2 * WPA Supplicant - Scanning
3 * Copyright (c) 2003-2010, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
12 * See README and COPYING for more details.
15 #include "utils/includes.h"
17 #include "utils/common.h"
18 #include "utils/eloop.h"
19 #include "common/ieee802_11_defs.h"
21 #include "wpa_supplicant_i.h"
24 #include "wps_supplicant.h"
25 #include "p2p_supplicant.h"
32 static void wpa_supplicant_gen_assoc_event(struct wpa_supplicant *wpa_s)
34 struct wpa_ssid *ssid;
35 union wpa_event_data data;
37 ssid = wpa_supplicant_get_ssid(wpa_s);
41 if (wpa_s->current_ssid == NULL) {
42 wpa_s->current_ssid = ssid;
43 if (wpa_s->current_ssid != NULL)
44 wpas_notify_network_changed(wpa_s);
46 wpa_supplicant_initiate_eapol(wpa_s);
47 wpa_dbg(wpa_s, MSG_DEBUG, "Already associated with a configured "
48 "network - generating associated event");
49 os_memset(&data, 0, sizeof(data));
50 wpa_supplicant_event(wpa_s, EVENT_ASSOC, &data);
55 static int wpas_wps_in_use(struct wpa_supplicant *wpa_s,
56 enum wps_request_type *req_type)
58 struct wpa_ssid *ssid;
61 for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
62 if (!(ssid->key_mgmt & WPA_KEY_MGMT_WPS))
66 *req_type = wpas_wps_get_req_type(ssid);
67 if (!ssid->eap.phase1)
70 if (os_strstr(ssid->eap.phase1, "pbc=1"))
75 wpa_s->wps->dev.p2p = 1;
78 *req_type = WPS_REQ_ENROLLEE_INFO;
80 #endif /* CONFIG_P2P */
84 #endif /* CONFIG_WPS */
87 int wpa_supplicant_enabled_networks(struct wpa_config *conf)
89 struct wpa_ssid *ssid = conf->ssid;
100 static void wpa_supplicant_assoc_try(struct wpa_supplicant *wpa_s,
101 struct wpa_ssid *ssid)
109 /* ap_scan=2 mode - try to associate with each SSID. */
111 wpa_dbg(wpa_s, MSG_DEBUG, "wpa_supplicant_assoc_try: Reached "
112 "end of scan list - go back to beginning");
113 wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
114 wpa_supplicant_req_scan(wpa_s, 0, 0);
118 /* Continue from the next SSID on the next attempt. */
119 wpa_s->prev_scan_ssid = ssid;
121 /* Start from the beginning of the SSID list. */
122 wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
124 wpa_supplicant_associate(wpa_s, NULL, ssid);
128 static int int_array_len(const int *a)
131 for (i = 0; a && a[i]; i++)
137 static void int_array_concat(int **res, const int *a)
142 reslen = int_array_len(*res);
143 alen = int_array_len(a);
145 n = os_realloc(*res, (reslen + alen + 1) * sizeof(int));
151 for (i = 0; i <= alen; i++)
152 n[reslen + i] = a[i];
157 static int freq_cmp(const void *a, const void *b)
170 static void int_array_sort_unique(int *a)
178 alen = int_array_len(a);
179 qsort(a, alen, sizeof(int), freq_cmp);
183 while (a[i] && a[j]) {
196 int wpa_supplicant_trigger_scan(struct wpa_supplicant *wpa_s,
197 struct wpa_driver_scan_params *params)
201 wpa_supplicant_notify_scanning(wpa_s, 1);
203 if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
204 ret = ieee80211_sta_req_scan(wpa_s, params);
206 ret = wpa_drv_scan(wpa_s, params);
209 wpa_supplicant_notify_scanning(wpa_s, 0);
210 wpas_notify_scan_done(wpa_s, 0);
219 wpa_supplicant_delayed_sched_scan_timeout(void *eloop_ctx, void *timeout_ctx)
221 struct wpa_supplicant *wpa_s = eloop_ctx;
223 wpa_dbg(wpa_s, MSG_DEBUG, "Starting delayed sched scan");
225 if (wpa_supplicant_req_sched_scan(wpa_s))
226 wpa_supplicant_req_scan(wpa_s, 0, 0);
231 wpa_supplicant_sched_scan_timeout(void *eloop_ctx, void *timeout_ctx)
233 struct wpa_supplicant *wpa_s = eloop_ctx;
235 wpa_dbg(wpa_s, MSG_DEBUG, "Sched scan timeout - stopping it");
237 wpa_s->sched_scan_timed_out = 1;
238 wpa_supplicant_cancel_sched_scan(wpa_s);
243 wpa_supplicant_start_sched_scan(struct wpa_supplicant *wpa_s,
244 struct wpa_driver_scan_params *params,
249 if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
252 wpa_supplicant_notify_scanning(wpa_s, 1);
253 ret = wpa_drv_sched_scan(wpa_s, params, interval * 1000);
255 wpa_supplicant_notify_scanning(wpa_s, 0);
257 wpa_s->sched_scanning = 1;
263 static int wpa_supplicant_stop_sched_scan(struct wpa_supplicant *wpa_s)
267 ret = wpa_drv_stop_sched_scan(wpa_s);
269 wpa_dbg(wpa_s, MSG_DEBUG, "stopping sched_scan failed!");
270 /* TODO: what to do if stopping fails? */
278 static struct wpa_driver_scan_filter *
279 wpa_supplicant_build_filter_ssids(struct wpa_config *conf, size_t *num_ssids)
281 struct wpa_driver_scan_filter *ssids;
282 struct wpa_ssid *ssid;
286 if (!conf->filter_ssids)
289 for (count = 0, ssid = conf->ssid; ssid; ssid = ssid->next) {
290 if (ssid->ssid && ssid->ssid_len)
295 ssids = os_zalloc(count * sizeof(struct wpa_driver_scan_filter));
299 for (ssid = conf->ssid; ssid; ssid = ssid->next) {
300 if (!ssid->ssid || !ssid->ssid_len)
302 os_memcpy(ssids[*num_ssids].ssid, ssid->ssid, ssid->ssid_len);
303 ssids[*num_ssids].ssid_len = ssid->ssid_len;
311 static void wpa_supplicant_optimize_freqs(
312 struct wpa_supplicant *wpa_s, struct wpa_driver_scan_params *params)
315 if (params->freqs == NULL && wpa_s->p2p_in_provisioning &&
317 /* Optimize provisioning state scan based on GO information */
318 if (wpa_s->p2p_in_provisioning < 5 &&
319 wpa_s->go_params->freq > 0) {
320 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only GO "
321 "preferred frequency %d MHz",
322 wpa_s->go_params->freq);
323 params->freqs = os_zalloc(2 * sizeof(int));
325 params->freqs[0] = wpa_s->go_params->freq;
326 } else if (wpa_s->p2p_in_provisioning < 8 &&
327 wpa_s->go_params->freq_list[0]) {
328 wpa_dbg(wpa_s, MSG_DEBUG, "P2P: Scan only common "
330 int_array_concat(¶ms->freqs,
331 wpa_s->go_params->freq_list);
333 int_array_sort_unique(params->freqs);
335 wpa_s->p2p_in_provisioning++;
337 #endif /* CONFIG_P2P */
340 if (params->freqs == NULL && wpa_s->after_wps && wpa_s->wps_freq) {
342 * Optimize post-provisioning scan based on channel used
343 * during provisioning.
345 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Scan only frequency %u MHz "
346 "that was used during provisioning", wpa_s->wps_freq);
347 params->freqs = os_zalloc(2 * sizeof(int));
349 params->freqs[0] = wpa_s->wps_freq;
353 #endif /* CONFIG_WPS */
357 static struct wpabuf *
358 wpa_supplicant_extra_ies(struct wpa_supplicant *wpa_s,
359 struct wpa_driver_scan_params *params)
361 struct wpabuf *wps_ie = NULL;
364 enum wps_request_type req_type = WPS_REQ_ENROLLEE_INFO;
366 wps = wpas_wps_in_use(wpa_s, &req_type);
369 wps_ie = wps_build_probe_req_ie(wps == 2, &wpa_s->wps->dev,
370 wpa_s->wps->uuid, req_type,
373 params->extra_ies = wpabuf_head(wps_ie);
374 params->extra_ies_len = wpabuf_len(wps_ie);
380 size_t ielen = p2p_scan_ie_buf_len(wpa_s->global->p2p);
381 if (wpabuf_resize(&wps_ie, ielen) == 0) {
382 wpas_p2p_scan_ie(wpa_s, wps_ie);
383 params->extra_ies = wpabuf_head(wps_ie);
384 params->extra_ies_len = wpabuf_len(wps_ie);
387 #endif /* CONFIG_P2P */
389 #endif /* CONFIG_WPS */
395 static void wpa_supplicant_scan(void *eloop_ctx, void *timeout_ctx)
397 struct wpa_supplicant *wpa_s = eloop_ctx;
398 struct wpa_ssid *ssid;
399 int scan_req = 0, ret;
400 struct wpabuf *wps_ie;
401 struct wpa_driver_scan_params params;
403 enum wpa_states prev_state;
405 if (wpa_s->wpa_state == WPA_INTERFACE_DISABLED) {
406 wpa_dbg(wpa_s, MSG_DEBUG, "Skip scan - interface disabled");
410 if (wpa_s->disconnected && !wpa_s->scan_req) {
411 wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
415 if (!wpa_supplicant_enabled_networks(wpa_s->conf) &&
417 wpa_dbg(wpa_s, MSG_DEBUG, "No enabled networks - do not scan");
418 wpa_supplicant_set_state(wpa_s, WPA_INACTIVE);
422 if (wpa_s->conf->ap_scan != 0 &&
423 (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED)) {
424 wpa_dbg(wpa_s, MSG_DEBUG, "Using wired authentication - "
425 "overriding ap_scan configuration");
426 wpa_s->conf->ap_scan = 0;
427 wpas_notify_ap_scan_changed(wpa_s);
430 if (wpa_s->conf->ap_scan == 0) {
431 wpa_supplicant_gen_assoc_event(wpa_s);
436 if (wpas_p2p_in_progress(wpa_s)) {
437 if (wpa_s->wpa_state == WPA_SCANNING) {
438 wpa_dbg(wpa_s, MSG_DEBUG, "Delay station mode scan "
439 "while P2P operation is in progress");
440 wpa_supplicant_req_scan(wpa_s, 5, 0);
442 wpa_dbg(wpa_s, MSG_DEBUG, "Do not request scan while "
443 "P2P operation is in progress");
447 #endif /* CONFIG_P2P */
449 if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME) ||
450 wpa_s->conf->ap_scan == 2)
453 max_ssids = wpa_s->max_scan_ssids;
454 if (max_ssids > WPAS_MAX_SCAN_SSIDS)
455 max_ssids = WPAS_MAX_SCAN_SSIDS;
458 scan_req = wpa_s->scan_req;
461 os_memset(¶ms, 0, sizeof(params));
463 prev_state = wpa_s->wpa_state;
464 if (wpa_s->wpa_state == WPA_DISCONNECTED ||
465 wpa_s->wpa_state == WPA_INACTIVE)
466 wpa_supplicant_set_state(wpa_s, WPA_SCANNING);
468 if (scan_req != 2 && wpa_s->connect_without_scan) {
469 for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) {
470 if (ssid == wpa_s->connect_without_scan)
473 wpa_s->connect_without_scan = NULL;
475 wpa_printf(MSG_DEBUG, "Start a pre-selected network "
476 "without scan step");
477 wpa_supplicant_associate(wpa_s, NULL, ssid);
482 /* Find the starting point from which to continue scanning */
483 ssid = wpa_s->conf->ssid;
484 if (wpa_s->prev_scan_ssid != WILDCARD_SSID_SCAN) {
486 if (ssid == wpa_s->prev_scan_ssid) {
494 if (scan_req != 2 && wpa_s->conf->ap_scan == 2) {
495 wpa_s->connect_without_scan = NULL;
496 wpa_supplicant_assoc_try(wpa_s, ssid);
498 } else if (wpa_s->conf->ap_scan == 2) {
500 * User-initiated scan request in ap_scan == 2; scan with
505 struct wpa_ssid *start = ssid, *tssid;
507 if (ssid == NULL && max_ssids > 1)
508 ssid = wpa_s->conf->ssid;
510 if (!ssid->disabled && ssid->scan_ssid) {
511 wpa_hexdump_ascii(MSG_DEBUG, "Scan SSID",
512 ssid->ssid, ssid->ssid_len);
513 params.ssids[params.num_ssids].ssid =
515 params.ssids[params.num_ssids].ssid_len =
518 if (params.num_ssids + 1 >= max_ssids)
524 if (ssid == NULL && max_ssids > 1 &&
525 start != wpa_s->conf->ssid)
526 ssid = wpa_s->conf->ssid;
529 for (tssid = wpa_s->conf->ssid; tssid; tssid = tssid->next) {
532 if ((params.freqs || !freqs_set) && tssid->scan_freq) {
533 int_array_concat(¶ms.freqs,
536 os_free(params.freqs);
541 int_array_sort_unique(params.freqs);
545 wpa_s->prev_scan_ssid = ssid;
547 wpa_dbg(wpa_s, MSG_DEBUG, "Include wildcard SSID in "
551 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for specific "
554 wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
556 wpa_dbg(wpa_s, MSG_DEBUG, "Starting AP scan for wildcard "
560 wpa_supplicant_optimize_freqs(wpa_s, ¶ms);
561 wps_ie = wpa_supplicant_extra_ies(wpa_s, ¶ms);
563 if (params.freqs == NULL && wpa_s->next_scan_freqs) {
564 wpa_dbg(wpa_s, MSG_DEBUG, "Optimize scan based on previously "
565 "generated frequency list");
566 params.freqs = wpa_s->next_scan_freqs;
568 os_free(wpa_s->next_scan_freqs);
569 wpa_s->next_scan_freqs = NULL;
571 params.filter_ssids = wpa_supplicant_build_filter_ssids(
572 wpa_s->conf, ¶ms.num_filter_ssids);
574 ret = wpa_supplicant_trigger_scan(wpa_s, ¶ms);
577 os_free(params.freqs);
578 os_free(params.filter_ssids);
581 wpa_msg(wpa_s, MSG_WARNING, "Failed to initiate AP scan");
582 if (prev_state != wpa_s->wpa_state)
583 wpa_supplicant_set_state(wpa_s, prev_state);
584 wpa_supplicant_req_scan(wpa_s, 1, 0);
590 * wpa_supplicant_req_scan - Schedule a scan for neighboring access points
591 * @wpa_s: Pointer to wpa_supplicant data
592 * @sec: Number of seconds after which to scan
593 * @usec: Number of microseconds after which to scan
595 * This function is used to schedule a scan for neighboring access points after
596 * the specified time.
598 void wpa_supplicant_req_scan(struct wpa_supplicant *wpa_s, int sec, int usec)
600 /* If there's at least one network that should be specifically scanned
601 * then don't cancel the scan and reschedule. Some drivers do
602 * background scanning which generates frequent scan results, and that
603 * causes the specific SSID scan to get continually pushed back and
604 * never happen, which causes hidden APs to never get probe-scanned.
606 if (eloop_is_timeout_registered(wpa_supplicant_scan, wpa_s, NULL) &&
607 wpa_s->conf->ap_scan == 1) {
608 struct wpa_ssid *ssid = wpa_s->conf->ssid;
611 if (!ssid->disabled && ssid->scan_ssid)
616 wpa_dbg(wpa_s, MSG_DEBUG, "Not rescheduling scan to "
617 "ensure that specific SSID scans occur");
622 wpa_dbg(wpa_s, MSG_DEBUG, "Setting scan request: %d sec %d usec",
624 eloop_cancel_timeout(wpa_supplicant_scan, wpa_s, NULL);
625 eloop_register_timeout(sec, usec, wpa_supplicant_scan, wpa_s, NULL);
630 * wpa_supplicant_delayed_sched_scan - Request a delayed scheduled scan
631 * @wpa_s: Pointer to wpa_supplicant data
632 * @sec: Number of seconds after which to scan
633 * @usec: Number of microseconds after which to scan
635 * This function is used to schedule periodic scans for neighboring
636 * access points after the specified time.
638 int wpa_supplicant_delayed_sched_scan(struct wpa_supplicant *wpa_s,
641 if (!wpa_s->sched_scan_supported)
644 eloop_register_timeout(sec, usec,
645 wpa_supplicant_delayed_sched_scan_timeout,
653 * wpa_supplicant_req_sched_scan - Start a periodic scheduled scan
654 * @wpa_s: Pointer to wpa_supplicant data
656 * This function is used to schedule periodic scans for neighboring
657 * access points repeating the scan continuously.
659 int wpa_supplicant_req_sched_scan(struct wpa_supplicant *wpa_s)
661 struct wpa_driver_scan_params params;
662 enum wpa_states prev_state;
663 struct wpa_ssid *ssid;
664 struct wpabuf *wps_ie = NULL;
666 unsigned int max_sched_scan_ssids;
668 if (!wpa_s->sched_scan_supported)
671 if (wpa_s->max_sched_scan_ssids > WPAS_MAX_SCAN_SSIDS)
672 max_sched_scan_ssids = WPAS_MAX_SCAN_SSIDS;
674 max_sched_scan_ssids = wpa_s->max_sched_scan_ssids;
676 if (wpa_s->sched_scanning)
679 os_memset(¶ms, 0, sizeof(params));
681 /* If we can't allocate space for the filters, we just don't filter */
682 params.filter_ssids = os_zalloc(wpa_s->max_match_sets *
683 sizeof(struct wpa_driver_scan_filter));
685 prev_state = wpa_s->wpa_state;
686 if (wpa_s->wpa_state == WPA_DISCONNECTED ||
687 wpa_s->wpa_state == WPA_INACTIVE)
688 wpa_supplicant_set_state(wpa_s, WPA_SCANNING);
690 /* Find the starting point from which to continue scanning */
691 ssid = wpa_s->conf->ssid;
692 if (wpa_s->prev_sched_ssid) {
694 if (ssid == wpa_s->prev_sched_ssid) {
702 if (!ssid || !wpa_s->prev_sched_ssid) {
703 wpa_dbg(wpa_s, MSG_DEBUG, "Beginning of SSID list");
705 wpa_s->sched_scan_interval = 2;
706 wpa_s->sched_scan_timeout = max_sched_scan_ssids * 2;
707 wpa_s->first_sched_scan = 1;
708 ssid = wpa_s->conf->ssid;
709 wpa_s->prev_sched_ssid = ssid;
713 if (ssid->disabled) {
714 wpa_s->prev_sched_ssid = ssid;
719 if (params.filter_ssids && ssid->ssid && ssid->ssid_len) {
720 os_memcpy(params.filter_ssids[params.num_filter_ssids].ssid,
721 ssid->ssid, ssid->ssid_len);
722 params.filter_ssids[params.num_filter_ssids].ssid_len =
724 params.num_filter_ssids++;
727 if (ssid->scan_ssid) {
728 params.ssids[params.num_ssids].ssid =
730 params.ssids[params.num_ssids].ssid_len =
733 if (params.num_ssids >= max_sched_scan_ssids) {
734 wpa_s->prev_sched_ssid = ssid;
739 if (params.num_filter_ssids >= wpa_s->max_match_sets)
741 wpa_s->prev_sched_ssid = ssid;
745 if (!params.num_ssids) {
746 os_free(params.filter_ssids);
751 wps_ie = wpa_supplicant_extra_ies(wpa_s, ¶ms);
753 wpa_dbg(wpa_s, MSG_DEBUG,
754 "Starting sched scan: interval %d timeout %d",
755 wpa_s->sched_scan_interval, wpa_s->sched_scan_timeout);
757 ret = wpa_supplicant_start_sched_scan(wpa_s, ¶ms,
758 wpa_s->sched_scan_interval);
760 os_free(params.filter_ssids);
762 wpa_msg(wpa_s, MSG_WARNING, "Failed to initiate sched scan");
763 if (prev_state != wpa_s->wpa_state)
764 wpa_supplicant_set_state(wpa_s, prev_state);
768 /* If we have more SSIDs to scan, add a timeout so we scan them too */
769 if (ssid || !wpa_s->first_sched_scan) {
770 wpa_s->sched_scan_timed_out = 0;
771 eloop_register_timeout(wpa_s->sched_scan_timeout, 0,
772 wpa_supplicant_sched_scan_timeout,
774 wpa_s->first_sched_scan = 0;
775 wpa_s->sched_scan_timeout /= 2;
776 wpa_s->sched_scan_interval *= 2;
784 * wpa_supplicant_cancel_scan - Cancel a scheduled scan request
785 * @wpa_s: Pointer to wpa_supplicant data
787 * This function is used to cancel a scan request scheduled with
788 * wpa_supplicant_req_scan().
790 void wpa_supplicant_cancel_scan(struct wpa_supplicant *wpa_s)
792 wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling scan request");
793 eloop_cancel_timeout(wpa_supplicant_scan, wpa_s, NULL);
798 * wpa_supplicant_cancel_sched_scan - Stop running scheduled scans
799 * @wpa_s: Pointer to wpa_supplicant data
801 * This function is used to stop a periodic scheduled scan.
803 void wpa_supplicant_cancel_sched_scan(struct wpa_supplicant *wpa_s)
805 if (!wpa_s->sched_scanning)
808 wpa_dbg(wpa_s, MSG_DEBUG, "Cancelling sched scan");
809 eloop_cancel_timeout(wpa_supplicant_sched_scan_timeout, wpa_s, NULL);
810 wpa_supplicant_stop_sched_scan(wpa_s);
814 void wpa_supplicant_notify_scanning(struct wpa_supplicant *wpa_s,
817 if (wpa_s->scanning != scanning) {
818 wpa_s->scanning = scanning;
819 wpas_notify_scanning(wpa_s);
824 static int wpa_scan_get_max_rate(const struct wpa_scan_res *res)
830 ie = wpa_scan_get_ie(res, WLAN_EID_SUPP_RATES);
831 for (i = 0; ie && i < ie[1]; i++) {
832 if ((ie[i + 2] & 0x7f) > rate)
833 rate = ie[i + 2] & 0x7f;
836 ie = wpa_scan_get_ie(res, WLAN_EID_EXT_SUPP_RATES);
837 for (i = 0; ie && i < ie[1]; i++) {
838 if ((ie[i + 2] & 0x7f) > rate)
839 rate = ie[i + 2] & 0x7f;
846 const u8 * wpa_scan_get_ie(const struct wpa_scan_res *res, u8 ie)
850 pos = (const u8 *) (res + 1);
851 end = pos + res->ie_len;
853 while (pos + 1 < end) {
854 if (pos + 2 + pos[1] > end)
865 const u8 * wpa_scan_get_vendor_ie(const struct wpa_scan_res *res,
870 pos = (const u8 *) (res + 1);
871 end = pos + res->ie_len;
873 while (pos + 1 < end) {
874 if (pos + 2 + pos[1] > end)
876 if (pos[0] == WLAN_EID_VENDOR_SPECIFIC && pos[1] >= 4 &&
877 vendor_type == WPA_GET_BE32(&pos[2]))
886 struct wpabuf * wpa_scan_get_vendor_ie_multi(const struct wpa_scan_res *res,
892 buf = wpabuf_alloc(res->ie_len);
896 pos = (const u8 *) (res + 1);
897 end = pos + res->ie_len;
899 while (pos + 1 < end) {
900 if (pos + 2 + pos[1] > end)
902 if (pos[0] == WLAN_EID_VENDOR_SPECIFIC && pos[1] >= 4 &&
903 vendor_type == WPA_GET_BE32(&pos[2]))
904 wpabuf_put_data(buf, pos + 2 + 4, pos[1] - 4);
908 if (wpabuf_len(buf) == 0) {
917 struct wpabuf * wpa_scan_get_vendor_ie_multi_beacon(
918 const struct wpa_scan_res *res, u32 vendor_type)
923 if (res->beacon_ie_len == 0)
925 buf = wpabuf_alloc(res->beacon_ie_len);
929 pos = (const u8 *) (res + 1);
931 end = pos + res->beacon_ie_len;
933 while (pos + 1 < end) {
934 if (pos + 2 + pos[1] > end)
936 if (pos[0] == WLAN_EID_VENDOR_SPECIFIC && pos[1] >= 4 &&
937 vendor_type == WPA_GET_BE32(&pos[2]))
938 wpabuf_put_data(buf, pos + 2 + 4, pos[1] - 4);
942 if (wpabuf_len(buf) == 0) {
951 /* Compare function for sorting scan results. Return >0 if @b is considered
953 static int wpa_scan_result_compar(const void *a, const void *b)
955 struct wpa_scan_res **_wa = (void *) a;
956 struct wpa_scan_res **_wb = (void *) b;
957 struct wpa_scan_res *wa = *_wa;
958 struct wpa_scan_res *wb = *_wb;
959 int wpa_a, wpa_b, maxrate_a, maxrate_b;
961 /* WPA/WPA2 support preferred */
962 wpa_a = wpa_scan_get_vendor_ie(wa, WPA_IE_VENDOR_TYPE) != NULL ||
963 wpa_scan_get_ie(wa, WLAN_EID_RSN) != NULL;
964 wpa_b = wpa_scan_get_vendor_ie(wb, WPA_IE_VENDOR_TYPE) != NULL ||
965 wpa_scan_get_ie(wb, WLAN_EID_RSN) != NULL;
972 /* privacy support preferred */
973 if ((wa->caps & IEEE80211_CAP_PRIVACY) == 0 &&
974 (wb->caps & IEEE80211_CAP_PRIVACY))
976 if ((wa->caps & IEEE80211_CAP_PRIVACY) &&
977 (wb->caps & IEEE80211_CAP_PRIVACY) == 0)
980 /* best/max rate preferred if signal level close enough XXX */
981 if ((wa->level && wb->level && abs(wb->level - wa->level) < 5) ||
982 (wa->qual && wb->qual && abs(wb->qual - wa->qual) < 10)) {
983 maxrate_a = wpa_scan_get_max_rate(wa);
984 maxrate_b = wpa_scan_get_max_rate(wb);
985 if (maxrate_a != maxrate_b)
986 return maxrate_b - maxrate_a;
989 /* use freq for channel preference */
991 /* all things being equal, use signal level; if signal levels are
992 * identical, use quality values since some drivers may only report
993 * that value and leave the signal level zero */
994 if (wb->level == wa->level)
995 return wb->qual - wa->qual;
996 return wb->level - wa->level;
1001 /* Compare function for sorting scan results when searching a WPS AP for
1002 * provisioning. Return >0 if @b is considered better. */
1003 static int wpa_scan_result_wps_compar(const void *a, const void *b)
1005 struct wpa_scan_res **_wa = (void *) a;
1006 struct wpa_scan_res **_wb = (void *) b;
1007 struct wpa_scan_res *wa = *_wa;
1008 struct wpa_scan_res *wb = *_wb;
1009 int uses_wps_a, uses_wps_b;
1010 struct wpabuf *wps_a, *wps_b;
1013 /* Optimization - check WPS IE existence before allocated memory and
1014 * doing full reassembly. */
1015 uses_wps_a = wpa_scan_get_vendor_ie(wa, WPS_IE_VENDOR_TYPE) != NULL;
1016 uses_wps_b = wpa_scan_get_vendor_ie(wb, WPS_IE_VENDOR_TYPE) != NULL;
1017 if (uses_wps_a && !uses_wps_b)
1019 if (!uses_wps_a && uses_wps_b)
1022 if (uses_wps_a && uses_wps_b) {
1023 wps_a = wpa_scan_get_vendor_ie_multi(wa, WPS_IE_VENDOR_TYPE);
1024 wps_b = wpa_scan_get_vendor_ie_multi(wb, WPS_IE_VENDOR_TYPE);
1025 res = wps_ap_priority_compar(wps_a, wps_b);
1033 * Do not use current AP security policy as a sorting criteria during
1034 * WPS provisioning step since the AP may get reconfigured at the
1035 * completion of provisioning.
1038 /* all things being equal, use signal level; if signal levels are
1039 * identical, use quality values since some drivers may only report
1040 * that value and leave the signal level zero */
1041 if (wb->level == wa->level)
1042 return wb->qual - wa->qual;
1043 return wb->level - wa->level;
1045 #endif /* CONFIG_WPS */
1049 * wpa_supplicant_get_scan_results - Get scan results
1050 * @wpa_s: Pointer to wpa_supplicant data
1051 * @info: Information about what was scanned or %NULL if not available
1052 * @new_scan: Whether a new scan was performed
1053 * Returns: Scan results, %NULL on failure
1055 * This function request the current scan results from the driver and updates
1056 * the local BSS list wpa_s->bss. The caller is responsible for freeing the
1057 * results with wpa_scan_results_free().
1059 struct wpa_scan_results *
1060 wpa_supplicant_get_scan_results(struct wpa_supplicant *wpa_s,
1061 struct scan_info *info, int new_scan)
1063 struct wpa_scan_results *scan_res;
1065 int (*compar)(const void *, const void *) = wpa_scan_result_compar;
1067 if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
1068 scan_res = ieee80211_sta_get_scan_results(wpa_s);
1070 scan_res = wpa_drv_get_scan_results2(wpa_s);
1071 if (scan_res == NULL) {
1072 wpa_dbg(wpa_s, MSG_DEBUG, "Failed to get scan results");
1077 if (wpas_wps_in_progress(wpa_s)) {
1078 wpa_dbg(wpa_s, MSG_DEBUG, "WPS: Order scan results with WPS "
1079 "provisioning rules");
1080 compar = wpa_scan_result_wps_compar;
1082 #endif /* CONFIG_WPS */
1084 qsort(scan_res->res, scan_res->num, sizeof(struct wpa_scan_res *),
1087 wpa_bss_update_start(wpa_s);
1088 for (i = 0; i < scan_res->num; i++)
1089 wpa_bss_update_scan_res(wpa_s, scan_res->res[i]);
1090 wpa_bss_update_end(wpa_s, info, new_scan);
1096 int wpa_supplicant_update_scan_results(struct wpa_supplicant *wpa_s)
1098 struct wpa_scan_results *scan_res;
1099 scan_res = wpa_supplicant_get_scan_results(wpa_s, NULL, 0);
1100 if (scan_res == NULL)
1102 wpa_scan_results_free(scan_res);
1108 void wpa_scan_results_free(struct wpa_scan_results *res)
1115 for (i = 0; i < res->num; i++)
1116 os_free(res->res[i]);