mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
DPP2: Add Protocol Version attribute to network introduction messages
This can be used to determine whether to try to negotiate PFS (only available with version 2 or higher). Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
This commit is contained in:
parent
7ec86f6599
commit
42acf1292d
@ -1206,9 +1206,13 @@ static void hostapd_dpp_send_peer_disc_resp(struct hostapd_data *hapd,
|
|||||||
enum dpp_status_error status)
|
enum dpp_status_error status)
|
||||||
{
|
{
|
||||||
struct wpabuf *msg;
|
struct wpabuf *msg;
|
||||||
|
size_t len;
|
||||||
|
|
||||||
msg = dpp_alloc_msg(DPP_PA_PEER_DISCOVERY_RESP,
|
len = 5 + 5 + 4 + os_strlen(hapd->conf->dpp_connector);
|
||||||
5 + 5 + 4 + os_strlen(hapd->conf->dpp_connector));
|
#ifdef CONFIG_DPP2
|
||||||
|
len += 5;
|
||||||
|
#endif /* CONFIG_DPP2 */
|
||||||
|
msg = dpp_alloc_msg(DPP_PA_PEER_DISCOVERY_RESP, len);
|
||||||
if (!msg)
|
if (!msg)
|
||||||
return;
|
return;
|
||||||
|
|
||||||
@ -1281,6 +1285,13 @@ skip_status:
|
|||||||
skip_connector:
|
skip_connector:
|
||||||
#endif /* CONFIG_TESTING_OPTIONS */
|
#endif /* CONFIG_TESTING_OPTIONS */
|
||||||
|
|
||||||
|
#ifdef CONFIG_DPP2
|
||||||
|
/* Protocol Version */
|
||||||
|
wpabuf_put_le16(msg, DPP_ATTR_PROTOCOL_VERSION);
|
||||||
|
wpabuf_put_le16(msg, 1);
|
||||||
|
wpabuf_put_u8(msg, 2);
|
||||||
|
#endif /* CONFIG_DPP2 */
|
||||||
|
|
||||||
wpa_printf(MSG_DEBUG, "DPP: Send Peer Discovery Response to " MACSTR
|
wpa_printf(MSG_DEBUG, "DPP: Send Peer Discovery Response to " MACSTR
|
||||||
" status=%d", MAC2STR(src), status);
|
" status=%d", MAC2STR(src), status);
|
||||||
wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
|
wpa_msg(hapd->msg_ctx, MSG_INFO, DPP_EVENT_TX "dst=" MACSTR
|
||||||
|
@ -2474,6 +2474,7 @@ int wpas_dpp_check_connect(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
|
|||||||
unsigned int wait_time;
|
unsigned int wait_time;
|
||||||
const u8 *rsn;
|
const u8 *rsn;
|
||||||
struct wpa_ie_data ied;
|
struct wpa_ie_data ied;
|
||||||
|
size_t len;
|
||||||
|
|
||||||
if (!(ssid->key_mgmt & WPA_KEY_MGMT_DPP) || !bss)
|
if (!(ssid->key_mgmt & WPA_KEY_MGMT_DPP) || !bss)
|
||||||
return 0; /* Not using DPP AKM - continue */
|
return 0; /* Not using DPP AKM - continue */
|
||||||
@ -2507,8 +2508,11 @@ int wpas_dpp_check_connect(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
|
|||||||
"DPP: Starting network introduction protocol to derive PMKSA for "
|
"DPP: Starting network introduction protocol to derive PMKSA for "
|
||||||
MACSTR, MAC2STR(bss->bssid));
|
MACSTR, MAC2STR(bss->bssid));
|
||||||
|
|
||||||
msg = dpp_alloc_msg(DPP_PA_PEER_DISCOVERY_REQ,
|
len = 5 + 4 + os_strlen(ssid->dpp_connector);
|
||||||
5 + 4 + os_strlen(ssid->dpp_connector));
|
#ifdef CONFIG_DPP2
|
||||||
|
len += 5;
|
||||||
|
#endif /* CONFIG_DPP2 */
|
||||||
|
msg = dpp_alloc_msg(DPP_PA_PEER_DISCOVERY_REQ, len);
|
||||||
if (!msg)
|
if (!msg)
|
||||||
return -1;
|
return -1;
|
||||||
|
|
||||||
@ -2563,6 +2567,13 @@ skip_trans_id:
|
|||||||
skip_connector:
|
skip_connector:
|
||||||
#endif /* CONFIG_TESTING_OPTIONS */
|
#endif /* CONFIG_TESTING_OPTIONS */
|
||||||
|
|
||||||
|
#ifdef CONFIG_DPP2
|
||||||
|
/* Protocol Version */
|
||||||
|
wpabuf_put_le16(msg, DPP_ATTR_PROTOCOL_VERSION);
|
||||||
|
wpabuf_put_le16(msg, 1);
|
||||||
|
wpabuf_put_u8(msg, 2);
|
||||||
|
#endif /* CONFIG_DPP2 */
|
||||||
|
|
||||||
/* TODO: Timeout on AP response */
|
/* TODO: Timeout on AP response */
|
||||||
wait_time = wpa_s->max_remain_on_chan;
|
wait_time = wpa_s->max_remain_on_chan;
|
||||||
if (wait_time > 2000)
|
if (wait_time > 2000)
|
||||||
|
Loading…
Reference in New Issue
Block a user