mesh_mpm.c 26 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033
  1. /*
  2. * WPA Supplicant - Basic mesh peer management
  3. * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "common/ieee802_11_defs.h"
  12. #include "ap/hostapd.h"
  13. #include "ap/sta_info.h"
  14. #include "ap/ieee802_11.h"
  15. #include "wpa_supplicant_i.h"
  16. #include "driver_i.h"
  17. #include "mesh_mpm.h"
  18. #include "mesh_rsn.h"
  19. struct mesh_peer_mgmt_ie {
  20. const u8 *proto_id;
  21. const u8 *llid;
  22. const u8 *plid;
  23. const u8 *reason;
  24. const u8 *pmk;
  25. };
  26. static void plink_timer(void *eloop_ctx, void *user_data);
  27. enum plink_event {
  28. PLINK_UNDEFINED,
  29. OPN_ACPT,
  30. OPN_RJCT,
  31. OPN_IGNR,
  32. CNF_ACPT,
  33. CNF_RJCT,
  34. CNF_IGNR,
  35. CLS_ACPT,
  36. CLS_IGNR
  37. };
  38. static const char * const mplstate[] = {
  39. [PLINK_LISTEN] = "LISTEN",
  40. [PLINK_OPEN_SENT] = "OPEN_SENT",
  41. [PLINK_OPEN_RCVD] = "OPEN_RCVD",
  42. [PLINK_CNF_RCVD] = "CNF_RCVD",
  43. [PLINK_ESTAB] = "ESTAB",
  44. [PLINK_HOLDING] = "HOLDING",
  45. [PLINK_BLOCKED] = "BLOCKED"
  46. };
  47. static const char * const mplevent[] = {
  48. [PLINK_UNDEFINED] = "UNDEFINED",
  49. [OPN_ACPT] = "OPN_ACPT",
  50. [OPN_RJCT] = "OPN_RJCT",
  51. [OPN_IGNR] = "OPN_IGNR",
  52. [CNF_ACPT] = "CNF_ACPT",
  53. [CNF_RJCT] = "CNF_RJCT",
  54. [CNF_IGNR] = "CNF_IGNR",
  55. [CLS_ACPT] = "CLS_ACPT",
  56. [CLS_IGNR] = "CLS_IGNR"
  57. };
  58. static int mesh_mpm_parse_peer_mgmt(struct wpa_supplicant *wpa_s,
  59. u8 action_field,
  60. const u8 *ie, size_t len,
  61. struct mesh_peer_mgmt_ie *mpm_ie)
  62. {
  63. os_memset(mpm_ie, 0, sizeof(*mpm_ie));
  64. /* remove optional PMK at end */
  65. if (len >= 16) {
  66. len -= 16;
  67. mpm_ie->pmk = ie + len - 16;
  68. }
  69. if ((action_field == PLINK_OPEN && len != 4) ||
  70. (action_field == PLINK_CONFIRM && len != 6) ||
  71. (action_field == PLINK_CLOSE && len != 6 && len != 8)) {
  72. wpa_msg(wpa_s, MSG_DEBUG, "MPM: Invalid peer mgmt ie");
  73. return -1;
  74. }
  75. /* required fields */
  76. if (len < 4)
  77. return -1;
  78. mpm_ie->proto_id = ie;
  79. mpm_ie->llid = ie + 2;
  80. ie += 4;
  81. len -= 4;
  82. /* close reason is always present at end for close */
  83. if (action_field == PLINK_CLOSE) {
  84. if (len < 2)
  85. return -1;
  86. mpm_ie->reason = ie + len - 2;
  87. len -= 2;
  88. }
  89. /* plid, present for confirm, and possibly close */
  90. if (len)
  91. mpm_ie->plid = ie;
  92. return 0;
  93. }
  94. static int plink_free_count(struct hostapd_data *hapd)
  95. {
  96. if (hapd->max_plinks > hapd->num_plinks)
  97. return hapd->max_plinks - hapd->num_plinks;
  98. return 0;
  99. }
  100. static u16 copy_supp_rates(struct wpa_supplicant *wpa_s,
  101. struct sta_info *sta,
  102. struct ieee802_11_elems *elems)
  103. {
  104. if (!elems->supp_rates) {
  105. wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR,
  106. MAC2STR(sta->addr));
  107. return WLAN_STATUS_UNSPECIFIED_FAILURE;
  108. }
  109. if (elems->supp_rates_len + elems->ext_supp_rates_len >
  110. sizeof(sta->supported_rates)) {
  111. wpa_msg(wpa_s, MSG_ERROR,
  112. "Invalid supported rates element length " MACSTR
  113. " %d+%d", MAC2STR(sta->addr), elems->supp_rates_len,
  114. elems->ext_supp_rates_len);
  115. return WLAN_STATUS_UNSPECIFIED_FAILURE;
  116. }
  117. sta->supported_rates_len = merge_byte_arrays(
  118. sta->supported_rates, sizeof(sta->supported_rates),
  119. elems->supp_rates, elems->supp_rates_len,
  120. elems->ext_supp_rates, elems->ext_supp_rates_len);
  121. return WLAN_STATUS_SUCCESS;
  122. }
  123. /* return true if elems from a neighbor match this MBSS */
  124. static Boolean matches_local(struct wpa_supplicant *wpa_s,
  125. struct ieee802_11_elems *elems)
  126. {
  127. struct mesh_conf *mconf = wpa_s->ifmsh->mconf;
  128. if (elems->mesh_config_len < 5)
  129. return FALSE;
  130. return (mconf->meshid_len == elems->mesh_id_len &&
  131. os_memcmp(mconf->meshid, elems->mesh_id,
  132. elems->mesh_id_len) == 0 &&
  133. mconf->mesh_pp_id == elems->mesh_config[0] &&
  134. mconf->mesh_pm_id == elems->mesh_config[1] &&
  135. mconf->mesh_cc_id == elems->mesh_config[2] &&
  136. mconf->mesh_sp_id == elems->mesh_config[3] &&
  137. mconf->mesh_auth_id == elems->mesh_config[4]);
  138. }
  139. /* check if local link id is already used with another peer */
  140. static Boolean llid_in_use(struct wpa_supplicant *wpa_s, u16 llid)
  141. {
  142. struct sta_info *sta;
  143. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  144. for (sta = hapd->sta_list; sta; sta = sta->next) {
  145. if (sta->my_lid == llid)
  146. return TRUE;
  147. }
  148. return FALSE;
  149. }
  150. /* generate an llid for a link and set to initial state */
  151. static void mesh_mpm_init_link(struct wpa_supplicant *wpa_s,
  152. struct sta_info *sta)
  153. {
  154. u16 llid;
  155. do {
  156. if (os_get_random((u8 *) &llid, sizeof(llid)) < 0)
  157. continue;
  158. } while (!llid || llid_in_use(wpa_s, llid));
  159. sta->my_lid = llid;
  160. sta->peer_lid = 0;
  161. /*
  162. * We do not use wpa_mesh_set_plink_state() here because there is no
  163. * entry in kernel yet.
  164. */
  165. sta->plink_state = PLINK_LISTEN;
  166. }
  167. static void mesh_mpm_send_plink_action(struct wpa_supplicant *wpa_s,
  168. struct sta_info *sta,
  169. enum plink_action_field type,
  170. u16 close_reason)
  171. {
  172. struct wpabuf *buf;
  173. struct hostapd_iface *ifmsh = wpa_s->ifmsh;
  174. struct hostapd_data *bss = ifmsh->bss[0];
  175. struct mesh_conf *conf = ifmsh->mconf;
  176. u8 supp_rates[2 + 2 + 32];
  177. #ifdef CONFIG_IEEE80211N
  178. u8 ht_capa_oper[2 + 26 + 2 + 22];
  179. #endif /* CONFIG_IEEE80211N */
  180. u8 *pos, *cat;
  181. u8 ie_len, add_plid = 0;
  182. int ret;
  183. int ampe = conf->security & MESH_CONF_SEC_AMPE;
  184. size_t buf_len;
  185. if (!sta)
  186. return;
  187. buf_len = 2 + /* capability info */
  188. 2 + /* AID */
  189. 2 + 8 + /* supported rates */
  190. 2 + (32 - 8) +
  191. 2 + 32 + /* mesh ID */
  192. 2 + 7 + /* mesh config */
  193. 2 + 23 + /* peering management */
  194. 2 + 96 + /* AMPE */
  195. 2 + 16; /* MIC */
  196. #ifdef CONFIG_IEEE80211N
  197. if (type != PLINK_CLOSE && wpa_s->mesh_ht_enabled) {
  198. buf_len += 2 + 26 + /* HT capabilities */
  199. 2 + 22; /* HT operation */
  200. }
  201. #endif /* CONFIG_IEEE80211N */
  202. buf = wpabuf_alloc(buf_len);
  203. if (!buf)
  204. return;
  205. cat = wpabuf_mhead_u8(buf);
  206. wpabuf_put_u8(buf, WLAN_ACTION_SELF_PROTECTED);
  207. wpabuf_put_u8(buf, type);
  208. if (type != PLINK_CLOSE) {
  209. u8 info;
  210. /* capability info */
  211. wpabuf_put_le16(buf, ampe ? IEEE80211_CAP_PRIVACY : 0);
  212. /* aid */
  213. if (type == PLINK_CONFIRM)
  214. wpabuf_put_le16(buf, sta->peer_lid);
  215. /* IE: supp + ext. supp rates */
  216. pos = hostapd_eid_supp_rates(bss, supp_rates);
  217. pos = hostapd_eid_ext_supp_rates(bss, pos);
  218. wpabuf_put_data(buf, supp_rates, pos - supp_rates);
  219. /* IE: Mesh ID */
  220. wpabuf_put_u8(buf, WLAN_EID_MESH_ID);
  221. wpabuf_put_u8(buf, conf->meshid_len);
  222. wpabuf_put_data(buf, conf->meshid, conf->meshid_len);
  223. /* IE: mesh conf */
  224. wpabuf_put_u8(buf, WLAN_EID_MESH_CONFIG);
  225. wpabuf_put_u8(buf, 7);
  226. wpabuf_put_u8(buf, conf->mesh_pp_id);
  227. wpabuf_put_u8(buf, conf->mesh_pm_id);
  228. wpabuf_put_u8(buf, conf->mesh_cc_id);
  229. wpabuf_put_u8(buf, conf->mesh_sp_id);
  230. wpabuf_put_u8(buf, conf->mesh_auth_id);
  231. info = (bss->num_plinks > 63 ? 63 : bss->num_plinks) << 1;
  232. /* TODO: Add Connected to Mesh Gate/AS subfields */
  233. wpabuf_put_u8(buf, info);
  234. /* always forwarding & accepting plinks for now */
  235. wpabuf_put_u8(buf, 0x1 | 0x8);
  236. } else { /* Peer closing frame */
  237. /* IE: Mesh ID */
  238. wpabuf_put_u8(buf, WLAN_EID_MESH_ID);
  239. wpabuf_put_u8(buf, conf->meshid_len);
  240. wpabuf_put_data(buf, conf->meshid, conf->meshid_len);
  241. }
  242. /* IE: Mesh Peering Management element */
  243. ie_len = 4;
  244. if (ampe)
  245. ie_len += PMKID_LEN;
  246. switch (type) {
  247. case PLINK_OPEN:
  248. break;
  249. case PLINK_CONFIRM:
  250. ie_len += 2;
  251. add_plid = 1;
  252. break;
  253. case PLINK_CLOSE:
  254. ie_len += 2;
  255. add_plid = 1;
  256. ie_len += 2; /* reason code */
  257. break;
  258. }
  259. wpabuf_put_u8(buf, WLAN_EID_PEER_MGMT);
  260. wpabuf_put_u8(buf, ie_len);
  261. /* peering protocol */
  262. if (ampe)
  263. wpabuf_put_le16(buf, 1);
  264. else
  265. wpabuf_put_le16(buf, 0);
  266. wpabuf_put_le16(buf, sta->my_lid);
  267. if (add_plid)
  268. wpabuf_put_le16(buf, sta->peer_lid);
  269. if (type == PLINK_CLOSE)
  270. wpabuf_put_le16(buf, close_reason);
  271. if (ampe) {
  272. if (sta->sae == NULL) {
  273. wpa_msg(wpa_s, MSG_INFO, "Mesh MPM: no SAE session");
  274. goto fail;
  275. }
  276. mesh_rsn_get_pmkid(wpa_s->mesh_rsn, sta,
  277. wpabuf_put(buf, PMKID_LEN));
  278. }
  279. #ifdef CONFIG_IEEE80211N
  280. if (type != PLINK_CLOSE && wpa_s->mesh_ht_enabled) {
  281. pos = hostapd_eid_ht_capabilities(bss, ht_capa_oper);
  282. pos = hostapd_eid_ht_operation(bss, pos);
  283. wpabuf_put_data(buf, ht_capa_oper, pos - ht_capa_oper);
  284. }
  285. #endif /* CONFIG_IEEE80211N */
  286. if (ampe && mesh_rsn_protect_frame(wpa_s->mesh_rsn, sta, cat, buf)) {
  287. wpa_msg(wpa_s, MSG_INFO,
  288. "Mesh MPM: failed to add AMPE and MIC IE");
  289. goto fail;
  290. }
  291. ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0,
  292. sta->addr, wpa_s->own_addr, wpa_s->own_addr,
  293. wpabuf_head(buf), wpabuf_len(buf), 0);
  294. if (ret < 0)
  295. wpa_msg(wpa_s, MSG_INFO,
  296. "Mesh MPM: failed to send peering frame");
  297. fail:
  298. wpabuf_free(buf);
  299. }
  300. /* configure peering state in ours and driver's station entry */
  301. void wpa_mesh_set_plink_state(struct wpa_supplicant *wpa_s,
  302. struct sta_info *sta,
  303. enum mesh_plink_state state)
  304. {
  305. struct hostapd_sta_add_params params;
  306. int ret;
  307. sta->plink_state = state;
  308. os_memset(&params, 0, sizeof(params));
  309. params.addr = sta->addr;
  310. params.plink_state = state;
  311. params.set = 1;
  312. wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " into %s",
  313. MAC2STR(sta->addr), mplstate[state]);
  314. ret = wpa_drv_sta_add(wpa_s, &params);
  315. if (ret) {
  316. wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR
  317. ": %d", MAC2STR(sta->addr), ret);
  318. }
  319. }
  320. static void mesh_mpm_fsm_restart(struct wpa_supplicant *wpa_s,
  321. struct sta_info *sta)
  322. {
  323. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  324. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  325. if (sta->mpm_close_reason == WLAN_REASON_MESH_CLOSE_RCVD) {
  326. ap_free_sta(hapd, sta);
  327. return;
  328. }
  329. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_LISTEN);
  330. sta->my_lid = sta->peer_lid = sta->mpm_close_reason = 0;
  331. sta->mpm_retries = 0;
  332. }
  333. static void plink_timer(void *eloop_ctx, void *user_data)
  334. {
  335. struct wpa_supplicant *wpa_s = eloop_ctx;
  336. struct sta_info *sta = user_data;
  337. u16 reason = 0;
  338. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  339. switch (sta->plink_state) {
  340. case PLINK_OPEN_RCVD:
  341. case PLINK_OPEN_SENT:
  342. /* retry timer */
  343. if (sta->mpm_retries < conf->dot11MeshMaxRetries) {
  344. eloop_register_timeout(
  345. conf->dot11MeshRetryTimeout / 1000,
  346. (conf->dot11MeshRetryTimeout % 1000) * 1000,
  347. plink_timer, wpa_s, sta);
  348. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_OPEN, 0);
  349. sta->mpm_retries++;
  350. break;
  351. }
  352. reason = WLAN_REASON_MESH_MAX_RETRIES;
  353. /* fall through on else */
  354. case PLINK_CNF_RCVD:
  355. /* confirm timer */
  356. if (!reason)
  357. reason = WLAN_REASON_MESH_CONFIRM_TIMEOUT;
  358. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  359. eloop_register_timeout(conf->dot11MeshHoldingTimeout / 1000,
  360. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  361. plink_timer, wpa_s, sta);
  362. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason);
  363. break;
  364. case PLINK_HOLDING:
  365. /* holding timer */
  366. mesh_mpm_fsm_restart(wpa_s, sta);
  367. break;
  368. default:
  369. break;
  370. }
  371. }
  372. /* initiate peering with station */
  373. static void
  374. mesh_mpm_plink_open(struct wpa_supplicant *wpa_s, struct sta_info *sta,
  375. enum mesh_plink_state next_state)
  376. {
  377. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  378. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  379. eloop_register_timeout(conf->dot11MeshRetryTimeout / 1000,
  380. (conf->dot11MeshRetryTimeout % 1000) * 1000,
  381. plink_timer, wpa_s, sta);
  382. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_OPEN, 0);
  383. wpa_mesh_set_plink_state(wpa_s, sta, next_state);
  384. }
  385. int mesh_mpm_plink_close(struct hostapd_data *hapd,
  386. struct sta_info *sta, void *ctx)
  387. {
  388. struct wpa_supplicant *wpa_s = ctx;
  389. int reason = WLAN_REASON_MESH_PEERING_CANCELLED;
  390. if (sta) {
  391. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  392. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason);
  393. wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR,
  394. MAC2STR(sta->addr));
  395. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  396. return 0;
  397. }
  398. return 1;
  399. }
  400. void mesh_mpm_deinit(struct wpa_supplicant *wpa_s, struct hostapd_iface *ifmsh)
  401. {
  402. struct hostapd_data *hapd = ifmsh->bss[0];
  403. /* notify peers we're leaving */
  404. ap_for_each_sta(hapd, mesh_mpm_plink_close, wpa_s);
  405. hapd->num_plinks = 0;
  406. hostapd_free_stas(hapd);
  407. }
  408. /* for mesh_rsn to indicate this peer has completed authentication, and we're
  409. * ready to start AMPE */
  410. void mesh_mpm_auth_peer(struct wpa_supplicant *wpa_s, const u8 *addr)
  411. {
  412. struct hostapd_data *data = wpa_s->ifmsh->bss[0];
  413. struct hostapd_sta_add_params params;
  414. struct sta_info *sta;
  415. int ret;
  416. sta = ap_get_sta(data, addr);
  417. if (!sta) {
  418. wpa_msg(wpa_s, MSG_DEBUG, "no such mesh peer");
  419. return;
  420. }
  421. /* TODO: Should do nothing if this STA is already authenticated, but
  422. * the AP code already sets this flag. */
  423. sta->flags |= WLAN_STA_AUTH;
  424. mesh_rsn_init_ampe_sta(wpa_s, sta);
  425. os_memset(&params, 0, sizeof(params));
  426. params.addr = sta->addr;
  427. params.flags = WPA_STA_AUTHENTICATED | WPA_STA_AUTHORIZED;
  428. params.set = 1;
  429. wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR,
  430. MAC2STR(sta->addr));
  431. ret = wpa_drv_sta_add(wpa_s, &params);
  432. if (ret) {
  433. wpa_msg(wpa_s, MSG_ERROR,
  434. "Driver failed to set " MACSTR ": %d",
  435. MAC2STR(sta->addr), ret);
  436. }
  437. if (!sta->my_lid)
  438. mesh_mpm_init_link(wpa_s, sta);
  439. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPEN_SENT);
  440. }
  441. void wpa_mesh_new_mesh_peer(struct wpa_supplicant *wpa_s, const u8 *addr,
  442. struct ieee802_11_elems *elems)
  443. {
  444. struct hostapd_sta_add_params params;
  445. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  446. struct hostapd_data *data = wpa_s->ifmsh->bss[0];
  447. struct sta_info *sta;
  448. struct wpa_ssid *ssid = wpa_s->current_ssid;
  449. int ret = 0;
  450. sta = ap_get_sta(data, addr);
  451. if (!sta) {
  452. sta = ap_sta_add(data, addr);
  453. if (!sta)
  454. return;
  455. }
  456. /* initialize sta */
  457. if (copy_supp_rates(wpa_s, sta, elems))
  458. return;
  459. mesh_mpm_init_link(wpa_s, sta);
  460. #ifdef CONFIG_IEEE80211N
  461. copy_sta_ht_capab(data, sta, elems->ht_capabilities,
  462. elems->ht_capabilities_len);
  463. update_ht_state(data, sta);
  464. #endif /* CONFIG_IEEE80211N */
  465. /* insert into driver */
  466. os_memset(&params, 0, sizeof(params));
  467. params.supp_rates = sta->supported_rates;
  468. params.supp_rates_len = sta->supported_rates_len;
  469. params.addr = addr;
  470. params.plink_state = sta->plink_state;
  471. params.aid = sta->peer_lid;
  472. params.listen_interval = 100;
  473. params.ht_capabilities = sta->ht_capabilities;
  474. params.flags |= WPA_STA_WMM;
  475. params.flags_mask |= WPA_STA_AUTHENTICATED;
  476. if (conf->security == MESH_CONF_SEC_NONE) {
  477. params.flags |= WPA_STA_AUTHORIZED;
  478. params.flags |= WPA_STA_AUTHENTICATED;
  479. } else {
  480. sta->flags |= WLAN_STA_MFP;
  481. params.flags |= WPA_STA_MFP;
  482. }
  483. ret = wpa_drv_sta_add(wpa_s, &params);
  484. if (ret) {
  485. wpa_msg(wpa_s, MSG_ERROR,
  486. "Driver failed to insert " MACSTR ": %d",
  487. MAC2STR(addr), ret);
  488. return;
  489. }
  490. if (ssid && ssid->no_auto_peer) {
  491. wpa_msg(wpa_s, MSG_INFO, "will not initiate new peer link with "
  492. MACSTR " because of no_auto_peer", MAC2STR(addr));
  493. if (data->mesh_pending_auth) {
  494. struct os_reltime age;
  495. const struct ieee80211_mgmt *mgmt;
  496. struct hostapd_frame_info fi;
  497. mgmt = wpabuf_head(data->mesh_pending_auth);
  498. os_reltime_age(&data->mesh_pending_auth_time, &age);
  499. if (age.sec < 2 &&
  500. os_memcmp(mgmt->sa, addr, ETH_ALEN) == 0) {
  501. wpa_printf(MSG_DEBUG,
  502. "mesh: Process pending Authentication frame from %u.%06u seconds ago",
  503. (unsigned int) age.sec,
  504. (unsigned int) age.usec);
  505. os_memset(&fi, 0, sizeof(fi));
  506. ieee802_11_mgmt(
  507. data,
  508. wpabuf_head(data->mesh_pending_auth),
  509. wpabuf_len(data->mesh_pending_auth),
  510. &fi);
  511. }
  512. wpabuf_free(data->mesh_pending_auth);
  513. data->mesh_pending_auth = NULL;
  514. }
  515. return;
  516. }
  517. if (conf->security == MESH_CONF_SEC_NONE)
  518. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPEN_SENT);
  519. else
  520. mesh_rsn_auth_sae_sta(wpa_s, sta);
  521. }
  522. void mesh_mpm_mgmt_rx(struct wpa_supplicant *wpa_s, struct rx_mgmt *rx_mgmt)
  523. {
  524. struct hostapd_frame_info fi;
  525. os_memset(&fi, 0, sizeof(fi));
  526. fi.datarate = rx_mgmt->datarate;
  527. fi.ssi_signal = rx_mgmt->ssi_signal;
  528. ieee802_11_mgmt(wpa_s->ifmsh->bss[0], rx_mgmt->frame,
  529. rx_mgmt->frame_len, &fi);
  530. }
  531. static void mesh_mpm_plink_estab(struct wpa_supplicant *wpa_s,
  532. struct sta_info *sta)
  533. {
  534. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  535. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  536. u8 seq[6] = {};
  537. wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR " established",
  538. MAC2STR(sta->addr));
  539. if (conf->security & MESH_CONF_SEC_AMPE) {
  540. wpa_drv_set_key(wpa_s, WPA_ALG_CCMP, sta->addr, 0, 0,
  541. seq, sizeof(seq), sta->mtk, sizeof(sta->mtk));
  542. wpa_drv_set_key(wpa_s, WPA_ALG_CCMP, sta->addr, 1, 0,
  543. seq, sizeof(seq),
  544. sta->mgtk, sizeof(sta->mgtk));
  545. wpa_drv_set_key(wpa_s, WPA_ALG_IGTK, sta->addr, 4, 0,
  546. seq, sizeof(seq),
  547. sta->mgtk, sizeof(sta->mgtk));
  548. wpa_hexdump_key(MSG_DEBUG, "mtk:", sta->mtk, sizeof(sta->mtk));
  549. wpa_hexdump_key(MSG_DEBUG, "mgtk:",
  550. sta->mgtk, sizeof(sta->mgtk));
  551. }
  552. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_ESTAB);
  553. hapd->num_plinks++;
  554. sta->flags |= WLAN_STA_ASSOC;
  555. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  556. /* Send ctrl event */
  557. wpa_msg_ctrl(wpa_s, MSG_INFO, MESH_PEER_CONNECTED MACSTR,
  558. MAC2STR(sta->addr));
  559. }
  560. static void mesh_mpm_fsm(struct wpa_supplicant *wpa_s, struct sta_info *sta,
  561. enum plink_event event)
  562. {
  563. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  564. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  565. u16 reason = 0;
  566. wpa_msg(wpa_s, MSG_DEBUG, "MPM " MACSTR " state %s event %s",
  567. MAC2STR(sta->addr), mplstate[sta->plink_state],
  568. mplevent[event]);
  569. switch (sta->plink_state) {
  570. case PLINK_LISTEN:
  571. switch (event) {
  572. case CLS_ACPT:
  573. mesh_mpm_fsm_restart(wpa_s, sta);
  574. break;
  575. case OPN_ACPT:
  576. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPEN_RCVD);
  577. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CONFIRM,
  578. 0);
  579. break;
  580. default:
  581. break;
  582. }
  583. break;
  584. case PLINK_OPEN_SENT:
  585. switch (event) {
  586. case OPN_RJCT:
  587. case CNF_RJCT:
  588. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  589. /* fall-through */
  590. case CLS_ACPT:
  591. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  592. if (!reason)
  593. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  594. eloop_register_timeout(
  595. conf->dot11MeshHoldingTimeout / 1000,
  596. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  597. plink_timer, wpa_s, sta);
  598. mesh_mpm_send_plink_action(wpa_s, sta,
  599. PLINK_CLOSE, reason);
  600. break;
  601. case OPN_ACPT:
  602. /* retry timer is left untouched */
  603. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_OPEN_RCVD);
  604. mesh_mpm_send_plink_action(wpa_s, sta,
  605. PLINK_CONFIRM, 0);
  606. break;
  607. case CNF_ACPT:
  608. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_CNF_RCVD);
  609. eloop_register_timeout(
  610. conf->dot11MeshConfirmTimeout / 1000,
  611. (conf->dot11MeshConfirmTimeout % 1000) * 1000,
  612. plink_timer, wpa_s, sta);
  613. break;
  614. default:
  615. break;
  616. }
  617. break;
  618. case PLINK_OPEN_RCVD:
  619. switch (event) {
  620. case OPN_RJCT:
  621. case CNF_RJCT:
  622. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  623. /* fall-through */
  624. case CLS_ACPT:
  625. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  626. if (!reason)
  627. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  628. eloop_register_timeout(
  629. conf->dot11MeshHoldingTimeout / 1000,
  630. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  631. plink_timer, wpa_s, sta);
  632. sta->mpm_close_reason = reason;
  633. mesh_mpm_send_plink_action(wpa_s, sta,
  634. PLINK_CLOSE, reason);
  635. break;
  636. case OPN_ACPT:
  637. mesh_mpm_send_plink_action(wpa_s, sta,
  638. PLINK_CONFIRM, 0);
  639. break;
  640. case CNF_ACPT:
  641. if (conf->security & MESH_CONF_SEC_AMPE)
  642. mesh_rsn_derive_mtk(wpa_s, sta);
  643. mesh_mpm_plink_estab(wpa_s, sta);
  644. break;
  645. default:
  646. break;
  647. }
  648. break;
  649. case PLINK_CNF_RCVD:
  650. switch (event) {
  651. case OPN_RJCT:
  652. case CNF_RJCT:
  653. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  654. /* fall-through */
  655. case CLS_ACPT:
  656. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  657. if (!reason)
  658. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  659. eloop_register_timeout(
  660. conf->dot11MeshHoldingTimeout / 1000,
  661. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  662. plink_timer, wpa_s, sta);
  663. sta->mpm_close_reason = reason;
  664. mesh_mpm_send_plink_action(wpa_s, sta,
  665. PLINK_CLOSE, reason);
  666. break;
  667. case OPN_ACPT:
  668. mesh_mpm_plink_estab(wpa_s, sta);
  669. mesh_mpm_send_plink_action(wpa_s, sta,
  670. PLINK_CONFIRM, 0);
  671. break;
  672. default:
  673. break;
  674. }
  675. break;
  676. case PLINK_ESTAB:
  677. switch (event) {
  678. case CLS_ACPT:
  679. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  680. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  681. eloop_register_timeout(
  682. conf->dot11MeshHoldingTimeout / 1000,
  683. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  684. plink_timer, wpa_s, sta);
  685. sta->mpm_close_reason = reason;
  686. wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR
  687. " closed with reason %d",
  688. MAC2STR(sta->addr), reason);
  689. wpa_msg_ctrl(wpa_s, MSG_INFO,
  690. MESH_PEER_DISCONNECTED MACSTR,
  691. MAC2STR(sta->addr));
  692. hapd->num_plinks--;
  693. mesh_mpm_send_plink_action(wpa_s, sta,
  694. PLINK_CLOSE, reason);
  695. break;
  696. case OPN_ACPT:
  697. mesh_mpm_send_plink_action(wpa_s, sta,
  698. PLINK_CONFIRM, 0);
  699. break;
  700. default:
  701. break;
  702. }
  703. break;
  704. case PLINK_HOLDING:
  705. switch (event) {
  706. case CLS_ACPT:
  707. mesh_mpm_fsm_restart(wpa_s, sta);
  708. break;
  709. case OPN_ACPT:
  710. case CNF_ACPT:
  711. case OPN_RJCT:
  712. case CNF_RJCT:
  713. reason = sta->mpm_close_reason;
  714. mesh_mpm_send_plink_action(wpa_s, sta,
  715. PLINK_CLOSE, reason);
  716. break;
  717. default:
  718. break;
  719. }
  720. break;
  721. default:
  722. wpa_msg(wpa_s, MSG_DEBUG,
  723. "Unsupported MPM event %s for state %s",
  724. mplevent[event], mplstate[sta->plink_state]);
  725. break;
  726. }
  727. }
  728. void mesh_mpm_action_rx(struct wpa_supplicant *wpa_s,
  729. const struct ieee80211_mgmt *mgmt, size_t len)
  730. {
  731. u8 action_field;
  732. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  733. struct mesh_conf *mconf = wpa_s->ifmsh->mconf;
  734. struct sta_info *sta;
  735. u16 plid = 0, llid = 0;
  736. enum plink_event event;
  737. struct ieee802_11_elems elems;
  738. struct mesh_peer_mgmt_ie peer_mgmt_ie;
  739. const u8 *ies;
  740. size_t ie_len;
  741. int ret;
  742. if (mgmt->u.action.category != WLAN_ACTION_SELF_PROTECTED)
  743. return;
  744. action_field = mgmt->u.action.u.slf_prot_action.action;
  745. if (action_field != PLINK_OPEN &&
  746. action_field != PLINK_CONFIRM &&
  747. action_field != PLINK_CLOSE)
  748. return;
  749. ies = mgmt->u.action.u.slf_prot_action.variable;
  750. ie_len = (const u8 *) mgmt + len -
  751. mgmt->u.action.u.slf_prot_action.variable;
  752. /* at least expect mesh id and peering mgmt */
  753. if (ie_len < 2 + 2) {
  754. wpa_printf(MSG_DEBUG,
  755. "MPM: Ignore too short action frame %u ie_len %u",
  756. action_field, (unsigned int) ie_len);
  757. return;
  758. }
  759. wpa_printf(MSG_DEBUG, "MPM: Received PLINK action %u", action_field);
  760. if (action_field == PLINK_OPEN || action_field == PLINK_CONFIRM) {
  761. wpa_printf(MSG_DEBUG, "MPM: Capability 0x%x",
  762. WPA_GET_LE16(ies));
  763. ies += 2; /* capability */
  764. ie_len -= 2;
  765. }
  766. if (action_field == PLINK_CONFIRM) {
  767. wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", WPA_GET_LE16(ies));
  768. ies += 2; /* aid */
  769. ie_len -= 2;
  770. }
  771. /* check for mesh peering, mesh id and mesh config IEs */
  772. if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) {
  773. wpa_printf(MSG_DEBUG, "MPM: Failed to parse PLINK IEs");
  774. return;
  775. }
  776. if (!elems.peer_mgmt) {
  777. wpa_printf(MSG_DEBUG,
  778. "MPM: No Mesh Peering Management element");
  779. return;
  780. }
  781. if (action_field != PLINK_CLOSE) {
  782. if (!elems.mesh_id || !elems.mesh_config) {
  783. wpa_printf(MSG_DEBUG,
  784. "MPM: No Mesh ID or Mesh Configuration element");
  785. return;
  786. }
  787. if (!matches_local(wpa_s, &elems)) {
  788. wpa_printf(MSG_DEBUG,
  789. "MPM: Mesh ID or Mesh Configuration element do not match local MBSS");
  790. return;
  791. }
  792. }
  793. ret = mesh_mpm_parse_peer_mgmt(wpa_s, action_field,
  794. elems.peer_mgmt,
  795. elems.peer_mgmt_len,
  796. &peer_mgmt_ie);
  797. if (ret) {
  798. wpa_printf(MSG_DEBUG, "MPM: Mesh parsing rejected frame");
  799. return;
  800. }
  801. /* the sender's llid is our plid and vice-versa */
  802. plid = WPA_GET_LE16(peer_mgmt_ie.llid);
  803. if (peer_mgmt_ie.plid)
  804. llid = WPA_GET_LE16(peer_mgmt_ie.plid);
  805. wpa_printf(MSG_DEBUG, "MPM: plid=0x%x llid=0x%x", plid, llid);
  806. sta = ap_get_sta(hapd, mgmt->sa);
  807. if (!sta) {
  808. wpa_printf(MSG_DEBUG, "MPM: No STA entry for peer");
  809. return;
  810. }
  811. #ifdef CONFIG_SAE
  812. /* peer is in sae_accepted? */
  813. if (sta->sae && sta->sae->state != SAE_ACCEPTED) {
  814. wpa_printf(MSG_DEBUG, "MPM: SAE not yet accepted for peer");
  815. return;
  816. }
  817. #endif /* CONFIG_SAE */
  818. if (!sta->my_lid)
  819. mesh_mpm_init_link(wpa_s, sta);
  820. if ((mconf->security & MESH_CONF_SEC_AMPE) &&
  821. mesh_rsn_process_ampe(wpa_s, sta, &elems,
  822. &mgmt->u.action.category,
  823. ies, ie_len)) {
  824. wpa_printf(MSG_DEBUG, "MPM: RSN process rejected frame");
  825. return;
  826. }
  827. if (sta->plink_state == PLINK_BLOCKED) {
  828. wpa_printf(MSG_DEBUG, "MPM: PLINK_BLOCKED");
  829. return;
  830. }
  831. /* Now we will figure out the appropriate event... */
  832. switch (action_field) {
  833. case PLINK_OPEN:
  834. if (plink_free_count(hapd) == 0) {
  835. event = OPN_IGNR;
  836. wpa_printf(MSG_INFO,
  837. "MPM: Peer link num over quota(%d)",
  838. hapd->max_plinks);
  839. } else if (sta->peer_lid && sta->peer_lid != plid) {
  840. event = OPN_IGNR;
  841. } else {
  842. sta->peer_lid = plid;
  843. event = OPN_ACPT;
  844. }
  845. break;
  846. case PLINK_CONFIRM:
  847. if (plink_free_count(hapd) == 0) {
  848. event = CNF_IGNR;
  849. wpa_printf(MSG_INFO,
  850. "MPM: Peer link num over quota(%d)",
  851. hapd->max_plinks);
  852. } else if (sta->my_lid != llid ||
  853. (sta->peer_lid && sta->peer_lid != plid)) {
  854. event = CNF_IGNR;
  855. } else {
  856. if (!sta->peer_lid)
  857. sta->peer_lid = plid;
  858. event = CNF_ACPT;
  859. }
  860. break;
  861. case PLINK_CLOSE:
  862. if (sta->plink_state == PLINK_ESTAB)
  863. /* Do not check for llid or plid. This does not
  864. * follow the standard but since multiple plinks
  865. * per cand are not supported, it is necessary in
  866. * order to avoid a livelock when MP A sees an
  867. * establish peer link to MP B but MP B does not
  868. * see it. This can be caused by a timeout in
  869. * B's peer link establishment or B being
  870. * restarted.
  871. */
  872. event = CLS_ACPT;
  873. else if (sta->peer_lid != plid)
  874. event = CLS_IGNR;
  875. else if (peer_mgmt_ie.plid && sta->my_lid != llid)
  876. event = CLS_IGNR;
  877. else
  878. event = CLS_ACPT;
  879. break;
  880. default:
  881. /*
  882. * This cannot be hit due to the action_field check above, but
  883. * compilers may not be able to figure that out and can warn
  884. * about uninitialized event below.
  885. */
  886. return;
  887. }
  888. mesh_mpm_fsm(wpa_s, sta, event);
  889. }
  890. /* called by ap_free_sta */
  891. void mesh_mpm_free_sta(struct sta_info *sta)
  892. {
  893. eloop_cancel_timeout(plink_timer, ELOOP_ALL_CTX, sta);
  894. eloop_cancel_timeout(mesh_auth_timer, ELOOP_ALL_CTX, sta);
  895. }