wps_validate.c 47 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991
  1. /*
  2. * Wi-Fi Protected Setup - Strict protocol validation routines
  3. * Copyright (c) 2010, Atheros Communications, Inc.
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include "utils/common.h"
  16. #include "wps_i.h"
  17. #include "wps.h"
  18. #ifndef WPS_STRICT_ALL
  19. #define WPS_STRICT_WPS2
  20. #endif /* WPS_STRICT_ALL */
  21. static int wps_validate_version(const u8 *version, int mandatory)
  22. {
  23. if (version == NULL) {
  24. if (mandatory) {
  25. wpa_printf(MSG_INFO, "WPS-STRICT: Version attribute "
  26. "missing");
  27. return -1;
  28. }
  29. return 0;
  30. }
  31. if (*version != 0x10) {
  32. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version attribute "
  33. "value 0x%x", *version);
  34. return -1;
  35. }
  36. return 0;
  37. }
  38. static int wps_validate_version2(const u8 *version2, int mandatory)
  39. {
  40. if (version2 == NULL) {
  41. if (mandatory) {
  42. wpa_printf(MSG_INFO, "WPS-STRICT: Version2 attribute "
  43. "missing");
  44. return -1;
  45. }
  46. return 0;
  47. }
  48. if (*version2 < 0x20) {
  49. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Version2 attribute "
  50. "value 0x%x", *version2);
  51. return -1;
  52. }
  53. return 0;
  54. }
  55. static int wps_validate_request_type(const u8 *request_type, int mandatory)
  56. {
  57. if (request_type == NULL) {
  58. if (mandatory) {
  59. wpa_printf(MSG_INFO, "WPS-STRICT: Request Type "
  60. "attribute missing");
  61. return -1;
  62. }
  63. return 0;
  64. }
  65. if (*request_type > 0x03) {
  66. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request Type "
  67. "attribute value 0x%x", *request_type);
  68. return -1;
  69. }
  70. return 0;
  71. }
  72. static int wps_validate_response_type(const u8 *response_type, int mandatory)
  73. {
  74. if (response_type == NULL) {
  75. if (mandatory) {
  76. wpa_printf(MSG_INFO, "WPS-STRICT: Response Type "
  77. "attribute missing");
  78. return -1;
  79. }
  80. return 0;
  81. }
  82. if (*response_type > 0x03) {
  83. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Response Type "
  84. "attribute value 0x%x", *response_type);
  85. return -1;
  86. }
  87. return 0;
  88. }
  89. static int valid_config_methods(u16 val, int wps2)
  90. {
  91. if (wps2) {
  92. if ((val & 0x6000) && !(val & WPS_CONFIG_DISPLAY)) {
  93. wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
  94. "Display flag without old Display flag "
  95. "set");
  96. return 0;
  97. }
  98. if (!(val & 0x6000) && (val & WPS_CONFIG_DISPLAY)) {
  99. wpa_printf(MSG_INFO, "WPS-STRICT: Display flag "
  100. "without Physical/Virtual Display flag");
  101. return 0;
  102. }
  103. if ((val & 0x0600) && !(val & WPS_CONFIG_PUSHBUTTON)) {
  104. wpa_printf(MSG_INFO, "WPS-STRICT: Physical/Virtual "
  105. "PushButton flag without old PushButton "
  106. "flag set");
  107. return 0;
  108. }
  109. if (!(val & 0x0600) && (val & WPS_CONFIG_PUSHBUTTON)) {
  110. wpa_printf(MSG_INFO, "WPS-STRICT: PushButton flag "
  111. "without Physical/Virtual PushButton flag");
  112. return 0;
  113. }
  114. }
  115. return 1;
  116. }
  117. static int wps_validate_config_methods(const u8 *config_methods, int wps2,
  118. int mandatory)
  119. {
  120. u16 val;
  121. if (config_methods == NULL) {
  122. if (mandatory) {
  123. wpa_printf(MSG_INFO, "WPS-STRICT: Configuration "
  124. "Methods attribute missing");
  125. return -1;
  126. }
  127. return 0;
  128. }
  129. val = WPA_GET_BE16(config_methods);
  130. if (!valid_config_methods(val, wps2)) {
  131. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration "
  132. "Methods attribute value 0x%04x", val);
  133. return -1;
  134. }
  135. return 0;
  136. }
  137. static int wps_validate_ap_config_methods(const u8 *config_methods, int wps2,
  138. int mandatory)
  139. {
  140. u16 val;
  141. if (wps_validate_config_methods(config_methods, wps2, mandatory) < 0)
  142. return -1;
  143. if (config_methods == NULL)
  144. return 0;
  145. val = WPA_GET_BE16(config_methods);
  146. if (val & WPS_CONFIG_PUSHBUTTON) {
  147. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration "
  148. "Methods attribute value 0x%04x in AP info "
  149. "(PushButton not allowed for registering new ER)",
  150. val);
  151. return -1;
  152. }
  153. return 0;
  154. }
  155. static int wps_validate_uuid_e(const u8 *uuid_e, int mandatory)
  156. {
  157. if (uuid_e == NULL) {
  158. if (mandatory) {
  159. wpa_printf(MSG_INFO, "WPS-STRICT: UUID-E "
  160. "attribute missing");
  161. return -1;
  162. }
  163. return 0;
  164. }
  165. return 0;
  166. }
  167. static int wps_validate_uuid_r(const u8 *uuid_r, int mandatory)
  168. {
  169. if (uuid_r == NULL) {
  170. if (mandatory) {
  171. wpa_printf(MSG_INFO, "WPS-STRICT: UUID-R "
  172. "attribute missing");
  173. return -1;
  174. }
  175. return 0;
  176. }
  177. return 0;
  178. }
  179. static int wps_validate_primary_dev_type(const u8 *primary_dev_type,
  180. int mandatory)
  181. {
  182. if (primary_dev_type == NULL) {
  183. if (mandatory) {
  184. wpa_printf(MSG_INFO, "WPS-STRICT: Primary Device Type "
  185. "attribute missing");
  186. return -1;
  187. }
  188. return 0;
  189. }
  190. return 0;
  191. }
  192. static int wps_validate_rf_bands(const u8 *rf_bands, int mandatory)
  193. {
  194. if (rf_bands == NULL) {
  195. if (mandatory) {
  196. wpa_printf(MSG_INFO, "WPS-STRICT: RF Bands "
  197. "attribute missing");
  198. return -1;
  199. }
  200. return 0;
  201. }
  202. if (*rf_bands != WPS_RF_24GHZ && *rf_bands != WPS_RF_50GHZ &&
  203. *rf_bands != (WPS_RF_24GHZ | WPS_RF_50GHZ)) {
  204. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Rf Bands "
  205. "attribute value 0x%x", *rf_bands);
  206. return -1;
  207. }
  208. return 0;
  209. }
  210. static int wps_validate_assoc_state(const u8 *assoc_state, int mandatory)
  211. {
  212. u16 val;
  213. if (assoc_state == NULL) {
  214. if (mandatory) {
  215. wpa_printf(MSG_INFO, "WPS-STRICT: Association State "
  216. "attribute missing");
  217. return -1;
  218. }
  219. return 0;
  220. }
  221. val = WPA_GET_BE16(assoc_state);
  222. if (val > 4) {
  223. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Association State "
  224. "attribute value 0x%04x", val);
  225. return -1;
  226. }
  227. return 0;
  228. }
  229. static int wps_validate_config_error(const u8 *config_error, int mandatory)
  230. {
  231. u16 val;
  232. if (config_error == NULL) {
  233. if (mandatory) {
  234. wpa_printf(MSG_INFO, "WPS-STRICT: Configuration Error "
  235. "attribute missing");
  236. return -1;
  237. }
  238. return 0;
  239. }
  240. val = WPA_GET_BE16(config_error);
  241. if (val > 18) {
  242. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Configuration Error "
  243. "attribute value 0x%04x", val);
  244. return -1;
  245. }
  246. return 0;
  247. }
  248. static int wps_validate_dev_password_id(const u8 *dev_password_id,
  249. int mandatory)
  250. {
  251. u16 val;
  252. if (dev_password_id == NULL) {
  253. if (mandatory) {
  254. wpa_printf(MSG_INFO, "WPS-STRICT: Device Password ID "
  255. "attribute missing");
  256. return -1;
  257. }
  258. return 0;
  259. }
  260. val = WPA_GET_BE16(dev_password_id);
  261. if (val >= 0x0006 && val <= 0x000f) {
  262. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Device Password ID "
  263. "attribute value 0x%04x", val);
  264. return -1;
  265. }
  266. return 0;
  267. }
  268. static int wps_validate_manufacturer(const u8 *manufacturer, size_t len,
  269. int mandatory)
  270. {
  271. if (manufacturer == NULL) {
  272. if (mandatory) {
  273. wpa_printf(MSG_INFO, "WPS-STRICT: Manufacturer "
  274. "attribute missing");
  275. return -1;
  276. }
  277. return 0;
  278. }
  279. if (len > 0 && manufacturer[len - 1] == 0) {
  280. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Manufacturer "
  281. "attribute value", manufacturer, len);
  282. return -1;
  283. }
  284. return 0;
  285. }
  286. static int wps_validate_model_name(const u8 *model_name, size_t len,
  287. int mandatory)
  288. {
  289. if (model_name == NULL) {
  290. if (mandatory) {
  291. wpa_printf(MSG_INFO, "WPS-STRICT: Model Name "
  292. "attribute missing");
  293. return -1;
  294. }
  295. return 0;
  296. }
  297. if (len > 0 && model_name[len - 1] == 0) {
  298. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Model Name "
  299. "attribute value", model_name, len);
  300. return -1;
  301. }
  302. return 0;
  303. }
  304. static int wps_validate_model_number(const u8 *model_number, size_t len,
  305. int mandatory)
  306. {
  307. if (model_number == NULL) {
  308. if (mandatory) {
  309. wpa_printf(MSG_INFO, "WPS-STRICT: Model Number "
  310. "attribute missing");
  311. return -1;
  312. }
  313. return 0;
  314. }
  315. if (len > 0 && model_number[len - 1] == 0) {
  316. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Model Number "
  317. "attribute value", model_number, len);
  318. return -1;
  319. }
  320. return 0;
  321. }
  322. static int wps_validate_serial_number(const u8 *serial_number, size_t len,
  323. int mandatory)
  324. {
  325. if (serial_number == NULL) {
  326. if (mandatory) {
  327. wpa_printf(MSG_INFO, "WPS-STRICT: Serial Number "
  328. "attribute missing");
  329. return -1;
  330. }
  331. return 0;
  332. }
  333. if (len > 0 && serial_number[len - 1] == 0) {
  334. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Serial "
  335. "Number attribute value",
  336. serial_number, len);
  337. return -1;
  338. }
  339. return 0;
  340. }
  341. static int wps_validate_dev_name(const u8 *dev_name, size_t len,
  342. int mandatory)
  343. {
  344. if (dev_name == NULL) {
  345. if (mandatory) {
  346. wpa_printf(MSG_INFO, "WPS-STRICT: Device Name "
  347. "attribute missing");
  348. return -1;
  349. }
  350. return 0;
  351. }
  352. if (len > 0 && dev_name[len - 1] == 0) {
  353. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid Device Name "
  354. "attribute value", dev_name, len);
  355. return -1;
  356. }
  357. return 0;
  358. }
  359. static int wps_validate_request_to_enroll(const u8 *request_to_enroll,
  360. int mandatory)
  361. {
  362. if (request_to_enroll == NULL) {
  363. if (mandatory) {
  364. wpa_printf(MSG_INFO, "WPS-STRICT: Request to Enroll "
  365. "attribute missing");
  366. return -1;
  367. }
  368. return 0;
  369. }
  370. if (*request_to_enroll > 0x01) {
  371. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Request to Enroll "
  372. "attribute value 0x%x", *request_to_enroll);
  373. return -1;
  374. }
  375. return 0;
  376. }
  377. static int wps_validate_req_dev_type(const u8 *req_dev_type[], size_t num,
  378. int mandatory)
  379. {
  380. if (num == 0) {
  381. if (mandatory) {
  382. wpa_printf(MSG_INFO, "WPS-STRICT: Requested Device "
  383. "Type attribute missing");
  384. return -1;
  385. }
  386. return 0;
  387. }
  388. return 0;
  389. }
  390. static int wps_validate_wps_state(const u8 *wps_state, int mandatory)
  391. {
  392. if (wps_state == NULL) {
  393. if (mandatory) {
  394. wpa_printf(MSG_INFO, "WPS-STRICT: Wi-Fi Protected "
  395. "Setup State attribute missing");
  396. return -1;
  397. }
  398. return 0;
  399. }
  400. if (*wps_state != WPS_STATE_NOT_CONFIGURED &&
  401. *wps_state != WPS_STATE_CONFIGURED) {
  402. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Wi-Fi Protected "
  403. "Setup State attribute value 0x%x", *wps_state);
  404. return -1;
  405. }
  406. return 0;
  407. }
  408. static int wps_validate_ap_setup_locked(const u8 *ap_setup_locked,
  409. int mandatory)
  410. {
  411. if (ap_setup_locked == NULL) {
  412. if (mandatory) {
  413. wpa_printf(MSG_INFO, "WPS-STRICT: AP Setup Locked "
  414. "attribute missing");
  415. return -1;
  416. }
  417. return 0;
  418. }
  419. if (*ap_setup_locked > 1) {
  420. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid AP Setup Locked "
  421. "attribute value 0x%x", *ap_setup_locked);
  422. return -1;
  423. }
  424. return 0;
  425. }
  426. static int wps_validate_selected_registrar(const u8 *selected_registrar,
  427. int mandatory)
  428. {
  429. if (selected_registrar == NULL) {
  430. if (mandatory) {
  431. wpa_printf(MSG_INFO, "WPS-STRICT: Selected Registrar "
  432. "attribute missing");
  433. return -1;
  434. }
  435. return 0;
  436. }
  437. if (*selected_registrar > 1) {
  438. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Selected Registrar "
  439. "attribute value 0x%x", *selected_registrar);
  440. return -1;
  441. }
  442. return 0;
  443. }
  444. static int wps_validate_sel_reg_config_methods(const u8 *config_methods,
  445. int wps2, int mandatory)
  446. {
  447. u16 val;
  448. if (config_methods == NULL) {
  449. if (mandatory) {
  450. wpa_printf(MSG_INFO, "WPS-STRICT: Selected Registrar "
  451. "Configuration Methods attribute missing");
  452. return -1;
  453. }
  454. return 0;
  455. }
  456. val = WPA_GET_BE16(config_methods);
  457. if (!valid_config_methods(val, wps2)) {
  458. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Selected Registrar "
  459. "Configuration Methods attribute value 0x%04x",
  460. val);
  461. return -1;
  462. }
  463. return 0;
  464. }
  465. static int wps_validate_authorized_macs(const u8 *authorized_macs, size_t len,
  466. int mandatory)
  467. {
  468. if (authorized_macs == NULL) {
  469. if (mandatory) {
  470. wpa_printf(MSG_INFO, "WPS-STRICT: Authorized MACs "
  471. "attribute missing");
  472. return -1;
  473. }
  474. return 0;
  475. }
  476. if (len > 30 && (len % ETH_ALEN) != 0) {
  477. wpa_hexdump(MSG_INFO, "WPS-STRICT: Invalid Authorized "
  478. "MACs attribute value", authorized_macs, len);
  479. return -1;
  480. }
  481. return 0;
  482. }
  483. static int wps_validate_msg_type(const u8 *msg_type, int mandatory)
  484. {
  485. if (msg_type == NULL) {
  486. if (mandatory) {
  487. wpa_printf(MSG_INFO, "WPS-STRICT: Message Type "
  488. "attribute missing");
  489. return -1;
  490. }
  491. return 0;
  492. }
  493. if (*msg_type < WPS_Beacon || *msg_type > WPS_WSC_DONE) {
  494. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Message Type "
  495. "attribute value 0x%x", *msg_type);
  496. return -1;
  497. }
  498. return 0;
  499. }
  500. static int wps_validate_mac_addr(const u8 *mac_addr, int mandatory)
  501. {
  502. if (mac_addr == NULL) {
  503. if (mandatory) {
  504. wpa_printf(MSG_INFO, "WPS-STRICT: MAC Address "
  505. "attribute missing");
  506. return -1;
  507. }
  508. return 0;
  509. }
  510. if (mac_addr[0] & 0x01) {
  511. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid MAC Address "
  512. "attribute value " MACSTR, MAC2STR(mac_addr));
  513. return -1;
  514. }
  515. return 0;
  516. }
  517. static int wps_validate_enrollee_nonce(const u8 *enrollee_nonce, int mandatory)
  518. {
  519. if (enrollee_nonce == NULL) {
  520. if (mandatory) {
  521. wpa_printf(MSG_INFO, "WPS-STRICT: Enrollee Nonce "
  522. "attribute missing");
  523. return -1;
  524. }
  525. return 0;
  526. }
  527. return 0;
  528. }
  529. static int wps_validate_registrar_nonce(const u8 *registrar_nonce,
  530. int mandatory)
  531. {
  532. if (registrar_nonce == NULL) {
  533. if (mandatory) {
  534. wpa_printf(MSG_INFO, "WPS-STRICT: Registrar Nonce "
  535. "attribute missing");
  536. return -1;
  537. }
  538. return 0;
  539. }
  540. return 0;
  541. }
  542. static int wps_validate_public_key(const u8 *public_key, size_t len,
  543. int mandatory)
  544. {
  545. if (public_key == NULL) {
  546. if (mandatory) {
  547. wpa_printf(MSG_INFO, "WPS-STRICT: Public Key "
  548. "attribute missing");
  549. return -1;
  550. }
  551. return 0;
  552. }
  553. if (len != 192) {
  554. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Public Key "
  555. "attribute length %d", (int) len);
  556. return -1;
  557. }
  558. return 0;
  559. }
  560. static int num_bits_set(u16 val)
  561. {
  562. int c;
  563. for (c = 0; val; c++)
  564. val &= val - 1;
  565. return c;
  566. }
  567. static int wps_validate_auth_type_flags(const u8 *flags, int mandatory)
  568. {
  569. u16 val;
  570. if (flags == NULL) {
  571. if (mandatory) {
  572. wpa_printf(MSG_INFO, "WPS-STRICT: Authentication Type "
  573. "Flags attribute missing");
  574. return -1;
  575. }
  576. return 0;
  577. }
  578. val = WPA_GET_BE16(flags);
  579. if ((val & ~WPS_AUTH_TYPES) || !(val & WPS_AUTH_WPA2PSK)) {
  580. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Authentication Type "
  581. "Flags attribute value 0x%04x", val);
  582. return -1;
  583. }
  584. return 0;
  585. }
  586. static int wps_validate_auth_type(const u8 *type, int mandatory)
  587. {
  588. u16 val;
  589. if (type == NULL) {
  590. if (mandatory) {
  591. wpa_printf(MSG_INFO, "WPS-STRICT: Authentication Type "
  592. "attribute missing");
  593. return -1;
  594. }
  595. return 0;
  596. }
  597. val = WPA_GET_BE16(type);
  598. if ((val & ~WPS_AUTH_TYPES) || val == 0 ||
  599. (num_bits_set(val) > 1 &&
  600. val != (WPS_AUTH_WPAPSK | WPS_AUTH_WPA2PSK))) {
  601. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Authentication Type "
  602. "attribute value 0x%04x", val);
  603. return -1;
  604. }
  605. return 0;
  606. }
  607. static int wps_validate_encr_type_flags(const u8 *flags, int mandatory)
  608. {
  609. u16 val;
  610. if (flags == NULL) {
  611. if (mandatory) {
  612. wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type "
  613. "Flags attribute missing");
  614. return -1;
  615. }
  616. return 0;
  617. }
  618. val = WPA_GET_BE16(flags);
  619. if ((val & ~WPS_ENCR_TYPES) || !(val & WPS_ENCR_AES)) {
  620. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type "
  621. "Flags attribute value 0x%04x", val);
  622. return -1;
  623. }
  624. return 0;
  625. }
  626. static int wps_validate_encr_type(const u8 *type, int mandatory)
  627. {
  628. u16 val;
  629. if (type == NULL) {
  630. if (mandatory) {
  631. wpa_printf(MSG_INFO, "WPS-STRICT: Encryption Type "
  632. "attribute missing");
  633. return -1;
  634. }
  635. return 0;
  636. }
  637. val = WPA_GET_BE16(type);
  638. if ((val & ~WPS_ENCR_TYPES) || val == 0 ||
  639. (num_bits_set(val) > 1 && val != (WPS_ENCR_TKIP | WPS_ENCR_AES))) {
  640. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encryption Type "
  641. "attribute value 0x%04x", val);
  642. return -1;
  643. }
  644. return 0;
  645. }
  646. static int wps_validate_conn_type_flags(const u8 *flags, int mandatory)
  647. {
  648. if (flags == NULL) {
  649. if (mandatory) {
  650. wpa_printf(MSG_INFO, "WPS-STRICT: Connection Type "
  651. "Flags attribute missing");
  652. return -1;
  653. }
  654. return 0;
  655. }
  656. if ((*flags & ~(WPS_CONN_ESS | WPS_CONN_IBSS)) ||
  657. !(*flags & WPS_CONN_ESS)) {
  658. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Connection Type "
  659. "Flags attribute value 0x%02x", *flags);
  660. return -1;
  661. }
  662. return 0;
  663. }
  664. static int wps_validate_os_version(const u8 *os_version, int mandatory)
  665. {
  666. if (os_version == NULL) {
  667. if (mandatory) {
  668. wpa_printf(MSG_INFO, "WPS-STRICT: OS Version "
  669. "attribute missing");
  670. return -1;
  671. }
  672. return 0;
  673. }
  674. return 0;
  675. }
  676. static int wps_validate_authenticator(const u8 *authenticator, int mandatory)
  677. {
  678. if (authenticator == NULL) {
  679. if (mandatory) {
  680. wpa_printf(MSG_INFO, "WPS-STRICT: Authenticator "
  681. "attribute missing");
  682. return -1;
  683. }
  684. return 0;
  685. }
  686. return 0;
  687. }
  688. static int wps_validate_e_hash1(const u8 *hash, int mandatory)
  689. {
  690. if (hash == NULL) {
  691. if (mandatory) {
  692. wpa_printf(MSG_INFO, "WPS-STRICT: E-Hash1 "
  693. "attribute missing");
  694. return -1;
  695. }
  696. return 0;
  697. }
  698. return 0;
  699. }
  700. static int wps_validate_e_hash2(const u8 *hash, int mandatory)
  701. {
  702. if (hash == NULL) {
  703. if (mandatory) {
  704. wpa_printf(MSG_INFO, "WPS-STRICT: E-Hash2 "
  705. "attribute missing");
  706. return -1;
  707. }
  708. return 0;
  709. }
  710. return 0;
  711. }
  712. static int wps_validate_r_hash1(const u8 *hash, int mandatory)
  713. {
  714. if (hash == NULL) {
  715. if (mandatory) {
  716. wpa_printf(MSG_INFO, "WPS-STRICT: R-Hash1 "
  717. "attribute missing");
  718. return -1;
  719. }
  720. return 0;
  721. }
  722. return 0;
  723. }
  724. static int wps_validate_r_hash2(const u8 *hash, int mandatory)
  725. {
  726. if (hash == NULL) {
  727. if (mandatory) {
  728. wpa_printf(MSG_INFO, "WPS-STRICT: R-Hash2 "
  729. "attribute missing");
  730. return -1;
  731. }
  732. return 0;
  733. }
  734. return 0;
  735. }
  736. static int wps_validate_encr_settings(const u8 *encr_settings, size_t len,
  737. int mandatory)
  738. {
  739. if (encr_settings == NULL) {
  740. if (mandatory) {
  741. wpa_printf(MSG_INFO, "WPS-STRICT: Encrypted Settings "
  742. "attribute missing");
  743. return -1;
  744. }
  745. return 0;
  746. }
  747. if (len < 16) {
  748. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Encrypted Settings "
  749. "attribute length %d", (int) len);
  750. return -1;
  751. }
  752. return 0;
  753. }
  754. static int wps_validate_settings_delay_time(const u8 *delay, int mandatory)
  755. {
  756. if (delay == NULL) {
  757. if (mandatory) {
  758. wpa_printf(MSG_INFO, "WPS-STRICT: Settings Delay Time "
  759. "attribute missing");
  760. return -1;
  761. }
  762. return 0;
  763. }
  764. return 0;
  765. }
  766. static int wps_validate_r_snonce1(const u8 *nonce, int mandatory)
  767. {
  768. if (nonce == NULL) {
  769. if (mandatory) {
  770. wpa_printf(MSG_INFO, "WPS-STRICT: R-SNonce1 "
  771. "attribute missing");
  772. return -1;
  773. }
  774. return 0;
  775. }
  776. return 0;
  777. }
  778. static int wps_validate_r_snonce2(const u8 *nonce, int mandatory)
  779. {
  780. if (nonce == NULL) {
  781. if (mandatory) {
  782. wpa_printf(MSG_INFO, "WPS-STRICT: R-SNonce2 "
  783. "attribute missing");
  784. return -1;
  785. }
  786. return 0;
  787. }
  788. return 0;
  789. }
  790. static int wps_validate_e_snonce1(const u8 *nonce, int mandatory)
  791. {
  792. if (nonce == NULL) {
  793. if (mandatory) {
  794. wpa_printf(MSG_INFO, "WPS-STRICT: E-SNonce1 "
  795. "attribute missing");
  796. return -1;
  797. }
  798. return 0;
  799. }
  800. return 0;
  801. }
  802. static int wps_validate_e_snonce2(const u8 *nonce, int mandatory)
  803. {
  804. if (nonce == NULL) {
  805. if (mandatory) {
  806. wpa_printf(MSG_INFO, "WPS-STRICT: E-SNonce2 "
  807. "attribute missing");
  808. return -1;
  809. }
  810. return 0;
  811. }
  812. return 0;
  813. }
  814. static int wps_validate_key_wrap_auth(const u8 *auth, int mandatory)
  815. {
  816. if (auth == NULL) {
  817. if (mandatory) {
  818. wpa_printf(MSG_INFO, "WPS-STRICT: Key Wrap "
  819. "Authenticator attribute missing");
  820. return -1;
  821. }
  822. return 0;
  823. }
  824. return 0;
  825. }
  826. static int wps_validate_ssid(const u8 *ssid, size_t ssid_len, int mandatory)
  827. {
  828. if (ssid == NULL) {
  829. if (mandatory) {
  830. wpa_printf(MSG_INFO, "WPS-STRICT: SSID "
  831. "attribute missing");
  832. return -1;
  833. }
  834. return 0;
  835. }
  836. if (ssid_len == 0 || ssid[ssid_len - 1] == 0) {
  837. wpa_hexdump_ascii(MSG_INFO, "WPS-STRICT: Invalid SSID "
  838. "attribute value", ssid, ssid_len);
  839. return -1;
  840. }
  841. return 0;
  842. }
  843. static int wps_validate_network_key_index(const u8 *idx, int mandatory)
  844. {
  845. if (idx == NULL) {
  846. if (mandatory) {
  847. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key Index "
  848. "attribute missing");
  849. return -1;
  850. }
  851. return 0;
  852. }
  853. return 0;
  854. }
  855. static int wps_validate_network_idx(const u8 *idx, int mandatory)
  856. {
  857. if (idx == NULL) {
  858. if (mandatory) {
  859. wpa_printf(MSG_INFO, "WPS-STRICT: Network Index "
  860. "attribute missing");
  861. return -1;
  862. }
  863. return 0;
  864. }
  865. return 0;
  866. }
  867. static int wps_validate_network_key(const u8 *key, size_t key_len,
  868. const u8 *encr_type, int mandatory)
  869. {
  870. if (key == NULL) {
  871. if (mandatory) {
  872. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key "
  873. "attribute missing");
  874. return -1;
  875. }
  876. return 0;
  877. }
  878. if (((encr_type == NULL || WPA_GET_BE16(encr_type) != WPS_ENCR_WEP) &&
  879. key_len > 8 && key_len < 64 && key[key_len - 1] == 0) ||
  880. key_len > 64) {
  881. wpa_hexdump_ascii_key(MSG_INFO, "WPS-STRICT: Invalid Network "
  882. "Key attribute value", key, key_len);
  883. return -1;
  884. }
  885. return 0;
  886. }
  887. static int wps_validate_network_key_shareable(const u8 *val, int mandatory)
  888. {
  889. if (val == NULL) {
  890. if (mandatory) {
  891. wpa_printf(MSG_INFO, "WPS-STRICT: Network Key "
  892. "Shareable attribute missing");
  893. return -1;
  894. }
  895. return 0;
  896. }
  897. if (*val > 1) {
  898. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Network Key "
  899. "Shareable attribute value 0x%x", *val);
  900. return -1;
  901. }
  902. return 0;
  903. }
  904. static int wps_validate_cred(const u8 *cred, size_t len)
  905. {
  906. struct wps_parse_attr attr;
  907. struct wpabuf buf;
  908. if (cred == NULL)
  909. return -1;
  910. wpabuf_set(&buf, cred, len);
  911. if (wps_parse_msg(&buf, &attr) < 0) {
  912. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse Credential");
  913. return -1;
  914. }
  915. if (wps_validate_network_idx(attr.network_idx, 1) ||
  916. wps_validate_ssid(attr.ssid, attr.ssid_len, 1) ||
  917. wps_validate_auth_type(attr.auth_type, 1) ||
  918. wps_validate_encr_type(attr.encr_type, 1) ||
  919. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  920. wps_validate_network_key(attr.network_key, attr.network_key_len,
  921. attr.encr_type, 1) ||
  922. wps_validate_mac_addr(attr.mac_addr, 1) ||
  923. wps_validate_network_key_shareable(attr.network_key_shareable, 0))
  924. {
  925. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Credential");
  926. return -1;
  927. }
  928. return 0;
  929. }
  930. static int wps_validate_credential(const u8 *cred[], size_t len[], size_t num,
  931. int mandatory)
  932. {
  933. size_t i;
  934. if (num == 0) {
  935. if (mandatory) {
  936. wpa_printf(MSG_INFO, "WPS-STRICT: Credential "
  937. "attribute missing");
  938. return -1;
  939. }
  940. return 0;
  941. }
  942. for (i = 0; i < num; i++) {
  943. if (wps_validate_cred(cred[i], len[i]) < 0)
  944. return -1;
  945. }
  946. return 0;
  947. }
  948. int wps_validate_beacon(const struct wpabuf *wps_ie)
  949. {
  950. struct wps_parse_attr attr;
  951. int wps2, sel_reg;
  952. if (wps_ie == NULL) {
  953. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in Beacon frame");
  954. return -1;
  955. }
  956. if (wps_parse_msg(wps_ie, &attr) < 0) {
  957. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  958. "Beacon frame");
  959. return -1;
  960. }
  961. wps2 = attr.version2 != NULL;
  962. sel_reg = attr.selected_registrar != NULL &&
  963. *attr.selected_registrar != 0;
  964. if (wps_validate_version(attr.version, 1) ||
  965. wps_validate_wps_state(attr.wps_state, 1) ||
  966. wps_validate_ap_setup_locked(attr.ap_setup_locked, 0) ||
  967. wps_validate_selected_registrar(attr.selected_registrar, 0) ||
  968. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  969. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  970. wps2, sel_reg) ||
  971. wps_validate_uuid_e(attr.uuid_e, 0) ||
  972. wps_validate_rf_bands(attr.rf_bands, 0) ||
  973. wps_validate_version2(attr.version2, wps2) ||
  974. wps_validate_authorized_macs(attr.authorized_macs,
  975. attr.authorized_macs_len, 0)) {
  976. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Beacon frame");
  977. return -1;
  978. }
  979. return 0;
  980. }
  981. int wps_validate_beacon_probe_resp(const struct wpabuf *wps_ie, int probe,
  982. const u8 *addr)
  983. {
  984. struct wps_parse_attr attr;
  985. int wps2, sel_reg;
  986. if (wps_ie == NULL) {
  987. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  988. "%sProbe Response frame", probe ? "" : "Beacon/");
  989. return -1;
  990. }
  991. if (wps_parse_msg(wps_ie, &attr) < 0) {
  992. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  993. "%sProbe Response frame", probe ? "" : "Beacon/");
  994. return -1;
  995. }
  996. wps2 = attr.version2 != NULL;
  997. sel_reg = attr.selected_registrar != NULL &&
  998. *attr.selected_registrar != 0;
  999. if (wps_validate_version(attr.version, 1) ||
  1000. wps_validate_wps_state(attr.wps_state, 1) ||
  1001. wps_validate_ap_setup_locked(attr.ap_setup_locked, 0) ||
  1002. wps_validate_selected_registrar(attr.selected_registrar, 0) ||
  1003. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  1004. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  1005. wps2, sel_reg) ||
  1006. wps_validate_response_type(attr.response_type, probe) ||
  1007. wps_validate_uuid_e(attr.uuid_e, probe) ||
  1008. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1009. probe) ||
  1010. wps_validate_model_name(attr.model_name, attr.model_name_len,
  1011. probe) ||
  1012. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1013. probe) ||
  1014. wps_validate_serial_number(attr.serial_number,
  1015. attr.serial_number_len, probe) ||
  1016. wps_validate_primary_dev_type(attr.primary_dev_type, probe) ||
  1017. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, probe) ||
  1018. wps_validate_ap_config_methods(attr.config_methods, wps2, probe) ||
  1019. wps_validate_rf_bands(attr.rf_bands, 0) ||
  1020. wps_validate_version2(attr.version2, wps2) ||
  1021. wps_validate_authorized_macs(attr.authorized_macs,
  1022. attr.authorized_macs_len, 0)) {
  1023. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid %sProbe Response "
  1024. "frame from " MACSTR, probe ? "" : "Beacon/",
  1025. MAC2STR(addr));
  1026. #ifdef WPS_STRICT_WPS2
  1027. if (wps2)
  1028. return -1;
  1029. #else /* WPS_STRICT_WPS2 */
  1030. return -1;
  1031. #endif /* WPS_STRICT_WPS2 */
  1032. }
  1033. return 0;
  1034. }
  1035. int wps_validate_probe_req(const struct wpabuf *wps_ie, const u8 *addr)
  1036. {
  1037. struct wps_parse_attr attr;
  1038. int wps2;
  1039. if (wps_ie == NULL) {
  1040. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1041. "Probe Request frame");
  1042. return -1;
  1043. }
  1044. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1045. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1046. "Probe Request frame");
  1047. return -1;
  1048. }
  1049. wps2 = attr.version2 != NULL;
  1050. if (wps_validate_version(attr.version, 1) ||
  1051. wps_validate_request_type(attr.request_type, 1) ||
  1052. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1053. wps_validate_uuid_e(attr.uuid_e, attr.uuid_r == NULL) ||
  1054. wps_validate_uuid_r(attr.uuid_r, attr.uuid_e == NULL) ||
  1055. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1056. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1057. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1058. wps_validate_config_error(attr.config_error, 1) ||
  1059. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1060. wps_validate_version2(attr.version2, wps2) ||
  1061. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1062. wps2) ||
  1063. wps_validate_model_name(attr.model_name, attr.model_name_len,
  1064. wps2) ||
  1065. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1066. wps2) ||
  1067. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, wps2) ||
  1068. wps_validate_request_to_enroll(attr.request_to_enroll, 0) ||
  1069. wps_validate_req_dev_type(attr.req_dev_type, attr.num_req_dev_type,
  1070. 0)) {
  1071. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid Probe Request "
  1072. "frame from " MACSTR, MAC2STR(addr));
  1073. return -1;
  1074. }
  1075. return 0;
  1076. }
  1077. int wps_validate_assoc_req(const struct wpabuf *wps_ie)
  1078. {
  1079. struct wps_parse_attr attr;
  1080. int wps2;
  1081. if (wps_ie == NULL) {
  1082. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1083. "(Re)Association Request frame");
  1084. return -1;
  1085. }
  1086. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1087. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1088. "(Re)Association Request frame");
  1089. return -1;
  1090. }
  1091. wps2 = attr.version2 != NULL;
  1092. if (wps_validate_version(attr.version, 1) ||
  1093. wps_validate_request_type(attr.request_type, 1) ||
  1094. wps_validate_version2(attr.version2, wps2)) {
  1095. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid (Re)Association "
  1096. "Request frame");
  1097. return -1;
  1098. }
  1099. return 0;
  1100. }
  1101. int wps_validate_assoc_resp(const struct wpabuf *wps_ie)
  1102. {
  1103. struct wps_parse_attr attr;
  1104. int wps2;
  1105. if (wps_ie == NULL) {
  1106. wpa_printf(MSG_INFO, "WPS-STRICT: No WPS IE in "
  1107. "(Re)Association Response frame");
  1108. return -1;
  1109. }
  1110. if (wps_parse_msg(wps_ie, &attr) < 0) {
  1111. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse WPS IE in "
  1112. "(Re)Association Response frame");
  1113. return -1;
  1114. }
  1115. wps2 = attr.version2 != NULL;
  1116. if (wps_validate_version(attr.version, 1) ||
  1117. wps_validate_request_type(attr.request_type, 1) ||
  1118. wps_validate_version2(attr.version2, wps2)) {
  1119. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid (Re)Association "
  1120. "Response frame");
  1121. return -1;
  1122. }
  1123. return 0;
  1124. }
  1125. int wps_validate_m1(const struct wpabuf *tlvs)
  1126. {
  1127. struct wps_parse_attr attr;
  1128. int wps2;
  1129. if (tlvs == NULL) {
  1130. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M1");
  1131. return -1;
  1132. }
  1133. if (wps_parse_msg(tlvs, &attr) < 0) {
  1134. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1135. "in M1");
  1136. return -1;
  1137. }
  1138. wps2 = attr.version2 != NULL;
  1139. if (wps_validate_version(attr.version, 1) ||
  1140. wps_validate_msg_type(attr.msg_type, 1) ||
  1141. wps_validate_uuid_e(attr.uuid_e, 1) ||
  1142. wps_validate_mac_addr(attr.mac_addr, 1) ||
  1143. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1144. wps_validate_public_key(attr.public_key, attr.public_key_len, 1) ||
  1145. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1146. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1147. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1148. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1149. wps_validate_wps_state(attr.wps_state, 1) ||
  1150. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1151. 1) ||
  1152. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1153. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1154. 1) ||
  1155. wps_validate_serial_number(attr.serial_number,
  1156. attr.serial_number_len, 1) ||
  1157. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1158. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1159. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1160. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1161. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1162. wps_validate_config_error(attr.config_error, 1) ||
  1163. wps_validate_os_version(attr.os_version, 1) ||
  1164. wps_validate_version2(attr.version2, wps2) ||
  1165. wps_validate_request_to_enroll(attr.request_to_enroll, 0)) {
  1166. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M1");
  1167. #ifdef WPS_STRICT_WPS2
  1168. if (wps2)
  1169. return -1;
  1170. #else /* WPS_STRICT_WPS2 */
  1171. return -1;
  1172. #endif /* WPS_STRICT_WPS2 */
  1173. }
  1174. return 0;
  1175. }
  1176. int wps_validate_m2(const struct wpabuf *tlvs)
  1177. {
  1178. struct wps_parse_attr attr;
  1179. int wps2;
  1180. if (tlvs == NULL) {
  1181. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M2");
  1182. return -1;
  1183. }
  1184. if (wps_parse_msg(tlvs, &attr) < 0) {
  1185. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1186. "in M2");
  1187. return -1;
  1188. }
  1189. wps2 = attr.version2 != NULL;
  1190. if (wps_validate_version(attr.version, 1) ||
  1191. wps_validate_msg_type(attr.msg_type, 1) ||
  1192. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1193. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1194. wps_validate_uuid_r(attr.uuid_r, 1) ||
  1195. wps_validate_public_key(attr.public_key, attr.public_key_len, 1) ||
  1196. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1197. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1198. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1199. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1200. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1201. 1) ||
  1202. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1203. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1204. 1) ||
  1205. wps_validate_serial_number(attr.serial_number,
  1206. attr.serial_number_len, 1) ||
  1207. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1208. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1209. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1210. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1211. wps_validate_config_error(attr.config_error, 1) ||
  1212. wps_validate_dev_password_id(attr.dev_password_id, 1) ||
  1213. wps_validate_os_version(attr.os_version, 1) ||
  1214. wps_validate_version2(attr.version2, wps2) ||
  1215. wps_validate_authenticator(attr.authenticator, 1)) {
  1216. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M2");
  1217. #ifdef WPS_STRICT_WPS2
  1218. if (wps2)
  1219. return -1;
  1220. #else /* WPS_STRICT_WPS2 */
  1221. return -1;
  1222. #endif /* WPS_STRICT_WPS2 */
  1223. }
  1224. return 0;
  1225. }
  1226. int wps_validate_m2d(const struct wpabuf *tlvs)
  1227. {
  1228. struct wps_parse_attr attr;
  1229. int wps2;
  1230. if (tlvs == NULL) {
  1231. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M2D");
  1232. return -1;
  1233. }
  1234. if (wps_parse_msg(tlvs, &attr) < 0) {
  1235. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1236. "in M2D");
  1237. return -1;
  1238. }
  1239. wps2 = attr.version2 != NULL;
  1240. if (wps_validate_version(attr.version, 1) ||
  1241. wps_validate_msg_type(attr.msg_type, 1) ||
  1242. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1243. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1244. wps_validate_uuid_r(attr.uuid_r, 1) ||
  1245. wps_validate_auth_type_flags(attr.auth_type_flags, 1) ||
  1246. wps_validate_encr_type_flags(attr.encr_type_flags, 1) ||
  1247. wps_validate_conn_type_flags(attr.conn_type_flags, 1) ||
  1248. wps_validate_config_methods(attr.config_methods, wps2, 1) ||
  1249. wps_validate_manufacturer(attr.manufacturer, attr.manufacturer_len,
  1250. 1) ||
  1251. wps_validate_model_name(attr.model_name, attr.model_name_len, 1) ||
  1252. wps_validate_model_number(attr.model_number, attr.model_number_len,
  1253. 1) ||
  1254. wps_validate_serial_number(attr.serial_number,
  1255. attr.serial_number_len, 1) ||
  1256. wps_validate_primary_dev_type(attr.primary_dev_type, 1) ||
  1257. wps_validate_dev_name(attr.dev_name, attr.dev_name_len, 1) ||
  1258. wps_validate_rf_bands(attr.rf_bands, 1) ||
  1259. wps_validate_assoc_state(attr.assoc_state, 1) ||
  1260. wps_validate_config_error(attr.config_error, 1) ||
  1261. wps_validate_os_version(attr.os_version, 1) ||
  1262. wps_validate_version2(attr.version2, wps2)) {
  1263. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M2D");
  1264. #ifdef WPS_STRICT_WPS2
  1265. if (wps2)
  1266. return -1;
  1267. #else /* WPS_STRICT_WPS2 */
  1268. return -1;
  1269. #endif /* WPS_STRICT_WPS2 */
  1270. }
  1271. return 0;
  1272. }
  1273. int wps_validate_m3(const struct wpabuf *tlvs)
  1274. {
  1275. struct wps_parse_attr attr;
  1276. int wps2;
  1277. if (tlvs == NULL) {
  1278. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M3");
  1279. return -1;
  1280. }
  1281. if (wps_parse_msg(tlvs, &attr) < 0) {
  1282. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1283. "in M3");
  1284. return -1;
  1285. }
  1286. wps2 = attr.version2 != NULL;
  1287. if (wps_validate_version(attr.version, 1) ||
  1288. wps_validate_msg_type(attr.msg_type, 1) ||
  1289. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1290. wps_validate_e_hash1(attr.e_hash1, 1) ||
  1291. wps_validate_e_hash2(attr.e_hash2, 1) ||
  1292. wps_validate_version2(attr.version2, wps2) ||
  1293. wps_validate_authenticator(attr.authenticator, 1)) {
  1294. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M3");
  1295. #ifdef WPS_STRICT_WPS2
  1296. if (wps2)
  1297. return -1;
  1298. #else /* WPS_STRICT_WPS2 */
  1299. return -1;
  1300. #endif /* WPS_STRICT_WPS2 */
  1301. }
  1302. return 0;
  1303. }
  1304. int wps_validate_m4(const struct wpabuf *tlvs)
  1305. {
  1306. struct wps_parse_attr attr;
  1307. int wps2;
  1308. if (tlvs == NULL) {
  1309. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M4");
  1310. return -1;
  1311. }
  1312. if (wps_parse_msg(tlvs, &attr) < 0) {
  1313. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1314. "in M4");
  1315. return -1;
  1316. }
  1317. wps2 = attr.version2 != NULL;
  1318. if (wps_validate_version(attr.version, 1) ||
  1319. wps_validate_msg_type(attr.msg_type, 1) ||
  1320. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1321. wps_validate_r_hash1(attr.r_hash1, 1) ||
  1322. wps_validate_r_hash2(attr.r_hash2, 1) ||
  1323. wps_validate_encr_settings(attr.encr_settings,
  1324. attr.encr_settings_len, 1) ||
  1325. wps_validate_version2(attr.version2, wps2) ||
  1326. wps_validate_authenticator(attr.authenticator, 1)) {
  1327. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M4");
  1328. #ifdef WPS_STRICT_WPS2
  1329. if (wps2)
  1330. return -1;
  1331. #else /* WPS_STRICT_WPS2 */
  1332. return -1;
  1333. #endif /* WPS_STRICT_WPS2 */
  1334. }
  1335. return 0;
  1336. }
  1337. int wps_validate_m4_encr(const struct wpabuf *tlvs)
  1338. {
  1339. struct wps_parse_attr attr;
  1340. int wps2;
  1341. if (tlvs == NULL) {
  1342. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M4 encrypted "
  1343. "settings");
  1344. return -1;
  1345. }
  1346. if (wps_parse_msg(tlvs, &attr) < 0) {
  1347. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1348. "in M4 encrypted settings");
  1349. return -1;
  1350. }
  1351. wps2 = attr.version2 != NULL;
  1352. if (wps_validate_r_snonce1(attr.r_snonce1, 1) ||
  1353. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1354. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M4 encrypted "
  1355. "settings");
  1356. #ifdef WPS_STRICT_WPS2
  1357. if (wps2)
  1358. return -1;
  1359. #else /* WPS_STRICT_WPS2 */
  1360. return -1;
  1361. #endif /* WPS_STRICT_WPS2 */
  1362. }
  1363. return 0;
  1364. }
  1365. int wps_validate_m5(const struct wpabuf *tlvs)
  1366. {
  1367. struct wps_parse_attr attr;
  1368. int wps2;
  1369. if (tlvs == NULL) {
  1370. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M5");
  1371. return -1;
  1372. }
  1373. if (wps_parse_msg(tlvs, &attr) < 0) {
  1374. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1375. "in M5");
  1376. return -1;
  1377. }
  1378. wps2 = attr.version2 != NULL;
  1379. if (wps_validate_version(attr.version, 1) ||
  1380. wps_validate_msg_type(attr.msg_type, 1) ||
  1381. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1382. wps_validate_encr_settings(attr.encr_settings,
  1383. attr.encr_settings_len, 1) ||
  1384. wps_validate_version2(attr.version2, wps2) ||
  1385. wps_validate_authenticator(attr.authenticator, 1)) {
  1386. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M5");
  1387. #ifdef WPS_STRICT_WPS2
  1388. if (wps2)
  1389. return -1;
  1390. #else /* WPS_STRICT_WPS2 */
  1391. return -1;
  1392. #endif /* WPS_STRICT_WPS2 */
  1393. }
  1394. return 0;
  1395. }
  1396. int wps_validate_m5_encr(const struct wpabuf *tlvs)
  1397. {
  1398. struct wps_parse_attr attr;
  1399. int wps2;
  1400. if (tlvs == NULL) {
  1401. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M5 encrypted "
  1402. "settings");
  1403. return -1;
  1404. }
  1405. if (wps_parse_msg(tlvs, &attr) < 0) {
  1406. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1407. "in M5 encrypted settings");
  1408. return -1;
  1409. }
  1410. wps2 = attr.version2 != NULL;
  1411. if (wps_validate_e_snonce1(attr.e_snonce1, 1) ||
  1412. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1413. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M5 encrypted "
  1414. "settings");
  1415. #ifdef WPS_STRICT_WPS2
  1416. if (wps2)
  1417. return -1;
  1418. #else /* WPS_STRICT_WPS2 */
  1419. return -1;
  1420. #endif /* WPS_STRICT_WPS2 */
  1421. }
  1422. return 0;
  1423. }
  1424. int wps_validate_m6(const struct wpabuf *tlvs)
  1425. {
  1426. struct wps_parse_attr attr;
  1427. int wps2;
  1428. if (tlvs == NULL) {
  1429. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M6");
  1430. return -1;
  1431. }
  1432. if (wps_parse_msg(tlvs, &attr) < 0) {
  1433. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1434. "in M6");
  1435. return -1;
  1436. }
  1437. wps2 = attr.version2 != NULL;
  1438. if (wps_validate_version(attr.version, 1) ||
  1439. wps_validate_msg_type(attr.msg_type, 1) ||
  1440. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1441. wps_validate_encr_settings(attr.encr_settings,
  1442. attr.encr_settings_len, 1) ||
  1443. wps_validate_version2(attr.version2, wps2) ||
  1444. wps_validate_authenticator(attr.authenticator, 1)) {
  1445. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M6");
  1446. #ifdef WPS_STRICT_WPS2
  1447. if (wps2)
  1448. return -1;
  1449. #else /* WPS_STRICT_WPS2 */
  1450. return -1;
  1451. #endif /* WPS_STRICT_WPS2 */
  1452. }
  1453. return 0;
  1454. }
  1455. int wps_validate_m6_encr(const struct wpabuf *tlvs)
  1456. {
  1457. struct wps_parse_attr attr;
  1458. int wps2;
  1459. if (tlvs == NULL) {
  1460. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M6 encrypted "
  1461. "settings");
  1462. return -1;
  1463. }
  1464. if (wps_parse_msg(tlvs, &attr) < 0) {
  1465. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1466. "in M6 encrypted settings");
  1467. return -1;
  1468. }
  1469. wps2 = attr.version2 != NULL;
  1470. if (wps_validate_r_snonce2(attr.r_snonce2, 1) ||
  1471. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1472. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M6 encrypted "
  1473. "settings");
  1474. #ifdef WPS_STRICT_WPS2
  1475. if (wps2)
  1476. return -1;
  1477. #else /* WPS_STRICT_WPS2 */
  1478. return -1;
  1479. #endif /* WPS_STRICT_WPS2 */
  1480. }
  1481. return 0;
  1482. }
  1483. int wps_validate_m7(const struct wpabuf *tlvs)
  1484. {
  1485. struct wps_parse_attr attr;
  1486. int wps2;
  1487. if (tlvs == NULL) {
  1488. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M7");
  1489. return -1;
  1490. }
  1491. if (wps_parse_msg(tlvs, &attr) < 0) {
  1492. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1493. "in M7");
  1494. return -1;
  1495. }
  1496. wps2 = attr.version2 != NULL;
  1497. if (wps_validate_version(attr.version, 1) ||
  1498. wps_validate_msg_type(attr.msg_type, 1) ||
  1499. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1500. wps_validate_encr_settings(attr.encr_settings,
  1501. attr.encr_settings_len, 1) ||
  1502. wps_validate_settings_delay_time(attr.settings_delay_time, 0) ||
  1503. wps_validate_version2(attr.version2, wps2) ||
  1504. wps_validate_authenticator(attr.authenticator, 1)) {
  1505. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M7");
  1506. #ifdef WPS_STRICT_WPS2
  1507. if (wps2)
  1508. return -1;
  1509. #else /* WPS_STRICT_WPS2 */
  1510. return -1;
  1511. #endif /* WPS_STRICT_WPS2 */
  1512. }
  1513. return 0;
  1514. }
  1515. int wps_validate_m7_encr(const struct wpabuf *tlvs, int ap)
  1516. {
  1517. struct wps_parse_attr attr;
  1518. int wps2;
  1519. if (tlvs == NULL) {
  1520. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M7 encrypted "
  1521. "settings");
  1522. return -1;
  1523. }
  1524. if (wps_parse_msg(tlvs, &attr) < 0) {
  1525. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1526. "in M7 encrypted settings");
  1527. return -1;
  1528. }
  1529. wps2 = attr.version2 != NULL;
  1530. if (wps_validate_e_snonce2(attr.e_snonce2, 1) ||
  1531. wps_validate_ssid(attr.ssid, attr.ssid_len, !ap) ||
  1532. wps_validate_mac_addr(attr.mac_addr, !ap) ||
  1533. wps_validate_auth_type(attr.auth_type, !ap) ||
  1534. wps_validate_encr_type(attr.encr_type, !ap) ||
  1535. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  1536. wps_validate_network_key(attr.network_key, attr.network_key_len,
  1537. attr.encr_type, !ap) ||
  1538. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1539. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M7 encrypted "
  1540. "settings");
  1541. #ifdef WPS_STRICT_WPS2
  1542. if (wps2)
  1543. return -1;
  1544. #else /* WPS_STRICT_WPS2 */
  1545. return -1;
  1546. #endif /* WPS_STRICT_WPS2 */
  1547. }
  1548. return 0;
  1549. }
  1550. int wps_validate_m8(const struct wpabuf *tlvs)
  1551. {
  1552. struct wps_parse_attr attr;
  1553. int wps2;
  1554. if (tlvs == NULL) {
  1555. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M8");
  1556. return -1;
  1557. }
  1558. if (wps_parse_msg(tlvs, &attr) < 0) {
  1559. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1560. "in M8");
  1561. return -1;
  1562. }
  1563. wps2 = attr.version2 != NULL;
  1564. if (wps_validate_version(attr.version, 1) ||
  1565. wps_validate_msg_type(attr.msg_type, 1) ||
  1566. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1567. wps_validate_encr_settings(attr.encr_settings,
  1568. attr.encr_settings_len, 1) ||
  1569. wps_validate_version2(attr.version2, wps2) ||
  1570. wps_validate_authenticator(attr.authenticator, 1)) {
  1571. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M8");
  1572. #ifdef WPS_STRICT_WPS2
  1573. if (wps2)
  1574. return -1;
  1575. #else /* WPS_STRICT_WPS2 */
  1576. return -1;
  1577. #endif /* WPS_STRICT_WPS2 */
  1578. }
  1579. return 0;
  1580. }
  1581. int wps_validate_m8_encr(const struct wpabuf *tlvs, int ap)
  1582. {
  1583. struct wps_parse_attr attr;
  1584. int wps2;
  1585. if (tlvs == NULL) {
  1586. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in M8 encrypted "
  1587. "settings");
  1588. return -1;
  1589. }
  1590. if (wps_parse_msg(tlvs, &attr) < 0) {
  1591. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1592. "in M8 encrypted settings");
  1593. return -1;
  1594. }
  1595. wps2 = attr.version2 != NULL;
  1596. if (wps_validate_ssid(attr.ssid, attr.ssid_len, ap) ||
  1597. wps_validate_auth_type(attr.auth_type, ap) ||
  1598. wps_validate_encr_type(attr.encr_type, ap) ||
  1599. wps_validate_network_key_index(attr.network_key_idx, 0) ||
  1600. wps_validate_mac_addr(attr.mac_addr, ap) ||
  1601. wps_validate_credential(attr.cred, attr.cred_len, attr.num_cred,
  1602. !ap) ||
  1603. wps_validate_key_wrap_auth(attr.key_wrap_auth, 1)) {
  1604. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid M8 encrypted "
  1605. "settings");
  1606. #ifdef WPS_STRICT_WPS2
  1607. if (wps2)
  1608. return -1;
  1609. #else /* WPS_STRICT_WPS2 */
  1610. return -1;
  1611. #endif /* WPS_STRICT_WPS2 */
  1612. }
  1613. return 0;
  1614. }
  1615. int wps_validate_wsc_ack(const struct wpabuf *tlvs)
  1616. {
  1617. struct wps_parse_attr attr;
  1618. int wps2;
  1619. if (tlvs == NULL) {
  1620. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_ACK");
  1621. return -1;
  1622. }
  1623. if (wps_parse_msg(tlvs, &attr) < 0) {
  1624. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1625. "in WSC_ACK");
  1626. return -1;
  1627. }
  1628. wps2 = attr.version2 != NULL;
  1629. if (wps_validate_version(attr.version, 1) ||
  1630. wps_validate_msg_type(attr.msg_type, 1) ||
  1631. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1632. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1633. wps_validate_version2(attr.version2, wps2)) {
  1634. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_ACK");
  1635. #ifdef WPS_STRICT_WPS2
  1636. if (wps2)
  1637. return -1;
  1638. #else /* WPS_STRICT_WPS2 */
  1639. return -1;
  1640. #endif /* WPS_STRICT_WPS2 */
  1641. }
  1642. return 0;
  1643. }
  1644. int wps_validate_wsc_nack(const struct wpabuf *tlvs)
  1645. {
  1646. struct wps_parse_attr attr;
  1647. int wps2;
  1648. if (tlvs == NULL) {
  1649. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_NACK");
  1650. return -1;
  1651. }
  1652. if (wps_parse_msg(tlvs, &attr) < 0) {
  1653. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1654. "in WSC_NACK");
  1655. return -1;
  1656. }
  1657. wps2 = attr.version2 != NULL;
  1658. if (wps_validate_version(attr.version, 1) ||
  1659. wps_validate_msg_type(attr.msg_type, 1) ||
  1660. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1661. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1662. wps_validate_config_error(attr.config_error, 1) ||
  1663. wps_validate_version2(attr.version2, wps2)) {
  1664. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_NACK");
  1665. #ifdef WPS_STRICT_WPS2
  1666. if (wps2)
  1667. return -1;
  1668. #else /* WPS_STRICT_WPS2 */
  1669. return -1;
  1670. #endif /* WPS_STRICT_WPS2 */
  1671. }
  1672. return 0;
  1673. }
  1674. int wps_validate_wsc_done(const struct wpabuf *tlvs)
  1675. {
  1676. struct wps_parse_attr attr;
  1677. int wps2;
  1678. if (tlvs == NULL) {
  1679. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in WSC_Done");
  1680. return -1;
  1681. }
  1682. if (wps_parse_msg(tlvs, &attr) < 0) {
  1683. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1684. "in WSC_Done");
  1685. return -1;
  1686. }
  1687. wps2 = attr.version2 != NULL;
  1688. if (wps_validate_version(attr.version, 1) ||
  1689. wps_validate_msg_type(attr.msg_type, 1) ||
  1690. wps_validate_enrollee_nonce(attr.enrollee_nonce, 1) ||
  1691. wps_validate_registrar_nonce(attr.registrar_nonce, 1) ||
  1692. wps_validate_version2(attr.version2, wps2)) {
  1693. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid WSC_Done");
  1694. #ifdef WPS_STRICT_WPS2
  1695. if (wps2)
  1696. return -1;
  1697. #else /* WPS_STRICT_WPS2 */
  1698. return -1;
  1699. #endif /* WPS_STRICT_WPS2 */
  1700. }
  1701. return 0;
  1702. }
  1703. int wps_validate_upnp_set_selected_registrar(const struct wpabuf *tlvs)
  1704. {
  1705. struct wps_parse_attr attr;
  1706. int wps2;
  1707. int sel_reg;
  1708. if (tlvs == NULL) {
  1709. wpa_printf(MSG_INFO, "WPS-STRICT: No TLVs in "
  1710. "SetSelectedRegistrar");
  1711. return -1;
  1712. }
  1713. if (wps_parse_msg(tlvs, &attr) < 0) {
  1714. wpa_printf(MSG_INFO, "WPS-STRICT: Failed to parse attributes "
  1715. "in SetSelectedRegistrar");
  1716. return -1;
  1717. }
  1718. wps2 = attr.version2 != NULL;
  1719. sel_reg = attr.selected_registrar != NULL &&
  1720. *attr.selected_registrar != 0;
  1721. if (wps_validate_version(attr.version, 1) ||
  1722. wps_validate_dev_password_id(attr.dev_password_id, sel_reg) ||
  1723. wps_validate_sel_reg_config_methods(attr.sel_reg_config_methods,
  1724. wps2, sel_reg) ||
  1725. wps_validate_version2(attr.version2, wps2) ||
  1726. wps_validate_authorized_macs(attr.authorized_macs,
  1727. attr.authorized_macs_len, wps2) ||
  1728. wps_validate_uuid_r(attr.uuid_r, wps2)) {
  1729. wpa_printf(MSG_INFO, "WPS-STRICT: Invalid "
  1730. "SetSelectedRegistrar");
  1731. #ifdef WPS_STRICT_WPS2
  1732. if (wps2)
  1733. return -1;
  1734. #else /* WPS_STRICT_WPS2 */
  1735. return -1;
  1736. #endif /* WPS_STRICT_WPS2 */
  1737. }
  1738. return 0;
  1739. }