2013-05-01 14:52:55 +02:00
|
|
|
#include "wtp.h"
|
|
|
|
#include "wtp_dfa.h"
|
|
|
|
#include "capwap_array.h"
|
|
|
|
#include "capwap_dfa.h"
|
|
|
|
#include "capwap_dtls.h"
|
|
|
|
|
|
|
|
#include <signal.h>
|
|
|
|
|
|
|
|
/* Handler signal */
|
|
|
|
static void wtp_signal_handler(int signum) {
|
|
|
|
if ((signum == SIGINT) || (signum == SIGTERM)) {
|
|
|
|
g_wtp.running = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
/* */
|
|
|
|
static struct capwap_packet_rxmng* wtp_get_packet_rxmng(int isctrlmsg) {
|
|
|
|
struct capwap_packet_rxmng* rxmngpacket = NULL;
|
|
|
|
|
|
|
|
if (isctrlmsg) {
|
|
|
|
if (!g_wtp.rxmngctrlpacket) {
|
|
|
|
g_wtp.rxmngctrlpacket = capwap_packet_rxmng_create_message(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
rxmngpacket = g_wtp.rxmngctrlpacket;
|
|
|
|
} else {
|
|
|
|
if (!g_wtp.rxmngdatapacket) {
|
|
|
|
g_wtp.rxmngdatapacket = capwap_packet_rxmng_create_message(0);
|
|
|
|
}
|
|
|
|
|
|
|
|
rxmngpacket = g_wtp.rxmngdatapacket;
|
|
|
|
}
|
|
|
|
|
|
|
|
return rxmngpacket;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
2013-06-05 19:39:03 +02:00
|
|
|
void wtp_free_packet_rxmng(int isctrlmsg) {
|
2013-05-27 21:33:23 +02:00
|
|
|
if (isctrlmsg && g_wtp.rxmngctrlpacket) {
|
|
|
|
capwap_packet_rxmng_free(g_wtp.rxmngctrlpacket);
|
|
|
|
g_wtp.rxmngctrlpacket = NULL;
|
|
|
|
} else if (!isctrlmsg && g_wtp.rxmngdatapacket) {
|
|
|
|
capwap_packet_rxmng_free(g_wtp.rxmngdatapacket);
|
|
|
|
g_wtp.rxmngdatapacket = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
2013-08-11 18:38:23 +02:00
|
|
|
static void wtp_send_invalid_request(struct capwap_packet_rxmng* rxmngpacket, struct capwap_connection* connection, uint32_t errorcode) {
|
2013-05-27 21:33:23 +02:00
|
|
|
struct capwap_header_data capwapheader;
|
|
|
|
struct capwap_packet_txmng* txmngpacket;
|
|
|
|
struct capwap_list* responsefragmentpacket;
|
|
|
|
struct capwap_fragment_packet_item* packet;
|
|
|
|
struct capwap_header* header;
|
2013-08-11 18:38:23 +02:00
|
|
|
struct capwap_resultcode_element resultcode = { .code = errorcode };
|
2013-05-27 21:33:23 +02:00
|
|
|
|
|
|
|
ASSERT(rxmngpacket != NULL);
|
|
|
|
ASSERT(rxmngpacket->fragmentlist->first != NULL);
|
|
|
|
ASSERT(connection != NULL);
|
|
|
|
|
|
|
|
/* */
|
|
|
|
packet = (struct capwap_fragment_packet_item*)rxmngpacket->fragmentlist->first->item;
|
|
|
|
header = (struct capwap_header*)packet->buffer;
|
|
|
|
|
2013-08-11 18:38:23 +02:00
|
|
|
/* Odd message type */
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_header_init(&capwapheader, CAPWAP_RADIOID_NONE, GET_WBID_HEADER(header));
|
|
|
|
txmngpacket = capwap_packet_txmng_create_ctrl_message(&capwapheader, rxmngpacket->ctrlmsg.type + 1, rxmngpacket->ctrlmsg.seq, g_wtp.mtu);
|
|
|
|
|
|
|
|
/* Add message element */
|
|
|
|
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_RESULTCODE, &resultcode);
|
|
|
|
|
|
|
|
/* Unknown response complete, get fragment packets */
|
|
|
|
responsefragmentpacket = capwap_list_create();
|
|
|
|
capwap_packet_txmng_get_fragment_packets(txmngpacket, responsefragmentpacket, g_wtp.fragmentid);
|
|
|
|
if (responsefragmentpacket->count > 1) {
|
|
|
|
g_wtp.fragmentid++;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free packets manager */
|
|
|
|
capwap_packet_txmng_free(txmngpacket);
|
|
|
|
|
|
|
|
/* Send unknown response */
|
|
|
|
capwap_crypt_sendto_fragmentpacket(&g_wtp.ctrldtls, connection->socket.socket[connection->socket.type], responsefragmentpacket, &connection->localaddr, &connection->remoteaddr);
|
|
|
|
|
|
|
|
/* Don't buffering a packets sent */
|
|
|
|
capwap_list_free(responsefragmentpacket);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* WTP Execute state */
|
2013-11-07 22:06:29 +01:00
|
|
|
static void wtp_dfa_execute(struct capwap_parsed_packet* packet, struct timeout_control* timeout) {
|
2013-05-27 21:33:23 +02:00
|
|
|
switch (g_wtp.dfa.state) {
|
|
|
|
case CAPWAP_IDLE_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_idle(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case CAPWAP_DISCOVERY_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_discovery(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_SULKING_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_sulking(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case CAPWAP_DTLS_CONNECT_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_teardown_connection(timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_DTLS_TEARDOWN_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_dtlsteardown(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_JOIN_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_join(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_CONFIGURE_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_configure(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_RESET_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_reset(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
case CAPWAP_DATA_CHECK_STATE: {
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_state_datacheck(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
case CAPWAP_RUN_STATE: {
|
|
|
|
wtp_dfa_state_run(packet, timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default: {
|
|
|
|
capwap_logging_debug("Unknown action event: %lu", g_wtp.dfa.state);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
/* WTP state machine */
|
2013-05-27 21:33:23 +02:00
|
|
|
int wtp_dfa_running(void) {
|
|
|
|
int res;
|
2013-05-01 14:52:55 +02:00
|
|
|
int result = CAPWAP_SUCCESSFUL;
|
|
|
|
struct timeout_control timeout;
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
char bufferencrypt[CAPWAP_MAX_PACKET_SIZE];
|
|
|
|
char bufferplain[CAPWAP_MAX_PACKET_SIZE];
|
|
|
|
char* buffer;
|
2013-05-01 14:52:55 +02:00
|
|
|
int buffersize;
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
struct capwap_socket socket;
|
|
|
|
struct capwap_connection connection;
|
|
|
|
struct capwap_parsed_packet packet;
|
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
int index;
|
|
|
|
struct sockaddr_storage recvfromaddr;
|
|
|
|
struct sockaddr_storage recvtoaddr;
|
|
|
|
int isrecvpacket = 0;
|
|
|
|
|
|
|
|
struct pollfd* fds;
|
|
|
|
int fdscount;
|
|
|
|
|
|
|
|
/* Init */
|
|
|
|
capwap_init_timeout(&timeout);
|
|
|
|
capwap_set_timeout(0, &timeout, CAPWAP_TIMER_CONTROL_CONNECTION); /* Start DFA with timeout */
|
|
|
|
|
2013-05-27 21:33:23 +02:00
|
|
|
memset(&packet, 0, sizeof(struct capwap_parsed_packet));
|
2013-05-01 14:52:55 +02:00
|
|
|
|
|
|
|
/* Configure poll struct */
|
|
|
|
fdscount = CAPWAP_MAX_SOCKETS * 2;
|
|
|
|
fds = (struct pollfd*)capwap_alloc(sizeof(struct pollfd) * fdscount);
|
|
|
|
|
|
|
|
/* Retrive all socket for polling */
|
|
|
|
fdscount = capwap_network_set_pollfd(&g_wtp.net, fds, fdscount);
|
|
|
|
ASSERT(fdscount > 0);
|
|
|
|
|
|
|
|
/* Handler signal */
|
|
|
|
g_wtp.running = 1;
|
2013-08-06 22:13:00 +02:00
|
|
|
signal(SIGPIPE, SIG_IGN);
|
2013-05-01 14:52:55 +02:00
|
|
|
signal(SIGINT, wtp_signal_handler);
|
|
|
|
signal(SIGTERM, wtp_signal_handler);
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Init complete, start DFA */
|
|
|
|
wtp_dfa_change_state(CAPWAP_IDLE_STATE);
|
|
|
|
wtp_dfa_state_idle(NULL, &timeout);
|
|
|
|
|
|
|
|
/* */
|
|
|
|
while (g_wtp.dfa.state != CAPWAP_DEAD_STATE) {
|
2013-05-01 14:52:55 +02:00
|
|
|
/* If request wait packet from AC */
|
|
|
|
isrecvpacket = 0;
|
2013-11-07 22:06:29 +01:00
|
|
|
buffer = bufferencrypt;
|
|
|
|
buffersize = CAPWAP_MAX_PACKET_SIZE;
|
|
|
|
index = capwap_recvfrom(fds, fdscount, buffer, &buffersize, &recvfromaddr, &recvtoaddr, &timeout);
|
|
|
|
if (!g_wtp.running) {
|
|
|
|
capwap_logging_debug("Closing WTP, Teardown connection");
|
2013-05-01 14:52:55 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Manual teardown */
|
|
|
|
index = CAPWAP_RECV_ERROR_TIMEOUT;
|
|
|
|
wtp_teardown_connection(&timeout);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Wait RFC teardown timeout */
|
|
|
|
capwap_wait_timeout(&timeout, CAPWAP_TIMER_CONTROL_CONNECTION);
|
|
|
|
}
|
2013-06-09 21:49:43 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
if (index >= 0) {
|
|
|
|
if (g_wtp.teardown) {
|
|
|
|
/* Drop packet */
|
|
|
|
continue;
|
|
|
|
} else {
|
|
|
|
int check;
|
|
|
|
|
|
|
|
/* Retrieve network information */
|
|
|
|
capwap_get_network_socket(&g_wtp.net, &socket, fds[index].fd);
|
|
|
|
|
|
|
|
/* Check source */
|
|
|
|
if (socket.isctrlsocket && (g_wtp.acctrladdress.ss_family != AF_UNSPEC)) {
|
|
|
|
if (capwap_compare_ip(&g_wtp.acctrladdress, &recvfromaddr)) {
|
|
|
|
/* Unknown source */
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
} else if (!socket.isctrlsocket && (g_wtp.acdataaddress.ss_family != AF_UNSPEC)) {
|
|
|
|
if (capwap_compare_ip(&g_wtp.acdataaddress, &recvfromaddr)) {
|
|
|
|
/* Unknown source */
|
|
|
|
continue;
|
2013-06-09 21:49:43 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-06-09 21:49:43 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Check of packet */
|
|
|
|
check = capwap_sanity_check(socket.isctrlsocket, g_wtp.dfa.state, buffer, buffersize, g_wtp.ctrldtls.enable, g_wtp.datadtls.enable);
|
|
|
|
if (check == CAPWAP_DTLS_PACKET) {
|
|
|
|
struct capwap_dtls* dtls = (socket.isctrlsocket ? &g_wtp.ctrldtls : &g_wtp.datadtls);
|
|
|
|
|
|
|
|
if (dtls->enable) {
|
|
|
|
int oldaction = dtls->action;
|
|
|
|
|
|
|
|
/* Decrypt packet */
|
|
|
|
buffersize = capwap_decrypt_packet(dtls, buffer, buffersize, bufferplain, CAPWAP_MAX_PACKET_SIZE);
|
|
|
|
if (buffersize > 0) {
|
|
|
|
buffer = bufferplain;
|
|
|
|
check = CAPWAP_PLAIN_PACKET;
|
|
|
|
} else if (buffersize == CAPWAP_ERROR_AGAIN) {
|
|
|
|
/* Check is handshake complete */
|
|
|
|
if ((oldaction == CAPWAP_DTLS_ACTION_HANDSHAKE) && (dtls->action == CAPWAP_DTLS_ACTION_DATA)) {
|
|
|
|
if (socket.isctrlsocket) {
|
|
|
|
if (g_wtp.dfa.state == CAPWAP_DTLS_CONNECT_STATE) {
|
|
|
|
check = CAPWAP_NONE_PACKET;
|
|
|
|
wtp_send_join(&timeout);
|
2013-05-01 14:52:55 +02:00
|
|
|
} else {
|
2013-11-07 22:06:29 +01:00
|
|
|
check = CAPWAP_WRONG_PACKET;
|
|
|
|
wtp_teardown_connection(&timeout);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (g_wtp.dfa.state == CAPWAP_DATA_CHECK_STATE) {
|
|
|
|
check = CAPWAP_NONE_PACKET;
|
|
|
|
wtp_start_datachannel(&timeout);
|
|
|
|
} else {
|
|
|
|
check = CAPWAP_WRONG_PACKET;
|
|
|
|
wtp_teardown_connection(&timeout);
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
|
|
|
continue; /* Next packet */
|
2013-05-01 14:52:55 +02:00
|
|
|
} else {
|
2013-11-07 22:06:29 +01:00
|
|
|
if ((oldaction == CAPWAP_DTLS_ACTION_DATA) && (dtls->action == CAPWAP_DTLS_ACTION_SHUTDOWN)) {
|
|
|
|
wtp_teardown_connection(&timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
continue; /* Next packet */
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
} else {
|
|
|
|
continue; /* Drop packet */
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
} else if (check == CAPWAP_WRONG_PACKET) {
|
|
|
|
capwap_logging_debug("Warning: sanity check failure");
|
|
|
|
/* Drop packet */
|
|
|
|
continue;
|
|
|
|
}
|
2013-05-01 14:52:55 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
|
|
|
if (check == CAPWAP_PLAIN_PACKET) {
|
|
|
|
struct capwap_packet_rxmng* rxmngpacket;
|
|
|
|
|
|
|
|
/* Detect local address */
|
|
|
|
if (recvtoaddr.ss_family == AF_UNSPEC) {
|
|
|
|
if (capwap_get_localaddress_by_remoteaddress(&recvtoaddr, &recvfromaddr, g_wtp.net.bind_interface, (!(g_wtp.net.bind_ctrl_flags & CAPWAP_IPV6ONLY_FLAG) ? 1 : 0))) {
|
|
|
|
struct sockaddr_storage sockinfo;
|
|
|
|
socklen_t sockinfolen = sizeof(struct sockaddr_storage);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
memset(&sockinfo, 0, sizeof(struct sockaddr_storage));
|
|
|
|
if (getsockname(fds[index].fd, (struct sockaddr*)&sockinfo, &sockinfolen) < 0) {
|
|
|
|
break;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
CAPWAP_SET_NETWORK_PORT(&recvtoaddr, CAPWAP_GET_NETWORK_PORT(&sockinfo));
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
|
|
|
if (socket.isctrlsocket) {
|
|
|
|
capwap_logging_debug("Receive control packet");
|
|
|
|
} else {
|
|
|
|
capwap_logging_debug("Receive data packet");
|
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Defragment management */
|
|
|
|
rxmngpacket = wtp_get_packet_rxmng(socket.isctrlsocket);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* If request, defragmentation packet */
|
|
|
|
check = capwap_packet_rxmng_add_recv_packet(rxmngpacket, buffer, buffersize);
|
|
|
|
if (check == CAPWAP_REQUEST_MORE_FRAGMENT) {
|
|
|
|
continue;
|
|
|
|
} else if (check != CAPWAP_RECEIVE_COMPLETE_PACKET) {
|
|
|
|
/* Discard fragments */
|
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
|
|
|
continue;
|
|
|
|
}
|
2013-05-01 14:52:55 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Receive all fragment */
|
|
|
|
memcpy(&connection.socket, &socket, sizeof(struct capwap_socket));
|
|
|
|
memcpy(&connection.localaddr, &recvtoaddr, sizeof(struct sockaddr_storage));
|
|
|
|
memcpy(&connection.remoteaddr, &recvfromaddr, sizeof(struct sockaddr_storage));
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Check for already response to packet */
|
|
|
|
if (socket.isctrlsocket) {
|
|
|
|
if (capwap_recv_retrasmitted_request(&g_wtp.ctrldtls, rxmngpacket, &connection, g_wtp.lastrecvpackethash, g_wtp.responsefragmentpacket)) {
|
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
|
|
|
capwap_logging_debug("Retrasmitted packet");
|
|
|
|
continue;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Check message type */
|
|
|
|
res = capwap_check_message_type(rxmngpacket);
|
|
|
|
if (res != VALID_MESSAGE_TYPE) {
|
|
|
|
if (res == INVALID_REQUEST_MESSAGE_TYPE) {
|
|
|
|
capwap_logging_warning("Unexpected Unrecognized Request, send Response Packet with error");
|
|
|
|
wtp_send_invalid_request(rxmngpacket, &connection, CAPWAP_RESULTCODE_MSG_UNEXPECTED_UNRECOGNIZED_REQUEST);
|
2013-08-11 18:38:23 +02:00
|
|
|
}
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
capwap_logging_debug("Invalid message type");
|
2013-05-27 21:33:23 +02:00
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
|
|
|
continue;
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
}
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* Parsing packet */
|
|
|
|
res = capwap_parsing_packet(rxmngpacket, &connection, &packet);
|
|
|
|
if (res != PARSING_COMPLETE) {
|
|
|
|
if (socket.isctrlsocket && (res == UNRECOGNIZED_MESSAGE_ELEMENT) && capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
|
|
|
capwap_logging_warning("Unrecognized Message Element, send Response Packet with error");
|
|
|
|
wtp_send_invalid_request(rxmngpacket, &connection, CAPWAP_RESULTCODE_FAILURE_UNRECOGNIZED_MESSAGE_ELEMENT);
|
|
|
|
/* TODO: add the unrecognized message element */
|
|
|
|
}
|
2013-08-11 18:38:23 +02:00
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
|
|
|
capwap_free_parsed_packet(&packet);
|
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
|
|
|
capwap_logging_debug("Failed parsing packet");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Validate packet */
|
|
|
|
if (capwap_validate_parsed_packet(&packet, NULL)) {
|
|
|
|
if (socket.isctrlsocket && capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
|
|
|
capwap_logging_warning("Missing Mandatory Message Element, send Response Packet with error");
|
|
|
|
wtp_send_invalid_request(rxmngpacket, &connection, CAPWAP_RESULTCODE_FAILURE_MISSING_MANDATORY_MSG_ELEMENT);
|
2013-05-27 21:33:23 +02:00
|
|
|
}
|
|
|
|
|
2013-11-07 22:06:29 +01:00
|
|
|
/* */
|
|
|
|
capwap_free_parsed_packet(&packet);
|
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
|
|
|
capwap_logging_debug("Failed validation parsed packet");
|
|
|
|
continue;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
|
|
|
|
/* Receive a complete packet */
|
|
|
|
isrecvpacket = 1;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
2013-11-07 22:06:29 +01:00
|
|
|
} else if (index == CAPWAP_RECV_ERROR_INTR) {
|
|
|
|
/* Ignore recv */
|
|
|
|
continue;
|
|
|
|
} else if (index == CAPWAP_RECV_ERROR_SOCKET) {
|
|
|
|
/* Socket close */
|
|
|
|
break;
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Execute state */
|
2013-11-07 22:06:29 +01:00
|
|
|
wtp_dfa_execute((isrecvpacket ? &packet : NULL), &timeout);
|
2013-05-01 14:52:55 +02:00
|
|
|
|
|
|
|
/* Free memory */
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_free_parsed_packet(&packet);
|
2013-05-01 14:52:55 +02:00
|
|
|
if (isrecvpacket) {
|
2013-05-27 21:33:23 +02:00
|
|
|
wtp_free_packet_rxmng(socket.isctrlsocket);
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Free memory */
|
|
|
|
capwap_free(fds);
|
2013-05-27 21:33:23 +02:00
|
|
|
|
2013-05-01 14:52:55 +02:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Change WTP state machine */
|
|
|
|
void wtp_dfa_change_state(int state) {
|
|
|
|
if (state != g_wtp.dfa.state) {
|
|
|
|
capwap_logging_debug("WTP change state from %s to %s", capwap_dfa_getname(g_wtp.dfa.state), capwap_dfa_getname(state));
|
|
|
|
g_wtp.dfa.state = state;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
void wtp_free_reference_last_request(void) {
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_list_flush(g_wtp.requestfragmentpacket);
|
2013-05-01 14:52:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
/* */
|
|
|
|
void wtp_free_reference_last_response(void) {
|
2013-05-27 21:33:23 +02:00
|
|
|
capwap_list_flush(g_wtp.responsefragmentpacket);
|
2013-05-01 14:52:55 +02:00
|
|
|
memset(&g_wtp.lastrecvpackethash[0], 0, sizeof(g_wtp.lastrecvpackethash));
|
|
|
|
}
|