mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-01 03:38:21 -05:00
b0194fe07e
This allows associations to be denied if the STA tries to use too large listen interval. The default value is 65535 which matches with the field size limits.
1760 lines
50 KiB
C
1760 lines
50 KiB
C
/*
|
|
* hostapd / IEEE 802.11 Management
|
|
* Copyright (c) 2002-2008, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
* published by the Free Software Foundation.
|
|
*
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
* license.
|
|
*
|
|
* See README and COPYING for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#ifndef CONFIG_NATIVE_WINDOWS
|
|
|
|
#include <net/if.h>
|
|
|
|
#include "eloop.h"
|
|
#include "hostapd.h"
|
|
#include "ieee802_11.h"
|
|
#include "beacon.h"
|
|
#include "hw_features.h"
|
|
#include "radius/radius.h"
|
|
#include "radius/radius_client.h"
|
|
#include "ieee802_11_auth.h"
|
|
#include "sta_info.h"
|
|
#include "rc4.h"
|
|
#include "ieee802_1x.h"
|
|
#include "wpa.h"
|
|
#include "wme.h"
|
|
#include "ap_list.h"
|
|
#include "accounting.h"
|
|
#include "driver.h"
|
|
#include "ieee802_11h.h"
|
|
#include "mlme.h"
|
|
|
|
|
|
u8 * hostapd_eid_supp_rates(struct hostapd_data *hapd, u8 *eid)
|
|
{
|
|
u8 *pos = eid;
|
|
int i, num, count;
|
|
|
|
if (hapd->iface->current_rates == NULL)
|
|
return eid;
|
|
|
|
*pos++ = WLAN_EID_SUPP_RATES;
|
|
num = hapd->iface->num_rates;
|
|
if (num > 8) {
|
|
/* rest of the rates are encoded in Extended supported
|
|
* rates element */
|
|
num = 8;
|
|
}
|
|
|
|
*pos++ = num;
|
|
count = 0;
|
|
for (i = 0, count = 0; i < hapd->iface->num_rates && count < num;
|
|
i++) {
|
|
count++;
|
|
*pos = hapd->iface->current_rates[i].rate / 5;
|
|
if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC)
|
|
*pos |= 0x80;
|
|
pos++;
|
|
}
|
|
|
|
return pos;
|
|
}
|
|
|
|
|
|
u8 * hostapd_eid_ext_supp_rates(struct hostapd_data *hapd, u8 *eid)
|
|
{
|
|
u8 *pos = eid;
|
|
int i, num, count;
|
|
|
|
if (hapd->iface->current_rates == NULL)
|
|
return eid;
|
|
|
|
num = hapd->iface->num_rates;
|
|
if (num <= 8)
|
|
return eid;
|
|
num -= 8;
|
|
|
|
*pos++ = WLAN_EID_EXT_SUPP_RATES;
|
|
*pos++ = num;
|
|
count = 0;
|
|
for (i = 0, count = 0; i < hapd->iface->num_rates && count < num + 8;
|
|
i++) {
|
|
count++;
|
|
if (count <= 8)
|
|
continue; /* already in SuppRates IE */
|
|
*pos = hapd->iface->current_rates[i].rate / 5;
|
|
if (hapd->iface->current_rates[i].flags & HOSTAPD_RATE_BASIC)
|
|
*pos |= 0x80;
|
|
pos++;
|
|
}
|
|
|
|
return pos;
|
|
}
|
|
|
|
|
|
u16 hostapd_own_capab_info(struct hostapd_data *hapd, struct sta_info *sta,
|
|
int probe)
|
|
{
|
|
int capab = WLAN_CAPABILITY_ESS;
|
|
int privacy;
|
|
|
|
if (hapd->iface->num_sta_no_short_preamble == 0 &&
|
|
hapd->iconf->preamble == SHORT_PREAMBLE)
|
|
capab |= WLAN_CAPABILITY_SHORT_PREAMBLE;
|
|
|
|
privacy = hapd->conf->ssid.wep.keys_set;
|
|
|
|
if (hapd->conf->ieee802_1x &&
|
|
(hapd->conf->default_wep_key_len ||
|
|
hapd->conf->individual_wep_key_len))
|
|
privacy = 1;
|
|
|
|
if (hapd->conf->wpa)
|
|
privacy = 1;
|
|
|
|
if (sta) {
|
|
int policy, def_klen;
|
|
if (probe && sta->ssid_probe) {
|
|
policy = sta->ssid_probe->security_policy;
|
|
def_klen = sta->ssid_probe->wep.default_len;
|
|
} else {
|
|
policy = sta->ssid->security_policy;
|
|
def_klen = sta->ssid->wep.default_len;
|
|
}
|
|
privacy = policy != SECURITY_PLAINTEXT;
|
|
if (policy == SECURITY_IEEE_802_1X && def_klen == 0)
|
|
privacy = 0;
|
|
}
|
|
|
|
if (privacy)
|
|
capab |= WLAN_CAPABILITY_PRIVACY;
|
|
|
|
if (hapd->iface->current_mode &&
|
|
hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G &&
|
|
hapd->iface->num_sta_no_short_slot_time == 0)
|
|
capab |= WLAN_CAPABILITY_SHORT_SLOT_TIME;
|
|
|
|
if (hapd->iface->dfs_enable)
|
|
capab |= WLAN_CAPABILITY_SPECTRUM_MGMT;
|
|
|
|
return capab;
|
|
}
|
|
|
|
|
|
#define OUI_MICROSOFT 0x0050f2 /* Microsoft (also used in Wi-Fi specs)
|
|
* 00:50:F2 */
|
|
|
|
static int ieee802_11_parse_vendor_specific(struct hostapd_data *hapd,
|
|
u8 *pos, size_t elen,
|
|
struct ieee802_11_elems *elems,
|
|
int show_errors)
|
|
{
|
|
unsigned int oui;
|
|
|
|
/* first 3 bytes in vendor specific information element are the IEEE
|
|
* OUI of the vendor. The following byte is used a vendor specific
|
|
* sub-type. */
|
|
if (elen < 4) {
|
|
if (show_errors) {
|
|
wpa_printf(MSG_MSGDUMP, "short vendor specific "
|
|
"information element ignored (len=%lu)",
|
|
(unsigned long) elen);
|
|
}
|
|
return -1;
|
|
}
|
|
|
|
oui = WPA_GET_BE24(pos);
|
|
switch (oui) {
|
|
case OUI_MICROSOFT:
|
|
/* Microsoft/Wi-Fi information elements are further typed and
|
|
* subtyped */
|
|
switch (pos[3]) {
|
|
case 1:
|
|
/* Microsoft OUI (00:50:F2) with OUI Type 1:
|
|
* real WPA information element */
|
|
elems->wpa_ie = pos;
|
|
elems->wpa_ie_len = elen;
|
|
break;
|
|
case WME_OUI_TYPE: /* this is a Wi-Fi WME info. element */
|
|
if (elen < 5) {
|
|
wpa_printf(MSG_MSGDUMP, "short WME "
|
|
"information element ignored "
|
|
"(len=%lu)",
|
|
(unsigned long) elen);
|
|
return -1;
|
|
}
|
|
switch (pos[4]) {
|
|
case WME_OUI_SUBTYPE_INFORMATION_ELEMENT:
|
|
case WME_OUI_SUBTYPE_PARAMETER_ELEMENT:
|
|
elems->wme = pos;
|
|
elems->wme_len = elen;
|
|
break;
|
|
case WME_OUI_SUBTYPE_TSPEC_ELEMENT:
|
|
elems->wme_tspec = pos;
|
|
elems->wme_tspec_len = elen;
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_MSGDUMP, "unknown WME "
|
|
"information element ignored "
|
|
"(subtype=%d len=%lu)",
|
|
pos[4], (unsigned long) elen);
|
|
return -1;
|
|
}
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_MSGDUMP, "Unknown Microsoft "
|
|
"information element ignored "
|
|
"(type=%d len=%lu)\n",
|
|
pos[3], (unsigned long) elen);
|
|
return -1;
|
|
}
|
|
break;
|
|
|
|
default:
|
|
wpa_printf(MSG_MSGDUMP, "unknown vendor specific information "
|
|
"element ignored (vendor OUI %02x:%02x:%02x "
|
|
"len=%lu)",
|
|
pos[0], pos[1], pos[2], (unsigned long) elen);
|
|
return -1;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
ParseRes ieee802_11_parse_elems(struct hostapd_data *hapd, u8 *start,
|
|
size_t len,
|
|
struct ieee802_11_elems *elems,
|
|
int show_errors)
|
|
{
|
|
size_t left = len;
|
|
u8 *pos = start;
|
|
int unknown = 0;
|
|
|
|
os_memset(elems, 0, sizeof(*elems));
|
|
|
|
while (left >= 2) {
|
|
u8 id, elen;
|
|
|
|
id = *pos++;
|
|
elen = *pos++;
|
|
left -= 2;
|
|
|
|
if (elen > left) {
|
|
if (show_errors) {
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11 element "
|
|
"parse failed (id=%d elen=%d "
|
|
"left=%lu)",
|
|
id, elen, (unsigned long) left);
|
|
wpa_hexdump(MSG_MSGDUMP, "IEs", start, len);
|
|
}
|
|
return ParseFailed;
|
|
}
|
|
|
|
switch (id) {
|
|
case WLAN_EID_SSID:
|
|
elems->ssid = pos;
|
|
elems->ssid_len = elen;
|
|
break;
|
|
case WLAN_EID_SUPP_RATES:
|
|
elems->supp_rates = pos;
|
|
elems->supp_rates_len = elen;
|
|
break;
|
|
case WLAN_EID_FH_PARAMS:
|
|
elems->fh_params = pos;
|
|
elems->fh_params_len = elen;
|
|
break;
|
|
case WLAN_EID_DS_PARAMS:
|
|
elems->ds_params = pos;
|
|
elems->ds_params_len = elen;
|
|
break;
|
|
case WLAN_EID_CF_PARAMS:
|
|
elems->cf_params = pos;
|
|
elems->cf_params_len = elen;
|
|
break;
|
|
case WLAN_EID_TIM:
|
|
elems->tim = pos;
|
|
elems->tim_len = elen;
|
|
break;
|
|
case WLAN_EID_IBSS_PARAMS:
|
|
elems->ibss_params = pos;
|
|
elems->ibss_params_len = elen;
|
|
break;
|
|
case WLAN_EID_CHALLENGE:
|
|
elems->challenge = pos;
|
|
elems->challenge_len = elen;
|
|
break;
|
|
case WLAN_EID_ERP_INFO:
|
|
elems->erp_info = pos;
|
|
elems->erp_info_len = elen;
|
|
break;
|
|
case WLAN_EID_EXT_SUPP_RATES:
|
|
elems->ext_supp_rates = pos;
|
|
elems->ext_supp_rates_len = elen;
|
|
break;
|
|
case WLAN_EID_VENDOR_SPECIFIC:
|
|
if (ieee802_11_parse_vendor_specific(hapd, pos, elen,
|
|
elems,
|
|
show_errors))
|
|
unknown++;
|
|
break;
|
|
case WLAN_EID_RSN:
|
|
elems->rsn_ie = pos;
|
|
elems->rsn_ie_len = elen;
|
|
break;
|
|
case WLAN_EID_PWR_CAPABILITY:
|
|
elems->power_cap = pos;
|
|
elems->power_cap_len = elen;
|
|
break;
|
|
case WLAN_EID_SUPPORTED_CHANNELS:
|
|
elems->supp_channels = pos;
|
|
elems->supp_channels_len = elen;
|
|
break;
|
|
case WLAN_EID_MOBILITY_DOMAIN:
|
|
elems->mdie = pos;
|
|
elems->mdie_len = elen;
|
|
break;
|
|
case WLAN_EID_FAST_BSS_TRANSITION:
|
|
elems->ftie = pos;
|
|
elems->ftie_len = elen;
|
|
break;
|
|
default:
|
|
unknown++;
|
|
if (!show_errors)
|
|
break;
|
|
wpa_printf(MSG_MSGDUMP, "IEEE 802.11 element parse "
|
|
"ignored unknown element (id=%d elen=%d)",
|
|
id, elen);
|
|
break;
|
|
}
|
|
|
|
left -= elen;
|
|
pos += elen;
|
|
}
|
|
|
|
if (left)
|
|
return ParseFailed;
|
|
|
|
return unknown ? ParseUnknown : ParseOK;
|
|
}
|
|
|
|
|
|
void ieee802_11_print_ssid(char *buf, const u8 *ssid, u8 len)
|
|
{
|
|
int i;
|
|
if (len > HOSTAPD_MAX_SSID_LEN)
|
|
len = HOSTAPD_MAX_SSID_LEN;
|
|
for (i = 0; i < len; i++) {
|
|
if (ssid[i] >= 32 && ssid[i] < 127)
|
|
buf[i] = ssid[i];
|
|
else
|
|
buf[i] = '.';
|
|
}
|
|
buf[len] = '\0';
|
|
}
|
|
|
|
|
|
void ieee802_11_send_deauth(struct hostapd_data *hapd, u8 *addr, u16 reason)
|
|
{
|
|
struct ieee80211_mgmt mgmt;
|
|
char buf[30];
|
|
|
|
hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"deauthenticate - reason %d", reason);
|
|
os_snprintf(buf, sizeof(buf), "SEND-DEAUTHENTICATE %d", reason);
|
|
os_memset(&mgmt, 0, sizeof(mgmt));
|
|
mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
WLAN_FC_STYPE_DEAUTH);
|
|
os_memcpy(mgmt.da, addr, ETH_ALEN);
|
|
os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(mgmt.bssid, hapd->own_addr, ETH_ALEN);
|
|
mgmt.u.deauth.reason_code = host_to_le16(reason);
|
|
if (hostapd_send_mgmt_frame(hapd, &mgmt, IEEE80211_HDRLEN +
|
|
sizeof(mgmt.u.deauth), 0) < 0)
|
|
perror("ieee802_11_send_deauth: send");
|
|
}
|
|
|
|
|
|
static void ieee802_11_sta_authenticate(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
struct hostapd_data *hapd = eloop_ctx;
|
|
struct ieee80211_mgmt mgmt;
|
|
char ssid_txt[33];
|
|
|
|
if (hapd->assoc_ap_state == WAIT_BEACON)
|
|
hapd->assoc_ap_state = AUTHENTICATE;
|
|
if (hapd->assoc_ap_state != AUTHENTICATE)
|
|
return;
|
|
|
|
ieee802_11_print_ssid(ssid_txt, (u8 *) hapd->assoc_ap_ssid,
|
|
hapd->assoc_ap_ssid_len);
|
|
printf("Authenticate with AP " MACSTR " SSID=%s (as station)\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr), ssid_txt);
|
|
|
|
os_memset(&mgmt, 0, sizeof(mgmt));
|
|
mgmt.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
WLAN_FC_STYPE_AUTH);
|
|
/* Request TX callback */
|
|
mgmt.frame_control |= host_to_le16(BIT(1));
|
|
os_memcpy(mgmt.da, hapd->conf->assoc_ap_addr, ETH_ALEN);
|
|
os_memcpy(mgmt.sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(mgmt.bssid, hapd->conf->assoc_ap_addr, ETH_ALEN);
|
|
mgmt.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
|
|
mgmt.u.auth.auth_transaction = host_to_le16(1);
|
|
mgmt.u.auth.status_code = host_to_le16(0);
|
|
if (hostapd_send_mgmt_frame(hapd, &mgmt, IEEE80211_HDRLEN +
|
|
sizeof(mgmt.u.auth), 0) < 0)
|
|
perror("ieee802_11_sta_authenticate: send");
|
|
|
|
/* Try to authenticate again, if this attempt fails or times out. */
|
|
eloop_register_timeout(5, 0, ieee802_11_sta_authenticate, hapd, NULL);
|
|
}
|
|
|
|
|
|
static void ieee802_11_sta_associate(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
struct hostapd_data *hapd = eloop_ctx;
|
|
u8 buf[256];
|
|
struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *) buf;
|
|
u8 *p;
|
|
char ssid_txt[33];
|
|
|
|
if (hapd->assoc_ap_state == AUTHENTICATE)
|
|
hapd->assoc_ap_state = ASSOCIATE;
|
|
if (hapd->assoc_ap_state != ASSOCIATE)
|
|
return;
|
|
|
|
ieee802_11_print_ssid(ssid_txt, (u8 *) hapd->assoc_ap_ssid,
|
|
hapd->assoc_ap_ssid_len);
|
|
printf("Associate with AP " MACSTR " SSID=%s (as station)\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr), ssid_txt);
|
|
|
|
os_memset(mgmt, 0, sizeof(*mgmt));
|
|
mgmt->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
WLAN_FC_STYPE_ASSOC_REQ);
|
|
/* Request TX callback */
|
|
mgmt->frame_control |= host_to_le16(BIT(1));
|
|
os_memcpy(mgmt->da, hapd->conf->assoc_ap_addr, ETH_ALEN);
|
|
os_memcpy(mgmt->sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(mgmt->bssid, hapd->conf->assoc_ap_addr, ETH_ALEN);
|
|
mgmt->u.assoc_req.capab_info = host_to_le16(0);
|
|
mgmt->u.assoc_req.listen_interval = host_to_le16(1);
|
|
p = &mgmt->u.assoc_req.variable[0];
|
|
|
|
*p++ = WLAN_EID_SSID;
|
|
*p++ = hapd->assoc_ap_ssid_len;
|
|
os_memcpy(p, hapd->assoc_ap_ssid, hapd->assoc_ap_ssid_len);
|
|
p += hapd->assoc_ap_ssid_len;
|
|
|
|
p = hostapd_eid_supp_rates(hapd, p);
|
|
p = hostapd_eid_ext_supp_rates(hapd, p);
|
|
|
|
if (hostapd_send_mgmt_frame(hapd, mgmt, p - (u8 *) mgmt, 0) < 0)
|
|
perror("ieee802_11_sta_associate: send");
|
|
|
|
/* Try to authenticate again, if this attempt fails or times out. */
|
|
eloop_register_timeout(5, 0, ieee802_11_sta_associate, hapd, NULL);
|
|
}
|
|
|
|
|
|
static u16 auth_shared_key(struct hostapd_data *hapd, struct sta_info *sta,
|
|
u16 auth_transaction, u8 *challenge, int iswep)
|
|
{
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"authentication (shared key, transaction %d)",
|
|
auth_transaction);
|
|
|
|
if (auth_transaction == 1) {
|
|
if (!sta->challenge) {
|
|
/* Generate a pseudo-random challenge */
|
|
u8 key[8];
|
|
time_t now;
|
|
int r;
|
|
sta->challenge = os_zalloc(WLAN_AUTH_CHALLENGE_LEN);
|
|
if (sta->challenge == NULL)
|
|
return WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
|
|
now = time(NULL);
|
|
r = random();
|
|
os_memcpy(key, &now, 4);
|
|
os_memcpy(key + 4, &r, 4);
|
|
rc4(sta->challenge, WLAN_AUTH_CHALLENGE_LEN,
|
|
key, sizeof(key));
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
if (auth_transaction != 3)
|
|
return WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
|
|
/* Transaction 3 */
|
|
if (!iswep || !sta->challenge || !challenge ||
|
|
os_memcmp(sta->challenge, challenge, WLAN_AUTH_CHALLENGE_LEN)) {
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO,
|
|
"shared key authentication - invalid "
|
|
"challenge-response");
|
|
return WLAN_STATUS_CHALLENGE_FAIL;
|
|
}
|
|
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"authentication OK (shared key)");
|
|
#ifdef IEEE80211_REQUIRE_AUTH_ACK
|
|
/* Station will be marked authenticated if it ACKs the
|
|
* authentication reply. */
|
|
#else
|
|
sta->flags |= WLAN_STA_AUTH;
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
|
|
#endif
|
|
os_free(sta->challenge);
|
|
sta->challenge = NULL;
|
|
|
|
return 0;
|
|
}
|
|
|
|
|
|
static void send_auth_reply(struct hostapd_data *hapd,
|
|
const u8 *dst, const u8 *bssid,
|
|
u16 auth_alg, u16 auth_transaction, u16 resp,
|
|
const u8 *ies, size_t ies_len)
|
|
{
|
|
struct ieee80211_mgmt *reply;
|
|
u8 *buf;
|
|
size_t rlen;
|
|
|
|
rlen = IEEE80211_HDRLEN + sizeof(reply->u.auth) + ies_len;
|
|
buf = os_zalloc(rlen);
|
|
if (buf == NULL)
|
|
return;
|
|
|
|
reply = (struct ieee80211_mgmt *) buf;
|
|
reply->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
WLAN_FC_STYPE_AUTH);
|
|
/* Request TX callback */
|
|
reply->frame_control |= host_to_le16(BIT(1));
|
|
os_memcpy(reply->da, dst, ETH_ALEN);
|
|
os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(reply->bssid, bssid, ETH_ALEN);
|
|
|
|
reply->u.auth.auth_alg = host_to_le16(auth_alg);
|
|
reply->u.auth.auth_transaction = host_to_le16(auth_transaction);
|
|
reply->u.auth.status_code = host_to_le16(resp);
|
|
|
|
if (ies && ies_len)
|
|
os_memcpy(reply->u.auth.variable, ies, ies_len);
|
|
|
|
wpa_printf(MSG_DEBUG, "authentication reply: STA=" MACSTR
|
|
" auth_alg=%d auth_transaction=%d resp=%d (IE len=%lu)",
|
|
MAC2STR(dst), auth_alg, auth_transaction,
|
|
resp, (unsigned long) ies_len);
|
|
if (hostapd_send_mgmt_frame(hapd, reply, rlen, 0) < 0)
|
|
perror("send_auth_reply: send");
|
|
|
|
os_free(buf);
|
|
}
|
|
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
static void handle_auth_ft_finish(void *ctx, const u8 *dst, const u8 *bssid,
|
|
u16 auth_transaction, u16 status,
|
|
const u8 *ies, size_t ies_len)
|
|
{
|
|
struct hostapd_data *hapd = ctx;
|
|
struct sta_info *sta;
|
|
|
|
send_auth_reply(hapd, dst, bssid, WLAN_AUTH_FT, auth_transaction,
|
|
status, ies, ies_len);
|
|
|
|
if (status != WLAN_STATUS_SUCCESS)
|
|
return;
|
|
|
|
sta = ap_get_sta(hapd, dst);
|
|
if (sta == NULL)
|
|
return;
|
|
|
|
hostapd_logger(hapd, dst, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG, "authentication OK (FT)");
|
|
sta->flags |= WLAN_STA_AUTH;
|
|
mlme_authenticate_indication(hapd, sta);
|
|
}
|
|
#endif /* CONFIG_IEEE80211R */
|
|
|
|
|
|
static void handle_auth(struct hostapd_data *hapd, struct ieee80211_mgmt *mgmt,
|
|
size_t len)
|
|
{
|
|
u16 auth_alg, auth_transaction, status_code;
|
|
u16 resp = WLAN_STATUS_SUCCESS;
|
|
struct sta_info *sta = NULL;
|
|
int res;
|
|
u16 fc;
|
|
u8 *challenge = NULL;
|
|
u32 session_timeout, acct_interim_interval;
|
|
int vlan_id = 0;
|
|
u8 resp_ies[2 + WLAN_AUTH_CHALLENGE_LEN];
|
|
size_t resp_ies_len = 0;
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
|
|
printf("handle_auth - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
|
|
auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
status_code = le_to_host16(mgmt->u.auth.status_code);
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
if (len >= IEEE80211_HDRLEN + sizeof(mgmt->u.auth) +
|
|
2 + WLAN_AUTH_CHALLENGE_LEN &&
|
|
mgmt->u.auth.variable[0] == WLAN_EID_CHALLENGE &&
|
|
mgmt->u.auth.variable[1] == WLAN_AUTH_CHALLENGE_LEN)
|
|
challenge = &mgmt->u.auth.variable[2];
|
|
|
|
wpa_printf(MSG_DEBUG, "authentication: STA=" MACSTR " auth_alg=%d "
|
|
"auth_transaction=%d status_code=%d wep=%d%s",
|
|
MAC2STR(mgmt->sa), auth_alg, auth_transaction,
|
|
status_code, !!(fc & WLAN_FC_ISWEP),
|
|
challenge ? " challenge" : "");
|
|
|
|
if (hapd->assoc_ap_state == AUTHENTICATE && auth_transaction == 2 &&
|
|
os_memcmp(mgmt->sa, hapd->conf->assoc_ap_addr, ETH_ALEN) == 0 &&
|
|
os_memcmp(mgmt->bssid, hapd->conf->assoc_ap_addr, ETH_ALEN) == 0) {
|
|
if (status_code != 0) {
|
|
printf("Authentication (as station) with AP "
|
|
MACSTR " failed (status_code=%d)\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr),
|
|
status_code);
|
|
return;
|
|
}
|
|
printf("Authenticated (as station) with AP " MACSTR "\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr));
|
|
ieee802_11_sta_associate(hapd, NULL);
|
|
return;
|
|
}
|
|
|
|
if (hapd->tkip_countermeasures) {
|
|
resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (!(((hapd->conf->auth_algs & WPA_AUTH_ALG_OPEN) &&
|
|
auth_alg == WLAN_AUTH_OPEN) ||
|
|
#ifdef CONFIG_IEEE80211R
|
|
(hapd->conf->wpa &&
|
|
(hapd->conf->wpa_key_mgmt &
|
|
(WPA_KEY_MGMT_FT_IEEE8021X | WPA_KEY_MGMT_FT_PSK)) &&
|
|
auth_alg == WLAN_AUTH_FT) ||
|
|
#endif /* CONFIG_IEEE80211R */
|
|
((hapd->conf->auth_algs & WPA_AUTH_ALG_SHARED) &&
|
|
auth_alg == WLAN_AUTH_SHARED_KEY))) {
|
|
printf("Unsupported authentication algorithm (%d)\n",
|
|
auth_alg);
|
|
resp = WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG;
|
|
goto fail;
|
|
}
|
|
|
|
if (!(auth_transaction == 1 ||
|
|
(auth_alg == WLAN_AUTH_SHARED_KEY && auth_transaction == 3))) {
|
|
printf("Unknown authentication transaction number (%d)\n",
|
|
auth_transaction);
|
|
resp = WLAN_STATUS_UNKNOWN_AUTH_TRANSACTION;
|
|
goto fail;
|
|
}
|
|
|
|
if (os_memcmp(mgmt->sa, hapd->own_addr, ETH_ALEN) == 0) {
|
|
printf("Station " MACSTR " not allowed to authenticate.\n",
|
|
MAC2STR(mgmt->sa));
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
res = hostapd_allowed_address(hapd, mgmt->sa, (u8 *) mgmt, len,
|
|
&session_timeout,
|
|
&acct_interim_interval, &vlan_id);
|
|
if (res == HOSTAPD_ACL_REJECT) {
|
|
printf("Station " MACSTR " not allowed to authenticate.\n",
|
|
MAC2STR(mgmt->sa));
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
if (res == HOSTAPD_ACL_PENDING) {
|
|
wpa_printf(MSG_DEBUG, "Authentication frame from " MACSTR
|
|
" waiting for an external authentication",
|
|
MAC2STR(mgmt->sa));
|
|
/* Authentication code will re-send the authentication frame
|
|
* after it has received (and cached) information from the
|
|
* external source. */
|
|
return;
|
|
}
|
|
|
|
sta = ap_sta_add(hapd, mgmt->sa);
|
|
if (!sta) {
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (vlan_id > 0) {
|
|
if (hostapd_get_vlan_id_ifname(hapd->conf->vlan,
|
|
sta->vlan_id) == NULL) {
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
|
|
HOSTAPD_LEVEL_INFO, "Invalid VLAN ID "
|
|
"%d received from RADIUS server",
|
|
vlan_id);
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
sta->vlan_id = vlan_id;
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_RADIUS,
|
|
HOSTAPD_LEVEL_INFO, "VLAN ID %d", sta->vlan_id);
|
|
}
|
|
|
|
sta->flags &= ~WLAN_STA_PREAUTH;
|
|
ieee802_1x_notify_pre_auth(sta->eapol_sm, 0);
|
|
|
|
if (hapd->conf->radius->acct_interim_interval == 0 &&
|
|
acct_interim_interval)
|
|
sta->acct_interim_interval = acct_interim_interval;
|
|
if (res == HOSTAPD_ACL_ACCEPT_TIMEOUT)
|
|
ap_sta_session_timeout(hapd, sta, session_timeout);
|
|
else
|
|
ap_sta_no_session_timeout(hapd, sta);
|
|
|
|
switch (auth_alg) {
|
|
case WLAN_AUTH_OPEN:
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"authentication OK (open system)");
|
|
#ifdef IEEE80211_REQUIRE_AUTH_ACK
|
|
/* Station will be marked authenticated if it ACKs the
|
|
* authentication reply. */
|
|
#else
|
|
sta->flags |= WLAN_STA_AUTH;
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_AUTH);
|
|
sta->auth_alg = WLAN_AUTH_OPEN;
|
|
mlme_authenticate_indication(hapd, sta);
|
|
#endif
|
|
break;
|
|
case WLAN_AUTH_SHARED_KEY:
|
|
resp = auth_shared_key(hapd, sta, auth_transaction, challenge,
|
|
fc & WLAN_FC_ISWEP);
|
|
sta->auth_alg = WLAN_AUTH_SHARED_KEY;
|
|
mlme_authenticate_indication(hapd, sta);
|
|
if (sta->challenge && auth_transaction == 1) {
|
|
resp_ies[0] = WLAN_EID_CHALLENGE;
|
|
resp_ies[1] = WLAN_AUTH_CHALLENGE_LEN;
|
|
os_memcpy(resp_ies + 2, sta->challenge,
|
|
WLAN_AUTH_CHALLENGE_LEN);
|
|
resp_ies_len = 2 + WLAN_AUTH_CHALLENGE_LEN;
|
|
}
|
|
break;
|
|
#ifdef CONFIG_IEEE80211R
|
|
case WLAN_AUTH_FT:
|
|
sta->auth_alg = WLAN_AUTH_FT;
|
|
if (sta->wpa_sm == NULL)
|
|
sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
|
|
sta->addr);
|
|
if (sta->wpa_sm == NULL) {
|
|
wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA "
|
|
"state machine");
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
wpa_ft_process_auth(sta->wpa_sm, mgmt->bssid,
|
|
auth_transaction, mgmt->u.auth.variable,
|
|
len - IEEE80211_HDRLEN -
|
|
sizeof(mgmt->u.auth),
|
|
handle_auth_ft_finish, hapd);
|
|
/* handle_auth_ft_finish() callback will complete auth. */
|
|
return;
|
|
#endif /* CONFIG_IEEE80211R */
|
|
}
|
|
|
|
fail:
|
|
send_auth_reply(hapd, mgmt->sa, mgmt->bssid, auth_alg,
|
|
auth_transaction + 1, resp, resp_ies, resp_ies_len);
|
|
}
|
|
|
|
|
|
static void handle_assoc(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len, int reassoc)
|
|
{
|
|
u16 capab_info, listen_interval;
|
|
u16 resp = WLAN_STATUS_SUCCESS;
|
|
u8 *pos, *wpa_ie;
|
|
size_t wpa_ie_len;
|
|
int send_deauth = 0, send_len, left, i;
|
|
struct sta_info *sta;
|
|
struct ieee802_11_elems elems;
|
|
u8 buf[sizeof(struct ieee80211_mgmt) + 512];
|
|
struct ieee80211_mgmt *reply;
|
|
|
|
if (len < IEEE80211_HDRLEN + (reassoc ? sizeof(mgmt->u.reassoc_req) :
|
|
sizeof(mgmt->u.assoc_req))) {
|
|
printf("handle_assoc(reassoc=%d) - too short payload (len=%lu)"
|
|
"\n", reassoc, (unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
if (reassoc) {
|
|
capab_info = le_to_host16(mgmt->u.reassoc_req.capab_info);
|
|
listen_interval = le_to_host16(
|
|
mgmt->u.reassoc_req.listen_interval);
|
|
wpa_printf(MSG_DEBUG, "reassociation request: STA=" MACSTR
|
|
" capab_info=0x%02x listen_interval=%d current_ap="
|
|
MACSTR,
|
|
MAC2STR(mgmt->sa), capab_info, listen_interval,
|
|
MAC2STR(mgmt->u.reassoc_req.current_ap));
|
|
left = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.reassoc_req));
|
|
pos = mgmt->u.reassoc_req.variable;
|
|
} else {
|
|
capab_info = le_to_host16(mgmt->u.assoc_req.capab_info);
|
|
listen_interval = le_to_host16(
|
|
mgmt->u.assoc_req.listen_interval);
|
|
wpa_printf(MSG_DEBUG, "association request: STA=" MACSTR
|
|
" capab_info=0x%02x listen_interval=%d",
|
|
MAC2STR(mgmt->sa), capab_info, listen_interval);
|
|
left = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.assoc_req));
|
|
pos = mgmt->u.assoc_req.variable;
|
|
}
|
|
|
|
sta = ap_get_sta(hapd, mgmt->sa);
|
|
#ifdef CONFIG_IEEE80211R
|
|
if (sta && sta->auth_alg == WLAN_AUTH_FT &&
|
|
(sta->flags & WLAN_STA_AUTH) == 0) {
|
|
wpa_printf(MSG_DEBUG, "FT: Allow STA " MACSTR " to associate "
|
|
"prior to authentication since it is using "
|
|
"over-the-DS FT", MAC2STR(mgmt->sa));
|
|
} else
|
|
#endif /* CONFIG_IEEE80211R */
|
|
if (sta == NULL || (sta->flags & WLAN_STA_AUTH) == 0) {
|
|
printf("STA " MACSTR " trying to associate before "
|
|
"authentication\n", MAC2STR(mgmt->sa));
|
|
if (sta) {
|
|
printf(" sta: addr=" MACSTR " aid=%d flags=0x%04x\n",
|
|
MAC2STR(sta->addr), sta->aid, sta->flags);
|
|
}
|
|
send_deauth = 1;
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (hapd->tkip_countermeasures) {
|
|
resp = WLAN_REASON_MICHAEL_MIC_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (listen_interval > hapd->conf->max_listen_interval) {
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"Too large Listen Interval (%d)",
|
|
listen_interval);
|
|
resp = WLAN_STATUS_ASSOC_DENIED_LISTEN_INT_TOO_LARGE;
|
|
goto fail;
|
|
}
|
|
|
|
if (reassoc) {
|
|
os_memcpy(sta->previous_ap, mgmt->u.reassoc_req.current_ap,
|
|
ETH_ALEN);
|
|
}
|
|
|
|
sta->capability = capab_info;
|
|
|
|
/* followed by SSID and Supported rates */
|
|
if (ieee802_11_parse_elems(hapd, pos, left, &elems, 1) == ParseFailed
|
|
|| !elems.ssid) {
|
|
printf("STA " MACSTR " sent invalid association request\n",
|
|
MAC2STR(sta->addr));
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (elems.ssid_len != hapd->conf->ssid.ssid_len ||
|
|
os_memcmp(elems.ssid, hapd->conf->ssid.ssid, elems.ssid_len) != 0)
|
|
{
|
|
char ssid_txt[33];
|
|
ieee802_11_print_ssid(ssid_txt, elems.ssid, elems.ssid_len);
|
|
printf("Station " MACSTR " tried to associate with "
|
|
"unknown SSID '%s'\n", MAC2STR(sta->addr), ssid_txt);
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
sta->flags &= ~WLAN_STA_WME;
|
|
if (elems.wme && hapd->conf->wme_enabled) {
|
|
if (hostapd_eid_wme_valid(hapd, elems.wme, elems.wme_len))
|
|
hostapd_logger(hapd, sta->addr,
|
|
HOSTAPD_MODULE_WPA,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"invalid WME element in association "
|
|
"request");
|
|
else
|
|
sta->flags |= WLAN_STA_WME;
|
|
}
|
|
|
|
if (!elems.supp_rates) {
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"No supported rates element in AssocReq");
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
if (elems.supp_rates_len > sizeof(sta->supported_rates)) {
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"Invalid supported rates element length %d",
|
|
elems.supp_rates_len);
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
os_memset(sta->supported_rates, 0, sizeof(sta->supported_rates));
|
|
os_memcpy(sta->supported_rates, elems.supp_rates,
|
|
elems.supp_rates_len);
|
|
sta->supported_rates_len = elems.supp_rates_len;
|
|
|
|
if (elems.ext_supp_rates) {
|
|
if (elems.supp_rates_len + elems.ext_supp_rates_len >
|
|
sizeof(sta->supported_rates)) {
|
|
hostapd_logger(hapd, mgmt->sa,
|
|
HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"Invalid supported rates element length"
|
|
" %d+%d", elems.supp_rates_len,
|
|
elems.ext_supp_rates_len);
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
os_memcpy(sta->supported_rates + elems.supp_rates_len,
|
|
elems.ext_supp_rates, elems.ext_supp_rates_len);
|
|
sta->supported_rates_len += elems.ext_supp_rates_len;
|
|
}
|
|
|
|
if ((hapd->conf->wpa & WPA_PROTO_RSN) && elems.rsn_ie) {
|
|
wpa_ie = elems.rsn_ie;
|
|
wpa_ie_len = elems.rsn_ie_len;
|
|
} else if ((hapd->conf->wpa & WPA_PROTO_WPA) &&
|
|
elems.wpa_ie) {
|
|
wpa_ie = elems.wpa_ie;
|
|
wpa_ie_len = elems.wpa_ie_len;
|
|
} else {
|
|
wpa_ie = NULL;
|
|
wpa_ie_len = 0;
|
|
}
|
|
if (hapd->conf->wpa && wpa_ie == NULL) {
|
|
printf("STA " MACSTR ": No WPA/RSN IE in association "
|
|
"request\n", MAC2STR(sta->addr));
|
|
resp = WLAN_STATUS_INVALID_IE;
|
|
goto fail;
|
|
}
|
|
|
|
if (hapd->conf->wpa && wpa_ie) {
|
|
int res;
|
|
wpa_ie -= 2;
|
|
wpa_ie_len += 2;
|
|
if (sta->wpa_sm == NULL)
|
|
sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
|
|
sta->addr);
|
|
if (sta->wpa_sm == NULL) {
|
|
printf("Failed to initialize WPA state machine\n");
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
res = wpa_validate_wpa_ie(hapd->wpa_auth, sta->wpa_sm,
|
|
wpa_ie, wpa_ie_len,
|
|
elems.mdie, elems.mdie_len);
|
|
if (res == WPA_INVALID_GROUP)
|
|
resp = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
|
|
else if (res == WPA_INVALID_PAIRWISE)
|
|
resp = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
|
|
else if (res == WPA_INVALID_AKMP)
|
|
resp = WLAN_STATUS_AKMP_NOT_VALID;
|
|
else if (res == WPA_ALLOC_FAIL)
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
#ifdef CONFIG_IEEE80211W
|
|
else if (res == WPA_MGMT_FRAME_PROTECTION_VIOLATION)
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE; /* FIX */
|
|
else if (res == WPA_INVALID_MGMT_GROUP_CIPHER)
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE; /* FIX */
|
|
#endif /* CONFIG_IEEE80211W */
|
|
else if (res == WPA_INVALID_MDIE)
|
|
resp = WLAN_STATUS_INVALID_MDIE;
|
|
else if (res != WPA_IE_OK)
|
|
resp = WLAN_STATUS_INVALID_IE;
|
|
if (resp != WLAN_STATUS_SUCCESS)
|
|
goto fail;
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
if (sta->auth_alg == WLAN_AUTH_FT) {
|
|
if (!reassoc) {
|
|
wpa_printf(MSG_DEBUG, "FT: " MACSTR " tried "
|
|
"to use association (not "
|
|
"re-association) with FT auth_alg",
|
|
MAC2STR(sta->addr));
|
|
resp = WLAN_STATUS_UNSPECIFIED_FAILURE;
|
|
goto fail;
|
|
}
|
|
|
|
resp = wpa_ft_validate_reassoc(sta->wpa_sm, pos, left);
|
|
if (resp != WLAN_STATUS_SUCCESS)
|
|
goto fail;
|
|
}
|
|
#endif /* CONFIG_IEEE80211R */
|
|
}
|
|
|
|
if (hapd->iface->dfs_enable &&
|
|
hapd->iconf->ieee80211h == SPECT_STRICT_BINDING) {
|
|
if (hostapd_check_power_cap(hapd, elems.power_cap,
|
|
elems.power_cap_len)) {
|
|
resp = WLAN_STATUS_PWR_CAPABILITY_NOT_VALID;
|
|
hostapd_logger(hapd, sta->addr,
|
|
HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"Power capabilities of the station not "
|
|
"acceptable");
|
|
goto fail;
|
|
}
|
|
}
|
|
|
|
if (hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G)
|
|
sta->flags |= WLAN_STA_NONERP;
|
|
for (i = 0; i < sta->supported_rates_len; i++) {
|
|
if ((sta->supported_rates[i] & 0x7f) > 22) {
|
|
sta->flags &= ~WLAN_STA_NONERP;
|
|
break;
|
|
}
|
|
}
|
|
if (sta->flags & WLAN_STA_NONERP && !sta->nonerp_set) {
|
|
sta->nonerp_set = 1;
|
|
hapd->iface->num_sta_non_erp++;
|
|
if (hapd->iface->num_sta_non_erp == 1)
|
|
ieee802_11_set_beacons(hapd->iface);
|
|
}
|
|
|
|
if (!(sta->capability & WLAN_CAPABILITY_SHORT_SLOT_TIME) &&
|
|
!sta->no_short_slot_time_set) {
|
|
sta->no_short_slot_time_set = 1;
|
|
hapd->iface->num_sta_no_short_slot_time++;
|
|
if (hapd->iface->current_mode->mode ==
|
|
HOSTAPD_MODE_IEEE80211G &&
|
|
hapd->iface->num_sta_no_short_slot_time == 1)
|
|
ieee802_11_set_beacons(hapd->iface);
|
|
}
|
|
|
|
if (sta->capability & WLAN_CAPABILITY_SHORT_PREAMBLE)
|
|
sta->flags |= WLAN_STA_SHORT_PREAMBLE;
|
|
else
|
|
sta->flags &= ~WLAN_STA_SHORT_PREAMBLE;
|
|
|
|
if (!(sta->capability & WLAN_CAPABILITY_SHORT_PREAMBLE) &&
|
|
!sta->no_short_preamble_set) {
|
|
sta->no_short_preamble_set = 1;
|
|
hapd->iface->num_sta_no_short_preamble++;
|
|
if (hapd->iface->current_mode->mode == HOSTAPD_MODE_IEEE80211G
|
|
&& hapd->iface->num_sta_no_short_preamble == 1)
|
|
ieee802_11_set_beacons(hapd->iface);
|
|
}
|
|
|
|
/* get a unique AID */
|
|
if (sta->aid > 0) {
|
|
wpa_printf(MSG_DEBUG, " old AID %d", sta->aid);
|
|
} else {
|
|
for (sta->aid = 1; sta->aid <= MAX_AID_TABLE_SIZE; sta->aid++)
|
|
if (hapd->sta_aid[sta->aid - 1] == NULL)
|
|
break;
|
|
if (sta->aid > MAX_AID_TABLE_SIZE) {
|
|
sta->aid = 0;
|
|
resp = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
|
|
wpa_printf(MSG_ERROR, " no room for more AIDs");
|
|
goto fail;
|
|
} else {
|
|
hapd->sta_aid[sta->aid - 1] = sta;
|
|
wpa_printf(MSG_DEBUG, " new AID %d", sta->aid);
|
|
}
|
|
}
|
|
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"association OK (aid %d)", sta->aid);
|
|
/* Station will be marked associated, after it acknowledges AssocResp
|
|
*/
|
|
|
|
if (sta->last_assoc_req)
|
|
os_free(sta->last_assoc_req);
|
|
sta->last_assoc_req = os_malloc(len);
|
|
if (sta->last_assoc_req)
|
|
os_memcpy(sta->last_assoc_req, mgmt, len);
|
|
|
|
/* Make sure that the previously registered inactivity timer will not
|
|
* remove the STA immediately. */
|
|
sta->timeout_next = STA_NULLFUNC;
|
|
|
|
fail:
|
|
os_memset(buf, 0, sizeof(buf));
|
|
reply = (struct ieee80211_mgmt *) buf;
|
|
reply->frame_control =
|
|
IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
(send_deauth ? WLAN_FC_STYPE_DEAUTH :
|
|
(reassoc ? WLAN_FC_STYPE_REASSOC_RESP :
|
|
WLAN_FC_STYPE_ASSOC_RESP)));
|
|
os_memcpy(reply->da, mgmt->sa, ETH_ALEN);
|
|
os_memcpy(reply->sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(reply->bssid, mgmt->bssid, ETH_ALEN);
|
|
|
|
send_len = IEEE80211_HDRLEN;
|
|
if (send_deauth) {
|
|
send_len += sizeof(reply->u.deauth);
|
|
reply->u.deauth.reason_code = host_to_le16(resp);
|
|
} else {
|
|
u8 *p;
|
|
send_len += sizeof(reply->u.assoc_resp);
|
|
reply->u.assoc_resp.capab_info =
|
|
host_to_le16(hostapd_own_capab_info(hapd, sta, 0));
|
|
reply->u.assoc_resp.status_code = host_to_le16(resp);
|
|
reply->u.assoc_resp.aid = host_to_le16((sta ? sta->aid : 0)
|
|
| BIT(14) | BIT(15));
|
|
/* Supported rates */
|
|
p = hostapd_eid_supp_rates(hapd, reply->u.assoc_resp.variable);
|
|
/* Extended supported rates */
|
|
p = hostapd_eid_ext_supp_rates(hapd, p);
|
|
if (sta->flags & WLAN_STA_WME)
|
|
p = hostapd_eid_wme(hapd, p);
|
|
|
|
#ifdef CONFIG_IEEE80211R
|
|
if (resp == WLAN_STATUS_SUCCESS) {
|
|
/* IEEE 802.11r: Mobility Domain Information, Fast BSS
|
|
* Transition Information, RSN */
|
|
p = wpa_sm_write_assoc_resp_ies(sta->wpa_sm, p,
|
|
buf + sizeof(buf) - p,
|
|
sta->auth_alg);
|
|
}
|
|
#endif /* CONFIG_IEEE80211R */
|
|
|
|
send_len += p - reply->u.assoc_resp.variable;
|
|
|
|
/* Request TX callback */
|
|
reply->frame_control |= host_to_le16(BIT(1));
|
|
}
|
|
|
|
if (hostapd_send_mgmt_frame(hapd, reply, send_len, 0) < 0)
|
|
perror("handle_assoc: send");
|
|
}
|
|
|
|
|
|
static void handle_assoc_resp(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len)
|
|
{
|
|
u16 status_code, aid;
|
|
|
|
if (hapd->assoc_ap_state != ASSOCIATE) {
|
|
printf("Unexpected association response received from " MACSTR
|
|
"\n", MAC2STR(mgmt->sa));
|
|
return;
|
|
}
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.assoc_resp)) {
|
|
printf("handle_assoc_resp - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
if (os_memcmp(mgmt->sa, hapd->conf->assoc_ap_addr, ETH_ALEN) != 0 ||
|
|
os_memcmp(mgmt->bssid, hapd->conf->assoc_ap_addr, ETH_ALEN) != 0) {
|
|
printf("Received association response from unexpected address "
|
|
"(SA=" MACSTR " BSSID=" MACSTR "\n",
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->bssid));
|
|
return;
|
|
}
|
|
|
|
status_code = le_to_host16(mgmt->u.assoc_resp.status_code);
|
|
aid = le_to_host16(mgmt->u.assoc_resp.aid);
|
|
aid &= ~(BIT(14) | BIT(15));
|
|
|
|
if (status_code != 0) {
|
|
printf("Association (as station) with AP " MACSTR " failed "
|
|
"(status_code=%d)\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr), status_code);
|
|
/* Try to authenticate again */
|
|
hapd->assoc_ap_state = AUTHENTICATE;
|
|
eloop_register_timeout(5, 0, ieee802_11_sta_authenticate,
|
|
hapd, NULL);
|
|
}
|
|
|
|
printf("Associated (as station) with AP " MACSTR " (aid=%d)\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr), aid);
|
|
hapd->assoc_ap_aid = aid;
|
|
hapd->assoc_ap_state = ASSOCIATED;
|
|
|
|
if (hostapd_set_assoc_ap(hapd, hapd->conf->assoc_ap_addr)) {
|
|
printf("Could not set associated AP address to kernel "
|
|
"driver.\n");
|
|
}
|
|
}
|
|
|
|
|
|
static void handle_disassoc(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len)
|
|
{
|
|
struct sta_info *sta;
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.disassoc)) {
|
|
printf("handle_disassoc - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "disassocation: STA=" MACSTR " reason_code=%d",
|
|
MAC2STR(mgmt->sa),
|
|
le_to_host16(mgmt->u.disassoc.reason_code));
|
|
|
|
if (hapd->assoc_ap_state != DO_NOT_ASSOC &&
|
|
os_memcmp(mgmt->sa, hapd->conf->assoc_ap_addr, ETH_ALEN) == 0) {
|
|
printf("Assoc AP " MACSTR " sent disassociation "
|
|
"(reason_code=%d) - try to authenticate\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr),
|
|
le_to_host16(mgmt->u.disassoc.reason_code));
|
|
hapd->assoc_ap_state = AUTHENTICATE;
|
|
ieee802_11_sta_authenticate(hapd, NULL);
|
|
eloop_register_timeout(0, 500000, ieee802_11_sta_authenticate,
|
|
hapd, NULL);
|
|
return;
|
|
}
|
|
|
|
sta = ap_get_sta(hapd, mgmt->sa);
|
|
if (sta == NULL) {
|
|
printf("Station " MACSTR " trying to disassociate, but it "
|
|
"is not associated.\n", MAC2STR(mgmt->sa));
|
|
return;
|
|
}
|
|
|
|
sta->flags &= ~WLAN_STA_ASSOC;
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_DISASSOC);
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO, "disassociated");
|
|
sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
|
|
ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
|
|
/* Stop Accounting and IEEE 802.1X sessions, but leave the STA
|
|
* authenticated. */
|
|
accounting_sta_stop(hapd, sta);
|
|
ieee802_1x_free_station(sta);
|
|
hostapd_sta_remove(hapd, sta->addr);
|
|
|
|
if (sta->timeout_next == STA_NULLFUNC ||
|
|
sta->timeout_next == STA_DISASSOC) {
|
|
sta->timeout_next = STA_DEAUTH;
|
|
eloop_cancel_timeout(ap_handle_timer, hapd, sta);
|
|
eloop_register_timeout(AP_DEAUTH_DELAY, 0, ap_handle_timer,
|
|
hapd, sta);
|
|
}
|
|
|
|
mlme_disassociate_indication(
|
|
hapd, sta, le_to_host16(mgmt->u.disassoc.reason_code));
|
|
}
|
|
|
|
|
|
static void handle_deauth(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len)
|
|
{
|
|
struct sta_info *sta;
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.deauth)) {
|
|
printf("handle_deauth - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "deauthentication: STA=" MACSTR
|
|
" reason_code=%d",
|
|
MAC2STR(mgmt->sa),
|
|
le_to_host16(mgmt->u.deauth.reason_code));
|
|
|
|
if (hapd->assoc_ap_state != DO_NOT_ASSOC &&
|
|
os_memcmp(mgmt->sa, hapd->conf->assoc_ap_addr, ETH_ALEN) == 0) {
|
|
printf("Assoc AP " MACSTR " sent deauthentication "
|
|
"(reason_code=%d) - try to authenticate\n",
|
|
MAC2STR(hapd->conf->assoc_ap_addr),
|
|
le_to_host16(mgmt->u.deauth.reason_code));
|
|
hapd->assoc_ap_state = AUTHENTICATE;
|
|
eloop_register_timeout(0, 500000, ieee802_11_sta_authenticate,
|
|
hapd, NULL);
|
|
return;
|
|
}
|
|
|
|
sta = ap_get_sta(hapd, mgmt->sa);
|
|
if (sta == NULL) {
|
|
printf("Station " MACSTR " trying to deauthenticate, but it "
|
|
"is not authenticated.\n", MAC2STR(mgmt->sa));
|
|
return;
|
|
}
|
|
|
|
sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_DEAUTH);
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG, "deauthenticated");
|
|
mlme_deauthenticate_indication(
|
|
hapd, sta, le_to_host16(mgmt->u.deauth.reason_code));
|
|
sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
|
|
ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
|
|
ap_free_sta(hapd, sta);
|
|
}
|
|
|
|
|
|
static void handle_beacon(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len,
|
|
struct hostapd_frame_info *fi)
|
|
{
|
|
struct ieee802_11_elems elems;
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.beacon)) {
|
|
printf("handle_beacon - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
(void) ieee802_11_parse_elems(hapd, mgmt->u.beacon.variable,
|
|
len - (IEEE80211_HDRLEN +
|
|
sizeof(mgmt->u.beacon)), &elems,
|
|
0);
|
|
|
|
if (hapd->assoc_ap_state == WAIT_BEACON &&
|
|
os_memcmp(mgmt->sa, hapd->conf->assoc_ap_addr, ETH_ALEN) == 0) {
|
|
if (elems.ssid && elems.ssid_len <= 32) {
|
|
os_memcpy(hapd->assoc_ap_ssid, elems.ssid,
|
|
elems.ssid_len);
|
|
hapd->assoc_ap_ssid[elems.ssid_len] = '\0';
|
|
hapd->assoc_ap_ssid_len = elems.ssid_len;
|
|
}
|
|
ieee802_11_sta_authenticate(hapd, NULL);
|
|
}
|
|
|
|
ap_list_process_beacon(hapd->iface, mgmt, &elems, fi);
|
|
}
|
|
|
|
|
|
static void handle_action(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt, size_t len)
|
|
{
|
|
if (len < IEEE80211_HDRLEN + 1) {
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"handle_action - too short payload (len=%lu)",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
switch (mgmt->u.action.category) {
|
|
#ifdef CONFIG_IEEE80211R
|
|
case WLAN_ACTION_FT:
|
|
{
|
|
struct sta_info *sta;
|
|
|
|
sta = ap_get_sta(hapd, mgmt->sa);
|
|
if (sta == NULL || !(sta->flags & WLAN_STA_ASSOC)) {
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Ignored FT Action "
|
|
"frame from unassociated STA " MACSTR,
|
|
MAC2STR(mgmt->sa));
|
|
return;
|
|
}
|
|
|
|
if (wpa_ft_action_rx(sta->wpa_sm, (u8 *) &mgmt->u.action,
|
|
len - IEEE80211_HDRLEN))
|
|
break;
|
|
|
|
return;
|
|
}
|
|
#endif /* CONFIG_IEEE80211R */
|
|
case WME_ACTION_CATEGORY:
|
|
hostapd_wme_action(hapd, mgmt, len);
|
|
return;
|
|
}
|
|
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"handle_action - unknown action category %d or invalid "
|
|
"frame",
|
|
mgmt->u.action.category);
|
|
if (!(mgmt->da[0] & 0x01) && !(mgmt->u.action.category & 0x80) &&
|
|
!(mgmt->sa[0] & 0x01)) {
|
|
/*
|
|
* IEEE 802.11-REVma/D9.0 - 7.3.1.11
|
|
* Return the Action frame to the source without change
|
|
* except that MSB of the Category set to 1.
|
|
*/
|
|
wpa_printf(MSG_DEBUG, "IEEE 802.11: Return unknown Action "
|
|
"frame back to sender");
|
|
os_memcpy(mgmt->da, mgmt->sa, ETH_ALEN);
|
|
os_memcpy(mgmt->sa, hapd->own_addr, ETH_ALEN);
|
|
os_memcpy(mgmt->bssid, hapd->own_addr, ETH_ALEN);
|
|
mgmt->u.action.category |= 0x80;
|
|
|
|
hostapd_send_mgmt_frame(hapd, mgmt, len, 0);
|
|
}
|
|
}
|
|
|
|
|
|
/**
|
|
* ieee802_11_mgmt - process incoming IEEE 802.11 management frames
|
|
* @hapd: hostapd BSS data structure (the BSS to which the management frame was
|
|
* sent to)
|
|
* @buf: management frame data (starting from IEEE 802.11 header)
|
|
* @len: length of frame data in octets
|
|
* @stype: management frame subtype from frame control field
|
|
*
|
|
* Process all incoming IEEE 802.11 management frames. This will be called for
|
|
* each frame received from the kernel driver through wlan#ap interface. In
|
|
* addition, it can be called to re-inserted pending frames (e.g., when using
|
|
* external RADIUS server as an MAC ACL).
|
|
*/
|
|
void ieee802_11_mgmt(struct hostapd_data *hapd, u8 *buf, size_t len, u16 stype,
|
|
struct hostapd_frame_info *fi)
|
|
{
|
|
struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *) buf;
|
|
int broadcast;
|
|
|
|
if (stype == WLAN_FC_STYPE_BEACON) {
|
|
handle_beacon(hapd, mgmt, len, fi);
|
|
return;
|
|
}
|
|
|
|
if (fi && fi->passive_scan)
|
|
return;
|
|
|
|
broadcast = mgmt->bssid[0] == 0xff && mgmt->bssid[1] == 0xff &&
|
|
mgmt->bssid[2] == 0xff && mgmt->bssid[3] == 0xff &&
|
|
mgmt->bssid[4] == 0xff && mgmt->bssid[5] == 0xff;
|
|
|
|
if (!broadcast &&
|
|
os_memcmp(mgmt->bssid, hapd->own_addr, ETH_ALEN) != 0 &&
|
|
(hapd->assoc_ap_state == DO_NOT_ASSOC ||
|
|
os_memcmp(mgmt->bssid, hapd->conf->assoc_ap_addr, ETH_ALEN) != 0))
|
|
{
|
|
printf("MGMT: BSSID=" MACSTR " not our address\n",
|
|
MAC2STR(mgmt->bssid));
|
|
return;
|
|
}
|
|
|
|
|
|
if (stype == WLAN_FC_STYPE_PROBE_REQ) {
|
|
handle_probe_req(hapd, mgmt, len);
|
|
return;
|
|
}
|
|
|
|
if (os_memcmp(mgmt->da, hapd->own_addr, ETH_ALEN) != 0) {
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"MGMT: DA=" MACSTR " not our address",
|
|
MAC2STR(mgmt->da));
|
|
return;
|
|
}
|
|
|
|
switch (stype) {
|
|
case WLAN_FC_STYPE_AUTH:
|
|
wpa_printf(MSG_DEBUG, "mgmt::auth");
|
|
handle_auth(hapd, mgmt, len);
|
|
break;
|
|
case WLAN_FC_STYPE_ASSOC_REQ:
|
|
wpa_printf(MSG_DEBUG, "mgmt::assoc_req");
|
|
handle_assoc(hapd, mgmt, len, 0);
|
|
break;
|
|
case WLAN_FC_STYPE_ASSOC_RESP:
|
|
wpa_printf(MSG_DEBUG, "mgmt::assoc_resp");
|
|
handle_assoc_resp(hapd, mgmt, len);
|
|
break;
|
|
case WLAN_FC_STYPE_REASSOC_REQ:
|
|
wpa_printf(MSG_DEBUG, "mgmt::reassoc_req");
|
|
handle_assoc(hapd, mgmt, len, 1);
|
|
break;
|
|
case WLAN_FC_STYPE_DISASSOC:
|
|
wpa_printf(MSG_DEBUG, "mgmt::disassoc");
|
|
handle_disassoc(hapd, mgmt, len);
|
|
break;
|
|
case WLAN_FC_STYPE_DEAUTH:
|
|
wpa_printf(MSG_DEBUG, "mgmt::deauth");
|
|
handle_deauth(hapd, mgmt, len);
|
|
break;
|
|
case WLAN_FC_STYPE_ACTION:
|
|
wpa_printf(MSG_DEBUG, "mgmt::action");
|
|
handle_action(hapd, mgmt, len);
|
|
break;
|
|
default:
|
|
hostapd_logger(hapd, mgmt->sa, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"unknown mgmt frame subtype %d", stype);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static void handle_auth_cb(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt,
|
|
size_t len, int ok)
|
|
{
|
|
u16 auth_alg, auth_transaction, status_code;
|
|
struct sta_info *sta;
|
|
|
|
if (!ok) {
|
|
hostapd_logger(hapd, mgmt->da, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_NOTICE,
|
|
"did not acknowledge authentication response");
|
|
return;
|
|
}
|
|
|
|
if (len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth)) {
|
|
printf("handle_auth_cb - too short payload (len=%lu)\n",
|
|
(unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
auth_alg = le_to_host16(mgmt->u.auth.auth_alg);
|
|
auth_transaction = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
status_code = le_to_host16(mgmt->u.auth.status_code);
|
|
|
|
sta = ap_get_sta(hapd, mgmt->da);
|
|
if (!sta) {
|
|
printf("handle_auth_cb: STA " MACSTR " not found\n",
|
|
MAC2STR(mgmt->da));
|
|
return;
|
|
}
|
|
|
|
if (status_code == WLAN_STATUS_SUCCESS &&
|
|
((auth_alg == WLAN_AUTH_OPEN && auth_transaction == 2) ||
|
|
(auth_alg == WLAN_AUTH_SHARED_KEY && auth_transaction == 4))) {
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO, "authenticated");
|
|
sta->flags |= WLAN_STA_AUTH;
|
|
}
|
|
}
|
|
|
|
|
|
static void handle_assoc_cb(struct hostapd_data *hapd,
|
|
struct ieee80211_mgmt *mgmt,
|
|
size_t len, int reassoc, int ok)
|
|
{
|
|
u16 status;
|
|
struct sta_info *sta;
|
|
int new_assoc = 1;
|
|
|
|
if (!ok) {
|
|
hostapd_logger(hapd, mgmt->da, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_DEBUG,
|
|
"did not acknowledge association response");
|
|
return;
|
|
}
|
|
|
|
if (len < IEEE80211_HDRLEN + (reassoc ? sizeof(mgmt->u.reassoc_resp) :
|
|
sizeof(mgmt->u.assoc_resp))) {
|
|
printf("handle_assoc_cb(reassoc=%d) - too short payload "
|
|
"(len=%lu)\n", reassoc, (unsigned long) len);
|
|
return;
|
|
}
|
|
|
|
if (reassoc)
|
|
status = le_to_host16(mgmt->u.reassoc_resp.status_code);
|
|
else
|
|
status = le_to_host16(mgmt->u.assoc_resp.status_code);
|
|
|
|
sta = ap_get_sta(hapd, mgmt->da);
|
|
if (!sta) {
|
|
printf("handle_assoc_cb: STA " MACSTR " not found\n",
|
|
MAC2STR(mgmt->da));
|
|
return;
|
|
}
|
|
|
|
if (status != WLAN_STATUS_SUCCESS)
|
|
goto fail;
|
|
|
|
/* Stop previous accounting session, if one is started, and allocate
|
|
* new session id for the new session. */
|
|
accounting_sta_stop(hapd, sta);
|
|
accounting_sta_get_id(hapd, sta);
|
|
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO,
|
|
"associated (aid %d, accounting session %08X-%08X)",
|
|
sta->aid, sta->acct_session_id_hi,
|
|
sta->acct_session_id_lo);
|
|
|
|
if (sta->flags & WLAN_STA_ASSOC)
|
|
new_assoc = 0;
|
|
sta->flags |= WLAN_STA_ASSOC;
|
|
|
|
if (reassoc)
|
|
mlme_reassociate_indication(hapd, sta);
|
|
else
|
|
mlme_associate_indication(hapd, sta);
|
|
|
|
if (hostapd_sta_add(hapd->conf->iface, hapd, sta->addr, sta->aid,
|
|
sta->capability, sta->supported_rates,
|
|
sta->supported_rates_len, 0, sta->listen_interval))
|
|
{
|
|
hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_NOTICE,
|
|
"Could not add STA to kernel driver");
|
|
}
|
|
|
|
if (sta->eapol_sm == NULL) {
|
|
/*
|
|
* This STA does not use RADIUS server for EAP authentication,
|
|
* so bind it to the selected VLAN interface now, since the
|
|
* interface selection is not going to change anymore.
|
|
*/
|
|
ap_sta_bind_vlan(hapd, sta, 0);
|
|
} else if (sta->vlan_id) {
|
|
/* VLAN ID already set (e.g., by PMKSA caching), so bind STA */
|
|
ap_sta_bind_vlan(hapd, sta, 0);
|
|
}
|
|
if (sta->flags & WLAN_STA_SHORT_PREAMBLE) {
|
|
hostapd_sta_set_flags(hapd, sta->addr, sta->flags,
|
|
WLAN_STA_SHORT_PREAMBLE, ~0);
|
|
} else {
|
|
hostapd_sta_set_flags(hapd, sta->addr, sta->flags,
|
|
0, ~WLAN_STA_SHORT_PREAMBLE);
|
|
}
|
|
|
|
if (sta->auth_alg == WLAN_AUTH_FT)
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC_FT);
|
|
else
|
|
wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC);
|
|
hostapd_new_assoc_sta(hapd, sta, !new_assoc);
|
|
|
|
ieee802_1x_notify_port_enabled(sta->eapol_sm, 1);
|
|
|
|
fail:
|
|
/* Copy of the association request is not needed anymore */
|
|
if (sta->last_assoc_req) {
|
|
os_free(sta->last_assoc_req);
|
|
sta->last_assoc_req = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
void ieee802_11_mgmt_cb(struct hostapd_data *hapd, u8 *buf, size_t len,
|
|
u16 stype, int ok)
|
|
{
|
|
struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *) buf;
|
|
|
|
switch (stype) {
|
|
case WLAN_FC_STYPE_AUTH:
|
|
wpa_printf(MSG_DEBUG, "mgmt::auth cb");
|
|
handle_auth_cb(hapd, mgmt, len, ok);
|
|
break;
|
|
case WLAN_FC_STYPE_ASSOC_RESP:
|
|
wpa_printf(MSG_DEBUG, "mgmt::assoc_resp cb");
|
|
handle_assoc_cb(hapd, mgmt, len, 0, ok);
|
|
break;
|
|
case WLAN_FC_STYPE_REASSOC_RESP:
|
|
wpa_printf(MSG_DEBUG, "mgmt::reassoc_resp cb");
|
|
handle_assoc_cb(hapd, mgmt, len, 1, ok);
|
|
break;
|
|
case WLAN_FC_STYPE_PROBE_RESP:
|
|
wpa_printf(MSG_DEBUG, "mgmt::proberesp cb");
|
|
break;
|
|
case WLAN_FC_STYPE_DEAUTH:
|
|
/* ignore */
|
|
break;
|
|
default:
|
|
printf("unknown mgmt cb frame subtype %d\n", stype);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
|
|
void *timeout_ctx)
|
|
{
|
|
struct hostapd_data *hapd = eloop_ctx;
|
|
hapd->tkip_countermeasures = 0;
|
|
hostapd_set_countermeasures(hapd, 0);
|
|
hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
|
|
}
|
|
|
|
|
|
static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
|
|
{
|
|
struct sta_info *sta;
|
|
|
|
hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
|
|
|
|
wpa_auth_countermeasures_start(hapd->wpa_auth);
|
|
hapd->tkip_countermeasures = 1;
|
|
hostapd_set_countermeasures(hapd, 1);
|
|
wpa_gtk_rekey(hapd->wpa_auth);
|
|
eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
|
|
eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
|
|
hapd, NULL);
|
|
for (sta = hapd->sta_list; sta != NULL; sta = sta->next) {
|
|
hostapd_sta_deauth(hapd, sta->addr,
|
|
WLAN_REASON_MICHAEL_MIC_FAILURE);
|
|
sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC |
|
|
WLAN_STA_AUTHORIZED);
|
|
hostapd_sta_remove(hapd, sta->addr);
|
|
}
|
|
}
|
|
|
|
|
|
void ieee80211_michael_mic_failure(struct hostapd_data *hapd, const u8 *addr,
|
|
int local)
|
|
{
|
|
time_t now;
|
|
|
|
if (addr && local) {
|
|
struct sta_info *sta = ap_get_sta(hapd, addr);
|
|
if (sta != NULL) {
|
|
wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
|
|
hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
|
|
HOSTAPD_LEVEL_INFO,
|
|
"Michael MIC failure detected in "
|
|
"received frame");
|
|
mlme_michaelmicfailure_indication(hapd, addr);
|
|
} else {
|
|
wpa_printf(MSG_DEBUG,
|
|
"MLME-MICHAELMICFAILURE.indication "
|
|
"for not associated STA (" MACSTR
|
|
") ignored", MAC2STR(addr));
|
|
return;
|
|
}
|
|
}
|
|
|
|
time(&now);
|
|
if (now > hapd->michael_mic_failure + 60) {
|
|
hapd->michael_mic_failures = 1;
|
|
} else {
|
|
hapd->michael_mic_failures++;
|
|
if (hapd->michael_mic_failures > 1)
|
|
ieee80211_tkip_countermeasures_start(hapd);
|
|
}
|
|
hapd->michael_mic_failure = now;
|
|
}
|
|
|
|
|
|
int ieee802_11_get_mib(struct hostapd_data *hapd, char *buf, size_t buflen)
|
|
{
|
|
/* TODO */
|
|
return 0;
|
|
}
|
|
|
|
|
|
int ieee802_11_get_mib_sta(struct hostapd_data *hapd, struct sta_info *sta,
|
|
char *buf, size_t buflen)
|
|
{
|
|
/* TODO */
|
|
return 0;
|
|
}
|
|
|
|
#endif /* CONFIG_NATIVE_WINDOWS */
|