static void fst_session_handle_tear_down(struct fst_session *s, struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { const struct fst_tear_down *td; size_t plen = frame_len - IEEE80211_HDRLEN - 1; union fst_session_state_switch_extra evext = { .to_initial = { .reason = REASON_TEARDOWN, .initiator = FST_INITIATOR_REMOTE, }, }; if (plen < sizeof(*td)) { fst_printf_session(s, MSG_WARNING, "Too short FST Tear Down dropped"); return; } td = (const struct fst_tear_down *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (le_to_host32(td->fsts_id) != s->data.fsts_id) { fst_printf_siface(s, iface, MSG_WARNING, "tear down for wrong FST Setup ID (%u)", le_to_host32(td->fsts_id)); return; } fst_session_stt_disarm(s); fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); }
static void fst_session_handle_ack_response(struct fst_session *s, struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { const struct fst_ack_res *res; size_t plen = frame_len - IEEE80211_HDRLEN - 1; union fst_session_state_switch_extra evext = { .to_initial = { .reason = REASON_SWITCH, .initiator = FST_INITIATOR_LOCAL, }, }; if (!fst_session_is_switch_requested(s)) { fst_printf_siface(s, iface, MSG_ERROR, "Ack Response in inappropriate session state (%s)", fst_session_state_name(s->state)); return; } WPA_ASSERT(s->data.new_iface != NULL); if (iface != s->data.new_iface) { fst_printf_siface(s, iface, MSG_ERROR, "Ack response received on wrong interface"); return; } if (plen < sizeof(*res)) { fst_printf_session(s, MSG_WARNING, "Too short FST Ack Response dropped"); return; } res = (const struct fst_ack_res *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (le_to_host32(res->fsts_id) != s->data.fsts_id) { fst_printf_siface(s, iface, MSG_ERROR, "Ack response for wrong FST Setup ID (%u)", le_to_host32(res->fsts_id)); return; } fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED, NULL); fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); fst_session_stt_disarm(s); }
static int hostapd_ctrl_iface_sta_mib(struct hostapd_data *hapd, struct sta_info *sta, char *buf, size_t buflen) { int len, res, ret, i; const char *keyid; if (!sta) return 0; len = 0; ret = os_snprintf(buf + len, buflen - len, MACSTR "\nflags=", MAC2STR(sta->addr)); if (os_snprintf_error(buflen - len, ret)) return len; len += ret; ret = ap_sta_flags_txt(sta->flags, buf + len, buflen - len); if (ret < 0) return len; len += ret; ret = os_snprintf(buf + len, buflen - len, "\naid=%d\ncapability=0x%x\n" "listen_interval=%d\nsupported_rates=", sta->aid, sta->capability, sta->listen_interval); if (os_snprintf_error(buflen - len, ret)) return len; len += ret; for (i = 0; i < sta->supported_rates_len; i++) { ret = os_snprintf(buf + len, buflen - len, "%02x%s", sta->supported_rates[i], i + 1 < sta->supported_rates_len ? " " : ""); if (os_snprintf_error(buflen - len, ret)) return len; len += ret; } ret = os_snprintf(buf + len, buflen - len, "\ntimeout_next=%s\n", timeout_next_str(sta->timeout_next)); if (os_snprintf_error(buflen - len, ret)) return len; len += ret; res = ieee802_11_get_mib_sta(hapd, sta, buf + len, buflen - len); if (res >= 0) len += res; res = wpa_get_mib_sta(sta->wpa_sm, buf + len, buflen - len); if (res >= 0) len += res; res = ieee802_1x_get_mib_sta(hapd, sta, buf + len, buflen - len); if (res >= 0) len += res; res = hostapd_wps_get_mib_sta(hapd, sta->addr, buf + len, buflen - len); if (res >= 0) len += res; res = hostapd_p2p_get_mib_sta(hapd, sta, buf + len, buflen - len); if (res >= 0) len += res; len += hostapd_get_sta_tx_rx(hapd, sta, buf + len, buflen - len); len += hostapd_get_sta_conn_time(sta, buf + len, buflen - len); #ifdef CONFIG_SAE if (sta->sae && sta->sae->state == SAE_ACCEPTED) { res = os_snprintf(buf + len, buflen - len, "sae_group=%d\n", sta->sae->group); if (!os_snprintf_error(buflen - len, res)) len += res; } #endif /* CONFIG_SAE */ if (sta->vlan_id > 0) { res = os_snprintf(buf + len, buflen - len, "vlan_id=%d\n", sta->vlan_id); if (!os_snprintf_error(buflen - len, res)) len += res; } res = mbo_ap_get_info(sta, buf + len, buflen - len); if (res >= 0) len += res; if (sta->supp_op_classes && buflen - len > (unsigned) (17 + 2 * sta->supp_op_classes[0])) { len += os_snprintf(buf + len, buflen - len, "supp_op_classes="); len += wpa_snprintf_hex(buf + len, buflen - len, sta->supp_op_classes + 1, sta->supp_op_classes[0]); len += os_snprintf(buf + len, buflen - len, "\n"); } if (sta->power_capab) { ret = os_snprintf(buf + len, buflen - len, "min_txpower=%d\n" "max_txpower=%d\n", sta->min_tx_power, sta->max_tx_power); if (!os_snprintf_error(buflen - len, ret)) len += ret; } #ifdef CONFIG_IEEE80211AC if ((sta->flags & WLAN_STA_VHT) && sta->vht_capabilities) { res = os_snprintf(buf + len, buflen - len, "vht_caps_info=0x%08x\n", le_to_host32(sta->vht_capabilities-> vht_capabilities_info)); if (!os_snprintf_error(buflen - len, res)) len += res; } #endif /* CONFIG_IEEE80211AC */ #ifdef CONFIG_IEEE80211N if ((sta->flags & WLAN_STA_HT) && sta->ht_capabilities) { res = os_snprintf(buf + len, buflen - len, "ht_caps_info=0x%04x\n", le_to_host16(sta->ht_capabilities-> ht_capabilities_info)); if (!os_snprintf_error(buflen - len, res)) len += res; } #endif /* CONFIG_IEEE80211N */ if (sta->ext_capability && buflen - len > (unsigned) (11 + 2 * sta->ext_capability[0])) { len += os_snprintf(buf + len, buflen - len, "ext_capab="); len += wpa_snprintf_hex(buf + len, buflen - len, sta->ext_capability + 1, sta->ext_capability[0]); len += os_snprintf(buf + len, buflen - len, "\n"); } if (sta->flags & WLAN_STA_WDS && sta->ifname_wds) { ret = os_snprintf(buf + len, buflen - len, "wds_sta_ifname=%s\n", sta->ifname_wds); if (!os_snprintf_error(buflen - len, ret)) len += ret; } keyid = ap_sta_wpa_get_keyid(hapd, sta); if (keyid) { ret = os_snprintf(buf + len, buflen - len, "keyid=%s\n", keyid); if (!os_snprintf_error(buflen - len, ret)) len += ret; } return len; }
static void fst_session_handle_ack_request(struct fst_session *s, struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { const struct fst_ack_req *req; size_t plen = frame_len - IEEE80211_HDRLEN - 1; struct fst_ack_res res; union fst_session_state_switch_extra evext = { .to_initial = { .reason = REASON_SWITCH, .initiator = FST_INITIATOR_REMOTE, }, }; if (!fst_session_is_ready(s) && !fst_session_is_switch_requested(s)) { fst_printf_siface(s, iface, MSG_ERROR, "cannot initiate switch due to wrong session state (%s)", fst_session_state_name(s->state)); return; } WPA_ASSERT(s->data.new_iface != NULL); if (iface != s->data.new_iface) { fst_printf_siface(s, iface, MSG_ERROR, "Ack received on wrong interface"); return; } if (plen < sizeof(*req)) { fst_printf_session(s, MSG_WARNING, "Too short FST Ack Request dropped"); return; } req = (const struct fst_ack_req *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (le_to_host32(req->fsts_id) != s->data.fsts_id) { fst_printf_siface(s, iface, MSG_WARNING, "Ack for wrong FST Setup ID (%u)", le_to_host32(req->fsts_id)); return; } os_memset(&res, 0, sizeof(res)); res.action = FST_ACTION_ACK_RESPONSE; res.dialog_token = req->dialog_token; res.fsts_id = req->fsts_id; if (!fst_session_send_action(s, FALSE, &res, sizeof(res), NULL)) { fst_printf_sframe(s, FALSE, MSG_INFO, "FST Ack Response sent"); fst_session_stt_disarm(s); fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_DONE, NULL); fst_session_set_state(s, FST_SESSION_STATE_TRANSITION_CONFIRMED, NULL); fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); } }
static void fst_session_handle_setup_response(struct fst_session *s, struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { const struct fst_setup_res *res; size_t plen = frame_len - IEEE80211_HDRLEN - 1; enum hostapd_hw_mode hw_mode; u8 channel; union fst_session_state_switch_extra evext = { .to_initial = {0}, }; if (iface != s->data.old_iface) { fst_printf_session(s, MSG_WARNING, "FST Response dropped: %s is not the old iface", fst_iface_get_name(iface)); return; } if (!fst_session_is_ready_pending(s)) { fst_printf_session(s, MSG_WARNING, "FST Response dropped due to wrong state: %s", fst_session_state_name(s->state)); return; } if (plen < sizeof(*res)) { fst_printf_session(s, MSG_WARNING, "Too short FST Response dropped"); return; } res = (const struct fst_setup_res *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (res->stie.element_id != WLAN_EID_SESSION_TRANSITION || res->stie.length < 11) { fst_printf_iface(iface, MSG_WARNING, "FST Response dropped: invalid STIE"); return; } if (res->dialog_token != s->data.pending_setup_req_dlgt) { fst_printf_session(s, MSG_WARNING, "FST Response dropped due to wrong dialog token (%u != %u)", s->data.pending_setup_req_dlgt, res->dialog_token); return; } if (res->status_code == WLAN_STATUS_SUCCESS && le_to_host32(res->stie.fsts_id) != s->data.fsts_id) { fst_printf_session(s, MSG_WARNING, "FST Response dropped due to wrong FST Session ID (%u)", le_to_host32(res->stie.fsts_id)); return; } fst_session_stt_disarm(s); if (res->status_code != WLAN_STATUS_SUCCESS) { /* * 10.32.2.2 Transitioning between states * The initiator shall set the STT to the value of the * FSTSessionTimeOut field at ... and at each ACK frame sent in * response to a received FST Setup Response with the Status * Code field equal to PENDING_ADMITTING_FST_SESSION or * PENDING_GAP_IN_BA_WINDOW. */ evext.to_initial.reason = REASON_REJECT; evext.to_initial.reject_code = res->status_code; evext.to_initial.initiator = FST_INITIATOR_REMOTE; fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); fst_printf_session(s, MSG_WARNING, "FST Setup rejected by remote side with status %u", res->status_code); return; } fst_iface_get_channel_info(s->data.new_iface, &hw_mode, &channel); if (fst_hw_mode_to_band(hw_mode) != res->stie.new_band_id) { evext.to_initial.reason = REASON_ERROR_PARAMS; fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); fst_printf_session(s, MSG_WARNING, "invalid FST Setup parameters"); fst_session_tear_down_setup(s); return; } fst_printf_session(s, MSG_INFO, "%s: FST Setup established for %s (llt=%u)", fst_iface_get_name(s->data.old_iface), fst_iface_get_name(s->data.new_iface), s->data.llt_ms); fst_session_notify_ctrl(s, EVENT_FST_ESTABLISHED, NULL); if (s->data.llt_ms == FST_LLT_SWITCH_IMMEDIATELY) fst_session_initiate_switch(s); }
static void fst_session_handle_setup_request(struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { struct fst_session *s; const struct fst_setup_req *req; struct fst_iface *new_iface = NULL; struct fst_group *g; u8 new_iface_peer_addr[ETH_ALEN]; const struct wpabuf *peer_mbies; size_t plen; if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req)) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: too short (%zu < %zu)", frame_len, IEEE80211_HDRLEN + 1 + sizeof(*req)); return; } plen = frame_len - IEEE80211_HDRLEN - 1; req = (const struct fst_setup_req *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION || req->stie.length < 11) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: invalid STIE"); return; } if (req->stie.new_band_id == req->stie.old_band_id) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: new and old band IDs are the same"); return; } g = fst_iface_get_group(iface); if (plen > sizeof(*req)) { fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1), plen - sizeof(*req)); fst_printf_iface(iface, MSG_INFO, "FST Request: MB IEs updated for " MACSTR, MAC2STR(mgmt->sa)); } peer_mbies = fst_iface_get_peer_mb_ie(iface, mgmt->sa); if (peer_mbies) { new_iface = fst_group_get_new_iface_by_stie_and_mbie( g, wpabuf_head(peer_mbies), wpabuf_len(peer_mbies), &req->stie, new_iface_peer_addr); if (new_iface) fst_printf_iface(iface, MSG_INFO, "FST Request: new iface (%s:" MACSTR ") found by MB IEs", fst_iface_get_name(new_iface), MAC2STR(new_iface_peer_addr)); } if (!new_iface) { new_iface = fst_group_find_new_iface_by_stie( g, iface, mgmt->sa, &req->stie, new_iface_peer_addr); if (new_iface) fst_printf_iface(iface, MSG_INFO, "FST Request: new iface (%s:" MACSTR ") found by others", fst_iface_get_name(new_iface), MAC2STR(new_iface_peer_addr)); } if (!new_iface) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: new iface not found"); return; } s = fst_find_session_in_progress(mgmt->sa, g); if (s) { union fst_session_state_switch_extra evext = { .to_initial = { .reason = REASON_SETUP, }, }; /* * 10.32.2.2 Transitioning between states: * Upon receipt of an FST Setup Request frame, the responder * shall respond with an FST Setup Response frame unless it has * a pending FST Setup Request frame addressed to the initiator * and the responder has a numerically larger MAC address than * the initiator’s MAC address, in which case, the responder * shall delete the received FST Setup Request. */ if (os_memcmp(mgmt->da, mgmt->sa, ETH_ALEN) > 0) { fst_printf_session(s, MSG_WARNING, "FST Request dropped due to MAC comparison (our MAC is " MACSTR ")", MAC2STR(mgmt->da)); return; } if (!fst_session_is_ready_pending(s)) { fst_printf_session(s, MSG_WARNING, "FST Request from " MACSTR " dropped due to inappropriate state %s", MAC2STR(mgmt->da), fst_session_state_name(s->state)); return; } /* * If FST Setup Request arrived with the same FSTS ID as one we * initialized before, it means the other side either didn't * receive our FST Request or skipped it for some reason (for * example, due to numerical MAC comparison). * * In this case, there's no need to tear down the session. * Moreover, as FSTS ID is the same, the other side will * associate this tear down with the session it initiated that * will break the sync. */ if (le_to_host32(req->stie.fsts_id) != s->data.fsts_id) fst_session_send_tear_down(s); else fst_printf_session(s, MSG_WARNING, "Skipping TearDown as the FST request has the same FSTS ID as initiated"); fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); fst_session_stt_disarm(s); fst_printf_session(s, MSG_WARNING, "reset due to FST request"); } s = fst_session_create(g); if (!s) { fst_printf(MSG_WARNING, "FST Request dropped: cannot create session for %s and %s", fst_iface_get_name(iface), fst_iface_get_name(new_iface)); return; } fst_session_set_iface(s, iface, TRUE); fst_session_set_peer_addr(s, mgmt->sa, TRUE); fst_session_set_iface(s, new_iface, FALSE); fst_session_set_peer_addr(s, new_iface_peer_addr, FALSE); fst_session_set_llt(s, FST_LLT_VAL_TO_MS(le_to_host32(req->llt))); s->data.pending_setup_req_dlgt = req->dialog_token; s->data.fsts_id = le_to_host32(req->stie.fsts_id); fst_session_stt_arm(s); fst_session_notify_ctrl(s, EVENT_FST_SETUP, NULL); fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION, NULL); }
static void fst_session_handle_setup_request(struct fst_iface *iface, const struct ieee80211_mgmt *mgmt, size_t frame_len) { struct fst_session *s; const struct fst_setup_req *req; struct fst_iface *new_iface = NULL; struct fst_group *g; u8 new_iface_peer_addr[ETH_ALEN]; size_t plen; if (frame_len < IEEE80211_HDRLEN + 1 + sizeof(*req)) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: too short (%zu < %zu)", frame_len, IEEE80211_HDRLEN + 1 + sizeof(*req)); return; } plen = frame_len - IEEE80211_HDRLEN - 1; req = (const struct fst_setup_req *) (((const u8 *) mgmt) + IEEE80211_HDRLEN + 1); if (req->stie.element_id != WLAN_EID_SESSION_TRANSITION || req->stie.length < 11) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: invalid STIE"); return; } if (req->stie.new_band_id == req->stie.old_band_id) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: new and old band IDs are the same"); return; } g = fst_iface_get_group(iface); if (plen > sizeof(*req)) { fst_iface_update_mb_ie(iface, mgmt->sa, (const u8 *) (req + 1), plen - sizeof(*req)); fst_printf_iface(iface, MSG_INFO, "FST Request: MB IEs updated for " MACSTR, MAC2STR(mgmt->sa)); } new_iface = fst_group_get_peer_other_connection(iface, mgmt->sa, req->stie.new_band_id, new_iface_peer_addr); if (!new_iface) { fst_printf_iface(iface, MSG_WARNING, "FST Request dropped: new iface not found"); return; } fst_printf_iface(iface, MSG_INFO, "FST Request: new iface (%s:" MACSTR ") found", fst_iface_get_name(new_iface), MAC2STR(new_iface_peer_addr)); s = fst_find_session_in_progress(mgmt->sa, g); if (s) { union fst_session_state_switch_extra evext = { .to_initial = { .reason = REASON_SETUP, }, }; /* * 10.32.2.2 Transitioning between states: * Upon receipt of an FST Setup Request frame, the responder * shall respond with an FST Setup Response frame unless it has * a pending FST Setup Request frame addressed to the initiator * and the responder has a numerically larger MAC address than * the initiator’s MAC address, in which case, the responder * shall delete the received FST Setup Request. */ if (fst_session_is_ready_pending(s) && /* waiting for Setup Response */ os_memcmp(mgmt->da, mgmt->sa, ETH_ALEN) > 0) { fst_printf_session(s, MSG_WARNING, "FST Request dropped due to MAC comparison (our MAC is " MACSTR ")", MAC2STR(mgmt->da)); return; } /* * State is SETUP_COMPLETION (either in transition or not) or * TRANSITION_DONE (in transition). * Setup Request arriving in this state could mean: * 1. peer sent it before receiving our Setup Request (race * condition) * 2. peer didn't receive our Setup Response. Peer is retrying * after STT timeout * 3. peer's FST state machines are out of sync due to some * other reason * * We will reset our session and create a new one instead. */ fst_printf_session(s, MSG_WARNING, "resetting due to FST request"); /* * If FST Setup Request arrived with the same FSTS ID as one we * initialized before, there's no need to tear down the session. * Moreover, as FSTS ID is the same, the other side will * associate this tear down with the session it initiated that * will break the sync. */ if (le_to_host32(req->stie.fsts_id) != s->data.fsts_id) fst_session_send_tear_down(s); else fst_printf_session(s, MSG_WARNING, "Skipping TearDown as the FST request has the same FSTS ID as initiated"); fst_session_set_state(s, FST_SESSION_STATE_INITIAL, &evext); fst_session_stt_disarm(s); } s = fst_session_create(g); if (!s) { fst_printf(MSG_WARNING, "FST Request dropped: cannot create session for %s and %s", fst_iface_get_name(iface), fst_iface_get_name(new_iface)); return; } fst_session_set_iface(s, iface, TRUE); fst_session_set_peer_addr(s, mgmt->sa, TRUE); fst_session_set_iface(s, new_iface, FALSE); fst_session_set_peer_addr(s, new_iface_peer_addr, FALSE); fst_session_set_llt(s, FST_LLT_VAL_TO_MS(le_to_host32(req->llt))); s->data.pending_setup_req_dlgt = req->dialog_token; s->data.fsts_id = le_to_host32(req->stie.fsts_id); fst_session_stt_arm(s); fst_session_notify_ctrl(s, EVENT_FST_SETUP, NULL); fst_session_set_state(s, FST_SESSION_STATE_SETUP_COMPLETION, NULL); }