wps_validate.c 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975
  1. /*
  2. * Wi-Fi Protected Setup - Strict protocol validation routines
  3. * Copyright (c) 2010, Atheros Communications, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "wps_i.h"
  11. #include "wps.h"
  12. #ifndef WPS_STRICT_ALL
  13. #define WPS_STRICT_WPS2
  14. #endif /* WPS_STRICT_ALL */
  15. static int wps_validate_version(const u8 *version, int mandatory)
  16. {
  17. if (version == NULL) {
  18. if (mandatory) {
  19. wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
  20. "missing");
  21. return -1;
  22. }
  23. return 0;
  24. }
  25. if (*version != 0x10) {
  26. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
  27. "value 0x%x", *version);
  28. return -1;
  29. }
  30. return 0;
  31. }
  32. static int wps_validate_version2(const u8 *version2, int mandatory)
  33. {
  34. if (version2 == NULL) {
  35. if (mandatory) {
  36. wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
  37. "missing");
  38. return -1;
  39. }
  40. return 0;
  41. }
  42. if (*version2 < 0x20) {
  43. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
  44. "value 0x%x", *version2);
  45. return -1;
  46. }
  47. return 0;
  48. }
  49. static int wps_validate_request_type(const u8 *request_type, int mandatory)
  50. {
  51. if (request_type == NULL) {
  52. if (mandatory) {
  53. wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
  54. "attribute missing");
  55. return -1;
  56. }
  57. return 0;
  58. }
  59. if (*request_type > 0x03) {
  60. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
  61. "attribute value 0x%x", *request_type);
  62. return -1;
  63. }
  64. return 0;
  65. }
  66. static int wps_validate_response_type(const u8 *response_type, int mandatory)
  67. {
  68. if (response_type == NULL) {
  69. if (mandatory) {
  70. wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
  71. "attribute missing");
  72. return -1;
  73. }
  74. return 0;
  75. }
  76. if (*response_type > 0x03) {
  77. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
  78. "attribute value 0x%x", *response_type);
  79. return -1;
  80. }
  81. return 0;
  82. }
  83. static int valid_config_methods(u16 val, int wps2)
  84. {
  85. if (wps2) {
  86. if ((val & 0x6000) && !(val & WPS_CONFIG_DISPLAY)) {
  87. wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
  88. "Display flag without old Display flag "
  89. "set");
  90. return 0;
  91. }
  92. if (!(val & 0x6000) && (val & WPS_CONFIG_DISPLAY)) {
  93. wpa_printf(MSG_INFO, "WPS-STRICT: Display flag "
  94. "without Physical/Virtual Display flag");
  95. return 0;
  96. }
  97. if ((val & 0x0600) && !(val & WPS_CONFIG_PUSHBUTTON)) {
  98. wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
  99. "PushButton flag without old PushButton "
  100. "flag set");
  101. return 0;
  102. }
  103. if (!(val & 0x0600) && (val & WPS_CONFIG_PUSHBUTTON)) {
  104. wpa_printf(MSG_INFO, "WPS-STRICT: PushButton flag "
  105. "without Physical/Virtual PushButton flag");
  106. return 0;
  107. }
  108. }
  109. return 1;
  110. }
  111. static int wps_validate_config_methods(const u8 *config_methods, int wps2,
  112. int mandatory)
  113. {
  114. u16 val;
  115. if (config_methods == NULL) {
  116. if (mandatory) {
  117. wpa_printf(MSG_INFO, "WPS-STRICT: Configuration "
  118. "Methods attribute missing");
  119. return -1;
  120. }
  121. return 0;
  122. }
  123. val = WPA_GET_BE16(config_methods);
  124. if (!valid_config_methods(val, wps2)) {
  125. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration "
  126. "Methods attribute value 0x%04x", val);
  127. return -1;
  128. }
  129. return 0;
  130. }
  131. static int wps_validate_ap_config_methods(const u8 *config_methods, int wps2,
  132. int mandatory)
  133. {
  134. u16 val;
  135. if (wps_validate_config_methods(config_methods, wps2, mandatory) < 0)
  136. return -1;
  137. if (config_methods == NULL)
  138. return 0;
  139. val = WPA_GET_BE16(config_methods);
  140. if (val & WPS_CONFIG_PUSHBUTTON) {
  141. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration "
  142. "Methods attribute value 0x%04x in AP info "
  143. "(PushButton not allowed for registering new ER)",
  144. val);
  145. return -1;
  146. }
  147. return 0;
  148. }
  149. static int wps_validate_uuid_e(const u8 *uuid_e, int mandatory)
  150. {
  151. if (uuid_e == NULL) {
  152. if (mandatory) {
  153. wpa_printf(MSG_INFO, "WPS-STRICT: UUID-E "
  154. "attribute missing");
  155. return -1;
  156. }
  157. return 0;
  158. }
  159. return 0;
  160. }
  161. static int wps_validate_uuid_r(const u8 *uuid_r, int mandatory)
  162. {
  163. if (uuid_r == NULL) {
  164. if (mandatory) {
  165. wpa_printf(MSG_INFO, "WPS-STRICT: UUID-R "
  166. "attribute missing");
  167. return -1;
  168. }
  169. return 0;
  170. }
  171. return 0;
  172. }
  173. static int wps_validate_primary_dev_type(const u8 *primary_dev_type,
  174. int mandatory)
  175. {
  176. if (primary_dev_type == NULL) {
  177. if (mandatory) {
  178. wpa_printf(MSG_INFO, "WPS-STRICT: Primary Device Type "
  179. "attribute missing");
  180. return -1;
  181. }
  182. return 0;
  183. }
  184. return 0;
  185. }
  186. static int wps_validate_rf_bands(const u8 *rf_bands, int mandatory)
  187. {
  188. if (rf_bands == NULL) {
  189. if (mandatory) {
  190. wpa_printf(MSG_INFO, "WPS-STRICT: RF Bands "
  191. "attribute missing");
  192. return -1;
  193. }
  194. return 0;
  195. }
  196. if (*rf_bands != WPS_RF_24GHZ && *rf_bands != WPS_RF_50GHZ &&
  197. *rf_bands != (WPS_RF_24GHZ | WPS_RF_50GHZ)) {
  198. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Rf Bands "
  199. "attribute value 0x%x", *rf_bands);
  200. return -1;
  201. }
  202. return 0;
  203. }
  204. static int wps_validate_assoc_state(const u8 *assoc_state, int mandatory)
  205. {
  206. u16 val;
  207. if (assoc_state == NULL) {
  208. if (mandatory) {
  209. wpa_printf(MSG_INFO, "WPS-STRICT: Association State "
  210. "attribute missing");
  211. return -1;
  212. }
  213. return 0;
  214. }
  215. val = WPA_GET_BE16(assoc_state);
  216. if (val > 4) {
  217. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Association State "
  218. "attribute value 0x%04x", val);
  219. return -1;
  220. }
  221. return 0;
  222. }
  223. static int wps_validate_config_error(const u8 *config_error, int mandatory)
  224. {
  225. u16 val;
  226. if (config_error == NULL) {
  227. if (mandatory) {
  228. wpa_printf(MSG_INFO, "WPS-STRICT: Configuration Error "
  229. "attribute missing");
  230. return -1;
  231. }
  232. return 0;
  233. }
  234. val = WPA_GET_BE16(config_error);
  235. if (val > 18) {
  236. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration Error "
  237. "attribute value 0x%04x", val);
  238. return -1;
  239. }
  240. return 0;
  241. }
  242. static int wps_validate_dev_password_id(const u8 *dev_password_id,
  243. int mandatory)
  244. {
  245. u16 val;
  246. if (dev_password_id == NULL) {
  247. if (mandatory) {
  248. wpa_printf(MSG_INFO, "WPS-STRICT: Device Password ID "
  249. "attribute missing");
  250. return -1;
  251. }
  252. return 0;
  253. }
  254. val = WPA_GET_BE16(dev_password_id);
  255. if (val >= 0x0006 && val <= 0x000f) {
  256. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Device Password ID "
  257. "attribute value 0x%04x", val);
  258. return -1;
  259. }
  260. return 0;
  261. }
  262. static int wps_validate_manufacturer(const u8 *manufacturer, size_t len,
  263. int mandatory)
  264. {
  265. if (manufacturer == NULL) {
  266. if (mandatory) {
  267. wpa_printf(MSG_INFO, "WPS-STRICT: Manufacturer "
  268. "attribute missing");
  269. return -1;
  270. }
  271. return 0;
  272. }
  273. if (len > 0 && manufacturer[len - 1] == 0) {
  274. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Manufacturer "
  275. "attribute value", manufacturer, len);
  276. return -1;
  277. }
  278. return 0;
  279. }
  280. static int wps_validate_model_name(const u8 *model_name, size_t len,
  281. int mandatory)
  282. {
  283. if (model_name == NULL) {
  284. if (mandatory) {
  285. wpa_printf(MSG_INFO, "WPS-STRICT: Model Name "
  286. "attribute missing");
  287. return -1;
  288. }
  289. return 0;
  290. }
  291. if (len > 0 && model_name[len - 1] == 0) {
  292. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Model Name "
  293. "attribute value", model_name, len);
  294. return -1;
  295. }
  296. return 0;
  297. }
  298. static int wps_validate_model_number(const u8 *model_number, size_t len,
  299. int mandatory)
  300. {
  301. if (model_number == NULL) {
  302. if (mandatory) {
  303. wpa_printf(MSG_INFO, "WPS-STRICT: Model Number "
  304. "attribute missing");
  305. return -1;
  306. }
  307. return 0;
  308. }
  309. if (len > 0 && model_number[len - 1] == 0) {
  310. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Model Number "
  311. "attribute value", model_number, len);
  312. return -1;
  313. }
  314. return 0;
  315. }
  316. static int wps_validate_serial_number(const u8 *serial_number, size_t len,
  317. int mandatory)
  318. {
  319. if (serial_number == NULL) {
  320. if (mandatory) {
  321. wpa_printf(MSG_INFO, "WPS-STRICT: Serial Number "
  322. "attribute missing");
  323. return -1;
  324. }
  325. return 0;
  326. }
  327. if (len > 0 && serial_number[len - 1] == 0) {
  328. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Serial "
  329. "Number attribute value",
  330. serial_number, len);
  331. return -1;
  332. }
  333. return 0;
  334. }
  335. static int wps_validate_dev_name(const u8 *dev_name, size_t len,
  336. int mandatory)
  337. {
  338. if (dev_name == NULL) {
  339. if (mandatory) {
  340. wpa_printf(MSG_INFO, "WPS-STRICT: Device Name "
  341. "attribute missing");
  342. return -1;
  343. }
  344. return 0;
  345. }
  346. if (len > 0 && dev_name[len - 1] == 0) {
  347. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Device Name "
  348. "attribute value", dev_name, len);
  349. return -1;
  350. }
  351. return 0;
  352. }
  353. static int wps_validate_request_to_enroll(const u8 *request_to_enroll,
  354. int mandatory)
  355. {
  356. if (request_to_enroll == NULL) {
  357. if (mandatory) {
  358. wpa_printf(MSG_INFO, "WPS-STRICT: Request to Enroll "
  359. "attribute missing");
  360. return -1;
  361. }
  362. return 0;
  363. }
  364. if (*request_to_enroll > 0x01) {
  365. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request to Enroll "
  366. "attribute value 0x%x", *request_to_enroll);
  367. return -1;
  368. }
  369. return 0;
  370. }
  371. static int wps_validate_req_dev_type(const u8 *req_dev_type[], size_t num,
  372. int mandatory)
  373. {
  374. if (num == 0) {
  375. if (mandatory) {
  376. wpa_printf(MSG_INFO, "WPS-STRICT: Requested Device "
  377. "Type attribute missing");
  378. return -1;
  379. }
  380. return 0;
  381. }
  382. return 0;
  383. }
  384. static int wps_validate_wps_state(const u8 *wps_state, int mandatory)
  385. {
  386. if (wps_state == NULL) {
  387. if (mandatory) {
  388. wpa_printf(MSG_INFO, "WPS-STRICT: Wi-Fi Protected "
  389. "Setup State attribute missing");
  390. return -1;
  391. }
  392. return 0;
  393. }
  394. if (*wps_state != WPS_STATE_NOT_CONFIGURED &&
  395. *wps_state != WPS_STATE_CONFIGURED) {
  396. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Wi-Fi Protected "
  397. "Setup State attribute value 0x%x", *wps_state);
  398. return -1;
  399. }
  400. return 0;
  401. }
  402. static int wps_validate_ap_setup_locked(const u8 *ap_setup_locked,
  403. int mandatory)
  404. {
  405. if (ap_setup_locked == NULL) {
  406. if (mandatory) {
  407. wpa_printf(MSG_INFO, "WPS-STRICT: AP Setup Locked "
  408. "attribute missing");
  409. return -1;
  410. }
  411. return 0;
  412. }
  413. if (*ap_setup_locked > 1) {
  414. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid AP Setup Locked "
  415. "attribute value 0x%x", *ap_setup_locked);
  416. return -1;
  417. }
  418. return 0;
  419. }
  420. static int wps_validate_selected_registrar(const u8 *selected_registrar,
  421. int mandatory)
  422. {
  423. if (selected_registrar == NULL) {
  424. if (mandatory) {
  425. wpa_printf(MSG_INFO, "WPS-STRICT: Selected Registrar "
  426. "attribute missing");
  427. return -1;
  428. }
  429. return 0;
  430. }
  431. if (*selected_registrar > 1) {
  432. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Selected Registrar "
  433. "attribute value 0x%x", *selected_registrar);
  434. return -1;
  435. }
  436. return 0;
  437. }
  438. static int wps_validate_sel_reg_config_methods(const u8 *config_methods,
  439. int wps2, int mandatory)
  440. {
  441. u16 val;
  442. if (config_methods == NULL) {
  443. if (mandatory) {
  444. wpa_printf(MSG_INFO, "WPS-STRICT: Selected Registrar "
  445. "Configuration Methods attribute missing");
  446. return -1;
  447. }
  448. return 0;
  449. }
  450. val = WPA_GET_BE16(config_methods);
  451. if (!valid_config_methods(val, wps2)) {
  452. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Selected Registrar "
  453. "Configuration Methods attribute value 0x%04x",
  454. val);
  455. return -1;
  456. }
  457. return 0;
  458. }
  459. static int wps_validate_authorized_macs(const u8 *authorized_macs, size_t len,
  460. int mandatory)
  461. {
  462. if (authorized_macs == NULL) {
  463. if (mandatory) {
  464. wpa_printf(MSG_INFO, "WPS-STRICT: Authorized MACs "
  465. "attribute missing");
  466. return -1;
  467. }
  468. return 0;
  469. }
  470. if (len > 30 && (len % ETH_ALEN) != 0) {
  471. wpa_hexdump(MSG_INFO, "WPS-STRICT: Invalid Authorized "
  472. "MACs attribute value", authorized_macs, len);
  473. return -1;
  474. }
  475. return 0;
  476. }
  477. static int wps_validate_msg_type(const u8 *msg_type, int mandatory)
  478. {
  479. if (msg_type == NULL) {
  480. if (mandatory) {
  481. wpa_printf(MSG_INFO, "WPS-STRICT: Message Type "
  482. "attribute missing");
  483. return -1;
  484. }
  485. return 0;
  486. }
  487. if (*msg_type < WPS_Beacon || *msg_type > WPS_WSC_DONE) {
  488. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Message Type "
  489. "attribute value 0x%x", *msg_type);
  490. return -1;
  491. }
  492. return 0;
  493. }
  494. static int wps_validate_mac_addr(const u8 *mac_addr, int mandatory)
  495. {
  496. if (mac_addr == NULL) {
  497. if (mandatory) {
  498. wpa_printf(MSG_INFO, "WPS-STRICT: MAC Address "
  499. "attribute missing");
  500. return -1;
  501. }
  502. return 0;
  503. }
  504. if (mac_addr[0] & 0x01) {
  505. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid MAC Address "
  506. "attribute value " MACSTR, MAC2STR(mac_addr));
  507. return -1;
  508. }
  509. return 0;
  510. }
  511. static int wps_validate_enrollee_nonce(const u8 *enrollee_nonce, int mandatory)
  512. {
  513. if (enrollee_nonce == NULL) {
  514. if (mandatory) {
  515. wpa_printf(MSG_INFO, "WPS-STRICT: Enrollee Nonce "
  516. "attribute missing");
  517. return -1;
  518. }
  519. return 0;
  520. }
  521. return 0;
  522. }
  523. static int wps_validate_registrar_nonce(const u8 *registrar_nonce,
  524. int mandatory)
  525. {
  526. if (registrar_nonce == NULL) {
  527. if (mandatory) {
  528. wpa_printf(MSG_INFO, "WPS-STRICT: Registrar Nonce "
  529. "attribute missing");
  530. return -1;
  531. }
  532. return 0;
  533. }
  534. return 0;
  535. }
  536. static int wps_validate_public_key(const u8 *public_key, size_t len,
  537. int mandatory)
  538. {
  539. if (public_key == NULL) {
  540. if (mandatory) {
  541. wpa_printf(MSG_INFO, "WPS-STRICT: Public Key "
  542. "attribute missing");
  543. return -1;
  544. }
  545. return 0;
  546. }
  547. if (len != 192) {
  548. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Public Key "
  549. "attribute length %d", (int) len);
  550. return -1;
  551. }
  552. return 0;
  553. }
  554. static int num_bits_set(u16 val)
  555. {
  556. int c;
  557. for (c = 0; val; c++)
  558. val &= val - 1;
  559. return c;
  560. }
  561. static int wps_validate_auth_type_flags(const u8 *flags, int mandatory)
  562. {
  563. u16 val;
  564. if (flags == NULL) {
  565. if (mandatory) {
  566. wpa_printf(MSG_INFO, "WPS-STRICT: Authentication Type "
  567. "Flags attribute missing");
  568. return -1;
  569. }
  570. return 0;
  571. }
  572. val = WPA_GET_BE16(flags);
  573. if ((val & ~WPS_AUTH_TYPES) || !(val & WPS_AUTH_WPA2PSK)) {
  574. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Authentication Type "
  575. "Flags attribute value 0x%04x", val);
  576. return -1;
  577. }
  578. return 0;
  579. }
  580. static int wps_validate_auth_type(const u8 *type, int mandatory)
  581. {
  582. u16 val;
  583. if (type == NULL) {
  584. if (mandatory) {
  585. wpa_printf(MSG_INFO, "WPS-STRICT: Authentication Type "
  586. "attribute missing");
  587. return -1;
  588. }
  589. return 0;
  590. }
  591. val = WPA_GET_BE16(type);
  592. if ((val & ~WPS_AUTH_TYPES) || val == 0 ||
  593. (num_bits_set(val) > 1 &&
  594. val != (WPS_AUTH_WPAPSK | WPS_AUTH_WPA2PSK))) {
  595. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Authentication Type "
  596. "attribute value 0x%04x", val);
  597. return -1;
  598. }
  599. return 0;
  600. }
  601. static int wps_validate_encr_type_flags(const u8 *flags, int mandatory)
  602. {
  603. u16 val;
  604. if (flags == NULL) {
  605. if (mandatory) {
  606. wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type "
  607. "Flags attribute missing");
  608. return -1;
  609. }
  610. return 0;
  611. }
  612. val = WPA_GET_BE16(flags);
  613. if ((val & ~WPS_ENCR_TYPES) || !(val & WPS_ENCR_AES)) {
  614. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type "
  615. "Flags attribute value 0x%04x", val);
  616. return -1;
  617. }
  618. return 0;
  619. }
  620. static int wps_validate_encr_type(const u8 *type, int mandatory)
  621. {
  622. u16 val;
  623. if (type == NULL) {
  624. if (mandatory) {
  625. wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type "
  626. "attribute missing");
  627. return -1;
  628. }
  629. return 0;
  630. }
  631. val = WPA_GET_BE16(type);
  632. if ((val & ~WPS_ENCR_TYPES) || val == 0 ||
  633. (num_bits_set(val) > 1 && val != (WPS_ENCR_TKIP | WPS_ENCR_AES))) {
  634. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type "
  635. "attribute value 0x%04x", val);
  636. return -1;
  637. }
  638. return 0;
  639. }
  640. static int wps_validate_conn_type_flags(const u8 *flags, int mandatory)
  641. {
  642. if (flags == NULL) {
  643. if (mandatory) {
  644. wpa_printf(MSG_INFO, "WPS-STRICT: Connection Type "
  645. "Flags attribute missing");
  646. return -1;
  647. }
  648. return 0;
  649. }
  650. if ((*flags & ~(WPS_CONN_ESS | WPS_CONN_IBSS)) ||
  651. !(*flags & WPS_CONN_ESS)) {
  652. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Connection Type "
  653. "Flags attribute value 0x%02x", *flags);
  654. return -1;
  655. }
  656. return 0;
  657. }
  658. static int wps_validate_os_version(const u8 *os_version, int mandatory)
  659. {
  660. if (os_version == NULL) {
  661. if (mandatory) {
  662. wpa_printf(MSG_INFO, "WPS-STRICT: OS Version "
  663. "attribute missing");
  664. return -1;
  665. }
  666. return 0;
  667. }
  668. return 0;
  669. }
  670. static int wps_validate_authenticator(const u8 *authenticator, int mandatory)
  671. {
  672. if (authenticator == NULL) {
  673. if (mandatory) {
  674. wpa_printf(MSG_INFO, "WPS-STRICT: Authenticator "
  675. "attribute missing");
  676. return -1;
  677. }
  678. return 0;
  679. }
  680. return 0;
  681. }
  682. static int wps_validate_e_hash1(const u8 *hash, int mandatory)
  683. {
  684. if (hash == NULL) {
  685. if (mandatory) {
  686. wpa_printf(MSG_INFO, "WPS-STRICT: E-Hash1 "
  687. "attribute missing");
  688. return -1;
  689. }
  690. return 0;
  691. }
  692. return 0;
  693. }
  694. static int wps_validate_e_hash2(const u8 *hash, int mandatory)
  695. {
  696. if (hash == NULL) {
  697. if (mandatory) {
  698. wpa_printf(MSG_INFO, "WPS-STRICT: E-Hash2 "
  699. "attribute missing");
  700. return -1;
  701. }
  702. return 0;
  703. }
  704. return 0;
  705. }
  706. static int wps_validate_r_hash1(const u8 *hash, int mandatory)
  707. {
  708. if (hash == NULL) {
  709. if (mandatory) {
  710. wpa_printf(MSG_INFO, "WPS-STRICT: R-Hash1 "
  711. "attribute missing");
  712. return -1;
  713. }
  714. return 0;
  715. }
  716. return 0;
  717. }
  718. static int wps_validate_r_hash2(const u8 *hash, int mandatory)
  719. {
  720. if (hash == NULL) {
  721. if (mandatory) {
  722. wpa_printf(MSG_INFO, "WPS-STRICT: R-Hash2 "
  723. "attribute missing");
  724. return -1;
  725. }
  726. return 0;
  727. }
  728. return 0;
  729. }
  730. static int wps_validate_encr_settings(const u8 *encr_settings, size_t len,
  731. int mandatory)
  732. {
  733. if (encr_settings == NULL) {
  734. if (mandatory) {
  735. wpa_printf(MSG_INFO, "WPS-STRICT: Encrypted Settings "
  736. "attribute missing");
  737. return -1;
  738. }
  739. return 0;
  740. }
  741. if (len < 16) {
  742. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encrypted Settings "
  743. "attribute length %d", (int) len);
  744. return -1;
  745. }
  746. return 0;
  747. }
  748. static int wps_validate_settings_delay_time(const u8 *delay, int mandatory)
  749. {
  750. if (delay == NULL) {
  751. if (mandatory) {
  752. wpa_printf(MSG_INFO, "WPS-STRICT: Settings Delay Time "
  753. "attribute missing");
  754. return -1;
  755. }
  756. return 0;
  757. }
  758. return 0;
  759. }
  760. static int wps_validate_r_snonce1(const u8 *nonce, int mandatory)
  761. {
  762. if (nonce == NULL) {
  763. if (mandatory) {
  764. wpa_printf(MSG_INFO, "WPS-STRICT: R-SNonce1 "
  765. "attribute missing");
  766. return -1;
  767. }
  768. return 0;
  769. }
  770. return 0;
  771. }
  772. static int wps_validate_r_snonce2(const u8 *nonce, int mandatory)
  773. {
  774. if (nonce == NULL) {
  775. if (mandatory) {
  776. wpa_printf(MSG_INFO, "WPS-STRICT: R-SNonce2 "
  777. "attribute missing");
  778. return -1;
  779. }
  780. return 0;
  781. }
  782. return 0;
  783. }
  784. static int wps_validate_e_snonce1(const u8 *nonce, int mandatory)
  785. {
  786. if (nonce == NULL) {
  787. if (mandatory) {
  788. wpa_printf(MSG_INFO, "WPS-STRICT: E-SNonce1 "
  789. "attribute missing");
  790. return -1;
  791. }
  792. return 0;
  793. }
  794. return 0;
  795. }
  796. static int wps_validate_e_snonce2(const u8 *nonce, int mandatory)
  797. {
  798. if (nonce == NULL) {
  799. if (mandatory) {
  800. wpa_printf(MSG_INFO, "WPS-STRICT: E-SNonce2 "
  801. "attribute missing");
  802. return -1;
  803. }
  804. return 0;
  805. }
  806. return 0;
  807. }
  808. static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory)
  809. {
  810. if (auth == NULL) {
  811. if (mandatory) {
  812. wpa_printf(MSG_INFO, "WPS-STRICT: Key Wrap "
  813. "Authenticator attribute missing");
  814. return -1;
  815. }
  816. return 0;
  817. }
  818. return 0;
  819. }
  820. static int wps_validate_ssid(const u8 *ssid, size_t ssid_len, int mandatory)
  821. {
  822. if (ssid == NULL) {
  823. if (mandatory) {
  824. wpa_printf(MSG_INFO, "WPS-STRICT: SSID "
  825. "attribute missing");
  826. return -1;
  827. }
  828. return 0;
  829. }
  830. if (ssid_len == 0 || ssid[ssid_len - 1] == 0) {
  831. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid SSID "
  832. "attribute value", ssid, ssid_len);
  833. return -1;
  834. }
  835. return 0;
  836. }
  837. static int wps_validate_network_key_index(const u8 *idx, int mandatory)
  838. {
  839. if (idx == NULL) {
  840. if (mandatory) {
  841. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key Index "
  842. "attribute missing");
  843. return -1;
  844. }
  845. return 0;
  846. }
  847. return 0;
  848. }
  849. static int wps_validate_network_idx(const u8 *idx, int mandatory)
  850. {
  851. if (idx == NULL) {
  852. if (mandatory) {
  853. wpa_printf(MSG_INFO, "WPS-STRICT: Network Index "
  854. "attribute missing");
  855. return -1;
  856. }
  857. return 0;
  858. }
  859. return 0;
  860. }
  861. static int wps_validate_network_key(const u8 *key, size_t key_len,
  862. const u8 *encr_type, int mandatory)
  863. {
  864. if (key == NULL) {
  865. if (mandatory) {
  866. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key "
  867. "attribute missing");
  868. return -1;
  869. }
  870. return 0;
  871. }
  872. if (((encr_type == NULL || WPA_GET_BE16(encr_type) != WPS_ENCR_WEP) &&
  873. key_len > 8 && key_len < 64 && key[key_len - 1] == 0) ||
  874. key_len > 64) {
  875. wpa_hexdump_ascii_key(MSG_INFO, "WPS-STRICT: Invalid Network "
  876. "Key attribute value", key, key_len);
  877. return -1;
  878. }
  879. return 0;
  880. }
  881. static int wps_validate_network_key_shareable(const u8 *val, int mandatory)
  882. {
  883. if (val == NULL) {
  884. if (mandatory) {
  885. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key "
  886. "Shareable attribute missing");
  887. return -1;
  888. }
  889. return 0;
  890. }
  891. if (*val > 1) {
  892. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Network Key "
  893. "Shareable attribute value 0x%x", *val);
  894. return -1;
  895. }
  896. return 0;
  897. }
  898. static int wps_validate_cred(const u8 *cred, size_t len)
  899. {
  900. struct wps_parse_attr attr;
  901. struct wpabuf buf;
  902. if (cred == NULL)
  903. return -1;
  904. wpabuf_set(&buf, cred, len);
  905. if (wps_parse_msg(&buf, &attr) < 0) {
  906. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse Credential");
  907. return -1;
  908. }
  909. if (wps_validate_network_idx(attr.network_idx, 1) ||
  910. wps_validate_ssid(attr.ssid, attr.ssid_len, 1) ||
  911. wps_validate_auth_type(attr.auth_type, 1) ||
  912. wps_validate_encr_type(attr.encr_type, 1) ||
  913. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  914. wps_validate_network_key(attr.network_key, attr.network_key_len,
  915. attr.encr_type, 1) ||
  916. wps_validate_mac_addr(attr.mac_addr, 1) ||
  917. wps_validate_network_key_shareable(attr.network_key_shareable, 0))
  918. {
  919. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Credential");
  920. return -1;
  921. }
  922. return 0;
  923. }
  924. static int wps_validate_credential(const u8 *cred[], size_t len[], size_t num,
  925. int mandatory)
  926. {
  927. size_t i;
  928. if (num == 0) {
  929. if (mandatory) {
  930. wpa_printf(MSG_INFO, "WPS-STRICT: Credential "
  931. "attribute missing");
  932. return -1;
  933. }
  934. return 0;
  935. }
  936. for (i = 0; i < num; i++) {
  937. if (wps_validate_cred(cred[i], len[i]) < 0)
  938. return -1;
  939. }
  940. return 0;
  941. }
  942. int wps_validate_beacon(const struct wpabuf *wps_ie)
  943. {
  944. struct wps_parse_attr attr;
  945. int wps2, sel_reg;
  946. if (wps_ie == NULL) {
  947. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in Beacon frame");
  948. return -1;
  949. }
  950. if (wps_parse_msg(wps_ie, &attr) < 0) {
  951. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  952. "Beacon frame");
  953. return -1;
  954. }
  955. wps2 = attr.version2 != NULL;
  956. sel_reg = attr.selected_registrar != NULL &&
  957. *attr.selected_registrar != 0;
  958. if (wps_validate_version(attr.version, 1) ||
  959. wps_validate_wps_state(attr.wps_state, 1) ||
  960. wps_validate_ap_setup_locked(attr.ap_setup_locked, 0) ||
  961. wps_validate_selected_registrar(attr.selected_registrar, 0) ||
  962. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  963. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  964. wps2, sel_reg) ||
  965. wps_validate_uuid_e(attr.uuid_e, 0) ||
  966. wps_validate_rf_bands(attr.rf_bands, 0) ||
  967. wps_validate_version2(attr.version2, wps2) ||
  968. wps_validate_authorized_macs(attr.authorized_macs,
  969. attr.authorized_macs_len, 0)) {
  970. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Beacon frame");
  971. return -1;
  972. }
  973. return 0;
  974. }
  975. int wps_validate_beacon_probe_resp(const struct wpabuf *wps_ie, int probe,
  976. const u8 *addr)
  977. {
  978. struct wps_parse_attr attr;
  979. int wps2, sel_reg;
  980. if (wps_ie == NULL) {
  981. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  982. "%sProbe Response frame", probe ? "" : "Beacon/");
  983. return -1;
  984. }
  985. if (wps_parse_msg(wps_ie, &attr) < 0) {
  986. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  987. "%sProbe Response frame", probe ? "" : "Beacon/");
  988. return -1;
  989. }
  990. wps2 = attr.version2 != NULL;
  991. sel_reg = attr.selected_registrar != NULL &&
  992. *attr.selected_registrar != 0;
  993. if (wps_validate_version(attr.version, 1) ||
  994. wps_validate_wps_state(attr.wps_state, 1) ||
  995. wps_validate_ap_setup_locked(attr.ap_setup_locked, 0) ||
  996. wps_validate_selected_registrar(attr.selected_registrar, 0) ||
  997. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  998. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  999. wps2, sel_reg) ||
  1000. wps_validate_response_type(attr.response_type, probe) ||
  1001. wps_validate_uuid_e(attr.uuid_e, probe) ||
  1002. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1003. probe) ||
  1004. wps_validate_model_name(attr.model_name, attr.model_name_len,
  1005. probe) ||
  1006. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1007. probe) ||
  1008. wps_validate_serial_number(attr.serial_number,
  1009. attr.serial_number_len, probe) ||
  1010. wps_validate_primary_dev_type(attr.primary_dev_type, probe) ||
  1011. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, probe) ||
  1012. wps_validate_ap_config_methods(attr.config_methods, wps2, probe) ||
  1013. wps_validate_rf_bands(attr.rf_bands, 0) ||
  1014. wps_validate_version2(attr.version2, wps2) ||
  1015. wps_validate_authorized_macs(attr.authorized_macs,
  1016. attr.authorized_macs_len, 0)) {
  1017. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid %sProbe Response "
  1018. "frame from " MACSTR, probe ? "" : "Beacon/",
  1019. MAC2STR(addr));
  1020. #ifdef WPS_STRICT_WPS2
  1021. if (wps2)
  1022. return -1;
  1023. #else /* WPS_STRICT_WPS2 */
  1024. return -1;
  1025. #endif /* WPS_STRICT_WPS2 */
  1026. }
  1027. return 0;
  1028. }
  1029. int wps_validate_probe_req(const struct wpabuf *wps_ie, const u8 *addr)
  1030. {
  1031. struct wps_parse_attr attr;
  1032. int wps2;
  1033. if (wps_ie == NULL) {
  1034. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1035. "Probe Request frame");
  1036. return -1;
  1037. }
  1038. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1039. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1040. "Probe Request frame");
  1041. return -1;
  1042. }
  1043. wps2 = attr.version2 != NULL;
  1044. if (wps_validate_version(attr.version, 1) ||
  1045. wps_validate_request_type(attr.request_type, 1) ||
  1046. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1047. wps_validate_uuid_e(attr.uuid_e, attr.uuid_r == NULL) ||
  1048. wps_validate_uuid_r(attr.uuid_r, attr.uuid_e == NULL) ||
  1049. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1050. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1051. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1052. wps_validate_config_error(attr.config_error, 1) ||
  1053. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1054. wps_validate_version2(attr.version2, wps2) ||
  1055. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1056. wps2) ||
  1057. wps_validate_model_name(attr.model_name, attr.model_name_len,
  1058. wps2) ||
  1059. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1060. wps2) ||
  1061. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, wps2) ||
  1062. wps_validate_request_to_enroll(attr.request_to_enroll, 0) ||
  1063. wps_validate_req_dev_type(attr.req_dev_type, attr.num_req_dev_type,
  1064. 0)) {
  1065. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Probe Request "
  1066. "frame from " MACSTR, MAC2STR(addr));
  1067. return -1;
  1068. }
  1069. return 0;
  1070. }
  1071. int wps_validate_assoc_req(const struct wpabuf *wps_ie)
  1072. {
  1073. struct wps_parse_attr attr;
  1074. int wps2;
  1075. if (wps_ie == NULL) {
  1076. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1077. "(Re)Association Request frame");
  1078. return -1;
  1079. }
  1080. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1081. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1082. "(Re)Association Request frame");
  1083. return -1;
  1084. }
  1085. wps2 = attr.version2 != NULL;
  1086. if (wps_validate_version(attr.version, 1) ||
  1087. wps_validate_request_type(attr.request_type, 1) ||
  1088. wps_validate_version2(attr.version2, wps2)) {
  1089. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid (Re)Association "
  1090. "Request frame");
  1091. return -1;
  1092. }
  1093. return 0;
  1094. }
  1095. int wps_validate_assoc_resp(const struct wpabuf *wps_ie)
  1096. {
  1097. struct wps_parse_attr attr;
  1098. int wps2;
  1099. if (wps_ie == NULL) {
  1100. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1101. "(Re)Association Response frame");
  1102. return -1;
  1103. }
  1104. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1105. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1106. "(Re)Association Response frame");
  1107. return -1;
  1108. }
  1109. wps2 = attr.version2 != NULL;
  1110. if (wps_validate_version(attr.version, 1) ||
  1111. wps_validate_response_type(attr.response_type, 1) ||
  1112. wps_validate_version2(attr.version2, wps2)) {
  1113. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid (Re)Association "
  1114. "Response frame");
  1115. return -1;
  1116. }
  1117. return 0;
  1118. }
  1119. int wps_validate_m1(const struct wpabuf *tlvs)
  1120. {
  1121. struct wps_parse_attr attr;
  1122. int wps2;
  1123. if (tlvs == NULL) {
  1124. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M1");
  1125. return -1;
  1126. }
  1127. if (wps_parse_msg(tlvs, &attr) < 0) {
  1128. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1129. "in M1");
  1130. return -1;
  1131. }
  1132. wps2 = attr.version2 != NULL;
  1133. if (wps_validate_version(attr.version, 1) ||
  1134. wps_validate_msg_type(attr.msg_type, 1) ||
  1135. wps_validate_uuid_e(attr.uuid_e, 1) ||
  1136. wps_validate_mac_addr(attr.mac_addr, 1) ||
  1137. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1138. wps_validate_public_key(attr.public_key, attr.public_key_len, 1) ||
  1139. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1140. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1141. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1142. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1143. wps_validate_wps_state(attr.wps_state, 1) ||
  1144. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1145. 1) ||
  1146. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1147. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1148. 1) ||
  1149. wps_validate_serial_number(attr.serial_number,
  1150. attr.serial_number_len, 1) ||
  1151. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1152. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1153. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1154. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1155. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1156. wps_validate_config_error(attr.config_error, 1) ||
  1157. wps_validate_os_version(attr.os_version, 1) ||
  1158. wps_validate_version2(attr.version2, wps2) ||
  1159. wps_validate_request_to_enroll(attr.request_to_enroll, 0)) {
  1160. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M1");
  1161. #ifdef WPS_STRICT_WPS2
  1162. if (wps2)
  1163. return -1;
  1164. #else /* WPS_STRICT_WPS2 */
  1165. return -1;
  1166. #endif /* WPS_STRICT_WPS2 */
  1167. }
  1168. return 0;
  1169. }
  1170. int wps_validate_m2(const struct wpabuf *tlvs)
  1171. {
  1172. struct wps_parse_attr attr;
  1173. int wps2;
  1174. if (tlvs == NULL) {
  1175. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M2");
  1176. return -1;
  1177. }
  1178. if (wps_parse_msg(tlvs, &attr) < 0) {
  1179. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1180. "in M2");
  1181. return -1;
  1182. }
  1183. wps2 = attr.version2 != NULL;
  1184. if (wps_validate_version(attr.version, 1) ||
  1185. wps_validate_msg_type(attr.msg_type, 1) ||
  1186. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1187. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1188. wps_validate_uuid_r(attr.uuid_r, 1) ||
  1189. wps_validate_public_key(attr.public_key, attr.public_key_len, 1) ||
  1190. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1191. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1192. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1193. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1194. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1195. 1) ||
  1196. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1197. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1198. 1) ||
  1199. wps_validate_serial_number(attr.serial_number,
  1200. attr.serial_number_len, 1) ||
  1201. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1202. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1203. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1204. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1205. wps_validate_config_error(attr.config_error, 1) ||
  1206. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1207. wps_validate_os_version(attr.os_version, 1) ||
  1208. wps_validate_version2(attr.version2, wps2) ||
  1209. wps_validate_authenticator(attr.authenticator, 1)) {
  1210. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M2");
  1211. #ifdef WPS_STRICT_WPS2
  1212. if (wps2)
  1213. return -1;
  1214. #else /* WPS_STRICT_WPS2 */
  1215. return -1;
  1216. #endif /* WPS_STRICT_WPS2 */
  1217. }
  1218. return 0;
  1219. }
  1220. int wps_validate_m2d(const struct wpabuf *tlvs)
  1221. {
  1222. struct wps_parse_attr attr;
  1223. int wps2;
  1224. if (tlvs == NULL) {
  1225. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M2D");
  1226. return -1;
  1227. }
  1228. if (wps_parse_msg(tlvs, &attr) < 0) {
  1229. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1230. "in M2D");
  1231. return -1;
  1232. }
  1233. wps2 = attr.version2 != NULL;
  1234. if (wps_validate_version(attr.version, 1) ||
  1235. wps_validate_msg_type(attr.msg_type, 1) ||
  1236. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1237. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1238. wps_validate_uuid_r(attr.uuid_r, 1) ||
  1239. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1240. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1241. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1242. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1243. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1244. 1) ||
  1245. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1246. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1247. 1) ||
  1248. wps_validate_serial_number(attr.serial_number,
  1249. attr.serial_number_len, 1) ||
  1250. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1251. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1252. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1253. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1254. wps_validate_config_error(attr.config_error, 1) ||
  1255. wps_validate_os_version(attr.os_version, 1) ||
  1256. wps_validate_version2(attr.version2, wps2)) {
  1257. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M2D");
  1258. #ifdef WPS_STRICT_WPS2
  1259. if (wps2)
  1260. return -1;
  1261. #else /* WPS_STRICT_WPS2 */
  1262. return -1;
  1263. #endif /* WPS_STRICT_WPS2 */
  1264. }
  1265. return 0;
  1266. }
  1267. int wps_validate_m3(const struct wpabuf *tlvs)
  1268. {
  1269. struct wps_parse_attr attr;
  1270. int wps2;
  1271. if (tlvs == NULL) {
  1272. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M3");
  1273. return -1;
  1274. }
  1275. if (wps_parse_msg(tlvs, &attr) < 0) {
  1276. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1277. "in M3");
  1278. return -1;
  1279. }
  1280. wps2 = attr.version2 != NULL;
  1281. if (wps_validate_version(attr.version, 1) ||
  1282. wps_validate_msg_type(attr.msg_type, 1) ||
  1283. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1284. wps_validate_e_hash1(attr.e_hash1, 1) ||
  1285. wps_validate_e_hash2(attr.e_hash2, 1) ||
  1286. wps_validate_version2(attr.version2, wps2) ||
  1287. wps_validate_authenticator(attr.authenticator, 1)) {
  1288. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M3");
  1289. #ifdef WPS_STRICT_WPS2
  1290. if (wps2)
  1291. return -1;
  1292. #else /* WPS_STRICT_WPS2 */
  1293. return -1;
  1294. #endif /* WPS_STRICT_WPS2 */
  1295. }
  1296. return 0;
  1297. }
  1298. int wps_validate_m4(const struct wpabuf *tlvs)
  1299. {
  1300. struct wps_parse_attr attr;
  1301. int wps2;
  1302. if (tlvs == NULL) {
  1303. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M4");
  1304. return -1;
  1305. }
  1306. if (wps_parse_msg(tlvs, &attr) < 0) {
  1307. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1308. "in M4");
  1309. return -1;
  1310. }
  1311. wps2 = attr.version2 != NULL;
  1312. if (wps_validate_version(attr.version, 1) ||
  1313. wps_validate_msg_type(attr.msg_type, 1) ||
  1314. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1315. wps_validate_r_hash1(attr.r_hash1, 1) ||
  1316. wps_validate_r_hash2(attr.r_hash2, 1) ||
  1317. wps_validate_encr_settings(attr.encr_settings,
  1318. attr.encr_settings_len, 1) ||
  1319. wps_validate_version2(attr.version2, wps2) ||
  1320. wps_validate_authenticator(attr.authenticator, 1)) {
  1321. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M4");
  1322. #ifdef WPS_STRICT_WPS2
  1323. if (wps2)
  1324. return -1;
  1325. #else /* WPS_STRICT_WPS2 */
  1326. return -1;
  1327. #endif /* WPS_STRICT_WPS2 */
  1328. }
  1329. return 0;
  1330. }
  1331. int wps_validate_m4_encr(const struct wpabuf *tlvs, int wps2)
  1332. {
  1333. struct wps_parse_attr attr;
  1334. if (tlvs == NULL) {
  1335. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M4 encrypted "
  1336. "settings");
  1337. return -1;
  1338. }
  1339. if (wps_parse_msg(tlvs, &attr) < 0) {
  1340. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1341. "in M4 encrypted settings");
  1342. return -1;
  1343. }
  1344. if (wps_validate_r_snonce1(attr.r_snonce1, 1) ||
  1345. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1346. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M4 encrypted "
  1347. "settings");
  1348. #ifdef WPS_STRICT_WPS2
  1349. if (wps2)
  1350. return -1;
  1351. #else /* WPS_STRICT_WPS2 */
  1352. return -1;
  1353. #endif /* WPS_STRICT_WPS2 */
  1354. }
  1355. return 0;
  1356. }
  1357. int wps_validate_m5(const struct wpabuf *tlvs)
  1358. {
  1359. struct wps_parse_attr attr;
  1360. int wps2;
  1361. if (tlvs == NULL) {
  1362. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M5");
  1363. return -1;
  1364. }
  1365. if (wps_parse_msg(tlvs, &attr) < 0) {
  1366. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1367. "in M5");
  1368. return -1;
  1369. }
  1370. wps2 = attr.version2 != NULL;
  1371. if (wps_validate_version(attr.version, 1) ||
  1372. wps_validate_msg_type(attr.msg_type, 1) ||
  1373. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1374. wps_validate_encr_settings(attr.encr_settings,
  1375. attr.encr_settings_len, 1) ||
  1376. wps_validate_version2(attr.version2, wps2) ||
  1377. wps_validate_authenticator(attr.authenticator, 1)) {
  1378. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M5");
  1379. #ifdef WPS_STRICT_WPS2
  1380. if (wps2)
  1381. return -1;
  1382. #else /* WPS_STRICT_WPS2 */
  1383. return -1;
  1384. #endif /* WPS_STRICT_WPS2 */
  1385. }
  1386. return 0;
  1387. }
  1388. int wps_validate_m5_encr(const struct wpabuf *tlvs, int wps2)
  1389. {
  1390. struct wps_parse_attr attr;
  1391. if (tlvs == NULL) {
  1392. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M5 encrypted "
  1393. "settings");
  1394. return -1;
  1395. }
  1396. if (wps_parse_msg(tlvs, &attr) < 0) {
  1397. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1398. "in M5 encrypted settings");
  1399. return -1;
  1400. }
  1401. if (wps_validate_e_snonce1(attr.e_snonce1, 1) ||
  1402. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1403. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M5 encrypted "
  1404. "settings");
  1405. #ifdef WPS_STRICT_WPS2
  1406. if (wps2)
  1407. return -1;
  1408. #else /* WPS_STRICT_WPS2 */
  1409. return -1;
  1410. #endif /* WPS_STRICT_WPS2 */
  1411. }
  1412. return 0;
  1413. }
  1414. int wps_validate_m6(const struct wpabuf *tlvs)
  1415. {
  1416. struct wps_parse_attr attr;
  1417. int wps2;
  1418. if (tlvs == NULL) {
  1419. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M6");
  1420. return -1;
  1421. }
  1422. if (wps_parse_msg(tlvs, &attr) < 0) {
  1423. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1424. "in M6");
  1425. return -1;
  1426. }
  1427. wps2 = attr.version2 != NULL;
  1428. if (wps_validate_version(attr.version, 1) ||
  1429. wps_validate_msg_type(attr.msg_type, 1) ||
  1430. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1431. wps_validate_encr_settings(attr.encr_settings,
  1432. attr.encr_settings_len, 1) ||
  1433. wps_validate_version2(attr.version2, wps2) ||
  1434. wps_validate_authenticator(attr.authenticator, 1)) {
  1435. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M6");
  1436. #ifdef WPS_STRICT_WPS2
  1437. if (wps2)
  1438. return -1;
  1439. #else /* WPS_STRICT_WPS2 */
  1440. return -1;
  1441. #endif /* WPS_STRICT_WPS2 */
  1442. }
  1443. return 0;
  1444. }
  1445. int wps_validate_m6_encr(const struct wpabuf *tlvs, int wps2)
  1446. {
  1447. struct wps_parse_attr attr;
  1448. if (tlvs == NULL) {
  1449. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M6 encrypted "
  1450. "settings");
  1451. return -1;
  1452. }
  1453. if (wps_parse_msg(tlvs, &attr) < 0) {
  1454. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1455. "in M6 encrypted settings");
  1456. return -1;
  1457. }
  1458. if (wps_validate_r_snonce2(attr.r_snonce2, 1) ||
  1459. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1460. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M6 encrypted "
  1461. "settings");
  1462. #ifdef WPS_STRICT_WPS2
  1463. if (wps2)
  1464. return -1;
  1465. #else /* WPS_STRICT_WPS2 */
  1466. return -1;
  1467. #endif /* WPS_STRICT_WPS2 */
  1468. }
  1469. return 0;
  1470. }
  1471. int wps_validate_m7(const struct wpabuf *tlvs)
  1472. {
  1473. struct wps_parse_attr attr;
  1474. int wps2;
  1475. if (tlvs == NULL) {
  1476. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M7");
  1477. return -1;
  1478. }
  1479. if (wps_parse_msg(tlvs, &attr) < 0) {
  1480. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1481. "in M7");
  1482. return -1;
  1483. }
  1484. wps2 = attr.version2 != NULL;
  1485. if (wps_validate_version(attr.version, 1) ||
  1486. wps_validate_msg_type(attr.msg_type, 1) ||
  1487. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1488. wps_validate_encr_settings(attr.encr_settings,
  1489. attr.encr_settings_len, 1) ||
  1490. wps_validate_settings_delay_time(attr.settings_delay_time, 0) ||
  1491. wps_validate_version2(attr.version2, wps2) ||
  1492. wps_validate_authenticator(attr.authenticator, 1)) {
  1493. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M7");
  1494. #ifdef WPS_STRICT_WPS2
  1495. if (wps2)
  1496. return -1;
  1497. #else /* WPS_STRICT_WPS2 */
  1498. return -1;
  1499. #endif /* WPS_STRICT_WPS2 */
  1500. }
  1501. return 0;
  1502. }
  1503. int wps_validate_m7_encr(const struct wpabuf *tlvs, int ap, int wps2)
  1504. {
  1505. struct wps_parse_attr attr;
  1506. if (tlvs == NULL) {
  1507. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M7 encrypted "
  1508. "settings");
  1509. return -1;
  1510. }
  1511. if (wps_parse_msg(tlvs, &attr) < 0) {
  1512. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1513. "in M7 encrypted settings");
  1514. return -1;
  1515. }
  1516. if (wps_validate_e_snonce2(attr.e_snonce2, 1) ||
  1517. wps_validate_ssid(attr.ssid, attr.ssid_len, !ap) ||
  1518. wps_validate_mac_addr(attr.mac_addr, !ap) ||
  1519. wps_validate_auth_type(attr.auth_type, !ap) ||
  1520. wps_validate_encr_type(attr.encr_type, !ap) ||
  1521. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  1522. wps_validate_network_key(attr.network_key, attr.network_key_len,
  1523. attr.encr_type, !ap) ||
  1524. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1525. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M7 encrypted "
  1526. "settings");
  1527. #ifdef WPS_STRICT_WPS2
  1528. if (wps2)
  1529. return -1;
  1530. #else /* WPS_STRICT_WPS2 */
  1531. return -1;
  1532. #endif /* WPS_STRICT_WPS2 */
  1533. }
  1534. return 0;
  1535. }
  1536. int wps_validate_m8(const struct wpabuf *tlvs)
  1537. {
  1538. struct wps_parse_attr attr;
  1539. int wps2;
  1540. if (tlvs == NULL) {
  1541. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M8");
  1542. return -1;
  1543. }
  1544. if (wps_parse_msg(tlvs, &attr) < 0) {
  1545. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1546. "in M8");
  1547. return -1;
  1548. }
  1549. wps2 = attr.version2 != NULL;
  1550. if (wps_validate_version(attr.version, 1) ||
  1551. wps_validate_msg_type(attr.msg_type, 1) ||
  1552. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1553. wps_validate_encr_settings(attr.encr_settings,
  1554. attr.encr_settings_len, 1) ||
  1555. wps_validate_version2(attr.version2, wps2) ||
  1556. wps_validate_authenticator(attr.authenticator, 1)) {
  1557. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M8");
  1558. #ifdef WPS_STRICT_WPS2
  1559. if (wps2)
  1560. return -1;
  1561. #else /* WPS_STRICT_WPS2 */
  1562. return -1;
  1563. #endif /* WPS_STRICT_WPS2 */
  1564. }
  1565. return 0;
  1566. }
  1567. int wps_validate_m8_encr(const struct wpabuf *tlvs, int ap, int wps2)
  1568. {
  1569. struct wps_parse_attr attr;
  1570. if (tlvs == NULL) {
  1571. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M8 encrypted "
  1572. "settings");
  1573. return -1;
  1574. }
  1575. if (wps_parse_msg(tlvs, &attr) < 0) {
  1576. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1577. "in M8 encrypted settings");
  1578. return -1;
  1579. }
  1580. if (wps_validate_ssid(attr.ssid, attr.ssid_len, ap) ||
  1581. wps_validate_auth_type(attr.auth_type, ap) ||
  1582. wps_validate_encr_type(attr.encr_type, ap) ||
  1583. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  1584. wps_validate_mac_addr(attr.mac_addr, ap) ||
  1585. wps_validate_credential(attr.cred, attr.cred_len, attr.num_cred,
  1586. !ap) ||
  1587. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1588. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M8 encrypted "
  1589. "settings");
  1590. #ifdef WPS_STRICT_WPS2
  1591. if (wps2)
  1592. return -1;
  1593. #else /* WPS_STRICT_WPS2 */
  1594. return -1;
  1595. #endif /* WPS_STRICT_WPS2 */
  1596. }
  1597. return 0;
  1598. }
  1599. int wps_validate_wsc_ack(const struct wpabuf *tlvs)
  1600. {
  1601. struct wps_parse_attr attr;
  1602. int wps2;
  1603. if (tlvs == NULL) {
  1604. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_ACK");
  1605. return -1;
  1606. }
  1607. if (wps_parse_msg(tlvs, &attr) < 0) {
  1608. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1609. "in WSC_ACK");
  1610. return -1;
  1611. }
  1612. wps2 = attr.version2 != NULL;
  1613. if (wps_validate_version(attr.version, 1) ||
  1614. wps_validate_msg_type(attr.msg_type, 1) ||
  1615. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1616. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1617. wps_validate_version2(attr.version2, wps2)) {
  1618. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_ACK");
  1619. #ifdef WPS_STRICT_WPS2
  1620. if (wps2)
  1621. return -1;
  1622. #else /* WPS_STRICT_WPS2 */
  1623. return -1;
  1624. #endif /* WPS_STRICT_WPS2 */
  1625. }
  1626. return 0;
  1627. }
  1628. int wps_validate_wsc_nack(const struct wpabuf *tlvs)
  1629. {
  1630. struct wps_parse_attr attr;
  1631. int wps2;
  1632. if (tlvs == NULL) {
  1633. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_NACK");
  1634. return -1;
  1635. }
  1636. if (wps_parse_msg(tlvs, &attr) < 0) {
  1637. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1638. "in WSC_NACK");
  1639. return -1;
  1640. }
  1641. wps2 = attr.version2 != NULL;
  1642. if (wps_validate_version(attr.version, 1) ||
  1643. wps_validate_msg_type(attr.msg_type, 1) ||
  1644. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1645. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1646. wps_validate_config_error(attr.config_error, 1) ||
  1647. wps_validate_version2(attr.version2, wps2)) {
  1648. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_NACK");
  1649. #ifdef WPS_STRICT_WPS2
  1650. if (wps2)
  1651. return -1;
  1652. #else /* WPS_STRICT_WPS2 */
  1653. return -1;
  1654. #endif /* WPS_STRICT_WPS2 */
  1655. }
  1656. return 0;
  1657. }
  1658. int wps_validate_wsc_done(const struct wpabuf *tlvs)
  1659. {
  1660. struct wps_parse_attr attr;
  1661. int wps2;
  1662. if (tlvs == NULL) {
  1663. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_Done");
  1664. return -1;
  1665. }
  1666. if (wps_parse_msg(tlvs, &attr) < 0) {
  1667. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1668. "in WSC_Done");
  1669. return -1;
  1670. }
  1671. wps2 = attr.version2 != NULL;
  1672. if (wps_validate_version(attr.version, 1) ||
  1673. wps_validate_msg_type(attr.msg_type, 1) ||
  1674. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1675. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1676. wps_validate_version2(attr.version2, wps2)) {
  1677. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_Done");
  1678. #ifdef WPS_STRICT_WPS2
  1679. if (wps2)
  1680. return -1;
  1681. #else /* WPS_STRICT_WPS2 */
  1682. return -1;
  1683. #endif /* WPS_STRICT_WPS2 */
  1684. }
  1685. return 0;
  1686. }
  1687. int wps_validate_upnp_set_selected_registrar(const struct wpabuf *tlvs)
  1688. {
  1689. struct wps_parse_attr attr;
  1690. int wps2;
  1691. int sel_reg;
  1692. if (tlvs == NULL) {
  1693. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in "
  1694. "SetSelectedRegistrar");
  1695. return -1;
  1696. }
  1697. if (wps_parse_msg(tlvs, &attr) < 0) {
  1698. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1699. "in SetSelectedRegistrar");
  1700. return -1;
  1701. }
  1702. wps2 = attr.version2 != NULL;
  1703. sel_reg = attr.selected_registrar != NULL &&
  1704. *attr.selected_registrar != 0;
  1705. if (wps_validate_version(attr.version, 1) ||
  1706. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  1707. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  1708. wps2, sel_reg) ||
  1709. wps_validate_version2(attr.version2, wps2) ||
  1710. wps_validate_authorized_macs(attr.authorized_macs,
  1711. attr.authorized_macs_len, wps2) ||
  1712. wps_validate_uuid_r(attr.uuid_r, wps2)) {
  1713. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid "
  1714. "SetSelectedRegistrar");
  1715. #ifdef WPS_STRICT_WPS2
  1716. if (wps2)
  1717. return -1;
  1718. #else /* WPS_STRICT_WPS2 */
  1719. return -1;
  1720. #endif /* WPS_STRICT_WPS2 */
  1721. }
  1722. return 0;
  1723. }