sme.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660
  1. /*
  2. * wpa_supplicant - SME
  3. * Copyright (c) 2009-2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "utils/eloop.h"
  17. #include "common/ieee802_11_defs.h"
  18. #include "common/ieee802_11_common.h"
  19. #include "eapol_supp/eapol_supp_sm.h"
  20. #include "common/wpa_common.h"
  21. #include "rsn_supp/wpa.h"
  22. #include "rsn_supp/pmksa_cache.h"
  23. #include "config.h"
  24. #include "wpa_supplicant_i.h"
  25. #include "driver_i.h"
  26. #include "wpas_glue.h"
  27. #include "wps_supplicant.h"
  28. #include "p2p_supplicant.h"
  29. #include "notify.h"
  30. #include "blacklist.h"
  31. #include "bss.h"
  32. #include "scan.h"
  33. #include "sme.h"
  34. void sme_authenticate(struct wpa_supplicant *wpa_s,
  35. struct wpa_bss *bss, struct wpa_ssid *ssid)
  36. {
  37. struct wpa_driver_auth_params params;
  38. struct wpa_ssid *old_ssid;
  39. #ifdef CONFIG_IEEE80211R
  40. const u8 *ie;
  41. #endif /* CONFIG_IEEE80211R */
  42. #ifdef CONFIG_IEEE80211R
  43. const u8 *md = NULL;
  44. #endif /* CONFIG_IEEE80211R */
  45. int i, bssid_changed;
  46. if (bss == NULL) {
  47. wpa_printf(MSG_ERROR, "SME: No scan result available for the "
  48. "network");
  49. return;
  50. }
  51. wpa_s->current_bss = bss;
  52. os_memset(&params, 0, sizeof(params));
  53. wpa_s->reassociate = 0;
  54. params.freq = bss->freq;
  55. params.bssid = bss->bssid;
  56. params.ssid = bss->ssid;
  57. params.ssid_len = bss->ssid_len;
  58. if (wpa_s->sme.ssid_len != params.ssid_len ||
  59. os_memcmp(wpa_s->sme.ssid, params.ssid, params.ssid_len) != 0)
  60. wpa_s->sme.prev_bssid_set = 0;
  61. wpa_s->sme.freq = params.freq;
  62. os_memcpy(wpa_s->sme.ssid, params.ssid, params.ssid_len);
  63. wpa_s->sme.ssid_len = params.ssid_len;
  64. params.auth_alg = WPA_AUTH_ALG_OPEN;
  65. #ifdef IEEE8021X_EAPOL
  66. if (ssid->key_mgmt & WPA_KEY_MGMT_IEEE8021X_NO_WPA) {
  67. if (ssid->leap) {
  68. if (ssid->non_leap == 0)
  69. params.auth_alg = WPA_AUTH_ALG_LEAP;
  70. else
  71. params.auth_alg |= WPA_AUTH_ALG_LEAP;
  72. }
  73. }
  74. #endif /* IEEE8021X_EAPOL */
  75. wpa_printf(MSG_DEBUG, "Automatic auth_alg selection: 0x%x",
  76. params.auth_alg);
  77. if (ssid->auth_alg) {
  78. params.auth_alg = ssid->auth_alg;
  79. wpa_printf(MSG_DEBUG, "Overriding auth_alg selection: 0x%x",
  80. params.auth_alg);
  81. }
  82. for (i = 0; i < NUM_WEP_KEYS; i++) {
  83. if (ssid->wep_key_len[i])
  84. params.wep_key[i] = ssid->wep_key[i];
  85. params.wep_key_len[i] = ssid->wep_key_len[i];
  86. }
  87. params.wep_tx_keyidx = ssid->wep_tx_keyidx;
  88. bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
  89. os_memset(wpa_s->bssid, 0, ETH_ALEN);
  90. os_memcpy(wpa_s->pending_bssid, bss->bssid, ETH_ALEN);
  91. if (bssid_changed)
  92. wpas_notify_bssid_changed(wpa_s);
  93. if ((wpa_bss_get_vendor_ie(bss, WPA_IE_VENDOR_TYPE) ||
  94. wpa_bss_get_ie(bss, WLAN_EID_RSN)) &&
  95. (ssid->key_mgmt & (WPA_KEY_MGMT_IEEE8021X | WPA_KEY_MGMT_PSK |
  96. WPA_KEY_MGMT_FT_IEEE8021X |
  97. WPA_KEY_MGMT_FT_PSK |
  98. WPA_KEY_MGMT_IEEE8021X_SHA256 |
  99. WPA_KEY_MGMT_PSK_SHA256))) {
  100. int try_opportunistic;
  101. try_opportunistic = ssid->proactive_key_caching &&
  102. (ssid->proto & WPA_PROTO_RSN);
  103. if (pmksa_cache_set_current(wpa_s->wpa, NULL, bss->bssid,
  104. wpa_s->current_ssid,
  105. try_opportunistic) == 0)
  106. eapol_sm_notify_pmkid_attempt(wpa_s->eapol, 1);
  107. wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
  108. if (wpa_supplicant_set_suites(wpa_s, bss, ssid,
  109. wpa_s->sme.assoc_req_ie,
  110. &wpa_s->sme.assoc_req_ie_len)) {
  111. wpa_printf(MSG_WARNING, "SME: Failed to set WPA key "
  112. "management and encryption suites");
  113. return;
  114. }
  115. } else if (ssid->key_mgmt &
  116. (WPA_KEY_MGMT_PSK | WPA_KEY_MGMT_IEEE8021X |
  117. WPA_KEY_MGMT_WPA_NONE | WPA_KEY_MGMT_FT_PSK |
  118. WPA_KEY_MGMT_FT_IEEE8021X | WPA_KEY_MGMT_PSK_SHA256 |
  119. WPA_KEY_MGMT_IEEE8021X_SHA256)) {
  120. wpa_s->sme.assoc_req_ie_len = sizeof(wpa_s->sme.assoc_req_ie);
  121. if (wpa_supplicant_set_suites(wpa_s, NULL, ssid,
  122. wpa_s->sme.assoc_req_ie,
  123. &wpa_s->sme.assoc_req_ie_len)) {
  124. wpa_printf(MSG_WARNING, "SME: Failed to set WPA key "
  125. "management and encryption suites (no scan "
  126. "results)");
  127. return;
  128. }
  129. #ifdef CONFIG_WPS
  130. } else if (ssid->key_mgmt & WPA_KEY_MGMT_WPS) {
  131. struct wpabuf *wps_ie;
  132. wps_ie = wps_build_assoc_req_ie(wpas_wps_get_req_type(ssid));
  133. if (wps_ie && wpabuf_len(wps_ie) <=
  134. sizeof(wpa_s->sme.assoc_req_ie)) {
  135. wpa_s->sme.assoc_req_ie_len = wpabuf_len(wps_ie);
  136. os_memcpy(wpa_s->sme.assoc_req_ie, wpabuf_head(wps_ie),
  137. wpa_s->sme.assoc_req_ie_len);
  138. } else
  139. wpa_s->sme.assoc_req_ie_len = 0;
  140. wpabuf_free(wps_ie);
  141. wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
  142. #endif /* CONFIG_WPS */
  143. } else {
  144. wpa_supplicant_set_non_wpa_policy(wpa_s, ssid);
  145. wpa_s->sme.assoc_req_ie_len = 0;
  146. }
  147. #ifdef CONFIG_IEEE80211R
  148. ie = wpa_bss_get_ie(bss, WLAN_EID_MOBILITY_DOMAIN);
  149. if (ie && ie[1] >= MOBILITY_DOMAIN_ID_LEN)
  150. md = ie + 2;
  151. wpa_sm_set_ft_params(wpa_s->wpa, ie, ie ? 2 + ie[1] : 0);
  152. if (md) {
  153. /* Prepare for the next transition */
  154. wpa_ft_prepare_auth_request(wpa_s->wpa, ie);
  155. }
  156. if (md && ssid->key_mgmt & (WPA_KEY_MGMT_FT_PSK |
  157. WPA_KEY_MGMT_FT_IEEE8021X)) {
  158. if (wpa_s->sme.assoc_req_ie_len + 5 <
  159. sizeof(wpa_s->sme.assoc_req_ie)) {
  160. struct rsn_mdie *mdie;
  161. u8 *pos = wpa_s->sme.assoc_req_ie +
  162. wpa_s->sme.assoc_req_ie_len;
  163. *pos++ = WLAN_EID_MOBILITY_DOMAIN;
  164. *pos++ = sizeof(*mdie);
  165. mdie = (struct rsn_mdie *) pos;
  166. os_memcpy(mdie->mobility_domain, md,
  167. MOBILITY_DOMAIN_ID_LEN);
  168. mdie->ft_capab = md[MOBILITY_DOMAIN_ID_LEN];
  169. wpa_s->sme.assoc_req_ie_len += 5;
  170. }
  171. if (wpa_s->sme.ft_used &&
  172. os_memcmp(md, wpa_s->sme.mobility_domain, 2) == 0 &&
  173. wpa_sm_has_ptk(wpa_s->wpa)) {
  174. wpa_printf(MSG_DEBUG, "SME: Trying to use FT "
  175. "over-the-air");
  176. params.auth_alg = WPA_AUTH_ALG_FT;
  177. params.ie = wpa_s->sme.ft_ies;
  178. params.ie_len = wpa_s->sme.ft_ies_len;
  179. }
  180. }
  181. #endif /* CONFIG_IEEE80211R */
  182. #ifdef CONFIG_IEEE80211W
  183. wpa_s->sme.mfp = ssid->ieee80211w;
  184. if (ssid->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
  185. const u8 *rsn = wpa_bss_get_ie(bss, WLAN_EID_RSN);
  186. struct wpa_ie_data _ie;
  187. if (rsn && wpa_parse_wpa_ie(rsn, 2 + rsn[1], &_ie) == 0 &&
  188. _ie.capabilities &
  189. (WPA_CAPABILITY_MFPC | WPA_CAPABILITY_MFPR)) {
  190. wpa_printf(MSG_DEBUG, "WPA: Selected AP supports MFP: "
  191. "require MFP");
  192. wpa_s->sme.mfp = MGMT_FRAME_PROTECTION_REQUIRED;
  193. }
  194. }
  195. #endif /* CONFIG_IEEE80211W */
  196. #ifdef CONFIG_P2P
  197. if (wpa_s->global->p2p) {
  198. u8 *pos;
  199. size_t len;
  200. int res;
  201. int p2p_group;
  202. p2p_group = wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE;
  203. pos = wpa_s->sme.assoc_req_ie + wpa_s->sme.assoc_req_ie_len;
  204. len = sizeof(wpa_s->sme.assoc_req_ie) -
  205. wpa_s->sme.assoc_req_ie_len;
  206. res = wpas_p2p_assoc_req_ie(wpa_s, bss, pos, len, p2p_group);
  207. if (res >= 0)
  208. wpa_s->sme.assoc_req_ie_len += res;
  209. }
  210. #endif /* CONFIG_P2P */
  211. wpa_supplicant_cancel_scan(wpa_s);
  212. wpa_msg(wpa_s, MSG_INFO, "Trying to authenticate with " MACSTR
  213. " (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
  214. wpa_ssid_txt(params.ssid, params.ssid_len), params.freq);
  215. wpa_clear_keys(wpa_s, bss->bssid);
  216. wpa_supplicant_set_state(wpa_s, WPA_AUTHENTICATING);
  217. old_ssid = wpa_s->current_ssid;
  218. wpa_s->current_ssid = ssid;
  219. wpa_supplicant_rsn_supp_set_config(wpa_s, wpa_s->current_ssid);
  220. wpa_supplicant_initiate_eapol(wpa_s);
  221. if (old_ssid != wpa_s->current_ssid)
  222. wpas_notify_network_changed(wpa_s);
  223. wpa_s->sme.auth_alg = params.auth_alg;
  224. if (wpa_drv_authenticate(wpa_s, &params) < 0) {
  225. wpa_msg(wpa_s, MSG_INFO, "Authentication request to the "
  226. "driver failed");
  227. wpa_supplicant_req_scan(wpa_s, 1, 0);
  228. return;
  229. }
  230. /* TODO: add timeout on authentication */
  231. /*
  232. * Association will be started based on the authentication event from
  233. * the driver.
  234. */
  235. }
  236. void sme_event_auth(struct wpa_supplicant *wpa_s, union wpa_event_data *data)
  237. {
  238. struct wpa_ssid *ssid = wpa_s->current_ssid;
  239. if (ssid == NULL) {
  240. wpa_printf(MSG_DEBUG, "SME: Ignore authentication event when "
  241. "network is not selected");
  242. return;
  243. }
  244. if (wpa_s->wpa_state != WPA_AUTHENTICATING) {
  245. wpa_printf(MSG_DEBUG, "SME: Ignore authentication event when "
  246. "not in authenticating state");
  247. return;
  248. }
  249. if (os_memcmp(wpa_s->pending_bssid, data->auth.peer, ETH_ALEN) != 0) {
  250. wpa_printf(MSG_DEBUG, "SME: Ignore authentication with "
  251. "unexpected peer " MACSTR,
  252. MAC2STR(data->auth.peer));
  253. return;
  254. }
  255. wpa_printf(MSG_DEBUG, "SME: Authentication response: peer=" MACSTR
  256. " auth_type=%d status_code=%d",
  257. MAC2STR(data->auth.peer), data->auth.auth_type,
  258. data->auth.status_code);
  259. wpa_hexdump(MSG_MSGDUMP, "SME: Authentication response IEs",
  260. data->auth.ies, data->auth.ies_len);
  261. if (data->auth.status_code != WLAN_STATUS_SUCCESS) {
  262. wpa_printf(MSG_DEBUG, "SME: Authentication failed (status "
  263. "code %d)", data->auth.status_code);
  264. if (data->auth.status_code !=
  265. WLAN_STATUS_NOT_SUPPORTED_AUTH_ALG ||
  266. wpa_s->sme.auth_alg == data->auth.auth_type ||
  267. wpa_s->current_ssid->auth_alg == WPA_AUTH_ALG_LEAP) {
  268. wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
  269. return;
  270. }
  271. switch (data->auth.auth_type) {
  272. case WLAN_AUTH_OPEN:
  273. wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_SHARED;
  274. wpa_printf(MSG_DEBUG, "SME: Trying SHARED auth");
  275. wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
  276. wpa_s->current_ssid);
  277. return;
  278. case WLAN_AUTH_SHARED_KEY:
  279. wpa_s->current_ssid->auth_alg = WPA_AUTH_ALG_LEAP;
  280. wpa_printf(MSG_DEBUG, "SME: Trying LEAP auth");
  281. wpa_supplicant_associate(wpa_s, wpa_s->current_bss,
  282. wpa_s->current_ssid);
  283. return;
  284. default:
  285. return;
  286. }
  287. }
  288. #ifdef CONFIG_IEEE80211R
  289. if (data->auth.auth_type == WLAN_AUTH_FT) {
  290. union wpa_event_data edata;
  291. os_memset(&edata, 0, sizeof(edata));
  292. edata.ft_ies.ies = data->auth.ies;
  293. edata.ft_ies.ies_len = data->auth.ies_len;
  294. os_memcpy(edata.ft_ies.target_ap, data->auth.peer, ETH_ALEN);
  295. wpa_supplicant_event(wpa_s, EVENT_FT_RESPONSE, &edata);
  296. }
  297. #endif /* CONFIG_IEEE80211R */
  298. sme_associate(wpa_s, ssid->mode, data->auth.peer,
  299. data->auth.auth_type);
  300. }
  301. void sme_associate(struct wpa_supplicant *wpa_s, enum wpas_mode mode,
  302. const u8 *bssid, u16 auth_type)
  303. {
  304. struct wpa_driver_associate_params params;
  305. struct ieee802_11_elems elems;
  306. os_memset(&params, 0, sizeof(params));
  307. params.bssid = bssid;
  308. params.ssid = wpa_s->sme.ssid;
  309. params.ssid_len = wpa_s->sme.ssid_len;
  310. params.freq = wpa_s->sme.freq;
  311. params.wpa_ie = wpa_s->sme.assoc_req_ie_len ?
  312. wpa_s->sme.assoc_req_ie : NULL;
  313. params.wpa_ie_len = wpa_s->sme.assoc_req_ie_len;
  314. params.pairwise_suite = cipher_suite2driver(wpa_s->pairwise_cipher);
  315. params.group_suite = cipher_suite2driver(wpa_s->group_cipher);
  316. #ifdef CONFIG_IEEE80211R
  317. if (auth_type == WLAN_AUTH_FT && wpa_s->sme.ft_ies) {
  318. params.wpa_ie = wpa_s->sme.ft_ies;
  319. params.wpa_ie_len = wpa_s->sme.ft_ies_len;
  320. }
  321. #endif /* CONFIG_IEEE80211R */
  322. params.mode = mode;
  323. params.mgmt_frame_protection = wpa_s->sme.mfp;
  324. if (wpa_s->sme.prev_bssid_set)
  325. params.prev_bssid = wpa_s->sme.prev_bssid;
  326. wpa_msg(wpa_s, MSG_INFO, "Trying to associate with " MACSTR
  327. " (SSID='%s' freq=%d MHz)", MAC2STR(params.bssid),
  328. params.ssid ? wpa_ssid_txt(params.ssid, params.ssid_len) : "",
  329. params.freq);
  330. wpa_supplicant_set_state(wpa_s, WPA_ASSOCIATING);
  331. if (params.wpa_ie == NULL ||
  332. ieee802_11_parse_elems(params.wpa_ie, params.wpa_ie_len, &elems, 0)
  333. < 0) {
  334. wpa_printf(MSG_DEBUG, "SME: Could not parse own IEs?!");
  335. os_memset(&elems, 0, sizeof(elems));
  336. }
  337. if (elems.rsn_ie)
  338. wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.rsn_ie - 2,
  339. elems.rsn_ie_len + 2);
  340. else if (elems.wpa_ie)
  341. wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, elems.wpa_ie - 2,
  342. elems.wpa_ie_len + 2);
  343. else
  344. wpa_sm_set_assoc_wpa_ie(wpa_s->wpa, NULL, 0);
  345. if (elems.p2p &&
  346. (wpa_s->drv_flags & WPA_DRIVER_FLAGS_P2P_CAPABLE))
  347. params.p2p = 1;
  348. if (wpa_s->parent->set_sta_uapsd)
  349. params.uapsd = wpa_s->parent->sta_uapsd;
  350. else
  351. params.uapsd = -1;
  352. if (wpa_drv_associate(wpa_s, &params) < 0) {
  353. wpa_msg(wpa_s, MSG_INFO, "Association request to the driver "
  354. "failed");
  355. wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
  356. os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
  357. return;
  358. }
  359. /* TODO: add timeout on association */
  360. }
  361. int sme_update_ft_ies(struct wpa_supplicant *wpa_s, const u8 *md,
  362. const u8 *ies, size_t ies_len)
  363. {
  364. if (md == NULL || ies == NULL) {
  365. wpa_printf(MSG_DEBUG, "SME: Remove mobility domain");
  366. os_free(wpa_s->sme.ft_ies);
  367. wpa_s->sme.ft_ies = NULL;
  368. wpa_s->sme.ft_ies_len = 0;
  369. wpa_s->sme.ft_used = 0;
  370. return 0;
  371. }
  372. os_memcpy(wpa_s->sme.mobility_domain, md, MOBILITY_DOMAIN_ID_LEN);
  373. wpa_hexdump(MSG_DEBUG, "SME: FT IEs", ies, ies_len);
  374. os_free(wpa_s->sme.ft_ies);
  375. wpa_s->sme.ft_ies = os_malloc(ies_len);
  376. if (wpa_s->sme.ft_ies == NULL)
  377. return -1;
  378. os_memcpy(wpa_s->sme.ft_ies, ies, ies_len);
  379. wpa_s->sme.ft_ies_len = ies_len;
  380. return 0;
  381. }
  382. void sme_event_assoc_reject(struct wpa_supplicant *wpa_s,
  383. union wpa_event_data *data)
  384. {
  385. int bssid_changed;
  386. wpa_printf(MSG_DEBUG, "SME: Association with " MACSTR " failed: "
  387. "status code %d", MAC2STR(wpa_s->pending_bssid),
  388. data->assoc_reject.status_code);
  389. bssid_changed = !is_zero_ether_addr(wpa_s->bssid);
  390. /*
  391. * For now, unconditionally terminate the previous authentication. In
  392. * theory, this should not be needed, but mac80211 gets quite confused
  393. * if the authentication is left pending.. Some roaming cases might
  394. * benefit from using the previous authentication, so this could be
  395. * optimized in the future.
  396. */
  397. if (wpa_drv_deauthenticate(wpa_s, wpa_s->pending_bssid,
  398. WLAN_REASON_DEAUTH_LEAVING) < 0) {
  399. wpa_msg(wpa_s, MSG_INFO,
  400. "Deauth request to the driver failed");
  401. }
  402. wpa_s->sme.prev_bssid_set = 0;
  403. wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
  404. wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
  405. os_memset(wpa_s->bssid, 0, ETH_ALEN);
  406. os_memset(wpa_s->pending_bssid, 0, ETH_ALEN);
  407. if (bssid_changed)
  408. wpas_notify_bssid_changed(wpa_s);
  409. }
  410. void sme_event_auth_timed_out(struct wpa_supplicant *wpa_s,
  411. union wpa_event_data *data)
  412. {
  413. wpa_printf(MSG_DEBUG, "SME: Authentication timed out");
  414. wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
  415. }
  416. void sme_event_assoc_timed_out(struct wpa_supplicant *wpa_s,
  417. union wpa_event_data *data)
  418. {
  419. wpa_printf(MSG_DEBUG, "SME: Association timed out");
  420. wpas_connection_failed(wpa_s, wpa_s->pending_bssid);
  421. wpa_supplicant_mark_disassoc(wpa_s);
  422. }
  423. void sme_event_disassoc(struct wpa_supplicant *wpa_s,
  424. union wpa_event_data *data)
  425. {
  426. wpa_printf(MSG_DEBUG, "SME: Disassociation event received");
  427. if (wpa_s->sme.prev_bssid_set &&
  428. !(wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)) {
  429. /*
  430. * cfg80211/mac80211 can get into somewhat confused state if
  431. * the AP only disassociates us and leaves us in authenticated
  432. * state. For now, force the state to be cleared to avoid
  433. * confusing errors if we try to associate with the AP again.
  434. */
  435. wpa_printf(MSG_DEBUG, "SME: Deauthenticate to clear driver "
  436. "state");
  437. wpa_drv_deauthenticate(wpa_s, wpa_s->sme.prev_bssid,
  438. WLAN_REASON_DEAUTH_LEAVING);
  439. }
  440. }
  441. #ifdef CONFIG_IEEE80211W
  442. static const unsigned int sa_query_max_timeout = 1000;
  443. static const unsigned int sa_query_retry_timeout = 201;
  444. static int sme_check_sa_query_timeout(struct wpa_supplicant *wpa_s)
  445. {
  446. u32 tu;
  447. struct os_time now, passed;
  448. os_get_time(&now);
  449. os_time_sub(&now, &wpa_s->sme.sa_query_start, &passed);
  450. tu = (passed.sec * 1000000 + passed.usec) / 1024;
  451. if (sa_query_max_timeout < tu) {
  452. wpa_printf(MSG_DEBUG, "SME: SA Query timed out");
  453. sme_stop_sa_query(wpa_s);
  454. wpa_supplicant_deauthenticate(
  455. wpa_s, WLAN_REASON_PREV_AUTH_NOT_VALID);
  456. return 1;
  457. }
  458. return 0;
  459. }
  460. static void sme_send_sa_query_req(struct wpa_supplicant *wpa_s,
  461. const u8 *trans_id)
  462. {
  463. u8 req[2 + WLAN_SA_QUERY_TR_ID_LEN];
  464. wpa_printf(MSG_DEBUG, "SME: Sending SA Query Request to "
  465. MACSTR, MAC2STR(wpa_s->bssid));
  466. wpa_hexdump(MSG_DEBUG, "SME: SA Query Transaction ID",
  467. trans_id, WLAN_SA_QUERY_TR_ID_LEN);
  468. req[0] = WLAN_ACTION_SA_QUERY;
  469. req[1] = WLAN_SA_QUERY_REQUEST;
  470. os_memcpy(req + 2, trans_id, WLAN_SA_QUERY_TR_ID_LEN);
  471. if (wpa_drv_send_action(wpa_s, wpa_s->assoc_freq, 0, wpa_s->bssid,
  472. wpa_s->own_addr, wpa_s->bssid,
  473. req, sizeof(req)) < 0)
  474. wpa_printf(MSG_INFO, "SME: Failed to send SA Query Request");
  475. }
  476. static void sme_sa_query_timer(void *eloop_ctx, void *timeout_ctx)
  477. {
  478. struct wpa_supplicant *wpa_s = eloop_ctx;
  479. unsigned int timeout, sec, usec;
  480. u8 *trans_id, *nbuf;
  481. if (wpa_s->sme.sa_query_count > 0 &&
  482. sme_check_sa_query_timeout(wpa_s))
  483. return;
  484. nbuf = os_realloc(wpa_s->sme.sa_query_trans_id,
  485. (wpa_s->sme.sa_query_count + 1) *
  486. WLAN_SA_QUERY_TR_ID_LEN);
  487. if (nbuf == NULL)
  488. return;
  489. if (wpa_s->sme.sa_query_count == 0) {
  490. /* Starting a new SA Query procedure */
  491. os_get_time(&wpa_s->sme.sa_query_start);
  492. }
  493. trans_id = nbuf + wpa_s->sme.sa_query_count * WLAN_SA_QUERY_TR_ID_LEN;
  494. wpa_s->sme.sa_query_trans_id = nbuf;
  495. wpa_s->sme.sa_query_count++;
  496. os_get_random(trans_id, WLAN_SA_QUERY_TR_ID_LEN);
  497. timeout = sa_query_retry_timeout;
  498. sec = ((timeout / 1000) * 1024) / 1000;
  499. usec = (timeout % 1000) * 1024;
  500. eloop_register_timeout(sec, usec, sme_sa_query_timer, wpa_s, NULL);
  501. wpa_printf(MSG_DEBUG, "SME: Association SA Query attempt %d",
  502. wpa_s->sme.sa_query_count);
  503. sme_send_sa_query_req(wpa_s, trans_id);
  504. }
  505. static void sme_start_sa_query(struct wpa_supplicant *wpa_s)
  506. {
  507. sme_sa_query_timer(wpa_s, NULL);
  508. }
  509. void sme_stop_sa_query(struct wpa_supplicant *wpa_s)
  510. {
  511. eloop_cancel_timeout(sme_sa_query_timer, wpa_s, NULL);
  512. os_free(wpa_s->sme.sa_query_trans_id);
  513. wpa_s->sme.sa_query_trans_id = NULL;
  514. wpa_s->sme.sa_query_count = 0;
  515. }
  516. void sme_event_unprot_disconnect(struct wpa_supplicant *wpa_s, const u8 *sa,
  517. const u8 *da, u16 reason_code)
  518. {
  519. struct wpa_ssid *ssid;
  520. if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME))
  521. return;
  522. if (wpa_s->wpa_state != WPA_COMPLETED)
  523. return;
  524. ssid = wpa_s->current_ssid;
  525. if (ssid == NULL || ssid->ieee80211w == 0)
  526. return;
  527. if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
  528. return;
  529. if (reason_code != WLAN_REASON_CLASS2_FRAME_FROM_NONAUTH_STA &&
  530. reason_code != WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA)
  531. return;
  532. if (wpa_s->sme.sa_query_count > 0)
  533. return;
  534. wpa_printf(MSG_DEBUG, "SME: Unprotected disconnect dropped - possible "
  535. "AP/STA state mismatch - trigger SA Query");
  536. sme_start_sa_query(wpa_s);
  537. }
  538. void sme_sa_query_rx(struct wpa_supplicant *wpa_s, const u8 *sa,
  539. const u8 *data, size_t len)
  540. {
  541. int i;
  542. if (wpa_s->sme.sa_query_trans_id == NULL ||
  543. len < 1 + WLAN_SA_QUERY_TR_ID_LEN ||
  544. data[0] != WLAN_SA_QUERY_RESPONSE)
  545. return;
  546. wpa_printf(MSG_DEBUG, "SME: Received SA Query response from " MACSTR
  547. " (trans_id %02x%02x)",
  548. MAC2STR(sa), data[1], data[2]);
  549. if (os_memcmp(sa, wpa_s->bssid, ETH_ALEN) != 0)
  550. return;
  551. for (i = 0; i < wpa_s->sme.sa_query_count; i++) {
  552. if (os_memcmp(wpa_s->sme.sa_query_trans_id +
  553. i * WLAN_SA_QUERY_TR_ID_LEN,
  554. data + 1, WLAN_SA_QUERY_TR_ID_LEN) == 0)
  555. break;
  556. }
  557. if (i >= wpa_s->sme.sa_query_count) {
  558. wpa_printf(MSG_DEBUG, "SME: No matching SA Query "
  559. "transaction identifier found");
  560. return;
  561. }
  562. wpa_printf(MSG_DEBUG, "SME: Reply to pending SA Query received from "
  563. MACSTR, MAC2STR(sa));
  564. sme_stop_sa_query(wpa_s);
  565. }
  566. #endif /* CONFIG_IEEE80211W */