1/* 2 * hostapd / IEEE 802.11 Management 3 * Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi> 4 * 5 * This software may be distributed under the terms of the BSD license. 6 * See README for more details. 7 */ 8 9#include "utils/includes.h" 10 11#include "utils/common.h" 12#include "common/ieee802_11_defs.h" 13#include "hostapd.h" 14#include "sta_info.h" 15#include "ap_config.h" 16#include "ap_drv_ops.h" 17#include "ieee802_11.h" 18 19 20#ifdef CONFIG_IEEE80211W 21 22u8 * hostapd_eid_assoc_comeback_time(struct hostapd_data *hapd, 23 struct sta_info *sta, u8 *eid) 24{ 25 u8 *pos = eid; 26 u32 timeout, tu; 27 struct os_reltime now, passed; 28 29 *pos++ = WLAN_EID_TIMEOUT_INTERVAL; 30 *pos++ = 5; 31 *pos++ = WLAN_TIMEOUT_ASSOC_COMEBACK; 32 os_get_reltime(&now); 33 os_reltime_sub(&now, &sta->sa_query_start, &passed); 34 tu = (passed.sec * 1000000 + passed.usec) / 1024; 35 if (hapd->conf->assoc_sa_query_max_timeout > tu) 36 timeout = hapd->conf->assoc_sa_query_max_timeout - tu; 37 else 38 timeout = 0; 39 if (timeout < hapd->conf->assoc_sa_query_max_timeout) 40 timeout++; /* add some extra time for local timers */ 41 WPA_PUT_LE32(pos, timeout); 42 pos += 4; 43 44 return pos; 45} 46 47 48/* MLME-SAQuery.request */ 49void ieee802_11_send_sa_query_req(struct hostapd_data *hapd, 50 const u8 *addr, const u8 *trans_id) 51{ 52 struct ieee80211_mgmt mgmt; 53 u8 *end; 54 55 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Request to " 56 MACSTR, MAC2STR(addr)); 57 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 58 trans_id, WLAN_SA_QUERY_TR_ID_LEN); 59 60 os_memset(&mgmt, 0, sizeof(mgmt)); 61 mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 62 WLAN_FC_STYPE_ACTION); 63 os_memcpy(mgmt.da, addr, ETH_ALEN); 64 os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN); 65 os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN); 66 mgmt.u.action.category = WLAN_ACTION_SA_QUERY; 67 mgmt.u.action.u.sa_query_req.action = WLAN_SA_QUERY_REQUEST; 68 os_memcpy(mgmt.u.action.u.sa_query_req.trans_id, trans_id, 69 WLAN_SA_QUERY_TR_ID_LEN); 70 end = mgmt.u.action.u.sa_query_req.trans_id + WLAN_SA_QUERY_TR_ID_LEN; 71 if (hostapd_drv_send_mlme(hapd, &mgmt, end - (u8 *) &mgmt, 0) < 0) 72 wpa_printf(MSG_INFO, "ieee802_11_send_sa_query_req: send failed"); 73} 74 75 76static void ieee802_11_send_sa_query_resp(struct hostapd_data *hapd, 77 const u8 *sa, const u8 *trans_id) 78{ 79 struct sta_info *sta; 80 struct ieee80211_mgmt resp; 81 u8 *end; 82 83 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Request from " 84 MACSTR, MAC2STR(sa)); 85 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 86 trans_id, WLAN_SA_QUERY_TR_ID_LEN); 87 88 sta = ap_get_sta(hapd, sa); 89 if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC)) { 90 wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignore SA Query Request " 91 "from unassociated STA " MACSTR, MAC2STR(sa)); 92 return; 93 } 94 95 wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Response to " 96 MACSTR, MAC2STR(sa)); 97 98 os_memset(&resp, 0, sizeof(resp)); 99 resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT, 100 WLAN_FC_STYPE_ACTION); 101 os_memcpy(resp.da, sa, ETH_ALEN); 102 os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN); 103 os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN); 104 resp.u.action.category = WLAN_ACTION_SA_QUERY; 105 resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE; 106 os_memcpy(resp.u.action.u.sa_query_req.trans_id, trans_id, 107 WLAN_SA_QUERY_TR_ID_LEN); 108 end = resp.u.action.u.sa_query_req.trans_id + WLAN_SA_QUERY_TR_ID_LEN; 109 if (hostapd_drv_send_mlme(hapd, &resp, end - (u8 *) &resp, 0) < 0) 110 wpa_printf(MSG_INFO, "ieee80211_mgmt_sa_query_request: send failed"); 111} 112 113 114void ieee802_11_sa_query_action(struct hostapd_data *hapd, const u8 *sa, 115 const u8 action_type, const u8 *trans_id) 116{ 117 struct sta_info *sta; 118 int i; 119 120 if (action_type == WLAN_SA_QUERY_REQUEST) { 121 ieee802_11_send_sa_query_resp(hapd, sa, trans_id); 122 return; 123 } 124 125 if (action_type != WLAN_SA_QUERY_RESPONSE) { 126 wpa_printf(MSG_DEBUG, "IEEE 802.11: Unexpected SA Query " 127 "Action %d", action_type); 128 return; 129 } 130 131 wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Response from " 132 MACSTR, MAC2STR(sa)); 133 wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID", 134 trans_id, WLAN_SA_QUERY_TR_ID_LEN); 135 136 /* MLME-SAQuery.confirm */ 137 138 sta = ap_get_sta(hapd, sa); 139 if (sta == NULL || sta->sa_query_trans_id == NULL) { 140 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching STA with " 141 "pending SA Query request found"); 142 return; 143 } 144 145 for (i = 0; i < sta->sa_query_count; i++) { 146 if (os_memcmp(sta->sa_query_trans_id + 147 i * WLAN_SA_QUERY_TR_ID_LEN, 148 trans_id, WLAN_SA_QUERY_TR_ID_LEN) == 0) 149 break; 150 } 151 152 if (i >= sta->sa_query_count) { 153 wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching SA Query " 154 "transaction identifier found"); 155 return; 156 } 157 158 hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211, 159 HOSTAPD_LEVEL_DEBUG, 160 "Reply to pending SA Query received"); 161 ap_sta_stop_sa_query(hapd, sta); 162} 163 164#endif /* CONFIG_IEEE80211W */ 165 166 167static void hostapd_ext_capab_byte(struct hostapd_data *hapd, u8 *pos, int idx) 168{ 169 *pos = 0x00; 170 171 switch (idx) { 172 case 0: /* Bits 0-7 */ 173 if (hapd->iconf->obss_interval) 174 *pos |= 0x01; /* Bit 0 - Coexistence management */ 175 if (hapd->iface->drv_flags & WPA_DRIVER_FLAGS_AP_CSA) 176 *pos |= 0x04; /* Bit 2 - Extended Channel Switching */ 177 break; 178 case 1: /* Bits 8-15 */ 179 if (hapd->conf->proxy_arp) 180 *pos |= 0x10; /* Bit 12 - Proxy ARP */ 181 break; 182 case 2: /* Bits 16-23 */ 183 if (hapd->conf->wnm_sleep_mode) 184 *pos |= 0x02; /* Bit 17 - WNM-Sleep Mode */ 185 if (hapd->conf->bss_transition) 186 *pos |= 0x08; /* Bit 19 - BSS Transition */ 187 break; 188 case 3: /* Bits 24-31 */ 189#ifdef CONFIG_WNM 190 *pos |= 0x02; /* Bit 25 - SSID List */ 191#endif /* CONFIG_WNM */ 192 if (hapd->conf->time_advertisement == 2) 193 *pos |= 0x08; /* Bit 27 - UTC TSF Offset */ 194 if (hapd->conf->interworking) 195 *pos |= 0x80; /* Bit 31 - Interworking */ 196 break; 197 case 4: /* Bits 32-39 */ 198 if (hapd->conf->qos_map_set_len) 199 *pos |= 0x01; /* Bit 32 - QoS Map */ 200 if (hapd->conf->tdls & TDLS_PROHIBIT) 201 *pos |= 0x40; /* Bit 38 - TDLS Prohibited */ 202 if (hapd->conf->tdls & TDLS_PROHIBIT_CHAN_SWITCH) { 203 /* Bit 39 - TDLS Channel Switching Prohibited */ 204 *pos |= 0x80; 205 } 206 break; 207 case 5: /* Bits 40-47 */ 208#ifdef CONFIG_HS20 209 if (hapd->conf->hs20) 210 *pos |= 0x40; /* Bit 46 - WNM-Notification */ 211#endif /* CONFIG_HS20 */ 212#ifdef CONFIG_MBO 213 if (hapd->conf->mbo_enabled) 214 *pos |= 0x40; /* Bit 46 - WNM-Notification */ 215#endif /* CONFIG_MBO */ 216 break; 217 case 6: /* Bits 48-55 */ 218 if (hapd->conf->ssid.utf8_ssid) 219 *pos |= 0x01; /* Bit 48 - UTF-8 SSID */ 220 break; 221 case 7: /* Bits 56-63 */ 222 break; 223 case 8: /* Bits 64-71 */ 224 if (hapd->conf->ftm_responder) 225 *pos |= 0x40; /* Bit 70 - FTM responder */ 226 if (hapd->conf->ftm_initiator) 227 *pos |= 0x80; /* Bit 71 - FTM initiator */ 228 case 9: /* Bits 72-79 */ 229#ifdef CONFIG_FILS 230 if ((hapd->conf->wpa & WPA_PROTO_RSN) && 231 wpa_key_mgmt_fils(hapd->conf->wpa_key_mgmt)) 232 *pos |= 0x01; 233#endif /* CONFIG_FILS */ 234 break; 235 } 236} 237 238 239u8 * hostapd_eid_ext_capab(struct hostapd_data *hapd, u8 *eid) 240{ 241 u8 *pos = eid; 242 u8 len = 0, i; 243 244 if (hapd->conf->tdls & (TDLS_PROHIBIT | TDLS_PROHIBIT_CHAN_SWITCH)) 245 len = 5; 246 if (len < 4 && hapd->conf->interworking) 247 len = 4; 248 if (len < 3 && hapd->conf->wnm_sleep_mode) 249 len = 3; 250 if (len < 1 && hapd->iconf->obss_interval) 251 len = 1; 252 if (len < 7 && hapd->conf->ssid.utf8_ssid) 253 len = 7; 254 if (len < 9 && 255 (hapd->conf->ftm_initiator || hapd->conf->ftm_responder)) 256 len = 9; 257#ifdef CONFIG_WNM 258 if (len < 4) 259 len = 4; 260#endif /* CONFIG_WNM */ 261#ifdef CONFIG_HS20 262 if (hapd->conf->hs20 && len < 6) 263 len = 6; 264#endif /* CONFIG_HS20 */ 265#ifdef CONFIG_MBO 266 if (hapd->conf->mbo_enabled && len < 6) 267 len = 6; 268#endif /* CONFIG_MBO */ 269#ifdef CONFIG_FILS 270 if ((!(hapd->conf->wpa & WPA_PROTO_RSN) || 271 !wpa_key_mgmt_fils(hapd->conf->wpa_key_mgmt)) && len < 10) 272 len = 10; 273#endif /* CONFIG_FILS */ 274 if (len < hapd->iface->extended_capa_len) 275 len = hapd->iface->extended_capa_len; 276 if (len == 0) 277 return eid; 278 279 *pos++ = WLAN_EID_EXT_CAPAB; 280 *pos++ = len; 281 for (i = 0; i < len; i++, pos++) { 282 hostapd_ext_capab_byte(hapd, pos, i); 283 284 if (i < hapd->iface->extended_capa_len) { 285 *pos &= ~hapd->iface->extended_capa_mask[i]; 286 *pos |= hapd->iface->extended_capa[i]; 287 } 288 } 289 290 while (len > 0 && eid[1 + len] == 0) { 291 len--; 292 eid[1] = len; 293 } 294 if (len == 0) 295 return eid; 296 297 return eid + 2 + len; 298} 299 300 301u8 * hostapd_eid_qos_map_set(struct hostapd_data *hapd, u8 *eid) 302{ 303 u8 *pos = eid; 304 u8 len = hapd->conf->qos_map_set_len; 305 306 if (!len) 307 return eid; 308 309 *pos++ = WLAN_EID_QOS_MAP_SET; 310 *pos++ = len; 311 os_memcpy(pos, hapd->conf->qos_map_set, len); 312 pos += len; 313 314 return pos; 315} 316 317 318u8 * hostapd_eid_interworking(struct hostapd_data *hapd, u8 *eid) 319{ 320 u8 *pos = eid; 321#ifdef CONFIG_INTERWORKING 322 u8 *len; 323 324 if (!hapd->conf->interworking) 325 return eid; 326 327 *pos++ = WLAN_EID_INTERWORKING; 328 len = pos++; 329 330 *pos = hapd->conf->access_network_type; 331 if (hapd->conf->internet) 332 *pos |= INTERWORKING_ANO_INTERNET; 333 if (hapd->conf->asra) 334 *pos |= INTERWORKING_ANO_ASRA; 335 if (hapd->conf->esr) 336 *pos |= INTERWORKING_ANO_ESR; 337 if (hapd->conf->uesa) 338 *pos |= INTERWORKING_ANO_UESA; 339 pos++; 340 341 if (hapd->conf->venue_info_set) { 342 *pos++ = hapd->conf->venue_group; 343 *pos++ = hapd->conf->venue_type; 344 } 345 346 if (!is_zero_ether_addr(hapd->conf->hessid)) { 347 os_memcpy(pos, hapd->conf->hessid, ETH_ALEN); 348 pos += ETH_ALEN; 349 } 350 351 *len = pos - len - 1; 352#endif /* CONFIG_INTERWORKING */ 353 354 return pos; 355} 356 357 358u8 * hostapd_eid_adv_proto(struct hostapd_data *hapd, u8 *eid) 359{ 360 u8 *pos = eid; 361#ifdef CONFIG_INTERWORKING 362 363 /* TODO: Separate configuration for ANQP? */ 364 if (!hapd->conf->interworking) 365 return eid; 366 367 *pos++ = WLAN_EID_ADV_PROTO; 368 *pos++ = 2; 369 *pos++ = 0x7F; /* Query Response Length Limit | PAME-BI */ 370 *pos++ = ACCESS_NETWORK_QUERY_PROTOCOL; 371#endif /* CONFIG_INTERWORKING */ 372 373 return pos; 374} 375 376 377u8 * hostapd_eid_roaming_consortium(struct hostapd_data *hapd, u8 *eid) 378{ 379 u8 *pos = eid; 380#ifdef CONFIG_INTERWORKING 381 u8 *len; 382 unsigned int i, count; 383 384 if (!hapd->conf->interworking || 385 hapd->conf->roaming_consortium == NULL || 386 hapd->conf->roaming_consortium_count == 0) 387 return eid; 388 389 *pos++ = WLAN_EID_ROAMING_CONSORTIUM; 390 len = pos++; 391 392 /* Number of ANQP OIs (in addition to the max 3 listed here) */ 393 if (hapd->conf->roaming_consortium_count > 3 + 255) 394 *pos++ = 255; 395 else if (hapd->conf->roaming_consortium_count > 3) 396 *pos++ = hapd->conf->roaming_consortium_count - 3; 397 else 398 *pos++ = 0; 399 400 /* OU #1 and #2 Lengths */ 401 *pos = hapd->conf->roaming_consortium[0].len; 402 if (hapd->conf->roaming_consortium_count > 1) 403 *pos |= hapd->conf->roaming_consortium[1].len << 4; 404 pos++; 405 406 if (hapd->conf->roaming_consortium_count > 3) 407 count = 3; 408 else 409 count = hapd->conf->roaming_consortium_count; 410 411 for (i = 0; i < count; i++) { 412 os_memcpy(pos, hapd->conf->roaming_consortium[i].oi, 413 hapd->conf->roaming_consortium[i].len); 414 pos += hapd->conf->roaming_consortium[i].len; 415 } 416 417 *len = pos - len - 1; 418#endif /* CONFIG_INTERWORKING */ 419 420 return pos; 421} 422 423 424u8 * hostapd_eid_time_adv(struct hostapd_data *hapd, u8 *eid) 425{ 426 if (hapd->conf->time_advertisement != 2) 427 return eid; 428 429 if (hapd->time_adv == NULL && 430 hostapd_update_time_adv(hapd) < 0) 431 return eid; 432 433 if (hapd->time_adv == NULL) 434 return eid; 435 436 os_memcpy(eid, wpabuf_head(hapd->time_adv), 437 wpabuf_len(hapd->time_adv)); 438 eid += wpabuf_len(hapd->time_adv); 439 440 return eid; 441} 442 443 444u8 * hostapd_eid_time_zone(struct hostapd_data *hapd, u8 *eid) 445{ 446 size_t len; 447 448 if (hapd->conf->time_advertisement != 2) 449 return eid; 450 451 len = os_strlen(hapd->conf->time_zone); 452 453 *eid++ = WLAN_EID_TIME_ZONE; 454 *eid++ = len; 455 os_memcpy(eid, hapd->conf->time_zone, len); 456 eid += len; 457 458 return eid; 459} 460 461 462int hostapd_update_time_adv(struct hostapd_data *hapd) 463{ 464 const int elen = 2 + 1 + 10 + 5 + 1; 465 struct os_time t; 466 struct os_tm tm; 467 u8 *pos; 468 469 if (hapd->conf->time_advertisement != 2) 470 return 0; 471 472 if (os_get_time(&t) < 0 || os_gmtime(t.sec, &tm) < 0) 473 return -1; 474 475 if (!hapd->time_adv) { 476 hapd->time_adv = wpabuf_alloc(elen); 477 if (hapd->time_adv == NULL) 478 return -1; 479 pos = wpabuf_put(hapd->time_adv, elen); 480 } else 481 pos = wpabuf_mhead_u8(hapd->time_adv); 482 483 *pos++ = WLAN_EID_TIME_ADVERTISEMENT; 484 *pos++ = 1 + 10 + 5 + 1; 485 486 *pos++ = 2; /* UTC time at which the TSF timer is 0 */ 487 488 /* Time Value at TSF 0 */ 489 /* FIX: need to calculate this based on the current TSF value */ 490 WPA_PUT_LE16(pos, tm.year); /* Year */ 491 pos += 2; 492 *pos++ = tm.month; /* Month */ 493 *pos++ = tm.day; /* Day of month */ 494 *pos++ = tm.hour; /* Hours */ 495 *pos++ = tm.min; /* Minutes */ 496 *pos++ = tm.sec; /* Seconds */ 497 WPA_PUT_LE16(pos, 0); /* Milliseconds (not used) */ 498 pos += 2; 499 *pos++ = 0; /* Reserved */ 500 501 /* Time Error */ 502 /* TODO: fill in an estimate on the error */ 503 *pos++ = 0; 504 *pos++ = 0; 505 *pos++ = 0; 506 *pos++ = 0; 507 *pos++ = 0; 508 509 *pos++ = hapd->time_update_counter++; 510 511 return 0; 512} 513 514 515u8 * hostapd_eid_bss_max_idle_period(struct hostapd_data *hapd, u8 *eid) 516{ 517 u8 *pos = eid; 518 519#ifdef CONFIG_WNM 520 if (hapd->conf->ap_max_inactivity > 0) { 521 unsigned int val; 522 *pos++ = WLAN_EID_BSS_MAX_IDLE_PERIOD; 523 *pos++ = 3; 524 val = hapd->conf->ap_max_inactivity; 525 if (val > 68000) 526 val = 68000; 527 val *= 1000; 528 val /= 1024; 529 if (val == 0) 530 val = 1; 531 if (val > 65535) 532 val = 65535; 533 WPA_PUT_LE16(pos, val); 534 pos += 2; 535 *pos++ = 0x00; /* TODO: Protected Keep-Alive Required */ 536 } 537#endif /* CONFIG_WNM */ 538 539 return pos; 540} 541 542 543#ifdef CONFIG_MBO 544 545u8 * hostapd_eid_mbo(struct hostapd_data *hapd, u8 *eid, size_t len) 546{ 547 u8 mbo[6], *mbo_pos = mbo; 548 u8 *pos = eid; 549 550 if (!hapd->conf->mbo_enabled) 551 return eid; 552 553 *mbo_pos++ = MBO_ATTR_ID_AP_CAPA_IND; 554 *mbo_pos++ = 1; 555 /* Not Cellular aware */ 556 *mbo_pos++ = 0; 557 558 if (hapd->mbo_assoc_disallow) { 559 *mbo_pos++ = MBO_ATTR_ID_ASSOC_DISALLOW; 560 *mbo_pos++ = 1; 561 *mbo_pos++ = hapd->mbo_assoc_disallow; 562 } 563 564 pos += mbo_add_ie(pos, len, mbo, mbo_pos - mbo); 565 566 return pos; 567} 568 569 570u8 hostapd_mbo_ie_len(struct hostapd_data *hapd) 571{ 572 if (!hapd->conf->mbo_enabled) 573 return 0; 574 575 /* 576 * MBO IE header (6) + Capability Indication attribute (3) + 577 * Association Disallowed attribute (3) = 12 578 */ 579 return 6 + 3 + (hapd->mbo_assoc_disallow ? 3 : 0); 580} 581 582#endif /* CONFIG_MBO */ 583 584 585void ap_copy_sta_supp_op_classes(struct sta_info *sta, 586 const u8 *supp_op_classes, 587 size_t supp_op_classes_len) 588{ 589 if (!supp_op_classes) 590 return; 591 os_free(sta->supp_op_classes); 592 sta->supp_op_classes = os_malloc(1 + supp_op_classes_len); 593 if (!sta->supp_op_classes) 594 return; 595 596 sta->supp_op_classes[0] = supp_op_classes_len; 597 os_memcpy(sta->supp_op_classes + 1, supp_op_classes, 598 supp_op_classes_len); 599} 600 601 602u8 * hostapd_eid_fils_indic(struct hostapd_data *hapd, u8 *eid, int hessid) 603{ 604 u8 *pos = eid; 605#ifdef CONFIG_FILS 606 u8 *len; 607 u16 fils_info = 0; 608 size_t realms; 609 struct fils_realm *realm; 610 611 if (!(hapd->conf->wpa & WPA_PROTO_RSN) || 612 !wpa_key_mgmt_fils(hapd->conf->wpa_key_mgmt)) 613 return pos; 614 615 realms = dl_list_len(&hapd->conf->fils_realms); 616 if (realms > 7) 617 realms = 7; /* 3 bit count field limits this to max 7 */ 618 619 *pos++ = WLAN_EID_FILS_INDICATION; 620 len = pos++; 621 /* TODO: B0..B2: Number of Public Key Identifiers */ 622 if (hapd->conf->erp_domain) { 623 /* B3..B5: Number of Realm Identifiers */ 624 fils_info |= realms << 3; 625 } 626 /* TODO: B6: FILS IP Address Configuration */ 627 if (hapd->conf->fils_cache_id_set) 628 fils_info |= BIT(7); 629 if (hessid && !is_zero_ether_addr(hapd->conf->hessid)) 630 fils_info |= BIT(8); /* HESSID Included */ 631 /* FILS Shared Key Authentication without PFS Supported */ 632 fils_info |= BIT(9); 633 /* TODO: B10: FILS Shared Key Authentication with PFS Supported */ 634 /* TODO: B11: FILS Public Key Authentication Supported */ 635 /* B12..B15: Reserved */ 636 WPA_PUT_LE16(pos, fils_info); 637 pos += 2; 638 if (hapd->conf->fils_cache_id_set) { 639 os_memcpy(pos, hapd->conf->fils_cache_id, FILS_CACHE_ID_LEN); 640 pos += FILS_CACHE_ID_LEN; 641 } 642 if (hessid && !is_zero_ether_addr(hapd->conf->hessid)) { 643 os_memcpy(pos, hapd->conf->hessid, ETH_ALEN); 644 pos += ETH_ALEN; 645 } 646 647 dl_list_for_each(realm, &hapd->conf->fils_realms, struct fils_realm, 648 list) { 649 if (realms == 0) 650 break; 651 realms--; 652 os_memcpy(pos, realm->hash, 2); 653 pos += 2; 654 } 655 *len = pos - len - 1; 656#endif /* CONFIG_FILS */ 657 658 return pos; 659} 660