Make deauthentication and disassociation consistent
[wpasupplicant] / wpa_supplicant / wpa_supplicant.c
index 9836b8a..f730bcf 100644 (file)
 #include "eap_peer/eap.h"
 #include "wpa.h"
 #include "eloop.h"
-#include "drivers/driver.h"
 #include "config.h"
 #include "l2_packet/l2_packet.h"
 #include "wpa_supplicant_i.h"
+#include "driver_i.h"
 #include "ctrl_iface.h"
 #include "ctrl_iface_dbus.h"
 #include "pcsc_funcs.h"
@@ -40,6 +40,8 @@
 #include "wpas_glue.h"
 #include "wps_supplicant.h"
 #include "ibss_rsn.h"
+#include "sme.h"
+#include "ap.h"
 
 const char *wpa_supplicant_version =
 "wpa_supplicant v" VERSION_STR "\n"
@@ -112,6 +114,7 @@ const char *wpa_supplicant_full_license5 =
 extern int wpa_debug_level;
 extern int wpa_debug_show_keys;
 extern int wpa_debug_timestamp;
+extern struct wpa_driver_ops *wpa_drivers[];
 
 /* Configure default/group WEP keys for static WEP */
 static int wpa_set_wep_keys(struct wpa_supplicant *wpa_s,
@@ -212,7 +215,7 @@ void wpa_supplicant_req_auth_timeout(struct wpa_supplicant *wpa_s,
                                     int sec, int usec)
 {
        if (wpa_s->conf && wpa_s->conf->ap_scan == 0 &&
-           wpa_s->driver && IS_WIRED(wpa_s->driver))
+           (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED))
                return;
 
        wpa_msg(wpa_s, MSG_DEBUG, "Setting authentication timeout: %d sec "
@@ -287,9 +290,8 @@ void wpa_supplicant_initiate_eapol(struct wpa_supplicant *wpa_s)
                                EAPOL_REQUIRE_KEY_BROADCAST;
                }
 
-               if (wpa_s->conf && wpa_s->driver && IS_WIRED(wpa_s->driver)) {
+               if (wpa_s->conf && (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED))
                        eapol_conf.required_keys = 0;
-               }
        }
        if (wpa_s->conf)
                eapol_conf.fast_reauth = wpa_s->conf->fast_reauth;
@@ -406,6 +408,16 @@ static void wpa_supplicant_cleanup(struct wpa_supplicant *wpa_s)
        ibss_rsn_deinit(wpa_s->ibss_rsn);
        wpa_s->ibss_rsn = NULL;
 #endif /* CONFIG_IBSS_RSN */
+
+#ifdef CONFIG_SME
+       os_free(wpa_s->sme.ft_ies);
+       wpa_s->sme.ft_ies = NULL;
+       wpa_s->sme.ft_ies_len = 0;
+#endif /* CONFIG_SME */
+
+#ifdef CONFIG_AP
+       wpa_supplicant_ap_deinit(wpa_s);
+#endif /* CONFIG_AP */
 }
 
 
@@ -466,6 +478,8 @@ const char * wpa_supplicant_state_txt(int state)
                return "INACTIVE";
        case WPA_SCANNING:
                return "SCANNING";
+       case WPA_AUTHENTICATING:
+               return "AUTHENTICATING";
        case WPA_ASSOCIATING:
                return "ASSOCIATING";
        case WPA_ASSOCIATED:
@@ -932,6 +946,26 @@ void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
        struct wpa_driver_capa capa;
        int assoc_failed = 0;
 
+       if (ssid->mode == 2) {
+#ifdef CONFIG_AP
+               if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_AP)) {
+                       wpa_printf(MSG_INFO, "Driver does not support AP "
+                                  "mode");
+                       return;
+               }
+               wpa_supplicant_create_ap(wpa_s, ssid);
+#else /* CONFIG_AP */
+               wpa_printf(MSG_ERROR, "AP mode support not included in the "
+                          "build");
+#endif /* CONFIG_AP */
+               return;
+       }
+
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_SME) {
+               sme_authenticate(wpa_s, bss, ssid);
+               return;
+       }
+
        wpa_s->reassociate = 0;
        if (bss) {
 #ifdef CONFIG_IEEE80211R
@@ -1121,7 +1155,7 @@ void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
        }
        params.wep_tx_keyidx = ssid->wep_tx_keyidx;
 
-       if (wpa_s->driver_4way_handshake &&
+       if ((wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE) &&
            (params.key_mgmt_suite == KEY_MGMT_PSK ||
             params.key_mgmt_suite == KEY_MGMT_FT_PSK)) {
                params.passphrase = ssid->passphrase;
@@ -1129,6 +1163,8 @@ void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
                        params.psk = ssid->psk;
        }
 
+       params.drop_unencrypted = use_crypt;
+
 #ifdef CONFIG_IEEE80211W
        switch (ssid->ieee80211w) {
        case NO_IEEE80211W:
@@ -1155,7 +1191,7 @@ void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
        }
 #endif /* CONFIG_IEEE80211W */
 
-       if (wpa_s->use_client_mlme)
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
                ret = ieee80211_sta_associate(wpa_s, &params);
        else
                ret = wpa_drv_associate(wpa_s, &params);
@@ -1179,6 +1215,7 @@ void wpa_supplicant_associate(struct wpa_supplicant *wpa_s,
        } else if (ssid->mode == IEEE80211_MODE_IBSS &&
                   wpa_s->key_mgmt != WPA_KEY_MGMT_NONE &&
                   wpa_s->key_mgmt != WPA_KEY_MGMT_WPA_NONE) {
+               ibss_rsn_set_psk(wpa_s->ibss_rsn, ssid->psk);
                /*
                 * RSN IBSS authentication is per-STA and we can disable the
                 * per-BSSID authentication.
@@ -1232,7 +1269,7 @@ void wpa_supplicant_disassociate(struct wpa_supplicant *wpa_s,
 {
        u8 *addr = NULL;
        if (!is_zero_ether_addr(wpa_s->bssid)) {
-               if (wpa_s->use_client_mlme)
+               if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
                        ieee80211_sta_disassociate(wpa_s, reason_code);
                else
                        wpa_drv_disassociate(wpa_s, wpa_s->bssid, reason_code);
@@ -1251,16 +1288,15 @@ void wpa_supplicant_disassociate(struct wpa_supplicant *wpa_s,
  * @wpa_s: Pointer to wpa_supplicant data
  * @reason_code: IEEE 802.11 reason code for the deauthenticate frame
  *
- * This function is used to request %wpa_supplicant to disassociate with the
+ * This function is used to request %wpa_supplicant to deauthenticate from the
  * current AP.
  */
 void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s,
                                   int reason_code)
 {
        u8 *addr = NULL;
-       wpa_supplicant_set_state(wpa_s, WPA_DISCONNECTED);
        if (!is_zero_ether_addr(wpa_s->bssid)) {
-               if (wpa_s->use_client_mlme)
+               if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
                        ieee80211_sta_deauthenticate(wpa_s, reason_code);
                else
                        wpa_drv_deauthenticate(wpa_s, wpa_s->bssid,
@@ -1268,11 +1304,10 @@ void wpa_supplicant_deauthenticate(struct wpa_supplicant *wpa_s,
                addr = wpa_s->bssid;
        }
        wpa_clear_keys(wpa_s, addr);
+       wpa_supplicant_mark_disassoc(wpa_s);
        wpa_s->current_ssid = NULL;
        wpa_sm_set_config(wpa_s->wpa, NULL);
        eapol_sm_notify_config(wpa_s->eapol, NULL, NULL);
-       eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
-       eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
 }
 
 
@@ -1396,7 +1431,7 @@ int wpa_supplicant_get_scan_results(struct wpa_supplicant *wpa_s)
 {
        int ret;
 
-       if (wpa_s->use_client_mlme) {
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME) {
                wpa_scan_results_free(wpa_s->scan_res);
                wpa_s->scan_res = ieee80211_sta_get_scan_results(wpa_s);
                if (wpa_s->scan_res == NULL) {
@@ -1437,7 +1472,7 @@ struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s)
        u8 bssid[ETH_ALEN];
        int wired;
 
-       if (wpa_s->use_client_mlme) {
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME) {
                if (ieee80211_sta_get_ssid(wpa_s, ssid, &ssid_len)) {
                        wpa_printf(MSG_WARNING, "Could not read SSID from "
                                   "MLME.");
@@ -1453,15 +1488,15 @@ struct wpa_ssid * wpa_supplicant_get_ssid(struct wpa_supplicant *wpa_s)
                ssid_len = res;
        }
 
-       if (wpa_s->use_client_mlme)
+       if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME)
                os_memcpy(bssid, wpa_s->bssid, ETH_ALEN);
        else if (wpa_drv_get_bssid(wpa_s, bssid) < 0) {
                wpa_printf(MSG_WARNING, "Could not read BSSID from driver.");
                return NULL;
        }
 
-       wired = wpa_s->conf->ap_scan == 0 && wpa_s->driver &&
-               IS_WIRED(wpa_s->driver);
+       wired = wpa_s->conf->ap_scan == 0 &&
+               (wpa_s->drv_flags & WPA_DRIVER_FLAGS_WIRED);
 
        entry = wpa_s->conf->ssid;
        while (entry) {
@@ -1490,11 +1525,13 @@ static int wpa_supplicant_set_driver(struct wpa_supplicant *wpa_s,
                                     const char *name)
 {
        int i;
+       size_t len;
+       const char *pos;
 
        if (wpa_s == NULL)
                return -1;
 
-       if (wpa_supplicant_drivers[0] == NULL) {
+       if (wpa_drivers[0] == NULL) {
                wpa_printf(MSG_ERROR, "No driver interfaces build into "
                           "wpa_supplicant.");
                return -1;
@@ -1502,18 +1539,25 @@ static int wpa_supplicant_set_driver(struct wpa_supplicant *wpa_s,
 
        if (name == NULL) {
                /* default to first driver in the list */
-               wpa_s->driver = wpa_supplicant_drivers[0];
+               wpa_s->driver = wpa_drivers[0];
                return 0;
        }
 
-       for (i = 0; wpa_supplicant_drivers[i]; i++) {
-               if (os_strcmp(name, wpa_supplicant_drivers[i]->name) == 0) {
-                       wpa_s->driver = wpa_supplicant_drivers[i];
+       pos = os_strchr(name, ',');
+       if (pos)
+               len = pos - name;
+       else
+               len = os_strlen(name);
+       for (i = 0; wpa_drivers[i]; i++) {
+               if (os_strlen(wpa_drivers[i]->name) == len &&
+                   os_strncmp(name, wpa_drivers[i]->name, len) ==
+                   0) {
+                       wpa_s->driver = wpa_drivers[i];
                        return 0;
                }
        }
 
-       wpa_printf(MSG_ERROR, "Unsupported driver '%s'.\n", name);
+       wpa_printf(MSG_ERROR, "Unsupported driver '%s'.", name);
        return -1;
 }
 
@@ -1533,7 +1577,7 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
        }
 
        if (wpa_s->eapol_received == 0 &&
-           (!wpa_s->driver_4way_handshake ||
+           (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE) ||
             !wpa_key_mgmt_wpa_psk(wpa_s->key_mgmt) ||
             wpa_s->wpa_state != WPA_COMPLETED)) {
                /* Timeout for completing IEEE 802.1X and WPA authentication */
@@ -1552,6 +1596,14 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
                return;
        }
 
+#ifdef CONFIG_IBSS_RSN
+       if (wpa_s->current_ssid &&
+           wpa_s->current_ssid->mode == IEEE80211_MODE_IBSS) {
+               ibss_rsn_rx_eapol(wpa_s->ibss_rsn, src_addr, buf, len);
+               return;
+       }
+#endif /* CONFIG_IBSS_RSN */
+
        /* Source address of the incoming EAPOL frame could be compared to the
         * current BSSID. However, it is possible that a centralized
         * Authenticator could be using another MAC address than the BSSID of
@@ -1563,7 +1615,7 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
            eapol_sm_rx_eapol(wpa_s->eapol, src_addr, buf, len) > 0)
                return;
        wpa_drv_poll(wpa_s);
-       if (!wpa_s->driver_4way_handshake)
+       if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE))
                wpa_sm_rx_eapol(wpa_s->wpa, src_addr, buf, len);
        else if (wpa_key_mgmt_wpa_ieee8021x(wpa_s->key_mgmt)) {
                /*
@@ -1577,13 +1629,6 @@ void wpa_supplicant_rx_eapol(void *ctx, const u8 *src_addr,
 }
 
 
-void wpa_supplicant_sta_free_hw_features(struct wpa_hw_modes *hw_features,
-                                        size_t num_hw_features)
-{
-       ieee80211_sta_free_hw_features(hw_features, num_hw_features);
-}
-
-
 void wpa_supplicant_sta_rx(void *ctx, const u8 *buf, size_t len,
                           struct ieee80211_rx_status *rx_status)
 {
@@ -1670,7 +1715,7 @@ int wpa_supplicant_driver_init(struct wpa_supplicant *wpa_s)
        wpa_printf(MSG_DEBUG, "RSN: flushing PMKID list in the driver");
        wpa_drv_flush_pmkid(wpa_s);
 
-       wpa_s->prev_scan_ssid = BROADCAST_SSID_SCAN;
+       wpa_s->prev_scan_ssid = WILDCARD_SSID_SCAN;
        wpa_supplicant_req_scan(wpa_s, interface_count, 100000);
        interface_count++;
 
@@ -1701,6 +1746,9 @@ static struct wpa_supplicant * wpa_supplicant_alloc(void)
 static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
                                     struct wpa_interface *iface)
 {
+       const char *ifname, *driver;
+       struct wpa_driver_capa capa;
+
        wpa_printf(MSG_DEBUG, "Initializing interface '%s' conf '%s' driver "
                   "'%s' ctrl_interface '%s' bridge '%s'", iface->ifname,
                   iface->confname ? iface->confname : "N/A",
@@ -1708,10 +1756,6 @@ static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
                   iface->ctrl_interface ? iface->ctrl_interface : "N/A",
                   iface->bridge_ifname ? iface->bridge_ifname : "N/A");
 
-       if (wpa_supplicant_set_driver(wpa_s, iface->driver) < 0) {
-               return -1;
-       }
-
        if (iface->confname) {
 #ifdef CONFIG_BACKEND_FILE
                wpa_s->confname = os_rel2abs_path(iface->confname);
@@ -1779,18 +1823,6 @@ static int wpa_supplicant_init_iface(struct wpa_supplicant *wpa_s,
                           sizeof(wpa_s->bridge_ifname));
        }
 
-       return 0;
-}
-
-
-static int wpa_supplicant_init_iface2(struct wpa_supplicant *wpa_s)
-{
-       const char *ifname;
-       struct wpa_driver_capa capa;
-
-       wpa_printf(MSG_DEBUG, "Initializing interface (2) '%s'",
-                  wpa_s->ifname);
-
        /* RSNA Supplicant Key Management - INITIALIZE */
        eapol_sm_notify_portEnabled(wpa_s->eapol, FALSE);
        eapol_sm_notify_portValid(wpa_s->eapol, FALSE);
@@ -1799,8 +1831,21 @@ static int wpa_supplicant_init_iface2(struct wpa_supplicant *wpa_s)
         * L2 receive handler so that association events are processed before
         * EAPOL-Key packets if both become available for the same select()
         * call. */
+       driver = iface->driver;
+next_driver:
+       if (wpa_supplicant_set_driver(wpa_s, driver) < 0)
+               return -1;
+
        wpa_s->drv_priv = wpa_drv_init(wpa_s, wpa_s->ifname);
        if (wpa_s->drv_priv == NULL) {
+               const char *pos;
+               pos = os_strchr(driver, ',');
+               if (pos) {
+                       wpa_printf(MSG_DEBUG, "Failed to initialize driver "
+                                  "interface - try next driver wrapper");
+                       driver = pos + 1;
+                       goto next_driver;
+               }
                wpa_printf(MSG_ERROR, "Failed to initialize driver interface");
                return -1;
        }
@@ -1882,13 +1927,12 @@ static int wpa_supplicant_init_iface2(struct wpa_supplicant *wpa_s)
        }
 
        if (wpa_drv_get_capa(wpa_s, &capa) == 0) {
+               wpa_s->drv_flags = capa.flags;
                if (capa.flags & WPA_DRIVER_FLAGS_USER_SPACE_MLME) {
-                       wpa_s->use_client_mlme = 1;
                        if (ieee80211_sta_init(wpa_s))
                                return -1;
                }
-               if (capa.flags & WPA_DRIVER_FLAGS_4WAY_HANDSHAKE)
-                       wpa_s->driver_4way_handshake = 1;
+               wpa_s->max_scan_ssids = capa.max_scan_ssids;
        }
 
 #ifdef CONFIG_IBSS_RSN
@@ -1955,8 +1999,7 @@ struct wpa_supplicant * wpa_supplicant_add_iface(struct wpa_global *global,
        if (wpa_s == NULL)
                return NULL;
 
-       if (wpa_supplicant_init_iface(wpa_s, iface) ||
-           wpa_supplicant_init_iface2(wpa_s)) {
+       if (wpa_supplicant_init_iface(wpa_s, iface)) {
                wpa_printf(MSG_DEBUG, "Failed to add interface %s",
                           iface->ifname);
                wpa_supplicant_deinit_iface(wpa_s);
@@ -2056,6 +2099,8 @@ struct wpa_global * wpa_supplicant_init(struct wpa_params *params)
                return NULL;
 
        wpa_debug_open_file(params->wpa_debug_file_path);
+       if (params->wpa_debug_syslog)
+               wpa_debug_open_syslog();
 
        ret = eap_peer_register_methods();
        if (ret) {
@@ -2105,7 +2150,7 @@ struct wpa_global * wpa_supplicant_init(struct wpa_params *params)
                }
        }
 
-       for (i = 0; wpa_supplicant_drivers[i]; i++)
+       for (i = 0; wpa_drivers[i]; i++)
                global->drv_count++;
        if (global->drv_count == 0) {
                wpa_printf(MSG_ERROR, "No drivers enabled");
@@ -2117,13 +2162,13 @@ struct wpa_global * wpa_supplicant_init(struct wpa_params *params)
                wpa_supplicant_deinit(global);
                return NULL;
        }
-       for (i = 0; wpa_supplicant_drivers[i]; i++) {
-               if (!wpa_supplicant_drivers[i]->global_init)
+       for (i = 0; wpa_drivers[i]; i++) {
+               if (!wpa_drivers[i]->global_init)
                        continue;
-               global->drv_priv[i] = wpa_supplicant_drivers[i]->global_init();
+               global->drv_priv[i] = wpa_drivers[i]->global_init();
                if (global->drv_priv[i] == NULL) {
                        wpa_printf(MSG_ERROR, "Failed to initialize driver "
-                                  "'%s'", wpa_supplicant_drivers[i]->name);
+                                  "'%s'", wpa_drivers[i]->name);
                        wpa_supplicant_deinit(global);
                        return NULL;
                }
@@ -2190,10 +2235,10 @@ void wpa_supplicant_deinit(struct wpa_global *global)
 
        eap_peer_unregister_methods();
 
-       for (i = 0; wpa_supplicant_drivers[i]; i++) {
+       for (i = 0; wpa_drivers[i] && global->drv_priv; i++) {
                if (!global->drv_priv[i])
                        continue;
-               wpa_supplicant_drivers[i]->global_deinit(global->drv_priv[i]);
+               wpa_drivers[i]->global_deinit(global->drv_priv[i]);
        }
        os_free(global->drv_priv);
 
@@ -2206,5 +2251,6 @@ void wpa_supplicant_deinit(struct wpa_global *global)
        os_free(global->params.ctrl_interface);
 
        os_free(global);
+       wpa_debug_close_syslog();
        wpa_debug_close_file();
 }