mesh_mpm.c 33 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261
  1. /*
  2. * WPA Supplicant - Basic mesh peer management
  3. * Copyright (c) 2013-2014, cozybit, Inc. All rights reserved.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "common/ieee802_11_defs.h"
  12. #include "ap/hostapd.h"
  13. #include "ap/sta_info.h"
  14. #include "ap/ieee802_11.h"
  15. #include "ap/wpa_auth.h"
  16. #include "wpa_supplicant_i.h"
  17. #include "driver_i.h"
  18. #include "mesh_mpm.h"
  19. #include "mesh_rsn.h"
  20. struct mesh_peer_mgmt_ie {
  21. const u8 *proto_id; /* Mesh Peering Protocol Identifier (2 octets) */
  22. const u8 *llid; /* Local Link ID (2 octets) */
  23. const u8 *plid; /* Peer Link ID (conditional, 2 octets) */
  24. const u8 *reason; /* Reason Code (conditional, 2 octets) */
  25. const u8 *chosen_pmk; /* Chosen PMK (optional, 16 octets) */
  26. };
  27. static void plink_timer(void *eloop_ctx, void *user_data);
  28. enum plink_event {
  29. PLINK_UNDEFINED,
  30. OPN_ACPT,
  31. OPN_RJCT,
  32. CNF_ACPT,
  33. CNF_RJCT,
  34. CLS_ACPT,
  35. REQ_RJCT
  36. };
  37. static const char * const mplstate[] = {
  38. [0] = "UNINITIALIZED",
  39. [PLINK_IDLE] = "IDLE",
  40. [PLINK_OPN_SNT] = "OPN_SNT",
  41. [PLINK_OPN_RCVD] = "OPN_RCVD",
  42. [PLINK_CNF_RCVD] = "CNF_RCVD",
  43. [PLINK_ESTAB] = "ESTAB",
  44. [PLINK_HOLDING] = "HOLDING",
  45. [PLINK_BLOCKED] = "BLOCKED"
  46. };
  47. static const char * const mplevent[] = {
  48. [PLINK_UNDEFINED] = "UNDEFINED",
  49. [OPN_ACPT] = "OPN_ACPT",
  50. [OPN_RJCT] = "OPN_RJCT",
  51. [CNF_ACPT] = "CNF_ACPT",
  52. [CNF_RJCT] = "CNF_RJCT",
  53. [CLS_ACPT] = "CLS_ACPT",
  54. [REQ_RJCT] = "REQ_RJCT",
  55. };
  56. static int mesh_mpm_parse_peer_mgmt(struct wpa_supplicant *wpa_s,
  57. u8 action_field,
  58. const u8 *ie, size_t len,
  59. struct mesh_peer_mgmt_ie *mpm_ie)
  60. {
  61. os_memset(mpm_ie, 0, sizeof(*mpm_ie));
  62. /* Remove optional Chosen PMK field at end */
  63. if (len >= SAE_PMKID_LEN) {
  64. mpm_ie->chosen_pmk = ie + len - SAE_PMKID_LEN;
  65. len -= SAE_PMKID_LEN;
  66. }
  67. if ((action_field == PLINK_OPEN && len != 4) ||
  68. (action_field == PLINK_CONFIRM && len != 6) ||
  69. (action_field == PLINK_CLOSE && len != 6 && len != 8)) {
  70. wpa_msg(wpa_s, MSG_DEBUG, "MPM: Invalid peer mgmt ie");
  71. return -1;
  72. }
  73. /* required fields */
  74. if (len < 4)
  75. return -1;
  76. mpm_ie->proto_id = ie;
  77. mpm_ie->llid = ie + 2;
  78. ie += 4;
  79. len -= 4;
  80. /* close reason is always present at end for close */
  81. if (action_field == PLINK_CLOSE) {
  82. if (len < 2)
  83. return -1;
  84. mpm_ie->reason = ie + len - 2;
  85. len -= 2;
  86. }
  87. /* Peer Link ID, present for confirm, and possibly close */
  88. if (len >= 2)
  89. mpm_ie->plid = ie;
  90. return 0;
  91. }
  92. static int plink_free_count(struct hostapd_data *hapd)
  93. {
  94. if (hapd->max_plinks > hapd->num_plinks)
  95. return hapd->max_plinks - hapd->num_plinks;
  96. return 0;
  97. }
  98. static u16 copy_supp_rates(struct wpa_supplicant *wpa_s,
  99. struct sta_info *sta,
  100. struct ieee802_11_elems *elems)
  101. {
  102. if (!elems->supp_rates) {
  103. wpa_msg(wpa_s, MSG_ERROR, "no supported rates from " MACSTR,
  104. MAC2STR(sta->addr));
  105. return WLAN_STATUS_UNSPECIFIED_FAILURE;
  106. }
  107. if (elems->supp_rates_len + elems->ext_supp_rates_len >
  108. sizeof(sta->supported_rates)) {
  109. wpa_msg(wpa_s, MSG_ERROR,
  110. "Invalid supported rates element length " MACSTR
  111. " %d+%d", MAC2STR(sta->addr), elems->supp_rates_len,
  112. elems->ext_supp_rates_len);
  113. return WLAN_STATUS_UNSPECIFIED_FAILURE;
  114. }
  115. sta->supported_rates_len = merge_byte_arrays(
  116. sta->supported_rates, sizeof(sta->supported_rates),
  117. elems->supp_rates, elems->supp_rates_len,
  118. elems->ext_supp_rates, elems->ext_supp_rates_len);
  119. return WLAN_STATUS_SUCCESS;
  120. }
  121. /* return true if elems from a neighbor match this MBSS */
  122. static Boolean matches_local(struct wpa_supplicant *wpa_s,
  123. struct ieee802_11_elems *elems)
  124. {
  125. struct mesh_conf *mconf = wpa_s->ifmsh->mconf;
  126. if (elems->mesh_config_len < 5)
  127. return FALSE;
  128. return (mconf->meshid_len == elems->mesh_id_len &&
  129. os_memcmp(mconf->meshid, elems->mesh_id,
  130. elems->mesh_id_len) == 0 &&
  131. mconf->mesh_pp_id == elems->mesh_config[0] &&
  132. mconf->mesh_pm_id == elems->mesh_config[1] &&
  133. mconf->mesh_cc_id == elems->mesh_config[2] &&
  134. mconf->mesh_sp_id == elems->mesh_config[3] &&
  135. mconf->mesh_auth_id == elems->mesh_config[4]);
  136. }
  137. /* check if local link id is already used with another peer */
  138. static Boolean llid_in_use(struct wpa_supplicant *wpa_s, u16 llid)
  139. {
  140. struct sta_info *sta;
  141. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  142. for (sta = hapd->sta_list; sta; sta = sta->next) {
  143. if (sta->my_lid == llid)
  144. return TRUE;
  145. }
  146. return FALSE;
  147. }
  148. /* generate an llid for a link and set to initial state */
  149. static void mesh_mpm_init_link(struct wpa_supplicant *wpa_s,
  150. struct sta_info *sta)
  151. {
  152. u16 llid;
  153. do {
  154. if (os_get_random((u8 *) &llid, sizeof(llid)) < 0)
  155. continue;
  156. } while (!llid || llid_in_use(wpa_s, llid));
  157. sta->my_lid = llid;
  158. sta->peer_lid = 0;
  159. /*
  160. * We do not use wpa_mesh_set_plink_state() here because there is no
  161. * entry in kernel yet.
  162. */
  163. sta->plink_state = PLINK_IDLE;
  164. }
  165. static void mesh_mpm_send_plink_action(struct wpa_supplicant *wpa_s,
  166. struct sta_info *sta,
  167. enum plink_action_field type,
  168. u16 close_reason)
  169. {
  170. struct wpabuf *buf;
  171. struct hostapd_iface *ifmsh = wpa_s->ifmsh;
  172. struct hostapd_data *bss = ifmsh->bss[0];
  173. struct mesh_conf *conf = ifmsh->mconf;
  174. u8 supp_rates[2 + 2 + 32];
  175. u8 *pos, *cat;
  176. u8 ie_len, add_plid = 0;
  177. int ret;
  178. int ampe = conf->security & MESH_CONF_SEC_AMPE;
  179. size_t buf_len;
  180. if (!sta)
  181. return;
  182. buf_len = 2 + /* capability info */
  183. 2 + /* AID */
  184. 2 + 8 + /* supported rates */
  185. 2 + (32 - 8) +
  186. 2 + 32 + /* mesh ID */
  187. 2 + 7 + /* mesh config */
  188. 2 + 23 + /* peering management */
  189. 2 + 96 + /* AMPE */
  190. 2 + 16; /* MIC */
  191. #ifdef CONFIG_IEEE80211N
  192. if (type != PLINK_CLOSE && wpa_s->mesh_ht_enabled) {
  193. buf_len += 2 + 26 + /* HT capabilities */
  194. 2 + 22; /* HT operation */
  195. }
  196. #endif /* CONFIG_IEEE80211N */
  197. #ifdef CONFIG_IEEE80211AC
  198. if (type != PLINK_CLOSE && wpa_s->mesh_vht_enabled) {
  199. buf_len += 2 + 12 + /* VHT Capabilities */
  200. 2 + 5; /* VHT Operation */
  201. }
  202. #endif /* CONFIG_IEEE80211AC */
  203. if (type != PLINK_CLOSE)
  204. buf_len += conf->rsn_ie_len; /* RSN IE */
  205. buf = wpabuf_alloc(buf_len);
  206. if (!buf)
  207. return;
  208. cat = wpabuf_mhead_u8(buf);
  209. wpabuf_put_u8(buf, WLAN_ACTION_SELF_PROTECTED);
  210. wpabuf_put_u8(buf, type);
  211. if (type != PLINK_CLOSE) {
  212. u8 info;
  213. /* capability info */
  214. wpabuf_put_le16(buf, ampe ? IEEE80211_CAP_PRIVACY : 0);
  215. /* aid */
  216. if (type == PLINK_CONFIRM)
  217. wpabuf_put_le16(buf, sta->aid);
  218. /* IE: supp + ext. supp rates */
  219. pos = hostapd_eid_supp_rates(bss, supp_rates);
  220. pos = hostapd_eid_ext_supp_rates(bss, pos);
  221. wpabuf_put_data(buf, supp_rates, pos - supp_rates);
  222. /* IE: RSN IE */
  223. wpabuf_put_data(buf, conf->rsn_ie, conf->rsn_ie_len);
  224. /* IE: Mesh ID */
  225. wpabuf_put_u8(buf, WLAN_EID_MESH_ID);
  226. wpabuf_put_u8(buf, conf->meshid_len);
  227. wpabuf_put_data(buf, conf->meshid, conf->meshid_len);
  228. /* IE: mesh conf */
  229. wpabuf_put_u8(buf, WLAN_EID_MESH_CONFIG);
  230. wpabuf_put_u8(buf, 7);
  231. wpabuf_put_u8(buf, conf->mesh_pp_id);
  232. wpabuf_put_u8(buf, conf->mesh_pm_id);
  233. wpabuf_put_u8(buf, conf->mesh_cc_id);
  234. wpabuf_put_u8(buf, conf->mesh_sp_id);
  235. wpabuf_put_u8(buf, conf->mesh_auth_id);
  236. info = (bss->num_plinks > 63 ? 63 : bss->num_plinks) << 1;
  237. /* TODO: Add Connected to Mesh Gate/AS subfields */
  238. wpabuf_put_u8(buf, info);
  239. /* always forwarding & accepting plinks for now */
  240. wpabuf_put_u8(buf, MESH_CAP_ACCEPT_ADDITIONAL_PEER |
  241. MESH_CAP_FORWARDING);
  242. } else { /* Peer closing frame */
  243. /* IE: Mesh ID */
  244. wpabuf_put_u8(buf, WLAN_EID_MESH_ID);
  245. wpabuf_put_u8(buf, conf->meshid_len);
  246. wpabuf_put_data(buf, conf->meshid, conf->meshid_len);
  247. }
  248. /* IE: Mesh Peering Management element */
  249. ie_len = 4;
  250. if (ampe)
  251. ie_len += PMKID_LEN;
  252. switch (type) {
  253. case PLINK_OPEN:
  254. break;
  255. case PLINK_CONFIRM:
  256. ie_len += 2;
  257. add_plid = 1;
  258. break;
  259. case PLINK_CLOSE:
  260. ie_len += 2;
  261. add_plid = 1;
  262. ie_len += 2; /* reason code */
  263. break;
  264. }
  265. wpabuf_put_u8(buf, WLAN_EID_PEER_MGMT);
  266. wpabuf_put_u8(buf, ie_len);
  267. /* peering protocol */
  268. if (ampe)
  269. wpabuf_put_le16(buf, 1);
  270. else
  271. wpabuf_put_le16(buf, 0);
  272. wpabuf_put_le16(buf, sta->my_lid);
  273. if (add_plid)
  274. wpabuf_put_le16(buf, sta->peer_lid);
  275. if (type == PLINK_CLOSE)
  276. wpabuf_put_le16(buf, close_reason);
  277. if (ampe) {
  278. if (sta->sae == NULL) {
  279. wpa_msg(wpa_s, MSG_INFO, "Mesh MPM: no SAE session");
  280. goto fail;
  281. }
  282. mesh_rsn_get_pmkid(wpa_s->mesh_rsn, sta,
  283. wpabuf_put(buf, PMKID_LEN));
  284. }
  285. #ifdef CONFIG_IEEE80211N
  286. if (type != PLINK_CLOSE && wpa_s->mesh_ht_enabled) {
  287. u8 ht_capa_oper[2 + 26 + 2 + 22];
  288. pos = hostapd_eid_ht_capabilities(bss, ht_capa_oper);
  289. pos = hostapd_eid_ht_operation(bss, pos);
  290. wpabuf_put_data(buf, ht_capa_oper, pos - ht_capa_oper);
  291. }
  292. #endif /* CONFIG_IEEE80211N */
  293. #ifdef CONFIG_IEEE80211AC
  294. if (type != PLINK_CLOSE && wpa_s->mesh_vht_enabled) {
  295. u8 vht_capa_oper[2 + 12 + 2 + 5];
  296. pos = hostapd_eid_vht_capabilities(bss, vht_capa_oper);
  297. pos = hostapd_eid_vht_operation(bss, pos);
  298. wpabuf_put_data(buf, vht_capa_oper, pos - vht_capa_oper);
  299. }
  300. #endif /* CONFIG_IEEE80211AC */
  301. if (ampe && mesh_rsn_protect_frame(wpa_s->mesh_rsn, sta, cat, buf)) {
  302. wpa_msg(wpa_s, MSG_INFO,
  303. "Mesh MPM: failed to add AMPE and MIC IE");
  304. goto fail;
  305. }
  306. wpa_msg(wpa_s, MSG_DEBUG, "Mesh MPM: Sending peering frame type %d to "
  307. MACSTR " (my_lid=0x%x peer_lid=0x%x)",
  308. type, MAC2STR(sta->addr), sta->my_lid, sta->peer_lid);
  309. ret = wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0,
  310. sta->addr, wpa_s->own_addr, wpa_s->own_addr,
  311. wpabuf_head(buf), wpabuf_len(buf), 0);
  312. if (ret < 0)
  313. wpa_msg(wpa_s, MSG_INFO,
  314. "Mesh MPM: failed to send peering frame");
  315. fail:
  316. wpabuf_free(buf);
  317. }
  318. /* configure peering state in ours and driver's station entry */
  319. void wpa_mesh_set_plink_state(struct wpa_supplicant *wpa_s,
  320. struct sta_info *sta,
  321. enum mesh_plink_state state)
  322. {
  323. struct hostapd_sta_add_params params;
  324. int ret;
  325. wpa_msg(wpa_s, MSG_DEBUG, "MPM set " MACSTR " from %s into %s",
  326. MAC2STR(sta->addr), mplstate[sta->plink_state],
  327. mplstate[state]);
  328. sta->plink_state = state;
  329. os_memset(&params, 0, sizeof(params));
  330. params.addr = sta->addr;
  331. params.plink_state = state;
  332. params.set = 1;
  333. ret = wpa_drv_sta_add(wpa_s, &params);
  334. if (ret) {
  335. wpa_msg(wpa_s, MSG_ERROR, "Driver failed to set " MACSTR
  336. ": %d", MAC2STR(sta->addr), ret);
  337. }
  338. }
  339. static void mesh_mpm_fsm_restart(struct wpa_supplicant *wpa_s,
  340. struct sta_info *sta)
  341. {
  342. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  343. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  344. ap_free_sta(hapd, sta);
  345. }
  346. static void plink_timer(void *eloop_ctx, void *user_data)
  347. {
  348. struct wpa_supplicant *wpa_s = eloop_ctx;
  349. struct sta_info *sta = user_data;
  350. u16 reason = 0;
  351. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  352. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  353. switch (sta->plink_state) {
  354. case PLINK_OPN_RCVD:
  355. case PLINK_OPN_SNT:
  356. /* retry timer */
  357. if (sta->mpm_retries < conf->dot11MeshMaxRetries) {
  358. eloop_register_timeout(
  359. conf->dot11MeshRetryTimeout / 1000,
  360. (conf->dot11MeshRetryTimeout % 1000) * 1000,
  361. plink_timer, wpa_s, sta);
  362. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_OPEN, 0);
  363. sta->mpm_retries++;
  364. break;
  365. }
  366. reason = WLAN_REASON_MESH_MAX_RETRIES;
  367. /* fall through on else */
  368. case PLINK_CNF_RCVD:
  369. /* confirm timer */
  370. if (!reason)
  371. reason = WLAN_REASON_MESH_CONFIRM_TIMEOUT;
  372. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  373. eloop_register_timeout(conf->dot11MeshHoldingTimeout / 1000,
  374. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  375. plink_timer, wpa_s, sta);
  376. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason);
  377. break;
  378. case PLINK_HOLDING:
  379. /* holding timer */
  380. if (sta->mesh_sae_pmksa_caching) {
  381. wpa_printf(MSG_DEBUG, "MPM: Peer " MACSTR
  382. " looks like it does not support mesh SAE PMKSA caching, so remove the cached entry for it",
  383. MAC2STR(sta->addr));
  384. wpa_auth_pmksa_remove(hapd->wpa_auth, sta->addr);
  385. }
  386. mesh_mpm_fsm_restart(wpa_s, sta);
  387. break;
  388. default:
  389. break;
  390. }
  391. }
  392. /* initiate peering with station */
  393. static void
  394. mesh_mpm_plink_open(struct wpa_supplicant *wpa_s, struct sta_info *sta,
  395. enum mesh_plink_state next_state)
  396. {
  397. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  398. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  399. eloop_register_timeout(conf->dot11MeshRetryTimeout / 1000,
  400. (conf->dot11MeshRetryTimeout % 1000) * 1000,
  401. plink_timer, wpa_s, sta);
  402. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_OPEN, 0);
  403. wpa_mesh_set_plink_state(wpa_s, sta, next_state);
  404. }
  405. static int mesh_mpm_plink_close(struct hostapd_data *hapd, struct sta_info *sta,
  406. void *ctx)
  407. {
  408. struct wpa_supplicant *wpa_s = ctx;
  409. int reason = WLAN_REASON_MESH_PEERING_CANCELLED;
  410. if (sta) {
  411. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  412. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CLOSE, reason);
  413. wpa_printf(MSG_DEBUG, "MPM closing plink sta=" MACSTR,
  414. MAC2STR(sta->addr));
  415. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  416. return 0;
  417. }
  418. return 1;
  419. }
  420. int mesh_mpm_close_peer(struct wpa_supplicant *wpa_s, const u8 *addr)
  421. {
  422. struct hostapd_data *hapd;
  423. struct sta_info *sta;
  424. if (!wpa_s->ifmsh) {
  425. wpa_msg(wpa_s, MSG_INFO, "Mesh is not prepared yet");
  426. return -1;
  427. }
  428. hapd = wpa_s->ifmsh->bss[0];
  429. sta = ap_get_sta(hapd, addr);
  430. if (!sta) {
  431. wpa_msg(wpa_s, MSG_INFO, "No such mesh peer");
  432. return -1;
  433. }
  434. return mesh_mpm_plink_close(hapd, sta, wpa_s) == 0 ? 0 : -1;
  435. }
  436. static void peer_add_timer(void *eloop_ctx, void *user_data)
  437. {
  438. struct wpa_supplicant *wpa_s = eloop_ctx;
  439. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  440. os_memset(hapd->mesh_required_peer, 0, ETH_ALEN);
  441. }
  442. int mesh_mpm_connect_peer(struct wpa_supplicant *wpa_s, const u8 *addr,
  443. int duration)
  444. {
  445. struct wpa_ssid *ssid = wpa_s->current_ssid;
  446. struct hostapd_data *hapd;
  447. struct sta_info *sta;
  448. struct mesh_conf *conf;
  449. if (!wpa_s->ifmsh) {
  450. wpa_msg(wpa_s, MSG_INFO, "Mesh is not prepared yet");
  451. return -1;
  452. }
  453. if (!ssid || !ssid->no_auto_peer) {
  454. wpa_msg(wpa_s, MSG_INFO,
  455. "This command is available only with no_auto_peer mesh network");
  456. return -1;
  457. }
  458. hapd = wpa_s->ifmsh->bss[0];
  459. conf = wpa_s->ifmsh->mconf;
  460. sta = ap_get_sta(hapd, addr);
  461. if (!sta) {
  462. wpa_msg(wpa_s, MSG_INFO, "No such mesh peer");
  463. return -1;
  464. }
  465. if ((PLINK_OPN_SNT <= sta->plink_state &&
  466. sta->plink_state <= PLINK_ESTAB) ||
  467. (sta->sae && sta->sae->state > SAE_NOTHING)) {
  468. wpa_msg(wpa_s, MSG_INFO,
  469. "Specified peer is connecting/connected");
  470. return -1;
  471. }
  472. if (conf->security == MESH_CONF_SEC_NONE) {
  473. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPN_SNT);
  474. } else {
  475. mesh_rsn_auth_sae_sta(wpa_s, sta);
  476. os_memcpy(hapd->mesh_required_peer, addr, ETH_ALEN);
  477. eloop_register_timeout(duration == -1 ? 10 : duration, 0,
  478. peer_add_timer, wpa_s, NULL);
  479. }
  480. return 0;
  481. }
  482. void mesh_mpm_deinit(struct wpa_supplicant *wpa_s, struct hostapd_iface *ifmsh)
  483. {
  484. struct hostapd_data *hapd = ifmsh->bss[0];
  485. /* notify peers we're leaving */
  486. ap_for_each_sta(hapd, mesh_mpm_plink_close, wpa_s);
  487. hapd->num_plinks = 0;
  488. hostapd_free_stas(hapd);
  489. eloop_cancel_timeout(peer_add_timer, wpa_s, NULL);
  490. }
  491. /* for mesh_rsn to indicate this peer has completed authentication, and we're
  492. * ready to start AMPE */
  493. void mesh_mpm_auth_peer(struct wpa_supplicant *wpa_s, const u8 *addr)
  494. {
  495. struct hostapd_data *data = wpa_s->ifmsh->bss[0];
  496. struct hostapd_sta_add_params params;
  497. struct sta_info *sta;
  498. int ret;
  499. sta = ap_get_sta(data, addr);
  500. if (!sta) {
  501. wpa_msg(wpa_s, MSG_DEBUG, "no such mesh peer");
  502. return;
  503. }
  504. /* TODO: Should do nothing if this STA is already authenticated, but
  505. * the AP code already sets this flag. */
  506. sta->flags |= WLAN_STA_AUTH;
  507. mesh_rsn_init_ampe_sta(wpa_s, sta);
  508. os_memset(&params, 0, sizeof(params));
  509. params.addr = sta->addr;
  510. params.flags = WPA_STA_AUTHENTICATED | WPA_STA_AUTHORIZED;
  511. params.set = 1;
  512. wpa_msg(wpa_s, MSG_DEBUG, "MPM authenticating " MACSTR,
  513. MAC2STR(sta->addr));
  514. ret = wpa_drv_sta_add(wpa_s, &params);
  515. if (ret) {
  516. wpa_msg(wpa_s, MSG_ERROR,
  517. "Driver failed to set " MACSTR ": %d",
  518. MAC2STR(sta->addr), ret);
  519. }
  520. if (!sta->my_lid)
  521. mesh_mpm_init_link(wpa_s, sta);
  522. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPN_SNT);
  523. }
  524. /*
  525. * Initialize a sta_info structure for a peer and upload it into the driver
  526. * in preparation for beginning authentication or peering. This is done when a
  527. * Beacon (secure or open mesh) or a peering open frame (for open mesh) is
  528. * received from the peer for the first time.
  529. */
  530. static struct sta_info * mesh_mpm_add_peer(struct wpa_supplicant *wpa_s,
  531. const u8 *addr,
  532. struct ieee802_11_elems *elems)
  533. {
  534. struct hostapd_sta_add_params params;
  535. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  536. struct hostapd_data *data = wpa_s->ifmsh->bss[0];
  537. struct sta_info *sta;
  538. int ret;
  539. if (elems->mesh_config_len >= 7 &&
  540. !(elems->mesh_config[6] & MESH_CAP_ACCEPT_ADDITIONAL_PEER)) {
  541. wpa_msg(wpa_s, MSG_DEBUG,
  542. "mesh: Ignore a crowded peer " MACSTR,
  543. MAC2STR(addr));
  544. return NULL;
  545. }
  546. sta = ap_get_sta(data, addr);
  547. if (!sta) {
  548. sta = ap_sta_add(data, addr);
  549. if (!sta)
  550. return NULL;
  551. }
  552. /* Set WMM by default since Mesh STAs are QoS STAs */
  553. sta->flags |= WLAN_STA_WMM;
  554. /* initialize sta */
  555. if (copy_supp_rates(wpa_s, sta, elems)) {
  556. ap_free_sta(data, sta);
  557. return NULL;
  558. }
  559. if (!sta->my_lid)
  560. mesh_mpm_init_link(wpa_s, sta);
  561. #ifdef CONFIG_IEEE80211N
  562. copy_sta_ht_capab(data, sta, elems->ht_capabilities);
  563. update_ht_state(data, sta);
  564. #endif /* CONFIG_IEEE80211N */
  565. #ifdef CONFIG_IEEE80211AC
  566. copy_sta_vht_capab(data, sta, elems->vht_capabilities);
  567. set_sta_vht_opmode(data, sta, elems->vht_opmode_notif);
  568. #endif /* CONFIG_IEEE80211AC */
  569. if (hostapd_get_aid(data, sta) < 0) {
  570. wpa_msg(wpa_s, MSG_ERROR, "No AIDs available");
  571. ap_free_sta(data, sta);
  572. return NULL;
  573. }
  574. /* insert into driver */
  575. os_memset(&params, 0, sizeof(params));
  576. params.supp_rates = sta->supported_rates;
  577. params.supp_rates_len = sta->supported_rates_len;
  578. params.addr = addr;
  579. params.plink_state = sta->plink_state;
  580. params.aid = sta->aid;
  581. params.listen_interval = 100;
  582. params.ht_capabilities = sta->ht_capabilities;
  583. params.vht_capabilities = sta->vht_capabilities;
  584. params.flags |= WPA_STA_WMM;
  585. params.flags_mask |= WPA_STA_AUTHENTICATED;
  586. if (conf->security == MESH_CONF_SEC_NONE) {
  587. params.flags |= WPA_STA_AUTHORIZED;
  588. params.flags |= WPA_STA_AUTHENTICATED;
  589. } else {
  590. sta->flags |= WLAN_STA_MFP;
  591. params.flags |= WPA_STA_MFP;
  592. }
  593. ret = wpa_drv_sta_add(wpa_s, &params);
  594. if (ret) {
  595. wpa_msg(wpa_s, MSG_ERROR,
  596. "Driver failed to insert " MACSTR ": %d",
  597. MAC2STR(addr), ret);
  598. ap_free_sta(data, sta);
  599. return NULL;
  600. }
  601. return sta;
  602. }
  603. void wpa_mesh_new_mesh_peer(struct wpa_supplicant *wpa_s, const u8 *addr,
  604. struct ieee802_11_elems *elems)
  605. {
  606. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  607. struct hostapd_data *data = wpa_s->ifmsh->bss[0];
  608. struct sta_info *sta;
  609. struct wpa_ssid *ssid = wpa_s->current_ssid;
  610. sta = mesh_mpm_add_peer(wpa_s, addr, elems);
  611. if (!sta)
  612. return;
  613. if (ssid && ssid->no_auto_peer &&
  614. (is_zero_ether_addr(data->mesh_required_peer) ||
  615. os_memcmp(data->mesh_required_peer, addr, ETH_ALEN) != 0)) {
  616. wpa_msg(wpa_s, MSG_INFO, "will not initiate new peer link with "
  617. MACSTR " because of no_auto_peer", MAC2STR(addr));
  618. if (data->mesh_pending_auth) {
  619. struct os_reltime age;
  620. const struct ieee80211_mgmt *mgmt;
  621. struct hostapd_frame_info fi;
  622. mgmt = wpabuf_head(data->mesh_pending_auth);
  623. os_reltime_age(&data->mesh_pending_auth_time, &age);
  624. if (age.sec < 2 &&
  625. os_memcmp(mgmt->sa, addr, ETH_ALEN) == 0) {
  626. wpa_printf(MSG_DEBUG,
  627. "mesh: Process pending Authentication frame from %u.%06u seconds ago",
  628. (unsigned int) age.sec,
  629. (unsigned int) age.usec);
  630. os_memset(&fi, 0, sizeof(fi));
  631. ieee802_11_mgmt(
  632. data,
  633. wpabuf_head(data->mesh_pending_auth),
  634. wpabuf_len(data->mesh_pending_auth),
  635. &fi);
  636. }
  637. wpabuf_free(data->mesh_pending_auth);
  638. data->mesh_pending_auth = NULL;
  639. }
  640. return;
  641. }
  642. if (conf->security == MESH_CONF_SEC_NONE) {
  643. if (sta->plink_state < PLINK_OPN_SNT ||
  644. sta->plink_state > PLINK_ESTAB)
  645. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPN_SNT);
  646. } else {
  647. mesh_rsn_auth_sae_sta(wpa_s, sta);
  648. }
  649. }
  650. void mesh_mpm_mgmt_rx(struct wpa_supplicant *wpa_s, struct rx_mgmt *rx_mgmt)
  651. {
  652. struct hostapd_frame_info fi;
  653. os_memset(&fi, 0, sizeof(fi));
  654. fi.datarate = rx_mgmt->datarate;
  655. fi.ssi_signal = rx_mgmt->ssi_signal;
  656. ieee802_11_mgmt(wpa_s->ifmsh->bss[0], rx_mgmt->frame,
  657. rx_mgmt->frame_len, &fi);
  658. }
  659. static void mesh_mpm_plink_estab(struct wpa_supplicant *wpa_s,
  660. struct sta_info *sta)
  661. {
  662. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  663. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  664. u8 seq[6] = {};
  665. wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR " established",
  666. MAC2STR(sta->addr));
  667. if (conf->security & MESH_CONF_SEC_AMPE) {
  668. wpa_hexdump_key(MSG_DEBUG, "mesh: MTK", sta->mtk, sta->mtk_len);
  669. wpa_drv_set_key(wpa_s, wpa_cipher_to_alg(conf->pairwise_cipher),
  670. sta->addr, 0, 0, seq, sizeof(seq),
  671. sta->mtk, sta->mtk_len);
  672. wpa_hexdump_key(MSG_DEBUG, "mesh: RX MGTK Key RSC",
  673. sta->mgtk_rsc, sizeof(sta->mgtk_rsc));
  674. wpa_hexdump_key(MSG_DEBUG, "mesh: RX MGTK",
  675. sta->mgtk, sta->mgtk_len);
  676. wpa_drv_set_key(wpa_s, wpa_cipher_to_alg(conf->group_cipher),
  677. sta->addr, sta->mgtk_key_id, 0,
  678. sta->mgtk_rsc, sizeof(sta->mgtk_rsc),
  679. sta->mgtk, sta->mgtk_len);
  680. if (sta->igtk_len) {
  681. wpa_hexdump_key(MSG_DEBUG, "mesh: RX IGTK Key RSC",
  682. sta->igtk_rsc, sizeof(sta->igtk_rsc));
  683. wpa_hexdump_key(MSG_DEBUG, "mesh: RX IGTK",
  684. sta->igtk, sta->igtk_len);
  685. wpa_drv_set_key(
  686. wpa_s,
  687. wpa_cipher_to_alg(conf->mgmt_group_cipher),
  688. sta->addr, sta->igtk_key_id, 0,
  689. sta->igtk_rsc, sizeof(sta->igtk_rsc),
  690. sta->igtk, sta->igtk_len);
  691. }
  692. }
  693. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_ESTAB);
  694. hapd->num_plinks++;
  695. sta->flags |= WLAN_STA_ASSOC;
  696. sta->mesh_sae_pmksa_caching = 0;
  697. eloop_cancel_timeout(peer_add_timer, wpa_s, NULL);
  698. peer_add_timer(wpa_s, NULL);
  699. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  700. /* Send ctrl event */
  701. wpa_msg(wpa_s, MSG_INFO, MESH_PEER_CONNECTED MACSTR,
  702. MAC2STR(sta->addr));
  703. }
  704. static void mesh_mpm_fsm(struct wpa_supplicant *wpa_s, struct sta_info *sta,
  705. enum plink_event event, u16 reason)
  706. {
  707. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  708. struct mesh_conf *conf = wpa_s->ifmsh->mconf;
  709. wpa_msg(wpa_s, MSG_DEBUG, "MPM " MACSTR " state %s event %s",
  710. MAC2STR(sta->addr), mplstate[sta->plink_state],
  711. mplevent[event]);
  712. switch (sta->plink_state) {
  713. case PLINK_IDLE:
  714. switch (event) {
  715. case CLS_ACPT:
  716. mesh_mpm_fsm_restart(wpa_s, sta);
  717. break;
  718. case OPN_ACPT:
  719. mesh_mpm_plink_open(wpa_s, sta, PLINK_OPN_RCVD);
  720. mesh_mpm_send_plink_action(wpa_s, sta, PLINK_CONFIRM,
  721. 0);
  722. break;
  723. case REQ_RJCT:
  724. mesh_mpm_send_plink_action(wpa_s, sta,
  725. PLINK_CLOSE, reason);
  726. break;
  727. default:
  728. break;
  729. }
  730. break;
  731. case PLINK_OPN_SNT:
  732. switch (event) {
  733. case OPN_RJCT:
  734. case CNF_RJCT:
  735. if (!reason)
  736. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  737. /* fall-through */
  738. case CLS_ACPT:
  739. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  740. if (!reason)
  741. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  742. eloop_register_timeout(
  743. conf->dot11MeshHoldingTimeout / 1000,
  744. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  745. plink_timer, wpa_s, sta);
  746. mesh_mpm_send_plink_action(wpa_s, sta,
  747. PLINK_CLOSE, reason);
  748. break;
  749. case OPN_ACPT:
  750. /* retry timer is left untouched */
  751. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_OPN_RCVD);
  752. mesh_mpm_send_plink_action(wpa_s, sta,
  753. PLINK_CONFIRM, 0);
  754. break;
  755. case CNF_ACPT:
  756. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_CNF_RCVD);
  757. eloop_cancel_timeout(plink_timer, wpa_s, sta);
  758. eloop_register_timeout(
  759. conf->dot11MeshConfirmTimeout / 1000,
  760. (conf->dot11MeshConfirmTimeout % 1000) * 1000,
  761. plink_timer, wpa_s, sta);
  762. break;
  763. default:
  764. break;
  765. }
  766. break;
  767. case PLINK_OPN_RCVD:
  768. switch (event) {
  769. case OPN_RJCT:
  770. case CNF_RJCT:
  771. if (!reason)
  772. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  773. /* fall-through */
  774. case CLS_ACPT:
  775. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  776. if (!reason)
  777. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  778. eloop_register_timeout(
  779. conf->dot11MeshHoldingTimeout / 1000,
  780. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  781. plink_timer, wpa_s, sta);
  782. sta->mpm_close_reason = reason;
  783. mesh_mpm_send_plink_action(wpa_s, sta,
  784. PLINK_CLOSE, reason);
  785. break;
  786. case OPN_ACPT:
  787. mesh_mpm_send_plink_action(wpa_s, sta,
  788. PLINK_CONFIRM, 0);
  789. break;
  790. case CNF_ACPT:
  791. if (conf->security & MESH_CONF_SEC_AMPE)
  792. mesh_rsn_derive_mtk(wpa_s, sta);
  793. mesh_mpm_plink_estab(wpa_s, sta);
  794. break;
  795. default:
  796. break;
  797. }
  798. break;
  799. case PLINK_CNF_RCVD:
  800. switch (event) {
  801. case OPN_RJCT:
  802. case CNF_RJCT:
  803. if (!reason)
  804. reason = WLAN_REASON_MESH_CONFIG_POLICY_VIOLATION;
  805. /* fall-through */
  806. case CLS_ACPT:
  807. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  808. if (!reason)
  809. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  810. eloop_register_timeout(
  811. conf->dot11MeshHoldingTimeout / 1000,
  812. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  813. plink_timer, wpa_s, sta);
  814. sta->mpm_close_reason = reason;
  815. mesh_mpm_send_plink_action(wpa_s, sta,
  816. PLINK_CLOSE, reason);
  817. break;
  818. case OPN_ACPT:
  819. if (conf->security & MESH_CONF_SEC_AMPE)
  820. mesh_rsn_derive_mtk(wpa_s, sta);
  821. mesh_mpm_plink_estab(wpa_s, sta);
  822. mesh_mpm_send_plink_action(wpa_s, sta,
  823. PLINK_CONFIRM, 0);
  824. break;
  825. default:
  826. break;
  827. }
  828. break;
  829. case PLINK_ESTAB:
  830. switch (event) {
  831. case OPN_RJCT:
  832. case CNF_RJCT:
  833. case CLS_ACPT:
  834. wpa_mesh_set_plink_state(wpa_s, sta, PLINK_HOLDING);
  835. if (!reason)
  836. reason = WLAN_REASON_MESH_CLOSE_RCVD;
  837. eloop_register_timeout(
  838. conf->dot11MeshHoldingTimeout / 1000,
  839. (conf->dot11MeshHoldingTimeout % 1000) * 1000,
  840. plink_timer, wpa_s, sta);
  841. sta->mpm_close_reason = reason;
  842. wpa_msg(wpa_s, MSG_INFO, "mesh plink with " MACSTR
  843. " closed with reason %d",
  844. MAC2STR(sta->addr), reason);
  845. wpa_msg(wpa_s, MSG_INFO, MESH_PEER_DISCONNECTED MACSTR,
  846. MAC2STR(sta->addr));
  847. hapd->num_plinks--;
  848. mesh_mpm_send_plink_action(wpa_s, sta,
  849. PLINK_CLOSE, reason);
  850. break;
  851. case OPN_ACPT:
  852. mesh_mpm_send_plink_action(wpa_s, sta,
  853. PLINK_CONFIRM, 0);
  854. break;
  855. default:
  856. break;
  857. }
  858. break;
  859. case PLINK_HOLDING:
  860. switch (event) {
  861. case CLS_ACPT:
  862. mesh_mpm_fsm_restart(wpa_s, sta);
  863. break;
  864. case OPN_ACPT:
  865. case CNF_ACPT:
  866. case OPN_RJCT:
  867. case CNF_RJCT:
  868. reason = sta->mpm_close_reason;
  869. mesh_mpm_send_plink_action(wpa_s, sta,
  870. PLINK_CLOSE, reason);
  871. break;
  872. default:
  873. break;
  874. }
  875. break;
  876. default:
  877. wpa_msg(wpa_s, MSG_DEBUG,
  878. "Unsupported MPM event %s for state %s",
  879. mplevent[event], mplstate[sta->plink_state]);
  880. break;
  881. }
  882. }
  883. void mesh_mpm_action_rx(struct wpa_supplicant *wpa_s,
  884. const struct ieee80211_mgmt *mgmt, size_t len)
  885. {
  886. u8 action_field;
  887. struct hostapd_data *hapd = wpa_s->ifmsh->bss[0];
  888. struct mesh_conf *mconf = wpa_s->ifmsh->mconf;
  889. struct sta_info *sta;
  890. u16 plid = 0, llid = 0;
  891. enum plink_event event;
  892. struct ieee802_11_elems elems;
  893. struct mesh_peer_mgmt_ie peer_mgmt_ie;
  894. const u8 *ies;
  895. size_t ie_len;
  896. int ret;
  897. u16 reason = 0;
  898. if (mgmt->u.action.category != WLAN_ACTION_SELF_PROTECTED)
  899. return;
  900. action_field = mgmt->u.action.u.slf_prot_action.action;
  901. if (action_field != PLINK_OPEN &&
  902. action_field != PLINK_CONFIRM &&
  903. action_field != PLINK_CLOSE)
  904. return;
  905. ies = mgmt->u.action.u.slf_prot_action.variable;
  906. ie_len = (const u8 *) mgmt + len -
  907. mgmt->u.action.u.slf_prot_action.variable;
  908. /* at least expect mesh id and peering mgmt */
  909. if (ie_len < 2 + 2) {
  910. wpa_printf(MSG_DEBUG,
  911. "MPM: Ignore too short action frame %u ie_len %u",
  912. action_field, (unsigned int) ie_len);
  913. return;
  914. }
  915. wpa_printf(MSG_DEBUG, "MPM: Received PLINK action %u", action_field);
  916. if (action_field == PLINK_OPEN || action_field == PLINK_CONFIRM) {
  917. wpa_printf(MSG_DEBUG, "MPM: Capability 0x%x",
  918. WPA_GET_LE16(ies));
  919. ies += 2; /* capability */
  920. ie_len -= 2;
  921. }
  922. if (action_field == PLINK_CONFIRM) {
  923. wpa_printf(MSG_DEBUG, "MPM: AID 0x%x", WPA_GET_LE16(ies));
  924. ies += 2; /* aid */
  925. ie_len -= 2;
  926. }
  927. /* check for mesh peering, mesh id and mesh config IEs */
  928. if (ieee802_11_parse_elems(ies, ie_len, &elems, 0) == ParseFailed) {
  929. wpa_printf(MSG_DEBUG, "MPM: Failed to parse PLINK IEs");
  930. return;
  931. }
  932. if (!elems.peer_mgmt) {
  933. wpa_printf(MSG_DEBUG,
  934. "MPM: No Mesh Peering Management element");
  935. return;
  936. }
  937. if (action_field != PLINK_CLOSE) {
  938. if (!elems.mesh_id || !elems.mesh_config) {
  939. wpa_printf(MSG_DEBUG,
  940. "MPM: No Mesh ID or Mesh Configuration element");
  941. return;
  942. }
  943. if (!matches_local(wpa_s, &elems)) {
  944. wpa_printf(MSG_DEBUG,
  945. "MPM: Mesh ID or Mesh Configuration element do not match local MBSS");
  946. return;
  947. }
  948. }
  949. ret = mesh_mpm_parse_peer_mgmt(wpa_s, action_field,
  950. elems.peer_mgmt,
  951. elems.peer_mgmt_len,
  952. &peer_mgmt_ie);
  953. if (ret) {
  954. wpa_printf(MSG_DEBUG, "MPM: Mesh parsing rejected frame");
  955. return;
  956. }
  957. /* the sender's llid is our plid and vice-versa */
  958. plid = WPA_GET_LE16(peer_mgmt_ie.llid);
  959. if (peer_mgmt_ie.plid)
  960. llid = WPA_GET_LE16(peer_mgmt_ie.plid);
  961. wpa_printf(MSG_DEBUG, "MPM: plid=0x%x llid=0x%x", plid, llid);
  962. if (action_field == PLINK_CLOSE)
  963. wpa_printf(MSG_DEBUG, "MPM: close reason=%u",
  964. WPA_GET_LE16(peer_mgmt_ie.reason));
  965. sta = ap_get_sta(hapd, mgmt->sa);
  966. /*
  967. * If this is an open frame from an unknown STA, and this is an
  968. * open mesh, then go ahead and add the peer before proceeding.
  969. */
  970. if (!sta && action_field == PLINK_OPEN &&
  971. (!(mconf->security & MESH_CONF_SEC_AMPE) ||
  972. wpa_auth_pmksa_get(hapd->wpa_auth, mgmt->sa)))
  973. sta = mesh_mpm_add_peer(wpa_s, mgmt->sa, &elems);
  974. if (!sta) {
  975. wpa_printf(MSG_DEBUG, "MPM: No STA entry for peer");
  976. return;
  977. }
  978. #ifdef CONFIG_SAE
  979. /* peer is in sae_accepted? */
  980. if (sta->sae && sta->sae->state != SAE_ACCEPTED) {
  981. wpa_printf(MSG_DEBUG, "MPM: SAE not yet accepted for peer");
  982. return;
  983. }
  984. #endif /* CONFIG_SAE */
  985. if (!sta->my_lid)
  986. mesh_mpm_init_link(wpa_s, sta);
  987. if (mconf->security & MESH_CONF_SEC_AMPE) {
  988. int res;
  989. res = mesh_rsn_process_ampe(wpa_s, sta, &elems,
  990. &mgmt->u.action.category,
  991. peer_mgmt_ie.chosen_pmk,
  992. ies, ie_len);
  993. if (res) {
  994. wpa_printf(MSG_DEBUG,
  995. "MPM: RSN process rejected frame (res=%d)",
  996. res);
  997. if (action_field == PLINK_OPEN && res == -2) {
  998. /* AES-SIV decryption failed */
  999. mesh_mpm_fsm(wpa_s, sta, OPN_RJCT,
  1000. WLAN_REASON_MESH_INVALID_GTK);
  1001. }
  1002. return;
  1003. }
  1004. }
  1005. if (sta->plink_state == PLINK_BLOCKED) {
  1006. wpa_printf(MSG_DEBUG, "MPM: PLINK_BLOCKED");
  1007. return;
  1008. }
  1009. /* Now we will figure out the appropriate event... */
  1010. switch (action_field) {
  1011. case PLINK_OPEN:
  1012. if (plink_free_count(hapd) == 0) {
  1013. event = REQ_RJCT;
  1014. reason = WLAN_REASON_MESH_MAX_PEERS;
  1015. wpa_printf(MSG_INFO,
  1016. "MPM: Peer link num over quota(%d)",
  1017. hapd->max_plinks);
  1018. } else if (sta->peer_lid && sta->peer_lid != plid) {
  1019. wpa_printf(MSG_DEBUG,
  1020. "MPM: peer_lid mismatch: 0x%x != 0x%x",
  1021. sta->peer_lid, plid);
  1022. return; /* no FSM event */
  1023. } else {
  1024. sta->peer_lid = plid;
  1025. event = OPN_ACPT;
  1026. }
  1027. break;
  1028. case PLINK_CONFIRM:
  1029. if (plink_free_count(hapd) == 0) {
  1030. event = REQ_RJCT;
  1031. reason = WLAN_REASON_MESH_MAX_PEERS;
  1032. wpa_printf(MSG_INFO,
  1033. "MPM: Peer link num over quota(%d)",
  1034. hapd->max_plinks);
  1035. } else if (sta->my_lid != llid ||
  1036. (sta->peer_lid && sta->peer_lid != plid)) {
  1037. wpa_printf(MSG_DEBUG,
  1038. "MPM: lid mismatch: my_lid: 0x%x != 0x%x or peer_lid: 0x%x != 0x%x",
  1039. sta->my_lid, llid, sta->peer_lid, plid);
  1040. return; /* no FSM event */
  1041. } else {
  1042. if (!sta->peer_lid)
  1043. sta->peer_lid = plid;
  1044. event = CNF_ACPT;
  1045. }
  1046. break;
  1047. case PLINK_CLOSE:
  1048. if (sta->plink_state == PLINK_ESTAB)
  1049. /* Do not check for llid or plid. This does not
  1050. * follow the standard but since multiple plinks
  1051. * per cand are not supported, it is necessary in
  1052. * order to avoid a livelock when MP A sees an
  1053. * establish peer link to MP B but MP B does not
  1054. * see it. This can be caused by a timeout in
  1055. * B's peer link establishment or B being
  1056. * restarted.
  1057. */
  1058. event = CLS_ACPT;
  1059. else if (sta->peer_lid != plid) {
  1060. wpa_printf(MSG_DEBUG,
  1061. "MPM: peer_lid mismatch: 0x%x != 0x%x",
  1062. sta->peer_lid, plid);
  1063. return; /* no FSM event */
  1064. } else if (peer_mgmt_ie.plid && sta->my_lid != llid) {
  1065. wpa_printf(MSG_DEBUG,
  1066. "MPM: my_lid mismatch: 0x%x != 0x%x",
  1067. sta->my_lid, llid);
  1068. return; /* no FSM event */
  1069. } else {
  1070. event = CLS_ACPT;
  1071. }
  1072. break;
  1073. default:
  1074. /*
  1075. * This cannot be hit due to the action_field check above, but
  1076. * compilers may not be able to figure that out and can warn
  1077. * about uninitialized event below.
  1078. */
  1079. return;
  1080. }
  1081. mesh_mpm_fsm(wpa_s, sta, event, reason);
  1082. }
  1083. /* called by ap_free_sta */
  1084. void mesh_mpm_free_sta(struct hostapd_data *hapd, struct sta_info *sta)
  1085. {
  1086. if (sta->plink_state == PLINK_ESTAB)
  1087. hapd->num_plinks--;
  1088. eloop_cancel_timeout(plink_timer, ELOOP_ALL_CTX, sta);
  1089. eloop_cancel_timeout(mesh_auth_timer, ELOOP_ALL_CTX, sta);
  1090. }