mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
55a2df4389
The Hotspot 2.0 specification seems to mandate this element to be included in all (Re)Association Request frames if the station is Hotspot 2.0 capable. However, that results in conflicts with other requirements like no TKIP use when this element is present. The design is really supposed to include the indication element only for Hotspot 2.0 associations regardless of what the current specification implies. Remove the HS 2.0 Indication element from (Re)Association Request frame whenever the connection is not for Hotspot 2.0 purposes. Signed-hostap: Jouni Malinen <j@w1.fi>
215 lines
5.3 KiB
C
215 lines
5.3 KiB
C
/*
|
|
* Copyright (c) 2009, Atheros Communications, Inc.
|
|
* Copyright (c) 2011-2012, Qualcomm Atheros, Inc.
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
|
|
#include "common.h"
|
|
#include "eloop.h"
|
|
#include "common/ieee802_11_common.h"
|
|
#include "common/ieee802_11_defs.h"
|
|
#include "common/gas.h"
|
|
#include "common/wpa_ctrl.h"
|
|
#include "wpa_supplicant_i.h"
|
|
#include "driver_i.h"
|
|
#include "config.h"
|
|
#include "bss.h"
|
|
#include "gas_query.h"
|
|
#include "interworking.h"
|
|
#include "hs20_supplicant.h"
|
|
|
|
|
|
void wpas_hs20_add_indication(struct wpabuf *buf)
|
|
{
|
|
wpabuf_put_u8(buf, WLAN_EID_VENDOR_SPECIFIC);
|
|
wpabuf_put_u8(buf, 5);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_INDICATION_OUI_TYPE);
|
|
wpabuf_put_u8(buf, 0x00); /* Hotspot Configuration */
|
|
}
|
|
|
|
|
|
int is_hs20_network(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid,
|
|
struct wpa_bss *bss)
|
|
{
|
|
if (!wpa_s->conf->hs20 || !ssid)
|
|
return 0;
|
|
|
|
if (ssid->parent_cred)
|
|
return 1;
|
|
|
|
if (bss && !wpa_bss_get_vendor_ie(bss, HS20_IE_VENDOR_TYPE))
|
|
return 0;
|
|
|
|
/*
|
|
* This may catch some non-Hotspot 2.0 cases, but it is safer to do that
|
|
* than cause Hotspot 2.0 connections without indication element getting
|
|
* added. Non-Hotspot 2.0 APs should ignore the unknown vendor element.
|
|
*/
|
|
|
|
if (!(ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X))
|
|
return 0;
|
|
if (!(ssid->pairwise_cipher & WPA_CIPHER_CCMP))
|
|
return 0;
|
|
if (ssid->proto != WPA_PROTO_RSN)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
struct wpabuf * hs20_build_anqp_req(u32 stypes, const u8 *payload,
|
|
size_t payload_len)
|
|
{
|
|
struct wpabuf *buf;
|
|
u8 *len_pos;
|
|
|
|
buf = gas_anqp_build_initial_req(0, 100 + payload_len);
|
|
if (buf == NULL)
|
|
return NULL;
|
|
|
|
len_pos = gas_anqp_add_element(buf, ANQP_VENDOR_SPECIFIC);
|
|
wpabuf_put_be24(buf, OUI_WFA);
|
|
wpabuf_put_u8(buf, HS20_ANQP_OUI_TYPE);
|
|
if (stypes == BIT(HS20_STYPE_NAI_HOME_REALM_QUERY)) {
|
|
wpabuf_put_u8(buf, HS20_STYPE_NAI_HOME_REALM_QUERY);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
if (payload)
|
|
wpabuf_put_data(buf, payload, payload_len);
|
|
} else {
|
|
u8 i;
|
|
wpabuf_put_u8(buf, HS20_STYPE_QUERY_LIST);
|
|
wpabuf_put_u8(buf, 0); /* Reserved */
|
|
for (i = 0; i < 32; i++) {
|
|
if (stypes & BIT(i))
|
|
wpabuf_put_u8(buf, i);
|
|
}
|
|
}
|
|
gas_anqp_set_element_len(buf, len_pos);
|
|
|
|
gas_anqp_set_len(buf);
|
|
|
|
return buf;
|
|
}
|
|
|
|
|
|
int hs20_anqp_send_req(struct wpa_supplicant *wpa_s, const u8 *dst, u32 stypes,
|
|
const u8 *payload, size_t payload_len)
|
|
{
|
|
struct wpabuf *buf;
|
|
int ret = 0;
|
|
int freq;
|
|
struct wpa_bss *bss;
|
|
int res;
|
|
|
|
freq = wpa_s->assoc_freq;
|
|
bss = wpa_bss_get_bssid(wpa_s, dst);
|
|
if (bss) {
|
|
wpa_bss_anqp_unshare_alloc(bss);
|
|
freq = bss->freq;
|
|
}
|
|
if (freq <= 0)
|
|
return -1;
|
|
|
|
wpa_printf(MSG_DEBUG, "HS20: ANQP Query Request to " MACSTR " for "
|
|
"subtypes 0x%x", MAC2STR(dst), stypes);
|
|
|
|
buf = hs20_build_anqp_req(stypes, payload, payload_len);
|
|
if (buf == NULL)
|
|
return -1;
|
|
|
|
res = gas_query_req(wpa_s->gas, dst, freq, buf, anqp_resp_cb, wpa_s);
|
|
if (res < 0) {
|
|
wpa_printf(MSG_DEBUG, "ANQP: Failed to send Query Request");
|
|
ret = -1;
|
|
} else
|
|
wpa_printf(MSG_DEBUG, "ANQP: Query started with dialog token "
|
|
"%u", res);
|
|
|
|
wpabuf_free(buf);
|
|
return ret;
|
|
}
|
|
|
|
|
|
void hs20_parse_rx_hs20_anqp_resp(struct wpa_supplicant *wpa_s,
|
|
const u8 *sa, const u8 *data, size_t slen)
|
|
{
|
|
const u8 *pos = data;
|
|
u8 subtype;
|
|
struct wpa_bss *bss = wpa_bss_get_bssid(wpa_s, sa);
|
|
struct wpa_bss_anqp *anqp = NULL;
|
|
|
|
if (slen < 2)
|
|
return;
|
|
|
|
if (bss)
|
|
anqp = bss->anqp;
|
|
|
|
subtype = *pos++;
|
|
slen--;
|
|
|
|
pos++; /* Reserved */
|
|
slen--;
|
|
|
|
switch (subtype) {
|
|
case HS20_STYPE_CAPABILITY_LIST:
|
|
wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
|
" HS Capability List", MAC2STR(sa));
|
|
wpa_hexdump_ascii(MSG_DEBUG, "HS Capability List", pos, slen);
|
|
break;
|
|
case HS20_STYPE_OPERATOR_FRIENDLY_NAME:
|
|
wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
|
" Operator Friendly Name", MAC2STR(sa));
|
|
wpa_hexdump_ascii(MSG_DEBUG, "oper friendly name", pos, slen);
|
|
if (anqp) {
|
|
wpabuf_free(anqp->hs20_operator_friendly_name);
|
|
anqp->hs20_operator_friendly_name =
|
|
wpabuf_alloc_copy(pos, slen);
|
|
}
|
|
break;
|
|
case HS20_STYPE_WAN_METRICS:
|
|
wpa_hexdump(MSG_DEBUG, "WAN Metrics", pos, slen);
|
|
if (slen < 13) {
|
|
wpa_dbg(wpa_s, MSG_DEBUG, "HS 2.0: Too short WAN "
|
|
"Metrics value from " MACSTR, MAC2STR(sa));
|
|
break;
|
|
}
|
|
wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
|
" WAN Metrics %02x:%u:%u:%u:%u:%u", MAC2STR(sa),
|
|
pos[0], WPA_GET_LE32(pos + 1), WPA_GET_LE32(pos + 5),
|
|
pos[9], pos[10], WPA_GET_LE16(pos + 11));
|
|
if (anqp) {
|
|
wpabuf_free(anqp->hs20_wan_metrics);
|
|
anqp->hs20_wan_metrics = wpabuf_alloc_copy(pos, slen);
|
|
}
|
|
break;
|
|
case HS20_STYPE_CONNECTION_CAPABILITY:
|
|
wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
|
" Connection Capability", MAC2STR(sa));
|
|
wpa_hexdump_ascii(MSG_DEBUG, "conn capability", pos, slen);
|
|
if (anqp) {
|
|
wpabuf_free(anqp->hs20_connection_capability);
|
|
anqp->hs20_connection_capability =
|
|
wpabuf_alloc_copy(pos, slen);
|
|
}
|
|
break;
|
|
case HS20_STYPE_OPERATING_CLASS:
|
|
wpa_msg(wpa_s, MSG_INFO, "RX-HS20-ANQP " MACSTR
|
|
" Operating Class", MAC2STR(sa));
|
|
wpa_hexdump_ascii(MSG_DEBUG, "Operating Class", pos, slen);
|
|
if (anqp) {
|
|
wpabuf_free(anqp->hs20_operating_class);
|
|
anqp->hs20_operating_class =
|
|
wpabuf_alloc_copy(pos, slen);
|
|
}
|
|
break;
|
|
default:
|
|
wpa_printf(MSG_DEBUG, "HS20: Unsupported subtype %u", subtype);
|
|
break;
|
|
}
|
|
}
|