2011-10-17 16:30:43 +02:00
|
|
|
/*
|
|
|
|
* hostapd / IEEE 802.11 Management
|
2012-05-28 02:35:00 +02:00
|
|
|
* Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
|
2011-10-17 16:30:43 +02:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2011-10-17 16:30:43 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "utils/includes.h"
|
|
|
|
|
|
|
|
#include "utils/common.h"
|
|
|
|
#include "common/ieee802_11_defs.h"
|
|
|
|
#include "hostapd.h"
|
|
|
|
#include "sta_info.h"
|
|
|
|
#include "ap_config.h"
|
|
|
|
#include "ap_drv_ops.h"
|
2011-10-17 23:24:16 +02:00
|
|
|
#include "ieee802_11.h"
|
2011-10-17 16:30:43 +02:00
|
|
|
|
|
|
|
|
|
|
|
#ifdef CONFIG_IEEE80211W
|
|
|
|
|
|
|
|
u8 * hostapd_eid_assoc_comeback_time(struct hostapd_data *hapd,
|
|
|
|
struct sta_info *sta, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
u32 timeout, tu;
|
2013-11-25 21:56:09 +01:00
|
|
|
struct os_reltime now, passed;
|
2011-10-17 16:30:43 +02:00
|
|
|
|
|
|
|
*pos++ = WLAN_EID_TIMEOUT_INTERVAL;
|
|
|
|
*pos++ = 5;
|
|
|
|
*pos++ = WLAN_TIMEOUT_ASSOC_COMEBACK;
|
2013-11-25 21:56:09 +01:00
|
|
|
os_get_reltime(&now);
|
|
|
|
os_reltime_sub(&now, &sta->sa_query_start, &passed);
|
2011-10-17 16:30:43 +02:00
|
|
|
tu = (passed.sec * 1000000 + passed.usec) / 1024;
|
|
|
|
if (hapd->conf->assoc_sa_query_max_timeout > tu)
|
|
|
|
timeout = hapd->conf->assoc_sa_query_max_timeout - tu;
|
|
|
|
else
|
|
|
|
timeout = 0;
|
|
|
|
if (timeout < hapd->conf->assoc_sa_query_max_timeout)
|
|
|
|
timeout++; /* add some extra time for local timers */
|
|
|
|
WPA_PUT_LE32(pos, timeout);
|
|
|
|
pos += 4;
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* MLME-SAQuery.request */
|
|
|
|
void ieee802_11_send_sa_query_req(struct hostapd_data *hapd,
|
|
|
|
const u8 *addr, const u8 *trans_id)
|
|
|
|
{
|
|
|
|
struct ieee80211_mgmt mgmt;
|
|
|
|
u8 *end;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Request to "
|
|
|
|
MACSTR, MAC2STR(addr));
|
|
|
|
wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
|
|
|
|
trans_id, WLAN_SA_QUERY_TR_ID_LEN);
|
|
|
|
|
|
|
|
os_memset(&mgmt, 0, sizeof(mgmt));
|
|
|
|
mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
|
|
WLAN_FC_STYPE_ACTION);
|
|
|
|
os_memcpy(mgmt.da, addr, ETH_ALEN);
|
|
|
|
os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
|
|
|
|
os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
|
|
|
|
mgmt.u.action.category = WLAN_ACTION_SA_QUERY;
|
|
|
|
mgmt.u.action.u.sa_query_req.action = WLAN_SA_QUERY_REQUEST;
|
|
|
|
os_memcpy(mgmt.u.action.u.sa_query_req.trans_id, trans_id,
|
|
|
|
WLAN_SA_QUERY_TR_ID_LEN);
|
|
|
|
end = mgmt.u.action.u.sa_query_req.trans_id + WLAN_SA_QUERY_TR_ID_LEN;
|
2011-11-19 18:02:05 +01:00
|
|
|
if (hostapd_drv_send_mlme(hapd, &mgmt, end - (u8 *) &mgmt, 0) < 0)
|
2013-11-02 11:51:30 +01:00
|
|
|
wpa_printf(MSG_INFO, "ieee802_11_send_sa_query_req: send failed");
|
2011-10-17 16:30:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-18 20:53:36 +01:00
|
|
|
static void ieee802_11_send_sa_query_resp(struct hostapd_data *hapd,
|
|
|
|
const u8 *sa, const u8 *trans_id)
|
2011-10-17 16:30:43 +02:00
|
|
|
{
|
|
|
|
struct sta_info *sta;
|
|
|
|
struct ieee80211_mgmt resp;
|
|
|
|
u8 *end;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Request from "
|
|
|
|
MACSTR, MAC2STR(sa));
|
|
|
|
wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
|
|
|
|
trans_id, WLAN_SA_QUERY_TR_ID_LEN);
|
|
|
|
|
|
|
|
sta = ap_get_sta(hapd, sa);
|
|
|
|
if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignore SA Query Request "
|
|
|
|
"from unassociated STA " MACSTR, MAC2STR(sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Sending SA Query Response to "
|
|
|
|
MACSTR, MAC2STR(sa));
|
|
|
|
|
|
|
|
os_memset(&resp, 0, sizeof(resp));
|
|
|
|
resp.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
|
|
WLAN_FC_STYPE_ACTION);
|
|
|
|
os_memcpy(resp.da, sa, ETH_ALEN);
|
|
|
|
os_memcpy(resp.sa, hapd->own_addr, ETH_ALEN);
|
|
|
|
os_memcpy(resp.bssid, hapd->own_addr, ETH_ALEN);
|
|
|
|
resp.u.action.category = WLAN_ACTION_SA_QUERY;
|
|
|
|
resp.u.action.u.sa_query_req.action = WLAN_SA_QUERY_RESPONSE;
|
|
|
|
os_memcpy(resp.u.action.u.sa_query_req.trans_id, trans_id,
|
|
|
|
WLAN_SA_QUERY_TR_ID_LEN);
|
|
|
|
end = resp.u.action.u.sa_query_req.trans_id + WLAN_SA_QUERY_TR_ID_LEN;
|
2011-11-19 18:02:05 +01:00
|
|
|
if (hostapd_drv_send_mlme(hapd, &resp, end - (u8 *) &resp, 0) < 0)
|
2013-11-02 11:51:30 +01:00
|
|
|
wpa_printf(MSG_INFO, "ieee80211_mgmt_sa_query_request: send failed");
|
2011-10-17 16:30:43 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ieee802_11_sa_query_action(struct hostapd_data *hapd, const u8 *sa,
|
|
|
|
const u8 action_type, const u8 *trans_id)
|
|
|
|
{
|
|
|
|
struct sta_info *sta;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (action_type == WLAN_SA_QUERY_REQUEST) {
|
|
|
|
ieee802_11_send_sa_query_resp(hapd, sa, trans_id);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (action_type != WLAN_SA_QUERY_RESPONSE) {
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Unexpected SA Query "
|
|
|
|
"Action %d", action_type);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Received SA Query Response from "
|
|
|
|
MACSTR, MAC2STR(sa));
|
|
|
|
wpa_hexdump(MSG_DEBUG, "IEEE 802.11: SA Query Transaction ID",
|
|
|
|
trans_id, WLAN_SA_QUERY_TR_ID_LEN);
|
|
|
|
|
|
|
|
/* MLME-SAQuery.confirm */
|
|
|
|
|
|
|
|
sta = ap_get_sta(hapd, sa);
|
|
|
|
if (sta == NULL || sta->sa_query_trans_id == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching STA with "
|
|
|
|
"pending SA Query request found");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < sta->sa_query_count; i++) {
|
|
|
|
if (os_memcmp(sta->sa_query_trans_id +
|
|
|
|
i * WLAN_SA_QUERY_TR_ID_LEN,
|
|
|
|
trans_id, WLAN_SA_QUERY_TR_ID_LEN) == 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i >= sta->sa_query_count) {
|
|
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: No matching SA Query "
|
|
|
|
"transaction identifier found");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
|
|
"Reply to pending SA Query received");
|
|
|
|
ap_sta_stop_sa_query(hapd, sta);
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* CONFIG_IEEE80211W */
|
2011-10-17 20:03:52 +02:00
|
|
|
|
|
|
|
|
2013-03-31 20:51:44 +02:00
|
|
|
static void hostapd_ext_capab_byte(struct hostapd_data *hapd, u8 *pos, int idx)
|
|
|
|
{
|
|
|
|
*pos = 0x00;
|
|
|
|
|
|
|
|
switch (idx) {
|
|
|
|
case 0: /* Bits 0-7 */
|
2014-03-12 23:28:39 +01:00
|
|
|
if (hapd->iconf->obss_interval)
|
|
|
|
*pos |= 0x01; /* Bit 0 - Coexistence management */
|
2013-03-31 20:51:44 +02:00
|
|
|
break;
|
|
|
|
case 1: /* Bits 8-15 */
|
AP: Add support for Proxy ARP, DHCP snooping mechanism
Proxy ARP allows the AP devices to keep track of the hardware address to
IP address mapping of the STA devices within the BSS. When a request for
such information is made (i.e., ARP request, Neighbor Solicitation), the
AP will respond on behalf of the STA device within the BSS. Such
requests could originate from a device within the BSS or also from the
bridge. In the process of the AP replying to the request (i.e., ARP
reply, Neighbor Advertisement), the AP will drop the original request
frame. The relevant STA will not even know that such information was
ever requested.
This feature is a requirement for Hotspot 2.0, and is defined in IEEE
Std 802.11-2012, 10.23.13. While the Proxy ARP support code mainly
resides in the kernel bridge code, in order to optimize the performance
and simplify kernel implementation, the DHCP snooping code was added to
the hostapd.
Signed-off-by: Kyeyoon Park <kyeyoonp@qca.qualcomm.com>
2014-09-26 07:32:55 +02:00
|
|
|
if (hapd->conf->proxy_arp)
|
|
|
|
*pos |= 0x10; /* Bit 12 - Proxy ARP */
|
2013-03-31 20:51:44 +02:00
|
|
|
break;
|
|
|
|
case 2: /* Bits 16-23 */
|
|
|
|
if (hapd->conf->wnm_sleep_mode)
|
|
|
|
*pos |= 0x02; /* Bit 17 - WNM-Sleep Mode */
|
|
|
|
if (hapd->conf->bss_transition)
|
|
|
|
*pos |= 0x08; /* Bit 19 - BSS Transition */
|
|
|
|
break;
|
|
|
|
case 3: /* Bits 24-31 */
|
|
|
|
#ifdef CONFIG_WNM
|
|
|
|
*pos |= 0x02; /* Bit 25 - SSID List */
|
|
|
|
#endif /* CONFIG_WNM */
|
|
|
|
if (hapd->conf->time_advertisement == 2)
|
|
|
|
*pos |= 0x08; /* Bit 27 - UTC TSF Offset */
|
|
|
|
if (hapd->conf->interworking)
|
|
|
|
*pos |= 0x80; /* Bit 31 - Interworking */
|
|
|
|
break;
|
|
|
|
case 4: /* Bits 32-39 */
|
2013-07-24 11:28:20 +02:00
|
|
|
if (hapd->conf->qos_map_set_len)
|
|
|
|
*pos |= 0x01; /* Bit 32 - QoS Map */
|
2013-03-31 20:51:44 +02:00
|
|
|
if (hapd->conf->tdls & TDLS_PROHIBIT)
|
|
|
|
*pos |= 0x40; /* Bit 38 - TDLS Prohibited */
|
|
|
|
if (hapd->conf->tdls & TDLS_PROHIBIT_CHAN_SWITCH) {
|
|
|
|
/* Bit 39 - TDLS Channel Switching Prohibited */
|
|
|
|
*pos |= 0x80;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case 5: /* Bits 40-47 */
|
2013-03-17 15:03:42 +01:00
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
if (hapd->conf->hs20)
|
|
|
|
*pos |= 0x40; /* Bit 46 - WNM-Notification */
|
|
|
|
#endif /* CONFIG_HS20 */
|
2013-03-31 20:51:44 +02:00
|
|
|
break;
|
|
|
|
case 6: /* Bits 48-55 */
|
|
|
|
if (hapd->conf->ssid.utf8_ssid)
|
|
|
|
*pos |= 0x01; /* Bit 48 - UTF-8 SSID */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-17 20:03:52 +02:00
|
|
|
u8 * hostapd_eid_ext_capab(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
2013-03-31 20:51:44 +02:00
|
|
|
u8 len = 0, i;
|
2011-10-17 20:03:52 +02:00
|
|
|
|
|
|
|
if (hapd->conf->tdls & (TDLS_PROHIBIT | TDLS_PROHIBIT_CHAN_SWITCH))
|
|
|
|
len = 5;
|
|
|
|
if (len < 4 && hapd->conf->interworking)
|
|
|
|
len = 4;
|
2012-12-16 18:16:17 +01:00
|
|
|
if (len < 3 && hapd->conf->wnm_sleep_mode)
|
|
|
|
len = 3;
|
2014-03-12 23:28:39 +01:00
|
|
|
if (len < 1 && hapd->iconf->obss_interval)
|
|
|
|
len = 1;
|
2012-12-16 19:46:51 +01:00
|
|
|
if (len < 7 && hapd->conf->ssid.utf8_ssid)
|
|
|
|
len = 7;
|
2012-12-16 20:22:24 +01:00
|
|
|
#ifdef CONFIG_WNM
|
|
|
|
if (len < 4)
|
|
|
|
len = 4;
|
|
|
|
#endif /* CONFIG_WNM */
|
2013-03-17 15:03:42 +01:00
|
|
|
#ifdef CONFIG_HS20
|
|
|
|
if (hapd->conf->hs20 && len < 6)
|
|
|
|
len = 6;
|
|
|
|
#endif /* CONFIG_HS20 */
|
2013-03-31 20:51:44 +02:00
|
|
|
if (len < hapd->iface->extended_capa_len)
|
|
|
|
len = hapd->iface->extended_capa_len;
|
2011-10-17 20:03:52 +02:00
|
|
|
if (len == 0)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_EXT_CAPAB;
|
|
|
|
*pos++ = len;
|
2013-03-31 20:51:44 +02:00
|
|
|
for (i = 0; i < len; i++, pos++) {
|
|
|
|
hostapd_ext_capab_byte(hapd, pos, i);
|
2011-10-17 20:03:52 +02:00
|
|
|
|
2013-03-31 20:51:44 +02:00
|
|
|
if (i < hapd->iface->extended_capa_len) {
|
|
|
|
*pos &= ~hapd->iface->extended_capa_mask[i];
|
|
|
|
*pos |= hapd->iface->extended_capa[i];
|
|
|
|
}
|
|
|
|
}
|
2012-12-16 19:46:51 +01:00
|
|
|
|
2013-03-31 20:58:17 +02:00
|
|
|
while (len > 0 && eid[1 + len] == 0) {
|
|
|
|
len--;
|
|
|
|
eid[1] = len;
|
|
|
|
}
|
|
|
|
if (len == 0)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
return eid + 2 + len;
|
2011-10-17 20:03:52 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-07-24 11:28:20 +02:00
|
|
|
u8 * hostapd_eid_qos_map_set(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
u8 len = hapd->conf->qos_map_set_len;
|
|
|
|
|
|
|
|
if (!len)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_QOS_MAP_SET;
|
|
|
|
*pos++ = len;
|
|
|
|
os_memcpy(pos, hapd->conf->qos_map_set, len);
|
|
|
|
pos += len;
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-17 20:03:52 +02:00
|
|
|
u8 * hostapd_eid_interworking(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
u8 *len;
|
|
|
|
|
|
|
|
if (!hapd->conf->interworking)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_INTERWORKING;
|
|
|
|
len = pos++;
|
|
|
|
|
|
|
|
*pos = hapd->conf->access_network_type;
|
|
|
|
if (hapd->conf->internet)
|
|
|
|
*pos |= INTERWORKING_ANO_INTERNET;
|
|
|
|
if (hapd->conf->asra)
|
|
|
|
*pos |= INTERWORKING_ANO_ASRA;
|
|
|
|
if (hapd->conf->esr)
|
|
|
|
*pos |= INTERWORKING_ANO_ESR;
|
|
|
|
if (hapd->conf->uesa)
|
|
|
|
*pos |= INTERWORKING_ANO_UESA;
|
|
|
|
pos++;
|
|
|
|
|
|
|
|
if (hapd->conf->venue_info_set) {
|
|
|
|
*pos++ = hapd->conf->venue_group;
|
|
|
|
*pos++ = hapd->conf->venue_type;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!is_zero_ether_addr(hapd->conf->hessid)) {
|
|
|
|
os_memcpy(pos, hapd->conf->hessid, ETH_ALEN);
|
|
|
|
pos += ETH_ALEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
*len = pos - len - 1;
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
2011-10-17 22:19:52 +02:00
|
|
|
|
|
|
|
|
|
|
|
u8 * hostapd_eid_adv_proto(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
|
|
|
|
/* TODO: Separate configuration for ANQP? */
|
|
|
|
if (!hapd->conf->interworking)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_ADV_PROTO;
|
|
|
|
*pos++ = 2;
|
2011-10-25 10:31:21 +02:00
|
|
|
*pos++ = 0x7F; /* Query Response Length Limit | PAME-BI */
|
2011-10-17 22:19:52 +02:00
|
|
|
*pos++ = ACCESS_NETWORK_QUERY_PROTOCOL;
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
2011-10-17 22:55:50 +02:00
|
|
|
|
|
|
|
|
|
|
|
u8 * hostapd_eid_roaming_consortium(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
#ifdef CONFIG_INTERWORKING
|
|
|
|
u8 *len;
|
|
|
|
unsigned int i, count;
|
|
|
|
|
|
|
|
if (!hapd->conf->interworking ||
|
|
|
|
hapd->conf->roaming_consortium == NULL ||
|
|
|
|
hapd->conf->roaming_consortium_count == 0)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_ROAMING_CONSORTIUM;
|
|
|
|
len = pos++;
|
|
|
|
|
|
|
|
/* Number of ANQP OIs (in addition to the max 3 listed here) */
|
|
|
|
if (hapd->conf->roaming_consortium_count > 3 + 255)
|
|
|
|
*pos++ = 255;
|
|
|
|
else if (hapd->conf->roaming_consortium_count > 3)
|
|
|
|
*pos++ = hapd->conf->roaming_consortium_count - 3;
|
|
|
|
else
|
|
|
|
*pos++ = 0;
|
|
|
|
|
|
|
|
/* OU #1 and #2 Lengths */
|
|
|
|
*pos = hapd->conf->roaming_consortium[0].len;
|
|
|
|
if (hapd->conf->roaming_consortium_count > 1)
|
|
|
|
*pos |= hapd->conf->roaming_consortium[1].len << 4;
|
|
|
|
pos++;
|
|
|
|
|
|
|
|
if (hapd->conf->roaming_consortium_count > 3)
|
|
|
|
count = 3;
|
|
|
|
else
|
|
|
|
count = hapd->conf->roaming_consortium_count;
|
|
|
|
|
|
|
|
for (i = 0; i < count; i++) {
|
|
|
|
os_memcpy(pos, hapd->conf->roaming_consortium[i].oi,
|
|
|
|
hapd->conf->roaming_consortium[i].len);
|
|
|
|
pos += hapd->conf->roaming_consortium[i].len;
|
|
|
|
}
|
|
|
|
|
|
|
|
*len = pos - len - 1;
|
|
|
|
#endif /* CONFIG_INTERWORKING */
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|
2011-10-17 23:24:16 +02:00
|
|
|
|
|
|
|
|
|
|
|
u8 * hostapd_eid_time_adv(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
if (hapd->conf->time_advertisement != 2)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
if (hapd->time_adv == NULL &&
|
|
|
|
hostapd_update_time_adv(hapd) < 0)
|
|
|
|
return eid;
|
|
|
|
|
2011-11-13 21:45:16 +01:00
|
|
|
if (hapd->time_adv == NULL)
|
|
|
|
return eid;
|
|
|
|
|
2011-10-17 23:24:16 +02:00
|
|
|
os_memcpy(eid, wpabuf_head(hapd->time_adv),
|
|
|
|
wpabuf_len(hapd->time_adv));
|
|
|
|
eid += wpabuf_len(hapd->time_adv);
|
|
|
|
|
|
|
|
return eid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
u8 * hostapd_eid_time_zone(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
if (hapd->conf->time_advertisement != 2)
|
|
|
|
return eid;
|
|
|
|
|
|
|
|
len = os_strlen(hapd->conf->time_zone);
|
|
|
|
|
|
|
|
*eid++ = WLAN_EID_TIME_ZONE;
|
|
|
|
*eid++ = len;
|
|
|
|
os_memcpy(eid, hapd->conf->time_zone, len);
|
|
|
|
eid += len;
|
|
|
|
|
|
|
|
return eid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int hostapd_update_time_adv(struct hostapd_data *hapd)
|
|
|
|
{
|
|
|
|
const int elen = 2 + 1 + 10 + 5 + 1;
|
|
|
|
struct os_time t;
|
|
|
|
struct os_tm tm;
|
|
|
|
u8 *pos;
|
|
|
|
|
|
|
|
if (hapd->conf->time_advertisement != 2)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
if (os_get_time(&t) < 0 || os_gmtime(t.sec, &tm) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (!hapd->time_adv) {
|
|
|
|
hapd->time_adv = wpabuf_alloc(elen);
|
|
|
|
if (hapd->time_adv == NULL)
|
|
|
|
return -1;
|
|
|
|
pos = wpabuf_put(hapd->time_adv, elen);
|
|
|
|
} else
|
|
|
|
pos = wpabuf_mhead_u8(hapd->time_adv);
|
|
|
|
|
|
|
|
*pos++ = WLAN_EID_TIME_ADVERTISEMENT;
|
|
|
|
*pos++ = 1 + 10 + 5 + 1;
|
|
|
|
|
|
|
|
*pos++ = 2; /* UTC time at which the TSF timer is 0 */
|
|
|
|
|
|
|
|
/* Time Value at TSF 0 */
|
|
|
|
/* FIX: need to calculate this based on the current TSF value */
|
|
|
|
WPA_PUT_LE16(pos, tm.year); /* Year */
|
|
|
|
pos += 2;
|
|
|
|
*pos++ = tm.month; /* Month */
|
|
|
|
*pos++ = tm.day; /* Day of month */
|
|
|
|
*pos++ = tm.hour; /* Hours */
|
|
|
|
*pos++ = tm.min; /* Minutes */
|
|
|
|
*pos++ = tm.sec; /* Seconds */
|
|
|
|
WPA_PUT_LE16(pos, 0); /* Milliseconds (not used) */
|
|
|
|
pos += 2;
|
|
|
|
*pos++ = 0; /* Reserved */
|
|
|
|
|
|
|
|
/* Time Error */
|
|
|
|
/* TODO: fill in an estimate on the error */
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
|
|
|
|
*pos++ = hapd->time_update_counter++;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2012-05-28 02:35:00 +02:00
|
|
|
|
|
|
|
|
|
|
|
u8 * hostapd_eid_bss_max_idle_period(struct hostapd_data *hapd, u8 *eid)
|
|
|
|
{
|
|
|
|
u8 *pos = eid;
|
|
|
|
|
|
|
|
#ifdef CONFIG_WNM
|
|
|
|
if (hapd->conf->ap_max_inactivity > 0) {
|
|
|
|
unsigned int val;
|
|
|
|
*pos++ = WLAN_EID_BSS_MAX_IDLE_PERIOD;
|
|
|
|
*pos++ = 3;
|
|
|
|
val = hapd->conf->ap_max_inactivity;
|
|
|
|
if (val > 68000)
|
|
|
|
val = 68000;
|
|
|
|
val *= 1000;
|
|
|
|
val /= 1024;
|
|
|
|
if (val == 0)
|
|
|
|
val = 1;
|
|
|
|
if (val > 65535)
|
|
|
|
val = 65535;
|
|
|
|
WPA_PUT_LE16(pos, val);
|
|
|
|
pos += 2;
|
|
|
|
*pos++ = 0x00; /* TODO: Protected Keep-Alive Required */
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_WNM */
|
|
|
|
|
|
|
|
return pos;
|
|
|
|
}
|