blob: 543fa335f7a589535888ec10b8138c1b81f0720b [file] [log] [blame]
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07001/*
2 * Hotspot 2.0 AP ANQP processing
3 * Copyright (c) 2009, Atheros Communications, Inc.
Dmitry Shmidtf21452a2014-02-26 10:55:25 -08004 * Copyright (c) 2011-2013, Qualcomm Atheros, Inc.
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005 *
6 * This software may be distributed under the terms of the BSD license.
7 * See README for more details.
8 */
9
10#include "includes.h"
11
12#include "common.h"
13#include "common/ieee802_11_defs.h"
Roshan Pius3a1667e2018-07-03 15:17:14 -070014#include "common/wpa_ctrl.h"
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070015#include "hostapd.h"
16#include "ap_config.h"
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080017#include "ap_drv_ops.h"
Roshan Pius3a1667e2018-07-03 15:17:14 -070018#include "sta_info.h"
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070019#include "hs20.h"
20
21
22u8 * hostapd_eid_hs20_indication(struct hostapd_data *hapd, u8 *eid)
23{
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080024 u8 conf;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070025 if (!hapd->conf->hs20)
26 return eid;
27 *eid++ = WLAN_EID_VENDOR_SPECIFIC;
Hai Shalom74f70d42019-02-11 14:42:39 -080028 *eid++ = hapd->conf->hs20_release < 2 ? 5 : 7;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070029 WPA_PUT_BE24(eid, OUI_WFA);
30 eid += 3;
31 *eid++ = HS20_INDICATION_OUI_TYPE;
Hai Shalom74f70d42019-02-11 14:42:39 -080032 conf = (hapd->conf->hs20_release - 1) << 4; /* Release Number */
33 if (hapd->conf->hs20_release >= 2)
34 conf |= HS20_ANQP_DOMAIN_ID_PRESENT;
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080035 if (hapd->conf->disable_dgaf)
36 conf |= HS20_DGAF_DISABLED;
37 *eid++ = conf;
Hai Shalom74f70d42019-02-11 14:42:39 -080038 if (hapd->conf->hs20_release >= 2) {
39 WPA_PUT_LE16(eid, hapd->conf->anqp_domain_id);
40 eid += 2;
41 }
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080042
Dmitry Shmidt61d9df32012-08-29 16:22:06 -070043 return eid;
44}
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080045
46
47u8 * hostapd_eid_osen(struct hostapd_data *hapd, u8 *eid)
48{
49 u8 *len;
50 u16 capab;
51
52 if (!hapd->conf->osen)
53 return eid;
54
55 *eid++ = WLAN_EID_VENDOR_SPECIFIC;
56 len = eid++; /* to be filled */
57 WPA_PUT_BE24(eid, OUI_WFA);
58 eid += 3;
59 *eid++ = HS20_OSEN_OUI_TYPE;
60
61 /* Group Data Cipher Suite */
62 RSN_SELECTOR_PUT(eid, RSN_CIPHER_SUITE_NO_GROUP_ADDRESSED);
63 eid += RSN_SELECTOR_LEN;
64
65 /* Pairwise Cipher Suite Count and List */
66 WPA_PUT_LE16(eid, 1);
67 eid += 2;
68 RSN_SELECTOR_PUT(eid, RSN_CIPHER_SUITE_CCMP);
69 eid += RSN_SELECTOR_LEN;
70
71 /* AKM Suite Count and List */
72 WPA_PUT_LE16(eid, 1);
73 eid += 2;
74 RSN_SELECTOR_PUT(eid, RSN_AUTH_KEY_MGMT_OSEN);
75 eid += RSN_SELECTOR_LEN;
76
77 /* RSN Capabilities */
78 capab = 0;
79 if (hapd->conf->wmm_enabled) {
80 /* 4 PTKSA replay counters when using WMM */
81 capab |= (RSN_NUM_REPLAY_COUNTERS_16 << 2);
82 }
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080083 if (hapd->conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
84 capab |= WPA_CAPABILITY_MFPC;
85 if (hapd->conf->ieee80211w == MGMT_FRAME_PROTECTION_REQUIRED)
86 capab |= WPA_CAPABILITY_MFPR;
87 }
Hai Shalom74f70d42019-02-11 14:42:39 -080088#ifdef CONFIG_OCV
89 if (hapd->conf->ocv)
90 capab |= WPA_CAPABILITY_OCVC;
91#endif /* CONFIG_OCV */
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080092 WPA_PUT_LE16(eid, capab);
93 eid += 2;
94
95 *len = eid - len - 1;
96
97 return eid;
98}
99
100
101int hs20_send_wnm_notification(struct hostapd_data *hapd, const u8 *addr,
102 u8 osu_method, const char *url)
103{
104 struct wpabuf *buf;
105 size_t len = 0;
106 int ret;
107
108 /* TODO: should refuse to send notification if the STA is not associated
109 * or if the STA did not indicate support for WNM-Notification */
110
111 if (url) {
112 len = 1 + os_strlen(url);
113 if (5 + len > 255) {
114 wpa_printf(MSG_INFO, "HS 2.0: Too long URL for "
115 "WNM-Notification: '%s'", url);
116 return -1;
117 }
118 }
119
120 buf = wpabuf_alloc(4 + 7 + len);
121 if (buf == NULL)
122 return -1;
123
124 wpabuf_put_u8(buf, WLAN_ACTION_WNM);
125 wpabuf_put_u8(buf, WNM_NOTIFICATION_REQ);
126 wpabuf_put_u8(buf, 1); /* Dialog token */
127 wpabuf_put_u8(buf, 1); /* Type - 1 reserved for WFA */
128
129 /* Subscription Remediation subelement */
130 wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
131 wpabuf_put_u8(buf, 5 + len);
132 wpabuf_put_be24(buf, OUI_WFA);
133 wpabuf_put_u8(buf, HS20_WNM_SUB_REM_NEEDED);
134 if (url) {
135 wpabuf_put_u8(buf, len - 1);
136 wpabuf_put_data(buf, url, len - 1);
137 wpabuf_put_u8(buf, osu_method);
138 } else {
139 /* Server URL and Server Method fields not included */
140 wpabuf_put_u8(buf, 0);
141 }
142
143 ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
144 wpabuf_head(buf), wpabuf_len(buf));
145
146 wpabuf_free(buf);
147
148 return ret;
149}
150
151
152int hs20_send_wnm_notification_deauth_req(struct hostapd_data *hapd,
153 const u8 *addr,
154 const struct wpabuf *payload)
155{
156 struct wpabuf *buf;
157 int ret;
158
159 /* TODO: should refuse to send notification if the STA is not associated
160 * or if the STA did not indicate support for WNM-Notification */
161
162 buf = wpabuf_alloc(4 + 6 + wpabuf_len(payload));
163 if (buf == NULL)
164 return -1;
165
166 wpabuf_put_u8(buf, WLAN_ACTION_WNM);
167 wpabuf_put_u8(buf, WNM_NOTIFICATION_REQ);
168 wpabuf_put_u8(buf, 1); /* Dialog token */
169 wpabuf_put_u8(buf, 1); /* Type - 1 reserved for WFA */
170
171 /* Deauthentication Imminent Notice subelement */
172 wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
173 wpabuf_put_u8(buf, 4 + wpabuf_len(payload));
174 wpabuf_put_be24(buf, OUI_WFA);
175 wpabuf_put_u8(buf, HS20_WNM_DEAUTH_IMMINENT_NOTICE);
176 wpabuf_put_buf(buf, payload);
177
178 ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
179 wpabuf_head(buf), wpabuf_len(buf));
180
181 wpabuf_free(buf);
182
183 return ret;
184}
Roshan Pius3a1667e2018-07-03 15:17:14 -0700185
186
187int hs20_send_wnm_notification_t_c(struct hostapd_data *hapd,
188 const u8 *addr, const char *url)
189{
190 struct wpabuf *buf;
191 int ret;
Hai Shalom74f70d42019-02-11 14:42:39 -0800192 size_t url_len;
Roshan Pius3a1667e2018-07-03 15:17:14 -0700193
194 if (!url) {
195 wpa_printf(MSG_INFO, "HS 2.0: No T&C Server URL available");
196 return -1;
197 }
198
Hai Shalom74f70d42019-02-11 14:42:39 -0800199 url_len = os_strlen(url);
Roshan Pius3a1667e2018-07-03 15:17:14 -0700200 if (5 + url_len > 255) {
201 wpa_printf(MSG_INFO,
202 "HS 2.0: Too long T&C Server URL for WNM-Notification: '%s'",
203 url);
204 return -1;
205 }
206
207 buf = wpabuf_alloc(4 + 7 + url_len);
208 if (!buf)
209 return -1;
210
211 wpabuf_put_u8(buf, WLAN_ACTION_WNM);
212 wpabuf_put_u8(buf, WNM_NOTIFICATION_REQ);
213 wpabuf_put_u8(buf, 1); /* Dialog token */
214 wpabuf_put_u8(buf, 1); /* Type - 1 reserved for WFA */
215
216 /* Terms and Conditions Acceptance subelement */
217 wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
218 wpabuf_put_u8(buf, 4 + 1 + url_len);
219 wpabuf_put_be24(buf, OUI_WFA);
220 wpabuf_put_u8(buf, HS20_WNM_T_C_ACCEPTANCE);
221 wpabuf_put_u8(buf, url_len);
222 wpabuf_put_str(buf, url);
223
224 ret = hostapd_drv_send_action(hapd, hapd->iface->freq, 0, addr,
225 wpabuf_head(buf), wpabuf_len(buf));
226
227 wpabuf_free(buf);
228
229 return ret;
230}
231
232
233void hs20_t_c_filtering(struct hostapd_data *hapd, struct sta_info *sta,
234 int enabled)
235{
236 if (enabled) {
237 wpa_printf(MSG_DEBUG,
238 "HS 2.0: Terms and Conditions filtering required for "
239 MACSTR, MAC2STR(sta->addr));
240 sta->hs20_t_c_filtering = 1;
241 /* TODO: Enable firewall filtering for the STA */
242 wpa_msg(hapd->msg_ctx, MSG_INFO, HS20_T_C_FILTERING_ADD MACSTR,
243 MAC2STR(sta->addr));
244 } else {
245 wpa_printf(MSG_DEBUG,
246 "HS 2.0: Terms and Conditions filtering not required for "
247 MACSTR, MAC2STR(sta->addr));
248 sta->hs20_t_c_filtering = 0;
249 /* TODO: Disable firewall filtering for the STA */
250 wpa_msg(hapd->msg_ctx, MSG_INFO,
251 HS20_T_C_FILTERING_REMOVE MACSTR, MAC2STR(sta->addr));
252 }
253}