process.c 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717
  1. /*
  2. * Received frame processing
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include "utils/common.h"
  16. #include "utils/radiotap.h"
  17. #include "utils/radiotap_iter.h"
  18. #include "common/ieee802_11_defs.h"
  19. #include "common/ieee802_11_common.h"
  20. #include "wlantest.h"
  21. static const char * mgmt_stype(u16 stype)
  22. {
  23. switch (stype) {
  24. case WLAN_FC_STYPE_ASSOC_REQ:
  25. return "ASSOC-REQ";
  26. case WLAN_FC_STYPE_ASSOC_RESP:
  27. return "ASSOC-RESP";
  28. case WLAN_FC_STYPE_REASSOC_REQ:
  29. return "REASSOC-REQ";
  30. case WLAN_FC_STYPE_REASSOC_RESP:
  31. return "REASSOC-RESP";
  32. case WLAN_FC_STYPE_PROBE_REQ:
  33. return "PROBE-REQ";
  34. case WLAN_FC_STYPE_PROBE_RESP:
  35. return "PROBE-RESP";
  36. case WLAN_FC_STYPE_BEACON:
  37. return "BEACON";
  38. case WLAN_FC_STYPE_ATIM:
  39. return "ATIM";
  40. case WLAN_FC_STYPE_DISASSOC:
  41. return "DISASSOC";
  42. case WLAN_FC_STYPE_AUTH:
  43. return "AUTH";
  44. case WLAN_FC_STYPE_DEAUTH:
  45. return "DEAUTH";
  46. case WLAN_FC_STYPE_ACTION:
  47. return "ACTION";
  48. }
  49. return "??";
  50. }
  51. static void bss_update(struct wlantest_bss *bss,
  52. struct ieee802_11_elems *elems)
  53. {
  54. if (elems->ssid == NULL || elems->ssid_len > 32) {
  55. wpa_printf(MSG_INFO, "Invalid or missing SSID in a Beacon "
  56. "frame for " MACSTR, MAC2STR(bss->bssid));
  57. bss->parse_error_reported = 1;
  58. return;
  59. }
  60. os_memcpy(bss->ssid, elems->ssid, elems->ssid_len);
  61. bss->ssid_len = elems->ssid_len;
  62. if (elems->rsn_ie == NULL) {
  63. if (bss->rsnie[0]) {
  64. wpa_printf(MSG_INFO, "BSS " MACSTR " - RSN IE removed",
  65. MAC2STR(bss->bssid));
  66. bss->rsnie[0] = 0;
  67. }
  68. } else {
  69. if (bss->rsnie[0] == 0 ||
  70. os_memcmp(bss->rsnie, elems->rsn_ie - 2,
  71. elems->rsn_ie_len + 2) != 0) {
  72. wpa_printf(MSG_INFO, "BSS " MACSTR " - RSN IE "
  73. "stored", MAC2STR(bss->bssid));
  74. wpa_hexdump(MSG_DEBUG, "RSN IE", elems->rsn_ie - 2,
  75. elems->rsn_ie_len + 2);
  76. }
  77. os_memcpy(bss->rsnie, elems->rsn_ie - 2,
  78. elems->rsn_ie_len + 2);
  79. }
  80. if (elems->wpa_ie == NULL) {
  81. if (bss->wpaie[0]) {
  82. wpa_printf(MSG_INFO, "BSS " MACSTR " - WPA IE removed",
  83. MAC2STR(bss->bssid));
  84. bss->wpaie[0] = 0;
  85. }
  86. } else {
  87. if (bss->wpaie[0] == 0 ||
  88. os_memcmp(bss->wpaie, elems->wpa_ie - 2,
  89. elems->wpa_ie_len + 2) != 0) {
  90. wpa_printf(MSG_INFO, "BSS " MACSTR " - WPA IE "
  91. "stored", MAC2STR(bss->bssid));
  92. wpa_hexdump(MSG_DEBUG, "WPA IE", elems->wpa_ie - 2,
  93. elems->wpa_ie_len + 2);
  94. }
  95. os_memcpy(bss->wpaie, elems->wpa_ie - 2,
  96. elems->wpa_ie_len + 2);
  97. }
  98. }
  99. static void rx_mgmt_beacon(struct wlantest *wt, const u8 *data, size_t len)
  100. {
  101. const struct ieee80211_mgmt *mgmt;
  102. struct wlantest_bss *bss;
  103. struct ieee802_11_elems elems;
  104. mgmt = (const struct ieee80211_mgmt *) data;
  105. bss = bss_get(wt, mgmt->bssid);
  106. if (bss == NULL)
  107. return;
  108. if (bss->proberesp_seen)
  109. return; /* do not override with Beacon data */
  110. bss->capab_info = le_to_host16(mgmt->u.beacon.capab_info);
  111. if (ieee802_11_parse_elems(mgmt->u.beacon.variable,
  112. len - (mgmt->u.beacon.variable - data),
  113. &elems, 0) == ParseFailed) {
  114. if (bss->parse_error_reported)
  115. return;
  116. wpa_printf(MSG_INFO, "Invalid IEs in a Beacon frame from "
  117. MACSTR, MAC2STR(mgmt->sa));
  118. bss->parse_error_reported = 1;
  119. return;
  120. }
  121. bss_update(bss, &elems);
  122. }
  123. static void rx_mgmt_probe_resp(struct wlantest *wt, const u8 *data, size_t len)
  124. {
  125. const struct ieee80211_mgmt *mgmt;
  126. struct wlantest_bss *bss;
  127. struct ieee802_11_elems elems;
  128. mgmt = (const struct ieee80211_mgmt *) data;
  129. bss = bss_get(wt, mgmt->bssid);
  130. if (bss == NULL)
  131. return;
  132. bss->capab_info = le_to_host16(mgmt->u.probe_resp.capab_info);
  133. if (ieee802_11_parse_elems(mgmt->u.probe_resp.variable,
  134. len - (mgmt->u.probe_resp.variable - data),
  135. &elems, 0) == ParseFailed) {
  136. if (bss->parse_error_reported)
  137. return;
  138. wpa_printf(MSG_INFO, "Invalid IEs in a Probe Response frame "
  139. "from " MACSTR, MAC2STR(mgmt->sa));
  140. bss->parse_error_reported = 1;
  141. return;
  142. }
  143. bss_update(bss, &elems);
  144. }
  145. static void rx_mgmt_auth(struct wlantest *wt, const u8 *data, size_t len)
  146. {
  147. const struct ieee80211_mgmt *mgmt;
  148. struct wlantest_bss *bss;
  149. struct wlantest_sta *sta;
  150. u16 alg, trans, status;
  151. mgmt = (const struct ieee80211_mgmt *) data;
  152. bss = bss_get(wt, mgmt->bssid);
  153. if (bss == NULL)
  154. return;
  155. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  156. sta = sta_get(bss, mgmt->da);
  157. else
  158. sta = sta_get(bss, mgmt->sa);
  159. if (sta == NULL)
  160. return;
  161. if (len < 24 + 6) {
  162. wpa_printf(MSG_INFO, "Too short Authentication frame from "
  163. MACSTR, MAC2STR(mgmt->sa));
  164. return;
  165. }
  166. alg = le_to_host16(mgmt->u.auth.auth_alg);
  167. trans = le_to_host16(mgmt->u.auth.auth_transaction);
  168. status = le_to_host16(mgmt->u.auth.status_code);
  169. wpa_printf(MSG_DEBUG, "AUTH " MACSTR " -> " MACSTR
  170. " (alg=%u trans=%u status=%u)",
  171. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), alg, trans, status);
  172. if (alg == 0 && trans == 2 && status == 0) {
  173. if (sta->state == STATE1) {
  174. wpa_printf(MSG_DEBUG, "STA " MACSTR
  175. " moved to State 2 with " MACSTR,
  176. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  177. sta->state = STATE2;
  178. }
  179. }
  180. }
  181. static void rx_mgmt_deauth(struct wlantest *wt, const u8 *data, size_t len)
  182. {
  183. const struct ieee80211_mgmt *mgmt;
  184. struct wlantest_bss *bss;
  185. struct wlantest_sta *sta;
  186. mgmt = (const struct ieee80211_mgmt *) data;
  187. bss = bss_get(wt, mgmt->bssid);
  188. if (bss == NULL)
  189. return;
  190. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  191. sta = sta_get(bss, mgmt->da);
  192. else
  193. sta = sta_get(bss, mgmt->sa);
  194. if (sta == NULL)
  195. return;
  196. if (len < 24 + 2) {
  197. wpa_printf(MSG_INFO, "Too short Deauthentication frame from "
  198. MACSTR, MAC2STR(mgmt->sa));
  199. return;
  200. }
  201. wpa_printf(MSG_DEBUG, "DEAUTH " MACSTR " -> " MACSTR
  202. " (reason=%u)",
  203. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  204. le_to_host16(mgmt->u.deauth.reason_code));
  205. if (sta->state != STATE1) {
  206. wpa_printf(MSG_DEBUG, "STA " MACSTR
  207. " moved to State 1 with " MACSTR,
  208. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  209. sta->state = STATE1;
  210. }
  211. }
  212. static void rx_mgmt_assoc_req(struct wlantest *wt, const u8 *data, size_t len)
  213. {
  214. const struct ieee80211_mgmt *mgmt;
  215. struct wlantest_bss *bss;
  216. struct wlantest_sta *sta;
  217. mgmt = (const struct ieee80211_mgmt *) data;
  218. bss = bss_get(wt, mgmt->bssid);
  219. if (bss == NULL)
  220. return;
  221. sta = sta_get(bss, mgmt->sa);
  222. if (sta == NULL)
  223. return;
  224. if (len < 24 + 4) {
  225. wpa_printf(MSG_INFO, "Too short Association Request frame "
  226. "from " MACSTR, MAC2STR(mgmt->sa));
  227. return;
  228. }
  229. wpa_printf(MSG_DEBUG, "ASSOCREQ " MACSTR " -> " MACSTR
  230. " (capab=0x%x listen_int=%u)",
  231. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  232. le_to_host16(mgmt->u.assoc_req.capab_info),
  233. le_to_host16(mgmt->u.assoc_req.listen_interval));
  234. }
  235. static void rx_mgmt_assoc_resp(struct wlantest *wt, const u8 *data, size_t len)
  236. {
  237. const struct ieee80211_mgmt *mgmt;
  238. struct wlantest_bss *bss;
  239. struct wlantest_sta *sta;
  240. u16 capab, status, aid;
  241. mgmt = (const struct ieee80211_mgmt *) data;
  242. bss = bss_get(wt, mgmt->bssid);
  243. if (bss == NULL)
  244. return;
  245. sta = sta_get(bss, mgmt->da);
  246. if (sta == NULL)
  247. return;
  248. if (len < 24 + 6) {
  249. wpa_printf(MSG_INFO, "Too short Association Response frame "
  250. "from " MACSTR, MAC2STR(mgmt->sa));
  251. return;
  252. }
  253. capab = le_to_host16(mgmt->u.assoc_resp.capab_info);
  254. status = le_to_host16(mgmt->u.assoc_resp.status_code);
  255. aid = le_to_host16(mgmt->u.assoc_resp.aid);
  256. wpa_printf(MSG_DEBUG, "ASSOCRESP " MACSTR " -> " MACSTR
  257. " (capab=0x%x status=%u aid=%u)",
  258. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
  259. aid & 0x3fff);
  260. if (status)
  261. return;
  262. if ((aid & 0xc000) != 0xc000) {
  263. wpa_printf(MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
  264. "in Association Response from " MACSTR,
  265. MAC2STR(mgmt->sa));
  266. }
  267. sta->aid = aid & 0xc000;
  268. if (sta->state < STATE2) {
  269. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 when "
  270. "getting associated", MAC2STR(sta->addr));
  271. }
  272. if (sta->state < STATE3) {
  273. wpa_printf(MSG_DEBUG, "STA " MACSTR
  274. " moved to State 3 with " MACSTR,
  275. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  276. sta->state = STATE3;
  277. }
  278. }
  279. static void rx_mgmt_reassoc_req(struct wlantest *wt, const u8 *data,
  280. size_t len)
  281. {
  282. const struct ieee80211_mgmt *mgmt;
  283. struct wlantest_bss *bss;
  284. struct wlantest_sta *sta;
  285. mgmt = (const struct ieee80211_mgmt *) data;
  286. bss = bss_get(wt, mgmt->bssid);
  287. if (bss == NULL)
  288. return;
  289. sta = sta_get(bss, mgmt->sa);
  290. if (sta == NULL)
  291. return;
  292. if (len < 24 + 4 + ETH_ALEN) {
  293. wpa_printf(MSG_INFO, "Too short Reassociation Request frame "
  294. "from " MACSTR, MAC2STR(mgmt->sa));
  295. return;
  296. }
  297. wpa_printf(MSG_DEBUG, "REASSOCREQ " MACSTR " -> " MACSTR
  298. " (capab=0x%x listen_int=%u current_ap=" MACSTR ")",
  299. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  300. le_to_host16(mgmt->u.reassoc_req.capab_info),
  301. le_to_host16(mgmt->u.reassoc_req.listen_interval),
  302. MAC2STR(mgmt->u.reassoc_req.current_ap));
  303. }
  304. static void rx_mgmt_reassoc_resp(struct wlantest *wt, const u8 *data,
  305. size_t len)
  306. {
  307. const struct ieee80211_mgmt *mgmt;
  308. struct wlantest_bss *bss;
  309. struct wlantest_sta *sta;
  310. u16 capab, status, aid;
  311. mgmt = (const struct ieee80211_mgmt *) data;
  312. bss = bss_get(wt, mgmt->bssid);
  313. if (bss == NULL)
  314. return;
  315. sta = sta_get(bss, mgmt->da);
  316. if (sta == NULL)
  317. return;
  318. if (len < 24 + 6) {
  319. wpa_printf(MSG_INFO, "Too short Reassociation Response frame "
  320. "from " MACSTR, MAC2STR(mgmt->sa));
  321. return;
  322. }
  323. capab = le_to_host16(mgmt->u.reassoc_resp.capab_info);
  324. status = le_to_host16(mgmt->u.reassoc_resp.status_code);
  325. aid = le_to_host16(mgmt->u.reassoc_resp.aid);
  326. wpa_printf(MSG_DEBUG, "REASSOCRESP " MACSTR " -> " MACSTR
  327. " (capab=0x%x status=%u aid=%u)",
  328. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
  329. aid & 0x3fff);
  330. if (status)
  331. return;
  332. if ((aid & 0xc000) != 0xc000) {
  333. wpa_printf(MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
  334. "in Reassociation Response from " MACSTR,
  335. MAC2STR(mgmt->sa));
  336. }
  337. sta->aid = aid & 0xc000;
  338. if (sta->state < STATE2) {
  339. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 when "
  340. "getting associated", MAC2STR(sta->addr));
  341. }
  342. if (sta->state < STATE3) {
  343. wpa_printf(MSG_DEBUG, "STA " MACSTR
  344. " moved to State 3 with " MACSTR,
  345. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  346. sta->state = STATE3;
  347. }
  348. }
  349. static void rx_mgmt_disassoc(struct wlantest *wt, const u8 *data, size_t len)
  350. {
  351. const struct ieee80211_mgmt *mgmt;
  352. struct wlantest_bss *bss;
  353. struct wlantest_sta *sta;
  354. mgmt = (const struct ieee80211_mgmt *) data;
  355. bss = bss_get(wt, mgmt->bssid);
  356. if (bss == NULL)
  357. return;
  358. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  359. sta = sta_get(bss, mgmt->da);
  360. else
  361. sta = sta_get(bss, mgmt->sa);
  362. if (sta == NULL)
  363. return;
  364. if (len < 24 + 2) {
  365. wpa_printf(MSG_INFO, "Too short Disassociation frame from "
  366. MACSTR, MAC2STR(mgmt->sa));
  367. return;
  368. }
  369. wpa_printf(MSG_DEBUG, "DISASSOC " MACSTR " -> " MACSTR
  370. " (reason=%u)",
  371. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  372. le_to_host16(mgmt->u.disassoc.reason_code));
  373. if (sta->state < STATE2) {
  374. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 or 3 "
  375. "when getting disassociated", MAC2STR(sta->addr));
  376. }
  377. if (sta->state > STATE2) {
  378. wpa_printf(MSG_DEBUG, "STA " MACSTR
  379. " moved to State 2 with " MACSTR,
  380. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  381. sta->state = STATE2;
  382. }
  383. }
  384. static void rx_mgmt(struct wlantest *wt, const u8 *data, size_t len)
  385. {
  386. const struct ieee80211_hdr *hdr;
  387. u16 fc, stype;
  388. if (len < 24)
  389. return;
  390. hdr = (const struct ieee80211_hdr *) data;
  391. fc = le_to_host16(hdr->frame_control);
  392. wt->rx_mgmt++;
  393. stype = WLAN_FC_GET_STYPE(fc);
  394. wpa_printf((stype == WLAN_FC_STYPE_BEACON ||
  395. stype == WLAN_FC_STYPE_PROBE_RESP ||
  396. stype == WLAN_FC_STYPE_PROBE_REQ) ?
  397. MSG_EXCESSIVE : MSG_MSGDUMP,
  398. "MGMT %s%s%s DA=" MACSTR " SA=" MACSTR " BSSID=" MACSTR,
  399. mgmt_stype(stype),
  400. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  401. fc & WLAN_FC_ISWEP ? " Prot" : "",
  402. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  403. MAC2STR(hdr->addr3));
  404. switch (stype) {
  405. case WLAN_FC_STYPE_BEACON:
  406. rx_mgmt_beacon(wt, data, len);
  407. break;
  408. case WLAN_FC_STYPE_PROBE_RESP:
  409. rx_mgmt_probe_resp(wt, data, len);
  410. break;
  411. case WLAN_FC_STYPE_AUTH:
  412. rx_mgmt_auth(wt, data, len);
  413. break;
  414. case WLAN_FC_STYPE_DEAUTH:
  415. rx_mgmt_deauth(wt, data, len);
  416. break;
  417. case WLAN_FC_STYPE_ASSOC_REQ:
  418. rx_mgmt_assoc_req(wt, data, len);
  419. break;
  420. case WLAN_FC_STYPE_ASSOC_RESP:
  421. rx_mgmt_assoc_resp(wt, data, len);
  422. break;
  423. case WLAN_FC_STYPE_REASSOC_REQ:
  424. rx_mgmt_reassoc_req(wt, data, len);
  425. break;
  426. case WLAN_FC_STYPE_REASSOC_RESP:
  427. rx_mgmt_reassoc_resp(wt, data, len);
  428. break;
  429. case WLAN_FC_STYPE_DISASSOC:
  430. rx_mgmt_disassoc(wt, data, len);
  431. break;
  432. }
  433. }
  434. static const char * data_stype(u16 stype)
  435. {
  436. switch (stype) {
  437. case WLAN_FC_STYPE_DATA:
  438. return "DATA";
  439. case WLAN_FC_STYPE_DATA_CFACK:
  440. return "DATA-CFACK";
  441. case WLAN_FC_STYPE_DATA_CFPOLL:
  442. return "DATA-CFPOLL";
  443. case WLAN_FC_STYPE_DATA_CFACKPOLL:
  444. return "DATA-CFACKPOLL";
  445. case WLAN_FC_STYPE_NULLFUNC:
  446. return "NULLFUNC";
  447. case WLAN_FC_STYPE_CFACK:
  448. return "CFACK";
  449. case WLAN_FC_STYPE_CFPOLL:
  450. return "CFPOLL";
  451. case WLAN_FC_STYPE_CFACKPOLL:
  452. return "CFACKPOLL";
  453. case WLAN_FC_STYPE_QOS_DATA:
  454. return "QOSDATA";
  455. case WLAN_FC_STYPE_QOS_DATA_CFACK:
  456. return "QOSDATA-CFACK";
  457. case WLAN_FC_STYPE_QOS_DATA_CFPOLL:
  458. return "QOSDATA-CFPOLL";
  459. case WLAN_FC_STYPE_QOS_DATA_CFACKPOLL:
  460. return "QOSDATA-CFACKPOLL";
  461. case WLAN_FC_STYPE_QOS_NULL:
  462. return "QOS-NULL";
  463. case WLAN_FC_STYPE_QOS_CFPOLL:
  464. return "QOS-CFPOLL";
  465. case WLAN_FC_STYPE_QOS_CFACKPOLL:
  466. return "QOS-CFACKPOLL";
  467. }
  468. return "??";
  469. }
  470. static void rx_data(struct wlantest *wt, const u8 *data, size_t len)
  471. {
  472. const struct ieee80211_hdr *hdr;
  473. u16 fc;
  474. if (len < 24)
  475. return;
  476. hdr = (const struct ieee80211_hdr *) data;
  477. fc = le_to_host16(hdr->frame_control);
  478. wt->rx_data++;
  479. switch (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) {
  480. case 0:
  481. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s IBSS DA=" MACSTR " SA="
  482. MACSTR " BSSID=" MACSTR,
  483. data_stype(WLAN_FC_GET_STYPE(fc)),
  484. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  485. fc & WLAN_FC_ISWEP ? " Prot" : "",
  486. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  487. MAC2STR(hdr->addr3));
  488. break;
  489. case WLAN_FC_FROMDS:
  490. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s FromDS DA=" MACSTR
  491. " BSSID=" MACSTR " SA=" MACSTR,
  492. data_stype(WLAN_FC_GET_STYPE(fc)),
  493. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  494. fc & WLAN_FC_ISWEP ? " Prot" : "",
  495. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  496. MAC2STR(hdr->addr3));
  497. break;
  498. case WLAN_FC_TODS:
  499. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s ToDS BSSID=" MACSTR
  500. " SA=" MACSTR " DA=" MACSTR,
  501. data_stype(WLAN_FC_GET_STYPE(fc)),
  502. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  503. fc & WLAN_FC_ISWEP ? " Prot" : "",
  504. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  505. MAC2STR(hdr->addr3));
  506. break;
  507. case WLAN_FC_TODS | WLAN_FC_FROMDS:
  508. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s WDS RA=" MACSTR " TA="
  509. MACSTR " DA=" MACSTR " SA=" MACSTR,
  510. data_stype(WLAN_FC_GET_STYPE(fc)),
  511. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  512. fc & WLAN_FC_ISWEP ? " Prot" : "",
  513. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  514. MAC2STR(hdr->addr3),
  515. MAC2STR((const u8 *) (hdr + 1)));
  516. break;
  517. }
  518. }
  519. static void rx_frame(struct wlantest *wt, const u8 *data, size_t len)
  520. {
  521. const struct ieee80211_hdr *hdr;
  522. u16 fc;
  523. wpa_hexdump(MSG_EXCESSIVE, "RX frame", data, len);
  524. if (len < 2)
  525. return;
  526. hdr = (const struct ieee80211_hdr *) data;
  527. fc = le_to_host16(hdr->frame_control);
  528. if (fc & WLAN_FC_PVER) {
  529. wpa_printf(MSG_DEBUG, "Drop RX frame with unexpected pver=%d",
  530. fc & WLAN_FC_PVER);
  531. return;
  532. }
  533. switch (WLAN_FC_GET_TYPE(fc)) {
  534. case WLAN_FC_TYPE_MGMT:
  535. rx_mgmt(wt, data, len);
  536. break;
  537. case WLAN_FC_TYPE_CTRL:
  538. if (len < 10)
  539. return;
  540. wt->rx_ctrl++;
  541. break;
  542. case WLAN_FC_TYPE_DATA:
  543. rx_data(wt, data, len);
  544. break;
  545. default:
  546. wpa_printf(MSG_DEBUG, "Drop RX frame with unexpected type %d",
  547. WLAN_FC_GET_TYPE(fc));
  548. break;
  549. }
  550. }
  551. static void tx_status(struct wlantest *wt, const u8 *data, size_t len, int ack)
  552. {
  553. wpa_printf(MSG_DEBUG, "TX status: ack=%d", ack);
  554. wpa_hexdump(MSG_EXCESSIVE, "TX status frame", data, len);
  555. }
  556. static int check_fcs(const u8 *frame, size_t frame_len, const u8 *fcs)
  557. {
  558. if (WPA_GET_LE32(fcs) != crc32(frame, frame_len))
  559. return -1;
  560. return 0;
  561. }
  562. void wlantest_process(struct wlantest *wt, const u8 *data, size_t len)
  563. {
  564. struct ieee80211_radiotap_iterator iter;
  565. int ret;
  566. int rxflags = 0, txflags = 0, failed = 0, fcs = 0;
  567. const u8 *frame, *fcspos;
  568. size_t frame_len;
  569. wpa_hexdump(MSG_EXCESSIVE, "Process data", data, len);
  570. if (ieee80211_radiotap_iterator_init(&iter, (void *) data, len)) {
  571. wpa_printf(MSG_INFO, "Invalid radiotap frame");
  572. return;
  573. }
  574. for (;;) {
  575. ret = ieee80211_radiotap_iterator_next(&iter);
  576. wpa_printf(MSG_EXCESSIVE, "radiotap iter: %d "
  577. "this_arg_index=%d", ret, iter.this_arg_index);
  578. if (ret == -ENOENT)
  579. break;
  580. if (ret) {
  581. wpa_printf(MSG_INFO, "Invalid radiotap header: %d",
  582. ret);
  583. return;
  584. }
  585. switch (iter.this_arg_index) {
  586. case IEEE80211_RADIOTAP_FLAGS:
  587. if (*iter.this_arg & IEEE80211_RADIOTAP_F_FCS)
  588. fcs = 1;
  589. break;
  590. case IEEE80211_RADIOTAP_RX_FLAGS:
  591. rxflags = 1;
  592. break;
  593. case IEEE80211_RADIOTAP_TX_FLAGS:
  594. txflags = 1;
  595. failed = le_to_host16((*(u16 *) iter.this_arg)) &
  596. IEEE80211_RADIOTAP_F_TX_FAIL;
  597. break;
  598. }
  599. }
  600. frame = data + iter.max_length;
  601. frame_len = len - iter.max_length;
  602. if (fcs && frame_len >= 4) {
  603. frame_len -= 4;
  604. fcspos = frame + frame_len;
  605. if (check_fcs(frame, frame_len, fcspos) < 0) {
  606. wpa_printf(MSG_EXCESSIVE, "Drop RX frame with invalid "
  607. "FCS");
  608. wt->fcs_error++;
  609. return;
  610. }
  611. }
  612. if (rxflags && txflags)
  613. return;
  614. if (!txflags)
  615. rx_frame(wt, frame, frame_len);
  616. else
  617. tx_status(wt, frame, frame_len, !failed);
  618. }