wpa_supplicant: Optimize BTM request scan

This commit is contained in:
Kapil Gupta
2021-10-28 14:23:34 +05:30
parent 4aa2ca369b
commit e5091bb7af
2 changed files with 25 additions and 8 deletions

View File

@@ -38,6 +38,10 @@ void wpa_supplicant_req_scan(struct wpa_supplicant *wpa_s, int sec, int usec)
} }
params = os_zalloc(sizeof(*params)); params = os_zalloc(sizeof(*params));
if (!params) {
wpa_printf(MSG_ERROR, "Memory allocation failed");
return;
}
if (wpa_s->wnm_mode) { if (wpa_s->wnm_mode) {
/* Use the same memory */ /* Use the same memory */
params->ssids[0].ssid = wpa_s->current_bss->ssid; params->ssids[0].ssid = wpa_s->current_bss->ssid;

View File

@@ -580,15 +580,15 @@ static void wnm_send_bss_transition_mgmt_resp(
struct wpabuf *buf; struct wpabuf *buf;
int res; int res;
wpa_printf(MSG_DEBUG,
"WNM: Send BSS Transition Management Response to " MACSTR
" dialog_token=%u status=%u reason=%u delay=%d",
MAC2STR(wpa_s->current_bss->bssid), dialog_token, status, reason, delay);
if (!wpa_s->current_bss) { if (!wpa_s->current_bss) {
wpa_printf(MSG_DEBUG, wpa_printf(MSG_DEBUG,
"WNM: Current BSS not known - drop response"); "WNM: Current BSS not known - drop response");
return; return;
} }
wpa_printf(MSG_DEBUG,
"WNM: Send BSS Transition Management Response to " MACSTR
" dialog_token=%u status=%u reason=%u delay=%d",
MAC2STR(wpa_s->current_bss->bssid), dialog_token, status, reason, delay);
buf = wpabuf_alloc(BTM_RESP_MIN_SIZE); buf = wpabuf_alloc(BTM_RESP_MIN_SIZE);
if (!buf) { if (!buf) {
@@ -784,7 +784,7 @@ static void wnm_dump_cand_list(struct wpa_supplicant *wpa_s)
static void wnm_set_scan_freqs(struct wpa_supplicant *wpa_s) static void wnm_set_scan_freqs(struct wpa_supplicant *wpa_s)
{ {
unsigned int i; unsigned int i;
int num_chan; int num_chan = 0;
u8 chan = 0; u8 chan = 0;
wpa_s->next_scan_chan = 0; wpa_s->next_scan_chan = 0;
@@ -802,8 +802,10 @@ static void wnm_set_scan_freqs(struct wpa_supplicant *wpa_s)
MAC2STR(nei->bssid)); MAC2STR(nei->bssid));
return; return;
} }
if (nei->channel_number != chan) if (nei->channel_number != chan) {
chan = nei->channel_number;
num_chan++; num_chan++;
}
} }
if (num_chan == 1) { if (num_chan == 1) {
@@ -826,6 +828,9 @@ static void ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s,
#ifdef CONFIG_MBO #ifdef CONFIG_MBO
const u8 *vendor; const u8 *vendor;
#endif /* CONFIG_MBO */ #endif /* CONFIG_MBO */
#ifdef ESP_SUPPLICANT
bool scan_required = false;
#endif
if (wpa_s->disable_mbo_oce || wpa_s->disable_btm) if (wpa_s->disable_mbo_oce || wpa_s->disable_btm)
return; return;
@@ -904,9 +909,11 @@ static void ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s,
#ifdef ESP_SUPPLICANT #ifdef ESP_SUPPLICANT
os_memset(wpa_s->next_scan_bssid, 0, ETH_ALEN); os_memset(wpa_s->next_scan_bssid, 0, ETH_ALEN);
wpa_s->next_scan_chan = 0; wpa_s->next_scan_chan = 0;
#endif scan_required = true;
#else
wpa_printf(MSG_DEBUG, "Trying to find another BSS"); wpa_printf(MSG_DEBUG, "Trying to find another BSS");
wpa_supplicant_req_scan(wpa_s, 0, 0); wpa_supplicant_req_scan(wpa_s, 0, 0);
#endif
} }
} }
@@ -1018,6 +1025,12 @@ static void ieee802_11_rx_bss_trans_mgmt_req(struct wpa_supplicant *wpa_s,
"WNM: Scan only for a specific BSSID since there is only a single candidate " "WNM: Scan only for a specific BSSID since there is only a single candidate "
MACSTR, MAC2STR(wpa_s->next_scan_bssid)); MACSTR, MAC2STR(wpa_s->next_scan_bssid));
} }
#ifdef ESP_SUPPLICANT
scan_required = true;
}
if (scan_required) {
wpa_printf(MSG_DEBUG, "Trying to find another BSS");
#endif
wpa_supplicant_req_scan(wpa_s, 0, 0); wpa_supplicant_req_scan(wpa_s, 0, 0);
} else if (reply) { } else if (reply) {
enum bss_trans_mgmt_status_code status; enum bss_trans_mgmt_status_code status;
@@ -1108,7 +1121,7 @@ void ieee802_11_rx_wnm_action(struct wpa_supplicant *wpa_s,
switch (act) { switch (act) {
case WNM_BSS_TRANS_MGMT_REQ: case WNM_BSS_TRANS_MGMT_REQ:
ieee802_11_rx_bss_trans_mgmt_req(wpa_s, pos, end, ieee802_11_rx_bss_trans_mgmt_req(wpa_s, pos, end,
!(sender[0] & 0x01)); 0x01);
break; break;
default: default:
wpa_printf(MSG_ERROR, "WNM: Unknown request"); wpa_printf(MSG_ERROR, "WNM: Unknown request");