current_bss, WLAN_EID_COUNTRY);
1077	if (ie && (ie[1] >= 6) && (ie[5] >= 201))
1078		return 1;
1079
1080	os_memset(chan_list, 0, sizeof(chan_list));
1081
1082	dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
1083		/* Skip other band bss */
1084		enum hostapd_hw_mode mode;
1085		mode = ieee80211_freq_to_chan(bss->freq, &channel);
1086		if (mode != HOSTAPD_MODE_IEEE80211G &&
1087		    mode != HOSTAPD_MODE_IEEE80211B)
1088			continue;
1089
1090		ie = wpa_bss_get_ie(bss, WLAN_EID_HT_CAP);
1091		ht_cap = (ie && (ie[1] == 26)) ? WPA_GET_LE16(ie + 2) : 0;
1092		wpa_printf(MSG_DEBUG, "SME OBSS scan BSS " MACSTR
1093			   " freq=%u chan=%u ht_cap=0x%x",
1094			   MAC2STR(bss->bssid), bss->freq, channel, ht_cap);
1095
1096		if (!ht_cap || (ht_cap & HT_CAP_INFO_40MHZ_INTOLERANT)) {
1097			if (ht_cap & HT_CAP_INFO_40MHZ_INTOLERANT)
1098				num_intol++;
1099
1100			/* Check whether the channel is already considered */
1101			for (i = 0; i < num_channels; i++) {
1102				if (channel == chan_list[i])
1103					break;
1104			}
1105			if (i != num_channels)
1106				continue;
1107
1108			chan_list[num_channels++] = channel;
1109		}
1110	}
1111
1112	sme_send_2040_bss_coex(wpa_s, chan_list, num_channels, num_intol);
1113	return 1;
1114}
1115
1116
1117static struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes,
1118					  u16 num_modes,
1119					  enum hostapd_hw_mode mode)
1120{
1121	u16 i;
1122
1123	for (i = 0; i < num_modes; i++) {
1124		if (modes[i].mode == mode)
1125			return &modes[i];
1126	}
1127
1128	return NULL;
1129}
1130
1131
1132static void wpa_setband_scan_freqs_list(struct wpa_supplicant *wpa_s,
1133					enum hostapd_hw_mode band,
1134					struct wpa_driver_scan_params *params)
1135{
1136	/* Include only supported channels for the specified band */
1137	struct hostapd_hw_modes *mode;
1138	int count, i;
1139
1140	mode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes, band);
1141	if (mode == NULL) {
1142		/* No channels supported in this band - use empty list */
1143		params->freqs = os_zalloc(sizeof(int));
1144		return;
1145	}
1146
1147	params->freqs = os_calloc(mode->num_channels + 1, sizeof(int));
1148	if (params->freqs == NULL)
1149		return;
1150	for (count = 0, i = 0; i < mode->num_channels; i++) {
1151		if (mode->channels[i].flag & HOSTAPD_CHAN_DISABLED)
1152			continue;
1153		params->freqs[count++] = mode->channels[i].freq;
1154	}
1155}
1156
1157
1158static void sme_obss_scan_timeout(void *eloop_ctx, void *timeout_ctx)
1159{
1160	struct wpa_supplicant *wpa_s = eloop_ctx;
1161	struct wpa_driver_scan_params params;
1162
1163	if (!wpa_s->current_bss) {
1164		wpa_printf(MSG_DEBUG, "SME OBSS: Ignore scan request");
1165		return;
1166	}
1167
1168	os_memset(&params, 0, sizeof(params));
1169	wpa_setband_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211G, &params);
1170	params.low_priority = 1;
1171	wpa_printf(MSG_DEBUG, "SME OBSS: Request an OBSS scan");
1172
1173	if (wpa_supplicant_trigger_scan(wpa_s, &params))
1174		wpa_printf(MSG_DEBUG, "SME OBSS: Failed to trigger scan");
1175	else
1176		wpa_s->sme.sched_obss_scan = 1;
1177	os_free(params.freqs);
1178
1179	eloop_register_timeout(wpa_s->sme.obss_scan_int, 0,
1180			       sme_obss_scan_timeout, wpa_s, NULL);
1181}
1182
1183
1184void sme_sched_obss_scan(struct wpa_supplicant *wpa_s, int enable)
1185{
1186	const u8 *ie;
1187	struct wpa_bss *bss = wpa_s->current_bss;
1188	struct wpa_ssid *ssid = wpa_s->current_ssid;
1189	struct hostapd_hw_modes *hw_mode = NULL;
1190	int i;
1191
1192	eloop_cancel_timeout(sme_obss_scan_timeout, wpa_s, NULL);
1193	wpa_s->sme.sched_obss_scan = 0;
1194	if (!enable)
1195		return;
1196
1197	/*
1198	 * Schedule OBSS scan if driver is using station SME in wpa_supplicant
1199	 * or it expects OBSS scan to be performed by wpa_supplicant.
1200	 */
1201	if (!((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) ||
1202	      (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OBSS_SCAN)) ||
1203	    ssid == NULL || ssid->mode != IEEE80211_MODE_INFRA)
1204		return;
1205
1206	if (!wpa_s->hw.modes)
1207		return;
1208
1209	/* only HT caps in 11g mode are relevant */
1210	for (i = 0; i < wpa_s->hw.num_modes; i++) {
1211		hw_mode = &wpa_s->hw.modes[i];
1212		if (hw_mode->mode == HOSTAPD_MODE_IEEE80211G)
1213			break;
1214	}
1215
1216	/* Driver does not support HT40 for 11g or doesn't have 11g. */
1217	if (i == wpa_s->hw.num_modes || !hw_mode ||
1218	    !(hw_mode->ht_capab & HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
1219		return;
1220
1221	if (bss == NULL || bss->freq < 2400 || bss->freq > 2500)
1222		return; /* Not associated on 2.4 GHz band */
1223
1224	/* Check whether AP supports HT40 */
1225	ie = wpa_bss_get_ie(wpa_s->current_bss, WLAN_EID_HT_CAP);
1226	if (!ie || ie[1] < 2 ||
1227	    !(WPA_GET_LE16(ie + 2) & HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
1228		return; /* AP does not support HT40 */
1229
1230	ie = wpa_bss_get_ie(wpa_s->current_bss,
1231			    WLAN_EID_OVERLAPPING_BSS_SCAN_PARAMS);
1232	if (!ie || ie[1] < 14)
1233		return; /* AP does not request OBSS scans */
1234
1235	wpa_s->sme.obss_scan_int = WPA_GET_LE16(ie + 6);
1236	if (wpa_s->sme.obss_scan_int < 10) {
1237		wpa_printf(MSG_DEBUG, "SME: Invalid OBSS Scan Interval %u "
1238			   "replaced with the minimum 10 sec",
1239			   wpa_s->sme.obss_scan_int);
1240		wpa_s->sme.obss_scan_int = 10;
1241	}
1242	wpa_printf(MSG_DEBUG, "SME: OBSS Scan Interval %u sec",
1243		   wpa_s->sme.obss_scan_int);
1244	eloop_register_timeout(wpa_s->sme.obss_scan_int, 0,
1245			       sme_obss_scan_timeout, wpa_s, NULL);
1246}
1247
1248
1249#ifdef CONFIG_IEEE80211W
1250
1251static const unsigned int sa_query_max_timeout = 1000;
1252static const unsigned int sa_query_retry_timeout = 201;
1253
1254static int sme_check_sa_query_timeout(struct wpa_supplicant *wpa_s)
1255{
1256	u32 tu;
1257	struct os_reltime now, passed;
1258	os_get_reltime(&now);
1259	os_reltime_sub(&now, &wpa_s->sme.sa_query_start, &passed);
1260	tu = (passed.sec * 1000000 + passed.usec) / 1024;
1261	if (sa_query_max_timeout < tu) {
1262		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SA Query timed out");
1263		sme_stop_sa_query(wpa_s);
1264		wpa_supplicant_deauthenticate(
1265			wpa_s, WLAN_REASON_PREV_AUTH_NOT_VALID);
1266		return 1;
1267	}
1268
1269	return 0;
1270}
1271
1272
1273static void sme_send_sa_query_req(struct wpa_supplicant *wpa_s,
1274				  const u8 *trans_id)
1275{
1276	u8 req[2 + WLAN_SA_QUERY_TR_ID_LEN];
1277	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Sending SA Query Request to "
1278		MACSTR, MAC2STR(wpa_s->bssid));
1279	wpa_hexdump(MSG_DEBUG, "SME: SA Query Transaction ID",
1280		    trans_id, WLAN_SA_QUERY_TR_ID_LEN);
1281	req[0] = WLAN_ACTION_SA_QUERY;
1282	req[1] = WLAN_SA_QUERY_REQUEST;
1283	os_memcpy(req + 2, trans_id, WLAN_SA_QUERY_TR_ID_LEN);
1284	if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
1285				wpa_s->own_addr, wpa_s->bssid,
1286				req, sizeof(req), 0) < 0)
1287		wpa_msg(wpa_s, MSG_INFO, "SME: Failed to send SA Query "
1288			"Request");
1289}
1290
1291
1292static void sme_sa_query_timer(void *eloop_ctx, void *timeout_ctx)
1293{
1294	struct wpa_supplicant *wpa_s = eloop_ctx;
1295	unsigned int timeout, sec, usec;
1296	u8 *trans_id, *nbuf;
1297
1298	if (wpa_s->sme.sa_query_count > 0 &&
1299	    sme_check_sa_query_timeout(wpa_s))
1300		return;
1301
1302	nbuf = os_realloc_array(wpa_s->sme.sa_query_trans_id,
1303				wpa_s->sme.sa_query_count + 1,
1304				WLAN_SA_QUERY_TR_ID_LEN);
1305	if (nbuf == NULL)
1306		return;
1307	if (wpa_s->sme.sa_query_count == 0) {
1308		/* Starting a new SA Query procedure */
1309		os_get_reltime(&wpa_s->sme.sa_query_start);
1310	}
1311	trans_id = nbuf + wpa_s->sme.sa_query_count * WLAN_SA_QUERY_TR_ID_LEN;
1312	wpa_s->sme.sa_query_trans_id = nbuf;
1313	wpa_s->sme.sa_query_count++;
1314
1315	os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN);
1316
1317	timeout = sa_query_retry_timeout;
1318	sec = ((timeout / 1000) * 1024) / 1000;
1319	usec = (timeout % 1000) * 1024;
1320	eloop_register_timeout(sec, usec, sme_sa_query_timer, wpa_s, NULL);
1321
1322	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association SA Query attempt %d",
1323		wpa_s->sme.sa_query_count);
1324
1325	sme_send_sa_query_req(wpa_s, trans_id);
1326}
1327
1328
1329static void sme_start_sa_query(struct wpa_supplicant *wpa_s)
1330{
1331	sme_sa_query_timer(wpa_s, NULL);
1332}
1333
1334
1335static void sme_stop_sa_query(struct wpa_supplicant *wpa_s)
1336{
1337	eloop_cancel_timeout(sme_sa_query_timer, wpa_s, NULL);
1338	os_free(wpa_s->sme.sa_query_trans_id);
1339	wpa_s->sme.sa_query_trans_id = NULL;
1340	wpa_s->sme.sa_query_count = 0;
1341}
1342
1343
1344void sme_event_unprot_disconnect(struct wpa_supplicant *wpa_s, const u8 *sa,
1345				 const u8 *da, u16 reason_code)
1346{
1347	struct wpa_ssid *ssid;
1348	struct os_reltime now;
1349
1350	if (wpa_s->wpa_state != WPA_COMPLETED)
1351		return;
1352	ssid = wpa_s->current_ssid;
1353	if (ssid == NULL ||
1354	    (ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT ?
1355	     wpa_s->conf->pmf : ssid->ieee80211w) == NO_MGMT_FRAME_PROTECTION)
1356		return;
1357	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
1358		return;
1359	if (reason_code != WLAN_REASON_CLASS2_FRAME_FROM_NONAUTH_STA &&
1360	    reason_code != WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA)
1361		return;
1362	if (wpa_s->sme.sa_query_count > 0)
1363		return;
1364
1365	os_get_reltime(&now);
1366	if (wpa_s->sme.last_unprot_disconnect.sec &&
1367	    !os_reltime_expired(&now, &wpa_s->sme.last_unprot_disconnect, 10))
1368		return; /* limit SA Query procedure frequency */
1369	wpa_s->sme.last_unprot_disconnect = now;
1370
1371	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Unprotected disconnect dropped - "
1372		"possible AP/STA state mismatch - trigger SA Query");
1373	sme_start_sa_query(wpa_s);
1374}
1375
1376
1377void sme_sa_query_rx(struct wpa_supplicant *wpa_s, const u8 *sa,
1378		     const u8 *data, size_t len)
1379{
1380	int i;
1381
1382	if (wpa_s->sme.sa_query_trans_id == NULL ||
1383	    len < 1 + WLAN_SA_QUERY_TR_ID_LEN ||
1384	    data[0] != WLAN_SA_QUERY_RESPONSE)
1385		return;
1386	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Received SA Query response from "
1387		MACSTR " (trans_id %02x%02x)", MAC2STR(sa), data[1], data[2]);
1388
1389	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
1390		return;
1391
1392	for (i = 0; i < wpa_s->sme.sa_query_count; i++) {
1393		if (os_memcmp(wpa_s->sme.sa_query_trans_id +
1394			      i * WLAN_SA_QUERY_TR_ID_LEN,
1395			      data + 1, WLAN_SA_QUERY_TR_ID_LEN) == 0)
1396			break;
1397	}
1398
1399	if (i >= wpa_s->sme.sa_query_count) {
1400		wpa_dbg(wpa_s, MSG_DEBUG, "SME: No matching SA Query "
1401			"transaction identifier found");
1402		return;
1403	}
1404
1405	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Reply to pending SA Query received "
1406		"from " MACSTR, MAC2STR(sa));
1407	sme_stop_sa_query(wpa_s);
1408}
1409
1410#endif /* CONFIG_IEEE80211W */
1411