drv_callbacks.c 27 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027
  1. /*
  2. * hostapd / Callback functions for driver wrappers
  3. * Copyright (c) 2002-2013, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "radius/radius.h"
  11. #include "drivers/driver.h"
  12. #include "common/ieee802_11_defs.h"
  13. #include "common/ieee802_11_common.h"
  14. #include "common/wpa_ctrl.h"
  15. #include "crypto/random.h"
  16. #include "p2p/p2p.h"
  17. #include "wps/wps.h"
  18. #include "wnm_ap.h"
  19. #include "hostapd.h"
  20. #include "ieee802_11.h"
  21. #include "sta_info.h"
  22. #include "accounting.h"
  23. #include "tkip_countermeasures.h"
  24. #include "ieee802_1x.h"
  25. #include "wpa_auth.h"
  26. #include "wps_hostapd.h"
  27. #include "ap_drv_ops.h"
  28. #include "ap_config.h"
  29. #include "hw_features.h"
  30. #include "dfs.h"
  31. int hostapd_notif_assoc(struct hostapd_data *hapd, const u8 *addr,
  32. const u8 *req_ies, size_t req_ies_len, int reassoc)
  33. {
  34. struct sta_info *sta;
  35. int new_assoc, res;
  36. struct ieee802_11_elems elems;
  37. const u8 *ie;
  38. size_t ielen;
  39. #ifdef CONFIG_IEEE80211R
  40. u8 buf[sizeof(struct ieee80211_mgmt) + 1024];
  41. u8 *p = buf;
  42. #endif /* CONFIG_IEEE80211R */
  43. u16 reason = WLAN_REASON_UNSPECIFIED;
  44. u16 status = WLAN_STATUS_SUCCESS;
  45. const u8 *p2p_dev_addr = NULL;
  46. if (addr == NULL) {
  47. /*
  48. * This could potentially happen with unexpected event from the
  49. * driver wrapper. This was seen at least in one case where the
  50. * driver ended up being set to station mode while hostapd was
  51. * running, so better make sure we stop processing such an
  52. * event here.
  53. */
  54. wpa_printf(MSG_DEBUG, "hostapd_notif_assoc: Skip event with "
  55. "no address");
  56. return -1;
  57. }
  58. random_add_randomness(addr, ETH_ALEN);
  59. hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
  60. HOSTAPD_LEVEL_INFO, "associated");
  61. ieee802_11_parse_elems(req_ies, req_ies_len, &elems, 0);
  62. if (elems.wps_ie) {
  63. ie = elems.wps_ie - 2;
  64. ielen = elems.wps_ie_len + 2;
  65. wpa_printf(MSG_DEBUG, "STA included WPS IE in (Re)AssocReq");
  66. } else if (elems.rsn_ie) {
  67. ie = elems.rsn_ie - 2;
  68. ielen = elems.rsn_ie_len + 2;
  69. wpa_printf(MSG_DEBUG, "STA included RSN IE in (Re)AssocReq");
  70. } else if (elems.wpa_ie) {
  71. ie = elems.wpa_ie - 2;
  72. ielen = elems.wpa_ie_len + 2;
  73. wpa_printf(MSG_DEBUG, "STA included WPA IE in (Re)AssocReq");
  74. } else {
  75. ie = NULL;
  76. ielen = 0;
  77. wpa_printf(MSG_DEBUG, "STA did not include WPS/RSN/WPA IE in "
  78. "(Re)AssocReq");
  79. }
  80. sta = ap_get_sta(hapd, addr);
  81. if (sta) {
  82. ap_sta_no_session_timeout(hapd, sta);
  83. accounting_sta_stop(hapd, sta);
  84. /*
  85. * Make sure that the previously registered inactivity timer
  86. * will not remove the STA immediately.
  87. */
  88. sta->timeout_next = STA_NULLFUNC;
  89. } else {
  90. sta = ap_sta_add(hapd, addr);
  91. if (sta == NULL) {
  92. hostapd_drv_sta_disassoc(hapd, addr,
  93. WLAN_REASON_DISASSOC_AP_BUSY);
  94. return -1;
  95. }
  96. }
  97. sta->flags &= ~(WLAN_STA_WPS | WLAN_STA_MAYBE_WPS | WLAN_STA_WPS2);
  98. #ifdef CONFIG_P2P
  99. if (elems.p2p) {
  100. wpabuf_free(sta->p2p_ie);
  101. sta->p2p_ie = ieee802_11_vendor_ie_concat(req_ies, req_ies_len,
  102. P2P_IE_VENDOR_TYPE);
  103. if (sta->p2p_ie)
  104. p2p_dev_addr = p2p_get_go_dev_addr(sta->p2p_ie);
  105. }
  106. #endif /* CONFIG_P2P */
  107. #ifdef CONFIG_INTERWORKING
  108. if (elems.ext_capab && elems.ext_capab_len > 4) {
  109. if (elems.ext_capab[4] & 0x01)
  110. sta->qos_map_enabled = 1;
  111. }
  112. #endif /* CONFIG_INTERWORKING */
  113. #ifdef CONFIG_HS20
  114. wpabuf_free(sta->hs20_ie);
  115. if (elems.hs20 && elems.hs20_len > 4) {
  116. sta->hs20_ie = wpabuf_alloc_copy(elems.hs20 + 4,
  117. elems.hs20_len - 4);
  118. } else
  119. sta->hs20_ie = NULL;
  120. #endif /* CONFIG_HS20 */
  121. if (hapd->conf->wpa) {
  122. if (ie == NULL || ielen == 0) {
  123. #ifdef CONFIG_WPS
  124. if (hapd->conf->wps_state) {
  125. wpa_printf(MSG_DEBUG, "STA did not include "
  126. "WPA/RSN IE in (Re)Association "
  127. "Request - possible WPS use");
  128. sta->flags |= WLAN_STA_MAYBE_WPS;
  129. goto skip_wpa_check;
  130. }
  131. #endif /* CONFIG_WPS */
  132. wpa_printf(MSG_DEBUG, "No WPA/RSN IE from STA");
  133. return -1;
  134. }
  135. #ifdef CONFIG_WPS
  136. if (hapd->conf->wps_state && ie[0] == 0xdd && ie[1] >= 4 &&
  137. os_memcmp(ie + 2, "\x00\x50\xf2\x04", 4) == 0) {
  138. struct wpabuf *wps;
  139. sta->flags |= WLAN_STA_WPS;
  140. wps = ieee802_11_vendor_ie_concat(ie, ielen,
  141. WPS_IE_VENDOR_TYPE);
  142. if (wps) {
  143. if (wps_is_20(wps)) {
  144. wpa_printf(MSG_DEBUG, "WPS: STA "
  145. "supports WPS 2.0");
  146. sta->flags |= WLAN_STA_WPS2;
  147. }
  148. wpabuf_free(wps);
  149. }
  150. goto skip_wpa_check;
  151. }
  152. #endif /* CONFIG_WPS */
  153. if (sta->wpa_sm == NULL)
  154. sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
  155. sta->addr,
  156. p2p_dev_addr);
  157. if (sta->wpa_sm == NULL) {
  158. wpa_printf(MSG_ERROR, "Failed to initialize WPA state "
  159. "machine");
  160. return -1;
  161. }
  162. res = wpa_validate_wpa_ie(hapd->wpa_auth, sta->wpa_sm,
  163. ie, ielen,
  164. elems.mdie, elems.mdie_len);
  165. if (res != WPA_IE_OK) {
  166. wpa_printf(MSG_DEBUG, "WPA/RSN information element "
  167. "rejected? (res %u)", res);
  168. wpa_hexdump(MSG_DEBUG, "IE", ie, ielen);
  169. if (res == WPA_INVALID_GROUP) {
  170. reason = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
  171. status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
  172. } else if (res == WPA_INVALID_PAIRWISE) {
  173. reason = WLAN_REASON_PAIRWISE_CIPHER_NOT_VALID;
  174. status = WLAN_STATUS_PAIRWISE_CIPHER_NOT_VALID;
  175. } else if (res == WPA_INVALID_AKMP) {
  176. reason = WLAN_REASON_AKMP_NOT_VALID;
  177. status = WLAN_STATUS_AKMP_NOT_VALID;
  178. }
  179. #ifdef CONFIG_IEEE80211W
  180. else if (res == WPA_MGMT_FRAME_PROTECTION_VIOLATION) {
  181. reason = WLAN_REASON_INVALID_IE;
  182. status = WLAN_STATUS_INVALID_IE;
  183. } else if (res == WPA_INVALID_MGMT_GROUP_CIPHER) {
  184. reason = WLAN_REASON_GROUP_CIPHER_NOT_VALID;
  185. status = WLAN_STATUS_GROUP_CIPHER_NOT_VALID;
  186. }
  187. #endif /* CONFIG_IEEE80211W */
  188. else {
  189. reason = WLAN_REASON_INVALID_IE;
  190. status = WLAN_STATUS_INVALID_IE;
  191. }
  192. goto fail;
  193. }
  194. #ifdef CONFIG_IEEE80211W
  195. if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
  196. sta->sa_query_count > 0)
  197. ap_check_sa_query_timeout(hapd, sta);
  198. if ((sta->flags & WLAN_STA_MFP) && !sta->sa_query_timed_out &&
  199. (sta->auth_alg != WLAN_AUTH_FT)) {
  200. /*
  201. * STA has already been associated with MFP and SA
  202. * Query timeout has not been reached. Reject the
  203. * association attempt temporarily and start SA Query,
  204. * if one is not pending.
  205. */
  206. if (sta->sa_query_count == 0)
  207. ap_sta_start_sa_query(hapd, sta);
  208. #ifdef CONFIG_IEEE80211R
  209. status = WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY;
  210. p = hostapd_eid_assoc_comeback_time(hapd, sta, p);
  211. hostapd_sta_assoc(hapd, addr, reassoc, status, buf,
  212. p - buf);
  213. #endif /* CONFIG_IEEE80211R */
  214. return 0;
  215. }
  216. if (wpa_auth_uses_mfp(sta->wpa_sm))
  217. sta->flags |= WLAN_STA_MFP;
  218. else
  219. sta->flags &= ~WLAN_STA_MFP;
  220. #endif /* CONFIG_IEEE80211W */
  221. #ifdef CONFIG_IEEE80211R
  222. if (sta->auth_alg == WLAN_AUTH_FT) {
  223. status = wpa_ft_validate_reassoc(sta->wpa_sm, req_ies,
  224. req_ies_len);
  225. if (status != WLAN_STATUS_SUCCESS) {
  226. if (status == WLAN_STATUS_INVALID_PMKID)
  227. reason = WLAN_REASON_INVALID_IE;
  228. if (status == WLAN_STATUS_INVALID_MDIE)
  229. reason = WLAN_REASON_INVALID_IE;
  230. if (status == WLAN_STATUS_INVALID_FTIE)
  231. reason = WLAN_REASON_INVALID_IE;
  232. goto fail;
  233. }
  234. }
  235. #endif /* CONFIG_IEEE80211R */
  236. } else if (hapd->conf->wps_state) {
  237. #ifdef CONFIG_WPS
  238. struct wpabuf *wps;
  239. if (req_ies)
  240. wps = ieee802_11_vendor_ie_concat(req_ies, req_ies_len,
  241. WPS_IE_VENDOR_TYPE);
  242. else
  243. wps = NULL;
  244. #ifdef CONFIG_WPS_STRICT
  245. if (wps && wps_validate_assoc_req(wps) < 0) {
  246. reason = WLAN_REASON_INVALID_IE;
  247. status = WLAN_STATUS_INVALID_IE;
  248. wpabuf_free(wps);
  249. goto fail;
  250. }
  251. #endif /* CONFIG_WPS_STRICT */
  252. if (wps) {
  253. sta->flags |= WLAN_STA_WPS;
  254. if (wps_is_20(wps)) {
  255. wpa_printf(MSG_DEBUG, "WPS: STA supports "
  256. "WPS 2.0");
  257. sta->flags |= WLAN_STA_WPS2;
  258. }
  259. } else
  260. sta->flags |= WLAN_STA_MAYBE_WPS;
  261. wpabuf_free(wps);
  262. #endif /* CONFIG_WPS */
  263. }
  264. #ifdef CONFIG_WPS
  265. skip_wpa_check:
  266. #endif /* CONFIG_WPS */
  267. #ifdef CONFIG_IEEE80211R
  268. p = wpa_sm_write_assoc_resp_ies(sta->wpa_sm, buf, sizeof(buf),
  269. sta->auth_alg, req_ies, req_ies_len);
  270. hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf);
  271. #else /* CONFIG_IEEE80211R */
  272. /* Keep compiler silent about unused variables */
  273. if (status) {
  274. }
  275. #endif /* CONFIG_IEEE80211R */
  276. new_assoc = (sta->flags & WLAN_STA_ASSOC) == 0;
  277. sta->flags |= WLAN_STA_AUTH | WLAN_STA_ASSOC;
  278. if (reassoc && (sta->auth_alg == WLAN_AUTH_FT))
  279. wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC_FT);
  280. else
  281. wpa_auth_sm_event(sta->wpa_sm, WPA_ASSOC);
  282. hostapd_new_assoc_sta(hapd, sta, !new_assoc);
  283. ieee802_1x_notify_port_enabled(sta->eapol_sm, 1);
  284. #ifdef CONFIG_P2P
  285. if (req_ies) {
  286. p2p_group_notif_assoc(hapd->p2p_group, sta->addr,
  287. req_ies, req_ies_len);
  288. }
  289. #endif /* CONFIG_P2P */
  290. return 0;
  291. fail:
  292. #ifdef CONFIG_IEEE80211R
  293. hostapd_sta_assoc(hapd, addr, reassoc, status, buf, p - buf);
  294. #endif /* CONFIG_IEEE80211R */
  295. hostapd_drv_sta_disassoc(hapd, sta->addr, reason);
  296. ap_free_sta(hapd, sta);
  297. return -1;
  298. }
  299. void hostapd_notif_disassoc(struct hostapd_data *hapd, const u8 *addr)
  300. {
  301. struct sta_info *sta;
  302. if (addr == NULL) {
  303. /*
  304. * This could potentially happen with unexpected event from the
  305. * driver wrapper. This was seen at least in one case where the
  306. * driver ended up reporting a station mode event while hostapd
  307. * was running, so better make sure we stop processing such an
  308. * event here.
  309. */
  310. wpa_printf(MSG_DEBUG, "hostapd_notif_disassoc: Skip event "
  311. "with no address");
  312. return;
  313. }
  314. hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
  315. HOSTAPD_LEVEL_INFO, "disassociated");
  316. sta = ap_get_sta(hapd, addr);
  317. if (sta == NULL) {
  318. wpa_printf(MSG_DEBUG, "Disassociation notification for "
  319. "unknown STA " MACSTR, MAC2STR(addr));
  320. return;
  321. }
  322. ap_sta_set_authorized(hapd, sta, 0);
  323. sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC);
  324. wpa_auth_sm_event(sta->wpa_sm, WPA_DISASSOC);
  325. sta->acct_terminate_cause = RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
  326. ieee802_1x_notify_port_enabled(sta->eapol_sm, 0);
  327. ap_free_sta(hapd, sta);
  328. }
  329. void hostapd_event_sta_low_ack(struct hostapd_data *hapd, const u8 *addr)
  330. {
  331. struct sta_info *sta = ap_get_sta(hapd, addr);
  332. if (!sta || !hapd->conf->disassoc_low_ack)
  333. return;
  334. hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
  335. HOSTAPD_LEVEL_INFO, "disconnected due to excessive "
  336. "missing ACKs");
  337. hostapd_drv_sta_disassoc(hapd, addr, WLAN_REASON_DISASSOC_LOW_ACK);
  338. if (sta)
  339. ap_sta_disassociate(hapd, sta, WLAN_REASON_DISASSOC_LOW_ACK);
  340. }
  341. void hostapd_event_ch_switch(struct hostapd_data *hapd, int freq, int ht,
  342. int offset)
  343. {
  344. #ifdef NEED_AP_MLME
  345. int channel;
  346. hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
  347. HOSTAPD_LEVEL_INFO, "driver had channel switch: "
  348. "freq=%d, ht=%d, offset=%d", freq, ht, offset);
  349. hapd->iface->freq = freq;
  350. channel = hostapd_hw_get_channel(hapd, freq);
  351. if (!channel) {
  352. hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
  353. HOSTAPD_LEVEL_WARNING, "driver switched to "
  354. "bad channel!");
  355. return;
  356. }
  357. hapd->iconf->channel = channel;
  358. hapd->iconf->ieee80211n = ht;
  359. hapd->iconf->secondary_channel = offset;
  360. if (hapd->iface->csa_in_progress && freq == hapd->iface->cs_freq) {
  361. hostapd_cleanup_cs_params(hapd);
  362. wpa_msg(hapd->msg_ctx, MSG_INFO, AP_CSA_FINISHED "freq=%d",
  363. freq);
  364. }
  365. #endif /* NEED_AP_MLME */
  366. }
  367. void hostapd_event_connect_failed_reason(struct hostapd_data *hapd,
  368. const u8 *addr, int reason_code)
  369. {
  370. switch (reason_code) {
  371. case MAX_CLIENT_REACHED:
  372. wpa_msg(hapd->msg_ctx, MSG_INFO, AP_REJECTED_MAX_STA MACSTR,
  373. MAC2STR(addr));
  374. break;
  375. case BLOCKED_CLIENT:
  376. wpa_msg(hapd->msg_ctx, MSG_INFO, AP_REJECTED_BLOCKED_STA MACSTR,
  377. MAC2STR(addr));
  378. break;
  379. }
  380. }
  381. int hostapd_probe_req_rx(struct hostapd_data *hapd, const u8 *sa, const u8 *da,
  382. const u8 *bssid, const u8 *ie, size_t ie_len,
  383. int ssi_signal)
  384. {
  385. size_t i;
  386. int ret = 0;
  387. if (sa == NULL || ie == NULL)
  388. return -1;
  389. random_add_randomness(sa, ETH_ALEN);
  390. for (i = 0; hapd->probereq_cb && i < hapd->num_probereq_cb; i++) {
  391. if (hapd->probereq_cb[i].cb(hapd->probereq_cb[i].ctx,
  392. sa, da, bssid, ie, ie_len,
  393. ssi_signal) > 0) {
  394. ret = 1;
  395. break;
  396. }
  397. }
  398. return ret;
  399. }
  400. #ifdef HOSTAPD
  401. #ifdef CONFIG_IEEE80211R
  402. static void hostapd_notify_auth_ft_finish(void *ctx, const u8 *dst,
  403. const u8 *bssid,
  404. u16 auth_transaction, u16 status,
  405. const u8 *ies, size_t ies_len)
  406. {
  407. struct hostapd_data *hapd = ctx;
  408. struct sta_info *sta;
  409. sta = ap_get_sta(hapd, dst);
  410. if (sta == NULL)
  411. return;
  412. hostapd_logger(hapd, dst, HOSTAPD_MODULE_IEEE80211,
  413. HOSTAPD_LEVEL_DEBUG, "authentication OK (FT)");
  414. sta->flags |= WLAN_STA_AUTH;
  415. hostapd_sta_auth(hapd, dst, auth_transaction, status, ies, ies_len);
  416. }
  417. #endif /* CONFIG_IEEE80211R */
  418. static void hostapd_notif_auth(struct hostapd_data *hapd,
  419. struct auth_info *rx_auth)
  420. {
  421. struct sta_info *sta;
  422. u16 status = WLAN_STATUS_SUCCESS;
  423. u8 resp_ies[2 + WLAN_AUTH_CHALLENGE_LEN];
  424. size_t resp_ies_len = 0;
  425. sta = ap_get_sta(hapd, rx_auth->peer);
  426. if (!sta) {
  427. sta = ap_sta_add(hapd, rx_auth->peer);
  428. if (sta == NULL) {
  429. status = WLAN_STATUS_AP_UNABLE_TO_HANDLE_NEW_STA;
  430. goto fail;
  431. }
  432. }
  433. sta->flags &= ~WLAN_STA_PREAUTH;
  434. ieee802_1x_notify_pre_auth(sta->eapol_sm, 0);
  435. #ifdef CONFIG_IEEE80211R
  436. if (rx_auth->auth_type == WLAN_AUTH_FT && hapd->wpa_auth) {
  437. sta->auth_alg = WLAN_AUTH_FT;
  438. if (sta->wpa_sm == NULL)
  439. sta->wpa_sm = wpa_auth_sta_init(hapd->wpa_auth,
  440. sta->addr, NULL);
  441. if (sta->wpa_sm == NULL) {
  442. wpa_printf(MSG_DEBUG, "FT: Failed to initialize WPA "
  443. "state machine");
  444. status = WLAN_STATUS_UNSPECIFIED_FAILURE;
  445. goto fail;
  446. }
  447. wpa_ft_process_auth(sta->wpa_sm, rx_auth->bssid,
  448. rx_auth->auth_transaction, rx_auth->ies,
  449. rx_auth->ies_len,
  450. hostapd_notify_auth_ft_finish, hapd);
  451. return;
  452. }
  453. #endif /* CONFIG_IEEE80211R */
  454. fail:
  455. hostapd_sta_auth(hapd, rx_auth->peer, rx_auth->auth_transaction + 1,
  456. status, resp_ies, resp_ies_len);
  457. }
  458. static void hostapd_action_rx(struct hostapd_data *hapd,
  459. struct rx_action *action)
  460. {
  461. struct sta_info *sta;
  462. wpa_printf(MSG_DEBUG, "RX_ACTION cat %d action plen %d",
  463. action->category, (int) action->len);
  464. sta = ap_get_sta(hapd, action->sa);
  465. if (sta == NULL) {
  466. wpa_printf(MSG_DEBUG, "%s: station not found", __func__);
  467. return;
  468. }
  469. #ifdef CONFIG_IEEE80211R
  470. if (action->category == WLAN_ACTION_FT) {
  471. wpa_printf(MSG_DEBUG, "%s: FT_ACTION length %d",
  472. __func__, (int) action->len);
  473. wpa_ft_action_rx(sta->wpa_sm, action->data, action->len);
  474. }
  475. #endif /* CONFIG_IEEE80211R */
  476. #ifdef CONFIG_IEEE80211W
  477. if (action->category == WLAN_ACTION_SA_QUERY && action->len >= 4) {
  478. wpa_printf(MSG_DEBUG, "%s: SA_QUERY_ACTION length %d",
  479. __func__, (int) action->len);
  480. ieee802_11_sa_query_action(hapd, action->sa,
  481. *(action->data + 1),
  482. action->data + 2);
  483. }
  484. #endif /* CONFIG_IEEE80211W */
  485. #ifdef CONFIG_WNM
  486. if (action->category == WLAN_ACTION_WNM) {
  487. wpa_printf(MSG_DEBUG, "%s: WNM_ACTION length %d",
  488. __func__, (int) action->len);
  489. ieee802_11_rx_wnm_action_ap(hapd, action);
  490. }
  491. #endif /* CONFIG_WNM */
  492. }
  493. #ifdef NEED_AP_MLME
  494. #define HAPD_BROADCAST ((struct hostapd_data *) -1)
  495. static struct hostapd_data * get_hapd_bssid(struct hostapd_iface *iface,
  496. const u8 *bssid)
  497. {
  498. size_t i;
  499. if (bssid == NULL)
  500. return NULL;
  501. if (bssid[0] == 0xff && bssid[1] == 0xff && bssid[2] == 0xff &&
  502. bssid[3] == 0xff && bssid[4] == 0xff && bssid[5] == 0xff)
  503. return HAPD_BROADCAST;
  504. for (i = 0; i < iface->num_bss; i++) {
  505. if (os_memcmp(bssid, iface->bss[i]->own_addr, ETH_ALEN) == 0)
  506. return iface->bss[i];
  507. }
  508. return NULL;
  509. }
  510. static void hostapd_rx_from_unknown_sta(struct hostapd_data *hapd,
  511. const u8 *bssid, const u8 *addr,
  512. int wds)
  513. {
  514. hapd = get_hapd_bssid(hapd->iface, bssid);
  515. if (hapd == NULL || hapd == HAPD_BROADCAST)
  516. return;
  517. ieee802_11_rx_from_unknown(hapd, addr, wds);
  518. }
  519. static void hostapd_mgmt_rx(struct hostapd_data *hapd, struct rx_mgmt *rx_mgmt)
  520. {
  521. struct hostapd_iface *iface = hapd->iface;
  522. const struct ieee80211_hdr *hdr;
  523. const u8 *bssid;
  524. struct hostapd_frame_info fi;
  525. hdr = (const struct ieee80211_hdr *) rx_mgmt->frame;
  526. bssid = get_hdr_bssid(hdr, rx_mgmt->frame_len);
  527. if (bssid == NULL)
  528. return;
  529. hapd = get_hapd_bssid(iface, bssid);
  530. if (hapd == NULL) {
  531. u16 fc;
  532. fc = le_to_host16(hdr->frame_control);
  533. /*
  534. * Drop frames to unknown BSSIDs except for Beacon frames which
  535. * could be used to update neighbor information.
  536. */
  537. if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
  538. WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_BEACON)
  539. hapd = iface->bss[0];
  540. else
  541. return;
  542. }
  543. os_memset(&fi, 0, sizeof(fi));
  544. fi.datarate = rx_mgmt->datarate;
  545. fi.ssi_signal = rx_mgmt->ssi_signal;
  546. if (hapd == HAPD_BROADCAST) {
  547. size_t i;
  548. for (i = 0; i < iface->num_bss; i++)
  549. ieee802_11_mgmt(iface->bss[i], rx_mgmt->frame,
  550. rx_mgmt->frame_len, &fi);
  551. } else
  552. ieee802_11_mgmt(hapd, rx_mgmt->frame, rx_mgmt->frame_len, &fi);
  553. random_add_randomness(&fi, sizeof(fi));
  554. }
  555. static void hostapd_rx_action(struct hostapd_data *hapd,
  556. struct rx_action *rx_action)
  557. {
  558. struct rx_mgmt rx_mgmt;
  559. u8 *buf;
  560. struct ieee80211_hdr *hdr;
  561. wpa_printf(MSG_DEBUG, "EVENT_RX_ACTION DA=" MACSTR " SA=" MACSTR
  562. " BSSID=" MACSTR " category=%u",
  563. MAC2STR(rx_action->da), MAC2STR(rx_action->sa),
  564. MAC2STR(rx_action->bssid), rx_action->category);
  565. wpa_hexdump(MSG_MSGDUMP, "Received action frame contents",
  566. rx_action->data, rx_action->len);
  567. buf = os_zalloc(24 + 1 + rx_action->len);
  568. if (buf == NULL)
  569. return;
  570. hdr = (struct ieee80211_hdr *) buf;
  571. hdr->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
  572. WLAN_FC_STYPE_ACTION);
  573. if (rx_action->category == WLAN_ACTION_SA_QUERY) {
  574. /*
  575. * Assume frame was protected; it would have been dropped if
  576. * not.
  577. */
  578. hdr->frame_control |= host_to_le16(WLAN_FC_ISWEP);
  579. }
  580. os_memcpy(hdr->addr1, rx_action->da, ETH_ALEN);
  581. os_memcpy(hdr->addr2, rx_action->sa, ETH_ALEN);
  582. os_memcpy(hdr->addr3, rx_action->bssid, ETH_ALEN);
  583. buf[24] = rx_action->category;
  584. os_memcpy(buf + 24 + 1, rx_action->data, rx_action->len);
  585. os_memset(&rx_mgmt, 0, sizeof(rx_mgmt));
  586. rx_mgmt.frame = buf;
  587. rx_mgmt.frame_len = 24 + 1 + rx_action->len;
  588. hostapd_mgmt_rx(hapd, &rx_mgmt);
  589. os_free(buf);
  590. }
  591. static void hostapd_mgmt_tx_cb(struct hostapd_data *hapd, const u8 *buf,
  592. size_t len, u16 stype, int ok)
  593. {
  594. struct ieee80211_hdr *hdr;
  595. hdr = (struct ieee80211_hdr *) buf;
  596. hapd = get_hapd_bssid(hapd->iface, get_hdr_bssid(hdr, len));
  597. if (hapd == NULL || hapd == HAPD_BROADCAST)
  598. return;
  599. ieee802_11_mgmt_cb(hapd, buf, len, stype, ok);
  600. }
  601. #endif /* NEED_AP_MLME */
  602. static int hostapd_event_new_sta(struct hostapd_data *hapd, const u8 *addr)
  603. {
  604. struct sta_info *sta = ap_get_sta(hapd, addr);
  605. if (sta)
  606. return 0;
  607. wpa_printf(MSG_DEBUG, "Data frame from unknown STA " MACSTR
  608. " - adding a new STA", MAC2STR(addr));
  609. sta = ap_sta_add(hapd, addr);
  610. if (sta) {
  611. hostapd_new_assoc_sta(hapd, sta, 0);
  612. } else {
  613. wpa_printf(MSG_DEBUG, "Failed to add STA entry for " MACSTR,
  614. MAC2STR(addr));
  615. return -1;
  616. }
  617. return 0;
  618. }
  619. static void hostapd_event_eapol_rx(struct hostapd_data *hapd, const u8 *src,
  620. const u8 *data, size_t data_len)
  621. {
  622. struct hostapd_iface *iface = hapd->iface;
  623. struct sta_info *sta;
  624. size_t j;
  625. for (j = 0; j < iface->num_bss; j++) {
  626. if ((sta = ap_get_sta(iface->bss[j], src))) {
  627. if (sta->flags & WLAN_STA_ASSOC) {
  628. hapd = iface->bss[j];
  629. break;
  630. }
  631. }
  632. }
  633. ieee802_1x_receive(hapd, src, data, data_len);
  634. }
  635. static struct hostapd_channel_data * hostapd_get_mode_channel(
  636. struct hostapd_iface *iface, unsigned int freq)
  637. {
  638. int i;
  639. struct hostapd_channel_data *chan;
  640. for (i = 0; i < iface->current_mode->num_channels; i++) {
  641. chan = &iface->current_mode->channels[i];
  642. if (!chan)
  643. return NULL;
  644. if ((unsigned int) chan->freq == freq)
  645. return chan;
  646. }
  647. return NULL;
  648. }
  649. static void hostapd_update_nf(struct hostapd_iface *iface,
  650. struct hostapd_channel_data *chan,
  651. struct freq_survey *survey)
  652. {
  653. if (!iface->chans_surveyed) {
  654. chan->min_nf = survey->nf;
  655. iface->lowest_nf = survey->nf;
  656. } else {
  657. if (dl_list_empty(&chan->survey_list))
  658. chan->min_nf = survey->nf;
  659. else if (survey->nf < chan->min_nf)
  660. chan->min_nf = survey->nf;
  661. if (survey->nf < iface->lowest_nf)
  662. iface->lowest_nf = survey->nf;
  663. }
  664. }
  665. static void hostapd_event_get_survey(struct hostapd_data *hapd,
  666. struct survey_results *survey_results)
  667. {
  668. struct hostapd_iface *iface = hapd->iface;
  669. struct freq_survey *survey, *tmp;
  670. struct hostapd_channel_data *chan;
  671. if (dl_list_empty(&survey_results->survey_list)) {
  672. wpa_printf(MSG_DEBUG, "No survey data received");
  673. return;
  674. }
  675. dl_list_for_each_safe(survey, tmp, &survey_results->survey_list,
  676. struct freq_survey, list) {
  677. chan = hostapd_get_mode_channel(iface, survey->freq);
  678. if (!chan)
  679. continue;
  680. if (chan->flag & HOSTAPD_CHAN_DISABLED)
  681. continue;
  682. dl_list_del(&survey->list);
  683. dl_list_add_tail(&chan->survey_list, &survey->list);
  684. hostapd_update_nf(iface, chan, survey);
  685. iface->chans_surveyed++;
  686. }
  687. }
  688. #ifdef NEED_AP_MLME
  689. static void hostapd_event_dfs_radar_detected(struct hostapd_data *hapd,
  690. struct dfs_event *radar)
  691. {
  692. wpa_printf(MSG_DEBUG, "DFS radar detected on %d MHz", radar->freq);
  693. hostapd_dfs_radar_detected(hapd->iface, radar->freq, radar->ht_enabled,
  694. radar->chan_offset, radar->chan_width,
  695. radar->cf1, radar->cf2);
  696. }
  697. static void hostapd_event_dfs_cac_finished(struct hostapd_data *hapd,
  698. struct dfs_event *radar)
  699. {
  700. wpa_printf(MSG_DEBUG, "DFS CAC finished on %d MHz", radar->freq);
  701. hostapd_dfs_complete_cac(hapd->iface, 1, radar->freq, radar->ht_enabled,
  702. radar->chan_offset, radar->chan_width,
  703. radar->cf1, radar->cf2);
  704. }
  705. static void hostapd_event_dfs_cac_aborted(struct hostapd_data *hapd,
  706. struct dfs_event *radar)
  707. {
  708. wpa_printf(MSG_DEBUG, "DFS CAC aborted on %d MHz", radar->freq);
  709. hostapd_dfs_complete_cac(hapd->iface, 0, radar->freq, radar->ht_enabled,
  710. radar->chan_offset, radar->chan_width,
  711. radar->cf1, radar->cf2);
  712. }
  713. static void hostapd_event_dfs_nop_finished(struct hostapd_data *hapd,
  714. struct dfs_event *radar)
  715. {
  716. wpa_printf(MSG_DEBUG, "DFS NOP finished on %d MHz", radar->freq);
  717. hostapd_dfs_nop_finished(hapd->iface, radar->freq, radar->ht_enabled,
  718. radar->chan_offset, radar->chan_width,
  719. radar->cf1, radar->cf2);
  720. }
  721. #endif /* NEED_AP_MLME */
  722. void wpa_supplicant_event(void *ctx, enum wpa_event_type event,
  723. union wpa_event_data *data)
  724. {
  725. struct hostapd_data *hapd = ctx;
  726. #ifndef CONFIG_NO_STDOUT_DEBUG
  727. int level = MSG_DEBUG;
  728. if (event == EVENT_RX_MGMT && data->rx_mgmt.frame &&
  729. data->rx_mgmt.frame_len >= 24) {
  730. const struct ieee80211_hdr *hdr;
  731. u16 fc;
  732. hdr = (const struct ieee80211_hdr *) data->rx_mgmt.frame;
  733. fc = le_to_host16(hdr->frame_control);
  734. if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
  735. WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_BEACON)
  736. level = MSG_EXCESSIVE;
  737. if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
  738. WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_PROBE_REQ)
  739. level = MSG_EXCESSIVE;
  740. }
  741. wpa_dbg(hapd->msg_ctx, level, "Event %s (%d) received",
  742. event_to_string(event), event);
  743. #endif /* CONFIG_NO_STDOUT_DEBUG */
  744. switch (event) {
  745. case EVENT_MICHAEL_MIC_FAILURE:
  746. michael_mic_failure(hapd, data->michael_mic_failure.src, 1);
  747. break;
  748. case EVENT_SCAN_RESULTS:
  749. if (hapd->iface->scan_cb)
  750. hapd->iface->scan_cb(hapd->iface);
  751. break;
  752. #ifdef CONFIG_IEEE80211R
  753. case EVENT_FT_RRB_RX:
  754. wpa_ft_rrb_rx(hapd->wpa_auth, data->ft_rrb_rx.src,
  755. data->ft_rrb_rx.data, data->ft_rrb_rx.data_len);
  756. break;
  757. #endif /* CONFIG_IEEE80211R */
  758. case EVENT_WPS_BUTTON_PUSHED:
  759. hostapd_wps_button_pushed(hapd, NULL);
  760. break;
  761. #ifdef NEED_AP_MLME
  762. case EVENT_TX_STATUS:
  763. switch (data->tx_status.type) {
  764. case WLAN_FC_TYPE_MGMT:
  765. hostapd_mgmt_tx_cb(hapd, data->tx_status.data,
  766. data->tx_status.data_len,
  767. data->tx_status.stype,
  768. data->tx_status.ack);
  769. break;
  770. case WLAN_FC_TYPE_DATA:
  771. hostapd_tx_status(hapd, data->tx_status.dst,
  772. data->tx_status.data,
  773. data->tx_status.data_len,
  774. data->tx_status.ack);
  775. break;
  776. }
  777. break;
  778. case EVENT_EAPOL_TX_STATUS:
  779. hostapd_eapol_tx_status(hapd, data->eapol_tx_status.dst,
  780. data->eapol_tx_status.data,
  781. data->eapol_tx_status.data_len,
  782. data->eapol_tx_status.ack);
  783. break;
  784. case EVENT_DRIVER_CLIENT_POLL_OK:
  785. hostapd_client_poll_ok(hapd, data->client_poll.addr);
  786. break;
  787. case EVENT_RX_FROM_UNKNOWN:
  788. hostapd_rx_from_unknown_sta(hapd, data->rx_from_unknown.bssid,
  789. data->rx_from_unknown.addr,
  790. data->rx_from_unknown.wds);
  791. break;
  792. case EVENT_RX_MGMT:
  793. hostapd_mgmt_rx(hapd, &data->rx_mgmt);
  794. break;
  795. #endif /* NEED_AP_MLME */
  796. case EVENT_RX_PROBE_REQ:
  797. if (data->rx_probe_req.sa == NULL ||
  798. data->rx_probe_req.ie == NULL)
  799. break;
  800. hostapd_probe_req_rx(hapd, data->rx_probe_req.sa,
  801. data->rx_probe_req.da,
  802. data->rx_probe_req.bssid,
  803. data->rx_probe_req.ie,
  804. data->rx_probe_req.ie_len,
  805. data->rx_probe_req.ssi_signal);
  806. break;
  807. case EVENT_NEW_STA:
  808. hostapd_event_new_sta(hapd, data->new_sta.addr);
  809. break;
  810. case EVENT_EAPOL_RX:
  811. hostapd_event_eapol_rx(hapd, data->eapol_rx.src,
  812. data->eapol_rx.data,
  813. data->eapol_rx.data_len);
  814. break;
  815. case EVENT_ASSOC:
  816. hostapd_notif_assoc(hapd, data->assoc_info.addr,
  817. data->assoc_info.req_ies,
  818. data->assoc_info.req_ies_len,
  819. data->assoc_info.reassoc);
  820. break;
  821. case EVENT_DISASSOC:
  822. if (data)
  823. hostapd_notif_disassoc(hapd, data->disassoc_info.addr);
  824. break;
  825. case EVENT_DEAUTH:
  826. if (data)
  827. hostapd_notif_disassoc(hapd, data->deauth_info.addr);
  828. break;
  829. case EVENT_STATION_LOW_ACK:
  830. if (!data)
  831. break;
  832. hostapd_event_sta_low_ack(hapd, data->low_ack.addr);
  833. break;
  834. case EVENT_RX_ACTION:
  835. if (data->rx_action.da == NULL || data->rx_action.sa == NULL ||
  836. data->rx_action.bssid == NULL)
  837. break;
  838. #ifdef NEED_AP_MLME
  839. hostapd_rx_action(hapd, &data->rx_action);
  840. #endif /* NEED_AP_MLME */
  841. hostapd_action_rx(hapd, &data->rx_action);
  842. break;
  843. case EVENT_AUTH:
  844. hostapd_notif_auth(hapd, &data->auth);
  845. break;
  846. case EVENT_CH_SWITCH:
  847. if (!data)
  848. break;
  849. hostapd_event_ch_switch(hapd, data->ch_switch.freq,
  850. data->ch_switch.ht_enabled,
  851. data->ch_switch.ch_offset);
  852. break;
  853. case EVENT_CONNECT_FAILED_REASON:
  854. if (!data)
  855. break;
  856. hostapd_event_connect_failed_reason(
  857. hapd, data->connect_failed_reason.addr,
  858. data->connect_failed_reason.code);
  859. break;
  860. case EVENT_SURVEY:
  861. hostapd_event_get_survey(hapd, &data->survey_results);
  862. break;
  863. #ifdef NEED_AP_MLME
  864. case EVENT_DFS_RADAR_DETECTED:
  865. if (!data)
  866. break;
  867. hostapd_event_dfs_radar_detected(hapd, &data->dfs_event);
  868. break;
  869. case EVENT_DFS_CAC_FINISHED:
  870. if (!data)
  871. break;
  872. hostapd_event_dfs_cac_finished(hapd, &data->dfs_event);
  873. break;
  874. case EVENT_DFS_CAC_ABORTED:
  875. if (!data)
  876. break;
  877. hostapd_event_dfs_cac_aborted(hapd, &data->dfs_event);
  878. break;
  879. case EVENT_DFS_NOP_FINISHED:
  880. if (!data)
  881. break;
  882. hostapd_event_dfs_nop_finished(hapd, &data->dfs_event);
  883. break;
  884. case EVENT_CHANNEL_LIST_CHANGED:
  885. /* channel list changed (regulatory?), update channel list */
  886. /* TODO: check this. hostapd_get_hw_features() initializes
  887. * too much stuff. */
  888. /* hostapd_get_hw_features(hapd->iface); */
  889. hostapd_channel_list_updated(
  890. hapd->iface, data->channel_list_changed.initiator);
  891. break;
  892. #endif /* NEED_AP_MLME */
  893. default:
  894. wpa_printf(MSG_DEBUG, "Unknown event %d", event);
  895. break;
  896. }
  897. }
  898. #endif /* HOSTAPD */