Allow SCAN command to specify scan_ssid=1 SSIDs
[mech_eap.git] / wpa_supplicant / ctrl_iface.c
index 9f5d4f4..244fd2d 100644 (file)
 #include "blacklist.h"
 #include "autoscan.h"
 #include "wnm_sta.h"
+#include "offchannel.h"
 
 static int wpa_supplicant_global_iface_list(struct wpa_global *global,
                                            char *buf, int len);
 static int wpa_supplicant_global_iface_interfaces(struct wpa_global *global,
                                                  char *buf, int len);
-
-
-static int pno_start(struct wpa_supplicant *wpa_s)
-{
-       int ret, interval;
-       size_t i, num_ssid;
-       struct wpa_ssid *ssid;
-       struct wpa_driver_scan_params params;
-
-       if (wpa_s->pno || wpa_s->pno_sched_pending)
-               return 0;
-
-       if ((wpa_s->wpa_state > WPA_SCANNING) &&
-           (wpa_s->wpa_state <= WPA_COMPLETED)) {
-               wpa_printf(MSG_ERROR, "PNO: In assoc process");
-               return -EAGAIN;
-       }
-
-       if (wpa_s->wpa_state == WPA_SCANNING) {
-               wpa_supplicant_cancel_scan(wpa_s);
-               if (wpa_s->sched_scanning) {
-                       wpa_printf(MSG_DEBUG, "Schedule PNO on completion of "
-                                  "ongoing sched scan");
-                       wpa_supplicant_cancel_sched_scan(wpa_s);
-                       wpa_s->pno_sched_pending = 1;
-                       return 0;
-               }
-       }
-
-       os_memset(&params, 0, sizeof(params));
-
-       num_ssid = 0;
-       ssid = wpa_s->conf->ssid;
-       while (ssid) {
-               if (!wpas_network_disabled(wpa_s, ssid))
-                       num_ssid++;
-               ssid = ssid->next;
-       }
-       if (num_ssid > WPAS_MAX_SCAN_SSIDS) {
-               wpa_printf(MSG_DEBUG, "PNO: Use only the first %u SSIDs from "
-                          "%u", WPAS_MAX_SCAN_SSIDS, (unsigned int) num_ssid);
-               num_ssid = WPAS_MAX_SCAN_SSIDS;
-       }
-
-       if (num_ssid == 0) {
-               wpa_printf(MSG_DEBUG, "PNO: No configured SSIDs");
-               return -1;
-       }
-
-       params.filter_ssids = os_malloc(sizeof(struct wpa_driver_scan_filter) *
-                                       num_ssid);
-       if (params.filter_ssids == NULL)
-               return -1;
-       i = 0;
-       ssid = wpa_s->conf->ssid;
-       while (ssid) {
-               if (!wpas_network_disabled(wpa_s, ssid)) {
-                       params.ssids[i].ssid = ssid->ssid;
-                       params.ssids[i].ssid_len = ssid->ssid_len;
-                       params.num_ssids++;
-                       os_memcpy(params.filter_ssids[i].ssid, ssid->ssid,
-                                 ssid->ssid_len);
-                       params.filter_ssids[i].ssid_len = ssid->ssid_len;
-                       params.num_filter_ssids++;
-                       i++;
-                       if (i == num_ssid)
-                               break;
-               }
-               ssid = ssid->next;
-       }
-
-       if (wpa_s->conf->filter_rssi)
-               params.filter_rssi = wpa_s->conf->filter_rssi;
-
-       interval = wpa_s->conf->sched_scan_interval ?
-               wpa_s->conf->sched_scan_interval : 10;
-
-       ret = wpa_supplicant_start_sched_scan(wpa_s, &params, interval);
-       os_free(params.filter_ssids);
-       if (ret == 0)
-               wpa_s->pno = 1;
-       return ret;
-}
-
-
-static int pno_stop(struct wpa_supplicant *wpa_s)
-{
-       int ret = 0;
-
-       if (wpa_s->pno || wpa_s->sched_scanning) {
-               wpa_s->pno = 0;
-               ret = wpa_supplicant_stop_sched_scan(wpa_s);
-       }
-
-       wpa_s->pno_sched_pending = 0;
-
-       if (wpa_s->wpa_state == WPA_SCANNING)
-               wpa_supplicant_req_scan(wpa_s, 0, 0);
-
-       return ret;
-}
-
+static int * freq_range_to_channel_list(struct wpa_supplicant *wpa_s,
+                                       char *val);
 
 static int set_bssid_filter(struct wpa_supplicant *wpa_s, char *val)
 {
@@ -307,6 +208,72 @@ static int set_disallow_aps(struct wpa_supplicant *wpa_s, char *val)
 }
 
 
+#ifndef CONFIG_NO_CONFIG_BLOBS
+static int wpas_ctrl_set_blob(struct wpa_supplicant *wpa_s, char *pos)
+{
+       char *name = pos;
+       struct wpa_config_blob *blob;
+       size_t len;
+
+       pos = os_strchr(pos, ' ');
+       if (pos == NULL)
+               return -1;
+       *pos++ = '\0';
+       len = os_strlen(pos);
+       if (len & 1)
+               return -1;
+
+       wpa_printf(MSG_DEBUG, "CTRL: Set blob '%s'", name);
+       blob = os_zalloc(sizeof(*blob));
+       if (blob == NULL)
+               return -1;
+       blob->name = os_strdup(name);
+       blob->data = os_malloc(len / 2);
+       if (blob->name == NULL || blob->data == NULL) {
+               wpa_config_free_blob(blob);
+               return -1;
+       }
+
+       if (hexstr2bin(pos, blob->data, len / 2) < 0) {
+               wpa_printf(MSG_DEBUG, "CTRL: Invalid blob hex data");
+               wpa_config_free_blob(blob);
+               return -1;
+       }
+       blob->len = len / 2;
+
+       wpa_config_set_blob(wpa_s->conf, blob);
+
+       return 0;
+}
+#endif /* CONFIG_NO_CONFIG_BLOBS */
+
+
+static int wpas_ctrl_pno(struct wpa_supplicant *wpa_s, char *cmd)
+{
+       char *params;
+       char *pos;
+       int *freqs = NULL;
+       int ret;
+
+       if (atoi(cmd)) {
+               params = os_strchr(cmd, ' ');
+               os_free(wpa_s->manual_sched_scan_freqs);
+               if (params) {
+                       params++;
+                       pos = os_strstr(params, "freq=");
+                       if (pos)
+                               freqs = freq_range_to_channel_list(wpa_s,
+                                                                  pos + 5);
+               }
+               wpa_s->manual_sched_scan_freqs = freqs;
+               ret = wpas_start_pno(wpa_s);
+       } else {
+               ret = wpas_stop_pno(wpa_s);
+       }
+       return ret;
+}
+
+
 static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
                                         char *cmd)
 {
@@ -390,10 +357,7 @@ static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
                wpa_tdls_enable(wpa_s->wpa, !disabled);
 #endif /* CONFIG_TDLS */
        } else if (os_strcasecmp(cmd, "pno") == 0) {
-               if (atoi(value))
-                       ret = pno_start(wpa_s);
-               else
-                       ret = pno_stop(wpa_s);
+               ret = wpas_ctrl_pno(wpa_s, value);
        } else if (os_strcasecmp(cmd, "radio_disabled") == 0) {
                int disabled = atoi(value);
                if (wpa_drv_radio_disable(wpa_s, disabled) < 0)
@@ -452,6 +416,14 @@ static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
                ret = set_disallow_aps(wpa_s, value);
        } else if (os_strcasecmp(cmd, "no_keep_alive") == 0) {
                wpa_s->no_keep_alive = !!atoi(value);
+#ifdef CONFIG_TESTING_OPTIONS
+       } else if (os_strcasecmp(cmd, "ext_mgmt_frame_handling") == 0) {
+               wpa_s->ext_mgmt_frame_handling = !!atoi(value);
+#endif /* CONFIG_TESTING_OPTIONS */
+#ifndef CONFIG_NO_CONFIG_BLOBS
+       } else if (os_strcmp(cmd, "blob") == 0) {
+               ret = wpas_ctrl_set_blob(wpa_s, value);
+#endif /* CONFIG_NO_CONFIG_BLOBS */
        } else {
                value[-1] = '=';
                ret = wpa_config_process_global(wpa_s->conf, cmd, -1);
@@ -612,6 +584,13 @@ static int wpa_supplicant_ctrl_iface_tdls_teardown(
        u8 peer[ETH_ALEN];
        int ret;
 
+       if (os_strcmp(addr, "*") == 0) {
+               /* remove everyone */
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE TDLS_TEARDOWN *");
+               wpa_tdls_teardown_peers(wpa_s->wpa);
+               return 0;
+       }
+
        if (hwaddr_aton(addr, peer)) {
                wpa_printf(MSG_DEBUG, "CTRL_IFACE TDLS_TEARDOWN: invalid "
                           "address '%s'", addr);
@@ -635,6 +614,22 @@ static int wpa_supplicant_ctrl_iface_tdls_teardown(
        return ret;
 }
 
+
+static int ctrl_iface_get_capability_tdls(
+       struct wpa_supplicant *wpa_s, char *buf, size_t buflen)
+{
+       int ret;
+
+       ret = os_snprintf(buf, buflen, "%s\n",
+                         wpa_s->drv_flags & WPA_DRIVER_FLAGS_TDLS_SUPPORT ?
+                         (wpa_s->drv_flags &
+                          WPA_DRIVER_FLAGS_TDLS_EXTERNAL_SETUP ?
+                          "EXTERNAL" : "INTERNAL") : "UNSUPPORTED");
+       if (ret < 0 || (size_t) ret > buflen)
+               return -1;
+       return ret;
+}
+
 #endif /* CONFIG_TDLS */
 
 
@@ -1106,33 +1101,6 @@ static int wpas_ctrl_nfc_get_handover_sel(struct wpa_supplicant *wpa_s,
 }
 
 
-static int wpas_ctrl_nfc_rx_handover_sel(struct wpa_supplicant *wpa_s,
-                                        char *cmd)
-{
-       size_t len;
-       struct wpabuf *buf;
-       int ret;
-
-       len = os_strlen(cmd);
-       if (len & 0x01)
-               return -1;
-       len /= 2;
-
-       buf = wpabuf_alloc(len);
-       if (buf == NULL)
-               return -1;
-       if (hexstr2bin(cmd, wpabuf_put(buf, len), len) < 0) {
-               wpabuf_free(buf);
-               return -1;
-       }
-
-       ret = wpas_wps_nfc_rx_handover_sel(wpa_s, buf);
-       wpabuf_free(buf);
-
-       return ret;
-}
-
-
 static int wpas_ctrl_nfc_report_handover(struct wpa_supplicant *wpa_s,
                                         char *cmd)
 {
@@ -1900,10 +1868,10 @@ static int wpa_supplicant_ctrl_iface_blacklist(struct wpa_supplicant *wpa_s,
         * skipped when processing scan results.
         */
        ret = wpa_blacklist_add(wpa_s, bssid);
-       if (ret != 0)
+       if (ret < 0)
                return -1;
        ret = wpa_blacklist_add(wpa_s, bssid);
-       if (ret != 0)
+       if (ret < 0)
                return -1;
        os_memcpy(buf, "OK\n", 3);
        return 3;
@@ -2074,7 +2042,8 @@ static char * wpa_supplicant_ie_txt(char *pos, char *end, const char *proto,
                                    const u8 *ie, size_t ie_len)
 {
        struct wpa_ie_data data;
-       int first, ret;
+       char *start;
+       int ret;
 
        ret = os_snprintf(pos, end - pos, "[%s-", proto);
        if (ret < 0 || ret >= end - pos)
@@ -2089,62 +2058,58 @@ static char * wpa_supplicant_ie_txt(char *pos, char *end, const char *proto,
                return pos;
        }
 
-       first = 1;
+       start = pos;
        if (data.key_mgmt & WPA_KEY_MGMT_IEEE8021X) {
-               ret = os_snprintf(pos, end - pos, "%sEAP", first ? "" : "+");
+               ret = os_snprintf(pos, end - pos, "%sEAP",
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
        if (data.key_mgmt & WPA_KEY_MGMT_PSK) {
-               ret = os_snprintf(pos, end - pos, "%sPSK", first ? "" : "+");
+               ret = os_snprintf(pos, end - pos, "%sPSK",
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
        if (data.key_mgmt & WPA_KEY_MGMT_WPA_NONE) {
-               ret = os_snprintf(pos, end - pos, "%sNone", first ? "" : "+");
+               ret = os_snprintf(pos, end - pos, "%sNone",
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
 #ifdef CONFIG_IEEE80211R
        if (data.key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X) {
                ret = os_snprintf(pos, end - pos, "%sFT/EAP",
-                                 first ? "" : "+");
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
        if (data.key_mgmt & WPA_KEY_MGMT_FT_PSK) {
                ret = os_snprintf(pos, end - pos, "%sFT/PSK",
-                                 first ? "" : "+");
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
 #endif /* CONFIG_IEEE80211R */
 #ifdef CONFIG_IEEE80211W
        if (data.key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256) {
                ret = os_snprintf(pos, end - pos, "%sEAP-SHA256",
-                                 first ? "" : "+");
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
        if (data.key_mgmt & WPA_KEY_MGMT_PSK_SHA256) {
                ret = os_snprintf(pos, end - pos, "%sPSK-SHA256",
-                                 first ? "" : "+");
+                                 pos == start ? "" : "+");
                if (ret < 0 || ret >= end - pos)
                        return pos;
                pos += ret;
-               first = 0;
        }
 #endif /* CONFIG_IEEE80211W */
 
@@ -2178,10 +2143,8 @@ static char * wpa_supplicant_wps_ie_txt_buf(struct wpa_supplicant *wpa_s,
                return pos;
        if (wps_is_selected_pbc_registrar(wps_ie))
                txt = "[WPS-PBC]";
-#ifdef CONFIG_WPS2
        else if (wps_is_addr_authorized(wps_ie, wpa_s->own_addr, 0))
                txt = "[WPS-AUTH]";
-#endif /* CONFIG_WPS2 */
        else if (wps_is_selected_pin_registrar(wps_ie))
                txt = "[WPS-PIN]";
        else
@@ -2248,17 +2211,43 @@ static int wpa_supplicant_ctrl_iface_scan_result(
                        return -1;
                pos += ret;
        }
-       if (bss->caps & IEEE80211_CAP_IBSS) {
-               ret = os_snprintf(pos, end - pos, "[IBSS]");
+       if (bss_is_dmg(bss)) {
+               const char *s;
+               ret = os_snprintf(pos, end - pos, "[DMG]");
                if (ret < 0 || ret >= end - pos)
                        return -1;
                pos += ret;
-       }
-       if (bss->caps & IEEE80211_CAP_ESS) {
-               ret = os_snprintf(pos, end - pos, "[ESS]");
+               switch (bss->caps & IEEE80211_CAP_DMG_MASK) {
+               case IEEE80211_CAP_DMG_IBSS:
+                       s = "[IBSS]";
+                       break;
+               case IEEE80211_CAP_DMG_AP:
+                       s = "[ESS]";
+                       break;
+               case IEEE80211_CAP_DMG_PBSS:
+                       s = "[PBSS]";
+                       break;
+               default:
+                       s = "";
+                       break;
+               }
+               ret = os_snprintf(pos, end - pos, "%s", s);
                if (ret < 0 || ret >= end - pos)
                        return -1;
                pos += ret;
+       } else {
+               if (bss->caps & IEEE80211_CAP_IBSS) {
+                       ret = os_snprintf(pos, end - pos, "[IBSS]");
+                       if (ret < 0 || ret >= end - pos)
+                               return -1;
+                       pos += ret;
+               }
+               if (bss->caps & IEEE80211_CAP_ESS) {
+                       ret = os_snprintf(pos, end - pos, "[ESS]");
+                       if (ret < 0 || ret >= end - pos)
+                               return -1;
+                       pos += ret;
+               }
        }
        if (p2p) {
                ret = os_snprintf(pos, end - pos, "[P2P]");
@@ -2322,9 +2311,10 @@ static int wpa_supplicant_ctrl_iface_select_network(
 {
        int id;
        struct wpa_ssid *ssid;
+       char *pos;
 
        /* cmd: "<network id>" or "any" */
-       if (os_strcmp(cmd, "any") == 0) {
+       if (os_strncmp(cmd, "any", 3) == 0) {
                wpa_printf(MSG_DEBUG, "CTRL_IFACE: SELECT_NETWORK any");
                ssid = NULL;
        } else {
@@ -2344,6 +2334,16 @@ static int wpa_supplicant_ctrl_iface_select_network(
                }
        }
 
+       pos = os_strstr(cmd, " freq=");
+       if (pos) {
+               int *freqs = freq_range_to_channel_list(wpa_s, pos + 6);
+               if (freqs) {
+                       wpa_s->scan_req = MANUAL_SCAN_REQ;
+                       os_free(wpa_s->manual_scan_freqs);
+                       wpa_s->manual_scan_freqs = freqs;
+               }
+       }
+
        wpa_supplicant_select_network(wpa_s, ssid);
 
        return 0;
@@ -2528,6 +2528,39 @@ static int wpa_supplicant_ctrl_iface_remove_network(
 }
 
 
+static int wpa_supplicant_ctrl_iface_update_network(
+       struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
+       char *name, char *value)
+{
+       if (wpa_config_set(ssid, name, value, 0) < 0) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Failed to set network "
+                          "variable '%s'", name);
+               return -1;
+       }
+
+       if (os_strcmp(name, "bssid") != 0 &&
+           os_strcmp(name, "priority") != 0)
+               wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
+
+       if (wpa_s->current_ssid == ssid || wpa_s->current_ssid == NULL) {
+               /*
+                * Invalidate the EAP session cache if anything in the current
+                * or previously used configuration changes.
+                */
+               eapol_sm_invalidate_cached_session(wpa_s->eapol);
+       }
+
+       if ((os_strcmp(name, "psk") == 0 &&
+            value[0] == '"' && ssid->ssid_len) ||
+           (os_strcmp(name, "ssid") == 0 && ssid->passphrase))
+               wpa_config_update_psk(ssid);
+       else if (os_strcmp(name, "priority") == 0)
+               wpa_config_update_prio_list(wpa_s->conf);
+
+       return 0;
+}
+
+
 static int wpa_supplicant_ctrl_iface_set_network(
        struct wpa_supplicant *wpa_s, char *cmd)
 {
@@ -2559,32 +2592,8 @@ static int wpa_supplicant_ctrl_iface_set_network(
                return -1;
        }
 
-       if (wpa_config_set(ssid, name, value, 0) < 0) {
-               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Failed to set network "
-                          "variable '%s'", name);
-               return -1;
-       }
-
-       if (os_strcmp(name, "bssid") != 0 &&
-           os_strcmp(name, "priority") != 0)
-               wpa_sm_pmksa_cache_flush(wpa_s->wpa, ssid);
-
-       if (wpa_s->current_ssid == ssid || wpa_s->current_ssid == NULL) {
-               /*
-                * Invalidate the EAP session cache if anything in the current
-                * or previously used configuration changes.
-                */
-               eapol_sm_invalidate_cached_session(wpa_s->eapol);
-       }
-
-       if ((os_strcmp(name, "psk") == 0 &&
-            value[0] == '"' && ssid->ssid_len) ||
-           (os_strcmp(name, "ssid") == 0 && ssid->passphrase))
-               wpa_config_update_psk(ssid);
-       else if (os_strcmp(name, "priority") == 0)
-               wpa_config_update_prio_list(wpa_s->conf);
-
-       return 0;
+       return wpa_supplicant_ctrl_iface_update_network(wpa_s, ssid, name,
+                                                       value);
 }
 
 
@@ -2632,6 +2641,59 @@ static int wpa_supplicant_ctrl_iface_get_network(
 }
 
 
+static int wpa_supplicant_ctrl_iface_dup_network(
+       struct wpa_supplicant *wpa_s, char *cmd)
+{
+       struct wpa_ssid *ssid_s, *ssid_d;
+       char *name, *id, *value;
+       int id_s, id_d, ret;
+
+       /* cmd: "<src network id> <dst network id> <variable name>" */
+       id = os_strchr(cmd, ' ');
+       if (id == NULL)
+               return -1;
+       *id++ = '\0';
+
+       name = os_strchr(id, ' ');
+       if (name == NULL)
+               return -1;
+       *name++ = '\0';
+
+       id_s = atoi(cmd);
+       id_d = atoi(id);
+       wpa_printf(MSG_DEBUG, "CTRL_IFACE: DUP_NETWORK id=%d -> %d name='%s'",
+                  id_s, id_d, name);
+
+       ssid_s = wpa_config_get_network(wpa_s->conf, id_s);
+       if (ssid_s == NULL) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find "
+                          "network id=%d", id_s);
+               return -1;
+       }
+
+       ssid_d = wpa_config_get_network(wpa_s->conf, id_d);
+       if (ssid_d == NULL) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find "
+                          "network id=%d", id_s);
+               return -1;
+       }
+
+       value = wpa_config_get(ssid_s, name);
+       if (value == NULL) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Failed to get network "
+                          "variable '%s'", name);
+               return -1;
+       }
+
+       ret = wpa_supplicant_ctrl_iface_update_network(wpa_s, ssid_d, name,
+                                                      value);
+
+       os_free(value);
+
+       return ret;
+}
+
+
 static int wpa_supplicant_ctrl_iface_list_creds(struct wpa_supplicant *wpa_s,
                                                char *buf, size_t buflen)
 {
@@ -2677,6 +2739,8 @@ static int wpa_supplicant_ctrl_iface_add_cred(struct wpa_supplicant *wpa_s,
        if (cred == NULL)
                return -1;
 
+       wpa_msg(wpa_s, MSG_INFO, CRED_ADDED "%d", cred->id);
+
        ret = os_snprintf(buf, buflen, "%d\n", cred->id);
        if (ret < 0 || (size_t) ret >= buflen)
                return -1;
@@ -2689,12 +2753,21 @@ static int wpas_ctrl_remove_cred(struct wpa_supplicant *wpa_s,
 {
        struct wpa_ssid *ssid;
        char str[20];
+       int id;
 
-       if (cred == NULL || wpa_config_remove_cred(wpa_s->conf, cred->id) < 0) {
+       if (cred == NULL) {
                wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find cred");
                return -1;
        }
 
+       id = cred->id;
+       if (wpa_config_remove_cred(wpa_s->conf, id) < 0) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find cred");
+               return -1;
+       }
+
+       wpa_msg(wpa_s, MSG_INFO, CRED_REMOVED "%d", id);
+
        /* Remove any network entry created based on the removed credential */
        ssid = wpa_s->conf->ssid;
        while (ssid) {
@@ -2811,10 +2884,57 @@ static int wpa_supplicant_ctrl_iface_set_cred(struct wpa_supplicant *wpa_s,
                return -1;
        }
 
+       wpa_msg(wpa_s, MSG_INFO, CRED_MODIFIED "%d %s", cred->id, name);
+
        return 0;
 }
 
 
+static int wpa_supplicant_ctrl_iface_get_cred(struct wpa_supplicant *wpa_s,
+                                             char *cmd, char *buf,
+                                             size_t buflen)
+{
+       int id;
+       size_t res;
+       struct wpa_cred *cred;
+       char *name, *value;
+
+       /* cmd: "<cred id> <variable name>" */
+       name = os_strchr(cmd, ' ');
+       if (name == NULL)
+               return -1;
+       *name++ = '\0';
+
+       id = atoi(cmd);
+       wpa_printf(MSG_DEBUG, "CTRL_IFACE: GET_CRED id=%d name='%s'",
+                  id, name);
+
+       cred = wpa_config_get_cred(wpa_s->conf, id);
+       if (cred == NULL) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Could not find cred id=%d",
+                          id);
+               return -1;
+       }
+
+       value = wpa_config_get_cred_no_key(cred, name);
+       if (value == NULL) {
+               wpa_printf(MSG_DEBUG, "CTRL_IFACE: Failed to get cred variable '%s'",
+                          name);
+               return -1;
+       }
+
+       res = os_strlcpy(buf, value, buflen);
+       if (res >= buflen) {
+               os_free(value);
+               return -1;
+       }
+
+       os_free(value);
+
+       return res;
+}
+
+
 #ifndef CONFIG_NO_CONFIG_WRITE
 static int wpa_supplicant_ctrl_iface_save_config(struct wpa_supplicant *wpa_s)
 {
@@ -2862,7 +2982,7 @@ static int ctrl_iface_get_capability_pairwise(int res, char *strict,
                                              struct wpa_driver_capa *capa,
                                              char *buf, size_t buflen)
 {
-       int ret, first = 1;
+       int ret;
        char *pos, *end;
        size_t len;
        unsigned int i;
@@ -2882,11 +3002,11 @@ static int ctrl_iface_get_capability_pairwise(int res, char *strict,
        for (i = 0; i < ARRAY_SIZE(ciphers); i++) {
                if (!ciphers[i].group_only && capa->enc & ciphers[i].capa) {
                        ret = os_snprintf(pos, end - pos, "%s%s",
-                                         first ? "" : " ", ciphers[i].name);
+                                         pos == buf ? "" : " ",
+                                         ciphers[i].name);
                        if (ret < 0 || ret >= end - pos)
                                return pos - buf;
                        pos += ret;
-                       first = 0;
                }
        }
 
@@ -2898,7 +3018,7 @@ static int ctrl_iface_get_capability_group(int res, char *strict,
                                           struct wpa_driver_capa *capa,
                                           char *buf, size_t buflen)
 {
-       int ret, first = 1;
+       int ret;
        char *pos, *end;
        size_t len;
        unsigned int i;
@@ -2918,11 +3038,11 @@ static int ctrl_iface_get_capability_group(int res, char *strict,
        for (i = 0; i < ARRAY_SIZE(ciphers); i++) {
                if (capa->enc & ciphers[i].capa) {
                        ret = os_snprintf(pos, end - pos, "%s%s",
-                                         first ? "" : " ", ciphers[i].name);
+                                         pos == buf ? "" : " ",
+                                         ciphers[i].name);
                        if (ret < 0 || ret >= end - pos)
                                return pos - buf;
                        pos += ret;
-                       first = 0;
                }
        }
 
@@ -2987,7 +3107,7 @@ static int ctrl_iface_get_capability_proto(int res, char *strict,
                                           struct wpa_driver_capa *capa,
                                           char *buf, size_t buflen)
 {
-       int ret, first = 1;
+       int ret;
        char *pos, *end;
        size_t len;
 
@@ -3005,20 +3125,20 @@ static int ctrl_iface_get_capability_proto(int res, char *strict,
 
        if (capa->key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA2 |
                              WPA_DRIVER_CAPA_KEY_MGMT_WPA2_PSK)) {
-               ret = os_snprintf(pos, end - pos, "%sRSN", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sRSN",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        if (capa->key_mgmt & (WPA_DRIVER_CAPA_KEY_MGMT_WPA |
                              WPA_DRIVER_CAPA_KEY_MGMT_WPA_PSK)) {
-               ret = os_snprintf(pos, end - pos, "%sWPA", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sWPA",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        return pos - buf;
@@ -3029,7 +3149,7 @@ static int ctrl_iface_get_capability_auth_alg(int res, char *strict,
                                              struct wpa_driver_capa *capa,
                                              char *buf, size_t buflen)
 {
-       int ret, first = 1;
+       int ret;
        char *pos, *end;
        size_t len;
 
@@ -3046,28 +3166,27 @@ static int ctrl_iface_get_capability_auth_alg(int res, char *strict,
        }
 
        if (capa->auth & (WPA_DRIVER_AUTH_OPEN)) {
-               ret = os_snprintf(pos, end - pos, "%sOPEN", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sOPEN",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        if (capa->auth & (WPA_DRIVER_AUTH_SHARED)) {
                ret = os_snprintf(pos, end - pos, "%sSHARED",
-                                 first ? "" : " ");
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        if (capa->auth & (WPA_DRIVER_AUTH_LEAP)) {
-               ret = os_snprintf(pos, end - pos, "%sLEAP", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sLEAP",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        return pos - buf;
@@ -3078,7 +3197,7 @@ static int ctrl_iface_get_capability_modes(int res, char *strict,
                                           struct wpa_driver_capa *capa,
                                           char *buf, size_t buflen)
 {
-       int ret, first = 1;
+       int ret;
        char *pos, *end;
        size_t len;
 
@@ -3095,19 +3214,19 @@ static int ctrl_iface_get_capability_modes(int res, char *strict,
        }
 
        if (capa->flags & WPA_DRIVER_FLAGS_IBSS) {
-               ret = os_snprintf(pos, end - pos, "%sIBSS", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sIBSS",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        if (capa->flags & WPA_DRIVER_FLAGS_AP) {
-               ret = os_snprintf(pos, end - pos, "%sAP", first ? "" : " ");
+               ret = os_snprintf(pos, end - pos, "%sAP",
+                                 pos == buf ? "" : " ");
                if (ret < 0 || ret >= end - pos)
                        return pos - buf;
                pos += ret;
-               first = 0;
        }
 
        return pos - buf;
@@ -3281,6 +3400,11 @@ static int wpa_supplicant_ctrl_iface_get_capability(
        if (os_strcmp(field, "freq") == 0)
                return ctrl_iface_get_capability_freq(wpa_s, buf, buflen);
 
+#ifdef CONFIG_TDLS
+       if (os_strcmp(field, "tdls") == 0)
+               return ctrl_iface_get_capability_tdls(wpa_s, buf, buflen);
+#endif /* CONFIG_TDLS */
+
        wpa_printf(MSG_DEBUG, "CTRL_IFACE: Unknown GET_CAPABILITY field '%s'",
                   field);
 
@@ -3453,17 +3577,43 @@ static int print_bss_info(struct wpa_supplicant *wpa_s, struct wpa_bss *bss,
                                return 0;
                        pos += ret;
                }
-               if (bss->caps & IEEE80211_CAP_IBSS) {
-                       ret = os_snprintf(pos, end - pos, "[IBSS]");
+               if (bss_is_dmg(bss)) {
+                       const char *s;
+                       ret = os_snprintf(pos, end - pos, "[DMG]");
                        if (ret < 0 || ret >= end - pos)
                                return 0;
                        pos += ret;
-               }
-               if (bss->caps & IEEE80211_CAP_ESS) {
-                       ret = os_snprintf(pos, end - pos, "[ESS]");
+                       switch (bss->caps & IEEE80211_CAP_DMG_MASK) {
+                       case IEEE80211_CAP_DMG_IBSS:
+                               s = "[IBSS]";
+                               break;
+                       case IEEE80211_CAP_DMG_AP:
+                               s = "[ESS]";
+                               break;
+                       case IEEE80211_CAP_DMG_PBSS:
+                               s = "[PBSS]";
+                               break;
+                       default:
+                               s = "";
+                               break;
+                       }
+                       ret = os_snprintf(pos, end - pos, "%s", s);
                        if (ret < 0 || ret >= end - pos)
                                return 0;
                        pos += ret;
+               } else {
+                       if (bss->caps & IEEE80211_CAP_IBSS) {
+                               ret = os_snprintf(pos, end - pos, "[IBSS]");
+                               if (ret < 0 || ret >= end - pos)
+                                       return 0;
+                               pos += ret;
+                       }
+                       if (bss->caps & IEEE80211_CAP_ESS) {
+                               ret = os_snprintf(pos, end - pos, "[ESS]");
+                               if (ret < 0 || ret >= end - pos)
+                                       return 0;
+                               pos += ret;
+                       }
                }
                if (wpa_bss_get_vendor_ie(bss, P2P_IE_VENDOR_TYPE) ||
                    wpa_bss_get_vendor_ie_beacon(bss, P2P_IE_VENDOR_TYPE)) {
@@ -3763,6 +3913,7 @@ static int wpa_supplicant_ctrl_iface_bss_flush(
 }
 
 
+#ifdef CONFIG_TESTING_OPTIONS
 static void wpa_supplicant_ctrl_iface_drop_sa(struct wpa_supplicant *wpa_s)
 {
        wpa_printf(MSG_DEBUG, "Dropping SA without deauthentication");
@@ -3784,6 +3935,7 @@ static void wpa_supplicant_ctrl_iface_drop_sa(struct wpa_supplicant *wpa_s)
                                   MLME_SETPROTECTION_KEY_TYPE_PAIRWISE);
        wpa_sm_drop_sa(wpa_s->wpa);
 }
+#endif /* CONFIG_TESTING_OPTIONS */
 
 
 static int wpa_supplicant_ctrl_iface_roam(struct wpa_supplicant *wpa_s,
@@ -3840,6 +3992,11 @@ static int p2p_ctrl_find(struct wpa_supplicant *wpa_s, char *cmd)
        char *pos;
        unsigned int search_delay;
 
+       if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) {
+               wpa_dbg(wpa_s, MSG_INFO,
+                       "Reject P2P_FIND since interface is disabled");
+               return -1;
+       }
        if (os_strstr(cmd, "type=social"))
                type = P2P_FIND_ONLY_SOCIAL;
        else if (os_strstr(cmd, "type=progressive"))
@@ -3991,6 +4148,11 @@ static int p2p_ctrl_connect(struct wpa_supplicant *wpa_s, char *cmd,
 static int p2p_ctrl_listen(struct wpa_supplicant *wpa_s, char *cmd)
 {
        unsigned int timeout = atoi(cmd);
+       if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) {
+               wpa_dbg(wpa_s, MSG_INFO,
+                       "Reject P2P_LISTEN since interface is disabled");
+               return -1;
+       }
        return wpas_p2p_listen(wpa_s, timeout);
 }
 
@@ -4605,7 +4767,7 @@ static int p2p_ctrl_set(struct wpa_supplicant *wpa_s, char *cmd)
 
        if (os_strcmp(cmd, "listen_channel") == 0) {
                return p2p_set_listen_channel(wpa_s->global->p2p, 81,
-                                             atoi(param));
+                                             atoi(param), 1);
        }
 
        if (os_strcmp(cmd, "ssid_postfix") == 0) {
@@ -4958,15 +5120,27 @@ static int get_anqp(struct wpa_supplicant *wpa_s, char *dst)
 #define MAX_ANQP_INFO_ID 100
        u16 id[MAX_ANQP_INFO_ID];
        size_t num_id = 0;
+       u32 subtypes = 0;
 
        used = hwaddr_aton2(dst, dst_addr);
        if (used < 0)
                return -1;
        pos = dst + used;
        while (num_id < MAX_ANQP_INFO_ID) {
-               id[num_id] = atoi(pos);
-               if (id[num_id])
-                       num_id++;
+               if (os_strncmp(pos, "hs20:", 5) == 0) {
+#ifdef CONFIG_HS20
+                       int num = atoi(pos + 5);
+                       if (num <= 0 || num > 31)
+                               return -1;
+                       subtypes |= BIT(num);
+#else /* CONFIG_HS20 */
+                       return -1;
+#endif /* CONFIG_HS20 */
+               } else {
+                       id[num_id] = atoi(pos);
+                       if (id[num_id])
+                               num_id++;
+               }
                pos = os_strchr(pos + 1, ',');
                if (pos == NULL)
                        break;
@@ -4976,7 +5150,7 @@ static int get_anqp(struct wpa_supplicant *wpa_s, char *dst)
        if (num_id == 0)
                return -1;
 
-       return anqp_send_req(wpa_s, dst_addr, id, num_id);
+       return anqp_send_req(wpa_s, dst_addr, id, num_id, subtypes);
 }
 
 
@@ -5201,7 +5375,7 @@ static int hs20_get_nai_home_realm_list(struct wpa_supplicant *wpa_s,
        if (len == 0 && cred && cred->realm)
                return hs20_nai_home_realm_list(wpa_s, dst_addr, cred->realm);
 
-       if (len % 1)
+       if (len & 1)
                return -1;
        len /= 2;
        buf = os_malloc(len);
@@ -5464,11 +5638,69 @@ static int wpa_supplicant_driver_cmd(struct wpa_supplicant *wpa_s, char *cmd,
 #endif /* ANDROID */
 
 
+static int wpa_supplicant_vendor_cmd(struct wpa_supplicant *wpa_s, char *cmd,
+                                    char *buf, size_t buflen)
+{
+       int ret;
+       char *pos;
+       u8 *data = NULL;
+       unsigned int vendor_id, subcmd;
+       struct wpabuf *reply;
+       size_t data_len = 0;
+
+       /* cmd: <vendor id> <subcommand id> [<hex formatted data>] */
+       vendor_id = strtoul(cmd, &pos, 16);
+       if (!isblank(*pos))
+               return -EINVAL;
+
+       subcmd = strtoul(pos, &pos, 10);
+
+       if (*pos != '\0') {
+               if (!isblank(*pos++))
+                       return -EINVAL;
+               data_len = os_strlen(pos);
+       }
+
+       if (data_len) {
+               data_len /= 2;
+               data = os_malloc(data_len);
+               if (!data)
+                       return -1;
+
+               if (hexstr2bin(pos, data, data_len)) {
+                       wpa_printf(MSG_DEBUG,
+                                  "Vendor command: wrong parameter format");
+                       os_free(data);
+                       return -EINVAL;
+               }
+       }
+
+       reply = wpabuf_alloc((buflen - 1) / 2);
+       if (!reply) {
+               os_free(data);
+               return -1;
+       }
+
+       ret = wpa_drv_vendor_cmd(wpa_s, vendor_id, subcmd, data, data_len,
+                                reply);
+
+       if (ret == 0)
+               ret = wpa_snprintf_hex(buf, buflen, wpabuf_head_u8(reply),
+                                      wpabuf_len(reply));
+
+       wpabuf_free(reply);
+       os_free(data);
+
+       return ret;
+}
+
+
 static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
 {
        wpa_dbg(wpa_s, MSG_DEBUG, "Flush all wpa_supplicant state");
 
 #ifdef CONFIG_P2P
+       wpas_p2p_cancel(wpa_s);
        wpas_p2p_stop_find(wpa_s);
        p2p_ctrl_flush(wpa_s);
        wpas_p2p_group_remove(wpa_s, "*");
@@ -5477,6 +5709,8 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
        wpa_s->global->p2p_per_sta_psk = 0;
        wpa_s->conf->num_sec_device_types = 0;
        wpa_s->p2p_disable_ip_addr_req = 0;
+       os_free(wpa_s->global->p2p_go_avoid_freq.range);
+       wpa_s->global->p2p_go_avoid_freq.range = NULL;
 #endif /* CONFIG_P2P */
 
 #ifdef CONFIG_WPS_TESTING
@@ -5538,6 +5772,8 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
 #ifdef CONFIG_INTERWORKING
        hs20_cancel_fetch_osu(wpa_s);
 #endif /* CONFIG_INTERWORKING */
+
+       wpa_s->ext_mgmt_frame_handling = 0;
 }
 
 
@@ -5579,8 +5815,8 @@ static void wpas_ctrl_radio_work_timeout(void *eloop_ctx, void *timeout_ctx)
                "Timing out external radio work %u (%s)",
                ework->id, work->type);
        wpa_msg(work->wpa_s, MSG_INFO, EXT_RADIO_WORK_TIMEOUT "%u", ework->id);
-       os_free(ework);
        radio_work_done(work);
+       os_free(ework);
 }
 
 
@@ -5679,8 +5915,8 @@ static int wpas_ctrl_radio_work_done(struct wpa_supplicant *wpa_s, char *cmd)
                        "Completed external radio work %u (%s)",
                        ework->id, ework->type);
                eloop_cancel_timeout(wpas_ctrl_radio_work_timeout, work, NULL);
-               os_free(ework);
                radio_work_done(work);
+               os_free(ework);
                return 3; /* "OK\n" */
        }
 
@@ -5716,14 +5952,14 @@ void wpas_ctrl_radio_work_flush(struct wpa_supplicant *wpa_s)
                        continue;
                ework = work->ctx;
                wpa_dbg(wpa_s, MSG_DEBUG,
-                       "Flushing %sexternal radio work %u (%s)",
+                       "Flushing%s external radio work %u (%s)",
                        work->started ? " started" : "", ework->id,
                        ework->type);
                if (work->started)
                        eloop_cancel_timeout(wpas_ctrl_radio_work_timeout,
                                             work, NULL);
-               os_free(ework);
                radio_work_done(work);
+               os_free(ework);
        }
 }
 
@@ -5750,6 +5986,25 @@ static int set_scan_freqs(struct wpa_supplicant *wpa_s, char *val)
 }
 
 
+static int scan_id_list_parse(struct wpa_supplicant *wpa_s, const char *value)
+{
+       const char *pos = value;
+
+       while (pos) {
+               if (*pos == ' ' || *pos == '\0')
+                       break;
+               if (wpa_s->scan_id_count == MAX_SCAN_ID)
+                       return -1;
+               wpa_s->scan_id[wpa_s->scan_id_count++] = atoi(pos);
+               pos = os_strchr(pos, ',');
+               if (pos)
+                       pos++;
+       }
+
+       return 0;
+}
+
+
 static void wpas_ctrl_scan(struct wpa_supplicant *wpa_s, char *params,
                           char *reply, int reply_size, int *reply_len)
 {
@@ -5763,6 +6018,7 @@ static void wpas_ctrl_scan(struct wpa_supplicant *wpa_s, char *params,
        wpa_s->manual_scan_passive = 0;
        wpa_s->manual_scan_use_id = 0;
        wpa_s->manual_scan_only_new = 0;
+       wpa_s->scan_id_count = 0;
 
        if (params) {
                if (os_strncasecmp(params, "TYPE=ONLY", 9) == 0)
@@ -5785,6 +6041,12 @@ static void wpas_ctrl_scan(struct wpa_supplicant *wpa_s, char *params,
                pos = os_strstr(params, "only_new=1");
                if (pos)
                        wpa_s->manual_scan_only_new = 1;
+
+               pos = os_strstr(params, "scan_id=");
+               if (pos && scan_id_list_parse(wpa_s, pos + 8) < 0) {
+                       *reply_len = -1;
+                       return;
+               }
        } else {
                os_free(wpa_s->manual_scan_freqs);
                wpa_s->manual_scan_freqs = NULL;
@@ -5826,6 +6088,145 @@ static void wpas_ctrl_scan(struct wpa_supplicant *wpa_s, char *params,
 }
 
 
+#ifdef CONFIG_TESTING_OPTIONS
+
+static void wpas_ctrl_iface_mgmt_tx_cb(struct wpa_supplicant *wpa_s,
+                                      unsigned int freq, const u8 *dst,
+                                      const u8 *src, const u8 *bssid,
+                                      const u8 *data, size_t data_len,
+                                      enum offchannel_send_action_result
+                                      result)
+{
+       wpa_msg(wpa_s, MSG_INFO, "MGMT-TX-STATUS freq=%u dst=" MACSTR
+               " src=" MACSTR " bssid=" MACSTR " result=%s",
+               freq, MAC2STR(dst), MAC2STR(src), MAC2STR(bssid),
+               result == OFFCHANNEL_SEND_ACTION_SUCCESS ?
+               "SUCCESS" : (result == OFFCHANNEL_SEND_ACTION_NO_ACK ?
+                            "NO_ACK" : "FAILED"));
+}
+
+
+static int wpas_ctrl_iface_mgmt_tx(struct wpa_supplicant *wpa_s, char *cmd)
+{
+       char *pos, *param;
+       size_t len;
+       u8 *buf, da[ETH_ALEN], bssid[ETH_ALEN];
+       int res, used;
+       int freq = 0, no_cck = 0, wait_time = 0;
+
+       /* <DA> <BSSID> [freq=<MHz>] [wait_time=<ms>] [no_cck=1]
+        *    <action=Action frame payload> */
+
+       wpa_printf(MSG_DEBUG, "External MGMT TX: %s", cmd);
+
+       pos = cmd;
+       used = hwaddr_aton2(pos, da);
+       if (used < 0)
+               return -1;
+       pos += used;
+       while (*pos == ' ')
+               pos++;
+       used = hwaddr_aton2(pos, bssid);
+       if (used < 0)
+               return -1;
+       pos += used;
+
+       param = os_strstr(pos, " freq=");
+       if (param) {
+               param += 6;
+               freq = atoi(param);
+       }
+
+       param = os_strstr(pos, " no_cck=");
+       if (param) {
+               param += 8;
+               no_cck = atoi(param);
+       }
+
+       param = os_strstr(pos, " wait_time=");
+       if (param) {
+               param += 11;
+               wait_time = atoi(param);
+       }
+
+       param = os_strstr(pos, " action=");
+       if (param == NULL)
+               return -1;
+       param += 8;
+
+       len = os_strlen(param);
+       if (len & 1)
+               return -1;
+       len /= 2;
+
+       buf = os_malloc(len);
+       if (buf == NULL)
+               return -1;
+
+       if (hexstr2bin(param, buf, len) < 0) {
+               os_free(buf);
+               return -1;
+       }
+
+       res = offchannel_send_action(wpa_s, freq, da, wpa_s->own_addr, bssid,
+                                    buf, len, wait_time,
+                                    wpas_ctrl_iface_mgmt_tx_cb, no_cck);
+       os_free(buf);
+       return res;
+}
+
+
+static void wpas_ctrl_iface_mgmt_tx_done(struct wpa_supplicant *wpa_s)
+{
+       wpa_printf(MSG_DEBUG, "External MGMT TX - done waiting");
+       offchannel_send_action_done(wpa_s);
+}
+
+
+static int wpas_ctrl_iface_driver_event(struct wpa_supplicant *wpa_s, char *cmd)
+{
+       char *pos, *param;
+       union wpa_event_data event;
+       enum wpa_event_type ev;
+
+       /* <event name> [parameters..] */
+
+       wpa_dbg(wpa_s, MSG_DEBUG, "Testing - external driver event: %s", cmd);
+
+       pos = cmd;
+       param = os_strchr(pos, ' ');
+       if (param)
+               *param++ = '\0';
+
+       os_memset(&event, 0, sizeof(event));
+
+       if (os_strcmp(cmd, "INTERFACE_ENABLED") == 0) {
+               ev = EVENT_INTERFACE_ENABLED;
+       } else if (os_strcmp(cmd, "INTERFACE_DISABLED") == 0) {
+               ev = EVENT_INTERFACE_DISABLED;
+       } else if (os_strcmp(cmd, "AVOID_FREQUENCIES") == 0) {
+               ev = EVENT_AVOID_FREQUENCIES;
+               if (param == NULL)
+                       param = "";
+               if (freq_range_list_parse(&event.freq_range, param) < 0)
+                       return -1;
+               wpa_supplicant_event(wpa_s, ev, &event);
+               os_free(event.freq_range.range);
+               return 0;
+       } else {
+               wpa_dbg(wpa_s, MSG_DEBUG, "Testing - unknown driver event: %s",
+                       cmd);
+               return -1;
+       }
+
+       wpa_supplicant_event(wpa_s, ev, &event);
+
+       return 0;
+}
+
+#endif /* CONFIG_TESTING_OPTIONS */
+
+
 char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
                                         char *buf, size_t *resp_len)
 {
@@ -5845,8 +6246,7 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
                                           os_strlen(WPA_CTRL_RSP)) == 0 ?
                                WPA_CTRL_RSP : "SET_NETWORK");
        } else if (os_strncmp(buf, "WPS_NFC_TAG_READ", 16) == 0 ||
-                  os_strncmp(buf, "NFC_REPORT_HANDOVER", 19) == 0 ||
-                  os_strncmp(buf, "NFC_RX_HANDOVER_SEL", 19) == 0) {
+                  os_strncmp(buf, "NFC_REPORT_HANDOVER", 19) == 0) {
                wpa_hexdump_ascii_key(MSG_DEBUG, "RX ctrl_iface",
                                      (const u8 *) buf, os_strlen(buf));
        } else {
@@ -5908,6 +6308,14 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
                        reply_len = -1;
                else
                        wpas_request_connection(wpa_s);
+       } else if (os_strcmp(buf, "REATTACH") == 0) {
+               if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED ||
+                   !wpa_s->current_ssid)
+                       reply_len = -1;
+               else {
+                       wpa_s->reattach = 1;
+                       wpas_request_connection(wpa_s);
+               }
        } else if (os_strcmp(buf, "RECONNECT") == 0) {
                if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED)
                        reply_len = -1;
@@ -5976,9 +6384,6 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
        } else if (os_strncmp(buf, "NFC_GET_HANDOVER_SEL ", 21) == 0) {
                reply_len = wpas_ctrl_nfc_get_handover_sel(
                        wpa_s, buf + 21, reply, reply_size);
-       } else if (os_strncmp(buf, "NFC_RX_HANDOVER_SEL ", 20) == 0) {
-               if (wpas_ctrl_nfc_rx_handover_sel(wpa_s, buf + 20))
-                       reply_len = -1;
        } else if (os_strncmp(buf, "NFC_REPORT_HANDOVER ", 20) == 0) {
                if (wpas_ctrl_nfc_report_handover(wpa_s, buf + 20))
                        reply_len = -1;
@@ -6246,6 +6651,9 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
        } else if (os_strncmp(buf, "GET_NETWORK ", 12) == 0) {
                reply_len = wpa_supplicant_ctrl_iface_get_network(
                        wpa_s, buf + 12, reply, reply_size);
+       } else if (os_strncmp(buf, "DUP_NETWORK ", 12) == 0) {
+               if (wpa_supplicant_ctrl_iface_dup_network(wpa_s, buf + 12))
+                       reply_len = -1;
        } else if (os_strcmp(buf, "LIST_CREDS") == 0) {
                reply_len = wpa_supplicant_ctrl_iface_list_creds(
                        wpa_s, reply, reply_size);
@@ -6258,6 +6666,10 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
        } else if (os_strncmp(buf, "SET_CRED ", 9) == 0) {
                if (wpa_supplicant_ctrl_iface_set_cred(wpa_s, buf + 9))
                        reply_len = -1;
+       } else if (os_strncmp(buf, "GET_CRED ", 9) == 0) {
+               reply_len = wpa_supplicant_ctrl_iface_get_cred(wpa_s, buf + 9,
+                                                              reply,
+                                                              reply_size);
 #ifndef CONFIG_NO_CONFIG_WRITE
        } else if (os_strcmp(buf, "SAVE_CONFIG") == 0) {
                if (wpa_supplicant_ctrl_iface_save_config(wpa_s))
@@ -6304,8 +6716,10 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
                wpas_notify_suspend(wpa_s->global);
        } else if (os_strcmp(buf, "RESUME") == 0) {
                wpas_notify_resume(wpa_s->global);
+#ifdef CONFIG_TESTING_OPTIONS
        } else if (os_strcmp(buf, "DROP_SA") == 0) {
                wpa_supplicant_ctrl_iface_drop_sa(wpa_s);
+#endif /* CONFIG_TESTING_OPTIONS */
        } else if (os_strncmp(buf, "ROAM ", 5) == 0) {
                if (wpa_supplicant_ctrl_iface_roam(wpa_s, buf + 5))
                        reply_len = -1;
@@ -6349,6 +6763,9 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
                reply_len = wpa_supplicant_driver_cmd(wpa_s, buf + 7, reply,
                                                      reply_size);
 #endif /* ANDROID */
+       } else if (os_strncmp(buf, "VENDOR ", 7) == 0) {
+               reply_len = wpa_supplicant_vendor_cmd(wpa_s, buf + 7, reply,
+                                                     reply_size);
        } else if (os_strcmp(buf, "REAUTHENTICATE") == 0) {
                pmksa_cache_clear_current(wpa_s->wpa);
                eapol_sm_request_reauth(wpa_s->eapol);
@@ -6365,6 +6782,16 @@ char * wpa_supplicant_ctrl_iface_process(struct wpa_supplicant *wpa_s,
        } else if (os_strncmp(buf, "RADIO_WORK ", 11) == 0) {
                reply_len = wpas_ctrl_radio_work(wpa_s, buf + 11, reply,
                                                 reply_size);
+#ifdef CONFIG_TESTING_OPTIONS
+       } else if (os_strncmp(buf, "MGMT_TX ", 8) == 0) {
+               if (wpas_ctrl_iface_mgmt_tx(wpa_s, buf + 8) < 0)
+                       reply_len = -1;
+       } else if (os_strcmp(buf, "MGMT_TX_DONE") == 0) {
+               wpas_ctrl_iface_mgmt_tx_done(wpa_s);
+       } else if (os_strncmp(buf, "DRIVER_EVENT ", 13) == 0) {
+               if (wpas_ctrl_iface_driver_event(wpa_s, buf + 13) < 0)
+                       reply_len = -1;
+#endif /* CONFIG_TESTING_OPTIONS */
        } else {
                os_memcpy(reply, "UNKNOWN COMMAND\n", 16);
                reply_len = 16;
@@ -6582,7 +7009,6 @@ static char * wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global,
 #ifdef CONFIG_P2P
        static const char * cmd[] = {
                "LIST_NETWORKS",
-               "SAVE_CONFIG",
                "P2P_FIND",
                "P2P_STOP_FIND",
                "P2P_LISTEN",
@@ -6602,7 +7028,6 @@ static char * wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global,
 #endif /* ANDROID */
                "GET_NETWORK ",
                "REMOVE_NETWORK ",
-               "SET ",
                "P2P_FIND ",
                "P2P_CONNECT ",
                "P2P_LISTEN ",
@@ -6623,6 +7048,9 @@ static char * wpas_global_ctrl_iface_redir_p2p(struct wpa_global *global,
                "P2P_PRESENCE_REQ ",
                "P2P_EXT_LISTEN ",
                "P2P_REMOVE_CLIENT ",
+               "NFC_GET_HANDOVER_SEL ",
+               "NFC_GET_HANDOVER_REQ ",
+               "NFC_REPORT_HANDOVER ",
                NULL
        };
        int found = 0;
@@ -6699,6 +7127,9 @@ static int wpas_global_ctrl_iface_set(struct wpa_global *global, char *cmd)
        }
 #endif /* CONFIG_WIFI_DISPLAY */
 
+       /* Restore cmd to its original value to allow redirection */
+       value[-1] = ' ';
+
        return -1;
 }
 
@@ -6706,7 +7137,7 @@ static int wpas_global_ctrl_iface_set(struct wpa_global *global, char *cmd)
 #ifndef CONFIG_NO_CONFIG_WRITE
 static int wpas_global_ctrl_iface_save_config(struct wpa_global *global)
 {
-       int ret = 0;
+       int ret = 0, saved = 0;
        struct wpa_supplicant *wpa_s;
 
        for (wpa_s = global->ifaces; wpa_s; wpa_s = wpa_s->next) {
@@ -6720,9 +7151,16 @@ static int wpas_global_ctrl_iface_save_config(struct wpa_global *global)
                        ret = 1;
                } else {
                        wpa_dbg(wpa_s, MSG_DEBUG, "CTRL_IFACE: SAVE_CONFIG - Configuration updated");
+                       saved++;
                }
        }
 
+       if (!saved && !ret) {
+               wpa_dbg(wpa_s, MSG_DEBUG,
+                       "CTRL_IFACE: SAVE_CONFIG - No configuration files could be updated");
+               ret = 1;
+       }
+
        return ret;
 }
 #endif /* CONFIG_NO_CONFIG_WRITE */
@@ -6835,8 +7273,19 @@ char * wpa_supplicant_global_ctrl_iface_process(struct wpa_global *global,
        } else if (os_strcmp(buf, "RESUME") == 0) {
                wpas_notify_resume(global);
        } else if (os_strncmp(buf, "SET ", 4) == 0) {
-               if (wpas_global_ctrl_iface_set(global, buf + 4))
+               if (wpas_global_ctrl_iface_set(global, buf + 4)) {
+#ifdef CONFIG_P2P
+                       if (global->p2p_init_wpa_s) {
+                               os_free(reply);
+                               /* Check if P2P redirection would work for this
+                                * command. */
+                               return wpa_supplicant_ctrl_iface_process(
+                                       global->p2p_init_wpa_s,
+                                       buf, resp_len);
+                       }
+#endif /* CONFIG_P2P */
                        reply_len = -1;
+               }
 #ifndef CONFIG_NO_CONFIG_WRITE
        } else if (os_strcmp(buf, "SAVE_CONFIG") == 0) {
                if (wpas_global_ctrl_iface_save_config(global))