1 /*
2  * WPA Supplicant
3  * Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  *
8  * This file implements functions for registering and unregistering
9  * %wpa_supplicant interfaces. In addition, this file contains number of
10  * functions for managing network connections.
11  */
12 
13 #include "includes.h"
14 #ifdef CONFIG_MATCH_IFACE
15 #include <net/if.h>
16 #include <fnmatch.h>
17 #endif /* CONFIG_MATCH_IFACE */
18 
19 #include "common.h"
20 #include "crypto/random.h"
21 #include "crypto/sha1.h"
22 #include "eapol_supp/eapol_supp_sm.h"
23 #include "eap_peer/eap.h"
24 #include "eap_peer/eap_proxy.h"
25 #include "eap_server/eap_methods.h"
26 #include "rsn_supp/wpa.h"
27 #include "eloop.h"
28 #include "config.h"
29 #include "utils/ext_password.h"
30 #include "l2_packet/l2_packet.h"
31 #include "wpa_supplicant_i.h"
32 #include "driver_i.h"
33 #include "ctrl_iface.h"
34 #include "pcsc_funcs.h"
35 #include "common/version.h"
36 #include "rsn_supp/preauth.h"
37 #include "rsn_supp/pmksa_cache.h"
38 #include "common/wpa_ctrl.h"
39 #include "common/ieee802_11_common.h"
40 #include "common/ieee802_11_defs.h"
41 #include "common/hw_features_common.h"
42 #include "common/gas_server.h"
43 #include "common/dpp.h"
44 #include "p2p/p2p.h"
45 #include "fst/fst.h"
46 #include "blacklist.h"
47 #include "wpas_glue.h"
48 #include "wps_supplicant.h"
49 #include "ibss_rsn.h"
50 #include "sme.h"
51 #include "gas_query.h"
52 #include "ap.h"
53 #include "p2p_supplicant.h"
54 #include "wifi_display.h"
55 #include "notify.h"
56 #include "bgscan.h"
57 #include "autoscan.h"
58 #include "bss.h"
59 #include "scan.h"
60 #include "offchannel.h"
61 #include "hs20_supplicant.h"
62 #include "wnm_sta.h"
63 #include "wpas_kay.h"
64 #include "mesh.h"
65 #include "dpp_supplicant.h"
66 #ifdef CONFIG_MESH
67 #include "ap/ap_config.h"
68 #include "ap/hostapd.h"
69 #endif /* CONFIG_MESH */
70 
71 const char *const wpa_supplicant_version =
72 "wpa_supplicant v" VERSION_STR "\n"
73 "Copyright (c) 2003-2019, Jouni Malinen <j@w1.fi> and contributors";
74 
75 const char *const wpa_supplicant_license =
76 "This software may be distributed under the terms of the BSD license.\n"
77 "See README for more details.\n"
78 #ifdef EAP_TLS_OPENSSL
79 "\nThis product includes software developed by the OpenSSL Project\n"
80 "for use in the OpenSSL Toolkit (http://www.openssl.org/)\n"
81 #endif /* EAP_TLS_OPENSSL */
82 ;
83 
84 #ifndef CONFIG_NO_STDOUT_DEBUG
85 /* Long text divided into parts in order to fit in C89 strings size limits. */
86 const char *const wpa_supplicant_full_license1 =
87 "";
88 const char *const wpa_supplicant_full_license2 =
89 "This software may be distributed under the terms of the BSD license.\n"
90 "\n"
91 "Redistribution and use in source and binary forms, with or without\n"
92 "modification, are permitted provided that the following conditions are\n"
93 "met:\n"
94 "\n";
95 const char *const wpa_supplicant_full_license3 =
96 "1. Redistributions of source code must retain the above copyright\n"
97 "   notice, this list of conditions and the following disclaimer.\n"
98 "\n"
99 "2. Redistributions in binary form must reproduce the above copyright\n"
100 "   notice, this list of conditions and the following disclaimer in the\n"
101 "   documentation and/or other materials provided with the distribution.\n"
102 "\n";
103 const char *const wpa_supplicant_full_license4 =
104 "3. Neither the name(s) of the above-listed copyright holder(s) nor the\n"
105 "   names of its contributors may be used to endorse or promote products\n"
106 "   derived from this software without specific prior written permission.\n"
107 "\n"
108 "THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n"
109 "\"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n"
110 "LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\n"
111 "A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\n";
112 const char *const wpa_supplicant_full_license5 =
113 "OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n"
114 "SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\n"
115 "LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\n"
116 "DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\n"
117 "THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n"
118 "(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\n"
119 "OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n"
120 "\n";
121 #endif /* CONFIG_NO_STDOUT_DEBUG */
122 
123 
124 static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx);
125 #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
126 static void wpas_update_fils_connect_params(struct wpa_supplicant *wpa_s);
127 #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
128 
129 
130 /* Configure default/group WEP keys for static WEP */
wpa_set_wep_keys(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)131 int wpa_set_wep_keys(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
132 {
133 	int i, set = 0;
134 
135 	for (i = 0; i < NUM_WEP_KEYS; i++) {
136 		if (ssid->wep_key_len[i] == 0)
137 			continue;
138 
139 		set = 1;
140 		wpa_drv_set_key(wpa_s, WPA_ALG_WEP, NULL,
141 				i, i == ssid->wep_tx_keyidx, NULL, 0,
142 				ssid->wep_key[i], ssid->wep_key_len[i]);
143 	}
144 
145 	return set;
146 }
147 
148 
wpa_supplicant_set_wpa_none_key(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)149 int wpa_supplicant_set_wpa_none_key(struct wpa_supplicant *wpa_s,
150 				    struct wpa_ssid *ssid)
151 {
152 	u8 key[32];
153 	size_t keylen;
154 	enum wpa_alg alg;
155 	u8 seq[6] = { 0 };
156 	int ret;
157 
158 	/* IBSS/WPA-None uses only one key (Group) for both receiving and
159 	 * sending unicast and multicast packets. */
160 
161 	if (ssid->mode != WPAS_MODE_IBSS) {
162 		wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid mode %d (not "
163 			"IBSS/ad-hoc) for WPA-None", ssid->mode);
164 		return -1;
165 	}
166 
167 	if (!ssid->psk_set) {
168 		wpa_msg(wpa_s, MSG_INFO, "WPA: No PSK configured for "
169 			"WPA-None");
170 		return -1;
171 	}
172 
173 	switch (wpa_s->group_cipher) {
174 	case WPA_CIPHER_CCMP:
175 		os_memcpy(key, ssid->psk, 16);
176 		keylen = 16;
177 		alg = WPA_ALG_CCMP;
178 		break;
179 	case WPA_CIPHER_GCMP:
180 		os_memcpy(key, ssid->psk, 16);
181 		keylen = 16;
182 		alg = WPA_ALG_GCMP;
183 		break;
184 	case WPA_CIPHER_TKIP:
185 		/* WPA-None uses the same Michael MIC key for both TX and RX */
186 		os_memcpy(key, ssid->psk, 16 + 8);
187 		os_memcpy(key + 16 + 8, ssid->psk + 16, 8);
188 		keylen = 32;
189 		alg = WPA_ALG_TKIP;
190 		break;
191 	default:
192 		wpa_msg(wpa_s, MSG_INFO, "WPA: Invalid group cipher %d for "
193 			"WPA-None", wpa_s->group_cipher);
194 		return -1;
195 	}
196 
197 	/* TODO: should actually remember the previously used seq#, both for TX
198 	 * and RX from each STA.. */
199 
200 	ret = wpa_drv_set_key(wpa_s, alg, NULL, 0, 1, seq, 6, key, keylen);
201 	os_memset(key, 0, sizeof(key));
202 	return ret;
203 }
204 
205 
wpa_supplicant_timeout(void * eloop_ctx,void * timeout_ctx)206 static void wpa_supplicant_timeout(void *eloop_ctx, void *timeout_ctx)
207 {
208 	struct wpa_supplicant *wpa_s = eloop_ctx;
209 	const u8 *bssid = wpa_s->bssid;
210 	if (!is_zero_ether_addr(wpa_s->pending_bssid) &&
211 	    (wpa_s->wpa_state == WPA_AUTHENTICATING ||
212 	     wpa_s->wpa_state == WPA_ASSOCIATING))
213 		bssid = wpa_s->pending_bssid;
214 	wpa_msg(wpa_s, MSG_INFO, "Authentication with " MACSTR " timed out.",
215 		MAC2STR(bssid));
216 	wpa_blacklist_add(wpa_s, bssid);
217 	wpa_sm_notify_disassoc(wpa_s->wpa);
218 	wpa_supplicant_deauthenticate(wpa_s, WLAN_REASON_DEAUTH_LEAVING);
219 	wpa_s->reassociate = 1;
220 
221 	/*
222 	 * If we timed out, the AP or the local radio may be busy.
223 	 * So, wait a second until scanning again.
224 	 */
225 	wpa_supplicant_req_scan(wpa_s, 1, 0);
226 }
227 
228 
229 /**
230  * wpa_supplicant_req_auth_timeout - Schedule a timeout for authentication
231  * @wpa_s: Pointer to wpa_supplicant data
232  * @sec: Number of seconds after which to time out authentication
233  * @usec: Number of microseconds after which to time out authentication
234  *
235  * This function is used to schedule a timeout for the current authentication
236  * attempt.
237  */
wpa_supplicant_req_auth_timeout(struct wpa_supplicant * wpa_s,int sec,int usec)238 void wpa_supplicant_req_auth_timeout(struct wpa_supplicant *wpa_s,
239 				     int sec, int usec)
240 {
241 	if (wpa_s->conf->ap_scan == 0 &&
242 	    (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED))
243 		return;
244 
245 	wpa_dbg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec "
246 		"%d usec", sec, usec);
247 	eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
248 	wpa_s->last_auth_timeout_sec = sec;
249 	eloop_register_timeout(sec, usec, wpa_supplicant_timeout, wpa_s, NULL);
250 }
251 
252 
253 /*
254  * wpas_auth_timeout_restart - Restart and change timeout for authentication
255  * @wpa_s: Pointer to wpa_supplicant data
256  * @sec_diff: difference in seconds applied to original timeout value
257  */
wpas_auth_timeout_restart(struct wpa_supplicant * wpa_s,int sec_diff)258 void wpas_auth_timeout_restart(struct wpa_supplicant *wpa_s, int sec_diff)
259 {
260 	int new_sec = wpa_s->last_auth_timeout_sec + sec_diff;
261 
262 	if (eloop_is_timeout_registered(wpa_supplicant_timeout, wpa_s, NULL)) {
263 		wpa_dbg(wpa_s, MSG_DEBUG,
264 			"Authentication timeout restart: %d sec", new_sec);
265 		eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
266 		eloop_register_timeout(new_sec, 0, wpa_supplicant_timeout,
267 				       wpa_s, NULL);
268 	}
269 }
270 
271 
272 /**
273  * wpa_supplicant_cancel_auth_timeout - Cancel authentication timeout
274  * @wpa_s: Pointer to wpa_supplicant data
275  *
276  * This function is used to cancel authentication timeout scheduled with
277  * wpa_supplicant_req_auth_timeout() and it is called when authentication has
278  * been completed.
279  */
wpa_supplicant_cancel_auth_timeout(struct wpa_supplicant * wpa_s)280 void wpa_supplicant_cancel_auth_timeout(struct wpa_supplicant *wpa_s)
281 {
282 	wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling authentication timeout");
283 	eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
284 	wpa_blacklist_del(wpa_s, wpa_s->bssid);
285 	os_free(wpa_s->last_con_fail_realm);
286 	wpa_s->last_con_fail_realm = NULL;
287 	wpa_s->last_con_fail_realm_len = 0;
288 }
289 
290 
291 /**
292  * wpa_supplicant_initiate_eapol - Configure EAPOL state machine
293  * @wpa_s: Pointer to wpa_supplicant data
294  *
295  * This function is used to configure EAPOL state machine based on the selected
296  * authentication mode.
297  */
wpa_supplicant_initiate_eapol(struct wpa_supplicant * wpa_s)298 void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s)
299 {
300 #ifdef IEEE8021X_EAPOL
301 	struct eapol_config eapol_conf;
302 	struct wpa_ssid *ssid = wpa_s->current_ssid;
303 
304 #ifdef CONFIG_IBSS_RSN
305 	if (ssid->mode == WPAS_MODE_IBSS &&
306 	    wpa_s->key_mgmt != WPA_KEY_MGMT_NONE &&
307 	    wpa_s->key_mgmt != WPA_KEY_MGMT_WPA_NONE) {
308 		/*
309 		 * RSN IBSS authentication is per-STA and we can disable the
310 		 * per-BSSID EAPOL authentication.
311 		 */
312 		eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
313 		eapol_sm_notify_eap_success(wpa_s->eapol, TRUE);
314 		eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
315 		return;
316 	}
317 #endif /* CONFIG_IBSS_RSN */
318 
319 	eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
320 	eapol_sm_notify_eap_fail(wpa_s->eapol, FALSE);
321 
322 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
323 	    wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE)
324 		eapol_sm_notify_portControl(wpa_s->eapol, ForceAuthorized);
325 	else
326 		eapol_sm_notify_portControl(wpa_s->eapol, Auto);
327 
328 	os_memset(&eapol_conf, 0, sizeof(eapol_conf));
329 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
330 		eapol_conf.accept_802_1x_keys = 1;
331 		eapol_conf.required_keys = 0;
332 		if (ssid->eapol_flags & EAPOL_FLAG_REQUIRE_KEY_UNICAST) {
333 			eapol_conf.required_keys |= EAPOL_REQUIRE_KEY_UNICAST;
334 		}
335 		if (ssid->eapol_flags & EAPOL_FLAG_REQUIRE_KEY_BROADCAST) {
336 			eapol_conf.required_keys |=
337 				EAPOL_REQUIRE_KEY_BROADCAST;
338 		}
339 
340 		if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED)
341 			eapol_conf.required_keys = 0;
342 	}
343 	eapol_conf.fast_reauth = wpa_s->conf->fast_reauth;
344 	eapol_conf.workaround = ssid->eap_workaround;
345 	eapol_conf.eap_disabled =
346 		!wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) &&
347 		wpa_s->key_mgmt != WPA_KEY_MGMT_IEEE8021X_NO_WPA &&
348 		wpa_s->key_mgmt != WPA_KEY_MGMT_WPS;
349 	eapol_conf.external_sim = wpa_s->conf->external_sim;
350 
351 #ifdef CONFIG_WPS
352 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
353 		eapol_conf.wps |= EAPOL_LOCAL_WPS_IN_USE;
354 		if (wpa_s->current_bss) {
355 			struct wpabuf *ie;
356 			ie = wpa_bss_get_vendor_ie_multi(wpa_s->current_bss,
357 							 WPS_IE_VENDOR_TYPE);
358 			if (ie) {
359 				if (wps_is_20(ie))
360 					eapol_conf.wps |=
361 						EAPOL_PEER_IS_WPS20_AP;
362 				wpabuf_free(ie);
363 			}
364 		}
365 	}
366 #endif /* CONFIG_WPS */
367 
368 	eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf);
369 
370 #ifdef CONFIG_MACSEC
371 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE && ssid->mka_psk_set)
372 		ieee802_1x_create_preshared_mka(wpa_s, ssid);
373 	else
374 		ieee802_1x_alloc_kay_sm(wpa_s, ssid);
375 #endif /* CONFIG_MACSEC */
376 #endif /* IEEE8021X_EAPOL */
377 }
378 
379 
380 /**
381  * wpa_supplicant_set_non_wpa_policy - Set WPA parameters to non-WPA mode
382  * @wpa_s: Pointer to wpa_supplicant data
383  * @ssid: Configuration data for the network
384  *
385  * This function is used to configure WPA state machine and related parameters
386  * to a mode where WPA is not enabled. This is called as part of the
387  * authentication configuration when the selected network does not use WPA.
388  */
wpa_supplicant_set_non_wpa_policy(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)389 void wpa_supplicant_set_non_wpa_policy(struct wpa_supplicant *wpa_s,
390 				       struct wpa_ssid *ssid)
391 {
392 	int i;
393 
394 	if (ssid->key_mgmt & WPA_KEY_MGMT_WPS)
395 		wpa_s->key_mgmt = WPA_KEY_MGMT_WPS;
396 	else if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA)
397 		wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA;
398 	else
399 		wpa_s->key_mgmt = WPA_KEY_MGMT_NONE;
400 	wpa_sm_set_ap_wpa_ie(wpa_s->wpa, NULL, 0);
401 	wpa_sm_set_ap_rsn_ie(wpa_s->wpa, NULL, 0);
402 	wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
403 	wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
404 	wpa_s->group_cipher = WPA_CIPHER_NONE;
405 	wpa_s->mgmt_group_cipher = 0;
406 
407 	for (i = 0; i < NUM_WEP_KEYS; i++) {
408 		if (ssid->wep_key_len[i] > 5) {
409 			wpa_s->pairwise_cipher = WPA_CIPHER_WEP104;
410 			wpa_s->group_cipher = WPA_CIPHER_WEP104;
411 			break;
412 		} else if (ssid->wep_key_len[i] > 0) {
413 			wpa_s->pairwise_cipher = WPA_CIPHER_WEP40;
414 			wpa_s->group_cipher = WPA_CIPHER_WEP40;
415 			break;
416 		}
417 	}
418 
419 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_RSN_ENABLED, 0);
420 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_KEY_MGMT, wpa_s->key_mgmt);
421 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PAIRWISE,
422 			 wpa_s->pairwise_cipher);
423 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_GROUP, wpa_s->group_cipher);
424 #ifdef CONFIG_IEEE80211W
425 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MGMT_GROUP,
426 			 wpa_s->mgmt_group_cipher);
427 #endif /* CONFIG_IEEE80211W */
428 
429 	pmksa_cache_clear_current(wpa_s->wpa);
430 }
431 
432 
free_hw_features(struct wpa_supplicant * wpa_s)433 void free_hw_features(struct wpa_supplicant *wpa_s)
434 {
435 	int i;
436 	if (wpa_s->hw.modes == NULL)
437 		return;
438 
439 	for (i = 0; i < wpa_s->hw.num_modes; i++) {
440 		os_free(wpa_s->hw.modes[i].channels);
441 		os_free(wpa_s->hw.modes[i].rates);
442 	}
443 
444 	os_free(wpa_s->hw.modes);
445 	wpa_s->hw.modes = NULL;
446 }
447 
448 
free_bss_tmp_disallowed(struct wpa_supplicant * wpa_s)449 void free_bss_tmp_disallowed(struct wpa_supplicant *wpa_s)
450 {
451 	struct wpa_bss_tmp_disallowed *bss, *prev;
452 
453 	dl_list_for_each_safe(bss, prev, &wpa_s->bss_tmp_disallowed,
454 			      struct wpa_bss_tmp_disallowed, list) {
455 		eloop_cancel_timeout(wpa_bss_tmp_disallow_timeout, wpa_s, bss);
456 		dl_list_del(&bss->list);
457 		os_free(bss);
458 	}
459 }
460 
461 
wpas_flush_fils_hlp_req(struct wpa_supplicant * wpa_s)462 void wpas_flush_fils_hlp_req(struct wpa_supplicant *wpa_s)
463 {
464 	struct fils_hlp_req *req;
465 
466 	while ((req = dl_list_first(&wpa_s->fils_hlp_req, struct fils_hlp_req,
467 				    list)) != NULL) {
468 		dl_list_del(&req->list);
469 		wpabuf_free(req->pkt);
470 		os_free(req);
471 	}
472 }
473 
474 
wpa_supplicant_cleanup(struct wpa_supplicant * wpa_s)475 static void wpa_supplicant_cleanup(struct wpa_supplicant *wpa_s)
476 {
477 	int i;
478 
479 	bgscan_deinit(wpa_s);
480 	autoscan_deinit(wpa_s);
481 	scard_deinit(wpa_s->scard);
482 	wpa_s->scard = NULL;
483 	wpa_sm_set_scard_ctx(wpa_s->wpa, NULL);
484 	eapol_sm_register_scard_ctx(wpa_s->eapol, NULL);
485 	l2_packet_deinit(wpa_s->l2);
486 	wpa_s->l2 = NULL;
487 	if (wpa_s->l2_br) {
488 		l2_packet_deinit(wpa_s->l2_br);
489 		wpa_s->l2_br = NULL;
490 	}
491 #ifdef CONFIG_TESTING_OPTIONS
492 	l2_packet_deinit(wpa_s->l2_test);
493 	wpa_s->l2_test = NULL;
494 	os_free(wpa_s->get_pref_freq_list_override);
495 	wpa_s->get_pref_freq_list_override = NULL;
496 	wpabuf_free(wpa_s->last_assoc_req_wpa_ie);
497 	wpa_s->last_assoc_req_wpa_ie = NULL;
498 #endif /* CONFIG_TESTING_OPTIONS */
499 
500 	if (wpa_s->conf != NULL) {
501 		struct wpa_ssid *ssid;
502 		for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
503 			wpas_notify_network_removed(wpa_s, ssid);
504 	}
505 
506 	os_free(wpa_s->confname);
507 	wpa_s->confname = NULL;
508 
509 	os_free(wpa_s->confanother);
510 	wpa_s->confanother = NULL;
511 
512 	os_free(wpa_s->last_con_fail_realm);
513 	wpa_s->last_con_fail_realm = NULL;
514 	wpa_s->last_con_fail_realm_len = 0;
515 
516 	wpa_sm_set_eapol(wpa_s->wpa, NULL);
517 	eapol_sm_deinit(wpa_s->eapol);
518 	wpa_s->eapol = NULL;
519 
520 	rsn_preauth_deinit(wpa_s->wpa);
521 
522 #ifdef CONFIG_TDLS
523 	wpa_tdls_deinit(wpa_s->wpa);
524 #endif /* CONFIG_TDLS */
525 
526 	wmm_ac_clear_saved_tspecs(wpa_s);
527 	pmksa_candidate_free(wpa_s->wpa);
528 	wpa_sm_deinit(wpa_s->wpa);
529 	wpa_s->wpa = NULL;
530 	wpa_blacklist_clear(wpa_s);
531 
532 	wpa_bss_deinit(wpa_s);
533 
534 	wpa_supplicant_cancel_delayed_sched_scan(wpa_s);
535 	wpa_supplicant_cancel_scan(wpa_s);
536 	wpa_supplicant_cancel_auth_timeout(wpa_s);
537 	eloop_cancel_timeout(wpa_supplicant_stop_countermeasures, wpa_s, NULL);
538 #ifdef CONFIG_DELAYED_MIC_ERROR_REPORT
539 	eloop_cancel_timeout(wpa_supplicant_delayed_mic_error_report,
540 			     wpa_s, NULL);
541 #endif /* CONFIG_DELAYED_MIC_ERROR_REPORT */
542 
543 	eloop_cancel_timeout(wpas_network_reenabled, wpa_s, NULL);
544 
545 	wpas_wps_deinit(wpa_s);
546 
547 	wpabuf_free(wpa_s->pending_eapol_rx);
548 	wpa_s->pending_eapol_rx = NULL;
549 
550 #ifdef CONFIG_IBSS_RSN
551 	ibss_rsn_deinit(wpa_s->ibss_rsn);
552 	wpa_s->ibss_rsn = NULL;
553 #endif /* CONFIG_IBSS_RSN */
554 
555 	sme_deinit(wpa_s);
556 
557 #ifdef CONFIG_AP
558 	wpa_supplicant_ap_deinit(wpa_s);
559 #endif /* CONFIG_AP */
560 
561 	wpas_p2p_deinit(wpa_s);
562 
563 #ifdef CONFIG_OFFCHANNEL
564 	offchannel_deinit(wpa_s);
565 #endif /* CONFIG_OFFCHANNEL */
566 
567 	wpa_supplicant_cancel_sched_scan(wpa_s);
568 
569 	os_free(wpa_s->next_scan_freqs);
570 	wpa_s->next_scan_freqs = NULL;
571 
572 	os_free(wpa_s->manual_scan_freqs);
573 	wpa_s->manual_scan_freqs = NULL;
574 	os_free(wpa_s->select_network_scan_freqs);
575 	wpa_s->select_network_scan_freqs = NULL;
576 
577 	os_free(wpa_s->manual_sched_scan_freqs);
578 	wpa_s->manual_sched_scan_freqs = NULL;
579 
580 	wpas_mac_addr_rand_scan_clear(wpa_s, MAC_ADDR_RAND_ALL);
581 
582 	/*
583 	 * Need to remove any pending gas-query radio work before the
584 	 * gas_query_deinit() call because gas_query::work has not yet been set
585 	 * for works that have not been started. gas_query_free() will be unable
586 	 * to cancel such pending radio works and once the pending gas-query
587 	 * radio work eventually gets removed, the deinit notification call to
588 	 * gas_query_start_cb() would result in dereferencing freed memory.
589 	 */
590 	if (wpa_s->radio)
591 		radio_remove_works(wpa_s, "gas-query", 0);
592 	gas_query_deinit(wpa_s->gas);
593 	wpa_s->gas = NULL;
594 	gas_server_deinit(wpa_s->gas_server);
595 	wpa_s->gas_server = NULL;
596 
597 	free_hw_features(wpa_s);
598 
599 	ieee802_1x_dealloc_kay_sm(wpa_s);
600 
601 	os_free(wpa_s->bssid_filter);
602 	wpa_s->bssid_filter = NULL;
603 
604 	os_free(wpa_s->disallow_aps_bssid);
605 	wpa_s->disallow_aps_bssid = NULL;
606 	os_free(wpa_s->disallow_aps_ssid);
607 	wpa_s->disallow_aps_ssid = NULL;
608 
609 	wnm_bss_keep_alive_deinit(wpa_s);
610 #ifdef CONFIG_WNM
611 	wnm_deallocate_memory(wpa_s);
612 #endif /* CONFIG_WNM */
613 
614 	ext_password_deinit(wpa_s->ext_pw);
615 	wpa_s->ext_pw = NULL;
616 
617 	wpabuf_free(wpa_s->last_gas_resp);
618 	wpa_s->last_gas_resp = NULL;
619 	wpabuf_free(wpa_s->prev_gas_resp);
620 	wpa_s->prev_gas_resp = NULL;
621 
622 	os_free(wpa_s->last_scan_res);
623 	wpa_s->last_scan_res = NULL;
624 
625 #ifdef CONFIG_HS20
626 	if (wpa_s->drv_priv)
627 		wpa_drv_configure_frame_filters(wpa_s, 0);
628 	hs20_deinit(wpa_s);
629 #endif /* CONFIG_HS20 */
630 
631 	for (i = 0; i < NUM_VENDOR_ELEM_FRAMES; i++) {
632 		wpabuf_free(wpa_s->vendor_elem[i]);
633 		wpa_s->vendor_elem[i] = NULL;
634 	}
635 
636 	wmm_ac_notify_disassoc(wpa_s);
637 
638 	wpa_s->sched_scan_plans_num = 0;
639 	os_free(wpa_s->sched_scan_plans);
640 	wpa_s->sched_scan_plans = NULL;
641 
642 #ifdef CONFIG_MBO
643 	wpa_s->non_pref_chan_num = 0;
644 	os_free(wpa_s->non_pref_chan);
645 	wpa_s->non_pref_chan = NULL;
646 #endif /* CONFIG_MBO */
647 
648 	free_bss_tmp_disallowed(wpa_s);
649 
650 	wpabuf_free(wpa_s->lci);
651 	wpa_s->lci = NULL;
652 	wpas_clear_beacon_rep_data(wpa_s);
653 
654 #ifdef CONFIG_PMKSA_CACHE_EXTERNAL
655 #ifdef CONFIG_MESH
656 	{
657 		struct external_pmksa_cache *entry;
658 
659 		while ((entry = dl_list_last(&wpa_s->mesh_external_pmksa_cache,
660 					     struct external_pmksa_cache,
661 					     list)) != NULL) {
662 			dl_list_del(&entry->list);
663 			os_free(entry->pmksa_cache);
664 			os_free(entry);
665 		}
666 	}
667 #endif /* CONFIG_MESH */
668 #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
669 
670 	wpas_flush_fils_hlp_req(wpa_s);
671 
672 	wpabuf_free(wpa_s->ric_ies);
673 	wpa_s->ric_ies = NULL;
674 
675 #ifdef CONFIG_DPP
676 	wpas_dpp_deinit(wpa_s);
677 	dpp_global_deinit(wpa_s->dpp);
678 	wpa_s->dpp = NULL;
679 #endif /* CONFIG_DPP */
680 }
681 
682 
683 /**
684  * wpa_clear_keys - Clear keys configured for the driver
685  * @wpa_s: Pointer to wpa_supplicant data
686  * @addr: Previously used BSSID or %NULL if not available
687  *
688  * This function clears the encryption keys that has been previously configured
689  * for the driver.
690  */
wpa_clear_keys(struct wpa_supplicant * wpa_s,const u8 * addr)691 void wpa_clear_keys(struct wpa_supplicant *wpa_s, const u8 *addr)
692 {
693 	int i, max;
694 
695 #ifdef CONFIG_IEEE80211W
696 	max = 6;
697 #else /* CONFIG_IEEE80211W */
698 	max = 4;
699 #endif /* CONFIG_IEEE80211W */
700 
701 	/* MLME-DELETEKEYS.request */
702 	for (i = 0; i < max; i++) {
703 		if (wpa_s->keys_cleared & BIT(i))
704 			continue;
705 		wpa_drv_set_key(wpa_s, WPA_ALG_NONE, NULL, i, 0, NULL, 0,
706 				NULL, 0);
707 	}
708 	if (!(wpa_s->keys_cleared & BIT(0)) && addr &&
709 	    !is_zero_ether_addr(addr)) {
710 		wpa_drv_set_key(wpa_s, WPA_ALG_NONE, addr, 0, 0, NULL, 0, NULL,
711 				0);
712 		/* MLME-SETPROTECTION.request(None) */
713 		wpa_drv_mlme_setprotection(
714 			wpa_s, addr,
715 			MLME_SETPROTECTION_PROTECT_TYPE_NONE,
716 			MLME_SETPROTECTION_KEY_TYPE_PAIRWISE);
717 	}
718 	wpa_s->keys_cleared = (u32) -1;
719 }
720 
721 
722 /**
723  * wpa_supplicant_state_txt - Get the connection state name as a text string
724  * @state: State (wpa_state; WPA_*)
725  * Returns: The state name as a printable text string
726  */
wpa_supplicant_state_txt(enum wpa_states state)727 const char * wpa_supplicant_state_txt(enum wpa_states state)
728 {
729 	switch (state) {
730 	case WPA_DISCONNECTED:
731 		return "DISCONNECTED";
732 	case WPA_INACTIVE:
733 		return "INACTIVE";
734 	case WPA_INTERFACE_DISABLED:
735 		return "INTERFACE_DISABLED";
736 	case WPA_SCANNING:
737 		return "SCANNING";
738 	case WPA_AUTHENTICATING:
739 		return "AUTHENTICATING";
740 	case WPA_ASSOCIATING:
741 		return "ASSOCIATING";
742 	case WPA_ASSOCIATED:
743 		return "ASSOCIATED";
744 	case WPA_4WAY_HANDSHAKE:
745 		return "4WAY_HANDSHAKE";
746 	case WPA_GROUP_HANDSHAKE:
747 		return "GROUP_HANDSHAKE";
748 	case WPA_COMPLETED:
749 		return "COMPLETED";
750 	default:
751 		return "UNKNOWN";
752 	}
753 }
754 
755 
756 #ifdef CONFIG_BGSCAN
757 
wpa_supplicant_start_bgscan(struct wpa_supplicant * wpa_s)758 static void wpa_supplicant_start_bgscan(struct wpa_supplicant *wpa_s)
759 {
760 	const char *name;
761 
762 	if (wpa_s->current_ssid && wpa_s->current_ssid->bgscan)
763 		name = wpa_s->current_ssid->bgscan;
764 	else
765 		name = wpa_s->conf->bgscan;
766 	if (name == NULL || name[0] == '\0')
767 		return;
768 	if (wpas_driver_bss_selection(wpa_s))
769 		return;
770 	if (wpa_s->current_ssid == wpa_s->bgscan_ssid)
771 		return;
772 #ifdef CONFIG_P2P
773 	if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE)
774 		return;
775 #endif /* CONFIG_P2P */
776 
777 	bgscan_deinit(wpa_s);
778 	if (wpa_s->current_ssid) {
779 		if (bgscan_init(wpa_s, wpa_s->current_ssid, name)) {
780 			wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize "
781 				"bgscan");
782 			/*
783 			 * Live without bgscan; it is only used as a roaming
784 			 * optimization, so the initial connection is not
785 			 * affected.
786 			 */
787 		} else {
788 			struct wpa_scan_results *scan_res;
789 			wpa_s->bgscan_ssid = wpa_s->current_ssid;
790 			scan_res = wpa_supplicant_get_scan_results(wpa_s, NULL,
791 								   0);
792 			if (scan_res) {
793 				bgscan_notify_scan(wpa_s, scan_res);
794 				wpa_scan_results_free(scan_res);
795 			}
796 		}
797 	} else
798 		wpa_s->bgscan_ssid = NULL;
799 }
800 
801 
wpa_supplicant_stop_bgscan(struct wpa_supplicant * wpa_s)802 static void wpa_supplicant_stop_bgscan(struct wpa_supplicant *wpa_s)
803 {
804 	if (wpa_s->bgscan_ssid != NULL) {
805 		bgscan_deinit(wpa_s);
806 		wpa_s->bgscan_ssid = NULL;
807 	}
808 }
809 
810 #endif /* CONFIG_BGSCAN */
811 
812 
wpa_supplicant_start_autoscan(struct wpa_supplicant * wpa_s)813 static void wpa_supplicant_start_autoscan(struct wpa_supplicant *wpa_s)
814 {
815 	if (autoscan_init(wpa_s, 0))
816 		wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize autoscan");
817 }
818 
819 
wpa_supplicant_stop_autoscan(struct wpa_supplicant * wpa_s)820 static void wpa_supplicant_stop_autoscan(struct wpa_supplicant *wpa_s)
821 {
822 	autoscan_deinit(wpa_s);
823 }
824 
825 
wpa_supplicant_reinit_autoscan(struct wpa_supplicant * wpa_s)826 void wpa_supplicant_reinit_autoscan(struct wpa_supplicant *wpa_s)
827 {
828 	if (wpa_s->wpa_state == WPA_DISCONNECTED ||
829 	    wpa_s->wpa_state == WPA_SCANNING) {
830 		autoscan_deinit(wpa_s);
831 		wpa_supplicant_start_autoscan(wpa_s);
832 	}
833 }
834 
835 
836 /**
837  * wpa_supplicant_set_state - Set current connection state
838  * @wpa_s: Pointer to wpa_supplicant data
839  * @state: The new connection state
840  *
841  * This function is called whenever the connection state changes, e.g.,
842  * association is completed for WPA/WPA2 4-Way Handshake is started.
843  */
wpa_supplicant_set_state(struct wpa_supplicant * wpa_s,enum wpa_states state)844 void wpa_supplicant_set_state(struct wpa_supplicant *wpa_s,
845 			      enum wpa_states state)
846 {
847 	enum wpa_states old_state = wpa_s->wpa_state;
848 
849 	wpa_dbg(wpa_s, MSG_DEBUG, "State: %s -> %s",
850 		wpa_supplicant_state_txt(wpa_s->wpa_state),
851 		wpa_supplicant_state_txt(state));
852 
853 	if (state == WPA_COMPLETED &&
854 	    os_reltime_initialized(&wpa_s->roam_start)) {
855 		os_reltime_age(&wpa_s->roam_start, &wpa_s->roam_time);
856 		wpa_s->roam_start.sec = 0;
857 		wpa_s->roam_start.usec = 0;
858 		wpas_notify_auth_changed(wpa_s);
859 		wpas_notify_roam_time(wpa_s);
860 		wpas_notify_roam_complete(wpa_s);
861 	} else if (state == WPA_DISCONNECTED &&
862 		   os_reltime_initialized(&wpa_s->roam_start)) {
863 		wpa_s->roam_start.sec = 0;
864 		wpa_s->roam_start.usec = 0;
865 		wpa_s->roam_time.sec = 0;
866 		wpa_s->roam_time.usec = 0;
867 		wpas_notify_roam_complete(wpa_s);
868 	}
869 
870 	if (state == WPA_INTERFACE_DISABLED) {
871 		/* Assure normal scan when interface is restored */
872 		wpa_s->normal_scans = 0;
873 	}
874 
875 	if (state == WPA_COMPLETED) {
876 		wpas_connect_work_done(wpa_s);
877 		/* Reinitialize normal_scan counter */
878 		wpa_s->normal_scans = 0;
879 	}
880 
881 #ifdef CONFIG_P2P
882 	/*
883 	 * P2PS client has to reply to Probe Request frames received on the
884 	 * group operating channel. Enable Probe Request frame reporting for
885 	 * P2P connected client in case p2p_cli_probe configuration property is
886 	 * set to 1.
887 	 */
888 	if (wpa_s->conf->p2p_cli_probe && wpa_s->current_ssid &&
889 	    wpa_s->current_ssid->mode == WPAS_MODE_INFRA &&
890 	    wpa_s->current_ssid->p2p_group) {
891 		if (state == WPA_COMPLETED && !wpa_s->p2p_cli_probe) {
892 			wpa_dbg(wpa_s, MSG_DEBUG,
893 				"P2P: Enable CLI Probe Request RX reporting");
894 			wpa_s->p2p_cli_probe =
895 				wpa_drv_probe_req_report(wpa_s, 1) >= 0;
896 		} else if (state != WPA_COMPLETED && wpa_s->p2p_cli_probe) {
897 			wpa_dbg(wpa_s, MSG_DEBUG,
898 				"P2P: Disable CLI Probe Request RX reporting");
899 			wpa_s->p2p_cli_probe = 0;
900 			wpa_drv_probe_req_report(wpa_s, 0);
901 		}
902 	}
903 #endif /* CONFIG_P2P */
904 
905 	if (state != WPA_SCANNING)
906 		wpa_supplicant_notify_scanning(wpa_s, 0);
907 
908 	if (state == WPA_COMPLETED && wpa_s->new_connection) {
909 		struct wpa_ssid *ssid = wpa_s->current_ssid;
910 		int fils_hlp_sent = 0;
911 
912 #ifdef CONFIG_SME
913 		if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
914 		    wpa_auth_alg_fils(wpa_s->sme.auth_alg))
915 			fils_hlp_sent = 1;
916 #endif /* CONFIG_SME */
917 		if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
918 		    wpa_auth_alg_fils(wpa_s->auth_alg))
919 			fils_hlp_sent = 1;
920 
921 #if defined(CONFIG_CTRL_IFACE) || !defined(CONFIG_NO_STDOUT_DEBUG)
922 		wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_CONNECTED "- Connection to "
923 			MACSTR " completed [id=%d id_str=%s%s]",
924 			MAC2STR(wpa_s->bssid),
925 			ssid ? ssid->id : -1,
926 			ssid && ssid->id_str ? ssid->id_str : "",
927 			fils_hlp_sent ? " FILS_HLP_SENT" : "");
928 #endif /* CONFIG_CTRL_IFACE || !CONFIG_NO_STDOUT_DEBUG */
929 		wpas_clear_temp_disabled(wpa_s, ssid, 1);
930 		wpa_blacklist_clear(wpa_s);
931 		wpa_s->extra_blacklist_count = 0;
932 		wpa_s->new_connection = 0;
933 		wpa_drv_set_operstate(wpa_s, 1);
934 #ifndef IEEE8021X_EAPOL
935 		wpa_drv_set_supp_port(wpa_s, 1);
936 #endif /* IEEE8021X_EAPOL */
937 		wpa_s->after_wps = 0;
938 		wpa_s->known_wps_freq = 0;
939 		wpas_p2p_completed(wpa_s);
940 
941 		sme_sched_obss_scan(wpa_s, 1);
942 
943 #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
944 		if (!fils_hlp_sent && ssid && ssid->eap.erp)
945 			wpas_update_fils_connect_params(wpa_s);
946 #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
947 	} else if (state == WPA_DISCONNECTED || state == WPA_ASSOCIATING ||
948 		   state == WPA_ASSOCIATED) {
949 		wpa_s->new_connection = 1;
950 		wpa_drv_set_operstate(wpa_s, 0);
951 #ifndef IEEE8021X_EAPOL
952 		wpa_drv_set_supp_port(wpa_s, 0);
953 #endif /* IEEE8021X_EAPOL */
954 		sme_sched_obss_scan(wpa_s, 0);
955 	}
956 	wpa_s->wpa_state = state;
957 
958 #ifdef CONFIG_BGSCAN
959 	if (state == WPA_COMPLETED)
960 		wpa_supplicant_start_bgscan(wpa_s);
961 	else if (state < WPA_ASSOCIATED)
962 		wpa_supplicant_stop_bgscan(wpa_s);
963 #endif /* CONFIG_BGSCAN */
964 
965 	if (state > WPA_SCANNING)
966 		wpa_supplicant_stop_autoscan(wpa_s);
967 
968 	if (state == WPA_DISCONNECTED || state == WPA_INACTIVE)
969 		wpa_supplicant_start_autoscan(wpa_s);
970 
971 	if (old_state >= WPA_ASSOCIATED && wpa_s->wpa_state < WPA_ASSOCIATED)
972 		wmm_ac_notify_disassoc(wpa_s);
973 
974 	if (wpa_s->wpa_state != old_state) {
975 		wpas_notify_state_changed(wpa_s, wpa_s->wpa_state, old_state);
976 
977 		/*
978 		 * Notify the P2P Device interface about a state change in one
979 		 * of the interfaces.
980 		 */
981 		wpas_p2p_indicate_state_change(wpa_s);
982 
983 		if (wpa_s->wpa_state == WPA_COMPLETED ||
984 		    old_state == WPA_COMPLETED)
985 			wpas_notify_auth_changed(wpa_s);
986 	}
987 }
988 
989 
wpa_supplicant_terminate_proc(struct wpa_global * global)990 void wpa_supplicant_terminate_proc(struct wpa_global *global)
991 {
992 	int pending = 0;
993 #ifdef CONFIG_WPS
994 	struct wpa_supplicant *wpa_s = global->ifaces;
995 	while (wpa_s) {
996 		struct wpa_supplicant *next = wpa_s->next;
997 		if (wpas_wps_terminate_pending(wpa_s) == 1)
998 			pending = 1;
999 #ifdef CONFIG_P2P
1000 		if (wpa_s->p2p_group_interface != NOT_P2P_GROUP_INTERFACE ||
1001 		    (wpa_s->current_ssid && wpa_s->current_ssid->p2p_group))
1002 			wpas_p2p_disconnect(wpa_s);
1003 #endif /* CONFIG_P2P */
1004 		wpa_s = next;
1005 	}
1006 #endif /* CONFIG_WPS */
1007 	if (pending)
1008 		return;
1009 	eloop_terminate();
1010 }
1011 
1012 
wpa_supplicant_terminate(int sig,void * signal_ctx)1013 static void wpa_supplicant_terminate(int sig, void *signal_ctx)
1014 {
1015 	struct wpa_global *global = signal_ctx;
1016 	wpa_supplicant_terminate_proc(global);
1017 }
1018 
1019 
wpa_supplicant_clear_status(struct wpa_supplicant * wpa_s)1020 void wpa_supplicant_clear_status(struct wpa_supplicant *wpa_s)
1021 {
1022 	enum wpa_states old_state = wpa_s->wpa_state;
1023 
1024 	wpa_s->pairwise_cipher = 0;
1025 	wpa_s->group_cipher = 0;
1026 	wpa_s->mgmt_group_cipher = 0;
1027 	wpa_s->key_mgmt = 0;
1028 	if (wpa_s->wpa_state != WPA_INTERFACE_DISABLED)
1029 		wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
1030 
1031 	if (wpa_s->wpa_state != old_state)
1032 		wpas_notify_state_changed(wpa_s, wpa_s->wpa_state, old_state);
1033 }
1034 
1035 
1036 /**
1037  * wpa_supplicant_reload_configuration - Reload configuration data
1038  * @wpa_s: Pointer to wpa_supplicant data
1039  * Returns: 0 on success or -1 if configuration parsing failed
1040  *
1041  * This function can be used to request that the configuration data is reloaded
1042  * (e.g., after configuration file change). This function is reloading
1043  * configuration only for one interface, so this may need to be called multiple
1044  * times if %wpa_supplicant is controlling multiple interfaces and all
1045  * interfaces need reconfiguration.
1046  */
wpa_supplicant_reload_configuration(struct wpa_supplicant * wpa_s)1047 int wpa_supplicant_reload_configuration(struct wpa_supplicant *wpa_s)
1048 {
1049 	struct wpa_config *conf;
1050 	int reconf_ctrl;
1051 	int old_ap_scan;
1052 
1053 	if (wpa_s->confname == NULL)
1054 		return -1;
1055 	conf = wpa_config_read(wpa_s->confname, NULL);
1056 	if (conf == NULL) {
1057 		wpa_msg(wpa_s, MSG_ERROR, "Failed to parse the configuration "
1058 			"file '%s' - exiting", wpa_s->confname);
1059 		return -1;
1060 	}
1061 	if (wpa_s->confanother &&
1062 	    !wpa_config_read(wpa_s->confanother, conf)) {
1063 		wpa_msg(wpa_s, MSG_ERROR,
1064 			"Failed to parse the configuration file '%s' - exiting",
1065 			wpa_s->confanother);
1066 		return -1;
1067 	}
1068 
1069 	conf->changed_parameters = (unsigned int) -1;
1070 
1071 	reconf_ctrl = !!conf->ctrl_interface != !!wpa_s->conf->ctrl_interface
1072 		|| (conf->ctrl_interface && wpa_s->conf->ctrl_interface &&
1073 		    os_strcmp(conf->ctrl_interface,
1074 			      wpa_s->conf->ctrl_interface) != 0);
1075 
1076 	if (reconf_ctrl && wpa_s->ctrl_iface) {
1077 		wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface);
1078 		wpa_s->ctrl_iface = NULL;
1079 	}
1080 
1081 	eapol_sm_invalidate_cached_session(wpa_s->eapol);
1082 	if (wpa_s->current_ssid) {
1083 		if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
1084 			wpa_s->own_disconnect_req = 1;
1085 		wpa_supplicant_deauthenticate(wpa_s,
1086 					      WLAN_REASON_DEAUTH_LEAVING);
1087 	}
1088 
1089 	/*
1090 	 * TODO: should notify EAPOL SM about changes in opensc_engine_path,
1091 	 * pkcs11_engine_path, pkcs11_module_path, openssl_ciphers.
1092 	 */
1093 	if (wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
1094 	    wpa_s->key_mgmt == WPA_KEY_MGMT_OWE ||
1095 	    wpa_s->key_mgmt == WPA_KEY_MGMT_DPP) {
1096 		/*
1097 		 * Clear forced success to clear EAP state for next
1098 		 * authentication.
1099 		 */
1100 		eapol_sm_notify_eap_success(wpa_s->eapol, FALSE);
1101 	}
1102 	eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
1103 	wpa_sm_set_config(wpa_s->wpa, NULL);
1104 	wpa_sm_pmksa_cache_flush(wpa_s->wpa, NULL);
1105 	wpa_sm_set_fast_reauth(wpa_s->wpa, wpa_s->conf->fast_reauth);
1106 	rsn_preauth_deinit(wpa_s->wpa);
1107 
1108 	old_ap_scan = wpa_s->conf->ap_scan;
1109 	wpa_config_free(wpa_s->conf);
1110 	wpa_s->conf = conf;
1111 	if (old_ap_scan != wpa_s->conf->ap_scan)
1112 		wpas_notify_ap_scan_changed(wpa_s);
1113 
1114 	if (reconf_ctrl)
1115 		wpa_s->ctrl_iface = wpa_supplicant_ctrl_iface_init(wpa_s);
1116 
1117 	wpa_supplicant_update_config(wpa_s);
1118 
1119 	wpa_supplicant_clear_status(wpa_s);
1120 	if (wpa_supplicant_enabled_networks(wpa_s)) {
1121 		wpa_s->reassociate = 1;
1122 		wpa_supplicant_req_scan(wpa_s, 0, 0);
1123 	}
1124 	wpa_dbg(wpa_s, MSG_DEBUG, "Reconfiguration completed");
1125 	return 0;
1126 }
1127 
1128 
wpa_supplicant_reconfig(int sig,void * signal_ctx)1129 static void wpa_supplicant_reconfig(int sig, void *signal_ctx)
1130 {
1131 	struct wpa_global *global = signal_ctx;
1132 	struct wpa_supplicant *wpa_s;
1133 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
1134 		wpa_dbg(wpa_s, MSG_DEBUG, "Signal %d received - reconfiguring",
1135 			sig);
1136 		if (wpa_supplicant_reload_configuration(wpa_s) < 0) {
1137 			wpa_supplicant_terminate_proc(global);
1138 		}
1139 	}
1140 
1141 	if (wpa_debug_reopen_file() < 0) {
1142 		/* Ignore errors since we cannot really do much to fix this */
1143 		wpa_printf(MSG_DEBUG, "Could not reopen debug log file");
1144 	}
1145 }
1146 
1147 
wpa_supplicant_suites_from_ai(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid,struct wpa_ie_data * ie)1148 static int wpa_supplicant_suites_from_ai(struct wpa_supplicant *wpa_s,
1149 					 struct wpa_ssid *ssid,
1150 					 struct wpa_ie_data *ie)
1151 {
1152 	int ret = wpa_sm_parse_own_wpa_ie(wpa_s->wpa, ie);
1153 	if (ret) {
1154 		if (ret == -2) {
1155 			wpa_msg(wpa_s, MSG_INFO, "WPA: Failed to parse WPA IE "
1156 				"from association info");
1157 		}
1158 		return -1;
1159 	}
1160 
1161 	wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Using WPA IE from AssocReq to set "
1162 		"cipher suites");
1163 	if (!(ie->group_cipher & ssid->group_cipher)) {
1164 		wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled group "
1165 			"cipher 0x%x (mask 0x%x) - reject",
1166 			ie->group_cipher, ssid->group_cipher);
1167 		return -1;
1168 	}
1169 	if (!(ie->pairwise_cipher & ssid->pairwise_cipher)) {
1170 		wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled pairwise "
1171 			"cipher 0x%x (mask 0x%x) - reject",
1172 			ie->pairwise_cipher, ssid->pairwise_cipher);
1173 		return -1;
1174 	}
1175 	if (!(ie->key_mgmt & ssid->key_mgmt)) {
1176 		wpa_msg(wpa_s, MSG_INFO, "WPA: Driver used disabled key "
1177 			"management 0x%x (mask 0x%x) - reject",
1178 			ie->key_mgmt, ssid->key_mgmt);
1179 		return -1;
1180 	}
1181 
1182 #ifdef CONFIG_IEEE80211W
1183 	if (!(ie->capabilities & WPA_CAPABILITY_MFPC) &&
1184 	    wpas_get_ssid_pmf(wpa_s, ssid) == MGMT_FRAME_PROTECTION_REQUIRED) {
1185 		wpa_msg(wpa_s, MSG_INFO, "WPA: Driver associated with an AP "
1186 			"that does not support management frame protection - "
1187 			"reject");
1188 		return -1;
1189 	}
1190 #endif /* CONFIG_IEEE80211W */
1191 
1192 	return 0;
1193 }
1194 
1195 
matching_ciphers(struct wpa_ssid * ssid,struct wpa_ie_data * ie,int freq)1196 static int matching_ciphers(struct wpa_ssid *ssid, struct wpa_ie_data *ie,
1197 			    int freq)
1198 {
1199 	if (!ie->has_group)
1200 		ie->group_cipher = wpa_default_rsn_cipher(freq);
1201 	if (!ie->has_pairwise)
1202 		ie->pairwise_cipher = wpa_default_rsn_cipher(freq);
1203 	return (ie->group_cipher & ssid->group_cipher) &&
1204 		(ie->pairwise_cipher & ssid->pairwise_cipher);
1205 }
1206 
1207 
1208 /**
1209  * wpa_supplicant_set_suites - Set authentication and encryption parameters
1210  * @wpa_s: Pointer to wpa_supplicant data
1211  * @bss: Scan results for the selected BSS, or %NULL if not available
1212  * @ssid: Configuration data for the selected network
1213  * @wpa_ie: Buffer for the WPA/RSN IE
1214  * @wpa_ie_len: Maximum wpa_ie buffer size on input. This is changed to be the
1215  * used buffer length in case the functions returns success.
1216  * Returns: 0 on success or -1 on failure
1217  *
1218  * This function is used to configure authentication and encryption parameters
1219  * based on the network configuration and scan result for the selected BSS (if
1220  * available).
1221  */
wpa_supplicant_set_suites(struct wpa_supplicant * wpa_s,struct wpa_bss * bss,struct wpa_ssid * ssid,u8 * wpa_ie,size_t * wpa_ie_len)1222 int wpa_supplicant_set_suites(struct wpa_supplicant *wpa_s,
1223 			      struct wpa_bss *bss, struct wpa_ssid *ssid,
1224 			      u8 *wpa_ie, size_t *wpa_ie_len)
1225 {
1226 	struct wpa_ie_data ie;
1227 	int sel, proto;
1228 	const u8 *bss_wpa, *bss_rsn, *bss_osen;
1229 
1230 	if (bss) {
1231 		bss_wpa = wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE);
1232 		bss_rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
1233 		bss_osen = wpa_bss_get_vendor_ie(bss, OSEN_IE_VENDOR_TYPE);
1234 	} else
1235 		bss_wpa = bss_rsn = bss_osen = NULL;
1236 
1237 	if (bss_rsn && (ssid->proto & WPA_PROTO_RSN) &&
1238 	    wpa_parse_wpa_ie(bss_rsn, 2 + bss_rsn[1], &ie) == 0 &&
1239 	    matching_ciphers(ssid, &ie, bss->freq) &&
1240 	    (ie.key_mgmt & ssid->key_mgmt)) {
1241 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using IEEE 802.11i/D9.0");
1242 		proto = WPA_PROTO_RSN;
1243 	} else if (bss_wpa && (ssid->proto & WPA_PROTO_WPA) &&
1244 		   wpa_parse_wpa_ie(bss_wpa, 2 + bss_wpa[1], &ie) == 0 &&
1245 		   (ie.group_cipher & ssid->group_cipher) &&
1246 		   (ie.pairwise_cipher & ssid->pairwise_cipher) &&
1247 		   (ie.key_mgmt & ssid->key_mgmt)) {
1248 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using IEEE 802.11i/D3.0");
1249 		proto = WPA_PROTO_WPA;
1250 #ifdef CONFIG_HS20
1251 	} else if (bss_osen && (ssid->proto & WPA_PROTO_OSEN) &&
1252 		   wpa_parse_wpa_ie(bss_osen, 2 + bss_osen[1], &ie) == 0 &&
1253 		   (ie.group_cipher & ssid->group_cipher) &&
1254 		   (ie.pairwise_cipher & ssid->pairwise_cipher) &&
1255 		   (ie.key_mgmt & ssid->key_mgmt)) {
1256 		wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using OSEN");
1257 		proto = WPA_PROTO_OSEN;
1258 	} else if (bss_rsn && (ssid->proto & WPA_PROTO_OSEN) &&
1259 	    wpa_parse_wpa_ie(bss_rsn, 2 + bss_rsn[1], &ie) == 0 &&
1260 	    (ie.group_cipher & ssid->group_cipher) &&
1261 	    (ie.pairwise_cipher & ssid->pairwise_cipher) &&
1262 	    (ie.key_mgmt & ssid->key_mgmt)) {
1263 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using OSEN (within RSN)");
1264 		proto = WPA_PROTO_RSN;
1265 #endif /* CONFIG_HS20 */
1266 	} else if (bss) {
1267 		wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select WPA/RSN");
1268 		wpa_dbg(wpa_s, MSG_DEBUG,
1269 			"WPA: ssid proto=0x%x pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
1270 			ssid->proto, ssid->pairwise_cipher, ssid->group_cipher,
1271 			ssid->key_mgmt);
1272 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: BSS " MACSTR " ssid='%s'%s%s%s",
1273 			MAC2STR(bss->bssid),
1274 			wpa_ssid_txt(bss->ssid, bss->ssid_len),
1275 			bss_wpa ? " WPA" : "",
1276 			bss_rsn ? " RSN" : "",
1277 			bss_osen ? " OSEN" : "");
1278 		if (bss_rsn) {
1279 			wpa_hexdump(MSG_DEBUG, "RSN", bss_rsn, 2 + bss_rsn[1]);
1280 			if (wpa_parse_wpa_ie(bss_rsn, 2 + bss_rsn[1], &ie)) {
1281 				wpa_dbg(wpa_s, MSG_DEBUG,
1282 					"Could not parse RSN element");
1283 			} else {
1284 				wpa_dbg(wpa_s, MSG_DEBUG,
1285 					"RSN: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
1286 					ie.pairwise_cipher, ie.group_cipher,
1287 					ie.key_mgmt);
1288 			}
1289 		}
1290 		if (bss_wpa) {
1291 			wpa_hexdump(MSG_DEBUG, "WPA", bss_wpa, 2 + bss_wpa[1]);
1292 			if (wpa_parse_wpa_ie(bss_wpa, 2 + bss_wpa[1], &ie)) {
1293 				wpa_dbg(wpa_s, MSG_DEBUG,
1294 					"Could not parse WPA element");
1295 			} else {
1296 				wpa_dbg(wpa_s, MSG_DEBUG,
1297 					"WPA: pairwise_cipher=0x%x group_cipher=0x%x key_mgmt=0x%x",
1298 					ie.pairwise_cipher, ie.group_cipher,
1299 					ie.key_mgmt);
1300 			}
1301 		}
1302 		return -1;
1303 	} else {
1304 		if (ssid->proto & WPA_PROTO_OSEN)
1305 			proto = WPA_PROTO_OSEN;
1306 		else if (ssid->proto & WPA_PROTO_RSN)
1307 			proto = WPA_PROTO_RSN;
1308 		else
1309 			proto = WPA_PROTO_WPA;
1310 		if (wpa_supplicant_suites_from_ai(wpa_s, ssid, &ie) < 0) {
1311 			os_memset(&ie, 0, sizeof(ie));
1312 			ie.group_cipher = ssid->group_cipher;
1313 			ie.pairwise_cipher = ssid->pairwise_cipher;
1314 			ie.key_mgmt = ssid->key_mgmt;
1315 #ifdef CONFIG_IEEE80211W
1316 			ie.mgmt_group_cipher = 0;
1317 			if (ssid->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
1318 				if (ssid->group_mgmt_cipher &
1319 				    WPA_CIPHER_BIP_GMAC_256)
1320 					ie.mgmt_group_cipher =
1321 						WPA_CIPHER_BIP_GMAC_256;
1322 				else if (ssid->group_mgmt_cipher &
1323 					 WPA_CIPHER_BIP_CMAC_256)
1324 					ie.mgmt_group_cipher =
1325 						WPA_CIPHER_BIP_CMAC_256;
1326 				else if (ssid->group_mgmt_cipher &
1327 					 WPA_CIPHER_BIP_GMAC_128)
1328 					ie.mgmt_group_cipher =
1329 						WPA_CIPHER_BIP_GMAC_128;
1330 				else
1331 					ie.mgmt_group_cipher =
1332 						WPA_CIPHER_AES_128_CMAC;
1333 			}
1334 #endif /* CONFIG_IEEE80211W */
1335 #ifdef CONFIG_OWE
1336 			if ((ssid->key_mgmt & WPA_KEY_MGMT_OWE) &&
1337 			    !ssid->owe_only &&
1338 			    !bss_wpa && !bss_rsn && !bss_osen) {
1339 				wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
1340 				wpa_s->wpa_proto = 0;
1341 				*wpa_ie_len = 0;
1342 				return 0;
1343 			}
1344 #endif /* CONFIG_OWE */
1345 			wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Set cipher suites "
1346 				"based on configuration");
1347 		} else
1348 			proto = ie.proto;
1349 	}
1350 
1351 	wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected cipher suites: group %d "
1352 		"pairwise %d key_mgmt %d proto %d",
1353 		ie.group_cipher, ie.pairwise_cipher, ie.key_mgmt, proto);
1354 #ifdef CONFIG_IEEE80211W
1355 	if (ssid->ieee80211w) {
1356 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected mgmt group cipher %d",
1357 			ie.mgmt_group_cipher);
1358 	}
1359 #endif /* CONFIG_IEEE80211W */
1360 
1361 	wpa_s->wpa_proto = proto;
1362 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, proto);
1363 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_RSN_ENABLED,
1364 			 !!(ssid->proto & (WPA_PROTO_RSN | WPA_PROTO_OSEN)));
1365 
1366 	if (bss || !wpa_s->ap_ies_from_associnfo) {
1367 		if (wpa_sm_set_ap_wpa_ie(wpa_s->wpa, bss_wpa,
1368 					 bss_wpa ? 2 + bss_wpa[1] : 0) ||
1369 		    wpa_sm_set_ap_rsn_ie(wpa_s->wpa, bss_rsn,
1370 					 bss_rsn ? 2 + bss_rsn[1] : 0))
1371 			return -1;
1372 	}
1373 
1374 #ifdef CONFIG_NO_WPA
1375 	wpa_s->group_cipher = WPA_CIPHER_NONE;
1376 	wpa_s->pairwise_cipher = WPA_CIPHER_NONE;
1377 #else /* CONFIG_NO_WPA */
1378 	sel = ie.group_cipher & ssid->group_cipher;
1379 	wpa_dbg(wpa_s, MSG_DEBUG,
1380 		"WPA: AP group 0x%x network profile group 0x%x; available group 0x%x",
1381 		ie.group_cipher, ssid->group_cipher, sel);
1382 	wpa_s->group_cipher = wpa_pick_group_cipher(sel);
1383 	if (wpa_s->group_cipher < 0) {
1384 		wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select group "
1385 			"cipher");
1386 		return -1;
1387 	}
1388 	wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using GTK %s",
1389 		wpa_cipher_txt(wpa_s->group_cipher));
1390 
1391 	sel = ie.pairwise_cipher & ssid->pairwise_cipher;
1392 	wpa_dbg(wpa_s, MSG_DEBUG,
1393 		"WPA: AP pairwise 0x%x network profile pairwise 0x%x; available pairwise 0x%x",
1394 		ie.pairwise_cipher, ssid->pairwise_cipher, sel);
1395 	wpa_s->pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1);
1396 	if (wpa_s->pairwise_cipher < 0) {
1397 		wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select pairwise "
1398 			"cipher");
1399 		return -1;
1400 	}
1401 	wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using PTK %s",
1402 		wpa_cipher_txt(wpa_s->pairwise_cipher));
1403 #endif /* CONFIG_NO_WPA */
1404 
1405 	sel = ie.key_mgmt & ssid->key_mgmt;
1406 	wpa_dbg(wpa_s, MSG_DEBUG,
1407 		"WPA: AP key_mgmt 0x%x network profile key_mgmt 0x%x; available key_mgmt 0x%x",
1408 		ie.key_mgmt, ssid->key_mgmt, sel);
1409 #ifdef CONFIG_SAE
1410 	if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SAE))
1411 		sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_FT_SAE);
1412 #endif /* CONFIG_SAE */
1413 	if (0) {
1414 #ifdef CONFIG_IEEE80211R
1415 #ifdef CONFIG_SHA384
1416 	} else if (sel & WPA_KEY_MGMT_FT_IEEE8021X_SHA384) {
1417 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X_SHA384;
1418 		wpa_dbg(wpa_s, MSG_DEBUG,
1419 			"WPA: using KEY_MGMT FT/802.1X-SHA384");
1420 		if (!ssid->ft_eap_pmksa_caching &&
1421 		    pmksa_cache_get_current(wpa_s->wpa)) {
1422 			/* PMKSA caching with FT may have interoperability
1423 			 * issues, so disable that case by default for now. */
1424 			wpa_dbg(wpa_s, MSG_DEBUG,
1425 				"WPA: Disable PMKSA caching for FT/802.1X connection");
1426 			pmksa_cache_clear_current(wpa_s->wpa);
1427 		}
1428 #endif /* CONFIG_SHA384 */
1429 #endif /* CONFIG_IEEE80211R */
1430 #ifdef CONFIG_SUITEB192
1431 	} else if (sel & WPA_KEY_MGMT_IEEE8021X_SUITE_B_192) {
1432 		wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B_192;
1433 		wpa_dbg(wpa_s, MSG_DEBUG,
1434 			"WPA: using KEY_MGMT 802.1X with Suite B (192-bit)");
1435 #endif /* CONFIG_SUITEB192 */
1436 #ifdef CONFIG_SUITEB
1437 	} else if (sel & WPA_KEY_MGMT_IEEE8021X_SUITE_B) {
1438 		wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SUITE_B;
1439 		wpa_dbg(wpa_s, MSG_DEBUG,
1440 			"WPA: using KEY_MGMT 802.1X with Suite B");
1441 #endif /* CONFIG_SUITEB */
1442 #ifdef CONFIG_FILS
1443 #ifdef CONFIG_IEEE80211R
1444 	} else if (sel & WPA_KEY_MGMT_FT_FILS_SHA384) {
1445 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_FILS_SHA384;
1446 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT-FILS-SHA384");
1447 	} else if (sel & WPA_KEY_MGMT_FT_FILS_SHA256) {
1448 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_FILS_SHA256;
1449 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT-FILS-SHA256");
1450 #endif /* CONFIG_IEEE80211R */
1451 	} else if (sel & WPA_KEY_MGMT_FILS_SHA384) {
1452 		wpa_s->key_mgmt = WPA_KEY_MGMT_FILS_SHA384;
1453 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FILS-SHA384");
1454 	} else if (sel & WPA_KEY_MGMT_FILS_SHA256) {
1455 		wpa_s->key_mgmt = WPA_KEY_MGMT_FILS_SHA256;
1456 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FILS-SHA256");
1457 #endif /* CONFIG_FILS */
1458 #ifdef CONFIG_IEEE80211R
1459 	} else if (sel & WPA_KEY_MGMT_FT_IEEE8021X) {
1460 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X;
1461 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/802.1X");
1462 		if (!ssid->ft_eap_pmksa_caching &&
1463 		    pmksa_cache_get_current(wpa_s->wpa)) {
1464 			/* PMKSA caching with FT may have interoperability
1465 			 * issues, so disable that case by default for now. */
1466 			wpa_dbg(wpa_s, MSG_DEBUG,
1467 				"WPA: Disable PMKSA caching for FT/802.1X connection");
1468 			pmksa_cache_clear_current(wpa_s->wpa);
1469 		}
1470 #endif /* CONFIG_IEEE80211R */
1471 #ifdef CONFIG_DPP
1472 	} else if (sel & WPA_KEY_MGMT_DPP) {
1473 		wpa_s->key_mgmt = WPA_KEY_MGMT_DPP;
1474 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT DPP");
1475 #endif /* CONFIG_DPP */
1476 #ifdef CONFIG_SAE
1477 	} else if (sel & WPA_KEY_MGMT_FT_SAE) {
1478 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_SAE;
1479 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT FT/SAE");
1480 	} else if (sel & WPA_KEY_MGMT_SAE) {
1481 		wpa_s->key_mgmt = WPA_KEY_MGMT_SAE;
1482 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT SAE");
1483 #endif /* CONFIG_SAE */
1484 #ifdef CONFIG_IEEE80211R
1485 	} else if (sel & WPA_KEY_MGMT_FT_PSK) {
1486 		wpa_s->key_mgmt = WPA_KEY_MGMT_FT_PSK;
1487 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT FT/PSK");
1488 #endif /* CONFIG_IEEE80211R */
1489 #ifdef CONFIG_IEEE80211W
1490 	} else if (sel & WPA_KEY_MGMT_IEEE8021X_SHA256) {
1491 		wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_SHA256;
1492 		wpa_dbg(wpa_s, MSG_DEBUG,
1493 			"WPA: using KEY_MGMT 802.1X with SHA256");
1494 	} else if (sel & WPA_KEY_MGMT_PSK_SHA256) {
1495 		wpa_s->key_mgmt = WPA_KEY_MGMT_PSK_SHA256;
1496 		wpa_dbg(wpa_s, MSG_DEBUG,
1497 			"WPA: using KEY_MGMT PSK with SHA256");
1498 #endif /* CONFIG_IEEE80211W */
1499 	} else if (sel & WPA_KEY_MGMT_IEEE8021X) {
1500 		wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X;
1501 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT 802.1X");
1502 	} else if (sel & WPA_KEY_MGMT_PSK) {
1503 		wpa_s->key_mgmt = WPA_KEY_MGMT_PSK;
1504 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-PSK");
1505 	} else if (sel & WPA_KEY_MGMT_WPA_NONE) {
1506 		wpa_s->key_mgmt = WPA_KEY_MGMT_WPA_NONE;
1507 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using KEY_MGMT WPA-NONE");
1508 #ifdef CONFIG_HS20
1509 	} else if (sel & WPA_KEY_MGMT_OSEN) {
1510 		wpa_s->key_mgmt = WPA_KEY_MGMT_OSEN;
1511 		wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: using KEY_MGMT OSEN");
1512 #endif /* CONFIG_HS20 */
1513 #ifdef CONFIG_OWE
1514 	} else if (sel & WPA_KEY_MGMT_OWE) {
1515 		wpa_s->key_mgmt = WPA_KEY_MGMT_OWE;
1516 		wpa_dbg(wpa_s, MSG_DEBUG, "RSN: using KEY_MGMT OWE");
1517 #endif /* CONFIG_OWE */
1518 	} else {
1519 		wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to select "
1520 			"authenticated key management type");
1521 		return -1;
1522 	}
1523 
1524 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_KEY_MGMT, wpa_s->key_mgmt);
1525 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PAIRWISE,
1526 			 wpa_s->pairwise_cipher);
1527 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_GROUP, wpa_s->group_cipher);
1528 
1529 #ifdef CONFIG_IEEE80211W
1530 	sel = ie.mgmt_group_cipher;
1531 	if (ssid->group_mgmt_cipher)
1532 		sel &= ssid->group_mgmt_cipher;
1533 	if (wpas_get_ssid_pmf(wpa_s, ssid) == NO_MGMT_FRAME_PROTECTION ||
1534 	    !(ie.capabilities & WPA_CAPABILITY_MFPC))
1535 		sel = 0;
1536 	wpa_dbg(wpa_s, MSG_DEBUG,
1537 		"WPA: AP mgmt_group_cipher 0x%x network profile mgmt_group_cipher 0x%x; available mgmt_group_cipher 0x%x",
1538 		ie.mgmt_group_cipher, ssid->group_mgmt_cipher, sel);
1539 	if (sel & WPA_CIPHER_AES_128_CMAC) {
1540 		wpa_s->mgmt_group_cipher = WPA_CIPHER_AES_128_CMAC;
1541 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
1542 			"AES-128-CMAC");
1543 	} else if (sel & WPA_CIPHER_BIP_GMAC_128) {
1544 		wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_GMAC_128;
1545 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
1546 			"BIP-GMAC-128");
1547 	} else if (sel & WPA_CIPHER_BIP_GMAC_256) {
1548 		wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_GMAC_256;
1549 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
1550 			"BIP-GMAC-256");
1551 	} else if (sel & WPA_CIPHER_BIP_CMAC_256) {
1552 		wpa_s->mgmt_group_cipher = WPA_CIPHER_BIP_CMAC_256;
1553 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: using MGMT group cipher "
1554 			"BIP-CMAC-256");
1555 	} else {
1556 		wpa_s->mgmt_group_cipher = 0;
1557 		wpa_dbg(wpa_s, MSG_DEBUG, "WPA: not using MGMT group cipher");
1558 	}
1559 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MGMT_GROUP,
1560 			 wpa_s->mgmt_group_cipher);
1561 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_MFP,
1562 			 wpas_get_ssid_pmf(wpa_s, ssid));
1563 #endif /* CONFIG_IEEE80211W */
1564 #ifdef CONFIG_OCV
1565 	wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_OCV, ssid->ocv);
1566 #endif /* CONFIG_OCV */
1567 
1568 	if (wpa_sm_set_assoc_wpa_ie_default(wpa_s->wpa, wpa_ie, wpa_ie_len)) {
1569 		wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to generate WPA IE");
1570 		return -1;
1571 	}
1572 
1573 	if (0) {
1574 #ifdef CONFIG_DPP
1575 	} else if (wpa_s->key_mgmt == WPA_KEY_MGMT_DPP) {
1576 		/* Use PMK from DPP network introduction (PMKSA entry) */
1577 		wpa_sm_set_pmk_from_pmksa(wpa_s->wpa);
1578 #endif /* CONFIG_DPP */
1579 	} else if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt)) {
1580 		int psk_set = 0;
1581 		int sae_only;
1582 
1583 		sae_only = (ssid->key_mgmt & (WPA_KEY_MGMT_PSK |
1584 					      WPA_KEY_MGMT_FT_PSK |
1585 					      WPA_KEY_MGMT_PSK_SHA256)) == 0;
1586 
1587 		if (ssid->psk_set && !sae_only) {
1588 			wpa_hexdump_key(MSG_MSGDUMP, "PSK (set in config)",
1589 					ssid->psk, PMK_LEN);
1590 			wpa_sm_set_pmk(wpa_s->wpa, ssid->psk, PMK_LEN, NULL,
1591 				       NULL);
1592 			psk_set = 1;
1593 		}
1594 
1595 		if (wpa_key_mgmt_sae(ssid->key_mgmt) &&
1596 		    (ssid->sae_password || ssid->passphrase))
1597 			psk_set = 1;
1598 
1599 #ifndef CONFIG_NO_PBKDF2
1600 		if (bss && ssid->bssid_set && ssid->ssid_len == 0 &&
1601 		    ssid->passphrase && !sae_only) {
1602 			u8 psk[PMK_LEN];
1603 		        pbkdf2_sha1(ssid->passphrase, bss->ssid, bss->ssid_len,
1604 				    4096, psk, PMK_LEN);
1605 		        wpa_hexdump_key(MSG_MSGDUMP, "PSK (from passphrase)",
1606 					psk, PMK_LEN);
1607 			wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL, NULL);
1608 			psk_set = 1;
1609 			os_memset(psk, 0, sizeof(psk));
1610 		}
1611 #endif /* CONFIG_NO_PBKDF2 */
1612 #ifdef CONFIG_EXT_PASSWORD
1613 		if (ssid->ext_psk && !sae_only) {
1614 			struct wpabuf *pw = ext_password_get(wpa_s->ext_pw,
1615 							     ssid->ext_psk);
1616 			char pw_str[64 + 1];
1617 			u8 psk[PMK_LEN];
1618 
1619 			if (pw == NULL) {
1620 				wpa_msg(wpa_s, MSG_INFO, "EXT PW: No PSK "
1621 					"found from external storage");
1622 				return -1;
1623 			}
1624 
1625 			if (wpabuf_len(pw) < 8 || wpabuf_len(pw) > 64) {
1626 				wpa_msg(wpa_s, MSG_INFO, "EXT PW: Unexpected "
1627 					"PSK length %d in external storage",
1628 					(int) wpabuf_len(pw));
1629 				ext_password_free(pw);
1630 				return -1;
1631 			}
1632 
1633 			os_memcpy(pw_str, wpabuf_head(pw), wpabuf_len(pw));
1634 			pw_str[wpabuf_len(pw)] = '\0';
1635 
1636 #ifndef CONFIG_NO_PBKDF2
1637 			if (wpabuf_len(pw) >= 8 && wpabuf_len(pw) < 64 && bss)
1638 			{
1639 				pbkdf2_sha1(pw_str, bss->ssid, bss->ssid_len,
1640 					    4096, psk, PMK_LEN);
1641 				os_memset(pw_str, 0, sizeof(pw_str));
1642 				wpa_hexdump_key(MSG_MSGDUMP, "PSK (from "
1643 						"external passphrase)",
1644 						psk, PMK_LEN);
1645 				wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL,
1646 					       NULL);
1647 				psk_set = 1;
1648 				os_memset(psk, 0, sizeof(psk));
1649 			} else
1650 #endif /* CONFIG_NO_PBKDF2 */
1651 			if (wpabuf_len(pw) == 2 * PMK_LEN) {
1652 				if (hexstr2bin(pw_str, psk, PMK_LEN) < 0) {
1653 					wpa_msg(wpa_s, MSG_INFO, "EXT PW: "
1654 						"Invalid PSK hex string");
1655 					os_memset(pw_str, 0, sizeof(pw_str));
1656 					ext_password_free(pw);
1657 					return -1;
1658 				}
1659 				wpa_hexdump_key(MSG_MSGDUMP,
1660 						"PSK (from external PSK)",
1661 						psk, PMK_LEN);
1662 				wpa_sm_set_pmk(wpa_s->wpa, psk, PMK_LEN, NULL,
1663 					       NULL);
1664 				psk_set = 1;
1665 				os_memset(psk, 0, sizeof(psk));
1666 			} else {
1667 				wpa_msg(wpa_s, MSG_INFO, "EXT PW: No suitable "
1668 					"PSK available");
1669 				os_memset(pw_str, 0, sizeof(pw_str));
1670 				ext_password_free(pw);
1671 				return -1;
1672 			}
1673 
1674 			os_memset(pw_str, 0, sizeof(pw_str));
1675 			ext_password_free(pw);
1676 		}
1677 #endif /* CONFIG_EXT_PASSWORD */
1678 
1679 		if (!psk_set) {
1680 			wpa_msg(wpa_s, MSG_INFO,
1681 				"No PSK available for association");
1682 			wpas_auth_failed(wpa_s, "NO_PSK_AVAILABLE");
1683 			return -1;
1684 		}
1685 #ifdef CONFIG_OWE
1686 	} else if (wpa_s->key_mgmt == WPA_KEY_MGMT_OWE) {
1687 		/* OWE Diffie-Hellman exchange in (Re)Association
1688 		 * Request/Response frames set the PMK, so do not override it
1689 		 * here. */
1690 #endif /* CONFIG_OWE */
1691 	} else
1692 		wpa_sm_set_pmk_from_pmksa(wpa_s->wpa);
1693 
1694 	return 0;
1695 }
1696 
1697 
wpas_ext_capab_byte(struct wpa_supplicant * wpa_s,u8 * pos,int idx)1698 static void wpas_ext_capab_byte(struct wpa_supplicant *wpa_s, u8 *pos, int idx)
1699 {
1700 	*pos = 0x00;
1701 
1702 	switch (idx) {
1703 	case 0: /* Bits 0-7 */
1704 		break;
1705 	case 1: /* Bits 8-15 */
1706 		if (wpa_s->conf->coloc_intf_reporting) {
1707 			/* Bit 13 - Collocated Interference Reporting */
1708 			*pos |= 0x20;
1709 		}
1710 		break;
1711 	case 2: /* Bits 16-23 */
1712 #ifdef CONFIG_WNM
1713 		*pos |= 0x02; /* Bit 17 - WNM-Sleep Mode */
1714 		if (!wpa_s->conf->disable_btm)
1715 			*pos |= 0x08; /* Bit 19 - BSS Transition */
1716 #endif /* CONFIG_WNM */
1717 		break;
1718 	case 3: /* Bits 24-31 */
1719 #ifdef CONFIG_WNM
1720 		*pos |= 0x02; /* Bit 25 - SSID List */
1721 #endif /* CONFIG_WNM */
1722 #ifdef CONFIG_INTERWORKING
1723 		if (wpa_s->conf->interworking)
1724 			*pos |= 0x80; /* Bit 31 - Interworking */
1725 #endif /* CONFIG_INTERWORKING */
1726 		break;
1727 	case 4: /* Bits 32-39 */
1728 #ifdef CONFIG_INTERWORKING
1729 		if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_QOS_MAPPING)
1730 			*pos |= 0x01; /* Bit 32 - QoS Map */
1731 #endif /* CONFIG_INTERWORKING */
1732 		break;
1733 	case 5: /* Bits 40-47 */
1734 #ifdef CONFIG_HS20
1735 		if (wpa_s->conf->hs20)
1736 			*pos |= 0x40; /* Bit 46 - WNM-Notification */
1737 #endif /* CONFIG_HS20 */
1738 #ifdef CONFIG_MBO
1739 		*pos |= 0x40; /* Bit 46 - WNM-Notification */
1740 #endif /* CONFIG_MBO */
1741 		break;
1742 	case 6: /* Bits 48-55 */
1743 		break;
1744 	case 7: /* Bits 56-63 */
1745 		break;
1746 	case 8: /* Bits 64-71 */
1747 		if (wpa_s->conf->ftm_responder)
1748 			*pos |= 0x40; /* Bit 70 - FTM responder */
1749 		if (wpa_s->conf->ftm_initiator)
1750 			*pos |= 0x80; /* Bit 71 - FTM initiator */
1751 		break;
1752 	case 9: /* Bits 72-79 */
1753 #ifdef CONFIG_FILS
1754 		if (!wpa_s->disable_fils)
1755 			*pos |= 0x01;
1756 #endif /* CONFIG_FILS */
1757 		break;
1758 	}
1759 }
1760 
1761 
wpas_build_ext_capab(struct wpa_supplicant * wpa_s,u8 * buf,size_t buflen)1762 int wpas_build_ext_capab(struct wpa_supplicant *wpa_s, u8 *buf, size_t buflen)
1763 {
1764 	u8 *pos = buf;
1765 	u8 len = 10, i;
1766 
1767 	if (len < wpa_s->extended_capa_len)
1768 		len = wpa_s->extended_capa_len;
1769 	if (buflen < (size_t) len + 2) {
1770 		wpa_printf(MSG_INFO,
1771 			   "Not enough room for building extended capabilities element");
1772 		return -1;
1773 	}
1774 
1775 	*pos++ = WLAN_EID_EXT_CAPAB;
1776 	*pos++ = len;
1777 	for (i = 0; i < len; i++, pos++) {
1778 		wpas_ext_capab_byte(wpa_s, pos, i);
1779 
1780 		if (i < wpa_s->extended_capa_len) {
1781 			*pos &= ~wpa_s->extended_capa_mask[i];
1782 			*pos |= wpa_s->extended_capa[i];
1783 		}
1784 	}
1785 
1786 	while (len > 0 && buf[1 + len] == 0) {
1787 		len--;
1788 		buf[1] = len;
1789 	}
1790 	if (len == 0)
1791 		return 0;
1792 
1793 	return 2 + len;
1794 }
1795 
1796 
wpas_valid_bss(struct wpa_supplicant * wpa_s,struct wpa_bss * test_bss)1797 static int wpas_valid_bss(struct wpa_supplicant *wpa_s,
1798 			  struct wpa_bss *test_bss)
1799 {
1800 	struct wpa_bss *bss;
1801 
1802 	dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
1803 		if (bss == test_bss)
1804 			return 1;
1805 	}
1806 
1807 	return 0;
1808 }
1809 
1810 
wpas_valid_ssid(struct wpa_supplicant * wpa_s,struct wpa_ssid * test_ssid)1811 static int wpas_valid_ssid(struct wpa_supplicant *wpa_s,
1812 			   struct wpa_ssid *test_ssid)
1813 {
1814 	struct wpa_ssid *ssid;
1815 
1816 	for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
1817 		if (ssid == test_ssid)
1818 			return 1;
1819 	}
1820 
1821 	return 0;
1822 }
1823 
1824 
wpas_valid_bss_ssid(struct wpa_supplicant * wpa_s,struct wpa_bss * test_bss,struct wpa_ssid * test_ssid)1825 int wpas_valid_bss_ssid(struct wpa_supplicant *wpa_s, struct wpa_bss *test_bss,
1826 			struct wpa_ssid *test_ssid)
1827 {
1828 	if (test_bss && !wpas_valid_bss(wpa_s, test_bss))
1829 		return 0;
1830 
1831 	return test_ssid == NULL || wpas_valid_ssid(wpa_s, test_ssid);
1832 }
1833 
1834 
wpas_connect_work_free(struct wpa_connect_work * cwork)1835 void wpas_connect_work_free(struct wpa_connect_work *cwork)
1836 {
1837 	if (cwork == NULL)
1838 		return;
1839 	os_free(cwork);
1840 }
1841 
1842 
wpas_connect_work_done(struct wpa_supplicant * wpa_s)1843 void wpas_connect_work_done(struct wpa_supplicant *wpa_s)
1844 {
1845 	struct wpa_connect_work *cwork;
1846 	struct wpa_radio_work *work = wpa_s->connect_work;
1847 
1848 	if (!work)
1849 		return;
1850 
1851 	wpa_s->connect_work = NULL;
1852 	cwork = work->ctx;
1853 	work->ctx = NULL;
1854 	wpas_connect_work_free(cwork);
1855 	radio_work_done(work);
1856 }
1857 
1858 
wpas_update_random_addr(struct wpa_supplicant * wpa_s,int style)1859 int wpas_update_random_addr(struct wpa_supplicant *wpa_s, int style)
1860 {
1861 	struct os_reltime now;
1862 	u8 addr[ETH_ALEN];
1863 
1864 	os_get_reltime(&now);
1865 	if (wpa_s->last_mac_addr_style == style &&
1866 	    wpa_s->last_mac_addr_change.sec != 0 &&
1867 	    !os_reltime_expired(&now, &wpa_s->last_mac_addr_change,
1868 				wpa_s->conf->rand_addr_lifetime)) {
1869 		wpa_msg(wpa_s, MSG_DEBUG,
1870 			"Previously selected random MAC address has not yet expired");
1871 		return 0;
1872 	}
1873 
1874 	switch (style) {
1875 	case 1:
1876 		if (random_mac_addr(addr) < 0)
1877 			return -1;
1878 		break;
1879 	case 2:
1880 		os_memcpy(addr, wpa_s->perm_addr, ETH_ALEN);
1881 		if (random_mac_addr_keep_oui(addr) < 0)
1882 			return -1;
1883 		break;
1884 	default:
1885 		return -1;
1886 	}
1887 
1888 	if (wpa_drv_set_mac_addr(wpa_s, addr) < 0) {
1889 		wpa_msg(wpa_s, MSG_INFO,
1890 			"Failed to set random MAC address");
1891 		return -1;
1892 	}
1893 
1894 	os_get_reltime(&wpa_s->last_mac_addr_change);
1895 	wpa_s->mac_addr_changed = 1;
1896 	wpa_s->last_mac_addr_style = style;
1897 
1898 	if (wpa_supplicant_update_mac_addr(wpa_s) < 0) {
1899 		wpa_msg(wpa_s, MSG_INFO,
1900 			"Could not update MAC address information");
1901 		return -1;
1902 	}
1903 
1904 	wpa_msg(wpa_s, MSG_DEBUG, "Using random MAC address " MACSTR,
1905 		MAC2STR(addr));
1906 
1907 	return 0;
1908 }
1909 
1910 
wpas_update_random_addr_disassoc(struct wpa_supplicant * wpa_s)1911 int wpas_update_random_addr_disassoc(struct wpa_supplicant *wpa_s)
1912 {
1913 	if (wpa_s->wpa_state >= WPA_AUTHENTICATING ||
1914 	    !wpa_s->conf->preassoc_mac_addr)
1915 		return 0;
1916 
1917 	return wpas_update_random_addr(wpa_s, wpa_s->conf->preassoc_mac_addr);
1918 }
1919 
1920 
1921 static void wpas_start_assoc_cb(struct wpa_radio_work *work, int deinit);
1922 
1923 /**
1924  * wpa_supplicant_associate - Request association
1925  * @wpa_s: Pointer to wpa_supplicant data
1926  * @bss: Scan results for the selected BSS, or %NULL if not available
1927  * @ssid: Configuration data for the selected network
1928  *
1929  * This function is used to request %wpa_supplicant to associate with a BSS.
1930  */
wpa_supplicant_associate(struct wpa_supplicant * wpa_s,struct wpa_bss * bss,struct wpa_ssid * ssid)1931 void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
1932 			      struct wpa_bss *bss, struct wpa_ssid *ssid)
1933 {
1934 	struct wpa_connect_work *cwork;
1935 	int rand_style;
1936 
1937 	wpa_s->own_disconnect_req = 0;
1938 
1939 	/*
1940 	 * If we are starting a new connection, any previously pending EAPOL
1941 	 * RX cannot be valid anymore.
1942 	 */
1943 	wpabuf_free(wpa_s->pending_eapol_rx);
1944 	wpa_s->pending_eapol_rx = NULL;
1945 
1946 	if (ssid->mac_addr == -1)
1947 		rand_style = wpa_s->conf->mac_addr;
1948 	else
1949 		rand_style = ssid->mac_addr;
1950 
1951 	wmm_ac_clear_saved_tspecs(wpa_s);
1952 	wpa_s->reassoc_same_bss = 0;
1953 	wpa_s->reassoc_same_ess = 0;
1954 #ifdef CONFIG_TESTING_OPTIONS
1955 	wpa_s->testing_resend_assoc = 0;
1956 #endif /* CONFIG_TESTING_OPTIONS */
1957 
1958 	if (wpa_s->last_ssid == ssid) {
1959 		wpa_dbg(wpa_s, MSG_DEBUG, "Re-association to the same ESS");
1960 		wpa_s->reassoc_same_ess = 1;
1961 		if (wpa_s->current_bss && wpa_s->current_bss == bss) {
1962 			wmm_ac_save_tspecs(wpa_s);
1963 			wpa_s->reassoc_same_bss = 1;
1964 		} else if (wpa_s->current_bss && wpa_s->current_bss != bss) {
1965 			os_get_reltime(&wpa_s->roam_start);
1966 		}
1967 	}
1968 
1969 	if (rand_style > 0 && !wpa_s->reassoc_same_ess) {
1970 		if (wpas_update_random_addr(wpa_s, rand_style) < 0)
1971 			return;
1972 		wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
1973 	} else if (rand_style == 0 && wpa_s->mac_addr_changed) {
1974 		if (wpa_drv_set_mac_addr(wpa_s, NULL) < 0) {
1975 			wpa_msg(wpa_s, MSG_INFO,
1976 				"Could not restore permanent MAC address");
1977 			return;
1978 		}
1979 		wpa_s->mac_addr_changed = 0;
1980 		if (wpa_supplicant_update_mac_addr(wpa_s) < 0) {
1981 			wpa_msg(wpa_s, MSG_INFO,
1982 				"Could not update MAC address information");
1983 			return;
1984 		}
1985 		wpa_msg(wpa_s, MSG_DEBUG, "Using permanent MAC address");
1986 	}
1987 	wpa_s->last_ssid = ssid;
1988 
1989 #ifdef CONFIG_IBSS_RSN
1990 	ibss_rsn_deinit(wpa_s->ibss_rsn);
1991 	wpa_s->ibss_rsn = NULL;
1992 #else /* CONFIG_IBSS_RSN */
1993 	if (ssid->mode == WPAS_MODE_IBSS &&
1994 	    !(ssid->key_mgmt & (WPA_KEY_MGMT_NONE | WPA_KEY_MGMT_WPA_NONE))) {
1995 		wpa_msg(wpa_s, MSG_INFO,
1996 			"IBSS RSN not supported in the build");
1997 		return;
1998 	}
1999 #endif /* CONFIG_IBSS_RSN */
2000 
2001 	if (ssid->mode == WPAS_MODE_AP || ssid->mode == WPAS_MODE_P2P_GO ||
2002 	    ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION) {
2003 #ifdef CONFIG_AP
2004 		if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_AP)) {
2005 			wpa_msg(wpa_s, MSG_INFO, "Driver does not support AP "
2006 				"mode");
2007 			return;
2008 		}
2009 		if (wpa_supplicant_create_ap(wpa_s, ssid) < 0) {
2010 			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
2011 			if (ssid->mode == WPAS_MODE_P2P_GROUP_FORMATION)
2012 				wpas_p2p_ap_setup_failed(wpa_s);
2013 			return;
2014 		}
2015 		wpa_s->current_bss = bss;
2016 #else /* CONFIG_AP */
2017 		wpa_msg(wpa_s, MSG_ERROR, "AP mode support not included in "
2018 			"the build");
2019 #endif /* CONFIG_AP */
2020 		return;
2021 	}
2022 
2023 	if (ssid->mode == WPAS_MODE_MESH) {
2024 #ifdef CONFIG_MESH
2025 		if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_MESH)) {
2026 			wpa_msg(wpa_s, MSG_INFO,
2027 				"Driver does not support mesh mode");
2028 			return;
2029 		}
2030 		if (bss)
2031 			ssid->frequency = bss->freq;
2032 		if (wpa_supplicant_join_mesh(wpa_s, ssid) < 0) {
2033 			wpa_msg(wpa_s, MSG_ERROR, "Could not join mesh");
2034 			return;
2035 		}
2036 		wpa_s->current_bss = bss;
2037 		wpa_msg(wpa_s, MSG_INFO, MESH_GROUP_STARTED "ssid=\"%s\" id=%d",
2038 			wpa_ssid_txt(ssid->ssid, ssid->ssid_len),
2039 			ssid->id);
2040 		wpas_notify_mesh_group_started(wpa_s, ssid);
2041 #else /* CONFIG_MESH */
2042 		wpa_msg(wpa_s, MSG_ERROR,
2043 			"mesh mode support not included in the build");
2044 #endif /* CONFIG_MESH */
2045 		return;
2046 	}
2047 
2048 	/*
2049 	 * Set WPA state machine configuration to match the selected network now
2050 	 * so that the information is available before wpas_start_assoc_cb()
2051 	 * gets called. This is needed at least for RSN pre-authentication where
2052 	 * candidate APs are added to a list based on scan result processing
2053 	 * before completion of the first association.
2054 	 */
2055 	wpa_supplicant_rsn_supp_set_config(wpa_s, ssid);
2056 
2057 #ifdef CONFIG_DPP
2058 	if (wpas_dpp_check_connect(wpa_s, ssid, bss) != 0)
2059 		return;
2060 #endif /* CONFIG_DPP */
2061 
2062 #ifdef CONFIG_TDLS
2063 	if (bss)
2064 		wpa_tdls_ap_ies(wpa_s->wpa, (const u8 *) (bss + 1),
2065 				bss->ie_len);
2066 #endif /* CONFIG_TDLS */
2067 
2068 	if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
2069 	    ssid->mode == WPAS_MODE_INFRA) {
2070 		sme_authenticate(wpa_s, bss, ssid);
2071 		return;
2072 	}
2073 
2074 	if (wpa_s->connect_work) {
2075 		wpa_dbg(wpa_s, MSG_DEBUG, "Reject wpa_supplicant_associate() call since connect_work exist");
2076 		return;
2077 	}
2078 
2079 	if (radio_work_pending(wpa_s, "connect")) {
2080 		wpa_dbg(wpa_s, MSG_DEBUG, "Reject wpa_supplicant_associate() call since pending work exist");
2081 		return;
2082 	}
2083 
2084 #ifdef CONFIG_SME
2085 	if (ssid->mode == WPAS_MODE_IBSS || ssid->mode == WPAS_MODE_MESH) {
2086 		/* Clear possibly set auth_alg, if any, from last attempt. */
2087 		wpa_s->sme.auth_alg = WPA_AUTH_ALG_OPEN;
2088 	}
2089 #endif /* CONFIG_SME */
2090 
2091 	wpas_abort_ongoing_scan(wpa_s);
2092 
2093 	cwork = os_zalloc(sizeof(*cwork));
2094 	if (cwork == NULL)
2095 		return;
2096 
2097 	cwork->bss = bss;
2098 	cwork->ssid = ssid;
2099 
2100 	if (radio_add_work(wpa_s, bss ? bss->freq : 0, "connect", 1,
2101 			   wpas_start_assoc_cb, cwork) < 0) {
2102 		os_free(cwork);
2103 	}
2104 }
2105 
2106 
bss_is_ibss(struct wpa_bss * bss)2107 static int bss_is_ibss(struct wpa_bss *bss)
2108 {
2109 	return (bss->caps & (IEEE80211_CAP_ESS | IEEE80211_CAP_IBSS)) ==
2110 		IEEE80211_CAP_IBSS;
2111 }
2112 
2113 
drv_supports_vht(struct wpa_supplicant * wpa_s,const struct wpa_ssid * ssid)2114 static int drv_supports_vht(struct wpa_supplicant *wpa_s,
2115 			    const struct wpa_ssid *ssid)
2116 {
2117 	enum hostapd_hw_mode hw_mode;
2118 	struct hostapd_hw_modes *mode = NULL;
2119 	u8 channel;
2120 	int i;
2121 
2122 	hw_mode = ieee80211_freq_to_chan(ssid->frequency, &channel);
2123 	if (hw_mode == NUM_HOSTAPD_MODES)
2124 		return 0;
2125 	for (i = 0; wpa_s->hw.modes && i < wpa_s->hw.num_modes; i++) {
2126 		if (wpa_s->hw.modes[i].mode == hw_mode) {
2127 			mode = &wpa_s->hw.modes[i];
2128 			break;
2129 		}
2130 	}
2131 
2132 	if (!mode)
2133 		return 0;
2134 
2135 	return mode->vht_capab != 0;
2136 }
2137 
2138 
ibss_mesh_setup_freq(struct wpa_supplicant * wpa_s,const struct wpa_ssid * ssid,struct hostapd_freq_params * freq)2139 void ibss_mesh_setup_freq(struct wpa_supplicant *wpa_s,
2140 			  const struct wpa_ssid *ssid,
2141 			  struct hostapd_freq_params *freq)
2142 {
2143 	int ieee80211_mode = wpas_mode_to_ieee80211_mode(ssid->mode);
2144 	enum hostapd_hw_mode hw_mode;
2145 	struct hostapd_hw_modes *mode = NULL;
2146 	int ht40plus[] = { 36, 44, 52, 60, 100, 108, 116, 124, 132, 149, 157,
2147 			   184, 192 };
2148 	int vht80[] = { 36, 52, 100, 116, 132, 149 };
2149 	struct hostapd_channel_data *pri_chan = NULL, *sec_chan = NULL;
2150 	u8 channel;
2151 	int i, chan_idx, ht40 = -1, res, obss_scan = 1;
2152 	unsigned int j, k;
2153 	struct hostapd_freq_params vht_freq;
2154 	int chwidth, seg0, seg1;
2155 	u32 vht_caps = 0;
2156 
2157 	freq->freq = ssid->frequency;
2158 
2159 	for (j = 0; j < wpa_s->last_scan_res_used; j++) {
2160 		struct wpa_bss *bss = wpa_s->last_scan_res[j];
2161 
2162 		if (ssid->mode != WPAS_MODE_IBSS)
2163 			break;
2164 
2165 		/* Don't adjust control freq in case of fixed_freq */
2166 		if (ssid->fixed_freq)
2167 			break;
2168 
2169 		if (!bss_is_ibss(bss))
2170 			continue;
2171 
2172 		if (ssid->ssid_len == bss->ssid_len &&
2173 		    os_memcmp(ssid->ssid, bss->ssid, bss->ssid_len) == 0) {
2174 			wpa_printf(MSG_DEBUG,
2175 				   "IBSS already found in scan results, adjust control freq: %d",
2176 				   bss->freq);
2177 			freq->freq = bss->freq;
2178 			obss_scan = 0;
2179 			break;
2180 		}
2181 	}
2182 
2183 	/* For IBSS check HT_IBSS flag */
2184 	if (ssid->mode == WPAS_MODE_IBSS &&
2185 	    !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_HT_IBSS))
2186 		return;
2187 
2188 	if (wpa_s->group_cipher == WPA_CIPHER_WEP40 ||
2189 	    wpa_s->group_cipher == WPA_CIPHER_WEP104 ||
2190 	    wpa_s->pairwise_cipher == WPA_CIPHER_TKIP) {
2191 		wpa_printf(MSG_DEBUG,
2192 			   "IBSS: WEP/TKIP detected, do not try to enable HT");
2193 		return;
2194 	}
2195 
2196 	hw_mode = ieee80211_freq_to_chan(freq->freq, &channel);
2197 	for (i = 0; wpa_s->hw.modes && i < wpa_s->hw.num_modes; i++) {
2198 		if (wpa_s->hw.modes[i].mode == hw_mode) {
2199 			mode = &wpa_s->hw.modes[i];
2200 			break;
2201 		}
2202 	}
2203 
2204 	if (!mode)
2205 		return;
2206 
2207 	/* HE can work without HT + VHT */
2208 	freq->he_enabled = mode->he_capab[ieee80211_mode].he_supported;
2209 
2210 #ifdef CONFIG_HT_OVERRIDES
2211 	if (ssid->disable_ht) {
2212 		freq->ht_enabled = 0;
2213 		return;
2214 	}
2215 #endif /* CONFIG_HT_OVERRIDES */
2216 
2217 	freq->ht_enabled = ht_supported(mode);
2218 	if (!freq->ht_enabled)
2219 		return;
2220 
2221 	/* Setup higher BW only for 5 GHz */
2222 	if (mode->mode != HOSTAPD_MODE_IEEE80211A)
2223 		return;
2224 
2225 	for (chan_idx = 0; chan_idx < mode->num_channels; chan_idx++) {
2226 		pri_chan = &mode->channels[chan_idx];
2227 		if (pri_chan->chan == channel)
2228 			break;
2229 		pri_chan = NULL;
2230 	}
2231 	if (!pri_chan)
2232 		return;
2233 
2234 	/* Check primary channel flags */
2235 	if (pri_chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
2236 		return;
2237 
2238 	freq->channel = pri_chan->chan;
2239 
2240 #ifdef CONFIG_HT_OVERRIDES
2241 	if (ssid->disable_ht40) {
2242 		if (ssid->disable_vht)
2243 			return;
2244 		goto skip_ht40;
2245 	}
2246 #endif /* CONFIG_HT_OVERRIDES */
2247 
2248 	/* Check/setup HT40+/HT40- */
2249 	for (j = 0; j < ARRAY_SIZE(ht40plus); j++) {
2250 		if (ht40plus[j] == channel) {
2251 			ht40 = 1;
2252 			break;
2253 		}
2254 	}
2255 
2256 	/* Find secondary channel */
2257 	for (i = 0; i < mode->num_channels; i++) {
2258 		sec_chan = &mode->channels[i];
2259 		if (sec_chan->chan == channel + ht40 * 4)
2260 			break;
2261 		sec_chan = NULL;
2262 	}
2263 	if (!sec_chan)
2264 		return;
2265 
2266 	/* Check secondary channel flags */
2267 	if (sec_chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
2268 		return;
2269 
2270 	if (ht40 == -1) {
2271 		if (!(pri_chan->flag & HOSTAPD_CHAN_HT40MINUS))
2272 			return;
2273 	} else {
2274 		if (!(pri_chan->flag & HOSTAPD_CHAN_HT40PLUS))
2275 			return;
2276 	}
2277 	freq->sec_channel_offset = ht40;
2278 
2279 	if (obss_scan) {
2280 		struct wpa_scan_results *scan_res;
2281 
2282 		scan_res = wpa_supplicant_get_scan_results(wpa_s, NULL, 0);
2283 		if (scan_res == NULL) {
2284 			/* Back to HT20 */
2285 			freq->sec_channel_offset = 0;
2286 			return;
2287 		}
2288 
2289 		res = check_40mhz_5g(mode, scan_res, pri_chan->chan,
2290 				     sec_chan->chan);
2291 		switch (res) {
2292 		case 0:
2293 			/* Back to HT20 */
2294 			freq->sec_channel_offset = 0;
2295 			break;
2296 		case 1:
2297 			/* Configuration allowed */
2298 			break;
2299 		case 2:
2300 			/* Switch pri/sec channels */
2301 			freq->freq = hw_get_freq(mode, sec_chan->chan);
2302 			freq->sec_channel_offset = -freq->sec_channel_offset;
2303 			freq->channel = sec_chan->chan;
2304 			break;
2305 		default:
2306 			freq->sec_channel_offset = 0;
2307 			break;
2308 		}
2309 
2310 		wpa_scan_results_free(scan_res);
2311 	}
2312 
2313 #ifdef CONFIG_HT_OVERRIDES
2314 skip_ht40:
2315 #endif /* CONFIG_HT_OVERRIDES */
2316 	wpa_printf(MSG_DEBUG,
2317 		   "IBSS/mesh: setup freq channel %d, sec_channel_offset %d",
2318 		   freq->channel, freq->sec_channel_offset);
2319 
2320 	if (!drv_supports_vht(wpa_s, ssid))
2321 		return;
2322 
2323 	/* For IBSS check VHT_IBSS flag */
2324 	if (ssid->mode == WPAS_MODE_IBSS &&
2325 	    !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_VHT_IBSS))
2326 		return;
2327 
2328 	vht_freq = *freq;
2329 
2330 #ifdef CONFIG_VHT_OVERRIDES
2331 	if (ssid->disable_vht) {
2332 		freq->vht_enabled = 0;
2333 		return;
2334 	}
2335 #endif /* CONFIG_VHT_OVERRIDES */
2336 
2337 	vht_freq.vht_enabled = vht_supported(mode);
2338 	if (!vht_freq.vht_enabled)
2339 		return;
2340 
2341 	/* setup center_freq1, bandwidth */
2342 	for (j = 0; j < ARRAY_SIZE(vht80); j++) {
2343 		if (freq->channel >= vht80[j] &&
2344 		    freq->channel < vht80[j] + 16)
2345 			break;
2346 	}
2347 
2348 	if (j == ARRAY_SIZE(vht80))
2349 		return;
2350 
2351 	for (i = vht80[j]; i < vht80[j] + 16; i += 4) {
2352 		struct hostapd_channel_data *chan;
2353 
2354 		chan = hw_get_channel_chan(mode, i, NULL);
2355 		if (!chan)
2356 			return;
2357 
2358 		/* Back to HT configuration if channel not usable */
2359 		if (chan->flag & (HOSTAPD_CHAN_DISABLED | HOSTAPD_CHAN_NO_IR))
2360 			return;
2361 	}
2362 
2363 	chwidth = CHANWIDTH_80MHZ;
2364 	seg0 = vht80[j] + 6;
2365 	seg1 = 0;
2366 
2367 	if (ssid->max_oper_chwidth == CHANWIDTH_80P80MHZ) {
2368 		/* setup center_freq2, bandwidth */
2369 		for (k = 0; k < ARRAY_SIZE(vht80); k++) {
2370 			/* Only accept 80 MHz segments separated by a gap */
2371 			if (j == k || abs(vht80[j] - vht80[k]) == 16)
2372 				continue;
2373 			for (i = vht80[k]; i < vht80[k] + 16; i += 4) {
2374 				struct hostapd_channel_data *chan;
2375 
2376 				chan = hw_get_channel_chan(mode, i, NULL);
2377 				if (!chan)
2378 					continue;
2379 
2380 				if (chan->flag & (HOSTAPD_CHAN_DISABLED |
2381 						  HOSTAPD_CHAN_NO_IR |
2382 						  HOSTAPD_CHAN_RADAR))
2383 					continue;
2384 
2385 				/* Found a suitable second segment for 80+80 */
2386 				chwidth = CHANWIDTH_80P80MHZ;
2387 				vht_caps |=
2388 					VHT_CAP_SUPP_CHAN_WIDTH_160_80PLUS80MHZ;
2389 				seg1 = vht80[k] + 6;
2390 			}
2391 
2392 			if (chwidth == CHANWIDTH_80P80MHZ)
2393 				break;
2394 		}
2395 	} else if (ssid->max_oper_chwidth == CHANWIDTH_160MHZ) {
2396 		if (freq->freq == 5180) {
2397 			chwidth = CHANWIDTH_160MHZ;
2398 			vht_caps |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
2399 			seg0 = 50;
2400 		} else if (freq->freq == 5520) {
2401 			chwidth = CHANWIDTH_160MHZ;
2402 			vht_caps |= VHT_CAP_SUPP_CHAN_WIDTH_160MHZ;
2403 			seg0 = 114;
2404 		}
2405 	} else if (ssid->max_oper_chwidth == CHANWIDTH_USE_HT) {
2406 		chwidth = CHANWIDTH_USE_HT;
2407 		seg0 = vht80[j] + 2;
2408 #ifdef CONFIG_HT_OVERRIDES
2409 		if (ssid->disable_ht40)
2410 			seg0 = 0;
2411 #endif /* CONFIG_HT_OVERRIDES */
2412 	}
2413 
2414 	if (hostapd_set_freq_params(&vht_freq, mode->mode, freq->freq,
2415 				    freq->channel, freq->ht_enabled,
2416 				    vht_freq.vht_enabled, freq->he_enabled,
2417 				    freq->sec_channel_offset,
2418 				    chwidth, seg0, seg1, vht_caps,
2419 				    &mode->he_capab[ieee80211_mode]) != 0)
2420 		return;
2421 
2422 	*freq = vht_freq;
2423 
2424 	wpa_printf(MSG_DEBUG, "IBSS: VHT setup freq cf1 %d, cf2 %d, bw %d",
2425 		   freq->center_freq1, freq->center_freq2, freq->bandwidth);
2426 }
2427 
2428 
2429 #ifdef CONFIG_FILS
wpas_add_fils_hlp_req(struct wpa_supplicant * wpa_s,u8 * ie_buf,size_t ie_buf_len)2430 static size_t wpas_add_fils_hlp_req(struct wpa_supplicant *wpa_s, u8 *ie_buf,
2431 				    size_t ie_buf_len)
2432 {
2433 	struct fils_hlp_req *req;
2434 	size_t rem_len, hdr_len, hlp_len, len, ie_len = 0;
2435 	const u8 *pos;
2436 	u8 *buf = ie_buf;
2437 
2438 	dl_list_for_each(req, &wpa_s->fils_hlp_req, struct fils_hlp_req,
2439 			 list) {
2440 		rem_len = ie_buf_len - ie_len;
2441 		pos = wpabuf_head(req->pkt);
2442 		hdr_len = 1 + 2 * ETH_ALEN + 6;
2443 		hlp_len = wpabuf_len(req->pkt);
2444 
2445 		if (rem_len < 2 + hdr_len + hlp_len) {
2446 			wpa_printf(MSG_ERROR,
2447 				   "FILS: Cannot fit HLP - rem_len=%lu to_fill=%lu",
2448 				   (unsigned long) rem_len,
2449 				   (unsigned long) (2 + hdr_len + hlp_len));
2450 			break;
2451 		}
2452 
2453 		len = (hdr_len + hlp_len) > 255 ? 255 : hdr_len + hlp_len;
2454 		/* Element ID */
2455 		*buf++ = WLAN_EID_EXTENSION;
2456 		/* Length */
2457 		*buf++ = len;
2458 		/* Element ID Extension */
2459 		*buf++ = WLAN_EID_EXT_FILS_HLP_CONTAINER;
2460 		/* Destination MAC address */
2461 		os_memcpy(buf, req->dst, ETH_ALEN);
2462 		buf += ETH_ALEN;
2463 		/* Source MAC address */
2464 		os_memcpy(buf, wpa_s->own_addr, ETH_ALEN);
2465 		buf += ETH_ALEN;
2466 		/* LLC/SNAP Header */
2467 		os_memcpy(buf, "\xaa\xaa\x03\x00\x00\x00", 6);
2468 		buf += 6;
2469 		/* HLP Packet */
2470 		os_memcpy(buf, pos, len - hdr_len);
2471 		buf += len - hdr_len;
2472 		pos += len - hdr_len;
2473 
2474 		hlp_len -= len - hdr_len;
2475 		ie_len += 2 + len;
2476 		rem_len -= 2 + len;
2477 
2478 		while (hlp_len) {
2479 			len = (hlp_len > 255) ? 255 : hlp_len;
2480 			if (rem_len < 2 + len)
2481 				break;
2482 			*buf++ = WLAN_EID_FRAGMENT;
2483 			*buf++ = len;
2484 			os_memcpy(buf, pos, len);
2485 			buf += len;
2486 			pos += len;
2487 
2488 			hlp_len -= len;
2489 			ie_len += 2 + len;
2490 			rem_len -= 2 + len;
2491 		}
2492 	}
2493 
2494 	return ie_len;
2495 }
2496 
2497 
wpa_is_fils_supported(struct wpa_supplicant * wpa_s)2498 int wpa_is_fils_supported(struct wpa_supplicant *wpa_s)
2499 {
2500 	return (((wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
2501 		 (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SUPPORT_FILS)) ||
2502 		(!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
2503 		 (wpa_s->drv_flags & WPA_DRIVER_FLAGS_FILS_SK_OFFLOAD)));
2504 }
2505 
2506 
wpa_is_fils_sk_pfs_supported(struct wpa_supplicant * wpa_s)2507 int wpa_is_fils_sk_pfs_supported(struct wpa_supplicant *wpa_s)
2508 {
2509 #ifdef CONFIG_FILS_SK_PFS
2510 	return (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) &&
2511 		(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SUPPORT_FILS);
2512 #else /* CONFIG_FILS_SK_PFS */
2513 	return 0;
2514 #endif /* CONFIG_FILS_SK_PFS */
2515 }
2516 
2517 #endif /* CONFIG_FILS */
2518 
2519 
wpas_populate_assoc_ies(struct wpa_supplicant * wpa_s,struct wpa_bss * bss,struct wpa_ssid * ssid,struct wpa_driver_associate_params * params,enum wpa_drv_update_connect_params_mask * mask)2520 static u8 * wpas_populate_assoc_ies(
2521 	struct wpa_supplicant *wpa_s,
2522 	struct wpa_bss *bss, struct wpa_ssid *ssid,
2523 	struct wpa_driver_associate_params *params,
2524 	enum wpa_drv_update_connect_params_mask *mask)
2525 {
2526 	u8 *wpa_ie;
2527 	size_t max_wpa_ie_len = 500;
2528 	size_t wpa_ie_len;
2529 	int algs = WPA_AUTH_ALG_OPEN;
2530 #ifdef CONFIG_MBO
2531 	const u8 *mbo_ie;
2532 #endif
2533 #ifdef CONFIG_SAE
2534 	int sae_pmksa_cached = 0;
2535 #endif /* CONFIG_SAE */
2536 #ifdef CONFIG_FILS
2537 	const u8 *realm, *username, *rrk;
2538 	size_t realm_len, username_len, rrk_len;
2539 	u16 next_seq_num;
2540 	struct fils_hlp_req *req;
2541 
2542 	dl_list_for_each(req, &wpa_s->fils_hlp_req, struct fils_hlp_req,
2543 			 list) {
2544 		max_wpa_ie_len += 3 + 2 * ETH_ALEN + 6 + wpabuf_len(req->pkt) +
2545 				  2 + 2 * wpabuf_len(req->pkt) / 255;
2546 	}
2547 #endif /* CONFIG_FILS */
2548 
2549 	wpa_ie = os_malloc(max_wpa_ie_len);
2550 	if (!wpa_ie) {
2551 		wpa_printf(MSG_ERROR,
2552 			   "Failed to allocate connect IE buffer for %lu bytes",
2553 			   (unsigned long) max_wpa_ie_len);
2554 		return NULL;
2555 	}
2556 
2557 	if (bss && (wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) ||
2558 		    wpa_bss_get_ie(bss, WLAN_EID_RSN)) &&
2559 	    wpa_key_mgmt_wpa(ssid->key_mgmt)) {
2560 		int try_opportunistic;
2561 		const u8 *cache_id = NULL;
2562 
2563 		try_opportunistic = (ssid->proactive_key_caching < 0 ?
2564 				     wpa_s->conf->okc :
2565 				     ssid->proactive_key_caching) &&
2566 			(ssid->proto & WPA_PROTO_RSN);
2567 #ifdef CONFIG_FILS
2568 		if (wpa_key_mgmt_fils(ssid->key_mgmt))
2569 			cache_id = wpa_bss_get_fils_cache_id(bss);
2570 #endif /* CONFIG_FILS */
2571 		if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
2572 					    ssid, try_opportunistic,
2573 					    cache_id, 0) == 0) {
2574 			eapol_sm_notify_pmkid_attempt(wpa_s->eapol);
2575 #ifdef CONFIG_SAE
2576 			sae_pmksa_cached = 1;
2577 #endif /* CONFIG_SAE */
2578 		}
2579 		wpa_ie_len = max_wpa_ie_len;
2580 		if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
2581 					      wpa_ie, &wpa_ie_len)) {
2582 			wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to set WPA "
2583 				"key management and encryption suites");
2584 			os_free(wpa_ie);
2585 			return NULL;
2586 		}
2587 #ifdef CONFIG_HS20
2588 	} else if (bss && wpa_bss_get_vendor_ie(bss, OSEN_IE_VENDOR_TYPE) &&
2589 		   (ssid->key_mgmt & WPA_KEY_MGMT_OSEN)) {
2590 		/* No PMKSA caching, but otherwise similar to RSN/WPA */
2591 		wpa_ie_len = max_wpa_ie_len;
2592 		if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
2593 					      wpa_ie, &wpa_ie_len)) {
2594 			wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to set WPA "
2595 				"key management and encryption suites");
2596 			os_free(wpa_ie);
2597 			return NULL;
2598 		}
2599 #endif /* CONFIG_HS20 */
2600 	} else if ((ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) && bss &&
2601 		   wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt)) {
2602 		/*
2603 		 * Both WPA and non-WPA IEEE 802.1X enabled in configuration -
2604 		 * use non-WPA since the scan results did not indicate that the
2605 		 * AP is using WPA or WPA2.
2606 		 */
2607 		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
2608 		wpa_ie_len = 0;
2609 		wpa_s->wpa_proto = 0;
2610 	} else if (wpa_key_mgmt_wpa_any(ssid->key_mgmt)) {
2611 		wpa_ie_len = max_wpa_ie_len;
2612 		if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
2613 					      wpa_ie, &wpa_ie_len)) {
2614 			wpa_msg(wpa_s, MSG_WARNING, "WPA: Failed to set WPA "
2615 				"key management and encryption suites (no "
2616 				"scan results)");
2617 			os_free(wpa_ie);
2618 			return NULL;
2619 		}
2620 #ifdef CONFIG_WPS
2621 	} else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) {
2622 		struct wpabuf *wps_ie;
2623 		wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid));
2624 		if (wps_ie && wpabuf_len(wps_ie) <= max_wpa_ie_len) {
2625 			wpa_ie_len = wpabuf_len(wps_ie);
2626 			os_memcpy(wpa_ie, wpabuf_head(wps_ie), wpa_ie_len);
2627 		} else
2628 			wpa_ie_len = 0;
2629 		wpabuf_free(wps_ie);
2630 		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
2631 		if (!bss || (bss->caps & IEEE80211_CAP_PRIVACY))
2632 			params->wps = WPS_MODE_PRIVACY;
2633 		else
2634 			params->wps = WPS_MODE_OPEN;
2635 		wpa_s->wpa_proto = 0;
2636 #endif /* CONFIG_WPS */
2637 	} else {
2638 		wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
2639 		wpa_ie_len = 0;
2640 		wpa_s->wpa_proto = 0;
2641 	}
2642 
2643 #ifdef IEEE8021X_EAPOL
2644 	if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
2645 		if (ssid->leap) {
2646 			if (ssid->non_leap == 0)
2647 				algs = WPA_AUTH_ALG_LEAP;
2648 			else
2649 				algs |= WPA_AUTH_ALG_LEAP;
2650 		}
2651 	}
2652 
2653 #ifdef CONFIG_FILS
2654 	/* Clear FILS association */
2655 	wpa_sm_set_reset_fils_completed(wpa_s->wpa, 0);
2656 
2657 	if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_FILS_SK_OFFLOAD) &&
2658 	    ssid->eap.erp && wpa_key_mgmt_fils(wpa_s->key_mgmt) &&
2659 	    eapol_sm_get_erp_info(wpa_s->eapol, &ssid->eap, &username,
2660 				  &username_len, &realm, &realm_len,
2661 				  &next_seq_num, &rrk, &rrk_len) == 0 &&
2662 	    (!wpa_s->last_con_fail_realm ||
2663 	     wpa_s->last_con_fail_realm_len != realm_len ||
2664 	     os_memcmp(wpa_s->last_con_fail_realm, realm, realm_len) != 0)) {
2665 		algs = WPA_AUTH_ALG_FILS;
2666 		params->fils_erp_username = username;
2667 		params->fils_erp_username_len = username_len;
2668 		params->fils_erp_realm = realm;
2669 		params->fils_erp_realm_len = realm_len;
2670 		params->fils_erp_next_seq_num = next_seq_num;
2671 		params->fils_erp_rrk = rrk;
2672 		params->fils_erp_rrk_len = rrk_len;
2673 
2674 		if (mask)
2675 			*mask |= WPA_DRV_UPDATE_FILS_ERP_INFO;
2676 	}
2677 #endif /* CONFIG_FILS */
2678 #endif /* IEEE8021X_EAPOL */
2679 #ifdef CONFIG_SAE
2680 	if (wpa_s->key_mgmt & (WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_FT_SAE))
2681 		algs = WPA_AUTH_ALG_SAE;
2682 #endif /* CONFIG_SAE */
2683 
2684 	wpa_dbg(wpa_s, MSG_DEBUG, "Automatic auth_alg selection: 0x%x", algs);
2685 	if (ssid->auth_alg) {
2686 		algs = ssid->auth_alg;
2687 		wpa_dbg(wpa_s, MSG_DEBUG,
2688 			"Overriding auth_alg selection: 0x%x", algs);
2689 	}
2690 
2691 #ifdef CONFIG_SAE
2692 	if (sae_pmksa_cached && algs == WPA_AUTH_ALG_SAE) {
2693 		wpa_dbg(wpa_s, MSG_DEBUG,
2694 			"SAE: Use WPA_AUTH_ALG_OPEN for PMKSA caching attempt");
2695 		algs = WPA_AUTH_ALG_OPEN;
2696 	}
2697 #endif /* CONFIG_SAE */
2698 
2699 #ifdef CONFIG_P2P
2700 	if (wpa_s->global->p2p) {
2701 		u8 *pos;
2702 		size_t len;
2703 		int res;
2704 		pos = wpa_ie + wpa_ie_len;
2705 		len = max_wpa_ie_len - wpa_ie_len;
2706 		res = wpas_p2p_assoc_req_ie(wpa_s, bss, pos, len,
2707 					    ssid->p2p_group);
2708 		if (res >= 0)
2709 			wpa_ie_len += res;
2710 	}
2711 
2712 	wpa_s->cross_connect_disallowed = 0;
2713 	if (bss) {
2714 		struct wpabuf *p2p;
2715 		p2p = wpa_bss_get_vendor_ie_multi(bss, P2P_IE_VENDOR_TYPE);
2716 		if (p2p) {
2717 			wpa_s->cross_connect_disallowed =
2718 				p2p_get_cross_connect_disallowed(p2p);
2719 			wpabuf_free(p2p);
2720 			wpa_dbg(wpa_s, MSG_DEBUG, "P2P: WLAN AP %s cross "
2721 				"connection",
2722 				wpa_s->cross_connect_disallowed ?
2723 				"disallows" : "allows");
2724 		}
2725 	}
2726 
2727 	os_memset(wpa_s->p2p_ip_addr_info, 0, sizeof(wpa_s->p2p_ip_addr_info));
2728 #endif /* CONFIG_P2P */
2729 
2730 	if (bss) {
2731 		wpa_ie_len += wpas_supp_op_class_ie(wpa_s, ssid, bss->freq,
2732 						    wpa_ie + wpa_ie_len,
2733 						    max_wpa_ie_len -
2734 						    wpa_ie_len);
2735 	}
2736 
2737 	/*
2738 	 * Workaround: Add Extended Capabilities element only if the AP
2739 	 * included this element in Beacon/Probe Response frames. Some older
2740 	 * APs seem to have interoperability issues if this element is
2741 	 * included, so while the standard may require us to include the
2742 	 * element in all cases, it is justifiable to skip it to avoid
2743 	 * interoperability issues.
2744 	 */
2745 	if (ssid->p2p_group)
2746 		wpa_drv_get_ext_capa(wpa_s, WPA_IF_P2P_CLIENT);
2747 	else
2748 		wpa_drv_get_ext_capa(wpa_s, WPA_IF_STATION);
2749 
2750 	if (!bss || wpa_bss_get_ie(bss, WLAN_EID_EXT_CAPAB)) {
2751 		u8 ext_capab[18];
2752 		int ext_capab_len;
2753 		ext_capab_len = wpas_build_ext_capab(wpa_s, ext_capab,
2754 						     sizeof(ext_capab));
2755 		if (ext_capab_len > 0 &&
2756 		    wpa_ie_len + ext_capab_len <= max_wpa_ie_len) {
2757 			u8 *pos = wpa_ie;
2758 			if (wpa_ie_len > 0 && pos[0] == WLAN_EID_RSN)
2759 				pos += 2 + pos[1];
2760 			os_memmove(pos + ext_capab_len, pos,
2761 				   wpa_ie_len - (pos - wpa_ie));
2762 			wpa_ie_len += ext_capab_len;
2763 			os_memcpy(pos, ext_capab, ext_capab_len);
2764 		}
2765 	}
2766 
2767 #ifdef CONFIG_HS20
2768 	if (is_hs20_network(wpa_s, ssid, bss)) {
2769 		struct wpabuf *hs20;
2770 
2771 		hs20 = wpabuf_alloc(20 + MAX_ROAMING_CONS_OI_LEN);
2772 		if (hs20) {
2773 			int pps_mo_id = hs20_get_pps_mo_id(wpa_s, ssid);
2774 			size_t len;
2775 
2776 			wpas_hs20_add_indication(hs20, pps_mo_id,
2777 						 get_hs20_version(bss));
2778 			wpas_hs20_add_roam_cons_sel(hs20, ssid);
2779 			len = max_wpa_ie_len - wpa_ie_len;
2780 			if (wpabuf_len(hs20) <= len) {
2781 				os_memcpy(wpa_ie + wpa_ie_len,
2782 					  wpabuf_head(hs20), wpabuf_len(hs20));
2783 				wpa_ie_len += wpabuf_len(hs20);
2784 			}
2785 			wpabuf_free(hs20);
2786 
2787 			hs20_configure_frame_filters(wpa_s);
2788 		}
2789 	}
2790 #endif /* CONFIG_HS20 */
2791 
2792 	if (wpa_s->vendor_elem[VENDOR_ELEM_ASSOC_REQ]) {
2793 		struct wpabuf *buf = wpa_s->vendor_elem[VENDOR_ELEM_ASSOC_REQ];
2794 		size_t len;
2795 
2796 		len = max_wpa_ie_len - wpa_ie_len;
2797 		if (wpabuf_len(buf) <= len) {
2798 			os_memcpy(wpa_ie + wpa_ie_len,
2799 				  wpabuf_head(buf), wpabuf_len(buf));
2800 			wpa_ie_len += wpabuf_len(buf);
2801 		}
2802 	}
2803 
2804 #ifdef CONFIG_FST
2805 	if (wpa_s->fst_ies) {
2806 		int fst_ies_len = wpabuf_len(wpa_s->fst_ies);
2807 
2808 		if (wpa_ie_len + fst_ies_len <= max_wpa_ie_len) {
2809 			os_memcpy(wpa_ie + wpa_ie_len,
2810 				  wpabuf_head(wpa_s->fst_ies), fst_ies_len);
2811 			wpa_ie_len += fst_ies_len;
2812 		}
2813 	}
2814 #endif /* CONFIG_FST */
2815 
2816 #ifdef CONFIG_MBO
2817 	mbo_ie = bss ? wpa_bss_get_vendor_ie(bss, MBO_IE_VENDOR_TYPE) : NULL;
2818 	if (mbo_ie) {
2819 		int len;
2820 
2821 		len = wpas_mbo_ie(wpa_s, wpa_ie + wpa_ie_len,
2822 				  max_wpa_ie_len - wpa_ie_len,
2823 				  !!mbo_attr_from_mbo_ie(mbo_ie,
2824 							 OCE_ATTR_ID_CAPA_IND));
2825 		if (len >= 0)
2826 			wpa_ie_len += len;
2827 	}
2828 #endif /* CONFIG_MBO */
2829 
2830 #ifdef CONFIG_FILS
2831 	if (algs == WPA_AUTH_ALG_FILS) {
2832 		size_t len;
2833 
2834 		len = wpas_add_fils_hlp_req(wpa_s, wpa_ie + wpa_ie_len,
2835 					    max_wpa_ie_len - wpa_ie_len);
2836 		wpa_ie_len += len;
2837 	}
2838 #endif /* CONFIG_FILS */
2839 
2840 #ifdef CONFIG_OWE
2841 #ifdef CONFIG_TESTING_OPTIONS
2842 	if (get_ie_ext(wpa_ie, wpa_ie_len, WLAN_EID_EXT_OWE_DH_PARAM)) {
2843 		wpa_printf(MSG_INFO, "TESTING: Override OWE DH element");
2844 	} else
2845 #endif /* CONFIG_TESTING_OPTIONS */
2846 	if (algs == WPA_AUTH_ALG_OPEN &&
2847 	    ssid->key_mgmt == WPA_KEY_MGMT_OWE) {
2848 		struct wpabuf *owe_ie;
2849 		u16 group;
2850 
2851 		if (ssid->owe_group) {
2852 			group = ssid->owe_group;
2853 		} else if (wpa_s->assoc_status_code ==
2854 			   WLAN_STATUS_FINITE_CYCLIC_GROUP_NOT_SUPPORTED) {
2855 			if (wpa_s->last_owe_group == 19)
2856 				group = 20;
2857 			else if (wpa_s->last_owe_group == 20)
2858 				group = 21;
2859 			else
2860 				group = OWE_DH_GROUP;
2861 		} else {
2862 			group = OWE_DH_GROUP;
2863 		}
2864 
2865 		wpa_s->last_owe_group = group;
2866 		wpa_printf(MSG_DEBUG, "OWE: Try to use group %u", group);
2867 		owe_ie = owe_build_assoc_req(wpa_s->wpa, group);
2868 		if (owe_ie &&
2869 		    wpabuf_len(owe_ie) <= max_wpa_ie_len - wpa_ie_len) {
2870 			os_memcpy(wpa_ie + wpa_ie_len,
2871 				  wpabuf_head(owe_ie), wpabuf_len(owe_ie));
2872 			wpa_ie_len += wpabuf_len(owe_ie);
2873 		}
2874 		wpabuf_free(owe_ie);
2875 	}
2876 #endif /* CONFIG_OWE */
2877 
2878 #ifdef CONFIG_DPP2
2879 	if (wpa_sm_get_key_mgmt(wpa_s->wpa) == WPA_KEY_MGMT_DPP &&
2880 	    ssid->dpp_netaccesskey) {
2881 		dpp_pfs_free(wpa_s->dpp_pfs);
2882 		wpa_s->dpp_pfs = dpp_pfs_init(ssid->dpp_netaccesskey,
2883 					      ssid->dpp_netaccesskey_len);
2884 		if (!wpa_s->dpp_pfs) {
2885 			wpa_printf(MSG_DEBUG, "DPP: Could not initialize PFS");
2886 			/* Try to continue without PFS */
2887 			goto pfs_fail;
2888 		}
2889 		if (wpabuf_len(wpa_s->dpp_pfs->ie) <=
2890 		    max_wpa_ie_len - wpa_ie_len) {
2891 			os_memcpy(wpa_ie + wpa_ie_len,
2892 				  wpabuf_head(wpa_s->dpp_pfs->ie),
2893 				  wpabuf_len(wpa_s->dpp_pfs->ie));
2894 			wpa_ie_len += wpabuf_len(wpa_s->dpp_pfs->ie);
2895 		}
2896 	}
2897 pfs_fail:
2898 #endif /* CONFIG_DPP2 */
2899 
2900 #ifdef CONFIG_IEEE80211R
2901 	/*
2902 	 * Add MDIE under these conditions: the network profile allows FT,
2903 	 * the AP supports FT, and the mobility domain ID matches.
2904 	 */
2905 	if (bss && wpa_key_mgmt_ft(wpa_sm_get_key_mgmt(wpa_s->wpa))) {
2906 		const u8 *mdie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
2907 
2908 		if (mdie && mdie[1] >= MOBILITY_DOMAIN_ID_LEN) {
2909 			size_t len = 0;
2910 			const u8 *md = mdie + 2;
2911 			const u8 *wpa_md = wpa_sm_get_ft_md(wpa_s->wpa);
2912 
2913 			if (os_memcmp(md, wpa_md,
2914 				      MOBILITY_DOMAIN_ID_LEN) == 0) {
2915 				/* Add mobility domain IE */
2916 				len = wpa_ft_add_mdie(
2917 					wpa_s->wpa, wpa_ie + wpa_ie_len,
2918 					max_wpa_ie_len - wpa_ie_len, mdie);
2919 				wpa_ie_len += len;
2920 			}
2921 #ifdef CONFIG_SME
2922 			if (len > 0 && wpa_s->sme.ft_used &&
2923 			    wpa_sm_has_ptk(wpa_s->wpa)) {
2924 				wpa_dbg(wpa_s, MSG_DEBUG,
2925 					"SME: Trying to use FT over-the-air");
2926 				algs |= WPA_AUTH_ALG_FT;
2927 			}
2928 #endif /* CONFIG_SME */
2929 		}
2930 	}
2931 #endif /* CONFIG_IEEE80211R */
2932 
2933 	if (ssid->multi_ap_backhaul_sta) {
2934 		size_t multi_ap_ie_len;
2935 
2936 		multi_ap_ie_len = add_multi_ap_ie(wpa_ie + wpa_ie_len,
2937 						  max_wpa_ie_len - wpa_ie_len,
2938 						  MULTI_AP_BACKHAUL_STA);
2939 		if (multi_ap_ie_len == 0) {
2940 			wpa_printf(MSG_ERROR,
2941 				   "Multi-AP: Failed to build Multi-AP IE");
2942 			os_free(wpa_ie);
2943 			return NULL;
2944 		}
2945 		wpa_ie_len += multi_ap_ie_len;
2946 	}
2947 
2948 	params->wpa_ie = wpa_ie;
2949 	params->wpa_ie_len = wpa_ie_len;
2950 	params->auth_alg = algs;
2951 	if (mask)
2952 		*mask |= WPA_DRV_UPDATE_ASSOC_IES | WPA_DRV_UPDATE_AUTH_TYPE;
2953 
2954 	return wpa_ie;
2955 }
2956 
2957 
2958 #if defined(CONFIG_FILS) && defined(IEEE8021X_EAPOL)
wpas_update_fils_connect_params(struct wpa_supplicant * wpa_s)2959 static void wpas_update_fils_connect_params(struct wpa_supplicant *wpa_s)
2960 {
2961 	struct wpa_driver_associate_params params;
2962 	enum wpa_drv_update_connect_params_mask mask = 0;
2963 	u8 *wpa_ie;
2964 
2965 	if (wpa_s->auth_alg != WPA_AUTH_ALG_OPEN)
2966 		return; /* nothing to do */
2967 
2968 	os_memset(&params, 0, sizeof(params));
2969 	wpa_ie = wpas_populate_assoc_ies(wpa_s, wpa_s->current_bss,
2970 					 wpa_s->current_ssid, &params, &mask);
2971 	if (!wpa_ie)
2972 		return;
2973 
2974 	if (params.auth_alg != WPA_AUTH_ALG_FILS) {
2975 		os_free(wpa_ie);
2976 		return;
2977 	}
2978 
2979 	wpa_s->auth_alg = params.auth_alg;
2980 	wpa_drv_update_connect_params(wpa_s, &params, mask);
2981 	os_free(wpa_ie);
2982 }
2983 #endif /* CONFIG_FILS && IEEE8021X_EAPOL */
2984 
2985 
2986 #ifdef CONFIG_MBO
wpas_update_mbo_connect_params(struct wpa_supplicant * wpa_s)2987 void wpas_update_mbo_connect_params(struct wpa_supplicant *wpa_s)
2988 {
2989 	struct wpa_driver_associate_params params;
2990 	u8 *wpa_ie;
2991 
2992 	/*
2993 	 * Update MBO connect params only in case of change of MBO attributes
2994 	 * when connected, if the AP support MBO.
2995 	 */
2996 
2997 	if (wpa_s->wpa_state != WPA_COMPLETED || !wpa_s->current_ssid ||
2998 	    !wpa_s->current_bss ||
2999 	    !wpa_bss_get_vendor_ie(wpa_s->current_bss, MBO_IE_VENDOR_TYPE))
3000 		return;
3001 
3002 	os_memset(&params, 0, sizeof(params));
3003 	wpa_ie = wpas_populate_assoc_ies(wpa_s, wpa_s->current_bss,
3004 					 wpa_s->current_ssid, &params, NULL);
3005 	if (!wpa_ie)
3006 		return;
3007 
3008 	wpa_drv_update_connect_params(wpa_s, &params, WPA_DRV_UPDATE_ASSOC_IES);
3009 	os_free(wpa_ie);
3010 }
3011 #endif /* CONFIG_MBO */
3012 
3013 
wpas_start_assoc_cb(struct wpa_radio_work * work,int deinit)3014 static void wpas_start_assoc_cb(struct wpa_radio_work *work, int deinit)
3015 {
3016 	struct wpa_connect_work *cwork = work->ctx;
3017 	struct wpa_bss *bss = cwork->bss;
3018 	struct wpa_ssid *ssid = cwork->ssid;
3019 	struct wpa_supplicant *wpa_s = work->wpa_s;
3020 	u8 *wpa_ie;
3021 	int use_crypt, ret, i, bssid_changed;
3022 	unsigned int cipher_pairwise, cipher_group, cipher_group_mgmt;
3023 	struct wpa_driver_associate_params params;
3024 	int wep_keys_set = 0;
3025 	int assoc_failed = 0;
3026 	struct wpa_ssid *old_ssid;
3027 	u8 prev_bssid[ETH_ALEN];
3028 #ifdef CONFIG_HT_OVERRIDES
3029 	struct ieee80211_ht_capabilities htcaps;
3030 	struct ieee80211_ht_capabilities htcaps_mask;
3031 #endif /* CONFIG_HT_OVERRIDES */
3032 #ifdef CONFIG_VHT_OVERRIDES
3033        struct ieee80211_vht_capabilities vhtcaps;
3034        struct ieee80211_vht_capabilities vhtcaps_mask;
3035 #endif /* CONFIG_VHT_OVERRIDES */
3036 
3037 	if (deinit) {
3038 		if (work->started) {
3039 			wpa_s->connect_work = NULL;
3040 
3041 			/* cancel possible auth. timeout */
3042 			eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s,
3043 					     NULL);
3044 		}
3045 		wpas_connect_work_free(cwork);
3046 		return;
3047 	}
3048 
3049 	wpa_s->connect_work = work;
3050 
3051 	if (cwork->bss_removed || !wpas_valid_bss_ssid(wpa_s, bss, ssid) ||
3052 	    wpas_network_disabled(wpa_s, ssid)) {
3053 		wpa_dbg(wpa_s, MSG_DEBUG, "BSS/SSID entry for association not valid anymore - drop connection attempt");
3054 		wpas_connect_work_done(wpa_s);
3055 		return;
3056 	}
3057 
3058 	os_memcpy(prev_bssid, wpa_s->bssid, ETH_ALEN);
3059 	os_memset(&params, 0, sizeof(params));
3060 	wpa_s->reassociate = 0;
3061 	wpa_s->eap_expected_failure = 0;
3062 	if (bss &&
3063 	    (!wpas_driver_bss_selection(wpa_s) || wpas_wps_searching(wpa_s))) {
3064 #ifdef CONFIG_IEEE80211R
3065 		const u8 *ie, *md = NULL;
3066 #endif /* CONFIG_IEEE80211R */
3067 		wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR
3068 			" (SSID='%s' freq=%d MHz)", MAC2STR(bss->bssid),
3069 			wpa_ssid_txt(bss->ssid, bss->ssid_len), bss->freq);
3070 		bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
3071 		os_memset(wpa_s->bssid, 0, ETH_ALEN);
3072 		os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
3073 		if (bssid_changed)
3074 			wpas_notify_bssid_changed(wpa_s);
3075 #ifdef CONFIG_IEEE80211R
3076 		ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
3077 		if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
3078 			md = ie + 2;
3079 		wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
3080 		if (md) {
3081 			/* Prepare for the next transition */
3082 			wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
3083 		}
3084 #endif /* CONFIG_IEEE80211R */
3085 #ifdef CONFIG_WPS
3086 	} else if ((ssid->ssid == NULL || ssid->ssid_len == 0) &&
3087 		   wpa_s->conf->ap_scan == 2 &&
3088 		   (ssid->key_mgmt & WPA_KEY_MGMT_WPS)) {
3089 		/* Use ap_scan==1 style network selection to find the network
3090 		 */
3091 		wpas_connect_work_done(wpa_s);
3092 		wpa_s->scan_req = MANUAL_SCAN_REQ;
3093 		wpa_s->reassociate = 1;
3094 		wpa_supplicant_req_scan(wpa_s, 0, 0);
3095 		return;
3096 #endif /* CONFIG_WPS */
3097 	} else {
3098 		wpa_msg(wpa_s, MSG_INFO, "Trying to associate with SSID '%s'",
3099 			wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
3100 		if (bss)
3101 			os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
3102 		else
3103 			os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
3104 	}
3105 	if (!wpa_s->pno)
3106 		wpa_supplicant_cancel_sched_scan(wpa_s);
3107 
3108 	wpa_supplicant_cancel_scan(wpa_s);
3109 
3110 	/* Starting new association, so clear the possibly used WPA IE from the
3111 	 * previous association. */
3112 	wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
3113 
3114 	wpa_ie = wpas_populate_assoc_ies(wpa_s, bss, ssid, &params, NULL);
3115 	if (!wpa_ie) {
3116 		wpas_connect_work_done(wpa_s);
3117 		return;
3118 	}
3119 
3120 	wpa_clear_keys(wpa_s, bss ? bss->bssid : NULL);
3121 	use_crypt = 1;
3122 	cipher_pairwise = wpa_s->pairwise_cipher;
3123 	cipher_group = wpa_s->group_cipher;
3124 	cipher_group_mgmt = wpa_s->mgmt_group_cipher;
3125 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE ||
3126 	    wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
3127 		if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE)
3128 			use_crypt = 0;
3129 		if (wpa_set_wep_keys(wpa_s, ssid)) {
3130 			use_crypt = 1;
3131 			wep_keys_set = 1;
3132 		}
3133 	}
3134 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPS)
3135 		use_crypt = 0;
3136 
3137 #ifdef IEEE8021X_EAPOL
3138 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
3139 		if ((ssid->eapol_flags &
3140 		     (EAPOL_FLAG_REQUIRE_KEY_UNICAST |
3141 		      EAPOL_FLAG_REQUIRE_KEY_BROADCAST)) == 0 &&
3142 		    !wep_keys_set) {
3143 			use_crypt = 0;
3144 		} else {
3145 			/* Assume that dynamic WEP-104 keys will be used and
3146 			 * set cipher suites in order for drivers to expect
3147 			 * encryption. */
3148 			cipher_pairwise = cipher_group = WPA_CIPHER_WEP104;
3149 		}
3150 	}
3151 #endif /* IEEE8021X_EAPOL */
3152 
3153 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
3154 		/* Set the key before (and later after) association */
3155 		wpa_supplicant_set_wpa_none_key(wpa_s, ssid);
3156 	}
3157 
3158 	wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING);
3159 	if (bss) {
3160 		params.ssid = bss->ssid;
3161 		params.ssid_len = bss->ssid_len;
3162 		if (!wpas_driver_bss_selection(wpa_s) || ssid->bssid_set ||
3163 		    wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
3164 			wpa_printf(MSG_DEBUG, "Limit connection to BSSID "
3165 				   MACSTR " freq=%u MHz based on scan results "
3166 				   "(bssid_set=%d wps=%d)",
3167 				   MAC2STR(bss->bssid), bss->freq,
3168 				   ssid->bssid_set,
3169 				   wpa_s->key_mgmt == WPA_KEY_MGMT_WPS);
3170 			params.bssid = bss->bssid;
3171 			params.freq.freq = bss->freq;
3172 		}
3173 		params.bssid_hint = bss->bssid;
3174 		params.freq_hint = bss->freq;
3175 		params.pbss = bss_is_pbss(bss);
3176 	} else {
3177 		if (ssid->bssid_hint_set)
3178 			params.bssid_hint = ssid->bssid_hint;
3179 
3180 		params.ssid = ssid->ssid;
3181 		params.ssid_len = ssid->ssid_len;
3182 		params.pbss = (ssid->pbss != 2) ? ssid->pbss : 0;
3183 	}
3184 
3185 	if (ssid->mode == WPAS_MODE_IBSS && ssid->bssid_set &&
3186 	    wpa_s->conf->ap_scan == 2) {
3187 		params.bssid = ssid->bssid;
3188 		params.fixed_bssid = 1;
3189 	}
3190 
3191 	/* Initial frequency for IBSS/mesh */
3192 	if ((ssid->mode == WPAS_MODE_IBSS || ssid->mode == WPAS_MODE_MESH) &&
3193 	    ssid->frequency > 0 && params.freq.freq == 0)
3194 		ibss_mesh_setup_freq(wpa_s, ssid, &params.freq);
3195 
3196 	if (ssid->mode == WPAS_MODE_IBSS) {
3197 		params.fixed_freq = ssid->fixed_freq;
3198 		if (ssid->beacon_int)
3199 			params.beacon_int = ssid->beacon_int;
3200 		else
3201 			params.beacon_int = wpa_s->conf->beacon_int;
3202 	}
3203 
3204 	params.pairwise_suite = cipher_pairwise;
3205 	params.group_suite = cipher_group;
3206 	params.mgmt_group_suite = cipher_group_mgmt;
3207 	params.key_mgmt_suite = wpa_s->key_mgmt;
3208 	params.wpa_proto = wpa_s->wpa_proto;
3209 	wpa_s->auth_alg = params.auth_alg;
3210 	params.mode = ssid->mode;
3211 	params.bg_scan_period = ssid->bg_scan_period;
3212 	for (i = 0; i < NUM_WEP_KEYS; i++) {
3213 		if (ssid->wep_key_len[i])
3214 			params.wep_key[i] = ssid->wep_key[i];
3215 		params.wep_key_len[i] = ssid->wep_key_len[i];
3216 	}
3217 	params.wep_tx_keyidx = ssid->wep_tx_keyidx;
3218 
3219 	if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK) &&
3220 	    (params.key_mgmt_suite == WPA_KEY_MGMT_PSK ||
3221 	     params.key_mgmt_suite == WPA_KEY_MGMT_FT_PSK)) {
3222 		params.passphrase = ssid->passphrase;
3223 		if (ssid->psk_set)
3224 			params.psk = ssid->psk;
3225 	}
3226 
3227 	if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_8021X) &&
3228 	    (params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
3229 	     params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
3230 	     params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
3231 	     params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192))
3232 		params.req_handshake_offload = 1;
3233 
3234 	if (wpa_s->conf->key_mgmt_offload) {
3235 		if (params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X ||
3236 		    params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SHA256 ||
3237 		    params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B ||
3238 		    params.key_mgmt_suite == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
3239 			params.req_key_mgmt_offload =
3240 				ssid->proactive_key_caching < 0 ?
3241 				wpa_s->conf->okc : ssid->proactive_key_caching;
3242 		else
3243 			params.req_key_mgmt_offload = 1;
3244 
3245 		if ((params.key_mgmt_suite == WPA_KEY_MGMT_PSK ||
3246 		     params.key_mgmt_suite == WPA_KEY_MGMT_PSK_SHA256 ||
3247 		     params.key_mgmt_suite == WPA_KEY_MGMT_FT_PSK) &&
3248 		    ssid->psk_set)
3249 			params.psk = ssid->psk;
3250 	}
3251 
3252 	params.drop_unencrypted = use_crypt;
3253 
3254 #ifdef CONFIG_IEEE80211W
3255 	params.mgmt_frame_protection = wpas_get_ssid_pmf(wpa_s, ssid);
3256 	if (params.mgmt_frame_protection != NO_MGMT_FRAME_PROTECTION && bss) {
3257 		const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
3258 		struct wpa_ie_data ie;
3259 		if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &ie) == 0 &&
3260 		    ie.capabilities &
3261 		    (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) {
3262 			wpa_dbg(wpa_s, MSG_DEBUG, "WPA: Selected AP supports "
3263 				"MFP: require MFP");
3264 			params.mgmt_frame_protection =
3265 				MGMT_FRAME_PROTECTION_REQUIRED;
3266 #ifdef CONFIG_OWE
3267 		} else if (!rsn && (ssid->key_mgmt & WPA_KEY_MGMT_OWE) &&
3268 			   !ssid->owe_only) {
3269 			params.mgmt_frame_protection = NO_MGMT_FRAME_PROTECTION;
3270 #endif /* CONFIG_OWE */
3271 		}
3272 	}
3273 #endif /* CONFIG_IEEE80211W */
3274 
3275 	params.p2p = ssid->p2p_group;
3276 
3277 	if (wpa_s->p2pdev->set_sta_uapsd)
3278 		params.uapsd = wpa_s->p2pdev->sta_uapsd;
3279 	else
3280 		params.uapsd = -1;
3281 
3282 #ifdef CONFIG_HT_OVERRIDES
3283 	os_memset(&htcaps, 0, sizeof(htcaps));
3284 	os_memset(&htcaps_mask, 0, sizeof(htcaps_mask));
3285 	params.htcaps = (u8 *) &htcaps;
3286 	params.htcaps_mask = (u8 *) &htcaps_mask;
3287 	wpa_supplicant_apply_ht_overrides(wpa_s, ssid, &params);
3288 #endif /* CONFIG_HT_OVERRIDES */
3289 #ifdef CONFIG_VHT_OVERRIDES
3290 	os_memset(&vhtcaps, 0, sizeof(vhtcaps));
3291 	os_memset(&vhtcaps_mask, 0, sizeof(vhtcaps_mask));
3292 	params.vhtcaps = &vhtcaps;
3293 	params.vhtcaps_mask = &vhtcaps_mask;
3294 	wpa_supplicant_apply_vht_overrides(wpa_s, ssid, &params);
3295 #endif /* CONFIG_VHT_OVERRIDES */
3296 
3297 #ifdef CONFIG_P2P
3298 	/*
3299 	 * If multi-channel concurrency is not supported, check for any
3300 	 * frequency conflict. In case of any frequency conflict, remove the
3301 	 * least prioritized connection.
3302 	 */
3303 	if (wpa_s->num_multichan_concurrent < 2) {
3304 		int freq, num;
3305 		num = get_shared_radio_freqs(wpa_s, &freq, 1);
3306 		if (num > 0 && freq > 0 && freq != params.freq.freq) {
3307 			wpa_printf(MSG_DEBUG,
3308 				   "Assoc conflicting freq found (%d != %d)",
3309 				   freq, params.freq.freq);
3310 			if (wpas_p2p_handle_frequency_conflicts(
3311 				    wpa_s, params.freq.freq, ssid) < 0) {
3312 				wpas_connect_work_done(wpa_s);
3313 				os_free(wpa_ie);
3314 				return;
3315 			}
3316 		}
3317 	}
3318 #endif /* CONFIG_P2P */
3319 
3320 	if (wpa_s->reassoc_same_ess && !is_zero_ether_addr(prev_bssid) &&
3321 	    wpa_s->current_ssid)
3322 		params.prev_bssid = prev_bssid;
3323 
3324 	ret = wpa_drv_associate(wpa_s, &params);
3325 	os_free(wpa_ie);
3326 	if (ret < 0) {
3327 		wpa_msg(wpa_s, MSG_INFO, "Association request to the driver "
3328 			"failed");
3329 		if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SANE_ERROR_CODES) {
3330 			/*
3331 			 * The driver is known to mean what is saying, so we
3332 			 * can stop right here; the association will not
3333 			 * succeed.
3334 			 */
3335 			wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
3336 			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
3337 			os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
3338 			return;
3339 		}
3340 		/* try to continue anyway; new association will be tried again
3341 		 * after timeout */
3342 		assoc_failed = 1;
3343 	}
3344 
3345 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_WPA_NONE) {
3346 		/* Set the key after the association just in case association
3347 		 * cleared the previously configured key. */
3348 		wpa_supplicant_set_wpa_none_key(wpa_s, ssid);
3349 		/* No need to timeout authentication since there is no key
3350 		 * management. */
3351 		wpa_supplicant_cancel_auth_timeout(wpa_s);
3352 		wpa_supplicant_set_state(wpa_s, WPA_COMPLETED);
3353 #ifdef CONFIG_IBSS_RSN
3354 	} else if (ssid->mode == WPAS_MODE_IBSS &&
3355 		   wpa_s->key_mgmt != WPA_KEY_MGMT_NONE &&
3356 		   wpa_s->key_mgmt != WPA_KEY_MGMT_WPA_NONE) {
3357 		/*
3358 		 * RSN IBSS authentication is per-STA and we can disable the
3359 		 * per-BSSID authentication.
3360 		 */
3361 		wpa_supplicant_cancel_auth_timeout(wpa_s);
3362 #endif /* CONFIG_IBSS_RSN */
3363 	} else {
3364 		/* Timeout for IEEE 802.11 authentication and association */
3365 		int timeout = 60;
3366 
3367 		if (assoc_failed) {
3368 			/* give IBSS a bit more time */
3369 			timeout = ssid->mode == WPAS_MODE_IBSS ? 10 : 5;
3370 		} else if (wpa_s->conf->ap_scan == 1) {
3371 			/* give IBSS a bit more time */
3372 			timeout = ssid->mode == WPAS_MODE_IBSS ? 20 : 10;
3373 		}
3374 		wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0);
3375 	}
3376 
3377 	if (wep_keys_set &&
3378 	    (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SET_KEYS_AFTER_ASSOC)) {
3379 		/* Set static WEP keys again */
3380 		wpa_set_wep_keys(wpa_s, ssid);
3381 	}
3382 
3383 	if (wpa_s->current_ssid && wpa_s->current_ssid != ssid) {
3384 		/*
3385 		 * Do not allow EAP session resumption between different
3386 		 * network configurations.
3387 		 */
3388 		eapol_sm_invalidate_cached_session(wpa_s->eapol);
3389 	}
3390 	old_ssid = wpa_s->current_ssid;
3391 	wpa_s->current_ssid = ssid;
3392 
3393 	if (!wpas_driver_bss_selection(wpa_s) || ssid->bssid_set) {
3394 		wpa_s->current_bss = bss;
3395 #ifdef CONFIG_HS20
3396 		hs20_configure_frame_filters(wpa_s);
3397 #endif /* CONFIG_HS20 */
3398 	}
3399 
3400 	wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
3401 	wpa_supplicant_initiate_eapol(wpa_s);
3402 	if (old_ssid != wpa_s->current_ssid)
3403 		wpas_notify_network_changed(wpa_s);
3404 }
3405 
3406 
wpa_supplicant_clear_connection(struct wpa_supplicant * wpa_s,const u8 * addr)3407 static void wpa_supplicant_clear_connection(struct wpa_supplicant *wpa_s,
3408 					    const u8 *addr)
3409 {
3410 	struct wpa_ssid *old_ssid;
3411 
3412 	wpas_connect_work_done(wpa_s);
3413 	wpa_clear_keys(wpa_s, addr);
3414 	old_ssid = wpa_s->current_ssid;
3415 	wpa_supplicant_mark_disassoc(wpa_s);
3416 	wpa_sm_set_config(wpa_s->wpa, NULL);
3417 	eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
3418 	if (old_ssid != wpa_s->current_ssid)
3419 		wpas_notify_network_changed(wpa_s);
3420 	eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
3421 }
3422 
3423 
3424 /**
3425  * wpa_supplicant_deauthenticate - Deauthenticate the current connection
3426  * @wpa_s: Pointer to wpa_supplicant data
3427  * @reason_code: IEEE 802.11 reason code for the deauthenticate frame
3428  *
3429  * This function is used to request %wpa_supplicant to deauthenticate from the
3430  * current AP.
3431  */
wpa_supplicant_deauthenticate(struct wpa_supplicant * wpa_s,u16 reason_code)3432 void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s,
3433 				   u16 reason_code)
3434 {
3435 	u8 *addr = NULL;
3436 	union wpa_event_data event;
3437 	int zero_addr = 0;
3438 
3439 	wpa_dbg(wpa_s, MSG_DEBUG, "Request to deauthenticate - bssid=" MACSTR
3440 		" pending_bssid=" MACSTR " reason=%d (%s) state=%s",
3441 		MAC2STR(wpa_s->bssid), MAC2STR(wpa_s->pending_bssid),
3442 		reason_code, reason2str(reason_code),
3443 		wpa_supplicant_state_txt(wpa_s->wpa_state));
3444 
3445 	if (!is_zero_ether_addr(wpa_s->pending_bssid) &&
3446 	    (wpa_s->wpa_state == WPA_AUTHENTICATING ||
3447 	     wpa_s->wpa_state == WPA_ASSOCIATING))
3448 		addr = wpa_s->pending_bssid;
3449 	else if (!is_zero_ether_addr(wpa_s->bssid))
3450 		addr = wpa_s->bssid;
3451 	else if (wpa_s->wpa_state == WPA_ASSOCIATING) {
3452 		/*
3453 		 * When using driver-based BSS selection, we may not know the
3454 		 * BSSID with which we are currently trying to associate. We
3455 		 * need to notify the driver of this disconnection even in such
3456 		 * a case, so use the all zeros address here.
3457 		 */
3458 		addr = wpa_s->bssid;
3459 		zero_addr = 1;
3460 	}
3461 
3462 	if (wpa_s->enabled_4addr_mode && wpa_drv_set_4addr_mode(wpa_s, 0) == 0)
3463 		wpa_s->enabled_4addr_mode = 0;
3464 
3465 #ifdef CONFIG_TDLS
3466 	wpa_tdls_teardown_peers(wpa_s->wpa);
3467 #endif /* CONFIG_TDLS */
3468 
3469 #ifdef CONFIG_MESH
3470 	if (wpa_s->ifmsh) {
3471 		struct mesh_conf *mconf;
3472 
3473 		mconf = wpa_s->ifmsh->mconf;
3474 		wpa_msg(wpa_s, MSG_INFO, MESH_GROUP_REMOVED "%s",
3475 			wpa_s->ifname);
3476 		wpas_notify_mesh_group_removed(wpa_s, mconf->meshid,
3477 					       mconf->meshid_len, reason_code);
3478 		wpa_supplicant_leave_mesh(wpa_s);
3479 	}
3480 #endif /* CONFIG_MESH */
3481 
3482 	if (addr) {
3483 		wpa_drv_deauthenticate(wpa_s, addr, reason_code);
3484 		os_memset(&event, 0, sizeof(event));
3485 		event.deauth_info.reason_code = reason_code;
3486 		event.deauth_info.locally_generated = 1;
3487 		wpa_supplicant_event(wpa_s, EVENT_DEAUTH, &event);
3488 		if (zero_addr)
3489 			addr = NULL;
3490 	}
3491 
3492 	wpa_supplicant_clear_connection(wpa_s, addr);
3493 }
3494 
wpa_supplicant_enable_one_network(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)3495 static void wpa_supplicant_enable_one_network(struct wpa_supplicant *wpa_s,
3496 					      struct wpa_ssid *ssid)
3497 {
3498 	if (!ssid || !ssid->disabled || ssid->disabled == 2)
3499 		return;
3500 
3501 	ssid->disabled = 0;
3502 	ssid->owe_transition_bss_select_count = 0;
3503 	wpas_clear_temp_disabled(wpa_s, ssid, 1);
3504 	wpas_notify_network_enabled_changed(wpa_s, ssid);
3505 
3506 	/*
3507 	 * Try to reassociate since there is no current configuration and a new
3508 	 * network was made available.
3509 	 */
3510 	if (!wpa_s->current_ssid && !wpa_s->disconnected)
3511 		wpa_s->reassociate = 1;
3512 }
3513 
3514 
3515 /**
3516  * wpa_supplicant_add_network - Add a new network
3517  * @wpa_s: wpa_supplicant structure for a network interface
3518  * Returns: The new network configuration or %NULL if operation failed
3519  *
3520  * This function performs the following operations:
3521  * 1. Adds a new network.
3522  * 2. Send network addition notification.
3523  * 3. Marks the network disabled.
3524  * 4. Set network default parameters.
3525  */
wpa_supplicant_add_network(struct wpa_supplicant * wpa_s)3526 struct wpa_ssid * wpa_supplicant_add_network(struct wpa_supplicant *wpa_s)
3527 {
3528 	struct wpa_ssid *ssid;
3529 
3530 	ssid = wpa_config_add_network(wpa_s->conf);
3531 	if (!ssid)
3532 		return NULL;
3533 	wpas_notify_network_added(wpa_s, ssid);
3534 	ssid->disabled = 1;
3535 	wpa_config_set_network_defaults(ssid);
3536 
3537 	return ssid;
3538 }
3539 
3540 
3541 /**
3542  * wpa_supplicant_remove_network - Remove a configured network based on id
3543  * @wpa_s: wpa_supplicant structure for a network interface
3544  * @id: Unique network id to search for
3545  * Returns: 0 on success, or -1 if the network was not found, -2 if the network
3546  * could not be removed
3547  *
3548  * This function performs the following operations:
3549  * 1. Removes the network.
3550  * 2. Send network removal notification.
3551  * 3. Update internal state machines.
3552  * 4. Stop any running sched scans.
3553  */
wpa_supplicant_remove_network(struct wpa_supplicant * wpa_s,int id)3554 int wpa_supplicant_remove_network(struct wpa_supplicant *wpa_s, int id)
3555 {
3556 	struct wpa_ssid *ssid;
3557 	int was_disabled;
3558 
3559 	ssid = wpa_config_get_network(wpa_s->conf, id);
3560 	if (!ssid)
3561 		return -1;
3562 	wpas_notify_network_removed(wpa_s, ssid);
3563 
3564 	if (wpa_s->last_ssid == ssid)
3565 		wpa_s->last_ssid = NULL;
3566 
3567 	if (ssid == wpa_s->current_ssid || !wpa_s->current_ssid) {
3568 #ifdef CONFIG_SME
3569 		wpa_s->sme.prev_bssid_set = 0;
3570 #endif /* CONFIG_SME */
3571 		/*
3572 		 * Invalidate the EAP session cache if the current or
3573 		 * previously used network is removed.
3574 		 */
3575 		eapol_sm_invalidate_cached_session(wpa_s->eapol);
3576 	}
3577 
3578 	if (ssid == wpa_s->current_ssid) {
3579 		wpa_sm_set_config(wpa_s->wpa, NULL);
3580 		eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
3581 
3582 		if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
3583 			wpa_s->own_disconnect_req = 1;
3584 		wpa_supplicant_deauthenticate(wpa_s,
3585 					      WLAN_REASON_DEAUTH_LEAVING);
3586 	}
3587 
3588 	was_disabled = ssid->disabled;
3589 
3590 	if (wpa_config_remove_network(wpa_s->conf, id) < 0)
3591 		return -2;
3592 
3593 	if (!was_disabled && wpa_s->sched_scanning) {
3594 		wpa_printf(MSG_DEBUG,
3595 			   "Stop ongoing sched_scan to remove network from filters");
3596 		wpa_supplicant_cancel_sched_scan(wpa_s);
3597 		wpa_supplicant_req_scan(wpa_s, 0, 0);
3598 	}
3599 
3600 	return 0;
3601 }
3602 
3603 
3604 /**
3605  * wpa_supplicant_enable_network - Mark a configured network as enabled
3606  * @wpa_s: wpa_supplicant structure for a network interface
3607  * @ssid: wpa_ssid structure for a configured network or %NULL
3608  *
3609  * Enables the specified network or all networks if no network specified.
3610  */
wpa_supplicant_enable_network(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)3611 void wpa_supplicant_enable_network(struct wpa_supplicant *wpa_s,
3612 				   struct wpa_ssid *ssid)
3613 {
3614 	if (ssid == NULL) {
3615 		for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
3616 			wpa_supplicant_enable_one_network(wpa_s, ssid);
3617 	} else
3618 		wpa_supplicant_enable_one_network(wpa_s, ssid);
3619 
3620 	if (wpa_s->reassociate && !wpa_s->disconnected &&
3621 	    (!wpa_s->current_ssid ||
3622 	     wpa_s->wpa_state == WPA_DISCONNECTED ||
3623 	     wpa_s->wpa_state == WPA_SCANNING)) {
3624 		if (wpa_s->sched_scanning) {
3625 			wpa_printf(MSG_DEBUG, "Stop ongoing sched_scan to add "
3626 				   "new network to scan filters");
3627 			wpa_supplicant_cancel_sched_scan(wpa_s);
3628 		}
3629 
3630 		if (wpa_supplicant_fast_associate(wpa_s) != 1) {
3631 			wpa_s->scan_req = NORMAL_SCAN_REQ;
3632 			wpa_supplicant_req_scan(wpa_s, 0, 0);
3633 		}
3634 	}
3635 }
3636 
3637 
3638 /**
3639  * wpa_supplicant_disable_network - Mark a configured network as disabled
3640  * @wpa_s: wpa_supplicant structure for a network interface
3641  * @ssid: wpa_ssid structure for a configured network or %NULL
3642  *
3643  * Disables the specified network or all networks if no network specified.
3644  */
wpa_supplicant_disable_network(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)3645 void wpa_supplicant_disable_network(struct wpa_supplicant *wpa_s,
3646 				    struct wpa_ssid *ssid)
3647 {
3648 	struct wpa_ssid *other_ssid;
3649 	int was_disabled;
3650 
3651 	if (ssid == NULL) {
3652 		if (wpa_s->sched_scanning)
3653 			wpa_supplicant_cancel_sched_scan(wpa_s);
3654 
3655 		for (other_ssid = wpa_s->conf->ssid; other_ssid;
3656 		     other_ssid = other_ssid->next) {
3657 			was_disabled = other_ssid->disabled;
3658 			if (was_disabled == 2)
3659 				continue; /* do not change persistent P2P group
3660 					   * data */
3661 
3662 			other_ssid->disabled = 1;
3663 
3664 			if (was_disabled != other_ssid->disabled)
3665 				wpas_notify_network_enabled_changed(
3666 					wpa_s, other_ssid);
3667 		}
3668 		if (wpa_s->current_ssid) {
3669 			if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
3670 				wpa_s->own_disconnect_req = 1;
3671 			wpa_supplicant_deauthenticate(
3672 				wpa_s, WLAN_REASON_DEAUTH_LEAVING);
3673 		}
3674 	} else if (ssid->disabled != 2) {
3675 		if (ssid == wpa_s->current_ssid) {
3676 			if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
3677 				wpa_s->own_disconnect_req = 1;
3678 			wpa_supplicant_deauthenticate(
3679 				wpa_s, WLAN_REASON_DEAUTH_LEAVING);
3680 		}
3681 
3682 		was_disabled = ssid->disabled;
3683 
3684 		ssid->disabled = 1;
3685 
3686 		if (was_disabled != ssid->disabled) {
3687 			wpas_notify_network_enabled_changed(wpa_s, ssid);
3688 			if (wpa_s->sched_scanning) {
3689 				wpa_printf(MSG_DEBUG, "Stop ongoing sched_scan "
3690 					   "to remove network from filters");
3691 				wpa_supplicant_cancel_sched_scan(wpa_s);
3692 				wpa_supplicant_req_scan(wpa_s, 0, 0);
3693 			}
3694 		}
3695 	}
3696 }
3697 
3698 
3699 /**
3700  * wpa_supplicant_select_network - Attempt association with a network
3701  * @wpa_s: wpa_supplicant structure for a network interface
3702  * @ssid: wpa_ssid structure for a configured network or %NULL for any network
3703  */
wpa_supplicant_select_network(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)3704 void wpa_supplicant_select_network(struct wpa_supplicant *wpa_s,
3705 				   struct wpa_ssid *ssid)
3706 {
3707 
3708 	struct wpa_ssid *other_ssid;
3709 	int disconnected = 0;
3710 
3711 	if (ssid && ssid != wpa_s->current_ssid && wpa_s->current_ssid) {
3712 		if (wpa_s->wpa_state >= WPA_AUTHENTICATING)
3713 			wpa_s->own_disconnect_req = 1;
3714 		wpa_supplicant_deauthenticate(
3715 			wpa_s, WLAN_REASON_DEAUTH_LEAVING);
3716 		disconnected = 1;
3717 	}
3718 
3719 	if (ssid)
3720 		wpas_clear_temp_disabled(wpa_s, ssid, 1);
3721 
3722 	/*
3723 	 * Mark all other networks disabled or mark all networks enabled if no
3724 	 * network specified.
3725 	 */
3726 	for (other_ssid = wpa_s->conf->ssid; other_ssid;
3727 	     other_ssid = other_ssid->next) {
3728 		int was_disabled = other_ssid->disabled;
3729 		if (was_disabled == 2)
3730 			continue; /* do not change persistent P2P group data */
3731 
3732 		other_ssid->disabled = ssid ? (ssid->id != other_ssid->id) : 0;
3733 		if (was_disabled && !other_ssid->disabled)
3734 			wpas_clear_temp_disabled(wpa_s, other_ssid, 0);
3735 
3736 		if (was_disabled != other_ssid->disabled)
3737 			wpas_notify_network_enabled_changed(wpa_s, other_ssid);
3738 	}
3739 
3740 	if (ssid && ssid == wpa_s->current_ssid && wpa_s->current_ssid &&
3741 	    wpa_s->wpa_state >= WPA_AUTHENTICATING) {
3742 		/* We are already associated with the selected network */
3743 		wpa_printf(MSG_DEBUG, "Already associated with the "
3744 			   "selected network - do nothing");
3745 		return;
3746 	}
3747 
3748 	if (ssid) {
3749 		wpa_s->current_ssid = ssid;
3750 		eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
3751 		wpa_s->connect_without_scan =
3752 			(ssid->mode == WPAS_MODE_MESH) ? ssid : NULL;
3753 
3754 		/*
3755 		 * Don't optimize next scan freqs since a new ESS has been
3756 		 * selected.
3757 		 */
3758 		os_free(wpa_s->next_scan_freqs);
3759 		wpa_s->next_scan_freqs = NULL;
3760 	} else {
3761 		wpa_s->connect_without_scan = NULL;
3762 	}
3763 
3764 	wpa_s->disconnected = 0;
3765 	wpa_s->reassociate = 1;
3766 	wpa_s->last_owe_group = 0;
3767 	if (ssid)
3768 		ssid->owe_transition_bss_select_count = 0;
3769 
3770 	if (wpa_s->connect_without_scan ||
3771 	    wpa_supplicant_fast_associate(wpa_s) != 1) {
3772 		wpa_s->scan_req = NORMAL_SCAN_REQ;
3773 		wpas_scan_reset_sched_scan(wpa_s);
3774 		wpa_supplicant_req_scan(wpa_s, 0, disconnected ? 100000 : 0);
3775 	}
3776 
3777 	if (ssid)
3778 		wpas_notify_network_selected(wpa_s, ssid);
3779 }
3780 
3781 
3782 /**
3783  * wpas_set_pkcs11_engine_and_module_path - Set PKCS #11 engine and module path
3784  * @wpa_s: wpa_supplicant structure for a network interface
3785  * @pkcs11_engine_path: PKCS #11 engine path or NULL
3786  * @pkcs11_module_path: PKCS #11 module path or NULL
3787  * Returns: 0 on success; -1 on failure
3788  *
3789  * Sets the PKCS #11 engine and module path. Both have to be NULL or a valid
3790  * path. If resetting the EAPOL state machine with the new PKCS #11 engine and
3791  * module path fails the paths will be reset to the default value (NULL).
3792  */
wpas_set_pkcs11_engine_and_module_path(struct wpa_supplicant * wpa_s,const char * pkcs11_engine_path,const char * pkcs11_module_path)3793 int wpas_set_pkcs11_engine_and_module_path(struct wpa_supplicant *wpa_s,
3794 					   const char *pkcs11_engine_path,
3795 					   const char *pkcs11_module_path)
3796 {
3797 	char *pkcs11_engine_path_copy = NULL;
3798 	char *pkcs11_module_path_copy = NULL;
3799 
3800 	if (pkcs11_engine_path != NULL) {
3801 		pkcs11_engine_path_copy = os_strdup(pkcs11_engine_path);
3802 		if (pkcs11_engine_path_copy == NULL)
3803 			return -1;
3804 	}
3805 	if (pkcs11_module_path != NULL) {
3806 		pkcs11_module_path_copy = os_strdup(pkcs11_module_path);
3807 		if (pkcs11_module_path_copy == NULL) {
3808 			os_free(pkcs11_engine_path_copy);
3809 			return -1;
3810 		}
3811 	}
3812 
3813 	os_free(wpa_s->conf->pkcs11_engine_path);
3814 	os_free(wpa_s->conf->pkcs11_module_path);
3815 	wpa_s->conf->pkcs11_engine_path = pkcs11_engine_path_copy;
3816 	wpa_s->conf->pkcs11_module_path = pkcs11_module_path_copy;
3817 
3818 	wpa_sm_set_eapol(wpa_s->wpa, NULL);
3819 	eapol_sm_deinit(wpa_s->eapol);
3820 	wpa_s->eapol = NULL;
3821 	if (wpa_supplicant_init_eapol(wpa_s)) {
3822 		/* Error -> Reset paths to the default value (NULL) once. */
3823 		if (pkcs11_engine_path != NULL && pkcs11_module_path != NULL)
3824 			wpas_set_pkcs11_engine_and_module_path(wpa_s, NULL,
3825 							       NULL);
3826 
3827 		return -1;
3828 	}
3829 	wpa_sm_set_eapol(wpa_s->wpa, wpa_s->eapol);
3830 
3831 	return 0;
3832 }
3833 
3834 
3835 /**
3836  * wpa_supplicant_set_ap_scan - Set AP scan mode for interface
3837  * @wpa_s: wpa_supplicant structure for a network interface
3838  * @ap_scan: AP scan mode
3839  * Returns: 0 if succeed or -1 if ap_scan has an invalid value
3840  *
3841  */
wpa_supplicant_set_ap_scan(struct wpa_supplicant * wpa_s,int ap_scan)3842 int wpa_supplicant_set_ap_scan(struct wpa_supplicant *wpa_s, int ap_scan)
3843 {
3844 
3845 	int old_ap_scan;
3846 
3847 	if (ap_scan < 0 || ap_scan > 2)
3848 		return -1;
3849 
3850 	if (ap_scan == 2 && os_strcmp(wpa_s->driver->name, "nl80211") == 0) {
3851 		wpa_printf(MSG_INFO,
3852 			   "Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures");
3853 	}
3854 
3855 #ifdef ANDROID
3856 	if (ap_scan == 2 && ap_scan != wpa_s->conf->ap_scan &&
3857 	    wpa_s->wpa_state >= WPA_ASSOCIATING &&
3858 	    wpa_s->wpa_state < WPA_COMPLETED) {
3859 		wpa_printf(MSG_ERROR, "ap_scan = %d (%d) rejected while "
3860 			   "associating", wpa_s->conf->ap_scan, ap_scan);
3861 		return 0;
3862 	}
3863 #endif /* ANDROID */
3864 
3865 	old_ap_scan = wpa_s->conf->ap_scan;
3866 	wpa_s->conf->ap_scan = ap_scan;
3867 
3868 	if (old_ap_scan != wpa_s->conf->ap_scan)
3869 		wpas_notify_ap_scan_changed(wpa_s);
3870 
3871 	return 0;
3872 }
3873 
3874 
3875 /**
3876  * wpa_supplicant_set_bss_expiration_age - Set BSS entry expiration age
3877  * @wpa_s: wpa_supplicant structure for a network interface
3878  * @expire_age: Expiration age in seconds
3879  * Returns: 0 if succeed or -1 if expire_age has an invalid value
3880  *
3881  */
wpa_supplicant_set_bss_expiration_age(struct wpa_supplicant * wpa_s,unsigned int bss_expire_age)3882 int wpa_supplicant_set_bss_expiration_age(struct wpa_supplicant *wpa_s,
3883 					  unsigned int bss_expire_age)
3884 {
3885 	if (bss_expire_age < 10) {
3886 		wpa_msg(wpa_s, MSG_ERROR, "Invalid bss expiration age %u",
3887 			bss_expire_age);
3888 		return -1;
3889 	}
3890 	wpa_msg(wpa_s, MSG_DEBUG, "Setting bss expiration age: %d sec",
3891 		bss_expire_age);
3892 	wpa_s->conf->bss_expiration_age = bss_expire_age;
3893 
3894 	return 0;
3895 }
3896 
3897 
3898 /**
3899  * wpa_supplicant_set_bss_expiration_count - Set BSS entry expiration scan count
3900  * @wpa_s: wpa_supplicant structure for a network interface
3901  * @expire_count: number of scans after which an unseen BSS is reclaimed
3902  * Returns: 0 if succeed or -1 if expire_count has an invalid value
3903  *
3904  */
wpa_supplicant_set_bss_expiration_count(struct wpa_supplicant * wpa_s,unsigned int bss_expire_count)3905 int wpa_supplicant_set_bss_expiration_count(struct wpa_supplicant *wpa_s,
3906 					    unsigned int bss_expire_count)
3907 {
3908 	if (bss_expire_count < 1) {
3909 		wpa_msg(wpa_s, MSG_ERROR, "Invalid bss expiration count %u",
3910 			bss_expire_count);
3911 		return -1;
3912 	}
3913 	wpa_msg(wpa_s, MSG_DEBUG, "Setting bss expiration scan count: %u",
3914 		bss_expire_count);
3915 	wpa_s->conf->bss_expiration_scan_count = bss_expire_count;
3916 
3917 	return 0;
3918 }
3919 
3920 
3921 /**
3922  * wpa_supplicant_set_scan_interval - Set scan interval
3923  * @wpa_s: wpa_supplicant structure for a network interface
3924  * @scan_interval: scan interval in seconds
3925  * Returns: 0 if succeed or -1 if scan_interval has an invalid value
3926  *
3927  */
wpa_supplicant_set_scan_interval(struct wpa_supplicant * wpa_s,int scan_interval)3928 int wpa_supplicant_set_scan_interval(struct wpa_supplicant *wpa_s,
3929 				     int scan_interval)
3930 {
3931 	if (scan_interval < 0) {
3932 		wpa_msg(wpa_s, MSG_ERROR, "Invalid scan interval %d",
3933 			scan_interval);
3934 		return -1;
3935 	}
3936 	wpa_msg(wpa_s, MSG_DEBUG, "Setting scan interval: %d sec",
3937 		scan_interval);
3938 	wpa_supplicant_update_scan_int(wpa_s, scan_interval);
3939 
3940 	return 0;
3941 }
3942 
3943 
3944 /**
3945  * wpa_supplicant_set_debug_params - Set global debug params
3946  * @global: wpa_global structure
3947  * @debug_level: debug level
3948  * @debug_timestamp: determines if show timestamp in debug data
3949  * @debug_show_keys: determines if show keys in debug data
3950  * Returns: 0 if succeed or -1 if debug_level has wrong value
3951  */
wpa_supplicant_set_debug_params(struct wpa_global * global,int debug_level,int debug_timestamp,int debug_show_keys)3952 int wpa_supplicant_set_debug_params(struct wpa_global *global, int debug_level,
3953 				    int debug_timestamp, int debug_show_keys)
3954 {
3955 
3956 	int old_level, old_timestamp, old_show_keys;
3957 
3958 	/* check for allowed debuglevels */
3959 	if (debug_level != MSG_EXCESSIVE &&
3960 	    debug_level != MSG_MSGDUMP &&
3961 	    debug_level != MSG_DEBUG &&
3962 	    debug_level != MSG_INFO &&
3963 	    debug_level != MSG_WARNING &&
3964 	    debug_level != MSG_ERROR)
3965 		return -1;
3966 
3967 	old_level = wpa_debug_level;
3968 	old_timestamp = wpa_debug_timestamp;
3969 	old_show_keys = wpa_debug_show_keys;
3970 
3971 	wpa_debug_level = debug_level;
3972 	wpa_debug_timestamp = debug_timestamp ? 1 : 0;
3973 	wpa_debug_show_keys = debug_show_keys ? 1 : 0;
3974 
3975 	if (wpa_debug_level != old_level)
3976 		wpas_notify_debug_level_changed(global);
3977 	if (wpa_debug_timestamp != old_timestamp)
3978 		wpas_notify_debug_timestamp_changed(global);
3979 	if (wpa_debug_show_keys != old_show_keys)
3980 		wpas_notify_debug_show_keys_changed(global);
3981 
3982 	return 0;
3983 }
3984 
3985 
3986 #ifdef CONFIG_OWE
owe_trans_ssid_match(struct wpa_supplicant * wpa_s,const u8 * bssid,const u8 * entry_ssid,size_t entry_ssid_len)3987 static int owe_trans_ssid_match(struct wpa_supplicant *wpa_s, const u8 *bssid,
3988 				const u8 *entry_ssid, size_t entry_ssid_len)
3989 {
3990 	const u8 *owe, *pos, *end;
3991 	u8 ssid_len;
3992 	struct wpa_bss *bss;
3993 
3994 	/* Check network profile SSID aganst the SSID in the
3995 	 * OWE Transition Mode element. */
3996 
3997 	bss = wpa_bss_get_bssid_latest(wpa_s, bssid);
3998 	if (!bss)
3999 		return 0;
4000 
4001 	owe = wpa_bss_get_vendor_ie(bss, OWE_IE_VENDOR_TYPE);
4002 	if (!owe)
4003 		return 0;
4004 
4005 	pos = owe + 6;
4006 	end = owe + 2 + owe[1];
4007 
4008 	if (end - pos < ETH_ALEN + 1)
4009 		return 0;
4010 	pos += ETH_ALEN;
4011 	ssid_len = *pos++;
4012 	if (end - pos < ssid_len || ssid_len > SSID_MAX_LEN)
4013 		return 0;
4014 
4015 	return entry_ssid_len == ssid_len &&
4016 		os_memcmp(pos, entry_ssid, ssid_len) == 0;
4017 }
4018 #endif /* CONFIG_OWE */
4019 
4020 
4021 /**
4022  * wpa_supplicant_get_ssid - Get a pointer to the current network structure
4023  * @wpa_s: Pointer to wpa_supplicant data
4024  * Returns: A pointer to the current network structure or %NULL on failure
4025  */
wpa_supplicant_get_ssid(struct wpa_supplicant * wpa_s)4026 struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s)
4027 {
4028 	struct wpa_ssid *entry;
4029 	u8 ssid[SSID_MAX_LEN];
4030 	int res;
4031 	size_t ssid_len;
4032 	u8 bssid[ETH_ALEN];
4033 	int wired;
4034 
4035 	res = wpa_drv_get_ssid(wpa_s, ssid);
4036 	if (res < 0) {
4037 		wpa_msg(wpa_s, MSG_WARNING, "Could not read SSID from "
4038 			"driver");
4039 		return NULL;
4040 	}
4041 	ssid_len = res;
4042 
4043 	if (wpa_drv_get_bssid(wpa_s, bssid) < 0) {
4044 		wpa_msg(wpa_s, MSG_WARNING, "Could not read BSSID from "
4045 			"driver");
4046 		return NULL;
4047 	}
4048 
4049 	wired = wpa_s->conf->ap_scan == 0 &&
4050 		(wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED);
4051 
4052 	entry = wpa_s->conf->ssid;
4053 	while (entry) {
4054 		if (!wpas_network_disabled(wpa_s, entry) &&
4055 		    ((ssid_len == entry->ssid_len &&
4056 		      (!entry->ssid ||
4057 		       os_memcmp(ssid, entry->ssid, ssid_len) == 0)) ||
4058 		     wired) &&
4059 		    (!entry->bssid_set ||
4060 		     os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
4061 			return entry;
4062 #ifdef CONFIG_WPS
4063 		if (!wpas_network_disabled(wpa_s, entry) &&
4064 		    (entry->key_mgmt & WPA_KEY_MGMT_WPS) &&
4065 		    (entry->ssid == NULL || entry->ssid_len == 0) &&
4066 		    (!entry->bssid_set ||
4067 		     os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
4068 			return entry;
4069 #endif /* CONFIG_WPS */
4070 
4071 #ifdef CONFIG_OWE
4072 		if (!wpas_network_disabled(wpa_s, entry) &&
4073 		    owe_trans_ssid_match(wpa_s, bssid, entry->ssid,
4074 		    entry->ssid_len) &&
4075 		    (!entry->bssid_set ||
4076 		     os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0))
4077 			return entry;
4078 #endif /* CONFIG_OWE */
4079 
4080 		if (!wpas_network_disabled(wpa_s, entry) && entry->bssid_set &&
4081 		    entry->ssid_len == 0 &&
4082 		    os_memcmp(bssid, entry->bssid, ETH_ALEN) == 0)
4083 			return entry;
4084 
4085 		entry = entry->next;
4086 	}
4087 
4088 	return NULL;
4089 }
4090 
4091 
select_driver(struct wpa_supplicant * wpa_s,int i)4092 static int select_driver(struct wpa_supplicant *wpa_s, int i)
4093 {
4094 	struct wpa_global *global = wpa_s->global;
4095 
4096 	if (wpa_drivers[i]->global_init && global->drv_priv[i] == NULL) {
4097 		global->drv_priv[i] = wpa_drivers[i]->global_init(global);
4098 		if (global->drv_priv[i] == NULL) {
4099 			wpa_printf(MSG_ERROR, "Failed to initialize driver "
4100 				   "'%s'", wpa_drivers[i]->name);
4101 			return -1;
4102 		}
4103 	}
4104 
4105 	wpa_s->driver = wpa_drivers[i];
4106 	wpa_s->global_drv_priv = global->drv_priv[i];
4107 
4108 	return 0;
4109 }
4110 
4111 
wpa_supplicant_set_driver(struct wpa_supplicant * wpa_s,const char * name)4112 static int wpa_supplicant_set_driver(struct wpa_supplicant *wpa_s,
4113 				     const char *name)
4114 {
4115 	int i;
4116 	size_t len;
4117 	const char *pos, *driver = name;
4118 
4119 	if (wpa_s == NULL)
4120 		return -1;
4121 
4122 	if (wpa_drivers[0] == NULL) {
4123 		wpa_msg(wpa_s, MSG_ERROR, "No driver interfaces build into "
4124 			"wpa_supplicant");
4125 		return -1;
4126 	}
4127 
4128 	if (name == NULL) {
4129 		/* default to first driver in the list */
4130 		return select_driver(wpa_s, 0);
4131 	}
4132 
4133 	do {
4134 		pos = os_strchr(driver, ',');
4135 		if (pos)
4136 			len = pos - driver;
4137 		else
4138 			len = os_strlen(driver);
4139 
4140 		for (i = 0; wpa_drivers[i]; i++) {
4141 			if (os_strlen(wpa_drivers[i]->name) == len &&
4142 			    os_strncmp(driver, wpa_drivers[i]->name, len) ==
4143 			    0) {
4144 				/* First driver that succeeds wins */
4145 				if (select_driver(wpa_s, i) == 0)
4146 					return 0;
4147 			}
4148 		}
4149 
4150 		driver = pos + 1;
4151 	} while (pos);
4152 
4153 	wpa_msg(wpa_s, MSG_ERROR, "Unsupported driver '%s'", name);
4154 	return -1;
4155 }
4156 
4157 
4158 /**
4159  * wpa_supplicant_rx_eapol - Deliver a received EAPOL frame to wpa_supplicant
4160  * @ctx: Context pointer (wpa_s); this is the ctx variable registered
4161  *	with struct wpa_driver_ops::init()
4162  * @src_addr: Source address of the EAPOL frame
4163  * @buf: EAPOL data starting from the EAPOL header (i.e., no Ethernet header)
4164  * @len: Length of the EAPOL data
4165  *
4166  * This function is called for each received EAPOL frame. Most driver
4167  * interfaces rely on more generic OS mechanism for receiving frames through
4168  * l2_packet, but if such a mechanism is not available, the driver wrapper may
4169  * take care of received EAPOL frames and deliver them to the core supplicant
4170  * code by calling this function.
4171  */
wpa_supplicant_rx_eapol(void * ctx,const u8 * src_addr,const u8 * buf,size_t len)4172 void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
4173 			     const u8 *buf, size_t len)
4174 {
4175 	struct wpa_supplicant *wpa_s = ctx;
4176 
4177 	wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR, MAC2STR(src_addr));
4178 	wpa_hexdump(MSG_MSGDUMP, "RX EAPOL", buf, len);
4179 
4180 #ifdef CONFIG_TESTING_OPTIONS
4181 	if (wpa_s->ignore_auth_resp) {
4182 		wpa_printf(MSG_INFO, "RX EAPOL - ignore_auth_resp active!");
4183 		return;
4184 	}
4185 #endif /* CONFIG_TESTING_OPTIONS */
4186 
4187 	if (wpa_s->wpa_state < WPA_ASSOCIATED ||
4188 	    (wpa_s->last_eapol_matches_bssid &&
4189 #ifdef CONFIG_AP
4190 	     !wpa_s->ap_iface &&
4191 #endif /* CONFIG_AP */
4192 	     os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) != 0)) {
4193 		/*
4194 		 * There is possible race condition between receiving the
4195 		 * association event and the EAPOL frame since they are coming
4196 		 * through different paths from the driver. In order to avoid
4197 		 * issues in trying to process the EAPOL frame before receiving
4198 		 * association information, lets queue it for processing until
4199 		 * the association event is received. This may also be needed in
4200 		 * driver-based roaming case, so also use src_addr != BSSID as a
4201 		 * trigger if we have previously confirmed that the
4202 		 * Authenticator uses BSSID as the src_addr (which is not the
4203 		 * case with wired IEEE 802.1X).
4204 		 */
4205 		wpa_dbg(wpa_s, MSG_DEBUG, "Not associated - Delay processing "
4206 			"of received EAPOL frame (state=%s bssid=" MACSTR ")",
4207 			wpa_supplicant_state_txt(wpa_s->wpa_state),
4208 			MAC2STR(wpa_s->bssid));
4209 		wpabuf_free(wpa_s->pending_eapol_rx);
4210 		wpa_s->pending_eapol_rx = wpabuf_alloc_copy(buf, len);
4211 		if (wpa_s->pending_eapol_rx) {
4212 			os_get_reltime(&wpa_s->pending_eapol_rx_time);
4213 			os_memcpy(wpa_s->pending_eapol_rx_src, src_addr,
4214 				  ETH_ALEN);
4215 		}
4216 		return;
4217 	}
4218 
4219 	wpa_s->last_eapol_matches_bssid =
4220 		os_memcmp(src_addr, wpa_s->bssid, ETH_ALEN) == 0;
4221 
4222 #ifdef CONFIG_AP
4223 	if (wpa_s->ap_iface) {
4224 		wpa_supplicant_ap_rx_eapol(wpa_s, src_addr, buf, len);
4225 		return;
4226 	}
4227 #endif /* CONFIG_AP */
4228 
4229 	if (wpa_s->key_mgmt == WPA_KEY_MGMT_NONE) {
4230 		wpa_dbg(wpa_s, MSG_DEBUG, "Ignored received EAPOL frame since "
4231 			"no key management is configured");
4232 		return;
4233 	}
4234 
4235 	if (wpa_s->eapol_received == 0 &&
4236 	    (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK) ||
4237 	     !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
4238 	     wpa_s->wpa_state != WPA_COMPLETED) &&
4239 	    (wpa_s->current_ssid == NULL ||
4240 	     wpa_s->current_ssid->mode != WPAS_MODE_IBSS)) {
4241 		/* Timeout for completing IEEE 802.1X and WPA authentication */
4242 		int timeout = 10;
4243 
4244 		if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) ||
4245 		    wpa_s->key_mgmt == WPA_KEY_MGMT_IEEE8021X_NO_WPA ||
4246 		    wpa_s->key_mgmt == WPA_KEY_MGMT_WPS) {
4247 			/* Use longer timeout for IEEE 802.1X/EAP */
4248 			timeout = 70;
4249 		}
4250 
4251 #ifdef CONFIG_WPS
4252 		if (wpa_s->current_ssid && wpa_s->current_bss &&
4253 		    (wpa_s->current_ssid->key_mgmt & WPA_KEY_MGMT_WPS) &&
4254 		    eap_is_wps_pin_enrollee(&wpa_s->current_ssid->eap)) {
4255 			/*
4256 			 * Use shorter timeout if going through WPS AP iteration
4257 			 * for PIN config method with an AP that does not
4258 			 * advertise Selected Registrar.
4259 			 */
4260 			struct wpabuf *wps_ie;
4261 
4262 			wps_ie = wpa_bss_get_vendor_ie_multi(
4263 				wpa_s->current_bss, WPS_IE_VENDOR_TYPE);
4264 			if (wps_ie &&
4265 			    !wps_is_addr_authorized(wps_ie, wpa_s->own_addr, 1))
4266 				timeout = 10;
4267 			wpabuf_free(wps_ie);
4268 		}
4269 #endif /* CONFIG_WPS */
4270 
4271 		wpa_supplicant_req_auth_timeout(wpa_s, timeout, 0);
4272 	}
4273 	wpa_s->eapol_received++;
4274 
4275 	if (wpa_s->countermeasures) {
4276 		wpa_msg(wpa_s, MSG_INFO, "WPA: Countermeasures - dropped "
4277 			"EAPOL packet");
4278 		return;
4279 	}
4280 
4281 #ifdef CONFIG_IBSS_RSN
4282 	if (wpa_s->current_ssid &&
4283 	    wpa_s->current_ssid->mode == WPAS_MODE_IBSS) {
4284 		ibss_rsn_rx_eapol(wpa_s->ibss_rsn, src_addr, buf, len);
4285 		return;
4286 	}
4287 #endif /* CONFIG_IBSS_RSN */
4288 
4289 	/* Source address of the incoming EAPOL frame could be compared to the
4290 	 * current BSSID. However, it is possible that a centralized
4291 	 * Authenticator could be using another MAC address than the BSSID of
4292 	 * an AP, so just allow any address to be used for now. The replies are
4293 	 * still sent to the current BSSID (if available), though. */
4294 
4295 	os_memcpy(wpa_s->last_eapol_src, src_addr, ETH_ALEN);
4296 	if (!wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) &&
4297 	    wpa_s->key_mgmt != WPA_KEY_MGMT_OWE &&
4298 	    wpa_s->key_mgmt != WPA_KEY_MGMT_DPP &&
4299 	    eapol_sm_rx_eapol(wpa_s->eapol, src_addr, buf, len) > 0)
4300 		return;
4301 	wpa_drv_poll(wpa_s);
4302 	if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE_PSK))
4303 		wpa_sm_rx_eapol(wpa_s->wpa, src_addr, buf, len);
4304 	else if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt)) {
4305 		/*
4306 		 * Set portValid = TRUE here since we are going to skip 4-way
4307 		 * handshake processing which would normally set portValid. We
4308 		 * need this to allow the EAPOL state machines to be completed
4309 		 * without going through EAPOL-Key handshake.
4310 		 */
4311 		eapol_sm_notify_portValid(wpa_s->eapol, TRUE);
4312 	}
4313 }
4314 
4315 
wpa_supplicant_update_mac_addr(struct wpa_supplicant * wpa_s)4316 int wpa_supplicant_update_mac_addr(struct wpa_supplicant *wpa_s)
4317 {
4318 	if ((!wpa_s->p2p_mgmt ||
4319 	     !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)) &&
4320 	    !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_DEDICATED_INTERFACE)) {
4321 		l2_packet_deinit(wpa_s->l2);
4322 		wpa_s->l2 = l2_packet_init(wpa_s->ifname,
4323 					   wpa_drv_get_mac_addr(wpa_s),
4324 					   ETH_P_EAPOL,
4325 					   wpa_supplicant_rx_eapol, wpa_s, 0);
4326 		if (wpa_s->l2 == NULL)
4327 			return -1;
4328 
4329 		if (l2_packet_set_packet_filter(wpa_s->l2,
4330 						L2_PACKET_FILTER_PKTTYPE))
4331 			wpa_dbg(wpa_s, MSG_DEBUG,
4332 				"Failed to attach pkt_type filter");
4333 	} else {
4334 		const u8 *addr = wpa_drv_get_mac_addr(wpa_s);
4335 		if (addr)
4336 			os_memcpy(wpa_s->own_addr, addr, ETH_ALEN);
4337 	}
4338 
4339 	if (wpa_s->l2 && l2_packet_get_own_addr(wpa_s->l2, wpa_s->own_addr)) {
4340 		wpa_msg(wpa_s, MSG_ERROR, "Failed to get own L2 address");
4341 		return -1;
4342 	}
4343 
4344 	wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr);
4345 
4346 	return 0;
4347 }
4348 
4349 
wpa_supplicant_rx_eapol_bridge(void * ctx,const u8 * src_addr,const u8 * buf,size_t len)4350 static void wpa_supplicant_rx_eapol_bridge(void *ctx, const u8 *src_addr,
4351 					   const u8 *buf, size_t len)
4352 {
4353 	struct wpa_supplicant *wpa_s = ctx;
4354 	const struct l2_ethhdr *eth;
4355 
4356 	if (len < sizeof(*eth))
4357 		return;
4358 	eth = (const struct l2_ethhdr *) buf;
4359 
4360 	if (os_memcmp(eth->h_dest, wpa_s->own_addr, ETH_ALEN) != 0 &&
4361 	    !(eth->h_dest[0] & 0x01)) {
4362 		wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR " to " MACSTR
4363 			" (bridge - not for this interface - ignore)",
4364 			MAC2STR(src_addr), MAC2STR(eth->h_dest));
4365 		return;
4366 	}
4367 
4368 	wpa_dbg(wpa_s, MSG_DEBUG, "RX EAPOL from " MACSTR " to " MACSTR
4369 		" (bridge)", MAC2STR(src_addr), MAC2STR(eth->h_dest));
4370 	wpa_supplicant_rx_eapol(wpa_s, src_addr, buf + sizeof(*eth),
4371 				len - sizeof(*eth));
4372 }
4373 
4374 
4375 /**
4376  * wpa_supplicant_driver_init - Initialize driver interface parameters
4377  * @wpa_s: Pointer to wpa_supplicant data
4378  * Returns: 0 on success, -1 on failure
4379  *
4380  * This function is called to initialize driver interface parameters.
4381  * wpa_drv_init() must have been called before this function to initialize the
4382  * driver interface.
4383  */
wpa_supplicant_driver_init(struct wpa_supplicant * wpa_s)4384 int wpa_supplicant_driver_init(struct wpa_supplicant *wpa_s)
4385 {
4386 	static int interface_count = 0;
4387 
4388 	if (wpa_supplicant_update_mac_addr(wpa_s) < 0)
4389 		return -1;
4390 
4391 	wpa_dbg(wpa_s, MSG_DEBUG, "Own MAC address: " MACSTR,
4392 		MAC2STR(wpa_s->own_addr));
4393 	os_memcpy(wpa_s->perm_addr, wpa_s->own_addr, ETH_ALEN);
4394 	wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr);
4395 
4396 	if (wpa_s->bridge_ifname[0]) {
4397 		wpa_dbg(wpa_s, MSG_DEBUG, "Receiving packets from bridge "
4398 			"interface '%s'", wpa_s->bridge_ifname);
4399 		wpa_s->l2_br = l2_packet_init_bridge(
4400 			wpa_s->bridge_ifname, wpa_s->ifname, wpa_s->own_addr,
4401 			ETH_P_EAPOL, wpa_supplicant_rx_eapol_bridge, wpa_s, 1);
4402 		if (wpa_s->l2_br == NULL) {
4403 			wpa_msg(wpa_s, MSG_ERROR, "Failed to open l2_packet "
4404 				"connection for the bridge interface '%s'",
4405 				wpa_s->bridge_ifname);
4406 			return -1;
4407 		}
4408 	}
4409 
4410 	if (wpa_s->conf->ap_scan == 2 &&
4411 	    os_strcmp(wpa_s->driver->name, "nl80211") == 0) {
4412 		wpa_printf(MSG_INFO,
4413 			   "Note: nl80211 driver interface is not designed to be used with ap_scan=2; this can result in connection failures");
4414 	}
4415 
4416 	wpa_clear_keys(wpa_s, NULL);
4417 
4418 	/* Make sure that TKIP countermeasures are not left enabled (could
4419 	 * happen if wpa_supplicant is killed during countermeasures. */
4420 	wpa_drv_set_countermeasures(wpa_s, 0);
4421 
4422 	wpa_dbg(wpa_s, MSG_DEBUG, "RSN: flushing PMKID list in the driver");
4423 	wpa_drv_flush_pmkid(wpa_s);
4424 
4425 	wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
4426 	wpa_s->prev_scan_wildcard = 0;
4427 
4428 	if (wpa_supplicant_enabled_networks(wpa_s)) {
4429 		if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) {
4430 			wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
4431 			interface_count = 0;
4432 		}
4433 #ifndef ANDROID
4434 		if (!wpa_s->p2p_mgmt &&
4435 		    wpa_supplicant_delayed_sched_scan(wpa_s,
4436 						      interface_count % 3,
4437 						      100000))
4438 			wpa_supplicant_req_scan(wpa_s, interface_count % 3,
4439 						100000);
4440 #endif /* ANDROID */
4441 		interface_count++;
4442 	} else
4443 		wpa_supplicant_set_state(wpa_s, WPA_INACTIVE);
4444 
4445 	return 0;
4446 }
4447 
4448 
wpa_supplicant_daemon(const char * pid_file)4449 static int wpa_supplicant_daemon(const char *pid_file)
4450 {
4451 	wpa_printf(MSG_DEBUG, "Daemonize..");
4452 	return os_daemonize(pid_file);
4453 }
4454 
4455 
4456 static struct wpa_supplicant *
wpa_supplicant_alloc(struct wpa_supplicant * parent)4457 wpa_supplicant_alloc(struct wpa_supplicant *parent)
4458 {
4459 	struct wpa_supplicant *wpa_s;
4460 
4461 	wpa_s = os_zalloc(sizeof(*wpa_s));
4462 	if (wpa_s == NULL)
4463 		return NULL;
4464 	wpa_s->scan_req = INITIAL_SCAN_REQ;
4465 	wpa_s->scan_interval = 5;
4466 	wpa_s->new_connection = 1;
4467 	wpa_s->parent = parent ? parent : wpa_s;
4468 	wpa_s->p2pdev = wpa_s->parent;
4469 	wpa_s->sched_scanning = 0;
4470 
4471 	dl_list_init(&wpa_s->bss_tmp_disallowed);
4472 	dl_list_init(&wpa_s->fils_hlp_req);
4473 
4474 	return wpa_s;
4475 }
4476 
4477 
4478 #ifdef CONFIG_HT_OVERRIDES
4479 
wpa_set_htcap_mcs(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,const char * ht_mcs)4480 static int wpa_set_htcap_mcs(struct wpa_supplicant *wpa_s,
4481 			     struct ieee80211_ht_capabilities *htcaps,
4482 			     struct ieee80211_ht_capabilities *htcaps_mask,
4483 			     const char *ht_mcs)
4484 {
4485 	/* parse ht_mcs into hex array */
4486 	int i;
4487 	const char *tmp = ht_mcs;
4488 	char *end = NULL;
4489 
4490 	/* If ht_mcs is null, do not set anything */
4491 	if (!ht_mcs)
4492 		return 0;
4493 
4494 	/* This is what we are setting in the kernel */
4495 	os_memset(&htcaps->supported_mcs_set, 0, IEEE80211_HT_MCS_MASK_LEN);
4496 
4497 	wpa_msg(wpa_s, MSG_DEBUG, "set_htcap, ht_mcs -:%s:-", ht_mcs);
4498 
4499 	for (i = 0; i < IEEE80211_HT_MCS_MASK_LEN; i++) {
4500 		long v;
4501 
4502 		errno = 0;
4503 		v = strtol(tmp, &end, 16);
4504 
4505 		if (errno == 0) {
4506 			wpa_msg(wpa_s, MSG_DEBUG,
4507 				"htcap value[%i]: %ld end: %p  tmp: %p",
4508 				i, v, end, tmp);
4509 			if (end == tmp)
4510 				break;
4511 
4512 			htcaps->supported_mcs_set[i] = v;
4513 			tmp = end;
4514 		} else {
4515 			wpa_msg(wpa_s, MSG_ERROR,
4516 				"Failed to parse ht-mcs: %s, error: %s\n",
4517 				ht_mcs, strerror(errno));
4518 			return -1;
4519 		}
4520 	}
4521 
4522 	/*
4523 	 * If we were able to parse any values, then set mask for the MCS set.
4524 	 */
4525 	if (i) {
4526 		os_memset(&htcaps_mask->supported_mcs_set, 0xff,
4527 			  IEEE80211_HT_MCS_MASK_LEN - 1);
4528 		/* skip the 3 reserved bits */
4529 		htcaps_mask->supported_mcs_set[IEEE80211_HT_MCS_MASK_LEN - 1] =
4530 			0x1f;
4531 	}
4532 
4533 	return 0;
4534 }
4535 
4536 
wpa_disable_max_amsdu(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int disabled)4537 static int wpa_disable_max_amsdu(struct wpa_supplicant *wpa_s,
4538 				 struct ieee80211_ht_capabilities *htcaps,
4539 				 struct ieee80211_ht_capabilities *htcaps_mask,
4540 				 int disabled)
4541 {
4542 	le16 msk;
4543 
4544 	if (disabled == -1)
4545 		return 0;
4546 
4547 	wpa_msg(wpa_s, MSG_DEBUG, "set_disable_max_amsdu: %d", disabled);
4548 
4549 	msk = host_to_le16(HT_CAP_INFO_MAX_AMSDU_SIZE);
4550 	htcaps_mask->ht_capabilities_info |= msk;
4551 	if (disabled)
4552 		htcaps->ht_capabilities_info &= msk;
4553 	else
4554 		htcaps->ht_capabilities_info |= msk;
4555 
4556 	return 0;
4557 }
4558 
4559 
wpa_set_ampdu_factor(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int factor)4560 static int wpa_set_ampdu_factor(struct wpa_supplicant *wpa_s,
4561 				struct ieee80211_ht_capabilities *htcaps,
4562 				struct ieee80211_ht_capabilities *htcaps_mask,
4563 				int factor)
4564 {
4565 	if (factor == -1)
4566 		return 0;
4567 
4568 	wpa_msg(wpa_s, MSG_DEBUG, "set_ampdu_factor: %d", factor);
4569 
4570 	if (factor < 0 || factor > 3) {
4571 		wpa_msg(wpa_s, MSG_ERROR, "ampdu_factor: %d out of range. "
4572 			"Must be 0-3 or -1", factor);
4573 		return -EINVAL;
4574 	}
4575 
4576 	htcaps_mask->a_mpdu_params |= 0x3; /* 2 bits for factor */
4577 	htcaps->a_mpdu_params &= ~0x3;
4578 	htcaps->a_mpdu_params |= factor & 0x3;
4579 
4580 	return 0;
4581 }
4582 
4583 
wpa_set_ampdu_density(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int density)4584 static int wpa_set_ampdu_density(struct wpa_supplicant *wpa_s,
4585 				 struct ieee80211_ht_capabilities *htcaps,
4586 				 struct ieee80211_ht_capabilities *htcaps_mask,
4587 				 int density)
4588 {
4589 	if (density == -1)
4590 		return 0;
4591 
4592 	wpa_msg(wpa_s, MSG_DEBUG, "set_ampdu_density: %d", density);
4593 
4594 	if (density < 0 || density > 7) {
4595 		wpa_msg(wpa_s, MSG_ERROR,
4596 			"ampdu_density: %d out of range. Must be 0-7 or -1.",
4597 			density);
4598 		return -EINVAL;
4599 	}
4600 
4601 	htcaps_mask->a_mpdu_params |= 0x1C;
4602 	htcaps->a_mpdu_params &= ~(0x1C);
4603 	htcaps->a_mpdu_params |= (density << 2) & 0x1C;
4604 
4605 	return 0;
4606 }
4607 
4608 
wpa_set_disable_ht40(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int disabled)4609 static int wpa_set_disable_ht40(struct wpa_supplicant *wpa_s,
4610 				struct ieee80211_ht_capabilities *htcaps,
4611 				struct ieee80211_ht_capabilities *htcaps_mask,
4612 				int disabled)
4613 {
4614 	if (disabled)
4615 		wpa_msg(wpa_s, MSG_DEBUG, "set_disable_ht40: %d", disabled);
4616 
4617 	set_disable_ht40(htcaps, disabled);
4618 	set_disable_ht40(htcaps_mask, 0);
4619 
4620 	return 0;
4621 }
4622 
4623 
wpa_set_disable_sgi(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int disabled)4624 static int wpa_set_disable_sgi(struct wpa_supplicant *wpa_s,
4625 			       struct ieee80211_ht_capabilities *htcaps,
4626 			       struct ieee80211_ht_capabilities *htcaps_mask,
4627 			       int disabled)
4628 {
4629 	/* Masking these out disables SGI */
4630 	le16 msk = host_to_le16(HT_CAP_INFO_SHORT_GI20MHZ |
4631 				HT_CAP_INFO_SHORT_GI40MHZ);
4632 
4633 	if (disabled)
4634 		wpa_msg(wpa_s, MSG_DEBUG, "set_disable_sgi: %d", disabled);
4635 
4636 	if (disabled)
4637 		htcaps->ht_capabilities_info &= ~msk;
4638 	else
4639 		htcaps->ht_capabilities_info |= msk;
4640 
4641 	htcaps_mask->ht_capabilities_info |= msk;
4642 
4643 	return 0;
4644 }
4645 
4646 
wpa_set_disable_ldpc(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int disabled)4647 static int wpa_set_disable_ldpc(struct wpa_supplicant *wpa_s,
4648 			       struct ieee80211_ht_capabilities *htcaps,
4649 			       struct ieee80211_ht_capabilities *htcaps_mask,
4650 			       int disabled)
4651 {
4652 	/* Masking these out disables LDPC */
4653 	le16 msk = host_to_le16(HT_CAP_INFO_LDPC_CODING_CAP);
4654 
4655 	if (disabled)
4656 		wpa_msg(wpa_s, MSG_DEBUG, "set_disable_ldpc: %d", disabled);
4657 
4658 	if (disabled)
4659 		htcaps->ht_capabilities_info &= ~msk;
4660 	else
4661 		htcaps->ht_capabilities_info |= msk;
4662 
4663 	htcaps_mask->ht_capabilities_info |= msk;
4664 
4665 	return 0;
4666 }
4667 
4668 
wpa_set_tx_stbc(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int tx_stbc)4669 static int wpa_set_tx_stbc(struct wpa_supplicant *wpa_s,
4670 			   struct ieee80211_ht_capabilities *htcaps,
4671 			   struct ieee80211_ht_capabilities *htcaps_mask,
4672 			   int tx_stbc)
4673 {
4674 	le16 msk = host_to_le16(HT_CAP_INFO_TX_STBC);
4675 
4676 	if (tx_stbc == -1)
4677 		return 0;
4678 
4679 	wpa_msg(wpa_s, MSG_DEBUG, "set_tx_stbc: %d", tx_stbc);
4680 
4681 	if (tx_stbc < 0 || tx_stbc > 1) {
4682 		wpa_msg(wpa_s, MSG_ERROR,
4683 			"tx_stbc: %d out of range. Must be 0-1 or -1", tx_stbc);
4684 		return -EINVAL;
4685 	}
4686 
4687 	htcaps_mask->ht_capabilities_info |= msk;
4688 	htcaps->ht_capabilities_info &= ~msk;
4689 	htcaps->ht_capabilities_info |= (tx_stbc << 7) & msk;
4690 
4691 	return 0;
4692 }
4693 
4694 
wpa_set_rx_stbc(struct wpa_supplicant * wpa_s,struct ieee80211_ht_capabilities * htcaps,struct ieee80211_ht_capabilities * htcaps_mask,int rx_stbc)4695 static int wpa_set_rx_stbc(struct wpa_supplicant *wpa_s,
4696 			   struct ieee80211_ht_capabilities *htcaps,
4697 			   struct ieee80211_ht_capabilities *htcaps_mask,
4698 			   int rx_stbc)
4699 {
4700 	le16 msk = host_to_le16(HT_CAP_INFO_RX_STBC_MASK);
4701 
4702 	if (rx_stbc == -1)
4703 		return 0;
4704 
4705 	wpa_msg(wpa_s, MSG_DEBUG, "set_rx_stbc: %d", rx_stbc);
4706 
4707 	if (rx_stbc < 0 || rx_stbc > 3) {
4708 		wpa_msg(wpa_s, MSG_ERROR,
4709 			"rx_stbc: %d out of range. Must be 0-3 or -1", rx_stbc);
4710 		return -EINVAL;
4711 	}
4712 
4713 	htcaps_mask->ht_capabilities_info |= msk;
4714 	htcaps->ht_capabilities_info &= ~msk;
4715 	htcaps->ht_capabilities_info |= (rx_stbc << 8) & msk;
4716 
4717 	return 0;
4718 }
4719 
4720 
wpa_supplicant_apply_ht_overrides(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid,struct wpa_driver_associate_params * params)4721 void wpa_supplicant_apply_ht_overrides(
4722 	struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
4723 	struct wpa_driver_associate_params *params)
4724 {
4725 	struct ieee80211_ht_capabilities *htcaps;
4726 	struct ieee80211_ht_capabilities *htcaps_mask;
4727 
4728 	if (!ssid)
4729 		return;
4730 
4731 	params->disable_ht = ssid->disable_ht;
4732 	if (!params->htcaps || !params->htcaps_mask)
4733 		return;
4734 
4735 	htcaps = (struct ieee80211_ht_capabilities *) params->htcaps;
4736 	htcaps_mask = (struct ieee80211_ht_capabilities *) params->htcaps_mask;
4737 	wpa_set_htcap_mcs(wpa_s, htcaps, htcaps_mask, ssid->ht_mcs);
4738 	wpa_disable_max_amsdu(wpa_s, htcaps, htcaps_mask,
4739 			      ssid->disable_max_amsdu);
4740 	wpa_set_ampdu_factor(wpa_s, htcaps, htcaps_mask, ssid->ampdu_factor);
4741 	wpa_set_ampdu_density(wpa_s, htcaps, htcaps_mask, ssid->ampdu_density);
4742 	wpa_set_disable_ht40(wpa_s, htcaps, htcaps_mask, ssid->disable_ht40);
4743 	wpa_set_disable_sgi(wpa_s, htcaps, htcaps_mask, ssid->disable_sgi);
4744 	wpa_set_disable_ldpc(wpa_s, htcaps, htcaps_mask, ssid->disable_ldpc);
4745 	wpa_set_rx_stbc(wpa_s, htcaps, htcaps_mask, ssid->rx_stbc);
4746 	wpa_set_tx_stbc(wpa_s, htcaps, htcaps_mask, ssid->tx_stbc);
4747 
4748 	if (ssid->ht40_intolerant) {
4749 		le16 bit = host_to_le16(HT_CAP_INFO_40MHZ_INTOLERANT);
4750 		htcaps->ht_capabilities_info |= bit;
4751 		htcaps_mask->ht_capabilities_info |= bit;
4752 	}
4753 }
4754 
4755 #endif /* CONFIG_HT_OVERRIDES */
4756 
4757 
4758 #ifdef CONFIG_VHT_OVERRIDES
wpa_supplicant_apply_vht_overrides(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid,struct wpa_driver_associate_params * params)4759 void wpa_supplicant_apply_vht_overrides(
4760 	struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
4761 	struct wpa_driver_associate_params *params)
4762 {
4763 	struct ieee80211_vht_capabilities *vhtcaps;
4764 	struct ieee80211_vht_capabilities *vhtcaps_mask;
4765 
4766 	if (!ssid)
4767 		return;
4768 
4769 	params->disable_vht = ssid->disable_vht;
4770 
4771 	vhtcaps = (void *) params->vhtcaps;
4772 	vhtcaps_mask = (void *) params->vhtcaps_mask;
4773 
4774 	if (!vhtcaps || !vhtcaps_mask)
4775 		return;
4776 
4777 	vhtcaps->vht_capabilities_info = host_to_le32(ssid->vht_capa);
4778 	vhtcaps_mask->vht_capabilities_info = host_to_le32(ssid->vht_capa_mask);
4779 
4780 #ifdef CONFIG_HT_OVERRIDES
4781 	if (ssid->disable_sgi) {
4782 		vhtcaps_mask->vht_capabilities_info |= (VHT_CAP_SHORT_GI_80 |
4783 							VHT_CAP_SHORT_GI_160);
4784 		vhtcaps->vht_capabilities_info &= ~(VHT_CAP_SHORT_GI_80 |
4785 						    VHT_CAP_SHORT_GI_160);
4786 		wpa_msg(wpa_s, MSG_DEBUG,
4787 			"disable-sgi override specified, vht-caps: 0x%x",
4788 			vhtcaps->vht_capabilities_info);
4789 	}
4790 
4791 	/* if max ampdu is <= 3, we have to make the HT cap the same */
4792 	if (ssid->vht_capa_mask & VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX) {
4793 		int max_ampdu;
4794 
4795 		max_ampdu = (ssid->vht_capa &
4796 			     VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX) >>
4797 			VHT_CAP_MAX_A_MPDU_LENGTH_EXPONENT_MAX_SHIFT;
4798 
4799 		max_ampdu = max_ampdu < 3 ? max_ampdu : 3;
4800 		wpa_set_ampdu_factor(wpa_s,
4801 				     (void *) params->htcaps,
4802 				     (void *) params->htcaps_mask,
4803 				     max_ampdu);
4804 	}
4805 #endif /* CONFIG_HT_OVERRIDES */
4806 
4807 #define OVERRIDE_MCS(i)							\
4808 	if (ssid->vht_tx_mcs_nss_ ##i >= 0) {				\
4809 		vhtcaps_mask->vht_supported_mcs_set.tx_map |=		\
4810 			host_to_le16(3 << 2 * (i - 1));			\
4811 		vhtcaps->vht_supported_mcs_set.tx_map |=		\
4812 			host_to_le16(ssid->vht_tx_mcs_nss_ ##i <<	\
4813 				     2 * (i - 1));			\
4814 	}								\
4815 	if (ssid->vht_rx_mcs_nss_ ##i >= 0) {				\
4816 		vhtcaps_mask->vht_supported_mcs_set.rx_map |=		\
4817 			host_to_le16(3 << 2 * (i - 1));			\
4818 		vhtcaps->vht_supported_mcs_set.rx_map |=		\
4819 			host_to_le16(ssid->vht_rx_mcs_nss_ ##i <<	\
4820 				     2 * (i - 1));			\
4821 	}
4822 
4823 	OVERRIDE_MCS(1);
4824 	OVERRIDE_MCS(2);
4825 	OVERRIDE_MCS(3);
4826 	OVERRIDE_MCS(4);
4827 	OVERRIDE_MCS(5);
4828 	OVERRIDE_MCS(6);
4829 	OVERRIDE_MCS(7);
4830 	OVERRIDE_MCS(8);
4831 }
4832 #endif /* CONFIG_VHT_OVERRIDES */
4833 
4834 
pcsc_reader_init(struct wpa_supplicant * wpa_s)4835 static int pcsc_reader_init(struct wpa_supplicant *wpa_s)
4836 {
4837 #ifdef PCSC_FUNCS
4838 	size_t len;
4839 
4840 	if (!wpa_s->conf->pcsc_reader)
4841 		return 0;
4842 
4843 	wpa_s->scard = scard_init(wpa_s->conf->pcsc_reader);
4844 	if (!wpa_s->scard)
4845 		return 1;
4846 
4847 	if (wpa_s->conf->pcsc_pin &&
4848 	    scard_set_pin(wpa_s->scard, wpa_s->conf->pcsc_pin) < 0) {
4849 		scard_deinit(wpa_s->scard);
4850 		wpa_s->scard = NULL;
4851 		wpa_msg(wpa_s, MSG_ERROR, "PC/SC PIN validation failed");
4852 		return -1;
4853 	}
4854 
4855 	len = sizeof(wpa_s->imsi) - 1;
4856 	if (scard_get_imsi(wpa_s->scard, wpa_s->imsi, &len)) {
4857 		scard_deinit(wpa_s->scard);
4858 		wpa_s->scard = NULL;
4859 		wpa_msg(wpa_s, MSG_ERROR, "Could not read IMSI");
4860 		return -1;
4861 	}
4862 	wpa_s->imsi[len] = '\0';
4863 
4864 	wpa_s->mnc_len = scard_get_mnc_len(wpa_s->scard);
4865 
4866 	wpa_printf(MSG_DEBUG, "SCARD: IMSI %s (MNC length %d)",
4867 		   wpa_s->imsi, wpa_s->mnc_len);
4868 
4869 	wpa_sm_set_scard_ctx(wpa_s->wpa, wpa_s->scard);
4870 	eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard);
4871 #endif /* PCSC_FUNCS */
4872 
4873 	return 0;
4874 }
4875 
4876 
wpas_init_ext_pw(struct wpa_supplicant * wpa_s)4877 int wpas_init_ext_pw(struct wpa_supplicant *wpa_s)
4878 {
4879 	char *val, *pos;
4880 
4881 	ext_password_deinit(wpa_s->ext_pw);
4882 	wpa_s->ext_pw = NULL;
4883 	eapol_sm_set_ext_pw_ctx(wpa_s->eapol, NULL);
4884 
4885 	if (!wpa_s->conf->ext_password_backend)
4886 		return 0;
4887 
4888 	val = os_strdup(wpa_s->conf->ext_password_backend);
4889 	if (val == NULL)
4890 		return -1;
4891 	pos = os_strchr(val, ':');
4892 	if (pos)
4893 		*pos++ = '\0';
4894 
4895 	wpa_printf(MSG_DEBUG, "EXT PW: Initialize backend '%s'", val);
4896 
4897 	wpa_s->ext_pw = ext_password_init(val, pos);
4898 	os_free(val);
4899 	if (wpa_s->ext_pw == NULL) {
4900 		wpa_printf(MSG_DEBUG, "EXT PW: Failed to initialize backend");
4901 		return -1;
4902 	}
4903 	eapol_sm_set_ext_pw_ctx(wpa_s->eapol, wpa_s->ext_pw);
4904 
4905 	return 0;
4906 }
4907 
4908 
4909 #ifdef CONFIG_FST
4910 
wpas_fst_get_bssid_cb(void * ctx)4911 static const u8 * wpas_fst_get_bssid_cb(void *ctx)
4912 {
4913 	struct wpa_supplicant *wpa_s = ctx;
4914 
4915 	return (is_zero_ether_addr(wpa_s->bssid) ||
4916 		wpa_s->wpa_state != WPA_COMPLETED) ? NULL : wpa_s->bssid;
4917 }
4918 
4919 
wpas_fst_get_channel_info_cb(void * ctx,enum hostapd_hw_mode * hw_mode,u8 * channel)4920 static void wpas_fst_get_channel_info_cb(void *ctx,
4921 					 enum hostapd_hw_mode *hw_mode,
4922 					 u8 *channel)
4923 {
4924 	struct wpa_supplicant *wpa_s = ctx;
4925 
4926 	if (wpa_s->current_bss) {
4927 		*hw_mode = ieee80211_freq_to_chan(wpa_s->current_bss->freq,
4928 						  channel);
4929 	} else if (wpa_s->hw.num_modes) {
4930 		*hw_mode = wpa_s->hw.modes[0].mode;
4931 	} else {
4932 		WPA_ASSERT(0);
4933 		*hw_mode = 0;
4934 	}
4935 }
4936 
4937 
wpas_fst_get_hw_modes(void * ctx,struct hostapd_hw_modes ** modes)4938 static int wpas_fst_get_hw_modes(void *ctx, struct hostapd_hw_modes **modes)
4939 {
4940 	struct wpa_supplicant *wpa_s = ctx;
4941 
4942 	*modes = wpa_s->hw.modes;
4943 	return wpa_s->hw.num_modes;
4944 }
4945 
4946 
wpas_fst_set_ies_cb(void * ctx,const struct wpabuf * fst_ies)4947 static void wpas_fst_set_ies_cb(void *ctx, const struct wpabuf *fst_ies)
4948 {
4949 	struct wpa_supplicant *wpa_s = ctx;
4950 
4951 	wpa_hexdump_buf(MSG_DEBUG, "FST: Set IEs", fst_ies);
4952 	wpa_s->fst_ies = fst_ies;
4953 }
4954 
4955 
wpas_fst_send_action_cb(void * ctx,const u8 * da,struct wpabuf * data)4956 static int wpas_fst_send_action_cb(void *ctx, const u8 *da, struct wpabuf *data)
4957 {
4958 	struct wpa_supplicant *wpa_s = ctx;
4959 
4960 	if (os_memcmp(wpa_s->bssid, da, ETH_ALEN) != 0) {
4961 		wpa_printf(MSG_INFO, "FST:%s:bssid=" MACSTR " != da=" MACSTR,
4962 			   __func__, MAC2STR(wpa_s->bssid), MAC2STR(da));
4963 		return -1;
4964 	}
4965 	return wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
4966 				   wpa_s->own_addr, wpa_s->bssid,
4967 				   wpabuf_head(data), wpabuf_len(data),
4968 				   0);
4969 }
4970 
4971 
wpas_fst_get_mb_ie_cb(void * ctx,const u8 * addr)4972 static const struct wpabuf * wpas_fst_get_mb_ie_cb(void *ctx, const u8 *addr)
4973 {
4974 	struct wpa_supplicant *wpa_s = ctx;
4975 
4976 	WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
4977 	return wpa_s->received_mb_ies;
4978 }
4979 
4980 
wpas_fst_update_mb_ie_cb(void * ctx,const u8 * addr,const u8 * buf,size_t size)4981 static void wpas_fst_update_mb_ie_cb(void *ctx, const u8 *addr,
4982 				     const u8 *buf, size_t size)
4983 {
4984 	struct wpa_supplicant *wpa_s = ctx;
4985 	struct mb_ies_info info;
4986 
4987 	WPA_ASSERT(os_memcmp(wpa_s->bssid, addr, ETH_ALEN) == 0);
4988 
4989 	if (!mb_ies_info_by_ies(&info, buf, size)) {
4990 		wpabuf_free(wpa_s->received_mb_ies);
4991 		wpa_s->received_mb_ies = mb_ies_by_info(&info);
4992 	}
4993 }
4994 
4995 
wpas_fst_get_peer_first(void * ctx,struct fst_get_peer_ctx ** get_ctx,Boolean mb_only)4996 static const u8 * wpas_fst_get_peer_first(void *ctx,
4997 					  struct fst_get_peer_ctx **get_ctx,
4998 					  Boolean mb_only)
4999 {
5000 	struct wpa_supplicant *wpa_s = ctx;
5001 
5002 	*get_ctx = NULL;
5003 	if (!is_zero_ether_addr(wpa_s->bssid))
5004 		return (wpa_s->received_mb_ies || !mb_only) ?
5005 			wpa_s->bssid : NULL;
5006 	return NULL;
5007 }
5008 
5009 
wpas_fst_get_peer_next(void * ctx,struct fst_get_peer_ctx ** get_ctx,Boolean mb_only)5010 static const u8 * wpas_fst_get_peer_next(void *ctx,
5011 					 struct fst_get_peer_ctx **get_ctx,
5012 					 Boolean mb_only)
5013 {
5014 	return NULL;
5015 }
5016 
fst_wpa_supplicant_fill_iface_obj(struct wpa_supplicant * wpa_s,struct fst_wpa_obj * iface_obj)5017 void fst_wpa_supplicant_fill_iface_obj(struct wpa_supplicant *wpa_s,
5018 				       struct fst_wpa_obj *iface_obj)
5019 {
5020 	iface_obj->ctx              = wpa_s;
5021 	iface_obj->get_bssid        = wpas_fst_get_bssid_cb;
5022 	iface_obj->get_channel_info = wpas_fst_get_channel_info_cb;
5023 	iface_obj->get_hw_modes     = wpas_fst_get_hw_modes;
5024 	iface_obj->set_ies          = wpas_fst_set_ies_cb;
5025 	iface_obj->send_action      = wpas_fst_send_action_cb;
5026 	iface_obj->get_mb_ie        = wpas_fst_get_mb_ie_cb;
5027 	iface_obj->update_mb_ie     = wpas_fst_update_mb_ie_cb;
5028 	iface_obj->get_peer_first   = wpas_fst_get_peer_first;
5029 	iface_obj->get_peer_next    = wpas_fst_get_peer_next;
5030 }
5031 #endif /* CONFIG_FST */
5032 
wpas_set_wowlan_triggers(struct wpa_supplicant * wpa_s,const struct wpa_driver_capa * capa)5033 static int wpas_set_wowlan_triggers(struct wpa_supplicant *wpa_s,
5034 				    const struct wpa_driver_capa *capa)
5035 {
5036 	struct wowlan_triggers *triggers;
5037 	int ret = 0;
5038 
5039 	if (!wpa_s->conf->wowlan_triggers)
5040 		return 0;
5041 
5042 	triggers = wpa_get_wowlan_triggers(wpa_s->conf->wowlan_triggers, capa);
5043 	if (triggers) {
5044 		ret = wpa_drv_wowlan(wpa_s, triggers);
5045 		os_free(triggers);
5046 	}
5047 	return ret;
5048 }
5049 
5050 
wpas_freq_to_band(int freq)5051 enum wpa_radio_work_band wpas_freq_to_band(int freq)
5052 {
5053 	if (freq < 3000)
5054 		return BAND_2_4_GHZ;
5055 	if (freq > 50000)
5056 		return BAND_60_GHZ;
5057 	return BAND_5_GHZ;
5058 }
5059 
5060 
wpas_get_bands(struct wpa_supplicant * wpa_s,const int * freqs)5061 unsigned int wpas_get_bands(struct wpa_supplicant *wpa_s, const int *freqs)
5062 {
5063 	int i;
5064 	unsigned int band = 0;
5065 
5066 	if (freqs) {
5067 		/* freqs are specified for the radio work */
5068 		for (i = 0; freqs[i]; i++)
5069 			band |= wpas_freq_to_band(freqs[i]);
5070 	} else {
5071 		/*
5072 		 * freqs are not specified, implies all
5073 		 * the supported freqs by HW
5074 		 */
5075 		for (i = 0; i < wpa_s->hw.num_modes; i++) {
5076 			if (wpa_s->hw.modes[i].num_channels != 0) {
5077 				if (wpa_s->hw.modes[i].mode ==
5078 				    HOSTAPD_MODE_IEEE80211B ||
5079 				    wpa_s->hw.modes[i].mode ==
5080 				    HOSTAPD_MODE_IEEE80211G)
5081 					band |= BAND_2_4_GHZ;
5082 				else if (wpa_s->hw.modes[i].mode ==
5083 					 HOSTAPD_MODE_IEEE80211A)
5084 					band |= BAND_5_GHZ;
5085 				else if (wpa_s->hw.modes[i].mode ==
5086 					 HOSTAPD_MODE_IEEE80211AD)
5087 					band |= BAND_60_GHZ;
5088 				else if (wpa_s->hw.modes[i].mode ==
5089 					 HOSTAPD_MODE_IEEE80211ANY)
5090 					band = BAND_2_4_GHZ | BAND_5_GHZ |
5091 						BAND_60_GHZ;
5092 			}
5093 		}
5094 	}
5095 
5096 	return band;
5097 }
5098 
5099 
radio_add_interface(struct wpa_supplicant * wpa_s,const char * rn)5100 static struct wpa_radio * radio_add_interface(struct wpa_supplicant *wpa_s,
5101 					      const char *rn)
5102 {
5103 	struct wpa_supplicant *iface = wpa_s->global->ifaces;
5104 	struct wpa_radio *radio;
5105 
5106 	while (rn && iface) {
5107 		radio = iface->radio;
5108 		if (radio && os_strcmp(rn, radio->name) == 0) {
5109 			wpa_printf(MSG_DEBUG, "Add interface %s to existing radio %s",
5110 				   wpa_s->ifname, rn);
5111 			dl_list_add(&radio->ifaces, &wpa_s->radio_list);
5112 			return radio;
5113 		}
5114 
5115 		iface = iface->next;
5116 	}
5117 
5118 	wpa_printf(MSG_DEBUG, "Add interface %s to a new radio %s",
5119 		   wpa_s->ifname, rn ? rn : "N/A");
5120 	radio = os_zalloc(sizeof(*radio));
5121 	if (radio == NULL)
5122 		return NULL;
5123 
5124 	if (rn)
5125 		os_strlcpy(radio->name, rn, sizeof(radio->name));
5126 	dl_list_init(&radio->ifaces);
5127 	dl_list_init(&radio->work);
5128 	dl_list_add(&radio->ifaces, &wpa_s->radio_list);
5129 
5130 	return radio;
5131 }
5132 
5133 
radio_work_free(struct wpa_radio_work * work)5134 static void radio_work_free(struct wpa_radio_work *work)
5135 {
5136 	if (work->wpa_s->scan_work == work) {
5137 		/* This should not really happen. */
5138 		wpa_dbg(work->wpa_s, MSG_INFO, "Freeing radio work '%s'@%p (started=%d) that is marked as scan_work",
5139 			work->type, work, work->started);
5140 		work->wpa_s->scan_work = NULL;
5141 	}
5142 
5143 #ifdef CONFIG_P2P
5144 	if (work->wpa_s->p2p_scan_work == work) {
5145 		/* This should not really happen. */
5146 		wpa_dbg(work->wpa_s, MSG_INFO, "Freeing radio work '%s'@%p (started=%d) that is marked as p2p_scan_work",
5147 			work->type, work, work->started);
5148 		work->wpa_s->p2p_scan_work = NULL;
5149 	}
5150 #endif /* CONFIG_P2P */
5151 
5152 	if (work->started) {
5153 		work->wpa_s->radio->num_active_works--;
5154 		wpa_dbg(work->wpa_s, MSG_DEBUG,
5155 			"radio_work_free('%s'@%p): num_active_works --> %u",
5156 			work->type, work,
5157 			work->wpa_s->radio->num_active_works);
5158 	}
5159 
5160 	dl_list_del(&work->list);
5161 	os_free(work);
5162 }
5163 
5164 
radio_work_is_connect(struct wpa_radio_work * work)5165 static int radio_work_is_connect(struct wpa_radio_work *work)
5166 {
5167 	return os_strcmp(work->type, "sme-connect") == 0 ||
5168 		os_strcmp(work->type, "connect") == 0;
5169 }
5170 
5171 
radio_work_is_scan(struct wpa_radio_work * work)5172 static int radio_work_is_scan(struct wpa_radio_work *work)
5173 {
5174 	return os_strcmp(work->type, "scan") == 0 ||
5175 		os_strcmp(work->type, "p2p-scan") == 0;
5176 }
5177 
5178 
radio_work_get_next_work(struct wpa_radio * radio)5179 static struct wpa_radio_work * radio_work_get_next_work(struct wpa_radio *radio)
5180 {
5181 	struct wpa_radio_work *active_work = NULL;
5182 	struct wpa_radio_work *tmp;
5183 
5184 	/* Get the active work to know the type and band. */
5185 	dl_list_for_each(tmp, &radio->work, struct wpa_radio_work, list) {
5186 		if (tmp->started) {
5187 			active_work = tmp;
5188 			break;
5189 		}
5190 	}
5191 
5192 	if (!active_work) {
5193 		/* No active work, start one */
5194 		radio->num_active_works = 0;
5195 		dl_list_for_each(tmp, &radio->work, struct wpa_radio_work,
5196 				 list) {
5197 			if (os_strcmp(tmp->type, "scan") == 0 &&
5198 			    radio->external_scan_running &&
5199 			    (((struct wpa_driver_scan_params *)
5200 			      tmp->ctx)->only_new_results ||
5201 			     tmp->wpa_s->clear_driver_scan_cache))
5202 				continue;
5203 			return tmp;
5204 		}
5205 		return NULL;
5206 	}
5207 
5208 	if (radio_work_is_connect(active_work)) {
5209 		/*
5210 		 * If the active work is either connect or sme-connect,
5211 		 * do not parallelize them with other radio works.
5212 		 */
5213 		wpa_dbg(active_work->wpa_s, MSG_DEBUG,
5214 			"Do not parallelize radio work with %s",
5215 			active_work->type);
5216 		return NULL;
5217 	}
5218 
5219 	dl_list_for_each(tmp, &radio->work, struct wpa_radio_work, list) {
5220 		if (tmp->started)
5221 			continue;
5222 
5223 		/*
5224 		 * If connect or sme-connect are enqueued, parallelize only
5225 		 * those operations ahead of them in the queue.
5226 		 */
5227 		if (radio_work_is_connect(tmp))
5228 			break;
5229 
5230 		/* Serialize parallel scan and p2p_scan operations on the same
5231 		 * interface since the driver_nl80211 mechanism for tracking
5232 		 * scan cookies does not yet have support for this. */
5233 		if (active_work->wpa_s == tmp->wpa_s &&
5234 		    radio_work_is_scan(active_work) &&
5235 		    radio_work_is_scan(tmp)) {
5236 			wpa_dbg(active_work->wpa_s, MSG_DEBUG,
5237 				"Do not start work '%s' when another work '%s' is already scheduled",
5238 				tmp->type, active_work->type);
5239 			continue;
5240 		}
5241 		/*
5242 		 * Check that the radio works are distinct and
5243 		 * on different bands.
5244 		 */
5245 		if (os_strcmp(active_work->type, tmp->type) != 0 &&
5246 		    (active_work->bands != tmp->bands)) {
5247 			/*
5248 			 * If a scan has to be scheduled through nl80211 scan
5249 			 * interface and if an external scan is already running,
5250 			 * do not schedule the scan since it is likely to get
5251 			 * rejected by kernel.
5252 			 */
5253 			if (os_strcmp(tmp->type, "scan") == 0 &&
5254 			    radio->external_scan_running &&
5255 			    (((struct wpa_driver_scan_params *)
5256 			      tmp->ctx)->only_new_results ||
5257 			     tmp->wpa_s->clear_driver_scan_cache))
5258 				continue;
5259 
5260 			wpa_dbg(active_work->wpa_s, MSG_DEBUG,
5261 				"active_work:%s new_work:%s",
5262 				active_work->type, tmp->type);
5263 			return tmp;
5264 		}
5265 	}
5266 
5267 	/* Did not find a radio work to schedule in parallel. */
5268 	return NULL;
5269 }
5270 
5271 
radio_start_next_work(void * eloop_ctx,void * timeout_ctx)5272 static void radio_start_next_work(void *eloop_ctx, void *timeout_ctx)
5273 {
5274 	struct wpa_radio *radio = eloop_ctx;
5275 	struct wpa_radio_work *work;
5276 	struct os_reltime now, diff;
5277 	struct wpa_supplicant *wpa_s;
5278 
5279 	work = dl_list_first(&radio->work, struct wpa_radio_work, list);
5280 	if (work == NULL) {
5281 		radio->num_active_works = 0;
5282 		return;
5283 	}
5284 
5285 	wpa_s = dl_list_first(&radio->ifaces, struct wpa_supplicant,
5286 			      radio_list);
5287 
5288 	if (!(wpa_s &&
5289 	      wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS)) {
5290 		if (work->started)
5291 			return; /* already started and still in progress */
5292 
5293 		if (wpa_s && wpa_s->radio->external_scan_running) {
5294 			wpa_printf(MSG_DEBUG, "Delay radio work start until externally triggered scan completes");
5295 			return;
5296 		}
5297 	} else {
5298 		work = NULL;
5299 		if (radio->num_active_works < MAX_ACTIVE_WORKS) {
5300 			/* get the work to schedule next */
5301 			work = radio_work_get_next_work(radio);
5302 		}
5303 		if (!work)
5304 			return;
5305 	}
5306 
5307 	wpa_s = work->wpa_s;
5308 	os_get_reltime(&now);
5309 	os_reltime_sub(&now, &work->time, &diff);
5310 	wpa_dbg(wpa_s, MSG_DEBUG,
5311 		"Starting radio work '%s'@%p after %jd.%06jd second wait",
5312 		work->type, work, (intmax_t)diff.sec, (intmax_t)diff.usec);
5313 	work->started = 1;
5314 	work->time = now;
5315 	radio->num_active_works++;
5316 
5317 	work->cb(work, 0);
5318 
5319 	if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS) &&
5320 	    radio->num_active_works < MAX_ACTIVE_WORKS)
5321 		radio_work_check_next(wpa_s);
5322 }
5323 
5324 
5325 /*
5326  * This function removes both started and pending radio works running on
5327  * the provided interface's radio.
5328  * Prior to the removal of the radio work, its callback (cb) is called with
5329  * deinit set to be 1. Each work's callback is responsible for clearing its
5330  * internal data and restoring to a correct state.
5331  * @wpa_s: wpa_supplicant data
5332  * @type: type of works to be removed
5333  * @remove_all: 1 to remove all the works on this radio, 0 to remove only
5334  * this interface's works.
5335  */
radio_remove_works(struct wpa_supplicant * wpa_s,const char * type,int remove_all)5336 void radio_remove_works(struct wpa_supplicant *wpa_s,
5337 			const char *type, int remove_all)
5338 {
5339 	struct wpa_radio_work *work, *tmp;
5340 	struct wpa_radio *radio = wpa_s->radio;
5341 
5342 	dl_list_for_each_safe(work, tmp, &radio->work, struct wpa_radio_work,
5343 			      list) {
5344 		if (type && os_strcmp(type, work->type) != 0)
5345 			continue;
5346 
5347 		/* skip other ifaces' works */
5348 		if (!remove_all && work->wpa_s != wpa_s)
5349 			continue;
5350 
5351 		wpa_dbg(wpa_s, MSG_DEBUG, "Remove radio work '%s'@%p%s",
5352 			work->type, work, work->started ? " (started)" : "");
5353 		work->cb(work, 1);
5354 		radio_work_free(work);
5355 	}
5356 
5357 	/* in case we removed the started work */
5358 	radio_work_check_next(wpa_s);
5359 }
5360 
5361 
radio_remove_pending_work(struct wpa_supplicant * wpa_s,void * ctx)5362 void radio_remove_pending_work(struct wpa_supplicant *wpa_s, void *ctx)
5363 {
5364 	struct wpa_radio_work *work;
5365 	struct wpa_radio *radio = wpa_s->radio;
5366 
5367 	dl_list_for_each(work, &radio->work, struct wpa_radio_work, list) {
5368 		if (work->ctx != ctx)
5369 			continue;
5370 		wpa_dbg(wpa_s, MSG_DEBUG, "Free pending radio work '%s'@%p%s",
5371 			work->type, work, work->started ? " (started)" : "");
5372 		radio_work_free(work);
5373 		break;
5374 	}
5375 }
5376 
5377 
radio_remove_interface(struct wpa_supplicant * wpa_s)5378 static void radio_remove_interface(struct wpa_supplicant *wpa_s)
5379 {
5380 	struct wpa_radio *radio = wpa_s->radio;
5381 
5382 	if (!radio)
5383 		return;
5384 
5385 	wpa_printf(MSG_DEBUG, "Remove interface %s from radio %s",
5386 		   wpa_s->ifname, radio->name);
5387 	dl_list_del(&wpa_s->radio_list);
5388 	radio_remove_works(wpa_s, NULL, 0);
5389 	wpa_s->radio = NULL;
5390 	if (!dl_list_empty(&radio->ifaces))
5391 		return; /* Interfaces remain for this radio */
5392 
5393 	wpa_printf(MSG_DEBUG, "Remove radio %s", radio->name);
5394 	eloop_cancel_timeout(radio_start_next_work, radio, NULL);
5395 	os_free(radio);
5396 }
5397 
5398 
radio_work_check_next(struct wpa_supplicant * wpa_s)5399 void radio_work_check_next(struct wpa_supplicant *wpa_s)
5400 {
5401 	struct wpa_radio *radio = wpa_s->radio;
5402 
5403 	if (dl_list_empty(&radio->work))
5404 		return;
5405 	if (wpa_s->ext_work_in_progress) {
5406 		wpa_printf(MSG_DEBUG,
5407 			   "External radio work in progress - delay start of pending item");
5408 		return;
5409 	}
5410 	eloop_cancel_timeout(radio_start_next_work, radio, NULL);
5411 	eloop_register_timeout(0, 0, radio_start_next_work, radio, NULL);
5412 }
5413 
5414 
5415 /**
5416  * radio_add_work - Add a radio work item
5417  * @wpa_s: Pointer to wpa_supplicant data
5418  * @freq: Frequency of the offchannel operation in MHz or 0
5419  * @type: Unique identifier for each type of work
5420  * @next: Force as the next work to be executed
5421  * @cb: Callback function for indicating when radio is available
5422  * @ctx: Context pointer for the work (work->ctx in cb())
5423  * Returns: 0 on success, -1 on failure
5424  *
5425  * This function is used to request time for an operation that requires
5426  * exclusive radio control. Once the radio is available, the registered callback
5427  * function will be called. radio_work_done() must be called once the exclusive
5428  * radio operation has been completed, so that the radio is freed for other
5429  * operations. The special case of deinit=1 is used to free the context data
5430  * during interface removal. That does not allow the callback function to start
5431  * the radio operation, i.e., it must free any resources allocated for the radio
5432  * work and return.
5433  *
5434  * The @freq parameter can be used to indicate a single channel on which the
5435  * offchannel operation will occur. This may allow multiple radio work
5436  * operations to be performed in parallel if they apply for the same channel.
5437  * Setting this to 0 indicates that the work item may use multiple channels or
5438  * requires exclusive control of the radio.
5439  */
radio_add_work(struct wpa_supplicant * wpa_s,unsigned int freq,const char * type,int next,void (* cb)(struct wpa_radio_work * work,int deinit),void * ctx)5440 int radio_add_work(struct wpa_supplicant *wpa_s, unsigned int freq,
5441 		   const char *type, int next,
5442 		   void (*cb)(struct wpa_radio_work *work, int deinit),
5443 		   void *ctx)
5444 {
5445 	struct wpa_radio *radio = wpa_s->radio;
5446 	struct wpa_radio_work *work;
5447 	int was_empty;
5448 
5449 	work = os_zalloc(sizeof(*work));
5450 	if (work == NULL)
5451 		return -1;
5452 	wpa_dbg(wpa_s, MSG_DEBUG, "Add radio work '%s'@%p", type, work);
5453 	os_get_reltime(&work->time);
5454 	work->freq = freq;
5455 	work->type = type;
5456 	work->wpa_s = wpa_s;
5457 	work->cb = cb;
5458 	work->ctx = ctx;
5459 
5460 	if (freq)
5461 		work->bands = wpas_freq_to_band(freq);
5462 	else if (os_strcmp(type, "scan") == 0 ||
5463 		 os_strcmp(type, "p2p-scan") == 0)
5464 		work->bands = wpas_get_bands(wpa_s,
5465 					     ((struct wpa_driver_scan_params *)
5466 					      ctx)->freqs);
5467 	else
5468 		work->bands = wpas_get_bands(wpa_s, NULL);
5469 
5470 	was_empty = dl_list_empty(&wpa_s->radio->work);
5471 	if (next)
5472 		dl_list_add(&wpa_s->radio->work, &work->list);
5473 	else
5474 		dl_list_add_tail(&wpa_s->radio->work, &work->list);
5475 	if (was_empty) {
5476 		wpa_dbg(wpa_s, MSG_DEBUG, "First radio work item in the queue - schedule start immediately");
5477 		radio_work_check_next(wpa_s);
5478 	} else if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_SIMULTANEOUS)
5479 		   && radio->num_active_works < MAX_ACTIVE_WORKS) {
5480 		wpa_dbg(wpa_s, MSG_DEBUG,
5481 			"Try to schedule a radio work (num_active_works=%u)",
5482 			radio->num_active_works);
5483 		radio_work_check_next(wpa_s);
5484 	}
5485 
5486 	return 0;
5487 }
5488 
5489 
5490 /**
5491  * radio_work_done - Indicate that a radio work item has been completed
5492  * @work: Completed work
5493  *
5494  * This function is called once the callback function registered with
5495  * radio_add_work() has completed its work.
5496  */
radio_work_done(struct wpa_radio_work * work)5497 void radio_work_done(struct wpa_radio_work *work)
5498 {
5499 	struct wpa_supplicant *wpa_s = work->wpa_s;
5500 	struct os_reltime now, diff;
5501 	unsigned int started = work->started;
5502 
5503 	os_get_reltime(&now);
5504 	os_reltime_sub(&now, &work->time, &diff);
5505 	wpa_dbg(wpa_s, MSG_DEBUG, "Radio work '%s'@%p %s in %jd.%06ld seconds",
5506 		work->type, work, started ? "done" : "canceled",
5507 		(intmax_t)diff.sec, (long)diff.usec);
5508 	radio_work_free(work);
5509 	if (started)
5510 		radio_work_check_next(wpa_s);
5511 }
5512 
5513 
5514 struct wpa_radio_work *
radio_work_pending(struct wpa_supplicant * wpa_s,const char * type)5515 radio_work_pending(struct wpa_supplicant *wpa_s, const char *type)
5516 {
5517 	struct wpa_radio_work *work;
5518 	struct wpa_radio *radio = wpa_s->radio;
5519 
5520 	dl_list_for_each(work, &radio->work, struct wpa_radio_work, list) {
5521 		if (work->wpa_s == wpa_s && os_strcmp(work->type, type) == 0)
5522 			return work;
5523 	}
5524 
5525 	return NULL;
5526 }
5527 
5528 
wpas_init_driver(struct wpa_supplicant * wpa_s,const struct wpa_interface * iface)5529 static int wpas_init_driver(struct wpa_supplicant *wpa_s,
5530 			    const struct wpa_interface *iface)
5531 {
5532 	const char *ifname, *driver, *rn;
5533 
5534 	driver = iface->driver;
5535 next_driver:
5536 	if (wpa_supplicant_set_driver(wpa_s, driver) < 0)
5537 		return -1;
5538 
5539 	wpa_s->drv_priv = wpa_drv_init(wpa_s, wpa_s->ifname);
5540 	if (wpa_s->drv_priv == NULL) {
5541 		const char *pos;
5542 		int level;
5543 
5544 		pos = driver ? os_strchr(driver, ',') : NULL;
5545 		if (pos) {
5546 			wpa_dbg(wpa_s, MSG_DEBUG, "Failed to initialize "
5547 				"driver interface - try next driver wrapper");
5548 			driver = pos + 1;
5549 			goto next_driver;
5550 		}
5551 
5552 #ifdef CONFIG_MATCH_IFACE
5553 		if (wpa_s->matched == WPA_IFACE_MATCHEDNULL)
5554 			level = MSG_DEBUG;
5555 		else
5556 #endif
5557 			level = MSG_ERROR;
5558 		wpa_msg(wpa_s, level, "Failed to initialize driver "
5559 			"interface");
5560 		return -1;
5561 	}
5562 	if (wpa_drv_set_param(wpa_s, wpa_s->conf->driver_param) < 0) {
5563 		wpa_msg(wpa_s, MSG_ERROR, "Driver interface rejected "
5564 			"driver_param '%s'", wpa_s->conf->driver_param);
5565 		return -1;
5566 	}
5567 
5568 	ifname = wpa_drv_get_ifname(wpa_s);
5569 	if (ifname && os_strcmp(ifname, wpa_s->ifname) != 0) {
5570 		wpa_dbg(wpa_s, MSG_DEBUG, "Driver interface replaced "
5571 			"interface name with '%s'", ifname);
5572 		os_strlcpy(wpa_s->ifname, ifname, sizeof(wpa_s->ifname));
5573 	}
5574 
5575 	rn = wpa_driver_get_radio_name(wpa_s);
5576 	if (rn && rn[0] == '\0')
5577 		rn = NULL;
5578 
5579 	wpa_s->radio = radio_add_interface(wpa_s, rn);
5580 	if (wpa_s->radio == NULL)
5581 		return -1;
5582 
5583 	return 0;
5584 }
5585 
5586 
5587 #ifdef CONFIG_GAS_SERVER
5588 
wpas_gas_server_tx_status(struct wpa_supplicant * wpa_s,unsigned int freq,const u8 * dst,const u8 * src,const u8 * bssid,const u8 * data,size_t data_len,enum offchannel_send_action_result result)5589 static void wpas_gas_server_tx_status(struct wpa_supplicant *wpa_s,
5590 				      unsigned int freq, const u8 *dst,
5591 				      const u8 *src, const u8 *bssid,
5592 				      const u8 *data, size_t data_len,
5593 				      enum offchannel_send_action_result result)
5594 {
5595 	wpa_printf(MSG_DEBUG, "GAS: TX status: freq=%u dst=" MACSTR
5596 		   " result=%s",
5597 		   freq, MAC2STR(dst),
5598 		   result == OFFCHANNEL_SEND_ACTION_SUCCESS ? "SUCCESS" :
5599 		   (result == OFFCHANNEL_SEND_ACTION_NO_ACK ? "no-ACK" :
5600 		    "FAILED"));
5601 	gas_server_tx_status(wpa_s->gas_server, dst, data, data_len,
5602 			     result == OFFCHANNEL_SEND_ACTION_SUCCESS);
5603 }
5604 
5605 
wpas_gas_server_tx(void * ctx,int freq,const u8 * da,struct wpabuf * buf,unsigned int wait_time)5606 static void wpas_gas_server_tx(void *ctx, int freq, const u8 *da,
5607 			       struct wpabuf *buf, unsigned int wait_time)
5608 {
5609 	struct wpa_supplicant *wpa_s = ctx;
5610 	const u8 broadcast[ETH_ALEN] = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff };
5611 
5612 	if (wait_time > wpa_s->max_remain_on_chan)
5613 		wait_time = wpa_s->max_remain_on_chan;
5614 
5615 	offchannel_send_action(wpa_s, freq, da, wpa_s->own_addr, broadcast,
5616 			       wpabuf_head(buf), wpabuf_len(buf),
5617 			       wait_time, wpas_gas_server_tx_status, 0);
5618 }
5619 
5620 #endif /* CONFIG_GAS_SERVER */
5621 
wpa_supplicant_init_iface(struct wpa_supplicant * wpa_s,const struct wpa_interface * iface)5622 static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
5623 				     const struct wpa_interface *iface)
5624 {
5625 	struct wpa_driver_capa capa;
5626 	int capa_res;
5627 	u8 dfs_domain;
5628 
5629 	wpa_printf(MSG_DEBUG, "Initializing interface '%s' conf '%s' driver "
5630 		   "'%s' ctrl_interface '%s' bridge '%s'", iface->ifname,
5631 		   iface->confname ? iface->confname : "N/A",
5632 		   iface->driver ? iface->driver : "default",
5633 		   iface->ctrl_interface ? iface->ctrl_interface : "N/A",
5634 		   iface->bridge_ifname ? iface->bridge_ifname : "N/A");
5635 
5636 	if (iface->confname) {
5637 #ifdef CONFIG_BACKEND_FILE
5638 		wpa_s->confname = os_rel2abs_path(iface->confname);
5639 		if (wpa_s->confname == NULL) {
5640 			wpa_printf(MSG_ERROR, "Failed to get absolute path "
5641 				   "for configuration file '%s'.",
5642 				   iface->confname);
5643 			return -1;
5644 		}
5645 		wpa_printf(MSG_DEBUG, "Configuration file '%s' -> '%s'",
5646 			   iface->confname, wpa_s->confname);
5647 #else /* CONFIG_BACKEND_FILE */
5648 		wpa_s->confname = os_strdup(iface->confname);
5649 #endif /* CONFIG_BACKEND_FILE */
5650 		wpa_s->conf = wpa_config_read(wpa_s->confname, NULL);
5651 		if (wpa_s->conf == NULL) {
5652 			wpa_printf(MSG_ERROR, "Failed to read or parse "
5653 				   "configuration '%s'.", wpa_s->confname);
5654 			return -1;
5655 		}
5656 		wpa_s->confanother = os_rel2abs_path(iface->confanother);
5657 		if (wpa_s->confanother &&
5658 		    !wpa_config_read(wpa_s->confanother, wpa_s->conf)) {
5659 			wpa_printf(MSG_ERROR,
5660 				   "Failed to read or parse configuration '%s'.",
5661 				   wpa_s->confanother);
5662 			return -1;
5663 		}
5664 
5665 		/*
5666 		 * Override ctrl_interface and driver_param if set on command
5667 		 * line.
5668 		 */
5669 		if (iface->ctrl_interface) {
5670 			os_free(wpa_s->conf->ctrl_interface);
5671 			wpa_s->conf->ctrl_interface =
5672 				os_strdup(iface->ctrl_interface);
5673 		}
5674 
5675 		if (iface->driver_param) {
5676 			os_free(wpa_s->conf->driver_param);
5677 			wpa_s->conf->driver_param =
5678 				os_strdup(iface->driver_param);
5679 		}
5680 
5681 		if (iface->p2p_mgmt && !iface->ctrl_interface) {
5682 			os_free(wpa_s->conf->ctrl_interface);
5683 			wpa_s->conf->ctrl_interface = NULL;
5684 		}
5685 	} else
5686 		wpa_s->conf = wpa_config_alloc_empty(iface->ctrl_interface,
5687 						     iface->driver_param);
5688 
5689 	if (wpa_s->conf == NULL) {
5690 		wpa_printf(MSG_ERROR, "\nNo configuration found.");
5691 		return -1;
5692 	}
5693 
5694 	if (iface->ifname == NULL) {
5695 		wpa_printf(MSG_ERROR, "\nInterface name is required.");
5696 		return -1;
5697 	}
5698 	if (os_strlen(iface->ifname) >= sizeof(wpa_s->ifname)) {
5699 		wpa_printf(MSG_ERROR, "\nToo long interface name '%s'.",
5700 			   iface->ifname);
5701 		return -1;
5702 	}
5703 	os_strlcpy(wpa_s->ifname, iface->ifname, sizeof(wpa_s->ifname));
5704 #ifdef CONFIG_MATCH_IFACE
5705 	wpa_s->matched = iface->matched;
5706 #endif
5707 
5708 	if (iface->bridge_ifname) {
5709 		if (os_strlen(iface->bridge_ifname) >=
5710 		    sizeof(wpa_s->bridge_ifname)) {
5711 			wpa_printf(MSG_ERROR, "\nToo long bridge interface "
5712 				   "name '%s'.", iface->bridge_ifname);
5713 			return -1;
5714 		}
5715 		os_strlcpy(wpa_s->bridge_ifname, iface->bridge_ifname,
5716 			   sizeof(wpa_s->bridge_ifname));
5717 	}
5718 
5719 	/* RSNA Supplicant Key Management - INITIALIZE */
5720 	eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
5721 	eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
5722 
5723 	/* Initialize driver interface and register driver event handler before
5724 	 * L2 receive handler so that association events are processed before
5725 	 * EAPOL-Key packets if both become available for the same select()
5726 	 * call. */
5727 	if (wpas_init_driver(wpa_s, iface) < 0)
5728 		return -1;
5729 
5730 	if (wpa_supplicant_init_wpa(wpa_s) < 0)
5731 		return -1;
5732 
5733 	wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname,
5734 			  wpa_s->bridge_ifname[0] ? wpa_s->bridge_ifname :
5735 			  NULL);
5736 	wpa_sm_set_fast_reauth(wpa_s->wpa, wpa_s->conf->fast_reauth);
5737 
5738 	if (wpa_s->conf->dot11RSNAConfigPMKLifetime &&
5739 	    wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_LIFETIME,
5740 			     wpa_s->conf->dot11RSNAConfigPMKLifetime)) {
5741 		wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
5742 			"dot11RSNAConfigPMKLifetime");
5743 		return -1;
5744 	}
5745 
5746 	if (wpa_s->conf->dot11RSNAConfigPMKReauthThreshold &&
5747 	    wpa_sm_set_param(wpa_s->wpa, RSNA_PMK_REAUTH_THRESHOLD,
5748 			     wpa_s->conf->dot11RSNAConfigPMKReauthThreshold)) {
5749 		wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
5750 			"dot11RSNAConfigPMKReauthThreshold");
5751 		return -1;
5752 	}
5753 
5754 	if (wpa_s->conf->dot11RSNAConfigSATimeout &&
5755 	    wpa_sm_set_param(wpa_s->wpa, RSNA_SA_TIMEOUT,
5756 			     wpa_s->conf->dot11RSNAConfigSATimeout)) {
5757 		wpa_msg(wpa_s, MSG_ERROR, "Invalid WPA parameter value for "
5758 			"dot11RSNAConfigSATimeout");
5759 		return -1;
5760 	}
5761 
5762 	wpa_s->hw.modes = wpa_drv_get_hw_feature_data(wpa_s,
5763 						      &wpa_s->hw.num_modes,
5764 						      &wpa_s->hw.flags,
5765 						      &dfs_domain);
5766 	if (wpa_s->hw.modes) {
5767 		u16 i;
5768 
5769 		for (i = 0; i < wpa_s->hw.num_modes; i++) {
5770 			if (wpa_s->hw.modes[i].vht_capab) {
5771 				wpa_s->hw_capab = CAPAB_VHT;
5772 				break;
5773 			}
5774 
5775 			if (wpa_s->hw.modes[i].ht_capab &
5776 			    HT_CAP_INFO_SUPP_CHANNEL_WIDTH_SET)
5777 				wpa_s->hw_capab = CAPAB_HT40;
5778 			else if (wpa_s->hw.modes[i].ht_capab &&
5779 				 wpa_s->hw_capab == CAPAB_NO_HT_VHT)
5780 				wpa_s->hw_capab = CAPAB_HT;
5781 		}
5782 	}
5783 
5784 	capa_res = wpa_drv_get_capa(wpa_s, &capa);
5785 	if (capa_res == 0) {
5786 		wpa_s->drv_capa_known = 1;
5787 		wpa_s->drv_flags = capa.flags;
5788 		wpa_s->drv_enc = capa.enc;
5789 		wpa_s->drv_smps_modes = capa.smps_modes;
5790 		wpa_s->drv_rrm_flags = capa.rrm_flags;
5791 		wpa_s->probe_resp_offloads = capa.probe_resp_offloads;
5792 		wpa_s->max_scan_ssids = capa.max_scan_ssids;
5793 		wpa_s->max_sched_scan_ssids = capa.max_sched_scan_ssids;
5794 		wpa_s->max_sched_scan_plans = capa.max_sched_scan_plans;
5795 		wpa_s->max_sched_scan_plan_interval =
5796 			capa.max_sched_scan_plan_interval;
5797 		wpa_s->max_sched_scan_plan_iterations =
5798 			capa.max_sched_scan_plan_iterations;
5799 		wpa_s->sched_scan_supported = capa.sched_scan_supported;
5800 		wpa_s->max_match_sets = capa.max_match_sets;
5801 		wpa_s->max_remain_on_chan = capa.max_remain_on_chan;
5802 		wpa_s->max_stations = capa.max_stations;
5803 		wpa_s->extended_capa = capa.extended_capa;
5804 		wpa_s->extended_capa_mask = capa.extended_capa_mask;
5805 		wpa_s->extended_capa_len = capa.extended_capa_len;
5806 		wpa_s->num_multichan_concurrent =
5807 			capa.num_multichan_concurrent;
5808 		wpa_s->wmm_ac_supported = capa.wmm_ac_supported;
5809 
5810 		if (capa.mac_addr_rand_scan_supported)
5811 			wpa_s->mac_addr_rand_supported |= MAC_ADDR_RAND_SCAN;
5812 		if (wpa_s->sched_scan_supported &&
5813 		    capa.mac_addr_rand_sched_scan_supported)
5814 			wpa_s->mac_addr_rand_supported |=
5815 				(MAC_ADDR_RAND_SCHED_SCAN | MAC_ADDR_RAND_PNO);
5816 
5817 		wpa_drv_get_ext_capa(wpa_s, WPA_IF_STATION);
5818 		if (wpa_s->extended_capa &&
5819 		    wpa_s->extended_capa_len >= 3 &&
5820 		    wpa_s->extended_capa[2] & 0x40)
5821 			wpa_s->multi_bss_support = 1;
5822 	}
5823 	if (wpa_s->max_remain_on_chan == 0)
5824 		wpa_s->max_remain_on_chan = 1000;
5825 
5826 	/*
5827 	 * Only take p2p_mgmt parameters when P2P Device is supported.
5828 	 * Doing it here as it determines whether l2_packet_init() will be done
5829 	 * during wpa_supplicant_driver_init().
5830 	 */
5831 	if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE)
5832 		wpa_s->p2p_mgmt = iface->p2p_mgmt;
5833 
5834 	if (wpa_s->num_multichan_concurrent == 0)
5835 		wpa_s->num_multichan_concurrent = 1;
5836 
5837 	if (wpa_supplicant_driver_init(wpa_s) < 0)
5838 		return -1;
5839 
5840 #ifdef CONFIG_TDLS
5841 	if (!iface->p2p_mgmt && wpa_tdls_init(wpa_s->wpa))
5842 		return -1;
5843 #endif /* CONFIG_TDLS */
5844 
5845 	if (wpa_s->conf->country[0] && wpa_s->conf->country[1] &&
5846 	    wpa_drv_set_country(wpa_s, wpa_s->conf->country)) {
5847 		wpa_dbg(wpa_s, MSG_DEBUG, "Failed to set country");
5848 		return -1;
5849 	}
5850 
5851 #ifdef CONFIG_FST
5852 	if (wpa_s->conf->fst_group_id) {
5853 		struct fst_iface_cfg cfg;
5854 		struct fst_wpa_obj iface_obj;
5855 
5856 		fst_wpa_supplicant_fill_iface_obj(wpa_s, &iface_obj);
5857 		os_strlcpy(cfg.group_id, wpa_s->conf->fst_group_id,
5858 			   sizeof(cfg.group_id));
5859 		cfg.priority = wpa_s->conf->fst_priority;
5860 		cfg.llt = wpa_s->conf->fst_llt;
5861 
5862 		wpa_s->fst = fst_attach(wpa_s->ifname, wpa_s->own_addr,
5863 					&iface_obj, &cfg);
5864 		if (!wpa_s->fst) {
5865 			wpa_msg(wpa_s, MSG_ERROR,
5866 				"FST: Cannot attach iface %s to group %s",
5867 				wpa_s->ifname, cfg.group_id);
5868 			return -1;
5869 		}
5870 	}
5871 #endif /* CONFIG_FST */
5872 
5873 	if (wpas_wps_init(wpa_s))
5874 		return -1;
5875 
5876 #ifdef CONFIG_GAS_SERVER
5877 	wpa_s->gas_server = gas_server_init(wpa_s, wpas_gas_server_tx);
5878 	if (!wpa_s->gas_server) {
5879 		wpa_printf(MSG_ERROR, "Failed to initialize GAS server");
5880 		return -1;
5881 	}
5882 #endif /* CONFIG_GAS_SERVER */
5883 
5884 #ifdef CONFIG_DPP
5885 	if (wpas_dpp_init(wpa_s) < 0)
5886 		return -1;
5887 #endif /* CONFIG_DPP */
5888 
5889 	if (wpa_supplicant_init_eapol(wpa_s) < 0)
5890 		return -1;
5891 	wpa_sm_set_eapol(wpa_s->wpa, wpa_s->eapol);
5892 
5893 	wpa_s->ctrl_iface = wpa_supplicant_ctrl_iface_init(wpa_s);
5894 	if (wpa_s->ctrl_iface == NULL) {
5895 		wpa_printf(MSG_ERROR,
5896 			   "Failed to initialize control interface '%s'.\n"
5897 			   "You may have another wpa_supplicant process "
5898 			   "already running or the file was\n"
5899 			   "left by an unclean termination of wpa_supplicant "
5900 			   "in which case you will need\n"
5901 			   "to manually remove this file before starting "
5902 			   "wpa_supplicant again.\n",
5903 			   wpa_s->conf->ctrl_interface);
5904 		return -1;
5905 	}
5906 
5907 	wpa_s->gas = gas_query_init(wpa_s);
5908 	if (wpa_s->gas == NULL) {
5909 		wpa_printf(MSG_ERROR, "Failed to initialize GAS query");
5910 		return -1;
5911 	}
5912 
5913 	if ((!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE) ||
5914 	     wpa_s->p2p_mgmt) &&
5915 	    wpas_p2p_init(wpa_s->global, wpa_s) < 0) {
5916 		wpa_msg(wpa_s, MSG_ERROR, "Failed to init P2P");
5917 		return -1;
5918 	}
5919 
5920 	if (wpa_bss_init(wpa_s) < 0)
5921 		return -1;
5922 
5923 #ifdef CONFIG_PMKSA_CACHE_EXTERNAL
5924 #ifdef CONFIG_MESH
5925 	dl_list_init(&wpa_s->mesh_external_pmksa_cache);
5926 #endif /* CONFIG_MESH */
5927 #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
5928 
5929 	/*
5930 	 * Set Wake-on-WLAN triggers, if configured.
5931 	 * Note: We don't restore/remove the triggers on shutdown (it doesn't
5932 	 * have effect anyway when the interface is down).
5933 	 */
5934 	if (capa_res == 0 && wpas_set_wowlan_triggers(wpa_s, &capa) < 0)
5935 		return -1;
5936 
5937 #ifdef CONFIG_EAP_PROXY
5938 {
5939 	size_t len;
5940 	wpa_s->mnc_len = eapol_sm_get_eap_proxy_imsi(wpa_s->eapol, -1,
5941 						     wpa_s->imsi, &len);
5942 	if (wpa_s->mnc_len > 0) {
5943 		wpa_s->imsi[len] = '\0';
5944 		wpa_printf(MSG_DEBUG, "eap_proxy: IMSI %s (MNC length %d)",
5945 			   wpa_s->imsi, wpa_s->mnc_len);
5946 	} else {
5947 		wpa_printf(MSG_DEBUG, "eap_proxy: IMSI not available");
5948 	}
5949 }
5950 #endif /* CONFIG_EAP_PROXY */
5951 
5952 	if (pcsc_reader_init(wpa_s) < 0)
5953 		return -1;
5954 
5955 	if (wpas_init_ext_pw(wpa_s) < 0)
5956 		return -1;
5957 
5958 	wpas_rrm_reset(wpa_s);
5959 
5960 	wpas_sched_scan_plans_set(wpa_s, wpa_s->conf->sched_scan_plans);
5961 
5962 #ifdef CONFIG_HS20
5963 	hs20_init(wpa_s);
5964 #endif /* CONFIG_HS20 */
5965 #ifdef CONFIG_MBO
5966 	if (wpa_s->conf->oce) {
5967 		if ((wpa_s->conf->oce & OCE_STA) &&
5968 		    (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OCE_STA))
5969 			wpa_s->enable_oce = OCE_STA;
5970 		if ((wpa_s->conf->oce & OCE_STA_CFON) &&
5971 		    (wpa_s->drv_flags & WPA_DRIVER_FLAGS_OCE_STA_CFON)) {
5972 			/* TODO: Need to add STA-CFON support */
5973 			wpa_printf(MSG_ERROR,
5974 				   "OCE STA-CFON feature is not yet supported");
5975 		}
5976 	}
5977 	wpas_mbo_update_non_pref_chan(wpa_s, wpa_s->conf->non_pref_chan);
5978 #endif /* CONFIG_MBO */
5979 
5980 	wpa_supplicant_set_default_scan_ies(wpa_s);
5981 
5982 	return 0;
5983 }
5984 
5985 
wpa_supplicant_deinit_iface(struct wpa_supplicant * wpa_s,int notify,int terminate)5986 static void wpa_supplicant_deinit_iface(struct wpa_supplicant *wpa_s,
5987 					int notify, int terminate)
5988 {
5989 	struct wpa_global *global = wpa_s->global;
5990 	struct wpa_supplicant *iface, *prev;
5991 
5992 	if (wpa_s == wpa_s->parent)
5993 		wpas_p2p_group_remove(wpa_s, "*");
5994 
5995 	iface = global->ifaces;
5996 	while (iface) {
5997 		if (iface->p2pdev == wpa_s)
5998 			iface->p2pdev = iface->parent;
5999 		if (iface == wpa_s || iface->parent != wpa_s) {
6000 			iface = iface->next;
6001 			continue;
6002 		}
6003 		wpa_printf(MSG_DEBUG,
6004 			   "Remove remaining child interface %s from parent %s",
6005 			   iface->ifname, wpa_s->ifname);
6006 		prev = iface;
6007 		iface = iface->next;
6008 		wpa_supplicant_remove_iface(global, prev, terminate);
6009 	}
6010 
6011 	wpa_s->disconnected = 1;
6012 	if (wpa_s->drv_priv) {
6013 		wpa_supplicant_deauthenticate(wpa_s,
6014 					      WLAN_REASON_DEAUTH_LEAVING);
6015 
6016 		wpa_drv_set_countermeasures(wpa_s, 0);
6017 		wpa_clear_keys(wpa_s, NULL);
6018 	}
6019 
6020 	wpa_supplicant_cleanup(wpa_s);
6021 	wpas_p2p_deinit_iface(wpa_s);
6022 
6023 	wpas_ctrl_radio_work_flush(wpa_s);
6024 	radio_remove_interface(wpa_s);
6025 
6026 #ifdef CONFIG_FST
6027 	if (wpa_s->fst) {
6028 		fst_detach(wpa_s->fst);
6029 		wpa_s->fst = NULL;
6030 	}
6031 	if (wpa_s->received_mb_ies) {
6032 		wpabuf_free(wpa_s->received_mb_ies);
6033 		wpa_s->received_mb_ies = NULL;
6034 	}
6035 #endif /* CONFIG_FST */
6036 
6037 	if (wpa_s->drv_priv)
6038 		wpa_drv_deinit(wpa_s);
6039 
6040 	if (notify)
6041 		wpas_notify_iface_removed(wpa_s);
6042 
6043 	if (terminate)
6044 		wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_TERMINATING);
6045 
6046 	if (wpa_s->ctrl_iface) {
6047 		wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface);
6048 		wpa_s->ctrl_iface = NULL;
6049 	}
6050 
6051 #ifdef CONFIG_MESH
6052 	if (wpa_s->ifmsh) {
6053 		wpa_supplicant_mesh_iface_deinit(wpa_s, wpa_s->ifmsh);
6054 		wpa_s->ifmsh = NULL;
6055 	}
6056 #endif /* CONFIG_MESH */
6057 
6058 	if (wpa_s->conf != NULL) {
6059 		wpa_config_free(wpa_s->conf);
6060 		wpa_s->conf = NULL;
6061 	}
6062 
6063 	os_free(wpa_s->ssids_from_scan_req);
6064 
6065 	os_free(wpa_s);
6066 }
6067 
6068 
6069 #ifdef CONFIG_MATCH_IFACE
6070 
6071 /**
6072  * wpa_supplicant_match_iface - Match an interface description to a name
6073  * @global: Pointer to global data from wpa_supplicant_init()
6074  * @ifname: Name of the interface to match
6075  * Returns: Pointer to the created interface description or %NULL on failure
6076  */
wpa_supplicant_match_iface(struct wpa_global * global,const char * ifname)6077 struct wpa_interface * wpa_supplicant_match_iface(struct wpa_global *global,
6078 						  const char *ifname)
6079 {
6080 	int i;
6081 	struct wpa_interface *iface, *miface;
6082 
6083 	for (i = 0; i < global->params.match_iface_count; i++) {
6084 		miface = &global->params.match_ifaces[i];
6085 		if (!miface->ifname ||
6086 		    fnmatch(miface->ifname, ifname, 0) == 0) {
6087 			iface = os_zalloc(sizeof(*iface));
6088 			if (!iface)
6089 				return NULL;
6090 			*iface = *miface;
6091 			if (!miface->ifname)
6092 				iface->matched = WPA_IFACE_MATCHEDNULL;
6093 			else
6094 				iface->matched = WPA_IFACE_MATCHED;
6095 			iface->ifname = ifname;
6096 			return iface;
6097 		}
6098 	}
6099 
6100 	return NULL;
6101 }
6102 
6103 
6104 /**
6105  * wpa_supplicant_match_existing - Match existing interfaces
6106  * @global: Pointer to global data from wpa_supplicant_init()
6107  * Returns: 0 on success, -1 on failure
6108  */
wpa_supplicant_match_existing(struct wpa_global * global)6109 static int wpa_supplicant_match_existing(struct wpa_global *global)
6110 {
6111 	struct if_nameindex *ifi, *ifp;
6112 	struct wpa_supplicant *wpa_s;
6113 	struct wpa_interface *iface;
6114 
6115 	ifp = if_nameindex();
6116 	if (!ifp) {
6117 		wpa_printf(MSG_ERROR, "if_nameindex: %s", strerror(errno));
6118 		return -1;
6119 	}
6120 
6121 	for (ifi = ifp; ifi->if_name; ifi++) {
6122 		wpa_s = wpa_supplicant_get_iface(global, ifi->if_name);
6123 		if (wpa_s)
6124 			continue;
6125 		iface = wpa_supplicant_match_iface(global, ifi->if_name);
6126 		if (iface) {
6127 			wpa_s = wpa_supplicant_add_iface(global, iface, NULL);
6128 			os_free(iface);
6129 		}
6130 	}
6131 
6132 	if_freenameindex(ifp);
6133 	return 0;
6134 }
6135 
6136 #endif /* CONFIG_MATCH_IFACE */
6137 
6138 
6139 /**
6140  * wpa_supplicant_add_iface - Add a new network interface
6141  * @global: Pointer to global data from wpa_supplicant_init()
6142  * @iface: Interface configuration options
6143  * @parent: Parent interface or %NULL to assign new interface as parent
6144  * Returns: Pointer to the created interface or %NULL on failure
6145  *
6146  * This function is used to add new network interfaces for %wpa_supplicant.
6147  * This can be called before wpa_supplicant_run() to add interfaces before the
6148  * main event loop has been started. In addition, new interfaces can be added
6149  * dynamically while %wpa_supplicant is already running. This could happen,
6150  * e.g., when a hotplug network adapter is inserted.
6151  */
wpa_supplicant_add_iface(struct wpa_global * global,struct wpa_interface * iface,struct wpa_supplicant * parent)6152 struct wpa_supplicant * wpa_supplicant_add_iface(struct wpa_global *global,
6153 						 struct wpa_interface *iface,
6154 						 struct wpa_supplicant *parent)
6155 {
6156 	struct wpa_supplicant *wpa_s;
6157 	struct wpa_interface t_iface;
6158 	struct wpa_ssid *ssid;
6159 
6160 	if (global == NULL || iface == NULL)
6161 		return NULL;
6162 
6163 	wpa_s = wpa_supplicant_alloc(parent);
6164 	if (wpa_s == NULL)
6165 		return NULL;
6166 
6167 	wpa_s->global = global;
6168 
6169 	t_iface = *iface;
6170 	if (global->params.override_driver) {
6171 		wpa_printf(MSG_DEBUG, "Override interface parameter: driver "
6172 			   "('%s' -> '%s')",
6173 			   iface->driver, global->params.override_driver);
6174 		t_iface.driver = global->params.override_driver;
6175 	}
6176 	if (global->params.override_ctrl_interface) {
6177 		wpa_printf(MSG_DEBUG, "Override interface parameter: "
6178 			   "ctrl_interface ('%s' -> '%s')",
6179 			   iface->ctrl_interface,
6180 			   global->params.override_ctrl_interface);
6181 		t_iface.ctrl_interface =
6182 			global->params.override_ctrl_interface;
6183 	}
6184 	if (wpa_supplicant_init_iface(wpa_s, &t_iface)) {
6185 		wpa_printf(MSG_DEBUG, "Failed to add interface %s",
6186 			   iface->ifname);
6187 		wpa_supplicant_deinit_iface(wpa_s, 0, 0);
6188 		return NULL;
6189 	}
6190 
6191 	if (iface->p2p_mgmt == 0) {
6192 		/* Notify the control interfaces about new iface */
6193 		if (wpas_notify_iface_added(wpa_s)) {
6194 			wpa_supplicant_deinit_iface(wpa_s, 1, 0);
6195 			return NULL;
6196 		}
6197 
6198 		for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next)
6199 			wpas_notify_network_added(wpa_s, ssid);
6200 	}
6201 
6202 	wpa_s->next = global->ifaces;
6203 	global->ifaces = wpa_s;
6204 
6205 	wpa_dbg(wpa_s, MSG_DEBUG, "Added interface %s", wpa_s->ifname);
6206 	wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
6207 
6208 #ifdef CONFIG_P2P
6209 	if (wpa_s->global->p2p == NULL &&
6210 	    !wpa_s->global->p2p_disabled && !wpa_s->conf->p2p_disabled &&
6211 	    (wpa_s->drv_flags & WPA_DRIVER_FLAGS_DEDICATED_P2P_DEVICE) &&
6212 	    wpas_p2p_add_p2pdev_interface(
6213 		    wpa_s, wpa_s->global->params.conf_p2p_dev) < 0) {
6214 		wpa_printf(MSG_INFO,
6215 			   "P2P: Failed to enable P2P Device interface");
6216 		/* Try to continue without. P2P will be disabled. */
6217 	}
6218 #endif /* CONFIG_P2P */
6219 
6220 	return wpa_s;
6221 }
6222 
6223 
6224 /**
6225  * wpa_supplicant_remove_iface - Remove a network interface
6226  * @global: Pointer to global data from wpa_supplicant_init()
6227  * @wpa_s: Pointer to the network interface to be removed
6228  * Returns: 0 if interface was removed, -1 if interface was not found
6229  *
6230  * This function can be used to dynamically remove network interfaces from
6231  * %wpa_supplicant, e.g., when a hotplug network adapter is ejected. In
6232  * addition, this function is used to remove all remaining interfaces when
6233  * %wpa_supplicant is terminated.
6234  */
wpa_supplicant_remove_iface(struct wpa_global * global,struct wpa_supplicant * wpa_s,int terminate)6235 int wpa_supplicant_remove_iface(struct wpa_global *global,
6236 				struct wpa_supplicant *wpa_s,
6237 				int terminate)
6238 {
6239 	struct wpa_supplicant *prev;
6240 #ifdef CONFIG_MESH
6241 	unsigned int mesh_if_created = wpa_s->mesh_if_created;
6242 	char *ifname = NULL;
6243 	struct wpa_supplicant *parent = wpa_s->parent;
6244 #endif /* CONFIG_MESH */
6245 
6246 	/* Remove interface from the global list of interfaces */
6247 	prev = global->ifaces;
6248 	if (prev == wpa_s) {
6249 		global->ifaces = wpa_s->next;
6250 	} else {
6251 		while (prev && prev->next != wpa_s)
6252 			prev = prev->next;
6253 		if (prev == NULL)
6254 			return -1;
6255 		prev->next = wpa_s->next;
6256 	}
6257 
6258 	wpa_dbg(wpa_s, MSG_DEBUG, "Removing interface %s", wpa_s->ifname);
6259 
6260 #ifdef CONFIG_MESH
6261 	if (mesh_if_created) {
6262 		ifname = os_strdup(wpa_s->ifname);
6263 		if (ifname == NULL) {
6264 			wpa_dbg(wpa_s, MSG_ERROR,
6265 				"mesh: Failed to malloc ifname");
6266 			return -1;
6267 		}
6268 	}
6269 #endif /* CONFIG_MESH */
6270 
6271 	if (global->p2p_group_formation == wpa_s)
6272 		global->p2p_group_formation = NULL;
6273 	if (global->p2p_invite_group == wpa_s)
6274 		global->p2p_invite_group = NULL;
6275 	wpa_supplicant_deinit_iface(wpa_s, 1, terminate);
6276 
6277 #ifdef CONFIG_MESH
6278 	if (mesh_if_created) {
6279 		wpa_drv_if_remove(parent, WPA_IF_MESH, ifname);
6280 		os_free(ifname);
6281 	}
6282 #endif /* CONFIG_MESH */
6283 
6284 	return 0;
6285 }
6286 
6287 
6288 /**
6289  * wpa_supplicant_get_eap_mode - Get the current EAP mode
6290  * @wpa_s: Pointer to the network interface
6291  * Returns: Pointer to the eap mode or the string "UNKNOWN" if not found
6292  */
wpa_supplicant_get_eap_mode(struct wpa_supplicant * wpa_s)6293 const char * wpa_supplicant_get_eap_mode(struct wpa_supplicant *wpa_s)
6294 {
6295 	const char *eapol_method;
6296 
6297         if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt) == 0 &&
6298             wpa_s->key_mgmt != WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
6299 		return "NO-EAP";
6300 	}
6301 
6302 	eapol_method = eapol_sm_get_method_name(wpa_s->eapol);
6303 	if (eapol_method == NULL)
6304 		return "UNKNOWN-EAP";
6305 
6306 	return eapol_method;
6307 }
6308 
6309 
6310 /**
6311  * wpa_supplicant_get_iface - Get a new network interface
6312  * @global: Pointer to global data from wpa_supplicant_init()
6313  * @ifname: Interface name
6314  * Returns: Pointer to the interface or %NULL if not found
6315  */
wpa_supplicant_get_iface(struct wpa_global * global,const char * ifname)6316 struct wpa_supplicant * wpa_supplicant_get_iface(struct wpa_global *global,
6317 						 const char *ifname)
6318 {
6319 	struct wpa_supplicant *wpa_s;
6320 
6321 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
6322 		if (os_strcmp(wpa_s->ifname, ifname) == 0)
6323 			return wpa_s;
6324 	}
6325 	return NULL;
6326 }
6327 
6328 
6329 #ifndef CONFIG_NO_WPA_MSG
wpa_supplicant_msg_ifname_cb(void * ctx)6330 static const char * wpa_supplicant_msg_ifname_cb(void *ctx)
6331 {
6332 	struct wpa_supplicant *wpa_s = ctx;
6333 	if (wpa_s == NULL)
6334 		return NULL;
6335 	return wpa_s->ifname;
6336 }
6337 #endif /* CONFIG_NO_WPA_MSG */
6338 
6339 
6340 #ifndef WPA_SUPPLICANT_CLEANUP_INTERVAL
6341 #define WPA_SUPPLICANT_CLEANUP_INTERVAL 10
6342 #endif /* WPA_SUPPLICANT_CLEANUP_INTERVAL */
6343 
6344 /* Periodic cleanup tasks */
wpas_periodic(void * eloop_ctx,void * timeout_ctx)6345 static void wpas_periodic(void *eloop_ctx, void *timeout_ctx)
6346 {
6347 	struct wpa_global *global = eloop_ctx;
6348 	struct wpa_supplicant *wpa_s;
6349 
6350 	eloop_register_timeout(WPA_SUPPLICANT_CLEANUP_INTERVAL, 0,
6351 			       wpas_periodic, global, NULL);
6352 
6353 #ifdef CONFIG_P2P
6354 	if (global->p2p)
6355 		p2p_expire_peers(global->p2p);
6356 #endif /* CONFIG_P2P */
6357 
6358 	for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
6359 		wpa_bss_flush_by_age(wpa_s, wpa_s->conf->bss_expiration_age);
6360 #ifdef CONFIG_AP
6361 		ap_periodic(wpa_s);
6362 #endif /* CONFIG_AP */
6363 	}
6364 }
6365 
6366 
6367 /**
6368  * wpa_supplicant_init - Initialize %wpa_supplicant
6369  * @params: Parameters for %wpa_supplicant
6370  * Returns: Pointer to global %wpa_supplicant data, or %NULL on failure
6371  *
6372  * This function is used to initialize %wpa_supplicant. After successful
6373  * initialization, the returned data pointer can be used to add and remove
6374  * network interfaces, and eventually, to deinitialize %wpa_supplicant.
6375  */
wpa_supplicant_init(struct wpa_params * params)6376 struct wpa_global * wpa_supplicant_init(struct wpa_params *params)
6377 {
6378 	struct wpa_global *global;
6379 	int ret, i;
6380 
6381 	if (params == NULL)
6382 		return NULL;
6383 
6384 #ifdef CONFIG_DRIVER_NDIS
6385 	{
6386 		void driver_ndis_init_ops(void);
6387 		driver_ndis_init_ops();
6388 	}
6389 #endif /* CONFIG_DRIVER_NDIS */
6390 
6391 #ifndef CONFIG_NO_WPA_MSG
6392 	wpa_msg_register_ifname_cb(wpa_supplicant_msg_ifname_cb);
6393 #endif /* CONFIG_NO_WPA_MSG */
6394 
6395 	if (params->wpa_debug_file_path)
6396 		wpa_debug_open_file(params->wpa_debug_file_path);
6397 	else
6398 		wpa_debug_setup_stdout();
6399 	if (params->wpa_debug_syslog)
6400 		wpa_debug_open_syslog();
6401 	if (params->wpa_debug_tracing) {
6402 		ret = wpa_debug_open_linux_tracing();
6403 		if (ret) {
6404 			wpa_printf(MSG_ERROR,
6405 				   "Failed to enable trace logging");
6406 			return NULL;
6407 		}
6408 	}
6409 
6410 	ret = eap_register_methods();
6411 	if (ret) {
6412 		wpa_printf(MSG_ERROR, "Failed to register EAP methods");
6413 		if (ret == -2)
6414 			wpa_printf(MSG_ERROR, "Two or more EAP methods used "
6415 				   "the same EAP type.");
6416 		return NULL;
6417 	}
6418 
6419 	global = os_zalloc(sizeof(*global));
6420 	if (global == NULL)
6421 		return NULL;
6422 	dl_list_init(&global->p2p_srv_bonjour);
6423 	dl_list_init(&global->p2p_srv_upnp);
6424 	global->params.daemonize = params->daemonize;
6425 	global->params.wait_for_monitor = params->wait_for_monitor;
6426 	global->params.dbus_ctrl_interface = params->dbus_ctrl_interface;
6427 	if (params->pid_file)
6428 		global->params.pid_file = os_strdup(params->pid_file);
6429 	if (params->ctrl_interface)
6430 		global->params.ctrl_interface =
6431 			os_strdup(params->ctrl_interface);
6432 	if (params->ctrl_interface_group)
6433 		global->params.ctrl_interface_group =
6434 			os_strdup(params->ctrl_interface_group);
6435 	if (params->override_driver)
6436 		global->params.override_driver =
6437 			os_strdup(params->override_driver);
6438 	if (params->override_ctrl_interface)
6439 		global->params.override_ctrl_interface =
6440 			os_strdup(params->override_ctrl_interface);
6441 #ifdef CONFIG_MATCH_IFACE
6442 	global->params.match_iface_count = params->match_iface_count;
6443 	if (params->match_iface_count) {
6444 		global->params.match_ifaces =
6445 			os_calloc(params->match_iface_count,
6446 				  sizeof(struct wpa_interface));
6447 		os_memcpy(global->params.match_ifaces,
6448 			  params->match_ifaces,
6449 			  params->match_iface_count *
6450 			  sizeof(struct wpa_interface));
6451 	}
6452 #endif /* CONFIG_MATCH_IFACE */
6453 #ifdef CONFIG_P2P
6454 	if (params->conf_p2p_dev)
6455 		global->params.conf_p2p_dev =
6456 			os_strdup(params->conf_p2p_dev);
6457 #endif /* CONFIG_P2P */
6458 	wpa_debug_level = global->params.wpa_debug_level =
6459 		params->wpa_debug_level;
6460 	wpa_debug_show_keys = global->params.wpa_debug_show_keys =
6461 		params->wpa_debug_show_keys;
6462 	wpa_debug_timestamp = global->params.wpa_debug_timestamp =
6463 		params->wpa_debug_timestamp;
6464 
6465 	wpa_printf(MSG_DEBUG, "wpa_supplicant v" VERSION_STR);
6466 
6467 	if (eloop_init()) {
6468 		wpa_printf(MSG_ERROR, "Failed to initialize event loop");
6469 		wpa_supplicant_deinit(global);
6470 		return NULL;
6471 	}
6472 
6473 	random_init(params->entropy_file);
6474 
6475 	global->ctrl_iface = wpa_supplicant_global_ctrl_iface_init(global);
6476 	if (global->ctrl_iface == NULL) {
6477 		wpa_supplicant_deinit(global);
6478 		return NULL;
6479 	}
6480 
6481 	if (wpas_notify_supplicant_initialized(global)) {
6482 		wpa_supplicant_deinit(global);
6483 		return NULL;
6484 	}
6485 
6486 	for (i = 0; wpa_drivers[i]; i++)
6487 		global->drv_count++;
6488 	if (global->drv_count == 0) {
6489 		wpa_printf(MSG_ERROR, "No drivers enabled");
6490 		wpa_supplicant_deinit(global);
6491 		return NULL;
6492 	}
6493 	global->drv_priv = os_calloc(global->drv_count, sizeof(void *));
6494 	if (global->drv_priv == NULL) {
6495 		wpa_supplicant_deinit(global);
6496 		return NULL;
6497 	}
6498 
6499 #ifdef CONFIG_WIFI_DISPLAY
6500 	if (wifi_display_init(global) < 0) {
6501 		wpa_printf(MSG_ERROR, "Failed to initialize Wi-Fi Display");
6502 		wpa_supplicant_deinit(global);
6503 		return NULL;
6504 	}
6505 #endif /* CONFIG_WIFI_DISPLAY */
6506 
6507 	eloop_register_timeout(WPA_SUPPLICANT_CLEANUP_INTERVAL, 0,
6508 			       wpas_periodic, global, NULL);
6509 
6510 	return global;
6511 }
6512 
6513 
6514 /**
6515  * wpa_supplicant_run - Run the %wpa_supplicant main event loop
6516  * @global: Pointer to global data from wpa_supplicant_init()
6517  * Returns: 0 after successful event loop run, -1 on failure
6518  *
6519  * This function starts the main event loop and continues running as long as
6520  * there are any remaining events. In most cases, this function is running as
6521  * long as the %wpa_supplicant process in still in use.
6522  */
wpa_supplicant_run(struct wpa_global * global)6523 int wpa_supplicant_run(struct wpa_global *global)
6524 {
6525 	struct wpa_supplicant *wpa_s;
6526 
6527 	if (global->params.daemonize &&
6528 	    (wpa_supplicant_daemon(global->params.pid_file) ||
6529 	     eloop_sock_requeue()))
6530 		return -1;
6531 
6532 #ifdef CONFIG_MATCH_IFACE
6533 	if (wpa_supplicant_match_existing(global))
6534 		return -1;
6535 #endif
6536 
6537 	if (global->params.wait_for_monitor) {
6538 		for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next)
6539 			if (wpa_s->ctrl_iface && !wpa_s->p2p_mgmt)
6540 				wpa_supplicant_ctrl_iface_wait(
6541 					wpa_s->ctrl_iface);
6542 	}
6543 
6544 	eloop_register_signal_terminate(wpa_supplicant_terminate, global);
6545 	eloop_register_signal_reconfig(wpa_supplicant_reconfig, global);
6546 
6547 	eloop_run();
6548 
6549 	return 0;
6550 }
6551 
6552 
6553 /**
6554  * wpa_supplicant_deinit - Deinitialize %wpa_supplicant
6555  * @global: Pointer to global data from wpa_supplicant_init()
6556  *
6557  * This function is called to deinitialize %wpa_supplicant and to free all
6558  * allocated resources. Remaining network interfaces will also be removed.
6559  */
wpa_supplicant_deinit(struct wpa_global * global)6560 void wpa_supplicant_deinit(struct wpa_global *global)
6561 {
6562 	int i;
6563 
6564 	if (global == NULL)
6565 		return;
6566 
6567 	eloop_cancel_timeout(wpas_periodic, global, NULL);
6568 
6569 #ifdef CONFIG_WIFI_DISPLAY
6570 	wifi_display_deinit(global);
6571 #endif /* CONFIG_WIFI_DISPLAY */
6572 
6573 	while (global->ifaces)
6574 		wpa_supplicant_remove_iface(global, global->ifaces, 1);
6575 
6576 	if (global->ctrl_iface)
6577 		wpa_supplicant_global_ctrl_iface_deinit(global->ctrl_iface);
6578 
6579 	wpas_notify_supplicant_deinitialized(global);
6580 
6581 	eap_peer_unregister_methods();
6582 #ifdef CONFIG_AP
6583 	eap_server_unregister_methods();
6584 #endif /* CONFIG_AP */
6585 
6586 	for (i = 0; wpa_drivers[i] && global->drv_priv; i++) {
6587 		if (!global->drv_priv[i])
6588 			continue;
6589 		wpa_drivers[i]->global_deinit(global->drv_priv[i]);
6590 	}
6591 	os_free(global->drv_priv);
6592 
6593 	random_deinit();
6594 
6595 	eloop_destroy();
6596 
6597 	if (global->params.pid_file) {
6598 		os_daemonize_terminate(global->params.pid_file);
6599 		os_free(global->params.pid_file);
6600 	}
6601 	os_free(global->params.ctrl_interface);
6602 	os_free(global->params.ctrl_interface_group);
6603 	os_free(global->params.override_driver);
6604 	os_free(global->params.override_ctrl_interface);
6605 #ifdef CONFIG_MATCH_IFACE
6606 	os_free(global->params.match_ifaces);
6607 #endif /* CONFIG_MATCH_IFACE */
6608 #ifdef CONFIG_P2P
6609 	os_free(global->params.conf_p2p_dev);
6610 #endif /* CONFIG_P2P */
6611 
6612 	os_free(global->p2p_disallow_freq.range);
6613 	os_free(global->p2p_go_avoid_freq.range);
6614 	os_free(global->add_psk);
6615 
6616 	os_free(global);
6617 	wpa_debug_close_syslog();
6618 	wpa_debug_close_file();
6619 	wpa_debug_close_linux_tracing();
6620 }
6621 
6622 
wpa_supplicant_update_config(struct wpa_supplicant * wpa_s)6623 void wpa_supplicant_update_config(struct wpa_supplicant *wpa_s)
6624 {
6625 	if ((wpa_s->conf->changed_parameters & CFG_CHANGED_COUNTRY) &&
6626 	    wpa_s->conf->country[0] && wpa_s->conf->country[1]) {
6627 		char country[3];
6628 		country[0] = wpa_s->conf->country[0];
6629 		country[1] = wpa_s->conf->country[1];
6630 		country[2] = '\0';
6631 		if (wpa_drv_set_country(wpa_s, country) < 0) {
6632 			wpa_printf(MSG_ERROR, "Failed to set country code "
6633 				   "'%s'", country);
6634 		}
6635 	}
6636 
6637 	if (wpa_s->conf->changed_parameters & CFG_CHANGED_EXT_PW_BACKEND)
6638 		wpas_init_ext_pw(wpa_s);
6639 
6640 	if (wpa_s->conf->changed_parameters & CFG_CHANGED_SCHED_SCAN_PLANS)
6641 		wpas_sched_scan_plans_set(wpa_s, wpa_s->conf->sched_scan_plans);
6642 
6643 	if (wpa_s->conf->changed_parameters & CFG_CHANGED_WOWLAN_TRIGGERS) {
6644 		struct wpa_driver_capa capa;
6645 		int res = wpa_drv_get_capa(wpa_s, &capa);
6646 
6647 		if (res == 0 && wpas_set_wowlan_triggers(wpa_s, &capa) < 0)
6648 			wpa_printf(MSG_ERROR,
6649 				   "Failed to update wowlan_triggers to '%s'",
6650 				   wpa_s->conf->wowlan_triggers);
6651 	}
6652 
6653 	if (wpa_s->conf->changed_parameters & CFG_CHANGED_DISABLE_BTM)
6654 		wpa_supplicant_set_default_scan_ies(wpa_s);
6655 
6656 #ifdef CONFIG_WPS
6657 	wpas_wps_update_config(wpa_s);
6658 #endif /* CONFIG_WPS */
6659 	wpas_p2p_update_config(wpa_s);
6660 	wpa_s->conf->changed_parameters = 0;
6661 }
6662 
6663 
add_freq(int * freqs,int * num_freqs,int freq)6664 void add_freq(int *freqs, int *num_freqs, int freq)
6665 {
6666 	int i;
6667 
6668 	for (i = 0; i < *num_freqs; i++) {
6669 		if (freqs[i] == freq)
6670 			return;
6671 	}
6672 
6673 	freqs[*num_freqs] = freq;
6674 	(*num_freqs)++;
6675 }
6676 
6677 
get_bss_freqs_in_ess(struct wpa_supplicant * wpa_s)6678 static int * get_bss_freqs_in_ess(struct wpa_supplicant *wpa_s)
6679 {
6680 	struct wpa_bss *bss, *cbss;
6681 	const int max_freqs = 10;
6682 	int *freqs;
6683 	int num_freqs = 0;
6684 
6685 	freqs = os_calloc(max_freqs + 1, sizeof(int));
6686 	if (freqs == NULL)
6687 		return NULL;
6688 
6689 	cbss = wpa_s->current_bss;
6690 
6691 	dl_list_for_each(bss, &wpa_s->bss, struct wpa_bss, list) {
6692 		if (bss == cbss)
6693 			continue;
6694 		if (bss->ssid_len == cbss->ssid_len &&
6695 		    os_memcmp(bss->ssid, cbss->ssid, bss->ssid_len) == 0 &&
6696 		    wpa_blacklist_get(wpa_s, bss->bssid) == NULL) {
6697 			add_freq(freqs, &num_freqs, bss->freq);
6698 			if (num_freqs == max_freqs)
6699 				break;
6700 		}
6701 	}
6702 
6703 	if (num_freqs == 0) {
6704 		os_free(freqs);
6705 		freqs = NULL;
6706 	}
6707 
6708 	return freqs;
6709 }
6710 
6711 
wpas_connection_failed(struct wpa_supplicant * wpa_s,const u8 * bssid)6712 void wpas_connection_failed(struct wpa_supplicant *wpa_s, const u8 *bssid)
6713 {
6714 	int timeout;
6715 	int count;
6716 	int *freqs = NULL;
6717 
6718 	wpas_connect_work_done(wpa_s);
6719 
6720 	/*
6721 	 * Remove possible authentication timeout since the connection failed.
6722 	 */
6723 	eloop_cancel_timeout(wpa_supplicant_timeout, wpa_s, NULL);
6724 
6725 	/*
6726 	 * There is no point in blacklisting the AP if this event is
6727 	 * generated based on local request to disconnect.
6728 	 */
6729 	if (wpa_s->own_disconnect_req) {
6730 		wpa_s->own_disconnect_req = 0;
6731 		wpa_dbg(wpa_s, MSG_DEBUG,
6732 			"Ignore connection failure due to local request to disconnect");
6733 		return;
6734 	}
6735 	if (wpa_s->disconnected) {
6736 		wpa_dbg(wpa_s, MSG_DEBUG, "Ignore connection failure "
6737 			"indication since interface has been put into "
6738 			"disconnected state");
6739 		return;
6740 	}
6741 
6742 	/*
6743 	 * Add the failed BSSID into the blacklist and speed up next scan
6744 	 * attempt if there could be other APs that could accept association.
6745 	 * The current blacklist count indicates how many times we have tried
6746 	 * connecting to this AP and multiple attempts mean that other APs are
6747 	 * either not available or has already been tried, so that we can start
6748 	 * increasing the delay here to avoid constant scanning.
6749 	 */
6750 	count = wpa_blacklist_add(wpa_s, bssid);
6751 	if (count == 1 && wpa_s->current_bss) {
6752 		/*
6753 		 * This BSS was not in the blacklist before. If there is
6754 		 * another BSS available for the same ESS, we should try that
6755 		 * next. Otherwise, we may as well try this one once more
6756 		 * before allowing other, likely worse, ESSes to be considered.
6757 		 */
6758 		freqs = get_bss_freqs_in_ess(wpa_s);
6759 		if (freqs) {
6760 			wpa_dbg(wpa_s, MSG_DEBUG, "Another BSS in this ESS "
6761 				"has been seen; try it next");
6762 			wpa_blacklist_add(wpa_s, bssid);
6763 			/*
6764 			 * On the next scan, go through only the known channels
6765 			 * used in this ESS based on previous scans to speed up
6766 			 * common load balancing use case.
6767 			 */
6768 			os_free(wpa_s->next_scan_freqs);
6769 			wpa_s->next_scan_freqs = freqs;
6770 		}
6771 	}
6772 
6773 	/*
6774 	 * Add previous failure count in case the temporary blacklist was
6775 	 * cleared due to no other BSSes being available.
6776 	 */
6777 	count += wpa_s->extra_blacklist_count;
6778 
6779 	if (count > 3 && wpa_s->current_ssid) {
6780 		wpa_printf(MSG_DEBUG, "Continuous association failures - "
6781 			   "consider temporary network disabling");
6782 		wpas_auth_failed(wpa_s, "CONN_FAILED");
6783 	}
6784 
6785 	switch (count) {
6786 	case 1:
6787 		timeout = 100;
6788 		break;
6789 	case 2:
6790 		timeout = 500;
6791 		break;
6792 	case 3:
6793 		timeout = 1000;
6794 		break;
6795 	case 4:
6796 		timeout = 5000;
6797 		break;
6798 	default:
6799 		timeout = 10000;
6800 		break;
6801 	}
6802 
6803 	wpa_dbg(wpa_s, MSG_DEBUG, "Blacklist count %d --> request scan in %d "
6804 		"ms", count, timeout);
6805 
6806 	/*
6807 	 * TODO: if more than one possible AP is available in scan results,
6808 	 * could try the other ones before requesting a new scan.
6809 	 */
6810 
6811 	/* speed up the connection attempt with normal scan */
6812 	wpa_s->normal_scans = 0;
6813 	wpa_supplicant_req_scan(wpa_s, timeout / 1000,
6814 				1000 * (timeout % 1000));
6815 }
6816 
6817 
6818 #ifdef CONFIG_FILS
fils_connection_failure(struct wpa_supplicant * wpa_s)6819 void fils_connection_failure(struct wpa_supplicant *wpa_s)
6820 {
6821 	struct wpa_ssid *ssid = wpa_s->current_ssid;
6822 	const u8 *realm, *username, *rrk;
6823 	size_t realm_len, username_len, rrk_len;
6824 	u16 next_seq_num;
6825 
6826 	if (!ssid || !ssid->eap.erp || !wpa_key_mgmt_fils(ssid->key_mgmt) ||
6827 	    eapol_sm_get_erp_info(wpa_s->eapol, &ssid->eap,
6828 				  &username, &username_len,
6829 				  &realm, &realm_len, &next_seq_num,
6830 				  &rrk, &rrk_len) != 0 ||
6831 	    !realm)
6832 		return;
6833 
6834 	wpa_hexdump_ascii(MSG_DEBUG,
6835 			  "FILS: Store last connection failure realm",
6836 			  realm, realm_len);
6837 	os_free(wpa_s->last_con_fail_realm);
6838 	wpa_s->last_con_fail_realm = os_malloc(realm_len);
6839 	if (wpa_s->last_con_fail_realm) {
6840 		wpa_s->last_con_fail_realm_len = realm_len;
6841 		os_memcpy(wpa_s->last_con_fail_realm, realm, realm_len);
6842 	}
6843 }
6844 #endif /* CONFIG_FILS */
6845 
6846 
wpas_driver_bss_selection(struct wpa_supplicant * wpa_s)6847 int wpas_driver_bss_selection(struct wpa_supplicant *wpa_s)
6848 {
6849 	return wpa_s->conf->ap_scan == 2 ||
6850 		(wpa_s->drv_flags & WPA_DRIVER_FLAGS_BSS_SELECTION);
6851 }
6852 
6853 
6854 #if defined(CONFIG_CTRL_IFACE) || defined(CONFIG_CTRL_IFACE_DBUS_NEW)
wpa_supplicant_ctrl_iface_ctrl_rsp_handle(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid,const char * field,const char * value)6855 int wpa_supplicant_ctrl_iface_ctrl_rsp_handle(struct wpa_supplicant *wpa_s,
6856 					      struct wpa_ssid *ssid,
6857 					      const char *field,
6858 					      const char *value)
6859 {
6860 #ifdef IEEE8021X_EAPOL
6861 	struct eap_peer_config *eap = &ssid->eap;
6862 
6863 	wpa_printf(MSG_DEBUG, "CTRL_IFACE: response handle field=%s", field);
6864 	wpa_hexdump_ascii_key(MSG_DEBUG, "CTRL_IFACE: response value",
6865 			      (const u8 *) value, os_strlen(value));
6866 
6867 	switch (wpa_supplicant_ctrl_req_from_string(field)) {
6868 	case WPA_CTRL_REQ_EAP_IDENTITY:
6869 		os_free(eap->identity);
6870 		eap->identity = (u8 *) os_strdup(value);
6871 		eap->identity_len = os_strlen(value);
6872 		eap->pending_req_identity = 0;
6873 		if (ssid == wpa_s->current_ssid)
6874 			wpa_s->reassociate = 1;
6875 		break;
6876 	case WPA_CTRL_REQ_EAP_PASSWORD:
6877 		bin_clear_free(eap->password, eap->password_len);
6878 		eap->password = (u8 *) os_strdup(value);
6879 		eap->password_len = os_strlen(value);
6880 		eap->pending_req_password = 0;
6881 		if (ssid == wpa_s->current_ssid)
6882 			wpa_s->reassociate = 1;
6883 		break;
6884 	case WPA_CTRL_REQ_EAP_NEW_PASSWORD:
6885 		bin_clear_free(eap->new_password, eap->new_password_len);
6886 		eap->new_password = (u8 *) os_strdup(value);
6887 		eap->new_password_len = os_strlen(value);
6888 		eap->pending_req_new_password = 0;
6889 		if (ssid == wpa_s->current_ssid)
6890 			wpa_s->reassociate = 1;
6891 		break;
6892 	case WPA_CTRL_REQ_EAP_PIN:
6893 		str_clear_free(eap->pin);
6894 		eap->pin = os_strdup(value);
6895 		eap->pending_req_pin = 0;
6896 		if (ssid == wpa_s->current_ssid)
6897 			wpa_s->reassociate = 1;
6898 		break;
6899 	case WPA_CTRL_REQ_EAP_OTP:
6900 		bin_clear_free(eap->otp, eap->otp_len);
6901 		eap->otp = (u8 *) os_strdup(value);
6902 		eap->otp_len = os_strlen(value);
6903 		os_free(eap->pending_req_otp);
6904 		eap->pending_req_otp = NULL;
6905 		eap->pending_req_otp_len = 0;
6906 		break;
6907 	case WPA_CTRL_REQ_EAP_PASSPHRASE:
6908 		str_clear_free(eap->private_key_passwd);
6909 		eap->private_key_passwd = os_strdup(value);
6910 		eap->pending_req_passphrase = 0;
6911 		if (ssid == wpa_s->current_ssid)
6912 			wpa_s->reassociate = 1;
6913 		break;
6914 	case WPA_CTRL_REQ_SIM:
6915 		str_clear_free(eap->external_sim_resp);
6916 		eap->external_sim_resp = os_strdup(value);
6917 		eap->pending_req_sim = 0;
6918 		break;
6919 	case WPA_CTRL_REQ_PSK_PASSPHRASE:
6920 		if (wpa_config_set(ssid, "psk", value, 0) < 0)
6921 			return -1;
6922 		ssid->mem_only_psk = 1;
6923 		if (ssid->passphrase)
6924 			wpa_config_update_psk(ssid);
6925 		if (wpa_s->wpa_state == WPA_SCANNING && !wpa_s->scanning)
6926 			wpa_supplicant_req_scan(wpa_s, 0, 0);
6927 		break;
6928 	case WPA_CTRL_REQ_EXT_CERT_CHECK:
6929 		if (eap->pending_ext_cert_check != PENDING_CHECK)
6930 			return -1;
6931 		if (os_strcmp(value, "good") == 0)
6932 			eap->pending_ext_cert_check = EXT_CERT_CHECK_GOOD;
6933 		else if (os_strcmp(value, "bad") == 0)
6934 			eap->pending_ext_cert_check = EXT_CERT_CHECK_BAD;
6935 		else
6936 			return -1;
6937 		break;
6938 	default:
6939 		wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown field '%s'", field);
6940 		return -1;
6941 	}
6942 
6943 	return 0;
6944 #else /* IEEE8021X_EAPOL */
6945 	wpa_printf(MSG_DEBUG, "CTRL_IFACE: IEEE 802.1X not included");
6946 	return -1;
6947 #endif /* IEEE8021X_EAPOL */
6948 }
6949 #endif /* CONFIG_CTRL_IFACE || CONFIG_CTRL_IFACE_DBUS_NEW */
6950 
6951 
wpas_network_disabled(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)6952 int wpas_network_disabled(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
6953 {
6954 	int i;
6955 	unsigned int drv_enc;
6956 
6957 	if (wpa_s->p2p_mgmt)
6958 		return 1; /* no normal network profiles on p2p_mgmt interface */
6959 
6960 	if (ssid == NULL)
6961 		return 1;
6962 
6963 	if (ssid->disabled)
6964 		return 1;
6965 
6966 	if (wpa_s->drv_capa_known)
6967 		drv_enc = wpa_s->drv_enc;
6968 	else
6969 		drv_enc = (unsigned int) -1;
6970 
6971 	for (i = 0; i < NUM_WEP_KEYS; i++) {
6972 		size_t len = ssid->wep_key_len[i];
6973 		if (len == 0)
6974 			continue;
6975 		if (len == 5 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP40))
6976 			continue;
6977 		if (len == 13 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP104))
6978 			continue;
6979 		if (len == 16 && (drv_enc & WPA_DRIVER_CAPA_ENC_WEP128))
6980 			continue;
6981 		return 1; /* invalid WEP key */
6982 	}
6983 
6984 	if (wpa_key_mgmt_wpa_psk(ssid->key_mgmt) && !ssid->psk_set &&
6985 	    (!ssid->passphrase || ssid->ssid_len != 0) && !ssid->ext_psk &&
6986 	    !(wpa_key_mgmt_sae(ssid->key_mgmt) && ssid->sae_password) &&
6987 	    !ssid->mem_only_psk)
6988 		return 1;
6989 
6990 	return 0;
6991 }
6992 
6993 
wpas_get_ssid_pmf(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid)6994 int wpas_get_ssid_pmf(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid)
6995 {
6996 #ifdef CONFIG_IEEE80211W
6997 	if (ssid == NULL || ssid->ieee80211w == MGMT_FRAME_PROTECTION_DEFAULT) {
6998 		if (wpa_s->conf->pmf == MGMT_FRAME_PROTECTION_OPTIONAL &&
6999 		    !(wpa_s->drv_enc & WPA_DRIVER_CAPA_ENC_BIP)) {
7000 			/*
7001 			 * Driver does not support BIP -- ignore pmf=1 default
7002 			 * since the connection with PMF would fail and the
7003 			 * configuration does not require PMF to be enabled.
7004 			 */
7005 			return NO_MGMT_FRAME_PROTECTION;
7006 		}
7007 
7008 		if (ssid &&
7009 		    (ssid->key_mgmt &
7010 		     ~(WPA_KEY_MGMT_NONE | WPA_KEY_MGMT_WPS |
7011 		       WPA_KEY_MGMT_IEEE8021X_NO_WPA)) == 0) {
7012 			/*
7013 			 * Do not use the default PMF value for non-RSN networks
7014 			 * since PMF is available only with RSN and pmf=2
7015 			 * configuration would otherwise prevent connections to
7016 			 * all open networks.
7017 			 */
7018 			return NO_MGMT_FRAME_PROTECTION;
7019 		}
7020 
7021 		return wpa_s->conf->pmf;
7022 	}
7023 
7024 	return ssid->ieee80211w;
7025 #else /* CONFIG_IEEE80211W */
7026 	return NO_MGMT_FRAME_PROTECTION;
7027 #endif /* CONFIG_IEEE80211W */
7028 }
7029 
7030 
wpas_is_p2p_prioritized(struct wpa_supplicant * wpa_s)7031 int wpas_is_p2p_prioritized(struct wpa_supplicant *wpa_s)
7032 {
7033 	if (wpa_s->global->conc_pref == WPA_CONC_PREF_P2P)
7034 		return 1;
7035 	if (wpa_s->global->conc_pref == WPA_CONC_PREF_STA)
7036 		return 0;
7037 	return -1;
7038 }
7039 
7040 
wpas_auth_failed(struct wpa_supplicant * wpa_s,char * reason)7041 void wpas_auth_failed(struct wpa_supplicant *wpa_s, char *reason)
7042 {
7043 	struct wpa_ssid *ssid = wpa_s->current_ssid;
7044 	int dur;
7045 	struct os_reltime now;
7046 
7047 	if (ssid == NULL) {
7048 		wpa_printf(MSG_DEBUG, "Authentication failure but no known "
7049 			   "SSID block");
7050 		return;
7051 	}
7052 
7053 	if (ssid->key_mgmt == WPA_KEY_MGMT_WPS)
7054 		return;
7055 
7056 	ssid->auth_failures++;
7057 
7058 #ifdef CONFIG_P2P
7059 	if (ssid->p2p_group &&
7060 	    (wpa_s->p2p_in_provisioning || wpa_s->show_group_started)) {
7061 		/*
7062 		 * Skip the wait time since there is a short timeout on the
7063 		 * connection to a P2P group.
7064 		 */
7065 		return;
7066 	}
7067 #endif /* CONFIG_P2P */
7068 
7069 	if (ssid->auth_failures > 50)
7070 		dur = 300;
7071 	else if (ssid->auth_failures > 10)
7072 		dur = 120;
7073 	else if (ssid->auth_failures > 5)
7074 		dur = 90;
7075 	else if (ssid->auth_failures > 3)
7076 		dur = 60;
7077 	else if (ssid->auth_failures > 2)
7078 		dur = 30;
7079 	else if (ssid->auth_failures > 1)
7080 		dur = 20;
7081 	else
7082 		dur = 10;
7083 
7084 	if (ssid->auth_failures > 1 &&
7085 	    wpa_key_mgmt_wpa_ieee8021x(ssid->key_mgmt))
7086 		dur += os_random() % (ssid->auth_failures * 10);
7087 
7088 	os_get_reltime(&now);
7089 	if (now.sec + dur <= ssid->disabled_until.sec)
7090 		return;
7091 
7092 	ssid->disabled_until.sec = now.sec + dur;
7093 
7094 	wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_TEMP_DISABLED
7095 		"id=%d ssid=\"%s\" auth_failures=%u duration=%d reason=%s",
7096 		ssid->id, wpa_ssid_txt(ssid->ssid, ssid->ssid_len),
7097 		ssid->auth_failures, dur, reason);
7098 }
7099 
7100 
wpas_clear_temp_disabled(struct wpa_supplicant * wpa_s,struct wpa_ssid * ssid,int clear_failures)7101 void wpas_clear_temp_disabled(struct wpa_supplicant *wpa_s,
7102 			      struct wpa_ssid *ssid, int clear_failures)
7103 {
7104 	if (ssid == NULL)
7105 		return;
7106 
7107 	if (ssid->disabled_until.sec) {
7108 		wpa_msg(wpa_s, MSG_INFO, WPA_EVENT_REENABLED
7109 			"id=%d ssid=\"%s\"",
7110 			ssid->id, wpa_ssid_txt(ssid->ssid, ssid->ssid_len));
7111 	}
7112 	ssid->disabled_until.sec = 0;
7113 	ssid->disabled_until.usec = 0;
7114 	if (clear_failures)
7115 		ssid->auth_failures = 0;
7116 }
7117 
7118 
disallowed_bssid(struct wpa_supplicant * wpa_s,const u8 * bssid)7119 int disallowed_bssid(struct wpa_supplicant *wpa_s, const u8 *bssid)
7120 {
7121 	size_t i;
7122 
7123 	if (wpa_s->disallow_aps_bssid == NULL)
7124 		return 0;
7125 
7126 	for (i = 0; i < wpa_s->disallow_aps_bssid_count; i++) {
7127 		if (os_memcmp(wpa_s->disallow_aps_bssid + i * ETH_ALEN,
7128 			      bssid, ETH_ALEN) == 0)
7129 			return 1;
7130 	}
7131 
7132 	return 0;
7133 }
7134 
7135 
disallowed_ssid(struct wpa_supplicant * wpa_s,const u8 * ssid,size_t ssid_len)7136 int disallowed_ssid(struct wpa_supplicant *wpa_s, const u8 *ssid,
7137 		    size_t ssid_len)
7138 {
7139 	size_t i;
7140 
7141 	if (wpa_s->disallow_aps_ssid == NULL || ssid == NULL)
7142 		return 0;
7143 
7144 	for (i = 0; i < wpa_s->disallow_aps_ssid_count; i++) {
7145 		struct wpa_ssid_value *s = &wpa_s->disallow_aps_ssid[i];
7146 		if (ssid_len == s->ssid_len &&
7147 		    os_memcmp(ssid, s->ssid, ssid_len) == 0)
7148 			return 1;
7149 	}
7150 
7151 	return 0;
7152 }
7153 
7154 
7155 /**
7156  * wpas_request_connection - Request a new connection
7157  * @wpa_s: Pointer to the network interface
7158  *
7159  * This function is used to request a new connection to be found. It will mark
7160  * the interface to allow reassociation and request a new scan to find a
7161  * suitable network to connect to.
7162  */
wpas_request_connection(struct wpa_supplicant * wpa_s)7163 void wpas_request_connection(struct wpa_supplicant *wpa_s)
7164 {
7165 	wpa_s->normal_scans = 0;
7166 	wpa_s->scan_req = NORMAL_SCAN_REQ;
7167 	wpa_supplicant_reinit_autoscan(wpa_s);
7168 	wpa_s->extra_blacklist_count = 0;
7169 	wpa_s->disconnected = 0;
7170 	wpa_s->reassociate = 1;
7171 	wpa_s->last_owe_group = 0;
7172 
7173 	if (wpa_supplicant_fast_associate(wpa_s) != 1)
7174 		wpa_supplicant_req_scan(wpa_s, 0, 0);
7175 	else
7176 		wpa_s->reattach = 0;
7177 }
7178 
7179 
7180 /**
7181  * wpas_request_disconnection - Request disconnection
7182  * @wpa_s: Pointer to the network interface
7183  *
7184  * This function is used to request disconnection from the currently connected
7185  * network. This will stop any ongoing scans and initiate deauthentication.
7186  */
wpas_request_disconnection(struct wpa_supplicant * wpa_s)7187 void wpas_request_disconnection(struct wpa_supplicant *wpa_s)
7188 {
7189 #ifdef CONFIG_SME
7190 	wpa_s->sme.prev_bssid_set = 0;
7191 #endif /* CONFIG_SME */
7192 	wpa_s->reassociate = 0;
7193 	wpa_s->disconnected = 1;
7194 	wpa_supplicant_cancel_sched_scan(wpa_s);
7195 	wpa_supplicant_cancel_scan(wpa_s);
7196 	wpa_supplicant_deauthenticate(wpa_s, WLAN_REASON_DEAUTH_LEAVING);
7197 	eloop_cancel_timeout(wpas_network_reenabled, wpa_s, NULL);
7198 	radio_remove_works(wpa_s, "connect", 0);
7199 	radio_remove_works(wpa_s, "sme-connect", 0);
7200 }
7201 
7202 
dump_freq_data(struct wpa_supplicant * wpa_s,const char * title,struct wpa_used_freq_data * freqs_data,unsigned int len)7203 void dump_freq_data(struct wpa_supplicant *wpa_s, const char *title,
7204 		    struct wpa_used_freq_data *freqs_data,
7205 		    unsigned int len)
7206 {
7207 	unsigned int i;
7208 
7209 	wpa_dbg(wpa_s, MSG_DEBUG, "Shared frequencies (len=%u): %s",
7210 		len, title);
7211 	for (i = 0; i < len; i++) {
7212 		struct wpa_used_freq_data *cur = &freqs_data[i];
7213 		wpa_dbg(wpa_s, MSG_DEBUG, "freq[%u]: %d, flags=0x%X",
7214 			i, cur->freq, cur->flags);
7215 	}
7216 }
7217 
7218 
7219 /*
7220  * Find the operating frequencies of any of the virtual interfaces that
7221  * are using the same radio as the current interface, and in addition, get
7222  * information about the interface types that are using the frequency.
7223  */
get_shared_radio_freqs_data(struct wpa_supplicant * wpa_s,struct wpa_used_freq_data * freqs_data,unsigned int len)7224 int get_shared_radio_freqs_data(struct wpa_supplicant *wpa_s,
7225 				struct wpa_used_freq_data *freqs_data,
7226 				unsigned int len)
7227 {
7228 	struct wpa_supplicant *ifs;
7229 	u8 bssid[ETH_ALEN];
7230 	int freq;
7231 	unsigned int idx = 0, i;
7232 
7233 	wpa_dbg(wpa_s, MSG_DEBUG,
7234 		"Determining shared radio frequencies (max len %u)", len);
7235 	os_memset(freqs_data, 0, sizeof(struct wpa_used_freq_data) * len);
7236 
7237 	dl_list_for_each(ifs, &wpa_s->radio->ifaces, struct wpa_supplicant,
7238 			 radio_list) {
7239 		if (idx == len)
7240 			break;
7241 
7242 		if (ifs->current_ssid == NULL || ifs->assoc_freq == 0)
7243 			continue;
7244 
7245 		if (ifs->current_ssid->mode == WPAS_MODE_AP ||
7246 		    ifs->current_ssid->mode == WPAS_MODE_P2P_GO ||
7247 		    ifs->current_ssid->mode == WPAS_MODE_MESH)
7248 			freq = ifs->current_ssid->frequency;
7249 		else if (wpa_drv_get_bssid(ifs, bssid) == 0)
7250 			freq = ifs->assoc_freq;
7251 		else
7252 			continue;
7253 
7254 		/* Hold only distinct freqs */
7255 		for (i = 0; i < idx; i++)
7256 			if (freqs_data[i].freq == freq)
7257 				break;
7258 
7259 		if (i == idx)
7260 			freqs_data[idx++].freq = freq;
7261 
7262 		if (ifs->current_ssid->mode == WPAS_MODE_INFRA) {
7263 			freqs_data[i].flags |= ifs->current_ssid->p2p_group ?
7264 				WPA_FREQ_USED_BY_P2P_CLIENT :
7265 				WPA_FREQ_USED_BY_INFRA_STATION;
7266 		}
7267 	}
7268 
7269 	dump_freq_data(wpa_s, "completed iteration", freqs_data, idx);
7270 	return idx;
7271 }
7272 
7273 
7274 /*
7275  * Find the operating frequencies of any of the virtual interfaces that
7276  * are using the same radio as the current interface.
7277  */
get_shared_radio_freqs(struct wpa_supplicant * wpa_s,int * freq_array,unsigned int len)7278 int get_shared_radio_freqs(struct wpa_supplicant *wpa_s,
7279 			   int *freq_array, unsigned int len)
7280 {
7281 	struct wpa_used_freq_data *freqs_data;
7282 	int num, i;
7283 
7284 	os_memset(freq_array, 0, sizeof(int) * len);
7285 
7286 	freqs_data = os_calloc(len, sizeof(struct wpa_used_freq_data));
7287 	if (!freqs_data)
7288 		return -1;
7289 
7290 	num = get_shared_radio_freqs_data(wpa_s, freqs_data, len);
7291 	for (i = 0; i < num; i++)
7292 		freq_array[i] = freqs_data[i].freq;
7293 
7294 	os_free(freqs_data);
7295 
7296 	return num;
7297 }
7298 
7299 
7300 struct wpa_supplicant *
wpas_vendor_elem(struct wpa_supplicant * wpa_s,enum wpa_vendor_elem_frame frame)7301 wpas_vendor_elem(struct wpa_supplicant *wpa_s, enum wpa_vendor_elem_frame frame)
7302 {
7303 	switch (frame) {
7304 #ifdef CONFIG_P2P
7305 	case VENDOR_ELEM_PROBE_REQ_P2P:
7306 	case VENDOR_ELEM_PROBE_RESP_P2P:
7307 	case VENDOR_ELEM_PROBE_RESP_P2P_GO:
7308 	case VENDOR_ELEM_BEACON_P2P_GO:
7309 	case VENDOR_ELEM_P2P_PD_REQ:
7310 	case VENDOR_ELEM_P2P_PD_RESP:
7311 	case VENDOR_ELEM_P2P_GO_NEG_REQ:
7312 	case VENDOR_ELEM_P2P_GO_NEG_RESP:
7313 	case VENDOR_ELEM_P2P_GO_NEG_CONF:
7314 	case VENDOR_ELEM_P2P_INV_REQ:
7315 	case VENDOR_ELEM_P2P_INV_RESP:
7316 	case VENDOR_ELEM_P2P_ASSOC_REQ:
7317 	case VENDOR_ELEM_P2P_ASSOC_RESP:
7318 		return wpa_s->p2pdev;
7319 #endif /* CONFIG_P2P */
7320 	default:
7321 		return wpa_s;
7322 	}
7323 }
7324 
7325 
wpas_vendor_elem_update(struct wpa_supplicant * wpa_s)7326 void wpas_vendor_elem_update(struct wpa_supplicant *wpa_s)
7327 {
7328 	unsigned int i;
7329 	char buf[30];
7330 
7331 	wpa_printf(MSG_DEBUG, "Update vendor elements");
7332 
7333 	for (i = 0; i < NUM_VENDOR_ELEM_FRAMES; i++) {
7334 		if (wpa_s->vendor_elem[i]) {
7335 			int res;
7336 
7337 			res = os_snprintf(buf, sizeof(buf), "frame[%u]", i);
7338 			if (!os_snprintf_error(sizeof(buf), res)) {
7339 				wpa_hexdump_buf(MSG_DEBUG, buf,
7340 						wpa_s->vendor_elem[i]);
7341 			}
7342 		}
7343 	}
7344 
7345 #ifdef CONFIG_P2P
7346 	if (wpa_s->parent == wpa_s &&
7347 	    wpa_s->global->p2p &&
7348 	    !wpa_s->global->p2p_disabled)
7349 		p2p_set_vendor_elems(wpa_s->global->p2p, wpa_s->vendor_elem);
7350 #endif /* CONFIG_P2P */
7351 }
7352 
7353 
wpas_vendor_elem_remove(struct wpa_supplicant * wpa_s,int frame,const u8 * elem,size_t len)7354 int wpas_vendor_elem_remove(struct wpa_supplicant *wpa_s, int frame,
7355 			    const u8 *elem, size_t len)
7356 {
7357 	u8 *ie, *end;
7358 
7359 	ie = wpabuf_mhead_u8(wpa_s->vendor_elem[frame]);
7360 	end = ie + wpabuf_len(wpa_s->vendor_elem[frame]);
7361 
7362 	for (; ie + 1 < end; ie += 2 + ie[1]) {
7363 		if (ie + len > end)
7364 			break;
7365 		if (os_memcmp(ie, elem, len) != 0)
7366 			continue;
7367 
7368 		if (wpabuf_len(wpa_s->vendor_elem[frame]) == len) {
7369 			wpabuf_free(wpa_s->vendor_elem[frame]);
7370 			wpa_s->vendor_elem[frame] = NULL;
7371 		} else {
7372 			os_memmove(ie, ie + len, end - (ie + len));
7373 			wpa_s->vendor_elem[frame]->used -= len;
7374 		}
7375 		wpas_vendor_elem_update(wpa_s);
7376 		return 0;
7377 	}
7378 
7379 	return -1;
7380 }
7381 
7382 
get_mode(struct hostapd_hw_modes * modes,u16 num_modes,enum hostapd_hw_mode mode)7383 struct hostapd_hw_modes * get_mode(struct hostapd_hw_modes *modes,
7384 				   u16 num_modes, enum hostapd_hw_mode mode)
7385 {
7386 	u16 i;
7387 
7388 	for (i = 0; i < num_modes; i++) {
7389 		if (modes[i].mode == mode)
7390 			return &modes[i];
7391 	}
7392 
7393 	return NULL;
7394 }
7395 
7396 
7397 static struct
wpas_get_disallowed_bss(struct wpa_supplicant * wpa_s,const u8 * bssid)7398 wpa_bss_tmp_disallowed * wpas_get_disallowed_bss(struct wpa_supplicant *wpa_s,
7399 						 const u8 *bssid)
7400 {
7401 	struct wpa_bss_tmp_disallowed *bss;
7402 
7403 	dl_list_for_each(bss, &wpa_s->bss_tmp_disallowed,
7404 			 struct wpa_bss_tmp_disallowed, list) {
7405 		if (os_memcmp(bssid, bss->bssid, ETH_ALEN) == 0)
7406 			return bss;
7407 	}
7408 
7409 	return NULL;
7410 }
7411 
7412 
wpa_set_driver_tmp_disallow_list(struct wpa_supplicant * wpa_s)7413 static int wpa_set_driver_tmp_disallow_list(struct wpa_supplicant *wpa_s)
7414 {
7415 	struct wpa_bss_tmp_disallowed *tmp;
7416 	unsigned int num_bssid = 0;
7417 	u8 *bssids;
7418 	int ret;
7419 
7420 	bssids = os_malloc(dl_list_len(&wpa_s->bss_tmp_disallowed) * ETH_ALEN);
7421 	if (!bssids)
7422 		return -1;
7423 	dl_list_for_each(tmp, &wpa_s->bss_tmp_disallowed,
7424 			 struct wpa_bss_tmp_disallowed, list) {
7425 		os_memcpy(&bssids[num_bssid * ETH_ALEN], tmp->bssid,
7426 			  ETH_ALEN);
7427 		num_bssid++;
7428 	}
7429 	ret = wpa_drv_set_bssid_blacklist(wpa_s, num_bssid, bssids);
7430 	os_free(bssids);
7431 	return ret;
7432 }
7433 
7434 
wpa_bss_tmp_disallow_timeout(void * eloop_ctx,void * timeout_ctx)7435 static void wpa_bss_tmp_disallow_timeout(void *eloop_ctx, void *timeout_ctx)
7436 {
7437 	struct wpa_supplicant *wpa_s = eloop_ctx;
7438 	struct wpa_bss_tmp_disallowed *tmp, *bss = timeout_ctx;
7439 
7440 	/* Make sure the bss is not already freed */
7441 	dl_list_for_each(tmp, &wpa_s->bss_tmp_disallowed,
7442 			 struct wpa_bss_tmp_disallowed, list) {
7443 		if (bss == tmp) {
7444 			dl_list_del(&tmp->list);
7445 			os_free(tmp);
7446 			wpa_set_driver_tmp_disallow_list(wpa_s);
7447 			break;
7448 		}
7449 	}
7450 }
7451 
7452 
wpa_bss_tmp_disallow(struct wpa_supplicant * wpa_s,const u8 * bssid,unsigned int sec,int rssi_threshold)7453 void wpa_bss_tmp_disallow(struct wpa_supplicant *wpa_s, const u8 *bssid,
7454 			  unsigned int sec, int rssi_threshold)
7455 {
7456 	struct wpa_bss_tmp_disallowed *bss;
7457 
7458 	bss = wpas_get_disallowed_bss(wpa_s, bssid);
7459 	if (bss) {
7460 		eloop_cancel_timeout(wpa_bss_tmp_disallow_timeout, wpa_s, bss);
7461 		goto finish;
7462 	}
7463 
7464 	bss = os_malloc(sizeof(*bss));
7465 	if (!bss) {
7466 		wpa_printf(MSG_DEBUG,
7467 			   "Failed to allocate memory for temp disallow BSS");
7468 		return;
7469 	}
7470 
7471 	os_memcpy(bss->bssid, bssid, ETH_ALEN);
7472 	dl_list_add(&wpa_s->bss_tmp_disallowed, &bss->list);
7473 	wpa_set_driver_tmp_disallow_list(wpa_s);
7474 
7475 finish:
7476 	bss->rssi_threshold = rssi_threshold;
7477 	eloop_register_timeout(sec, 0, wpa_bss_tmp_disallow_timeout,
7478 			       wpa_s, bss);
7479 }
7480 
7481 
wpa_is_bss_tmp_disallowed(struct wpa_supplicant * wpa_s,struct wpa_bss * bss)7482 int wpa_is_bss_tmp_disallowed(struct wpa_supplicant *wpa_s,
7483 			      struct wpa_bss *bss)
7484 {
7485 	struct wpa_bss_tmp_disallowed *disallowed = NULL, *tmp, *prev;
7486 
7487 	dl_list_for_each_safe(tmp, prev, &wpa_s->bss_tmp_disallowed,
7488 			 struct wpa_bss_tmp_disallowed, list) {
7489 		if (os_memcmp(bss->bssid, tmp->bssid, ETH_ALEN) == 0) {
7490 			disallowed = tmp;
7491 			break;
7492 		}
7493 	}
7494 	if (!disallowed)
7495 		return 0;
7496 
7497 	if (disallowed->rssi_threshold != 0 &&
7498 	    bss->level > disallowed->rssi_threshold)
7499 		return 0;
7500 
7501 	return 1;
7502 }
7503 
7504 
wpas_enable_mac_addr_randomization(struct wpa_supplicant * wpa_s,unsigned int type,const u8 * addr,const u8 * mask)7505 int wpas_enable_mac_addr_randomization(struct wpa_supplicant *wpa_s,
7506 				       unsigned int type, const u8 *addr,
7507 				       const u8 *mask)
7508 {
7509 	if ((addr && !mask) || (!addr && mask)) {
7510 		wpa_printf(MSG_INFO,
7511 			   "MAC_ADDR_RAND_SCAN invalid addr/mask combination");
7512 		return -1;
7513 	}
7514 
7515 	if (addr && mask && (!(mask[0] & 0x01) || (addr[0] & 0x01))) {
7516 		wpa_printf(MSG_INFO,
7517 			   "MAC_ADDR_RAND_SCAN cannot allow multicast address");
7518 		return -1;
7519 	}
7520 
7521 	if (type & MAC_ADDR_RAND_SCAN) {
7522 		if (wpas_mac_addr_rand_scan_set(wpa_s, MAC_ADDR_RAND_SCAN,
7523 						addr, mask))
7524 			return -1;
7525 	}
7526 
7527 	if (type & MAC_ADDR_RAND_SCHED_SCAN) {
7528 		if (wpas_mac_addr_rand_scan_set(wpa_s, MAC_ADDR_RAND_SCHED_SCAN,
7529 						addr, mask))
7530 			return -1;
7531 
7532 		if (wpa_s->sched_scanning && !wpa_s->pno)
7533 			wpas_scan_restart_sched_scan(wpa_s);
7534 	}
7535 
7536 	if (type & MAC_ADDR_RAND_PNO) {
7537 		if (wpas_mac_addr_rand_scan_set(wpa_s, MAC_ADDR_RAND_PNO,
7538 						addr, mask))
7539 			return -1;
7540 
7541 		if (wpa_s->pno) {
7542 			wpas_stop_pno(wpa_s);
7543 			wpas_start_pno(wpa_s);
7544 		}
7545 	}
7546 
7547 	return 0;
7548 }
7549 
7550 
wpas_disable_mac_addr_randomization(struct wpa_supplicant * wpa_s,unsigned int type)7551 int wpas_disable_mac_addr_randomization(struct wpa_supplicant *wpa_s,
7552 					unsigned int type)
7553 {
7554 	wpas_mac_addr_rand_scan_clear(wpa_s, type);
7555 	if (wpa_s->pno) {
7556 		if (type & MAC_ADDR_RAND_PNO) {
7557 			wpas_stop_pno(wpa_s);
7558 			wpas_start_pno(wpa_s);
7559 		}
7560 	} else if (wpa_s->sched_scanning && (type & MAC_ADDR_RAND_SCHED_SCAN)) {
7561 		wpas_scan_restart_sched_scan(wpa_s);
7562 	}
7563 
7564 	return 0;
7565 }
7566