sme.c revision 09f57babfc1e4473db20ced4f58a4c9f082c8ed8
18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/*
28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * wpa_supplicant - SME
3fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt * Copyright (c) 2009-2014, Jouni Malinen <j@w1.fi>
48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *
5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license.
6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details.
78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */
88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "includes.h"
108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common.h"
128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "utils/eloop.h"
138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/ieee802_11_defs.h"
148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/ieee802_11_common.h"
158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "eapol_supp/eapol_supp_sm.h"
168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/wpa_common.h"
17a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#include "common/sae.h"
188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "rsn_supp/wpa.h"
198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "rsn_supp/pmksa_cache.h"
208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "config.h"
218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wpa_supplicant_i.h"
228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "driver_i.h"
238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wpas_glue.h"
248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wps_supplicant.h"
258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "p2p_supplicant.h"
268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "notify.h"
278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "bss.h"
288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "scan.h"
298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "sme.h"
3004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt#include "hs20_supplicant.h"
318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define SME_AUTH_TIMEOUT 5
338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define SME_ASSOC_TIMEOUT 5
348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_auth_timer(void *eloop_ctx, void *timeout_ctx);
368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_assoc_timer(void *eloop_ctx, void *timeout_ctx);
3704949598a23f501be6eec21697465fd46a28840aDmitry Shmidtstatic void sme_obss_scan_timeout(void *eloop_ctx, void *timeout_ctx);
388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_stop_sa_query(struct wpa_supplicant *wpa_s);
408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
43d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
44d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
45a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic int index_within_array(const int *array, int idx)
46a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt{
47a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	int i;
48a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	for (i = 0; i < idx; i++) {
49cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		if (array[i] <= 0)
50a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return 0;
51a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
52a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	return 1;
53a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt}
54a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
55a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
56a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic int sme_set_sae_group(struct wpa_supplicant *wpa_s)
57a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt{
58a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	int *groups = wpa_s->conf->sae_groups;
59cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt	int default_groups[] = { 19, 20, 21, 25, 26, 0 };
60a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
61cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt	if (!groups || groups[0] <= 0)
62a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		groups = default_groups;
63a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
64a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	/* Configuration may have changed, so validate current index */
65a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (!index_within_array(groups, wpa_s->sme.sae_group_index))
66a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return -1;
67a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
68a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	for (;;) {
69a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		int group = groups[wpa_s->sme.sae_group_index];
70a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (group < 0)
71a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			break;
72a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sae_set_group(&wpa_s->sme.sae, group) == 0) {
73a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected SAE group %d",
74a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				wpa_s->sme.sae.group);
75a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		       return 0;
76a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		}
77a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae_group_index++;
78a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
79a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
80a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	return -1;
81a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt}
82a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
83a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
84a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidtstatic struct wpabuf * sme_auth_build_sae_commit(struct wpa_supplicant *wpa_s,
85a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt						 struct wpa_ssid *ssid,
86a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt						 const u8 *bssid)
87d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
88d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct wpabuf *buf;
89a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	size_t len;
90a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
91a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (ssid->passphrase == NULL) {
92a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: No password available");
93a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
94a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
95d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
96a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (sme_set_sae_group(wpa_s) < 0) {
97a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: Failed to select group");
98a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
99a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
100a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
101a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (sae_prepare_commit(wpa_s->own_addr, bssid,
102a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       (u8 *) ssid->passphrase,
103a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       os_strlen(ssid->passphrase),
104a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			       &wpa_s->sme.sae) < 0) {
105a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SAE: Could not pick PWE");
106a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return NULL;
107a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
108a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
109a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	len = wpa_s->sme.sae_token ? wpabuf_len(wpa_s->sme.sae_token) : 0;
110a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	buf = wpabuf_alloc(4 + SAE_COMMIT_MAX_LEN + len);
111d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (buf == NULL)
112d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return NULL;
113d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
114d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_put_le16(buf, 1); /* Transaction seq# */
115d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS);
116a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	sae_write_commit(&wpa_s->sme.sae, buf, wpa_s->sme.sae_token);
117d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
118d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	return buf;
119d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
120d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
121d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
122d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtstatic struct wpabuf * sme_auth_build_sae_confirm(struct wpa_supplicant *wpa_s)
123d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
124d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct wpabuf *buf;
125d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
126a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	buf = wpabuf_alloc(4 + SAE_CONFIRM_MAX_LEN);
127d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (buf == NULL)
128d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return NULL;
129d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
130d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_put_le16(buf, 2); /* Transaction seq# */
131d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS);
132a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	sae_write_confirm(&wpa_s->sme.sae, buf);
133d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
134d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	return buf;
135d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
136d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
137d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
138d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
139d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
140d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtstatic void sme_send_authentication(struct wpa_supplicant *wpa_s,
141d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				    struct wpa_bss *bss, struct wpa_ssid *ssid,
142d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				    int start)
1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_driver_auth_params params;
1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_ssid *old_ssid;
1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *ie;
1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	const u8 *md = NULL;
1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int i, bssid_changed;
153d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	struct wpabuf *resp = NULL;
15409f57babfc1e4473db20ced4f58a4c9f082c8ed8Dmitry Shmidt	u8 ext_capab[18];
155a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	int ext_capab_len;
1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (bss == NULL) {
1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_ERROR, "SME: No scan result available for "
1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"the network");
160fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpas_connect_work_done(wpa_s);
1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->current_bss = bss;
1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(&params, 0, sizeof(params));
1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->reassociate = 0;
1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.freq = bss->freq;
1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.bssid = bss->bssid;
1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.ssid = bss->ssid;
1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.ssid_len = bss->ssid_len;
1731f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	params.p2p = ssid->p2p_group;
1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.ssid_len != params.ssid_len ||
1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    os_memcmp(wpa_s->sme.ssid, params.ssid, params.ssid_len) != 0)
1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.prev_bssid_set = 0;
1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.freq = params.freq;
1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(wpa_s->sme.ssid, params.ssid, params.ssid_len);
1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.ssid_len = params.ssid_len;
1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.auth_alg = WPA_AUTH_ALG_OPEN;
1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef IEEE8021X_EAPOL
1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (ssid->leap) {
1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			if (ssid->non_leap == 0)
1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				params.auth_alg = WPA_AUTH_ALG_LEAP;
1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			else
1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				params.auth_alg |= WPA_AUTH_ALG_LEAP;
1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* IEEE8021X_EAPOL */
1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.auth_alg);
1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ssid->auth_alg) {
1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.auth_alg = ssid->auth_alg;
1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "Overriding auth_alg selection: "
1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"0x%x", params.auth_alg);
2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
201d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
202d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (wpa_key_mgmt_sae(ssid->key_mgmt)) {
203d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		const u8 *rsn;
204d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		struct wpa_ie_data ied;
205d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
206d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
207d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (rsn &&
208d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		    wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ied) == 0) {
209d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			if (wpa_key_mgmt_sae(ied.key_mgmt)) {
210d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				wpa_dbg(wpa_s, MSG_DEBUG, "Using SAE auth_alg");
211d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				params.auth_alg = WPA_AUTH_ALG_SAE;
212d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			}
213d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		}
214d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
215d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < NUM_WEP_KEYS; i++) {
2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (ssid->wep_key_len[i])
2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			params.wep_key[i] = ssid->wep_key[i];
2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.wep_key_len[i] = ssid->wep_key_len[i];
2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.wep_tx_keyidx = ssid->wep_tx_keyidx;
2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(wpa_s->bssid, 0, ETH_ALEN);
2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (bssid_changed)
2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpas_notify_bssid_changed(wpa_s);
2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if ((wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) ||
2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	     wpa_bss_get_ie(bss, WLAN_EID_RSN)) &&
2321f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	    wpa_key_mgmt_wpa(ssid->key_mgmt)) {
2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		int try_opportunistic;
234d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		try_opportunistic = (ssid->proactive_key_caching < 0 ?
235d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				     wpa_s->conf->okc :
236d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				     ssid->proactive_key_caching) &&
2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			(ssid->proto & WPA_PROTO_RSN);
2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					    wpa_s->current_ssid,
2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					    try_opportunistic) == 0)
2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					      wpa_s->sme.assoc_req_ie,
2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					      &wpa_s->sme.assoc_req_ie_len)) {
2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				"key management and encryption suites");
248fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			wpas_connect_work_done(wpa_s);
2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
25161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	} else if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) &&
25261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		   wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt)) {
25361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		/*
25461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
25561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		 * use non-WPA since the scan results did not indicate that the
25661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		 * AP is using WPA or WPA2.
25761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		 */
25861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
25961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		wpa_s->sme.assoc_req_ie_len = 0;
2601f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else if (wpa_key_mgmt_wpa_any(ssid->key_mgmt)) {
2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					      wpa_s->sme.assoc_req_ie,
2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					      &wpa_s->sme.assoc_req_ie_len)) {
2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_msg(wpa_s, MSG_WARNING, "SME: Failed to set WPA "
2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				"key management and encryption suites (no "
2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				"scan results)");
268fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			wpas_connect_work_done(wpa_s);
2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_WPS
2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) {
2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		struct wpabuf *wps_ie;
2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid));
2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wps_ie && wpabuf_len(wps_ie) <=
2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    sizeof(wpa_s->sme.assoc_req_ie)) {
2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.assoc_req_ie_len = wpabuf_len(wps_ie);
2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(wpa_s->sme.assoc_req_ie, wpabuf_head(wps_ie),
2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  wpa_s->sme.assoc_req_ie_len);
2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		} else
2818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.assoc_req_ie_len = 0;
2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpabuf_free(wps_ie);
2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_WPS */
2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	} else {
2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.assoc_req_ie_len = 0;
2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
2928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
2938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		md = ie + 2;
2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (md) {
2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* Prepare for the next transition */
2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3001f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (md && wpa_key_mgmt_ft(ssid->key_mgmt)) {
3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wpa_s->sme.assoc_req_ie_len + 5 <
3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    sizeof(wpa_s->sme.assoc_req_ie)) {
3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			struct rsn_mdie *mdie;
3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			u8 *pos = wpa_s->sme.assoc_req_ie +
3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_s->sme.assoc_req_ie_len;
3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*pos++ = WLAN_EID_MOBILITY_DOMAIN;
3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			*pos++ = sizeof(*mdie);
3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			mdie = (struct rsn_mdie *) pos;
3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			os_memcpy(mdie->mobility_domain, md,
3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  MOBILITY_DOMAIN_ID_LEN);
3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN];
3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.assoc_req_ie_len += 5;
3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (wpa_s->sme.ft_used &&
3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 &&
3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    wpa_sm_has_ptk(wpa_s->wpa)) {
3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying to use FT "
3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				"over-the-air");
3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			params.auth_alg = WPA_AUTH_ALG_FT;
3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			params.ie = wpa_s->sme.ft_ies;
3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			params.ie_len = wpa_s->sme.ft_ies_len;
3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
328d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpa_s->sme.mfp = ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT ?
329d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		wpa_s->conf->pmf : ssid->ieee80211w;
330d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (wpa_s->sme.mfp != NO_MGMT_FRAME_PROTECTION) {
3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		struct wpa_ie_data _ie;
3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &&
3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    _ie.capabilities &
3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) {
3368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Selected AP supports "
3378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				"MFP: require MFP");
3388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.mfp = MGMT_FRAME_PROTECTION_REQUIRED;
3398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
3408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
3428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
3438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_P2P
3448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->global->p2p) {
3458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		u8 *pos;
3468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		size_t len;
3478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		int res;
3488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		pos = wpa_s->sme.assoc_req_ie + wpa_s->sme.assoc_req_ie_len;
3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		len = sizeof(wpa_s->sme.assoc_req_ie) -
3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.assoc_req_ie_len;
3511f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		res = wpas_p2p_assoc_req_ie(wpa_s, bss, pos, len,
3521f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt					    ssid->p2p_group);
3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (res >= 0)
3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->sme.assoc_req_ie_len += res;
3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_P2P */
3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
35804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt#ifdef CONFIG_HS20
35951b6ea882f234c14cd1fe1332a3840cf61fafccaDmitry Shmidt	if (is_hs20_network(wpa_s, ssid, bss)) {
36004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		struct wpabuf *hs20;
36104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		hs20 = wpabuf_alloc(20);
36204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		if (hs20) {
363f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			int pps_mo_id = hs20_get_pps_mo_id(wpa_s, ssid);
364f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt			wpas_hs20_add_indication(hs20, pps_mo_id);
36504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			os_memcpy(wpa_s->sme.assoc_req_ie +
36604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				  wpa_s->sme.assoc_req_ie_len,
36704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				  wpabuf_head(hs20), wpabuf_len(hs20));
36804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			wpa_s->sme.assoc_req_ie_len += wpabuf_len(hs20);
36904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			wpabuf_free(hs20);
37004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		}
37104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
37204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt#endif /* CONFIG_HS20 */
37304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
37409f57babfc1e4473db20ced4f58a4c9f082c8ed8Dmitry Shmidt	ext_capab_len = wpas_build_ext_capab(wpa_s, ext_capab,
37509f57babfc1e4473db20ced4f58a4c9f082c8ed8Dmitry Shmidt					     sizeof(ext_capab));
376a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (ext_capab_len > 0) {
3771f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		u8 *pos = wpa_s->sme.assoc_req_ie;
3781f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		if (wpa_s->sme.assoc_req_ie_len > 0 && pos[0] == WLAN_EID_RSN)
3791f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			pos += 2 + pos[1];
380a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		os_memmove(pos + ext_capab_len, pos,
3811f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   wpa_s->sme.assoc_req_ie_len -
3821f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt			   (pos - wpa_s->sme.assoc_req_ie));
383a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.assoc_req_ie_len += ext_capab_len;
384a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		os_memcpy(pos, ext_capab, ext_capab_len);
3851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	}
3861f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt
387d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
388d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (params.auth_alg == WPA_AUTH_ALG_SAE) {
389d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (start)
390a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			resp = sme_auth_build_sae_commit(wpa_s, ssid,
391a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt							 bss->bssid);
392d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		else
393d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			resp = sme_auth_build_sae_confirm(wpa_s);
394fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		if (resp == NULL) {
395fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			wpas_connect_work_done(wpa_s);
396d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return;
397fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		}
398d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		params.sae_data = wpabuf_head(resp);
399d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		params.sae_data_len = wpabuf_len(resp);
400a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae.state = start ? SAE_COMMITTED : SAE_CONFIRMED;
401d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
402d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
403d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
4041f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	wpa_supplicant_cancel_sched_scan(wpa_s);
4058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_cancel_scan(wpa_s);
4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_msg(wpa_s, MSG_INFO, "SME: Trying to authenticate with " MACSTR
4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		" (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
4098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_ssid_txt(params.ssid, params.ssid_len), params.freq);
4108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_clear_keys(wpa_s, bss->bssid);
4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
4138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	old_ssid = wpa_s->current_ssid;
4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->current_ssid = ssid;
4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_initiate_eapol(wpa_s);
4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (old_ssid != wpa_s->current_ssid)
4188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpas_notify_network_changed(wpa_s);
4198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
420f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt#ifdef CONFIG_P2P
421f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	/*
422f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	 * If multi-channel concurrency is not supported, check for any
423f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	 * frequency conflict. In case of any frequency conflict, remove the
424f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	 * least prioritized connection.
425f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	 */
426f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	if (wpa_s->num_multichan_concurrent < 2) {
427f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt		int freq, num;
428f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt		num = get_shared_radio_freqs(wpa_s, &freq, 1);
429f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt		if (num > 0 && freq > 0 && freq != params.freq) {
430f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt			wpa_printf(MSG_DEBUG,
431f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				   "Conflicting frequency found (%d != %d)",
432f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				   freq, params.freq);
433f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt			if (wpas_p2p_handle_frequency_conflicts(wpa_s,
434f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt								params.freq,
435f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt								ssid) < 0) {
436f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				wpas_connection_failed(wpa_s, bss->bssid);
437f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				wpa_supplicant_mark_disassoc(wpa_s);
438f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				wpabuf_free(resp);
439f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				wpas_connect_work_done(wpa_s);
440f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt				return;
441f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt			}
442f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt		}
443f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt	}
444f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt#endif /* CONFIG_P2P */
445f9bdef99ce3b2858f2812c745a3d6bb093fb0e5dDmitry Shmidt
4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.auth_alg = params.auth_alg;
4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_drv_authenticate(wpa_s, &params) < 0) {
4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_INFO, "SME: Authentication request to the "
4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"driver failed");
4501f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		wpas_connection_failed(wpa_s, bss->bssid);
451c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt		wpa_supplicant_mark_disassoc(wpa_s);
452d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		wpabuf_free(resp);
453fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpas_connect_work_done(wpa_s);
4548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
4568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_register_timeout(SME_AUTH_TIMEOUT, 0, sme_auth_timer, wpa_s,
4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       NULL);
4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/*
4618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * Association will be started based on the authentication event from
4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * the driver.
4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
464d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
465d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpabuf_free(resp);
466d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
467d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
468d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
469fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidtstatic void sme_auth_start_cb(struct wpa_radio_work *work, int deinit)
470fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt{
471fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	struct wpa_connect_work *cwork = work->ctx;
472fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	struct wpa_supplicant *wpa_s = work->wpa_s;
473fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
474fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (deinit) {
475bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt		if (work->started)
476bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt			wpa_s->connect_work = NULL;
477bd14a57187b024f49f5b9ace55ef457d8d04650aDmitry Shmidt
478fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpas_connect_work_free(cwork);
479fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
480fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	}
481fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
482fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	wpa_s->connect_work = work;
483fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
484fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (!wpas_valid_bss_ssid(wpa_s, cwork->bss, cwork->ssid)) {
485fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: BSS/SSID entry for authentication not valid anymore - drop connection attempt");
486fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpas_connect_work_done(wpa_s);
487fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
488fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	}
489fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
490fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	sme_send_authentication(wpa_s, cwork->bss, cwork->ssid, 1);
491fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt}
492fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
493fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
494d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtvoid sme_authenticate(struct wpa_supplicant *wpa_s,
495d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		      struct wpa_bss *bss, struct wpa_ssid *ssid)
496d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
497fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	struct wpa_connect_work *cwork;
498fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
499fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (bss == NULL || ssid == NULL)
500fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
501fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (wpa_s->connect_work) {
502fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Reject sme_authenticate() call since connect_work exist");
503fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
504fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	}
505fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
506f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	if (radio_work_pending(wpa_s, "sme-connect")) {
507df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		/*
508df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		 * The previous sme-connect work might no longer be valid due to
509df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		 * the fact that the BSS list was updated. In addition, it makes
510df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		 * sense to adhere to the 'newer' decision.
511df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		 */
512df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG,
513df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt			"SME: Remove previous pending sme-connect");
514df5a7e4c5c64890c2425bb47d665bbce4992b676Dmitry Shmidt		radio_remove_works(wpa_s, "sme-connect", 0);
515f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	}
516f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt
517fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	cwork = os_zalloc(sizeof(*cwork));
518fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (cwork == NULL)
519fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		return;
520fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	cwork->bss = bss;
521fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	cwork->ssid = ssid;
522fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	cwork->sme = 1;
523fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
524a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#ifdef CONFIG_SAE
525a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	wpa_s->sme.sae.state = SAE_NOTHING;
526a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	wpa_s->sme.sae.send_confirm = 0;
527cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt	wpa_s->sme.sae_group_index = 0;
528a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#endif /* CONFIG_SAE */
529fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt
530fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	if (radio_add_work(wpa_s, bss->freq, "sme-connect", 1,
531fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt			   sme_auth_start_cb, cwork) < 0)
532fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		wpas_connect_work_free(cwork);
533d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt}
534d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
535d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
536d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
537d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
538d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidtstatic int sme_sae_auth(struct wpa_supplicant *wpa_s, u16 auth_transaction,
539d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			u16 status_code, const u8 *data, size_t len)
540d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt{
541d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE authentication transaction %u "
542d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		"status code %u", auth_transaction, status_code);
543a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
544a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (auth_transaction == 1 &&
545a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    status_code == WLAN_STATUS_ANTI_CLOGGING_TOKEN_REQ &&
546a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    wpa_s->sme.sae.state == SAE_COMMITTED &&
547a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    wpa_s->current_bss && wpa_s->current_ssid) {
548a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE anti-clogging token "
549a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			"requested");
550a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpabuf_free(wpa_s->sme.sae_token);
551a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae_token = wpabuf_alloc_copy(data, len);
552a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		sme_send_authentication(wpa_s, wpa_s->current_bss,
553a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					wpa_s->current_ssid, 1);
554a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return 0;
555a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
556a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
557a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	if (auth_transaction == 1 &&
558a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    status_code == WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED &&
559a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    wpa_s->sme.sae.state == SAE_COMMITTED &&
560a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	    wpa_s->current_bss && wpa_s->current_ssid) {
561a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SAE group not supported");
562a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae_group_index++;
563a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sme_set_sae_group(wpa_s) < 0)
564a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return -1; /* no other groups enabled */
565a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Try next enabled SAE group");
566a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		sme_send_authentication(wpa_s, wpa_s->current_bss,
567a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt					wpa_s->current_ssid, 1);
568a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		return 0;
569a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	}
570d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
571d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (status_code != WLAN_STATUS_SUCCESS)
572d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return -1;
573d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
574d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (auth_transaction == 1) {
575cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		int *groups = wpa_s->conf->sae_groups;
576cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt
577d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME SAE commit");
578d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (wpa_s->current_bss == NULL ||
579d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		    wpa_s->current_ssid == NULL)
580d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return -1;
581a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (wpa_s->sme.sae.state != SAE_COMMITTED)
582d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return -1;
583cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt		if (groups && groups[0] <= 0)
584cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt			groups = NULL;
585a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sae_parse_commit(&wpa_s->sme.sae, data, len, NULL, NULL,
586cce06667447b5aec83452adb0c15100ada531095Dmitry Shmidt				     groups) != WLAN_STATUS_SUCCESS)
587d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return -1;
588a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
589a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sae_process_commit(&wpa_s->sme.sae) < 0) {
590a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			wpa_printf(MSG_DEBUG, "SAE: Failed to process peer "
591a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt				   "commit");
592a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			return -1;
593a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		}
594a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
595a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpabuf_free(wpa_s->sme.sae_token);
596a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae_token = NULL;
597d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		sme_send_authentication(wpa_s, wpa_s->current_bss,
598d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt					wpa_s->current_ssid, 0);
599d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return 0;
600d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	} else if (auth_transaction == 2) {
601d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME SAE confirm");
602a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (wpa_s->sme.sae.state != SAE_CONFIRMED)
603d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return -1;
604a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		if (sae_check_confirm(&wpa_s->sme.sae, data, len) < 0)
605d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return -1;
606a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_s->sme.sae.state = SAE_ACCEPTED;
607a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		sae_clear_temp_data(&wpa_s->sme.sae);
608d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return 1;
609d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
610d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
611d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	return -1;
6128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
613d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
6148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data)
6178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
6188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_ssid *ssid = wpa_s->current_ssid;
6198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (ssid == NULL) {
6218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
6228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"when network is not selected");
6238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
6248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state != WPA_AUTHENTICATING) {
6278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication event "
6288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"when not in authenticating state");
6298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
6308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
6338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Ignore authentication with "
6348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"unexpected peer " MACSTR,
6358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			MAC2STR(data->auth.peer));
6368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
6378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
6388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
640d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		" auth_type=%d auth_transaction=%d status_code=%d",
6418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		MAC2STR(data->auth.peer), data->auth.auth_type,
642d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		data->auth.auth_transaction, data->auth.status_code);
6438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
6448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    data->auth.ies, data->auth.ies_len);
6458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
6478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
648d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#ifdef CONFIG_SAE
649d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (data->auth.auth_type == WLAN_AUTH_SAE) {
650d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		int res;
651d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		res = sme_sae_auth(wpa_s, data->auth.auth_transaction,
652d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				   data->auth.status_code, data->auth.ies,
653d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt				   data->auth.ies_len);
654d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (res < 0) {
655d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
656d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
657d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
658d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		}
659d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		if (res != 1)
660d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt			return;
661a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt
662a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SME: SAE completed - setting PMK for "
663a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt			   "4-way handshake");
664a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt		wpa_sm_set_pmk(wpa_s->wpa, wpa_s->sme.sae.pmk, PMK_LEN);
665d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	}
666d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt#endif /* CONFIG_SAE */
667d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt
6688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (data->auth.status_code != WLAN_STATUS_SUCCESS) {
6698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication failed (status "
6708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"code %d)", data->auth.status_code);
6718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (data->auth.status_code !=
6738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG ||
6748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    wpa_s->sme.auth_alg == data->auth.auth_type ||
6758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    wpa_s->current_ssid->auth_alg == WPA_AUTH_ALG_LEAP) {
6768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
67704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
6788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
6798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
6808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6819767226d8e6a1adaa33beb9f517ef40dddfa460cDmitry Shmidt		wpas_connect_work_done(wpa_s);
6829767226d8e6a1adaa33beb9f517ef40dddfa460cDmitry Shmidt
6838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		switch (data->auth.auth_type) {
6848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		case WLAN_AUTH_OPEN:
6858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_SHARED;
6868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying SHARED auth");
6888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
6898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						 wpa_s->current_ssid);
6908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
6918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		case WLAN_AUTH_SHARED_KEY:
6938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_LEAP;
6948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
6958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_dbg(wpa_s, MSG_DEBUG, "SME: Trying LEAP auth");
6968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
6978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt						 wpa_s->current_ssid);
6988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
6998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		default:
7018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			return;
7028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		}
7038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
7068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (data->auth.auth_type == WLAN_AUTH_FT) {
7078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		union wpa_event_data edata;
7088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memset(&edata, 0, sizeof(edata));
7098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		edata.ft_ies.ies = data->auth.ies;
7108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		edata.ft_ies.ies_len = data->auth.ies_len;
7118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
7128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_supplicant_event(wpa_s, EVENT_FT_RESPONSE, &edata);
7138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
7158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_associate(wpa_s, ssid->mode, data->auth.peer,
7178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		      data->auth.auth_type);
7188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
7198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode,
7228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		   const u8 *bssid, u16 auth_type)
7238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
7248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_driver_associate_params params;
7258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct ieee802_11_elems elems;
726c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt#ifdef CONFIG_HT_OVERRIDES
727c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	struct ieee80211_ht_capabilities htcaps;
728c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	struct ieee80211_ht_capabilities htcaps_mask;
729c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt#endif /* CONFIG_HT_OVERRIDES */
7302f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt#ifdef CONFIG_VHT_OVERRIDES
7312f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	struct ieee80211_vht_capabilities vhtcaps;
7322f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	struct ieee80211_vht_capabilities vhtcaps_mask;
7332f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt#endif /* CONFIG_VHT_OVERRIDES */
7348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(&params, 0, sizeof(params));
7368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.bssid = bssid;
7378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.ssid = wpa_s->sme.ssid;
7388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.ssid_len = wpa_s->sme.ssid_len;
7398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.freq = wpa_s->sme.freq;
74004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	params.bg_scan_period = wpa_s->current_ssid ?
74104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_s->current_ssid->bg_scan_period : -1;
7428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.wpa_ie = wpa_s->sme.assoc_req_ie_len ?
7438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.assoc_req_ie : NULL;
7448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len;
745fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	params.pairwise_suite = wpa_s->pairwise_cipher;
746fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	params.group_suite = wpa_s->group_cipher;
74715907098d1f67c24bb000e593e279af173cf57d7Dmitry Shmidt	params.key_mgmt_suite = wpa_s->key_mgmt;
74815907098d1f67c24bb000e593e279af173cf57d7Dmitry Shmidt	params.wpa_proto = wpa_s->wpa_proto;
749c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt#ifdef CONFIG_HT_OVERRIDES
750c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	os_memset(&htcaps, 0, sizeof(htcaps));
751c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	os_memset(&htcaps_mask, 0, sizeof(htcaps_mask));
752c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	params.htcaps = (u8 *) &htcaps;
753c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	params.htcaps_mask = (u8 *) &htcaps_mask;
754c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	wpa_supplicant_apply_ht_overrides(wpa_s, wpa_s->current_ssid, &params);
755c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt#endif /* CONFIG_HT_OVERRIDES */
7562f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt#ifdef CONFIG_VHT_OVERRIDES
7572f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	os_memset(&vhtcaps, 0, sizeof(vhtcaps));
7582f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	os_memset(&vhtcaps_mask, 0, sizeof(vhtcaps_mask));
7592f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	params.vhtcaps = &vhtcaps;
7602f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	params.vhtcaps_mask = &vhtcaps_mask;
7612f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt	wpa_supplicant_apply_vht_overrides(wpa_s, wpa_s->current_ssid, &params);
7622f023193a0fd630eb82ce6381b80911ad5a3462fDmitry Shmidt#endif /* CONFIG_VHT_OVERRIDES */
7638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211R
7648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) {
7658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.wpa_ie = wpa_s->sme.ft_ies;
7668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.wpa_ie_len = wpa_s->sme.ft_ies_len;
7678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211R */
7698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.mode = mode;
7708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	params.mgmt_frame_protection = wpa_s->sme.mfp;
7718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.prev_bssid_set)
7728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.prev_bssid = wpa_s->sme.prev_bssid;
7738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR
7758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		" (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
7768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.ssid ? wpa_ssid_txt(params.ssid, params.ssid_len) : "",
7778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.freq);
7788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING);
7808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
7818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (params.wpa_ie == NULL ||
7828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    ieee802_11_parse_elems(params.wpa_ie, params.wpa_ie_len, &elems, 0)
7838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    < 0) {
7848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Could not parse own IEs?!");
7858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memset(&elems, 0, sizeof(elems));
7868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
7871f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (elems.rsn_ie) {
7881f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		params.wpa_proto = WPA_PROTO_RSN;
7898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2,
7908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					elems.rsn_ie_len + 2);
7911f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else if (elems.wpa_ie) {
7921f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt		params.wpa_proto = WPA_PROTO_WPA;
7938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2,
7948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt					elems.wpa_ie_len + 2);
795f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt	} else if (elems.osen) {
796f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		params.wpa_proto = WPA_PROTO_OSEN;
797f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.osen - 2,
798f21452aea786ac056eb01f1cbba4f553bd502747Dmitry Shmidt					elems.osen_len + 2);
7991f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	} else
8008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
8011f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (wpa_s->current_ssid && wpa_s->current_ssid->p2p_group)
8028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.p2p = 1;
8038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->parent->set_sta_uapsd)
8058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.uapsd = wpa_s->parent->sta_uapsd;
8068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	else
8078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		params.uapsd = -1;
8088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_drv_associate(wpa_s, &params) < 0) {
8108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_INFO, "SME: Association request to the "
8118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"driver failed");
8128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
81304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
8148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
8158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
8168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_register_timeout(SME_ASSOC_TIMEOUT, 0, sme_assoc_timer, wpa_s,
8198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       NULL);
8208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md,
8248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		      const u8 *ies, size_t ies_len)
8258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (md == NULL || ies == NULL) {
8278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Remove mobility domain");
8288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		os_free(wpa_s->sme.ft_ies);
8298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.ft_ies = NULL;
8308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.ft_ies_len = 0;
8318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.ft_used = 0;
8328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 0;
8338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LEN);
8368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len);
8378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_free(wpa_s->sme.ft_ies);
8388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.ft_ies = os_malloc(ies_len);
8398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.ft_ies == NULL)
8408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return -1;
8418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(wpa_s->sme.ft_ies, ies, ies_len);
8428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.ft_ies_len = ies_len;
8438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
8448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_deauth(struct wpa_supplicant *wpa_s)
8488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int bssid_changed;
8508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
8528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_drv_deauthenticate(wpa_s, wpa_s->pending_bssid,
8548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				   WLAN_REASON_DEAUTH_LEAVING) < 0) {
8558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_INFO, "SME: Deauth request to the driver "
8568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"failed");
8578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
8588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.prev_bssid_set = 0;
8598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
8618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
8628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(wpa_s->bssid, 0, ETH_ALEN);
8638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
8648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (bssid_changed)
8658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpas_notify_bssid_changed(wpa_s);
8668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_assoc_reject(struct wpa_supplicant *wpa_s,
8708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			    union wpa_event_data *data)
8718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association with " MACSTR " failed: "
8738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		"status code %d", MAC2STR(wpa_s->pending_bssid),
8748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		data->assoc_reject.status_code);
8758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
8778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/*
8798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * For now, unconditionally terminate the previous authentication. In
8808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * theory, this should not be needed, but mac80211 gets quite confused
8818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * if the authentication is left pending.. Some roaming cases might
8828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * benefit from using the previous authentication, so this could be
8838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * optimized in the future.
8848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
8858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_deauth(wpa_s);
8868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_auth_timed_out(struct wpa_supplicant *wpa_s,
8908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			      union wpa_event_data *data)
8918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
8928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Authentication timed out");
8938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
894c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt	wpa_supplicant_mark_disassoc(wpa_s);
8958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
8968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
8988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_assoc_timed_out(struct wpa_supplicant *wpa_s,
8998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       union wpa_event_data *data)
9008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association timed out");
9028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
9038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_mark_disassoc(wpa_s);
9048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_disassoc(struct wpa_supplicant *wpa_s,
908c2ebb4b85d69b65f552fee71ac68f44e8d87b39eDmitry Shmidt			struct disassoc_info *info)
9098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Disassociation event received");
9111f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt	if (wpa_s->sme.prev_bssid_set) {
9128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/*
9138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * cfg80211/mac80211 can get into somewhat confused state if
9148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * the AP only disassociates us and leaves us in authenticated
9158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * state. For now, force the state to be cleared to avoid
9168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 * confusing errors if we try to associate with the AP again.
9178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		 */
9188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: Deauthenticate to clear "
9198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"driver state");
9208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_drv_deauthenticate(wpa_s, wpa_s->sme.prev_bssid,
9218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       WLAN_REASON_DEAUTH_LEAVING);
9228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_auth_timer(void *eloop_ctx, void *timeout_ctx)
9278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_supplicant *wpa_s = eloop_ctx;
9298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state == WPA_AUTHENTICATING) {
9308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_DEBUG, "SME: Authentication timeout");
9318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sme_deauth(wpa_s);
9328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_assoc_timer(void *eloop_ctx, void *timeout_ctx)
9378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_supplicant *wpa_s = eloop_ctx;
9398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state == WPA_ASSOCIATING) {
9408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_DEBUG, "SME: Association timeout");
9418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sme_deauth(wpa_s);
9428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
9438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_state_changed(struct wpa_supplicant *wpa_s)
9478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/* Make sure timers are cleaned up appropriately. */
9498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state != WPA_ASSOCIATING)
9508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
9518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state != WPA_AUTHENTICATING)
9528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
9538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_disassoc_while_authenticating(struct wpa_supplicant *wpa_s,
9578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				       const u8 *prev_pending_bssid)
9588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/*
9608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * mac80211-workaround to force deauth on failed auth cmd,
9618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * requires us to remain in authenticating state to allow the
9628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * second authentication attempt to be continued properly.
9638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
9648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Allow pending authentication "
9658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		"to proceed after disconnection event");
9668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
9678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(wpa_s->pending_bssid, prev_pending_bssid, ETH_ALEN);
9688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	/*
9708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 * Re-arm authentication timer in case auth fails for whatever reason.
9718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	 */
9728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
9738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_register_timeout(SME_AUTH_TIMEOUT, 0, sme_auth_timer, wpa_s,
9748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			       NULL);
9758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
9768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_deinit(struct wpa_supplicant *wpa_s)
9798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
9808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_free(wpa_s->sme.ft_ies);
9818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.ft_ies = NULL;
9828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.ft_ies_len = 0;
9838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
9848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_stop_sa_query(wpa_s);
9858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
986a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#ifdef CONFIG_SAE
987a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	wpabuf_free(wpa_s->sme.sae_token);
988a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	wpa_s->sme.sae_token = NULL;
989a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt	sae_clear_data(&wpa_s->sme.sae);
990a54fa5fb807eaeff45464139b5a7759f060cec68Dmitry Shmidt#endif /* CONFIG_SAE */
9918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
9928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_assoc_timer, wpa_s, NULL);
9938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_auth_timer, wpa_s, NULL);
99404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	eloop_cancel_timeout(sme_obss_scan_timeout, wpa_s, NULL);
99504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
99604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
99704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
99804949598a23f501be6eec21697465fd46a28840aDmitry Shmidtstatic void sme_send_2040_bss_coex(struct wpa_supplicant *wpa_s,
99904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				   const u8 *chan_list, u8 num_channels,
100004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				   u8 num_intol)
100104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
100204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct ieee80211_2040_bss_coex_ie *bc_ie;
100304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct ieee80211_2040_intol_chan_report *ic_report;
100404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpabuf *buf;
100504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
1006d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt	wpa_printf(MSG_DEBUG, "SME: Send 20/40 BSS Coexistence to " MACSTR
1007d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt		   " (num_channels=%u num_intol=%u)",
1008d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt		   MAC2STR(wpa_s->bssid), num_channels, num_intol);
1009d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt	wpa_hexdump(MSG_DEBUG, "SME: 20/40 BSS Intolerant Channels",
1010d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt		    chan_list, num_channels);
101104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
101204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	buf = wpabuf_alloc(2 + /* action.category + action_code */
101304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			   sizeof(struct ieee80211_2040_bss_coex_ie) +
101404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			   sizeof(struct ieee80211_2040_intol_chan_report) +
101504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			   num_channels);
101604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (buf == NULL)
101704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return;
101804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
101904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpabuf_put_u8(buf, WLAN_ACTION_PUBLIC);
102004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpabuf_put_u8(buf, WLAN_PA_20_40_BSS_COEX);
102104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
102204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	bc_ie = wpabuf_put(buf, sizeof(*bc_ie));
102304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	bc_ie->element_id = WLAN_EID_20_40_BSS_COEXISTENCE;
102404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	bc_ie->length = 1;
102504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (num_intol)
102604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		bc_ie->coex_param |= WLAN_20_40_BSS_COEX_20MHZ_WIDTH_REQ;
102704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
102804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (num_channels > 0) {
102904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ic_report = wpabuf_put(buf, sizeof(*ic_report));
103004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ic_report->element_id = WLAN_EID_20_40_BSS_INTOLERANT;
103104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ic_report->length = num_channels + 1;
103204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ic_report->op_class = 0;
103304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		os_memcpy(wpabuf_put(buf, num_channels), chan_list,
103404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			  num_channels);
103504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
103604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
103704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
103804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				wpa_s->own_addr, wpa_s->bssid,
103904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				wpabuf_head(buf), wpabuf_len(buf), 0) < 0) {
104004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_msg(wpa_s, MSG_INFO,
104104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			"SME: Failed to send 20/40 BSS Coexistence frame");
104204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
104304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
104404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpabuf_free(buf);
104504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
104604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
104704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
104804949598a23f501be6eec21697465fd46a28840aDmitry Shmidtint sme_proc_obss_scan(struct wpa_supplicant *wpa_s)
104904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
105004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpa_bss *bss;
105104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	const u8 *ie;
105204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	u16 ht_cap;
105304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	u8 chan_list[P2P_MAX_CHANNELS], channel;
105404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	u8 num_channels = 0, num_intol = 0, i;
105504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
105604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!wpa_s->sme.sched_obss_scan)
105704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return 0;
105804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
105904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_s->sme.sched_obss_scan = 0;
106004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!wpa_s->current_bss || wpa_s->wpa_state != WPA_COMPLETED)
106104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return 1;
106204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
106304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	/*
106404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * Check whether AP uses regulatory triplet or channel triplet in
106504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * country info. Right now the operating class of the BSS channel
106604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * width trigger event is "unknown" (IEEE Std 802.11-2012 10.15.12),
106704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * based on the assumption that operating class triplet is not used in
106804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * beacon frame. If the First Channel Number/Operating Extension
106904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * Identifier octet has a positive integer value of 201 or greater,
107004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * then its operating class triplet.
107104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 *
107204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * TODO: If Supported Operating Classes element is present in beacon
107304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * frame, have to lookup operating class in Annex E and fill them in
107404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 * 2040 coex frame.
107504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	 */
107604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	ie = wpa_bss_get_ie(wpa_s->current_bss, WLAN_EID_COUNTRY);
107704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (ie && (ie[1] >= 6) && (ie[5] >= 201))
107804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return 1;
107904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
108004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	os_memset(chan_list, 0, sizeof(chan_list));
108104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
108204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
108304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		/* Skip other band bss */
10844b06059785b935dd1f4f09314e4e12c417d2c6a4Dmitry Shmidt		enum hostapd_hw_mode mode;
10854b06059785b935dd1f4f09314e4e12c417d2c6a4Dmitry Shmidt		mode = ieee80211_freq_to_chan(bss->freq, &channel);
10864b06059785b935dd1f4f09314e4e12c417d2c6a4Dmitry Shmidt		if (mode != HOSTAPD_MODE_IEEE80211G &&
10874b06059785b935dd1f4f09314e4e12c417d2c6a4Dmitry Shmidt		    mode != HOSTAPD_MODE_IEEE80211B)
108804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			continue;
108904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
109004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ie = wpa_bss_get_ie(bss, WLAN_EID_HT_CAP);
109104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		ht_cap = (ie && (ie[1] == 26)) ? WPA_GET_LE16(ie + 2) : 0;
1092d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt		wpa_printf(MSG_DEBUG, "SME OBSS scan BSS " MACSTR
1093d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt			   " freq=%u chan=%u ht_cap=0x%x",
1094d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt			   MAC2STR(bss->bssid), bss->freq, channel, ht_cap);
109504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
109604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		if (!ht_cap || (ht_cap & HT_CAP_INFO_40MHZ_INTOLERANT)) {
1097d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt			if (ht_cap & HT_CAP_INFO_40MHZ_INTOLERANT)
1098d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt				num_intol++;
1099d11f019d62a42a8fc4c4d1f2ec17cf35b0763153Dmitry Shmidt
110004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			/* Check whether the channel is already considered */
110104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			for (i = 0; i < num_channels; i++) {
110204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				if (channel == chan_list[i])
110304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt					break;
110404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			}
110504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			if (i != num_channels)
110604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt				continue;
110704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
110804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			chan_list[num_channels++] = channel;
110904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		}
111004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
111104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
111204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	sme_send_2040_bss_coex(wpa_s, chan_list, num_channels, num_intol);
111304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	return 1;
111404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
111504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
111604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
111704949598a23f501be6eec21697465fd46a28840aDmitry Shmidtstatic struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes,
111804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt					  u16 num_modes,
111904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt					  enum hostapd_hw_mode mode)
112004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
112104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	u16 i;
112204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
112304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	for (i = 0; i < num_modes; i++) {
112404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		if (modes[i].mode == mode)
112504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			return &modes[i];
112604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
112704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
112804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	return NULL;
112904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
113004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
113104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
113204949598a23f501be6eec21697465fd46a28840aDmitry Shmidtstatic void wpa_setband_scan_freqs_list(struct wpa_supplicant *wpa_s,
113304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt					enum hostapd_hw_mode band,
113404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt					struct wpa_driver_scan_params *params)
113504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
113604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	/* Include only supported channels for the specified band */
113704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct hostapd_hw_modes *mode;
113804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	int count, i;
113904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
114004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	mode = get_mode(wpa_s->hw.modes, wpa_s->hw.num_modes, band);
114104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (mode == NULL) {
114204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		/* No channels supported in this band - use empty list */
114304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		params->freqs = os_zalloc(sizeof(int));
114404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return;
114504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
114604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
114761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	params->freqs = os_calloc(mode->num_channels + 1, sizeof(int));
114804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (params->freqs == NULL)
114904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return;
115004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	for (count = 0, i = 0; i < mode->num_channels; i++) {
115104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		if (mode->channels[i].flag & HOSTAPD_CHAN_DISABLED)
115204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			continue;
115304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		params->freqs[count++] = mode->channels[i].freq;
115404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
115504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
115604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
115704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
115804949598a23f501be6eec21697465fd46a28840aDmitry Shmidtstatic void sme_obss_scan_timeout(void *eloop_ctx, void *timeout_ctx)
115904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
116004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpa_supplicant *wpa_s = eloop_ctx;
116104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpa_driver_scan_params params;
116204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
116304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!wpa_s->current_bss) {
116404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_printf(MSG_DEBUG, "SME OBSS: Ignore scan request");
116504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return;
116604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
116704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
116804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	os_memset(&params, 0, sizeof(params));
116904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_setband_scan_freqs_list(wpa_s, HOSTAPD_MODE_IEEE80211G, &params);
117004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_printf(MSG_DEBUG, "SME OBSS: Request an OBSS scan");
117104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
117204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (wpa_supplicant_trigger_scan(wpa_s, &params))
117304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_printf(MSG_DEBUG, "SME OBSS: Failed to trigger scan");
117404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	else
117504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_s->sme.sched_obss_scan = 1;
117604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	os_free(params.freqs);
117704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
117804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	eloop_register_timeout(wpa_s->sme.obss_scan_int, 0,
117904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			       sme_obss_scan_timeout, wpa_s, NULL);
118004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt}
118104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
118204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
118304949598a23f501be6eec21697465fd46a28840aDmitry Shmidtvoid sme_sched_obss_scan(struct wpa_supplicant *wpa_s, int enable)
118404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt{
118504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	const u8 *ie;
118604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpa_bss *bss = wpa_s->current_bss;
118704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	struct wpa_ssid *ssid = wpa_s->current_ssid;
118861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	struct hostapd_hw_modes *hw_mode = NULL;
118961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	int i;
119004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
119104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	eloop_cancel_timeout(sme_obss_scan_timeout, wpa_s, NULL);
119204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_s->sme.sched_obss_scan = 0;
119304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!enable)
119404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return;
119504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
1196d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	/*
1197d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	 * Schedule OBSS scan if driver is using station SME in wpa_supplicant
1198d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	 * or it expects OBSS scan to be performed by wpa_supplicant.
1199d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	 */
1200d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (!((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) ||
1201d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	      (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OBSS_SCAN)) ||
1202d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	    ssid == NULL || ssid->mode != IEEE80211_MODE_INFRA)
1203d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt		return;
120404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
120561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	if (!wpa_s->hw.modes)
120661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		return;
120761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
120861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	/* only HT caps in 11g mode are relevant */
120961d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	for (i = 0; i < wpa_s->hw.num_modes; i++) {
121061d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		hw_mode = &wpa_s->hw.modes[i];
121161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		if (hw_mode->mode == HOSTAPD_MODE_IEEE80211G)
121261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt			break;
121361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	}
121461d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt
121561d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	/* Driver does not support HT40 for 11g or doesn't have 11g. */
121661d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	if (i == wpa_s->hw.num_modes || !hw_mode ||
121761d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	    !(hw_mode->ht_capab & HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
121861d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt		return;
121904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
122004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (bss == NULL || bss->freq < 2400 || bss->freq > 2500)
122104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return; /* Not associated on 2.4 GHz band */
122204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
122304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	/* Check whether AP supports HT40 */
122404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	ie = wpa_bss_get_ie(wpa_s->current_bss, WLAN_EID_HT_CAP);
122504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!ie || ie[1] < 2 ||
122604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	    !(WPA_GET_LE16(ie + 2) & HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET))
122704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return; /* AP does not support HT40 */
122804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
122904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	ie = wpa_bss_get_ie(wpa_s->current_bss,
123004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			    WLAN_EID_OVERLAPPING_BSS_SCAN_PARAMS);
123104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (!ie || ie[1] < 14)
123204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		return; /* AP does not request OBSS scans */
123304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt
123404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_s->sme.obss_scan_int = WPA_GET_LE16(ie + 6);
123504949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	if (wpa_s->sme.obss_scan_int < 10) {
123604949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_printf(MSG_DEBUG, "SME: Invalid OBSS Scan Interval %u "
123704949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			   "replaced with the minimum 10 sec",
123804949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			   wpa_s->sme.obss_scan_int);
123904949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		wpa_s->sme.obss_scan_int = 10;
124004949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	}
124104949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	wpa_printf(MSG_DEBUG, "SME: OBSS Scan Interval %u sec",
124204949598a23f501be6eec21697465fd46a28840aDmitry Shmidt		   wpa_s->sme.obss_scan_int);
124304949598a23f501be6eec21697465fd46a28840aDmitry Shmidt	eloop_register_timeout(wpa_s->sme.obss_scan_int, 0,
124404949598a23f501be6eec21697465fd46a28840aDmitry Shmidt			       sme_obss_scan_timeout, wpa_s, NULL);
12458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
12468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifdef CONFIG_IEEE80211W
12498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic const unsigned int sa_query_max_timeout = 1000;
12518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic const unsigned int sa_query_retry_timeout = 201;
12528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic int sme_check_sa_query_timeout(struct wpa_supplicant *wpa_s)
12548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
12558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u32 tu;
1256fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	struct os_reltime now, passed;
1257fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	os_get_reltime(&now);
1258fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt	os_reltime_sub(&now, &wpa_s->sme.sa_query_start, &passed);
12598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	tu = (passed.sec * 1000000 + passed.usec) / 1024;
12608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (sa_query_max_timeout < tu) {
12618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: SA Query timed out");
12628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		sme_stop_sa_query(wpa_s);
12638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_supplicant_deauthenticate(
12648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			wpa_s, WLAN_REASON_PREV_AUTH_NOT_VALID);
12658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return 1;
12668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
12678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	return 0;
12698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
12708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_send_sa_query_req(struct wpa_supplicant *wpa_s,
12738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				  const u8 *trans_id)
12748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
12758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 req[2 + WLAN_SA_QUERY_TR_ID_LEN];
12768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Sending SA Query Request to "
12778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		MACSTR, MAC2STR(wpa_s->bssid));
12788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_hexdump(MSG_DEBUG, "SME: SA Query Transaction ID",
12798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		    trans_id, WLAN_SA_QUERY_TR_ID_LEN);
12808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	req[0] = WLAN_ACTION_SA_QUERY;
12818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	req[1] = WLAN_SA_QUERY_REQUEST;
12828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_memcpy(req + 2, trans_id, WLAN_SA_QUERY_TR_ID_LEN);
12838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
12848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				wpa_s->own_addr, wpa_s->bssid,
12851f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidt				req, sizeof(req), 0) < 0)
12868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_msg(wpa_s, MSG_INFO, "SME: Failed to send SA Query "
12878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"Request");
12888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
12898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_sa_query_timer(void *eloop_ctx, void *timeout_ctx)
12928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
12938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_supplicant *wpa_s = eloop_ctx;
12948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	unsigned int timeout, sec, usec;
12958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	u8 *trans_id, *nbuf;
12968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
12978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.sa_query_count > 0 &&
12988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    sme_check_sa_query_timeout(wpa_s))
12998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
130161d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt	nbuf = os_realloc_array(wpa_s->sme.sa_query_trans_id,
130261d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt				wpa_s->sme.sa_query_count + 1,
130361d9df3e62aaa0e87ad05452fcb95142159a17b6Dmitry Shmidt				WLAN_SA_QUERY_TR_ID_LEN);
13048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (nbuf == NULL)
13058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.sa_query_count == 0) {
13078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		/* Starting a new SA Query procedure */
1308fb79edc9df1f20461e90e478363d207348213d35Dmitry Shmidt		os_get_reltime(&wpa_s->sme.sa_query_start);
13098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	trans_id = nbuf + wpa_s->sme.sa_query_count * WLAN_SA_QUERY_TR_ID_LEN;
13118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.sa_query_trans_id = nbuf;
13128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.sa_query_count++;
13138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN);
13158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	timeout = sa_query_retry_timeout;
13178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sec = ((timeout / 1000) * 1024) / 1000;
13188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	usec = (timeout % 1000) * 1024;
13198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_register_timeout(sec, usec, sme_sa_query_timer, wpa_s, NULL);
13208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Association SA Query attempt %d",
13228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_s->sme.sa_query_count);
13238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_send_sa_query_req(wpa_s, trans_id);
13258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
13268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void sme_start_sa_query(struct wpa_supplicant *wpa_s)
13298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
13308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_sa_query_timer(wpa_s, NULL);
13318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
13328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13341f69aa52ea2e0a73ac502565df8c666ee49cab6aDmitry Shmidtstatic void sme_stop_sa_query(struct wpa_supplicant *wpa_s)
13358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
13368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	eloop_cancel_timeout(sme_sa_query_timer, wpa_s, NULL);
13378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	os_free(wpa_s->sme.sa_query_trans_id);
13388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.sa_query_trans_id = NULL;
13398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_s->sme.sa_query_count = 0;
13408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
13418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_event_unprot_disconnect(struct wpa_supplicant *wpa_s, const u8 *sa,
13448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt				 const u8 *da, u16 reason_code)
13458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
13468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	struct wpa_ssid *ssid;
13478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->wpa_state != WPA_COMPLETED)
13498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	ssid = wpa_s->current_ssid;
1351d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	if (ssid == NULL ||
1352d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	    (ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT ?
1353d5e4923d04122f81300fa68fb07d64ede28fd44dDmitry Shmidt	     wpa_s->conf->pmf : ssid->ieee80211w) == NO_MGMT_FRAME_PROTECTION)
13548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
13568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (reason_code != WLAN_REASON_CLASS2_FRAME_FROM_NONAUTH_STA &&
13588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    reason_code != WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA)
13598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.sa_query_count > 0)
13618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Unprotected disconnect dropped - "
13648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		"possible AP/STA state mismatch - trigger SA Query");
13658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_start_sa_query(wpa_s);
13668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
13678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid sme_sa_query_rx(struct wpa_supplicant *wpa_s, const u8 *sa,
13708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		     const u8 *data, size_t len)
13718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{
13728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	int i;
13738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (wpa_s->sme.sa_query_trans_id == NULL ||
13758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    len < 1 + WLAN_SA_QUERY_TR_ID_LEN ||
13768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	    data[0] != WLAN_SA_QUERY_RESPONSE)
13778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Received SA Query response from "
13798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		MACSTR " (trans_id %02x%02x)", MAC2STR(sa), data[1], data[2]);
13808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
13828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	for (i = 0; i < wpa_s->sme.sa_query_count; i++) {
13858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		if (os_memcmp(wpa_s->sme.sa_query_trans_id +
13868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			      i * WLAN_SA_QUERY_TR_ID_LEN,
13878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			      data + 1, WLAN_SA_QUERY_TR_ID_LEN) == 0)
13888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			break;
13898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	if (i >= wpa_s->sme.sa_query_count) {
13928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		wpa_dbg(wpa_s, MSG_DEBUG, "SME: No matching SA Query "
13938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt			"transaction identifier found");
13948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		return;
13958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	}
13968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
13978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	wpa_dbg(wpa_s, MSG_DEBUG, "SME: Reply to pending SA Query received "
13988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt		"from " MACSTR, MAC2STR(sa));
13998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt	sme_stop_sa_query(wpa_s);
14008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}
14018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt
14028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* CONFIG_IEEE80211W */
1403