P2P: Show P2P flag in BSS entries also based on Beacon frames
It is possible that a P2P GO has been discovered through a non-P2P scan that did not return P2P IE in Probe Response frames. To cover those cases, check also Beacon frame (if received) for P2P IE. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
ff57398fca
commit
bb50ae4396
3 changed files with 43 additions and 1 deletions
|
@ -1027,6 +1027,43 @@ const u8 * wpa_bss_get_vendor_ie(const struct wpa_bss *bss, u32 vendor_type)
|
|||
}
|
||||
|
||||
|
||||
/**
|
||||
* wpa_bss_get_vendor_ie_beacon - Fetch a vendor information from a BSS entry
|
||||
* @bss: BSS table entry
|
||||
* @vendor_type: Vendor type (four octets starting the IE payload)
|
||||
* Returns: Pointer to the information element (id field) or %NULL if not found
|
||||
*
|
||||
* This function returns the first matching information element in the BSS
|
||||
* entry.
|
||||
*
|
||||
* This function is like wpa_bss_get_vendor_ie(), but uses IE buffer only
|
||||
* from Beacon frames instead of either Beacon or Probe Response frames.
|
||||
*/
|
||||
const u8 * wpa_bss_get_vendor_ie_beacon(const struct wpa_bss *bss,
|
||||
u32 vendor_type)
|
||||
{
|
||||
const u8 *end, *pos;
|
||||
|
||||
if (bss->beacon_ie_len == 0)
|
||||
return NULL;
|
||||
|
||||
pos = (const u8 *) (bss + 1);
|
||||
pos += bss->ie_len;
|
||||
end = pos + bss->beacon_ie_len;
|
||||
|
||||
while (pos + 1 < end) {
|
||||
if (pos + 2 + pos[1] > end)
|
||||
break;
|
||||
if (pos[0] == WLAN_EID_VENDOR_SPECIFIC && pos[1] >= 4 &&
|
||||
vendor_type == WPA_GET_BE32(&pos[2]))
|
||||
return pos;
|
||||
pos += 2 + pos[1];
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* wpa_bss_get_vendor_ie_multi - Fetch vendor IE data from a BSS entry
|
||||
* @bss: BSS table entry
|
||||
|
|
|
@ -118,6 +118,8 @@ struct wpa_bss * wpa_bss_get_id_range(struct wpa_supplicant *wpa_s,
|
|||
unsigned int idf, unsigned int idl);
|
||||
const u8 * wpa_bss_get_ie(const struct wpa_bss *bss, u8 ie);
|
||||
const u8 * wpa_bss_get_vendor_ie(const struct wpa_bss *bss, u32 vendor_type);
|
||||
const u8 * wpa_bss_get_vendor_ie_beacon(const struct wpa_bss *bss,
|
||||
u32 vendor_type);
|
||||
struct wpabuf * wpa_bss_get_vendor_ie_multi(const struct wpa_bss *bss,
|
||||
u32 vendor_type);
|
||||
struct wpabuf * wpa_bss_get_vendor_ie_multi_beacon(const struct wpa_bss *bss,
|
||||
|
|
|
@ -2016,6 +2016,8 @@ static int wpa_supplicant_ctrl_iface_scan_result(
|
|||
const u8 *ie, *ie2, *p2p;
|
||||
|
||||
p2p = wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE);
|
||||
if (!p2p)
|
||||
p2p = wpa_bss_get_vendor_ie_beacon(bss, P2P_IE_VENDOR_TYPE);
|
||||
if (p2p && bss->ssid_len == P2P_WILDCARD_SSID_LEN &&
|
||||
os_memcmp(bss->ssid, P2P_WILDCARD_SSID, P2P_WILDCARD_SSID_LEN) ==
|
||||
0)
|
||||
|
@ -3265,7 +3267,8 @@ static int print_bss_info(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
|
|||
return 0;
|
||||
pos += ret;
|
||||
}
|
||||
if (wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE)) {
|
||||
if (wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE) ||
|
||||
wpa_bss_get_vendor_ie_beacon(bss, P2P_IE_VENDOR_TYPE)) {
|
||||
ret = os_snprintf(pos, end - pos, "[P2P]");
|
||||
if (ret < 0 || ret >= end - pos)
|
||||
return 0;
|
||||
|
|
Loading…
Reference in a new issue