beacon.c 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550
  1. /*
  2. * hostapd / IEEE 802.11 Management: Beacon and Probe Request/Response
  3. * Copyright (c) 2002-2004, Instant802 Networks, Inc.
  4. * Copyright (c) 2005-2006, Devicescape Software, Inc.
  5. * Copyright (c) 2008-2009, Jouni Malinen <j@w1.fi>
  6. *
  7. * This program is free software; you can redistribute it and/or modify
  8. * it under the terms of the GNU General Public License version 2 as
  9. * published by the Free Software Foundation.
  10. *
  11. * Alternatively, this software may be distributed under the terms of BSD
  12. * license.
  13. *
  14. * See README and COPYING for more details.
  15. */
  16. #include "utils/includes.h"
  17. #ifndef CONFIG_NATIVE_WINDOWS
  18. #include "utils/common.h"
  19. #include "common/ieee802_11_defs.h"
  20. #include "common/ieee802_11_common.h"
  21. #include "drivers/driver.h"
  22. #include "wps/wps_defs.h"
  23. #include "p2p/p2p.h"
  24. #include "hostapd.h"
  25. #include "ieee802_11.h"
  26. #include "wpa_auth.h"
  27. #include "wmm.h"
  28. #include "ap_config.h"
  29. #include "sta_info.h"
  30. #include "beacon.h"
  31. static u8 ieee802_11_erp_info(struct hostapd_data *hapd)
  32. {
  33. u8 erp = 0;
  34. if (hapd->iface->current_mode == NULL ||
  35. hapd->iface->current_mode->mode != HOSTAPD_MODE_IEEE80211G)
  36. return 0;
  37. switch (hapd->iconf->cts_protection_type) {
  38. case CTS_PROTECTION_FORCE_ENABLED:
  39. erp |= ERP_INFO_NON_ERP_PRESENT | ERP_INFO_USE_PROTECTION;
  40. break;
  41. case CTS_PROTECTION_FORCE_DISABLED:
  42. erp = 0;
  43. break;
  44. case CTS_PROTECTION_AUTOMATIC:
  45. if (hapd->iface->olbc)
  46. erp |= ERP_INFO_USE_PROTECTION;
  47. /* continue */
  48. case CTS_PROTECTION_AUTOMATIC_NO_OLBC:
  49. if (hapd->iface->num_sta_non_erp > 0) {
  50. erp |= ERP_INFO_NON_ERP_PRESENT |
  51. ERP_INFO_USE_PROTECTION;
  52. }
  53. break;
  54. }
  55. if (hapd->iface->num_sta_no_short_preamble > 0 ||
  56. hapd->iconf->preamble == LONG_PREAMBLE)
  57. erp |= ERP_INFO_BARKER_PREAMBLE_MODE;
  58. return erp;
  59. }
  60. static u8 * hostapd_eid_ds_params(struct hostapd_data *hapd, u8 *eid)
  61. {
  62. *eid++ = WLAN_EID_DS_PARAMS;
  63. *eid++ = 1;
  64. *eid++ = hapd->iconf->channel;
  65. return eid;
  66. }
  67. static u8 * hostapd_eid_erp_info(struct hostapd_data *hapd, u8 *eid)
  68. {
  69. if (hapd->iface->current_mode == NULL ||
  70. hapd->iface->current_mode->mode != HOSTAPD_MODE_IEEE80211G)
  71. return eid;
  72. /* Set NonERP_present and use_protection bits if there
  73. * are any associated NonERP stations. */
  74. /* TODO: use_protection bit can be set to zero even if
  75. * there are NonERP stations present. This optimization
  76. * might be useful if NonERP stations are "quiet".
  77. * See 802.11g/D6 E-1 for recommended practice.
  78. * In addition, Non ERP present might be set, if AP detects Non ERP
  79. * operation on other APs. */
  80. /* Add ERP Information element */
  81. *eid++ = WLAN_EID_ERP_INFO;
  82. *eid++ = 1;
  83. *eid++ = ieee802_11_erp_info(hapd);
  84. return eid;
  85. }
  86. static u8 * hostapd_eid_country_add(u8 *pos, u8 *end, int chan_spacing,
  87. struct hostapd_channel_data *start,
  88. struct hostapd_channel_data *prev)
  89. {
  90. if (end - pos < 3)
  91. return pos;
  92. /* first channel number */
  93. *pos++ = start->chan;
  94. /* number of channels */
  95. *pos++ = (prev->chan - start->chan) / chan_spacing + 1;
  96. /* maximum transmit power level */
  97. *pos++ = start->max_tx_power;
  98. return pos;
  99. }
  100. static u8 * hostapd_eid_country(struct hostapd_data *hapd, u8 *eid,
  101. int max_len)
  102. {
  103. u8 *pos = eid;
  104. u8 *end = eid + max_len;
  105. int i;
  106. struct hostapd_hw_modes *mode;
  107. struct hostapd_channel_data *start, *prev;
  108. int chan_spacing = 1;
  109. if (!hapd->iconf->ieee80211d || max_len < 6 ||
  110. hapd->iface->current_mode == NULL)
  111. return eid;
  112. *pos++ = WLAN_EID_COUNTRY;
  113. pos++; /* length will be set later */
  114. os_memcpy(pos, hapd->iconf->country, 3); /* e.g., 'US ' */
  115. pos += 3;
  116. mode = hapd->iface->current_mode;
  117. if (mode->mode == HOSTAPD_MODE_IEEE80211A)
  118. chan_spacing = 4;
  119. start = prev = NULL;
  120. for (i = 0; i < mode->num_channels; i++) {
  121. struct hostapd_channel_data *chan = &mode->channels[i];
  122. if (chan->flag & HOSTAPD_CHAN_DISABLED)
  123. continue;
  124. if (start && prev &&
  125. prev->chan + chan_spacing == chan->chan &&
  126. start->max_tx_power == chan->max_tx_power) {
  127. prev = chan;
  128. continue; /* can use same entry */
  129. }
  130. if (start) {
  131. pos = hostapd_eid_country_add(pos, end, chan_spacing,
  132. start, prev);
  133. start = NULL;
  134. }
  135. /* Start new group */
  136. start = prev = chan;
  137. }
  138. if (start) {
  139. pos = hostapd_eid_country_add(pos, end, chan_spacing,
  140. start, prev);
  141. }
  142. if ((pos - eid) & 1) {
  143. if (end - pos < 1)
  144. return eid;
  145. *pos++ = 0; /* pad for 16-bit alignment */
  146. }
  147. eid[1] = (pos - eid) - 2;
  148. return pos;
  149. }
  150. static u8 * hostapd_eid_wpa(struct hostapd_data *hapd, u8 *eid, size_t len,
  151. struct sta_info *sta)
  152. {
  153. const u8 *ie;
  154. size_t ielen;
  155. ie = wpa_auth_get_wpa_ie(hapd->wpa_auth, &ielen);
  156. if (ie == NULL || ielen > len)
  157. return eid;
  158. os_memcpy(eid, ie, ielen);
  159. return eid + ielen;
  160. }
  161. #ifdef CONFIG_P2P_MANAGER
  162. u8 * hostapd_eid_p2p_manage(struct hostapd_data *hapd, u8 *eid)
  163. {
  164. u8 bitmap;
  165. *eid++ = WLAN_EID_VENDOR_SPECIFIC;
  166. *eid++ = 4 + 3 + 1;
  167. WPA_PUT_BE24(eid, OUI_WFA);
  168. eid += 3;
  169. *eid++ = P2P_OUI_TYPE;
  170. *eid++ = P2P_ATTR_MANAGEABILITY;
  171. WPA_PUT_LE16(eid, 1);
  172. eid += 2;
  173. bitmap = BIT(0); /* P2P Device Management */
  174. if (hapd->conf->p2p & P2P_ALLOW_CROSS_CONNECTION)
  175. bitmap |= BIT(1); /* Cross Connection Permitted */
  176. *eid++ = bitmap;
  177. return eid;
  178. }
  179. #endif /* CONFIG_P2P_MANAGER */
  180. void handle_probe_req(struct hostapd_data *hapd,
  181. const struct ieee80211_mgmt *mgmt, size_t len)
  182. {
  183. struct ieee80211_mgmt *resp;
  184. struct ieee802_11_elems elems;
  185. char *ssid;
  186. u8 *pos, *epos;
  187. const u8 *ie;
  188. size_t ssid_len, ie_len;
  189. struct sta_info *sta = NULL;
  190. size_t buflen;
  191. size_t i;
  192. ie = mgmt->u.probe_req.variable;
  193. ie_len = len - (IEEE80211_HDRLEN + sizeof(mgmt->u.probe_req));
  194. for (i = 0; hapd->probereq_cb && i < hapd->num_probereq_cb; i++)
  195. if (hapd->probereq_cb[i].cb(hapd->probereq_cb[i].ctx,
  196. mgmt->sa, ie, ie_len) > 0)
  197. return;
  198. if (!hapd->iconf->send_probe_response)
  199. return;
  200. if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) {
  201. wpa_printf(MSG_DEBUG, "Could not parse ProbeReq from " MACSTR,
  202. MAC2STR(mgmt->sa));
  203. return;
  204. }
  205. ssid = NULL;
  206. ssid_len = 0;
  207. if ((!elems.ssid || !elems.supp_rates)) {
  208. wpa_printf(MSG_DEBUG, "STA " MACSTR " sent probe request "
  209. "without SSID or supported rates element",
  210. MAC2STR(mgmt->sa));
  211. return;
  212. }
  213. #ifdef CONFIG_P2P
  214. if (hapd->p2p && elems.wps_ie) {
  215. struct wpabuf *wps;
  216. wps = ieee802_11_vendor_ie_concat(ie, ie_len, WPS_DEV_OUI_WFA);
  217. if (wps && !p2p_group_match_dev_type(hapd->p2p_group, wps)) {
  218. wpa_printf(MSG_MSGDUMP, "P2P: Ignore Probe Request "
  219. "due to mismatch with Requested Device "
  220. "Type");
  221. wpabuf_free(wps);
  222. return;
  223. }
  224. wpabuf_free(wps);
  225. }
  226. #endif /* CONFIG_P2P */
  227. if (hapd->conf->ignore_broadcast_ssid && elems.ssid_len == 0) {
  228. wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR " for "
  229. "broadcast SSID ignored", MAC2STR(mgmt->sa));
  230. return;
  231. }
  232. sta = ap_get_sta(hapd, mgmt->sa);
  233. #ifdef CONFIG_P2P
  234. if ((hapd->conf->p2p & P2P_GROUP_OWNER) &&
  235. elems.ssid_len == P2P_WILDCARD_SSID_LEN &&
  236. os_memcmp(elems.ssid, P2P_WILDCARD_SSID,
  237. P2P_WILDCARD_SSID_LEN) == 0) {
  238. /* Process P2P Wildcard SSID like Wildcard SSID */
  239. elems.ssid_len = 0;
  240. }
  241. #endif /* CONFIG_P2P */
  242. if (elems.ssid_len == 0 ||
  243. (elems.ssid_len == hapd->conf->ssid.ssid_len &&
  244. os_memcmp(elems.ssid, hapd->conf->ssid.ssid, elems.ssid_len) ==
  245. 0)) {
  246. ssid = hapd->conf->ssid.ssid;
  247. ssid_len = hapd->conf->ssid.ssid_len;
  248. if (sta)
  249. sta->ssid_probe = &hapd->conf->ssid;
  250. }
  251. if (!ssid) {
  252. if (!(mgmt->da[0] & 0x01)) {
  253. char ssid_txt[33];
  254. ieee802_11_print_ssid(ssid_txt, elems.ssid,
  255. elems.ssid_len);
  256. wpa_printf(MSG_MSGDUMP, "Probe Request from " MACSTR
  257. " for foreign SSID '%s' (DA " MACSTR ")",
  258. MAC2STR(mgmt->sa), ssid_txt,
  259. MAC2STR(mgmt->da));
  260. }
  261. return;
  262. }
  263. /* TODO: verify that supp_rates contains at least one matching rate
  264. * with AP configuration */
  265. #define MAX_PROBERESP_LEN 768
  266. buflen = MAX_PROBERESP_LEN;
  267. #ifdef CONFIG_WPS
  268. if (hapd->wps_probe_resp_ie)
  269. buflen += wpabuf_len(hapd->wps_probe_resp_ie);
  270. #endif /* CONFIG_WPS */
  271. #ifdef CONFIG_P2P
  272. if (hapd->p2p_probe_resp_ie)
  273. buflen += wpabuf_len(hapd->p2p_probe_resp_ie);
  274. #endif /* CONFIG_P2P */
  275. resp = os_zalloc(buflen);
  276. if (resp == NULL)
  277. return;
  278. epos = ((u8 *) resp) + MAX_PROBERESP_LEN;
  279. resp->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
  280. WLAN_FC_STYPE_PROBE_RESP);
  281. os_memcpy(resp->da, mgmt->sa, ETH_ALEN);
  282. os_memcpy(resp->sa, hapd->own_addr, ETH_ALEN);
  283. os_memcpy(resp->bssid, hapd->own_addr, ETH_ALEN);
  284. resp->u.probe_resp.beacon_int =
  285. host_to_le16(hapd->iconf->beacon_int);
  286. /* hardware or low-level driver will setup seq_ctrl and timestamp */
  287. resp->u.probe_resp.capab_info =
  288. host_to_le16(hostapd_own_capab_info(hapd, sta, 1));
  289. pos = resp->u.probe_resp.variable;
  290. *pos++ = WLAN_EID_SSID;
  291. *pos++ = ssid_len;
  292. os_memcpy(pos, ssid, ssid_len);
  293. pos += ssid_len;
  294. /* Supported rates */
  295. pos = hostapd_eid_supp_rates(hapd, pos);
  296. /* DS Params */
  297. pos = hostapd_eid_ds_params(hapd, pos);
  298. pos = hostapd_eid_country(hapd, pos, epos - pos);
  299. /* ERP Information element */
  300. pos = hostapd_eid_erp_info(hapd, pos);
  301. /* Extended supported rates */
  302. pos = hostapd_eid_ext_supp_rates(hapd, pos);
  303. /* RSN, MDIE, WPA */
  304. pos = hostapd_eid_wpa(hapd, pos, epos - pos, sta);
  305. #ifdef CONFIG_IEEE80211N
  306. pos = hostapd_eid_ht_capabilities(hapd, pos);
  307. pos = hostapd_eid_ht_operation(hapd, pos);
  308. #endif /* CONFIG_IEEE80211N */
  309. /* Wi-Fi Alliance WMM */
  310. pos = hostapd_eid_wmm(hapd, pos);
  311. #ifdef CONFIG_WPS
  312. if (hapd->conf->wps_state && hapd->wps_probe_resp_ie) {
  313. os_memcpy(pos, wpabuf_head(hapd->wps_probe_resp_ie),
  314. wpabuf_len(hapd->wps_probe_resp_ie));
  315. pos += wpabuf_len(hapd->wps_probe_resp_ie);
  316. }
  317. #endif /* CONFIG_WPS */
  318. #ifdef CONFIG_P2P
  319. if ((hapd->conf->p2p & P2P_ENABLED) && elems.p2p &&
  320. hapd->p2p_probe_resp_ie) {
  321. os_memcpy(pos, wpabuf_head(hapd->p2p_probe_resp_ie),
  322. wpabuf_len(hapd->p2p_probe_resp_ie));
  323. pos += wpabuf_len(hapd->p2p_probe_resp_ie);
  324. }
  325. #endif /* CONFIG_P2P */
  326. #ifdef CONFIG_P2P_MANAGER
  327. if ((hapd->conf->p2p & (P2P_MANAGE | P2P_ENABLED | P2P_GROUP_OWNER)) ==
  328. P2P_MANAGE)
  329. pos = hostapd_eid_p2p_manage(hapd, pos);
  330. #endif /* CONFIG_P2P_MANAGER */
  331. if (hapd->drv.send_mgmt_frame(hapd, resp, pos - (u8 *) resp) < 0)
  332. perror("handle_probe_req: send");
  333. os_free(resp);
  334. wpa_printf(MSG_EXCESSIVE, "STA " MACSTR " sent probe request for %s "
  335. "SSID", MAC2STR(mgmt->sa),
  336. elems.ssid_len == 0 ? "broadcast" : "our");
  337. }
  338. void ieee802_11_set_beacon(struct hostapd_data *hapd)
  339. {
  340. struct ieee80211_mgmt *head;
  341. u8 *pos, *tail, *tailpos;
  342. u16 capab_info;
  343. size_t head_len, tail_len;
  344. #ifdef CONFIG_P2P
  345. if ((hapd->conf->p2p & (P2P_ENABLED | P2P_GROUP_OWNER)) == P2P_ENABLED)
  346. goto no_beacon;
  347. #endif /* CONFIG_P2P */
  348. #define BEACON_HEAD_BUF_SIZE 256
  349. #define BEACON_TAIL_BUF_SIZE 512
  350. head = os_zalloc(BEACON_HEAD_BUF_SIZE);
  351. tail_len = BEACON_TAIL_BUF_SIZE;
  352. #ifdef CONFIG_WPS
  353. if (hapd->conf->wps_state && hapd->wps_beacon_ie)
  354. tail_len += wpabuf_len(hapd->wps_beacon_ie);
  355. #endif /* CONFIG_WPS */
  356. #ifdef CONFIG_P2P
  357. if (hapd->p2p_beacon_ie)
  358. tail_len += wpabuf_len(hapd->p2p_beacon_ie);
  359. #endif /* CONFIG_P2P */
  360. tailpos = tail = os_malloc(tail_len);
  361. if (head == NULL || tail == NULL) {
  362. wpa_printf(MSG_ERROR, "Failed to set beacon data");
  363. os_free(head);
  364. os_free(tail);
  365. return;
  366. }
  367. head->frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
  368. WLAN_FC_STYPE_BEACON);
  369. head->duration = host_to_le16(0);
  370. os_memset(head->da, 0xff, ETH_ALEN);
  371. os_memcpy(head->sa, hapd->own_addr, ETH_ALEN);
  372. os_memcpy(head->bssid, hapd->own_addr, ETH_ALEN);
  373. head->u.beacon.beacon_int =
  374. host_to_le16(hapd->iconf->beacon_int);
  375. /* hardware or low-level driver will setup seq_ctrl and timestamp */
  376. capab_info = hostapd_own_capab_info(hapd, NULL, 0);
  377. head->u.beacon.capab_info = host_to_le16(capab_info);
  378. pos = &head->u.beacon.variable[0];
  379. /* SSID */
  380. *pos++ = WLAN_EID_SSID;
  381. if (hapd->conf->ignore_broadcast_ssid == 2) {
  382. /* clear the data, but keep the correct length of the SSID */
  383. *pos++ = hapd->conf->ssid.ssid_len;
  384. os_memset(pos, 0, hapd->conf->ssid.ssid_len);
  385. pos += hapd->conf->ssid.ssid_len;
  386. } else if (hapd->conf->ignore_broadcast_ssid) {
  387. *pos++ = 0; /* empty SSID */
  388. } else {
  389. *pos++ = hapd->conf->ssid.ssid_len;
  390. os_memcpy(pos, hapd->conf->ssid.ssid,
  391. hapd->conf->ssid.ssid_len);
  392. pos += hapd->conf->ssid.ssid_len;
  393. }
  394. /* Supported rates */
  395. pos = hostapd_eid_supp_rates(hapd, pos);
  396. /* DS Params */
  397. pos = hostapd_eid_ds_params(hapd, pos);
  398. head_len = pos - (u8 *) head;
  399. tailpos = hostapd_eid_country(hapd, tailpos,
  400. tail + BEACON_TAIL_BUF_SIZE - tailpos);
  401. /* ERP Information element */
  402. tailpos = hostapd_eid_erp_info(hapd, tailpos);
  403. /* Extended supported rates */
  404. tailpos = hostapd_eid_ext_supp_rates(hapd, tailpos);
  405. /* RSN, MDIE, WPA */
  406. tailpos = hostapd_eid_wpa(hapd, tailpos, tail + BEACON_TAIL_BUF_SIZE -
  407. tailpos, NULL);
  408. #ifdef CONFIG_IEEE80211N
  409. tailpos = hostapd_eid_ht_capabilities(hapd, tailpos);
  410. tailpos = hostapd_eid_ht_operation(hapd, tailpos);
  411. #endif /* CONFIG_IEEE80211N */
  412. /* Wi-Fi Alliance WMM */
  413. tailpos = hostapd_eid_wmm(hapd, tailpos);
  414. #ifdef CONFIG_WPS
  415. if (hapd->conf->wps_state && hapd->wps_beacon_ie) {
  416. os_memcpy(tailpos, wpabuf_head(hapd->wps_beacon_ie),
  417. wpabuf_len(hapd->wps_beacon_ie));
  418. tailpos += wpabuf_len(hapd->wps_beacon_ie);
  419. }
  420. #endif /* CONFIG_WPS */
  421. #ifdef CONFIG_P2P
  422. if ((hapd->conf->p2p & P2P_ENABLED) && hapd->p2p_beacon_ie) {
  423. os_memcpy(tailpos, wpabuf_head(hapd->p2p_beacon_ie),
  424. wpabuf_len(hapd->p2p_beacon_ie));
  425. tailpos += wpabuf_len(hapd->p2p_beacon_ie);
  426. }
  427. #endif /* CONFIG_P2P */
  428. #ifdef CONFIG_P2P_MANAGER
  429. if ((hapd->conf->p2p & (P2P_MANAGE | P2P_ENABLED | P2P_GROUP_OWNER)) ==
  430. P2P_MANAGE)
  431. tailpos = hostapd_eid_p2p_manage(hapd, tailpos);
  432. #endif /* CONFIG_P2P_MANAGER */
  433. tail_len = tailpos > tail ? tailpos - tail : 0;
  434. if (hapd->drv.set_beacon(hapd, (u8 *) head, head_len,
  435. tail, tail_len, hapd->conf->dtim_period,
  436. hapd->iconf->beacon_int))
  437. wpa_printf(MSG_ERROR, "Failed to set beacon head/tail or DTIM "
  438. "period");
  439. os_free(tail);
  440. os_free(head);
  441. #ifdef CONFIG_P2P
  442. no_beacon:
  443. #endif /* CONFIG_P2P */
  444. hapd->drv.set_bss_params(hapd, !!(ieee802_11_erp_info(hapd) &
  445. ERP_INFO_USE_PROTECTION));
  446. }
  447. void ieee802_11_set_beacons(struct hostapd_iface *iface)
  448. {
  449. size_t i;
  450. for (i = 0; i < iface->num_bss; i++)
  451. ieee802_11_set_beacon(iface->bss[i]);
  452. }
  453. #endif /* CONFIG_NATIVE_WINDOWS */