rx_mgmt.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591
  1. /*
  2. * Received Management frame processing
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include "utils/common.h"
  16. #include "common/ieee802_11_defs.h"
  17. #include "common/ieee802_11_common.h"
  18. #include "crypto/aes_wrap.h"
  19. #include "wlantest.h"
  20. static const char * mgmt_stype(u16 stype)
  21. {
  22. switch (stype) {
  23. case WLAN_FC_STYPE_ASSOC_REQ:
  24. return "ASSOC-REQ";
  25. case WLAN_FC_STYPE_ASSOC_RESP:
  26. return "ASSOC-RESP";
  27. case WLAN_FC_STYPE_REASSOC_REQ:
  28. return "REASSOC-REQ";
  29. case WLAN_FC_STYPE_REASSOC_RESP:
  30. return "REASSOC-RESP";
  31. case WLAN_FC_STYPE_PROBE_REQ:
  32. return "PROBE-REQ";
  33. case WLAN_FC_STYPE_PROBE_RESP:
  34. return "PROBE-RESP";
  35. case WLAN_FC_STYPE_BEACON:
  36. return "BEACON";
  37. case WLAN_FC_STYPE_ATIM:
  38. return "ATIM";
  39. case WLAN_FC_STYPE_DISASSOC:
  40. return "DISASSOC";
  41. case WLAN_FC_STYPE_AUTH:
  42. return "AUTH";
  43. case WLAN_FC_STYPE_DEAUTH:
  44. return "DEAUTH";
  45. case WLAN_FC_STYPE_ACTION:
  46. return "ACTION";
  47. }
  48. return "??";
  49. }
  50. static void rx_mgmt_beacon(struct wlantest *wt, const u8 *data, size_t len)
  51. {
  52. const struct ieee80211_mgmt *mgmt;
  53. struct wlantest_bss *bss;
  54. struct ieee802_11_elems elems;
  55. mgmt = (const struct ieee80211_mgmt *) data;
  56. bss = bss_get(wt, mgmt->bssid);
  57. if (bss == NULL)
  58. return;
  59. if (bss->proberesp_seen)
  60. return; /* do not override with Beacon data */
  61. bss->capab_info = le_to_host16(mgmt->u.beacon.capab_info);
  62. if (ieee802_11_parse_elems(mgmt->u.beacon.variable,
  63. len - (mgmt->u.beacon.variable - data),
  64. &elems, 0) == ParseFailed) {
  65. if (bss->parse_error_reported)
  66. return;
  67. wpa_printf(MSG_INFO, "Invalid IEs in a Beacon frame from "
  68. MACSTR, MAC2STR(mgmt->sa));
  69. bss->parse_error_reported = 1;
  70. return;
  71. }
  72. bss_update(wt, bss, &elems);
  73. }
  74. static void rx_mgmt_probe_resp(struct wlantest *wt, const u8 *data, size_t len)
  75. {
  76. const struct ieee80211_mgmt *mgmt;
  77. struct wlantest_bss *bss;
  78. struct ieee802_11_elems elems;
  79. mgmt = (const struct ieee80211_mgmt *) data;
  80. bss = bss_get(wt, mgmt->bssid);
  81. if (bss == NULL)
  82. return;
  83. bss->capab_info = le_to_host16(mgmt->u.probe_resp.capab_info);
  84. if (ieee802_11_parse_elems(mgmt->u.probe_resp.variable,
  85. len - (mgmt->u.probe_resp.variable - data),
  86. &elems, 0) == ParseFailed) {
  87. if (bss->parse_error_reported)
  88. return;
  89. wpa_printf(MSG_INFO, "Invalid IEs in a Probe Response frame "
  90. "from " MACSTR, MAC2STR(mgmt->sa));
  91. bss->parse_error_reported = 1;
  92. return;
  93. }
  94. bss_update(wt, bss, &elems);
  95. }
  96. static void rx_mgmt_auth(struct wlantest *wt, const u8 *data, size_t len)
  97. {
  98. const struct ieee80211_mgmt *mgmt;
  99. struct wlantest_bss *bss;
  100. struct wlantest_sta *sta;
  101. u16 alg, trans, status;
  102. mgmt = (const struct ieee80211_mgmt *) data;
  103. bss = bss_get(wt, mgmt->bssid);
  104. if (bss == NULL)
  105. return;
  106. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  107. sta = sta_get(bss, mgmt->da);
  108. else
  109. sta = sta_get(bss, mgmt->sa);
  110. if (sta == NULL)
  111. return;
  112. if (len < 24 + 6) {
  113. wpa_printf(MSG_INFO, "Too short Authentication frame from "
  114. MACSTR, MAC2STR(mgmt->sa));
  115. return;
  116. }
  117. alg = le_to_host16(mgmt->u.auth.auth_alg);
  118. trans = le_to_host16(mgmt->u.auth.auth_transaction);
  119. status = le_to_host16(mgmt->u.auth.status_code);
  120. wpa_printf(MSG_DEBUG, "AUTH " MACSTR " -> " MACSTR
  121. " (alg=%u trans=%u status=%u)",
  122. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), alg, trans, status);
  123. if (alg == 0 && trans == 2 && status == 0) {
  124. if (sta->state == STATE1) {
  125. wpa_printf(MSG_DEBUG, "STA " MACSTR
  126. " moved to State 2 with " MACSTR,
  127. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  128. sta->state = STATE2;
  129. }
  130. }
  131. }
  132. static void rx_mgmt_deauth(struct wlantest *wt, const u8 *data, size_t len)
  133. {
  134. const struct ieee80211_mgmt *mgmt;
  135. struct wlantest_bss *bss;
  136. struct wlantest_sta *sta;
  137. mgmt = (const struct ieee80211_mgmt *) data;
  138. bss = bss_get(wt, mgmt->bssid);
  139. if (bss == NULL)
  140. return;
  141. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  142. sta = sta_get(bss, mgmt->da);
  143. else
  144. sta = sta_get(bss, mgmt->sa);
  145. if (sta == NULL)
  146. return;
  147. if (len < 24 + 2) {
  148. wpa_printf(MSG_INFO, "Too short Deauthentication frame from "
  149. MACSTR, MAC2STR(mgmt->sa));
  150. return;
  151. }
  152. wpa_printf(MSG_DEBUG, "DEAUTH " MACSTR " -> " MACSTR
  153. " (reason=%u)",
  154. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  155. le_to_host16(mgmt->u.deauth.reason_code));
  156. if (sta->state != STATE1) {
  157. wpa_printf(MSG_DEBUG, "STA " MACSTR
  158. " moved to State 1 with " MACSTR,
  159. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  160. sta->state = STATE1;
  161. }
  162. }
  163. static void rx_mgmt_assoc_req(struct wlantest *wt, const u8 *data, size_t len)
  164. {
  165. const struct ieee80211_mgmt *mgmt;
  166. struct wlantest_bss *bss;
  167. struct wlantest_sta *sta;
  168. struct ieee802_11_elems elems;
  169. mgmt = (const struct ieee80211_mgmt *) data;
  170. bss = bss_get(wt, mgmt->bssid);
  171. if (bss == NULL)
  172. return;
  173. sta = sta_get(bss, mgmt->sa);
  174. if (sta == NULL)
  175. return;
  176. if (len < 24 + 4) {
  177. wpa_printf(MSG_INFO, "Too short Association Request frame "
  178. "from " MACSTR, MAC2STR(mgmt->sa));
  179. return;
  180. }
  181. wpa_printf(MSG_DEBUG, "ASSOCREQ " MACSTR " -> " MACSTR
  182. " (capab=0x%x listen_int=%u)",
  183. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  184. le_to_host16(mgmt->u.assoc_req.capab_info),
  185. le_to_host16(mgmt->u.assoc_req.listen_interval));
  186. if (ieee802_11_parse_elems(mgmt->u.assoc_req.variable,
  187. len - (mgmt->u.assoc_req.variable - data),
  188. &elems, 0) == ParseFailed) {
  189. wpa_printf(MSG_INFO, "Invalid IEs in Association Request "
  190. "frame from " MACSTR, MAC2STR(mgmt->sa));
  191. return;
  192. }
  193. sta_update_assoc(sta, &elems);
  194. }
  195. static void rx_mgmt_assoc_resp(struct wlantest *wt, const u8 *data, size_t len)
  196. {
  197. const struct ieee80211_mgmt *mgmt;
  198. struct wlantest_bss *bss;
  199. struct wlantest_sta *sta;
  200. u16 capab, status, aid;
  201. mgmt = (const struct ieee80211_mgmt *) data;
  202. bss = bss_get(wt, mgmt->bssid);
  203. if (bss == NULL)
  204. return;
  205. sta = sta_get(bss, mgmt->da);
  206. if (sta == NULL)
  207. return;
  208. if (len < 24 + 6) {
  209. wpa_printf(MSG_INFO, "Too short Association Response frame "
  210. "from " MACSTR, MAC2STR(mgmt->sa));
  211. return;
  212. }
  213. capab = le_to_host16(mgmt->u.assoc_resp.capab_info);
  214. status = le_to_host16(mgmt->u.assoc_resp.status_code);
  215. aid = le_to_host16(mgmt->u.assoc_resp.aid);
  216. wpa_printf(MSG_DEBUG, "ASSOCRESP " MACSTR " -> " MACSTR
  217. " (capab=0x%x status=%u aid=%u)",
  218. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
  219. aid & 0x3fff);
  220. if (status)
  221. return;
  222. if ((aid & 0xc000) != 0xc000) {
  223. wpa_printf(MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
  224. "in Association Response from " MACSTR,
  225. MAC2STR(mgmt->sa));
  226. }
  227. sta->aid = aid & 0xc000;
  228. if (sta->state < STATE2) {
  229. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 when "
  230. "getting associated", MAC2STR(sta->addr));
  231. }
  232. if (sta->state < STATE3) {
  233. wpa_printf(MSG_DEBUG, "STA " MACSTR
  234. " moved to State 3 with " MACSTR,
  235. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  236. sta->state = STATE3;
  237. }
  238. }
  239. static void rx_mgmt_reassoc_req(struct wlantest *wt, const u8 *data,
  240. size_t len)
  241. {
  242. const struct ieee80211_mgmt *mgmt;
  243. struct wlantest_bss *bss;
  244. struct wlantest_sta *sta;
  245. struct ieee802_11_elems elems;
  246. mgmt = (const struct ieee80211_mgmt *) data;
  247. bss = bss_get(wt, mgmt->bssid);
  248. if (bss == NULL)
  249. return;
  250. sta = sta_get(bss, mgmt->sa);
  251. if (sta == NULL)
  252. return;
  253. if (len < 24 + 4 + ETH_ALEN) {
  254. wpa_printf(MSG_INFO, "Too short Reassociation Request frame "
  255. "from " MACSTR, MAC2STR(mgmt->sa));
  256. return;
  257. }
  258. wpa_printf(MSG_DEBUG, "REASSOCREQ " MACSTR " -> " MACSTR
  259. " (capab=0x%x listen_int=%u current_ap=" MACSTR ")",
  260. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  261. le_to_host16(mgmt->u.reassoc_req.capab_info),
  262. le_to_host16(mgmt->u.reassoc_req.listen_interval),
  263. MAC2STR(mgmt->u.reassoc_req.current_ap));
  264. if (ieee802_11_parse_elems(mgmt->u.reassoc_req.variable,
  265. len - (mgmt->u.reassoc_req.variable - data),
  266. &elems, 0) == ParseFailed) {
  267. wpa_printf(MSG_INFO, "Invalid IEs in Reassociation Request "
  268. "frame from " MACSTR, MAC2STR(mgmt->sa));
  269. return;
  270. }
  271. sta_update_assoc(sta, &elems);
  272. }
  273. static void rx_mgmt_reassoc_resp(struct wlantest *wt, const u8 *data,
  274. size_t len)
  275. {
  276. const struct ieee80211_mgmt *mgmt;
  277. struct wlantest_bss *bss;
  278. struct wlantest_sta *sta;
  279. u16 capab, status, aid;
  280. mgmt = (const struct ieee80211_mgmt *) data;
  281. bss = bss_get(wt, mgmt->bssid);
  282. if (bss == NULL)
  283. return;
  284. sta = sta_get(bss, mgmt->da);
  285. if (sta == NULL)
  286. return;
  287. if (len < 24 + 6) {
  288. wpa_printf(MSG_INFO, "Too short Reassociation Response frame "
  289. "from " MACSTR, MAC2STR(mgmt->sa));
  290. return;
  291. }
  292. capab = le_to_host16(mgmt->u.reassoc_resp.capab_info);
  293. status = le_to_host16(mgmt->u.reassoc_resp.status_code);
  294. aid = le_to_host16(mgmt->u.reassoc_resp.aid);
  295. wpa_printf(MSG_DEBUG, "REASSOCRESP " MACSTR " -> " MACSTR
  296. " (capab=0x%x status=%u aid=%u)",
  297. MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
  298. aid & 0x3fff);
  299. if (status)
  300. return;
  301. if ((aid & 0xc000) != 0xc000) {
  302. wpa_printf(MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
  303. "in Reassociation Response from " MACSTR,
  304. MAC2STR(mgmt->sa));
  305. }
  306. sta->aid = aid & 0xc000;
  307. if (sta->state < STATE2) {
  308. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 when "
  309. "getting associated", MAC2STR(sta->addr));
  310. }
  311. if (sta->state < STATE3) {
  312. wpa_printf(MSG_DEBUG, "STA " MACSTR
  313. " moved to State 3 with " MACSTR,
  314. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  315. sta->state = STATE3;
  316. }
  317. }
  318. static void rx_mgmt_disassoc(struct wlantest *wt, const u8 *data, size_t len)
  319. {
  320. const struct ieee80211_mgmt *mgmt;
  321. struct wlantest_bss *bss;
  322. struct wlantest_sta *sta;
  323. mgmt = (const struct ieee80211_mgmt *) data;
  324. bss = bss_get(wt, mgmt->bssid);
  325. if (bss == NULL)
  326. return;
  327. if (os_memcmp(mgmt->sa, mgmt->bssid, ETH_ALEN) == 0)
  328. sta = sta_get(bss, mgmt->da);
  329. else
  330. sta = sta_get(bss, mgmt->sa);
  331. if (sta == NULL)
  332. return;
  333. if (len < 24 + 2) {
  334. wpa_printf(MSG_INFO, "Too short Disassociation frame from "
  335. MACSTR, MAC2STR(mgmt->sa));
  336. return;
  337. }
  338. wpa_printf(MSG_DEBUG, "DISASSOC " MACSTR " -> " MACSTR
  339. " (reason=%u)",
  340. MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
  341. le_to_host16(mgmt->u.disassoc.reason_code));
  342. if (sta->state < STATE2) {
  343. wpa_printf(MSG_DEBUG, "STA " MACSTR " was not in State 2 or 3 "
  344. "when getting disassociated", MAC2STR(sta->addr));
  345. }
  346. if (sta->state > STATE2) {
  347. wpa_printf(MSG_DEBUG, "STA " MACSTR
  348. " moved to State 2 with " MACSTR,
  349. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  350. sta->state = STATE2;
  351. }
  352. }
  353. static int check_mmie_mic(const u8 *igtk, const u8 *data, size_t len)
  354. {
  355. u8 *buf;
  356. u8 mic[16];
  357. u16 fc;
  358. const struct ieee80211_hdr *hdr;
  359. buf = os_malloc(len + 20 - 24);
  360. if (buf == NULL)
  361. return -1;
  362. /* BIP AAD: FC(masked) A1 A2 A3 */
  363. hdr = (const struct ieee80211_hdr *) data;
  364. fc = le_to_host16(hdr->frame_control);
  365. fc &= ~(WLAN_FC_RETRY | WLAN_FC_PWRMGT | WLAN_FC_MOREDATA);
  366. WPA_PUT_LE16(buf, fc);
  367. os_memcpy(buf + 2, hdr->addr1, 3 * ETH_ALEN);
  368. /* Frame body with MMIE MIC masked to zero */
  369. os_memcpy(buf + 20, data + 24, len - 24 - 8);
  370. os_memset(buf + 20 + len - 24 - 8, 0, 8);
  371. wpa_hexdump(MSG_MSGDUMP, "BIP: AAD|Body(masked)", buf, len + 20 - 24);
  372. /* MIC = L(AES-128-CMAC(AAD || Frame Body(masked)), 0, 64) */
  373. if (omac1_aes_128(igtk, buf, len + 20 - 24, mic) < 0) {
  374. os_free(buf);
  375. return -1;
  376. }
  377. os_free(buf);
  378. if (os_memcmp(data + len - 8, mic, 8) != 0)
  379. return -1;
  380. return 0;
  381. }
  382. static int check_bip(struct wlantest *wt, const u8 *data, size_t len)
  383. {
  384. const struct ieee80211_mgmt *mgmt;
  385. u16 fc, stype;
  386. const u8 *mmie;
  387. int keyid;
  388. struct wlantest_bss *bss;
  389. mgmt = (const struct ieee80211_mgmt *) data;
  390. fc = le_to_host16(mgmt->frame_control);
  391. stype = WLAN_FC_GET_STYPE(fc);
  392. if (stype == WLAN_FC_STYPE_ACTION) {
  393. if (len < 24 + 1)
  394. return 0;
  395. if (mgmt->u.action.category == WLAN_ACTION_PUBLIC)
  396. return 0; /* Not a robust management frame */
  397. }
  398. bss = bss_get(wt, mgmt->bssid);
  399. if (bss == NULL)
  400. return 0; /* No key known yet */
  401. if (len < 24 + 18 || data[len - 18] != WLAN_EID_MMIE ||
  402. data[len - 17] != 16) {
  403. /* No MMIE */
  404. /* TODO: use MFPC flag in RSN IE instead of IGTK flags */
  405. if (bss->igtk_set[4] || bss->igtk_set[5]) {
  406. wpa_printf(MSG_INFO, "Robust group-addressed "
  407. "management frame sent without BIP by "
  408. MACSTR, MAC2STR(mgmt->sa));
  409. return -1;
  410. }
  411. return 0;
  412. }
  413. mmie = data + len - 16;
  414. keyid = WPA_GET_LE16(mmie);
  415. if (keyid < 4 || keyid > 5) {
  416. wpa_printf(MSG_INFO, "Unexpected MMIE KeyID %u from " MACSTR,
  417. keyid, MAC2STR(mgmt->sa));
  418. return 0;
  419. }
  420. wpa_printf(MSG_DEBUG, "MMIE KeyID %u", keyid);
  421. wpa_hexdump(MSG_MSGDUMP, "MMIE IPN", mmie + 2, 6);
  422. wpa_hexdump(MSG_MSGDUMP, "MMIE MIC", mmie + 8, 8);
  423. if (!bss->igtk_set[keyid]) {
  424. wpa_printf(MSG_DEBUG, "No IGTK known to validate BIP frame");
  425. return 0;
  426. }
  427. if (os_memcmp(mmie + 2, bss->ipn[keyid], 6) <= 0) {
  428. wpa_printf(MSG_INFO, "BIP replay detected: SA=" MACSTR,
  429. MAC2STR(mgmt->sa));
  430. wpa_hexdump(MSG_INFO, "RX IPN", mmie + 2, 6);
  431. wpa_hexdump(MSG_INFO, "Last RX IPN", bss->ipn[keyid], 6);
  432. }
  433. if (check_mmie_mic(bss->igtk[keyid], data, len) < 0) {
  434. wpa_printf(MSG_INFO, "Invalid MMIE MIC in a frame from "
  435. MACSTR, MAC2STR(mgmt->sa));
  436. return -1;
  437. }
  438. wpa_printf(MSG_DEBUG, "Valid MMIE MIC");
  439. os_memcpy(bss->ipn[keyid], mmie + 2, 6);
  440. return 0;
  441. }
  442. void rx_mgmt(struct wlantest *wt, const u8 *data, size_t len)
  443. {
  444. const struct ieee80211_hdr *hdr;
  445. u16 fc, stype;
  446. if (len < 24)
  447. return;
  448. hdr = (const struct ieee80211_hdr *) data;
  449. fc = le_to_host16(hdr->frame_control);
  450. wt->rx_mgmt++;
  451. stype = WLAN_FC_GET_STYPE(fc);
  452. if ((hdr->addr1[0] & 0x01) &&
  453. (stype == WLAN_FC_STYPE_DEAUTH ||
  454. stype == WLAN_FC_STYPE_DISASSOC ||
  455. stype == WLAN_FC_STYPE_ACTION))
  456. check_bip(wt, data, len);
  457. wpa_printf((stype == WLAN_FC_STYPE_BEACON ||
  458. stype == WLAN_FC_STYPE_PROBE_RESP ||
  459. stype == WLAN_FC_STYPE_PROBE_REQ) ?
  460. MSG_EXCESSIVE : MSG_MSGDUMP,
  461. "MGMT %s%s%s DA=" MACSTR " SA=" MACSTR " BSSID=" MACSTR,
  462. mgmt_stype(stype),
  463. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  464. fc & WLAN_FC_ISWEP ? " Prot" : "",
  465. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  466. MAC2STR(hdr->addr3));
  467. switch (stype) {
  468. case WLAN_FC_STYPE_BEACON:
  469. rx_mgmt_beacon(wt, data, len);
  470. break;
  471. case WLAN_FC_STYPE_PROBE_RESP:
  472. rx_mgmt_probe_resp(wt, data, len);
  473. break;
  474. case WLAN_FC_STYPE_AUTH:
  475. rx_mgmt_auth(wt, data, len);
  476. break;
  477. case WLAN_FC_STYPE_DEAUTH:
  478. rx_mgmt_deauth(wt, data, len);
  479. break;
  480. case WLAN_FC_STYPE_ASSOC_REQ:
  481. rx_mgmt_assoc_req(wt, data, len);
  482. break;
  483. case WLAN_FC_STYPE_ASSOC_RESP:
  484. rx_mgmt_assoc_resp(wt, data, len);
  485. break;
  486. case WLAN_FC_STYPE_REASSOC_REQ:
  487. rx_mgmt_reassoc_req(wt, data, len);
  488. break;
  489. case WLAN_FC_STYPE_REASSOC_RESP:
  490. rx_mgmt_reassoc_resp(wt, data, len);
  491. break;
  492. case WLAN_FC_STYPE_DISASSOC:
  493. rx_mgmt_disassoc(wt, data, len);
  494. break;
  495. }
  496. }