2013-05-01 14:52:55 +02:00
|
|
|
#include "wtp.h"
|
|
|
|
#include "wtp_dfa.h"
|
|
|
|
#include "capwap_array.h"
|
|
|
|
#include "capwap_dfa.h"
|
|
|
|
#include "capwap_dtls.h"
|
2014-01-21 19:54:59 +01:00
|
|
|
#include "wtp_radio.h"
|
2013-05-01 14:52:55 +02:00
|
|
|
|
|
|
|
#include <signal.h>
|
|
|
|
|
2013-12-21 23:50:15 +01:00
|
|
|
#define WTP_RECV_NOERROR_RADIO -1001
|
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
/* Handler signal */
|
|
|
|
static void wtp_signal_handler(int signum) {
|
|
|
|
if ((signum == SIGINT) || (signum == SIGTERM)) {
|
|
|
|
g_wtp.running = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
/* */
|
2014-09-10 21:58:23 +02:00
|
|
|
static struct capwap_packet_rxmng* wtp_get_packet_rxmng(void) {
|
|
|
|
if (!g_wtp.rxmngpacket) {
|
|
|
|
g_wtp.rxmngpacket = capwap_packet_rxmng_create_message();
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
|
|
|
|
2014-09-10 21:58:23 +02:00
|
|
|
return g_wtp.rxmngpacket;
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
2014-09-10 21:58:23 +02:00
|
|
|
void wtp_free_packet_rxmng(void) {
|
|
|
|
if (g_wtp.rxmngpacket) {
|
|
|
|
capwap_packet_rxmng_free(g_wtp.rxmngpacket);
|
|
|
|
g_wtp.rxmngpacket = NULL;
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
2014-09-10 21:58:23 +02:00
|
|
|
static void wtp_send_invalid_request(struct capwap_packet_rxmng* rxmngpacket, uint32_t errorcode) {
|
2013-05-27 21:33:23 +02:00
|
|
|
struct capwap_header_data capwapheader;
|
|
|
|
struct capwap_packet_txmng* txmngpacket;
|
|
|
|
struct capwap_list* responsefragmentpacket;
|
|
|
|
struct capwap_fragment_packet_item* packet;
|
|
|
|
struct capwap_header* header;
|
2013-08-11 18:38:23 +02:00
|
|
|
struct capwap_resultcode_element resultcode = { .code = errorcode };
|
2013-05-27 21:33:23 +02:00
|
|
|
|
|
|
|
ASSERT(rxmngpacket != NULL);
|
|
|
|
ASSERT(rxmngpacket->fragmentlist->first != NULL);
|
|
|
|
|
|
|
|
/* */
|
|
|
|
packet = (struct capwap_fragment_packet_item*)rxmngpacket->fragmentlist->first->item;
|
|
|
|
header = (struct capwap_header*)packet->buffer;
|
|
|
|
|
2013-08-11 18:38:23 +02:00
|
|
|
/* Odd message type */
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_header_init(&capwapheader, CAPWAP_RADIOID_NONE, GET_WBID_HEADER(header));
|
|
|
|
txmngpacket = capwap_packet_txmng_create_ctrl_message(&capwapheader, rxmngpacket->ctrlmsg.type + 1, rxmngpacket->ctrlmsg.seq, g_wtp.mtu);
|
|
|
|
|
|
|
|
/* Add message element */
|
|
|
|
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_RESULTCODE, &resultcode);
|
|
|
|
|
|
|
|
/* Unknown response complete, get fragment packets */
|
|
|
|
responsefragmentpacket = capwap_list_create();
|
|
|
|
capwap_packet_txmng_get_fragment_packets(txmngpacket, responsefragmentpacket, g_wtp.fragmentid);
|
2016-03-26 17:25:15 +01:00
|
|
|
if (responsefragmentpacket->count > 1)
|
2013-05-27 21:33:23 +02:00
|
|
|
g_wtp.fragmentid++;
|
|
|
|
|
|
|
|
/* Free packets manager */
|
|
|
|
capwap_packet_txmng_free(txmngpacket);
|
|
|
|
|
|
|
|
/* Send unknown response */
|
2014-09-10 21:58:23 +02:00
|
|
|
capwap_crypt_sendto_fragmentpacket(&g_wtp.dtls, responsefragmentpacket);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
|
|
|
/* Don't buffering a packets sent */
|
|
|
|
capwap_list_free(responsefragmentpacket);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* WTP Execute state */
|
2014-02-19 19:16:33 +01:00
|
|
|
static void wtp_dfa_execute(struct capwap_parsed_packet* packet) {
|
2014-03-02 19:31:27 +01:00
|
|
|
ASSERT(packet != NULL);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2014-03-02 19:31:27 +01:00
|
|
|
switch (g_wtp.state) {
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_DISCOVERY_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_discovery(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_SULKING_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_sulking(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case CAPWAP_DTLS_CONNECT_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_teardown_connection();
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_DTLS_TEARDOWN_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_dtlsteardown(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_JOIN_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_join(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_CONFIGURE_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_configure(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_DATA_CHECK_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_datacheck(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
case CAPWAP_RUN_STATE: {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_dfa_state_run(packet);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default: {
|
2014-12-26 15:37:30 +01:00
|
|
|
capwap_logging_debug("Unknown WTP action event: %lu", g_wtp.state);
|
|
|
|
wtp_teardown_connection();
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-21 23:50:15 +01:00
|
|
|
/* */
|
2014-09-10 21:58:23 +02:00
|
|
|
static int wtp_recvfrom(struct wtp_fds* fds, void* buffer, int* size, union sockaddr_capwap* recvfromaddr, union sockaddr_capwap* recvtoaddr) {
|
2013-12-21 23:50:15 +01:00
|
|
|
int index;
|
|
|
|
|
2014-02-08 18:03:38 +01:00
|
|
|
ASSERT(fds != NULL);
|
|
|
|
ASSERT(fds->fdspoll != NULL);
|
|
|
|
ASSERT(fds->fdstotalcount > 0);
|
2013-12-21 23:50:15 +01:00
|
|
|
ASSERT(buffer != NULL);
|
|
|
|
ASSERT(size != NULL);
|
|
|
|
ASSERT(*size > 0);
|
|
|
|
ASSERT(recvfromaddr != NULL);
|
|
|
|
ASSERT(recvtoaddr != NULL);
|
|
|
|
|
|
|
|
/* Wait packet */
|
2014-02-19 19:16:33 +01:00
|
|
|
index = capwap_wait_recvready(fds->fdspoll, fds->fdstotalcount, g_wtp.timeout);
|
2013-12-21 23:50:15 +01:00
|
|
|
if (index < 0) {
|
|
|
|
return index;
|
2014-06-07 22:37:19 +02:00
|
|
|
} else if ((fds->wifieventsstartpos >= 0) && (index >= fds->wifieventsstartpos)) {
|
|
|
|
int pos = index - fds->wifieventsstartpos;
|
2013-12-21 23:50:15 +01:00
|
|
|
|
2014-06-07 22:37:19 +02:00
|
|
|
if (pos < fds->wifieventscount) {
|
|
|
|
if (!fds->wifievents[pos].event_handler) {
|
2013-12-21 23:50:15 +01:00
|
|
|
return CAPWAP_RECV_ERROR_SOCKET;
|
|
|
|
}
|
|
|
|
|
2014-06-07 22:37:19 +02:00
|
|
|
fds->wifievents[pos].event_handler(fds->fdspoll[index].fd, fds->wifievents[pos].params, fds->wifievents[pos].paramscount);
|
|
|
|
}
|
|
|
|
|
|
|
|
return WTP_RECV_NOERROR_RADIO;
|
|
|
|
} else if ((fds->kmodeventsstartpos >= 0) && (index >= fds->kmodeventsstartpos)) {
|
|
|
|
int pos = index - fds->kmodeventsstartpos;
|
|
|
|
|
|
|
|
if (pos < fds->kmodeventscount) {
|
|
|
|
if (!fds->kmodevents[pos].event_handler) {
|
|
|
|
return CAPWAP_RECV_ERROR_SOCKET;
|
|
|
|
}
|
|
|
|
|
|
|
|
fds->kmodevents[pos].event_handler(fds->fdspoll[index].fd, fds->kmodevents[pos].params, fds->kmodevents[pos].paramscount);
|
2013-12-21 23:50:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return WTP_RECV_NOERROR_RADIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Receive packet */
|
2014-09-10 21:58:23 +02:00
|
|
|
if (capwap_recvfrom(fds->fdspoll[index].fd, buffer, size, recvfromaddr, recvtoaddr)) {
|
2013-12-21 23:50:15 +01:00
|
|
|
return CAPWAP_RECV_ERROR_SOCKET;
|
|
|
|
}
|
|
|
|
|
|
|
|
return index;
|
|
|
|
}
|
|
|
|
|
2014-02-08 18:03:38 +01:00
|
|
|
/* */
|
2014-06-07 22:37:19 +02:00
|
|
|
static int wtp_dfa_init_fdspool(struct wtp_fds* fds, struct capwap_network* net) {
|
2014-02-08 18:03:38 +01:00
|
|
|
ASSERT(fds != NULL);
|
|
|
|
ASSERT(net != NULL);
|
|
|
|
|
|
|
|
/* */
|
|
|
|
memset(fds, 0, sizeof(struct wtp_fds));
|
2014-06-07 22:37:19 +02:00
|
|
|
fds->fdsnetworkcount = capwap_network_set_pollfd(net, NULL, 0);
|
|
|
|
fds->fdspoll = (struct pollfd*)capwap_alloc(sizeof(struct pollfd) * fds->fdsnetworkcount);
|
2014-02-08 18:03:38 +01:00
|
|
|
|
|
|
|
/* Retrive all socket for polling */
|
2014-06-07 22:37:19 +02:00
|
|
|
fds->fdstotalcount = capwap_network_set_pollfd(net, fds->fdspoll, fds->fdsnetworkcount);
|
|
|
|
if (fds->fdsnetworkcount != fds->fdstotalcount) {
|
|
|
|
capwap_free(fds->fdspoll);
|
|
|
|
return -1;
|
|
|
|
}
|
2014-02-08 18:03:38 +01:00
|
|
|
|
|
|
|
/* Update Event File Descriptor */
|
2014-06-07 22:37:19 +02:00
|
|
|
wtp_dfa_update_fdspool(fds);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
int wtp_dfa_update_fdspool(struct wtp_fds* fds) {
|
|
|
|
int totalcount;
|
|
|
|
int kmodcount;
|
|
|
|
int wificount;
|
|
|
|
struct pollfd* fdsbuffer;
|
|
|
|
|
|
|
|
ASSERT(fds != NULL);
|
|
|
|
|
|
|
|
/* Retrieve number of Dynamic File Descriptor Event */
|
|
|
|
kmodcount = wtp_kmod_getfd(NULL, NULL, 0);
|
|
|
|
wificount = wifi_event_getfd(NULL, NULL, 0);
|
|
|
|
if ((kmodcount < 0) || (wificount < 0)) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Kernel Module Events Callback */
|
|
|
|
fds->kmodeventsstartpos = -1;
|
|
|
|
if (kmodcount != fds->kmodeventscount) {
|
|
|
|
if (fds->kmodevents) {
|
|
|
|
capwap_free(fds->kmodevents);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
fds->kmodeventscount = kmodcount;
|
2014-06-15 09:09:48 +02:00
|
|
|
fds->kmodevents = (struct wtp_kmod_event*)((kmodcount > 0) ? capwap_alloc(sizeof(struct wtp_kmod_event) * kmodcount) : NULL);
|
2014-06-07 22:37:19 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Wifi Events Callback */
|
|
|
|
fds->wifieventsstartpos = -1;
|
|
|
|
if (wificount != fds->wifieventscount) {
|
|
|
|
if (fds->wifievents) {
|
|
|
|
capwap_free(fds->wifievents);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
fds->wifieventscount = wificount;
|
|
|
|
fds->wifievents = (struct wifi_event*)((wificount > 0) ? capwap_alloc(sizeof(struct wifi_event) * wificount) : NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Resize poll */
|
|
|
|
totalcount = fds->fdsnetworkcount + fds->kmodeventscount + fds->wifieventscount;
|
|
|
|
if (fds->fdstotalcount != totalcount) {
|
|
|
|
fdsbuffer = (struct pollfd*)capwap_alloc(sizeof(struct pollfd) * totalcount);
|
|
|
|
if (fds->fdspoll) {
|
|
|
|
if (fds->fdsnetworkcount > 0) {
|
|
|
|
memcpy(fdsbuffer, fds->fdspoll, sizeof(struct pollfd) * fds->fdsnetworkcount);
|
|
|
|
}
|
|
|
|
|
|
|
|
capwap_free(fds->fdspoll);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
fds->fdspoll = fdsbuffer;
|
|
|
|
fds->fdstotalcount = totalcount;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Retrieve File Descriptor Kernel Module Event */
|
|
|
|
if (fds->kmodeventscount > 0) {
|
|
|
|
fds->kmodeventsstartpos = fds->fdsnetworkcount;
|
|
|
|
wtp_kmod_getfd(&fds->fdspoll[fds->kmodeventsstartpos], fds->kmodevents, fds->kmodeventscount);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Retrieve File Descriptor Wifi Event */
|
|
|
|
if (fds->wifieventscount > 0) {
|
|
|
|
fds->wifieventsstartpos = fds->fdsnetworkcount + fds->kmodeventscount;
|
|
|
|
wifi_event_getfd(&fds->fdspoll[fds->wifieventsstartpos], fds->wifievents, fds->wifieventscount);
|
|
|
|
}
|
|
|
|
|
|
|
|
return fds->fdstotalcount;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
void wtp_dfa_free_fdspool(struct wtp_fds* fds) {
|
|
|
|
ASSERT(fds != NULL);
|
|
|
|
|
|
|
|
if (fds->fdspoll) {
|
|
|
|
capwap_free(fds->fdspoll);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fds->kmodevents) {
|
|
|
|
capwap_free(fds->kmodevents);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (fds->wifievents) {
|
|
|
|
capwap_free(fds->wifievents);
|
|
|
|
}
|
2014-02-08 18:03:38 +01:00
|
|
|
}
|
|
|
|
|
2014-03-02 19:31:27 +01:00
|
|
|
/* */
|
|
|
|
static void wtp_dfa_closeapp(void) {
|
|
|
|
g_wtp.running = 0;
|
|
|
|
|
|
|
|
/* Teardown */
|
|
|
|
wtp_teardown_connection();
|
|
|
|
|
|
|
|
/* Wait RFC teardown timeout */
|
|
|
|
for (;;) {
|
|
|
|
if (capwap_timeout_wait(capwap_timeout_getcoming(g_wtp.timeout)) < 0) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (capwap_timeout_hasexpired(g_wtp.timeout) == g_wtp.idtimercontrol) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
ASSERT(g_wtp.state == CAPWAP_DEAD_STATE);
|
|
|
|
}
|
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
/* WTP state machine */
|
2013-05-27 21:33:23 +02:00
|
|
|
int wtp_dfa_running(void) {
|
|
|
|
int res;
|
2013-05-01 14:52:55 +02:00
|
|
|
int result = CAPWAP_SUCCESSFUL;
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
char bufferencrypt[CAPWAP_MAX_PACKET_SIZE];
|
|
|
|
char bufferplain[CAPWAP_MAX_PACKET_SIZE];
|
|
|
|
char* buffer;
|
2013-05-01 14:52:55 +02:00
|
|
|
int buffersize;
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
struct capwap_parsed_packet packet;
|
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
int index;
|
2014-09-10 21:58:23 +02:00
|
|
|
union sockaddr_capwap fromaddr;
|
|
|
|
union sockaddr_capwap toaddr;
|
2013-12-21 23:50:15 +01:00
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
/* Init */
|
2013-05-27 21:33:23 +02:00
|
|
|
memset(&packet, 0, sizeof(struct capwap_parsed_packet));
|
2013-12-21 23:50:15 +01:00
|
|
|
|
2014-02-08 18:03:38 +01:00
|
|
|
/* Configure poll struct */
|
2014-06-07 22:37:19 +02:00
|
|
|
if (wtp_dfa_init_fdspool(&g_wtp.fds, &g_wtp.net)) {
|
|
|
|
return CAPWAP_GENERIC_ERROR;
|
|
|
|
}
|
2014-01-21 19:54:59 +01:00
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
/* Handler signal */
|
|
|
|
g_wtp.running = 1;
|
2013-08-06 22:13:00 +02:00
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2013-05-01 14:52:55 +02:00
|
|
|
signal(SIGINT, wtp_signal_handler);
|
|
|
|
signal(SIGTERM, wtp_signal_handler);
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Init complete, start DFA */
|
|
|
|
wtp_dfa_change_state(CAPWAP_IDLE_STATE);
|
2014-03-02 19:31:27 +01:00
|
|
|
wtp_dfa_state_idle();
|
2013-11-07 22:06:29 +01:00
|
|
|
|
|
|
|
/* */
|
2014-03-02 19:31:27 +01:00
|
|
|
while (g_wtp.state != CAPWAP_DEAD_STATE) {
|
2013-05-01 14:52:55 +02:00
|
|
|
/* If request wait packet from AC */
|
2013-11-07 22:06:29 +01:00
|
|
|
buffer = bufferencrypt;
|
|
|
|
buffersize = CAPWAP_MAX_PACKET_SIZE;
|
2014-09-10 21:58:23 +02:00
|
|
|
index = wtp_recvfrom(&g_wtp.fds, buffer, &buffersize, &fromaddr, &toaddr);
|
2016-02-08 17:35:31 +01:00
|
|
|
capwap_logging_debug("WTP got data: idx: %d, size: %d", index, buffersize);
|
2013-11-07 22:06:29 +01:00
|
|
|
if (!g_wtp.running) {
|
|
|
|
capwap_logging_debug("Closing WTP, Teardown connection");
|
2014-03-02 19:31:27 +01:00
|
|
|
wtp_dfa_closeapp();
|
|
|
|
break;
|
|
|
|
} else if (index >= 0) {
|
2013-11-07 22:06:29 +01:00
|
|
|
if (g_wtp.teardown) {
|
2016-02-08 17:35:31 +01:00
|
|
|
capwap_logging_debug("WTP is in teardown, drop packet");
|
2014-09-10 21:58:23 +02:00
|
|
|
continue; /* Drop packet */
|
2013-11-07 22:06:29 +01:00
|
|
|
} else {
|
|
|
|
int check;
|
|
|
|
|
|
|
|
/* Check source */
|
2016-03-02 15:13:56 +01:00
|
|
|
if (g_wtp.state != CAPWAP_DISCOVERY_STATE &&
|
|
|
|
capwap_compare_ip(&g_wtp.dtls.peeraddr, &fromaddr)) {
|
|
|
|
capwap_logging_debug("CAPWAP packet from unknown WTP when not in DISCOVERY, drop packet");
|
2014-09-10 21:58:23 +02:00
|
|
|
continue; /* Unknown source */
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-06-09 21:49:43 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Check of packet */
|
2014-09-10 21:58:23 +02:00
|
|
|
check = capwap_sanity_check(g_wtp.state, buffer, buffersize, g_wtp.dtls.enable);
|
2013-11-07 22:06:29 +01:00
|
|
|
if (check == CAPWAP_DTLS_PACKET) {
|
2014-09-10 21:58:23 +02:00
|
|
|
int oldaction = g_wtp.dtls.action;
|
|
|
|
|
|
|
|
/* Decrypt packet */
|
|
|
|
buffersize = capwap_decrypt_packet(&g_wtp.dtls, buffer, buffersize, bufferplain, CAPWAP_MAX_PACKET_SIZE);
|
|
|
|
if (buffersize > 0) {
|
|
|
|
buffer = bufferplain;
|
|
|
|
check = CAPWAP_PLAIN_PACKET;
|
|
|
|
} else if (buffersize == CAPWAP_ERROR_AGAIN) {
|
|
|
|
/* Check is handshake complete */
|
|
|
|
if ((oldaction == CAPWAP_DTLS_ACTION_HANDSHAKE) && (g_wtp.dtls.action == CAPWAP_DTLS_ACTION_DATA)) {
|
|
|
|
if (g_wtp.state == CAPWAP_DTLS_CONNECT_STATE) {
|
|
|
|
wtp_send_join();
|
|
|
|
} else {
|
2014-02-19 19:16:33 +01:00
|
|
|
wtp_teardown_connection();
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2014-09-10 21:58:23 +02:00
|
|
|
|
|
|
|
continue; /* Next packet */
|
2013-11-07 22:06:29 +01:00
|
|
|
} else {
|
2014-09-10 21:58:23 +02:00
|
|
|
if ((oldaction == CAPWAP_DTLS_ACTION_DATA) && (g_wtp.dtls.action == CAPWAP_DTLS_ACTION_SHUTDOWN)) {
|
|
|
|
wtp_teardown_connection();
|
|
|
|
}
|
|
|
|
|
|
|
|
continue; /* Next packet */
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
} else if (check == CAPWAP_WRONG_PACKET) {
|
|
|
|
capwap_logging_debug("Warning: sanity check failure");
|
|
|
|
/* Drop packet */
|
|
|
|
continue;
|
|
|
|
}
|
2013-05-01 14:52:55 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
|
|
|
if (check == CAPWAP_PLAIN_PACKET) {
|
|
|
|
struct capwap_packet_rxmng* rxmngpacket;
|
|
|
|
|
|
|
|
/* Defragment management */
|
2014-09-10 21:58:23 +02:00
|
|
|
rxmngpacket = wtp_get_packet_rxmng();
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* If request, defragmentation packet */
|
|
|
|
check = capwap_packet_rxmng_add_recv_packet(rxmngpacket, buffer, buffersize);
|
|
|
|
if (check == CAPWAP_REQUEST_MORE_FRAGMENT) {
|
|
|
|
continue;
|
|
|
|
} else if (check != CAPWAP_RECEIVE_COMPLETE_PACKET) {
|
|
|
|
/* Discard fragments */
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_free_packet_rxmng();
|
2013-11-07 22:06:29 +01:00
|
|
|
continue;
|
|
|
|
}
|
2013-05-01 14:52:55 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Check for already response to packet */
|
2014-09-10 21:58:23 +02:00
|
|
|
if (capwap_is_request_type(rxmngpacket->ctrlmsg.type) && (g_wtp.remotetype == rxmngpacket->ctrlmsg.type) && (g_wtp.remoteseqnumber == rxmngpacket->ctrlmsg.seq)) {
|
|
|
|
/* Retransmit response */
|
|
|
|
if (!capwap_crypt_sendto_fragmentpacket(&g_wtp.dtls, g_wtp.responsefragmentpacket)) {
|
|
|
|
capwap_logging_error("Error to resend response packet");
|
|
|
|
} else {
|
|
|
|
capwap_logging_debug("Retrasmitted control packet");
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2015-02-01 17:52:11 +01:00
|
|
|
/* Discard fragments */
|
|
|
|
wtp_free_packet_rxmng();
|
2014-09-10 21:58:23 +02:00
|
|
|
continue;
|
|
|
|
}
|
2013-08-11 18:38:23 +02:00
|
|
|
|
2014-09-10 21:58:23 +02:00
|
|
|
/* Check message type */
|
|
|
|
res = capwap_check_message_type(rxmngpacket);
|
|
|
|
if (res != VALID_MESSAGE_TYPE) {
|
|
|
|
if (res == INVALID_REQUEST_MESSAGE_TYPE) {
|
|
|
|
capwap_logging_warning("Unexpected Unrecognized Request, send Response Packet with error");
|
|
|
|
wtp_send_invalid_request(rxmngpacket, CAPWAP_RESULTCODE_MSG_UNEXPECTED_UNRECOGNIZED_REQUEST);
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
2014-09-10 21:58:23 +02:00
|
|
|
|
|
|
|
capwap_logging_debug("Invalid message type");
|
|
|
|
wtp_free_packet_rxmng();
|
|
|
|
continue;
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Parsing packet */
|
2014-09-10 21:58:23 +02:00
|
|
|
res = capwap_parsing_packet(rxmngpacket, &packet);
|
2013-11-07 22:06:29 +01:00
|
|
|
if (res != PARSING_COMPLETE) {
|
2014-09-10 21:58:23 +02:00
|
|
|
if ((res == UNRECOGNIZED_MESSAGE_ELEMENT) && capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
2013-11-07 22:06:29 +01:00
|
|
|
capwap_logging_warning("Unrecognized Message Element, send Response Packet with error");
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_send_invalid_request(rxmngpacket, CAPWAP_RESULTCODE_FAILURE_UNRECOGNIZED_MESSAGE_ELEMENT);
|
2013-11-07 22:06:29 +01:00
|
|
|
/* TODO: add the unrecognized message element */
|
|
|
|
}
|
2013-08-11 18:38:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
2015-02-01 17:52:11 +01:00
|
|
|
capwap_logging_debug("Failed parsing packet");
|
2013-11-07 22:06:29 +01:00
|
|
|
capwap_free_parsed_packet(&packet);
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_free_packet_rxmng();
|
2013-11-07 22:06:29 +01:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate packet */
|
|
|
|
if (capwap_validate_parsed_packet(&packet, NULL)) {
|
2014-09-10 21:58:23 +02:00
|
|
|
if (capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
2013-11-07 22:06:29 +01:00
|
|
|
capwap_logging_warning("Missing Mandatory Message Element, send Response Packet with error");
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_send_invalid_request(rxmngpacket, CAPWAP_RESULTCODE_FAILURE_MISSING_MANDATORY_MSG_ELEMENT);
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
2015-02-01 17:52:11 +01:00
|
|
|
capwap_logging_debug("Failed validation parsed packet");
|
2013-11-07 22:06:29 +01:00
|
|
|
capwap_free_parsed_packet(&packet);
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_free_packet_rxmng();
|
2013-11-07 22:06:29 +01:00
|
|
|
continue;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
|
|
|
/* Receive a complete packet */
|
2014-03-02 19:31:27 +01:00
|
|
|
wtp_dfa_execute(&packet);
|
|
|
|
|
|
|
|
/* Free packet */
|
|
|
|
capwap_free_parsed_packet(&packet);
|
2014-09-10 21:58:23 +02:00
|
|
|
wtp_free_packet_rxmng();
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
2013-12-21 23:50:15 +01:00
|
|
|
} else if ((index == CAPWAP_RECV_ERROR_INTR) || (index == WTP_RECV_NOERROR_RADIO)) {
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Ignore recv */
|
|
|
|
continue;
|
|
|
|
} else if (index == CAPWAP_RECV_ERROR_SOCKET) {
|
|
|
|
/* Socket close */
|
|
|
|
break;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free memory */
|
2014-06-07 22:37:19 +02:00
|
|
|
wtp_dfa_free_fdspool(&g_wtp.fds);
|
2013-05-01 14:52:55 +02:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Change WTP state machine */
|
|
|
|
void wtp_dfa_change_state(int state) {
|
2014-03-02 19:31:27 +01:00
|
|
|
if (state != g_wtp.state) {
|
|
|
|
capwap_logging_debug("WTP change state from %s to %s", capwap_dfa_getname(g_wtp.state), capwap_dfa_getname(state));
|
|
|
|
g_wtp.state = state;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
void wtp_free_reference_last_request(void) {
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_list_flush(g_wtp.requestfragmentpacket);
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
void wtp_free_reference_last_response(void) {
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_list_flush(g_wtp.responsefragmentpacket);
|
2014-09-10 21:58:23 +02:00
|
|
|
g_wtp.remotetype = 0;
|
|
|
|
g_wtp.remoteseqnumber = 0;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2014-03-02 19:31:27 +01:00
|
|
|
|
|
|
|
/* */
|
2016-03-26 17:20:50 +01:00
|
|
|
void wtp_dfa_retransmition_timeout(struct capwap_timeout* timeout, unsigned long index,
|
|
|
|
void* context, void* param)
|
|
|
|
{
|
2014-09-10 21:58:23 +02:00
|
|
|
if (!g_wtp.requestfragmentpacket->count) {
|
|
|
|
capwap_logging_warning("Invalid retransmition request packet");
|
2014-03-02 19:31:27 +01:00
|
|
|
wtp_teardown_connection();
|
|
|
|
} else {
|
2014-09-10 21:58:23 +02:00
|
|
|
g_wtp.retransmitcount++;
|
|
|
|
if (g_wtp.retransmitcount >= WTP_MAX_RETRANSMIT) {
|
|
|
|
capwap_logging_info("Retransmition request packet timeout");
|
2014-03-02 19:31:27 +01:00
|
|
|
|
2014-09-10 21:58:23 +02:00
|
|
|
/* Timeout state */
|
|
|
|
wtp_free_reference_last_request();
|
|
|
|
wtp_teardown_connection();
|
|
|
|
} else {
|
|
|
|
/* Retransmit request */
|
|
|
|
capwap_logging_debug("Retransmition request packet");
|
|
|
|
if (!capwap_crypt_sendto_fragmentpacket(&g_wtp.dtls, g_wtp.requestfragmentpacket)) {
|
|
|
|
capwap_logging_error("Error to send request packet");
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Update timeout */
|
|
|
|
capwap_timeout_set(g_wtp.timeout, g_wtp.idtimercontrol, WTP_RETRANSMIT_INTERVAL, wtp_dfa_retransmition_timeout, NULL, NULL);
|
|
|
|
}
|
2014-03-02 19:31:27 +01:00
|
|
|
}
|
|
|
|
}
|