Added the code that handles the result code of a request.
This commit is contained in:
@ -2,11 +2,153 @@
|
||||
#include "capwap_dfa.h"
|
||||
#include "capwap_array.h"
|
||||
#include "ac_session.h"
|
||||
#include <json/json.h>
|
||||
#include <arpa/inet.h>
|
||||
|
||||
/* */
|
||||
static struct ac_soap_response* ac_dfa_state_configure_parsing_request(struct ac_session_t* session, struct capwap_parsed_packet* packet) {
|
||||
int i;
|
||||
const char* jsonmessage;
|
||||
char* base64confstatus;
|
||||
struct json_object* jarray;
|
||||
struct json_object* jsonparam;
|
||||
struct json_object* jhash;
|
||||
struct capwap_array* elemarray;
|
||||
struct capwap_statisticstimer_element* statisticstimer;
|
||||
struct capwap_wtprebootstat_element* wtprebootstat;
|
||||
struct capwap_wtpstaticipaddress_element* wtpstaticipaddress;
|
||||
struct ac_soap_response* response;
|
||||
|
||||
/* Create SOAP request with JSON param
|
||||
{
|
||||
RadioAdministrativeState: [
|
||||
{
|
||||
RadioID: [int],
|
||||
AdminState: [int]
|
||||
}
|
||||
],
|
||||
StatisticsTimer: {
|
||||
StatisticsTimer: [int]
|
||||
},
|
||||
WTPRebootStatistics: {
|
||||
RebootCount: [int],
|
||||
ACInitiatedCount: [int],
|
||||
LinkFailureCount: [int],
|
||||
SWFailureCount: [int],
|
||||
HWFailureCount: [int],
|
||||
OtherFailureCount: [int],
|
||||
UnknownFailureCount: [int],
|
||||
LastFailureType: [int]
|
||||
},
|
||||
ACNamePriority: [
|
||||
{
|
||||
Priority: [int],
|
||||
ACName: [string]
|
||||
}
|
||||
],
|
||||
WTPStaticIPAddressInformation: {
|
||||
IPAddress: [string],
|
||||
Netmask: [string],
|
||||
Gateway: [string],
|
||||
Static: [int]
|
||||
}
|
||||
}
|
||||
*/
|
||||
|
||||
/* */
|
||||
jsonparam = json_object_new_object();
|
||||
|
||||
/* RadioAdministrativeState */
|
||||
jarray = json_object_new_array();
|
||||
elemarray = (struct capwap_array*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_RADIOADMSTATE);
|
||||
for (i = 0; i < elemarray->count; i++) {
|
||||
json_object* jradioadm;
|
||||
struct capwap_radioadmstate_element* radioadm = *(struct capwap_radioadmstate_element**)capwap_array_get_item_pointer(elemarray, i);
|
||||
|
||||
/* */
|
||||
jradioadm = json_object_new_object();
|
||||
json_object_object_add(jradioadm, "RadioID", json_object_new_int((int)radioadm->radioid));
|
||||
json_object_object_add(jradioadm, "AdminState", json_object_new_int((int)radioadm->state));
|
||||
json_object_array_add(jarray, jradioadm);
|
||||
}
|
||||
|
||||
json_object_object_add(jsonparam, "RadioAdministrativeState", jarray);
|
||||
|
||||
/* StatisticsTimer */
|
||||
statisticstimer = (struct capwap_statisticstimer_element*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_STATISTICSTIMER);
|
||||
|
||||
jhash = json_object_new_object();
|
||||
json_object_object_add(jhash, "StatisticsTimer", json_object_new_int((int)statisticstimer->timer));
|
||||
json_object_object_add(jsonparam, "StatisticsTimer", jhash);
|
||||
|
||||
/* WTPRebootStatistics */
|
||||
wtprebootstat = (struct capwap_wtprebootstat_element*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_WTPREBOOTSTAT);
|
||||
|
||||
jhash = json_object_new_object();
|
||||
json_object_object_add(jhash, "RebootCount", json_object_new_int((int)wtprebootstat->rebootcount));
|
||||
json_object_object_add(jhash, "ACInitiatedCount", json_object_new_int((int)wtprebootstat->acinitiatedcount));
|
||||
json_object_object_add(jhash, "LinkFailureCount", json_object_new_int((int)wtprebootstat->linkfailurecount));
|
||||
json_object_object_add(jhash, "SWFailureCount", json_object_new_int((int)wtprebootstat->swfailurecount));
|
||||
json_object_object_add(jhash, "HWFailureCount", json_object_new_int((int)wtprebootstat->hwfailurecount));
|
||||
json_object_object_add(jhash, "OtherFailureCount", json_object_new_int((int)wtprebootstat->otherfailurecount));
|
||||
json_object_object_add(jhash, "UnknownFailureCount", json_object_new_int((int)wtprebootstat->unknownfailurecount));
|
||||
json_object_object_add(jhash, "LastFailureType", json_object_new_int((int)wtprebootstat->lastfailuretype));
|
||||
json_object_object_add(jsonparam, "WTPRebootStatistics", jhash);
|
||||
|
||||
/* ACNamePriority */
|
||||
elemarray = (struct capwap_array*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_ACNAMEPRIORITY);
|
||||
if (elemarray && elemarray->count) {
|
||||
jarray = json_object_new_array();
|
||||
for (i = 0; i < elemarray->count; i++) {
|
||||
json_object* jacname;
|
||||
struct capwap_acnamepriority_element* acname = *(struct capwap_acnamepriority_element**)capwap_array_get_item_pointer(elemarray, i);
|
||||
|
||||
/* */
|
||||
jacname = json_object_new_object();
|
||||
json_object_object_add(jacname, "Priority", json_object_new_int((int)acname->priority));
|
||||
json_object_object_add(jacname, "ACName", json_object_new_string((char*)acname->name));
|
||||
json_object_array_add(jarray, jacname);
|
||||
}
|
||||
|
||||
json_object_object_add(jsonparam, "ACNamePriority", jarray);
|
||||
}
|
||||
|
||||
/* WTPStaticIPAddressInformation */
|
||||
wtpstaticipaddress = (struct capwap_wtpstaticipaddress_element*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_WTPSTATICIPADDRESS);
|
||||
if (wtpstaticipaddress) {
|
||||
char ipbuffer[INET_ADDRSTRLEN];
|
||||
|
||||
/* */
|
||||
jhash = json_object_new_object();
|
||||
json_object_object_add(jhash, "IPAddress", json_object_new_string(inet_ntop(AF_INET, (void*)&wtpstaticipaddress->address, ipbuffer, INET_ADDRSTRLEN)));
|
||||
json_object_object_add(jhash, "Netmask", json_object_new_string(inet_ntop(AF_INET, (void*)&wtpstaticipaddress->netmask, ipbuffer, INET_ADDRSTRLEN)));
|
||||
json_object_object_add(jhash, "Gateway", json_object_new_string(inet_ntop(AF_INET, (void*)&wtpstaticipaddress->gateway, ipbuffer, INET_ADDRSTRLEN)));
|
||||
json_object_object_add(jhash, "Static", json_object_new_int((int)wtpstaticipaddress->staticip));
|
||||
json_object_object_add(jsonparam, "WTPStaticIPAddressInformation", jhash);
|
||||
}
|
||||
|
||||
/* Get JSON param and convert base64 */
|
||||
jsonmessage = json_object_to_json_string(jsonparam);
|
||||
base64confstatus = capwap_alloc(AC_BASE64_ENCODE_LENGTH(strlen(jsonmessage)));
|
||||
if (!base64confstatus) {
|
||||
capwap_outofmemory();
|
||||
}
|
||||
|
||||
ac_base64_string_encode(jsonmessage, base64confstatus);
|
||||
|
||||
/* Send message */
|
||||
response = ac_soap_configureStatus(session, session->wtpid, base64confstatus);
|
||||
|
||||
/* Free JSON */
|
||||
json_object_put(jsonparam);
|
||||
capwap_free(base64confstatus);
|
||||
|
||||
return response;
|
||||
}
|
||||
|
||||
/* */
|
||||
int ac_dfa_state_configure(struct ac_session_t* session, struct capwap_parsed_packet* packet) {
|
||||
unsigned long i;
|
||||
unsigned short binding;
|
||||
struct capwap_array* radioadmstate;
|
||||
struct capwap_header_data capwapheader;
|
||||
struct capwap_packet_txmng* txmngpacket;
|
||||
@ -15,64 +157,71 @@ int ac_dfa_state_configure(struct ac_session_t* session, struct capwap_parsed_pa
|
||||
ASSERT(session != NULL);
|
||||
|
||||
if (packet) {
|
||||
binding = GET_WBID_HEADER(packet->rxmngpacket->header);
|
||||
/* TODO: gestione richiesta */
|
||||
/* Parsing request */
|
||||
struct ac_soap_response* response = ac_dfa_state_configure_parsing_request(session, packet);
|
||||
if (response) {
|
||||
/* Create response */
|
||||
capwap_header_init(&capwapheader, CAPWAP_RADIOID_NONE, GET_WBID_HEADER(packet->rxmngpacket->header));
|
||||
txmngpacket = capwap_packet_txmng_create_ctrl_message(&capwapheader, CAPWAP_CONFIGURATION_STATUS_RESPONSE, packet->rxmngpacket->ctrlmsg.seq, session->mtu);
|
||||
|
||||
/* Create response */
|
||||
capwap_header_init(&capwapheader, CAPWAP_RADIOID_NONE, binding);
|
||||
txmngpacket = capwap_packet_txmng_create_ctrl_message(&capwapheader, CAPWAP_CONFIGURATION_STATUS_RESPONSE, packet->rxmngpacket->ctrlmsg.seq, session->mtu);
|
||||
/* Add message element */
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_TIMERS, &session->dfa.timers);
|
||||
|
||||
/* Add message element */
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_TIMERS, &session->dfa.timers);
|
||||
radioadmstate = (struct capwap_array*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_RADIOADMSTATE);
|
||||
for (i = 0; i < radioadmstate->count; i++) {
|
||||
struct capwap_decrypterrorreportperiod_element report;
|
||||
struct capwap_radioadmstate_element* radioadm = *(struct capwap_radioadmstate_element**)capwap_array_get_item_pointer(radioadmstate, i);
|
||||
|
||||
radioadmstate = (struct capwap_array*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_RADIOADMSTATE);
|
||||
for (i = 0; i < radioadmstate->count; i++) {
|
||||
struct capwap_decrypterrorreportperiod_element report;
|
||||
struct capwap_radioadmstate_element* radioadm = *(struct capwap_radioadmstate_element**)capwap_array_get_item_pointer(radioadmstate, i);
|
||||
report.radioid = radioadm->radioid;
|
||||
report.interval = session->dfa.decrypterrorreport_interval;
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_DECRYPTERRORREPORTPERIOD, &report);
|
||||
}
|
||||
|
||||
report.radioid = radioadm->radioid;
|
||||
report.interval = session->dfa.decrypterrorreport_interval;
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_DECRYPTERRORREPORTPERIOD, &report);
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_IDLETIMEOUT, &session->dfa.idletimeout);
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_WTPFALLBACK, &session->dfa.wtpfallback);
|
||||
|
||||
if (session->dfa.acipv4list.addresses->count > 0) {
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_ACIPV4LIST, &session->dfa.acipv4list);
|
||||
}
|
||||
|
||||
if (session->dfa.acipv6list.addresses->count > 0) {
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_ACIPV6LIST, &session->dfa.acipv6list);
|
||||
}
|
||||
|
||||
/* CAPWAP_CREATE_RADIOOPRSTATE_ELEMENT */ /* TODO */
|
||||
/* CAPWAP_CREATE_WTPSTATICIPADDRESS_ELEMENT */ /* TODO */
|
||||
/* CAPWAP_CREATE_VENDORSPECIFICPAYLOAD_ELEMENT */ /* TODO */
|
||||
|
||||
/* */
|
||||
ac_soapclient_free_response(response);
|
||||
|
||||
/* Configure response complete, get fragment packets */
|
||||
ac_free_reference_last_response(session);
|
||||
capwap_packet_txmng_get_fragment_packets(txmngpacket, session->responsefragmentpacket, session->fragmentid);
|
||||
if (session->responsefragmentpacket->count > 1) {
|
||||
session->fragmentid++;
|
||||
}
|
||||
|
||||
/* Free packets manager */
|
||||
capwap_packet_txmng_free(txmngpacket);
|
||||
|
||||
/* Save remote sequence number */
|
||||
session->remoteseqnumber = packet->rxmngpacket->ctrlmsg.seq;
|
||||
capwap_get_packet_digest(packet->rxmngpacket, packet->connection, session->lastrecvpackethash);
|
||||
|
||||
/* Send Configure response to WTP */
|
||||
if (!capwap_crypt_sendto_fragmentpacket(&session->ctrldtls, session->ctrlsocket.socket[session->ctrlsocket.type], session->responsefragmentpacket, &session->acctrladdress, &session->wtpctrladdress)) {
|
||||
/* Response is already created and saved. When receive a re-request, DFA autoresponse */
|
||||
capwap_logging_debug("Warning: error to send configuration status response packet");
|
||||
}
|
||||
|
||||
/* Change state */
|
||||
ac_dfa_change_state(session, CAPWAP_DATA_CHECK_STATE);
|
||||
capwap_set_timeout(session->dfa.rfcChangeStatePendingTimer, &session->timeout, CAPWAP_TIMER_CONTROL_CONNECTION);
|
||||
} else {
|
||||
ac_dfa_change_state(session, CAPWAP_CONFIGURE_TO_DTLS_TEARDOWN_STATE);
|
||||
status = AC_DFA_NO_PACKET;
|
||||
}
|
||||
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_IDLETIMEOUT, &session->dfa.idletimeout);
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_WTPFALLBACK, &session->dfa.wtpfallback);
|
||||
|
||||
if (session->dfa.acipv4list.addresses->count > 0) {
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_ACIPV4LIST, &session->dfa.acipv4list);
|
||||
}
|
||||
|
||||
if (session->dfa.acipv6list.addresses->count > 0) {
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_ACIPV6LIST, &session->dfa.acipv6list);
|
||||
}
|
||||
|
||||
/* CAPWAP_CREATE_RADIOOPRSTATE_ELEMENT */ /* TODO */
|
||||
/* CAPWAP_CREATE_WTPSTATICIPADDRESS_ELEMENT */ /* TODO */
|
||||
/* CAPWAP_CREATE_VENDORSPECIFICPAYLOAD_ELEMENT */ /* TODO */
|
||||
|
||||
/* Configure response complete, get fragment packets */
|
||||
ac_free_reference_last_response(session);
|
||||
capwap_packet_txmng_get_fragment_packets(txmngpacket, session->responsefragmentpacket, session->fragmentid);
|
||||
if (session->responsefragmentpacket->count > 1) {
|
||||
session->fragmentid++;
|
||||
}
|
||||
|
||||
/* Free packets manager */
|
||||
capwap_packet_txmng_free(txmngpacket);
|
||||
|
||||
/* Save remote sequence number */
|
||||
session->remoteseqnumber = packet->rxmngpacket->ctrlmsg.seq;
|
||||
capwap_get_packet_digest(packet->rxmngpacket, packet->connection, session->lastrecvpackethash);
|
||||
|
||||
/* Send Configure response to WTP */
|
||||
if (!capwap_crypt_sendto_fragmentpacket(&session->ctrldtls, session->ctrlsocket.socket[session->ctrlsocket.type], session->responsefragmentpacket, &session->acctrladdress, &session->wtpctrladdress)) {
|
||||
/* Response is already created and saved. When receive a re-request, DFA autoresponse */
|
||||
capwap_logging_debug("Warning: error to send configuration status response packet");
|
||||
}
|
||||
|
||||
/* Change state */
|
||||
ac_dfa_change_state(session, CAPWAP_DATA_CHECK_STATE);
|
||||
capwap_set_timeout(session->dfa.rfcChangeStatePendingTimer, &session->timeout, CAPWAP_TIMER_CONTROL_CONNECTION);
|
||||
} else {
|
||||
/* Configure timeout */
|
||||
ac_dfa_change_state(session, CAPWAP_CONFIGURE_TO_DTLS_TEARDOWN_STATE);
|
||||
|
@ -6,6 +6,11 @@
|
||||
|
||||
/* */
|
||||
static int ac_dfa_state_join_check_authorizejoin(struct ac_session_t* session, struct ac_soap_response* response) {
|
||||
if (response->responsecode != HTTP_RESULT_OK) {
|
||||
/* TODO: check return failed code */
|
||||
return CAPWAP_RESULTCODE_JOIN_FAILURE_UNKNOWN_SOURCE;
|
||||
}
|
||||
|
||||
return CAPWAP_RESULTCODE_SUCCESS;
|
||||
}
|
||||
|
||||
@ -44,21 +49,8 @@ int ac_dfa_state_join(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
/* Request authorization of Backend for complete join */
|
||||
response = ac_soap_authorizejoin(session, wtpid);
|
||||
if (response) {
|
||||
/* Validate Join */
|
||||
resultcode.code = ac_dfa_state_join_check_authorizejoin(session, response);
|
||||
ac_soapclient_free_response(response);
|
||||
|
||||
/* Valid WTP */
|
||||
if (resultcode.code == CAPWAP_RESULTCODE_SUCCESS) {
|
||||
session->wtpid = wtpid;
|
||||
wtpid = NULL;
|
||||
|
||||
/* Session id */
|
||||
memcpy(&session->sessionid, sessionid, sizeof(struct capwap_sessionid_element));
|
||||
|
||||
/* Binding */
|
||||
session->binding = binding;
|
||||
}
|
||||
} else {
|
||||
resultcode.code = CAPWAP_RESULTCODE_JOIN_FAILURE_UNKNOWN_SOURCE;
|
||||
}
|
||||
@ -67,7 +59,11 @@ int ac_dfa_state_join(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
}
|
||||
|
||||
/* */
|
||||
if (wtpid) {
|
||||
if (CAPWAP_RESULTCODE_OK(resultcode.code)) {
|
||||
session->wtpid = wtpid;
|
||||
memcpy(&session->sessionid, sessionid, sizeof(struct capwap_sessionid_element));
|
||||
session->binding = binding;
|
||||
} else {
|
||||
capwap_free(wtpid);
|
||||
}
|
||||
} else {
|
||||
@ -88,7 +84,7 @@ int ac_dfa_state_join(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_RESULTCODE, &resultcode);
|
||||
|
||||
/* Check is valid packet after parsing request */
|
||||
if ((resultcode.code == CAPWAP_RESULTCODE_SUCCESS) || (resultcode.code == CAPWAP_RESULTCODE_SUCCESS_NAT_DETECTED)) {
|
||||
if (CAPWAP_RESULTCODE_OK(resultcode.code)) {
|
||||
struct capwap_list* controllist;
|
||||
struct capwap_list_item* item;
|
||||
|
||||
@ -125,7 +121,7 @@ int ac_dfa_state_join(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_CONTROLIPV4, &element);
|
||||
} else if (sessioncontrol->localaddress.ss_family == AF_INET6) {
|
||||
struct capwap_controlipv6_element element;
|
||||
|
||||
|
||||
memcpy(&element.address, &((struct sockaddr_in6*)&sessioncontrol->localaddress)->sin6_addr, sizeof(struct in6_addr));
|
||||
element.wtpcount = sessioncontrol->count;
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_CONTROLIPV6, &element);
|
||||
@ -170,7 +166,12 @@ int ac_dfa_state_join(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
|
||||
/* Send Join response to WTP */
|
||||
if (capwap_crypt_sendto_fragmentpacket(&session->ctrldtls, session->ctrlsocket.socket[session->ctrlsocket.type], session->responsefragmentpacket, &session->acctrladdress, &session->wtpctrladdress)) {
|
||||
ac_dfa_change_state(session, CAPWAP_POSTJOIN_STATE);
|
||||
if (CAPWAP_RESULTCODE_OK(resultcode.code)) {
|
||||
ac_dfa_change_state(session, CAPWAP_POSTJOIN_STATE);
|
||||
} else {
|
||||
ac_dfa_change_state(session, CAPWAP_JOIN_TO_DTLS_TEARDOWN_STATE);
|
||||
status = AC_DFA_NO_PACKET;
|
||||
}
|
||||
} else {
|
||||
/* Error to send packets */
|
||||
capwap_logging_debug("Warning: error to send join response packet");
|
||||
|
@ -15,6 +15,14 @@ int ac_dfa_state_reset(struct ac_session_t* session, struct capwap_parsed_packet
|
||||
/* */
|
||||
binding = GET_WBID_HEADER(packet->rxmngpacket->header);
|
||||
if ((binding == session->binding) && (packet->rxmngpacket->ctrlmsg.type == CAPWAP_RESET_RESPONSE) && ((session->localseqnumber - 1) == packet->rxmngpacket->ctrlmsg.seq)) {
|
||||
struct capwap_resultcode_element* resultcode;
|
||||
|
||||
/* Check the success of the Request */
|
||||
resultcode = (struct capwap_resultcode_element*)capwap_get_message_element_data(packet, CAPWAP_ELEMENT_RESULTCODE);
|
||||
if (resultcode && !CAPWAP_RESULTCODE_OK(resultcode->code)) {
|
||||
capwap_logging_warning("Receive Reset Response with error: %d", (int)resultcode->code);
|
||||
}
|
||||
|
||||
ac_dfa_change_state(session, CAPWAP_RESET_TO_DTLS_TEARDOWN_STATE);
|
||||
status = AC_DFA_NO_PACKET;
|
||||
}
|
||||
|
@ -428,6 +428,47 @@ static void ac_free_packet_rxmng(struct ac_session_t* session, int isctrlmsg) {
|
||||
}
|
||||
}
|
||||
|
||||
/* */
|
||||
static void ac_send_invalid_request(struct ac_session_t* session, struct capwap_packet_rxmng* rxmngpacket, struct capwap_connection* connection, uint32_t errorcode) {
|
||||
struct capwap_header_data capwapheader;
|
||||
struct capwap_packet_txmng* txmngpacket;
|
||||
struct capwap_list* responsefragmentpacket;
|
||||
struct capwap_fragment_packet_item* packet;
|
||||
struct capwap_header* header;
|
||||
struct capwap_resultcode_element resultcode = { .code = errorcode };
|
||||
|
||||
ASSERT(rxmngpacket != NULL);
|
||||
ASSERT(rxmngpacket->fragmentlist->first != NULL);
|
||||
ASSERT(connection != NULL);
|
||||
|
||||
/* */
|
||||
packet = (struct capwap_fragment_packet_item*)rxmngpacket->fragmentlist->first->item;
|
||||
header = (struct capwap_header*)packet->buffer;
|
||||
|
||||
/* Odd message type */
|
||||
capwap_header_init(&capwapheader, CAPWAP_RADIOID_NONE, GET_WBID_HEADER(header));
|
||||
txmngpacket = capwap_packet_txmng_create_ctrl_message(&capwapheader, rxmngpacket->ctrlmsg.type + 1, rxmngpacket->ctrlmsg.seq, session->mtu);
|
||||
|
||||
/* Add message element */
|
||||
capwap_packet_txmng_add_message_element(txmngpacket, CAPWAP_ELEMENT_RESULTCODE, &resultcode);
|
||||
|
||||
/* Unknown response complete, get fragment packets */
|
||||
responsefragmentpacket = capwap_list_create();
|
||||
capwap_packet_txmng_get_fragment_packets(txmngpacket, responsefragmentpacket, session->fragmentid);
|
||||
if (responsefragmentpacket->count > 1) {
|
||||
session->fragmentid++;
|
||||
}
|
||||
|
||||
/* Free packets manager */
|
||||
capwap_packet_txmng_free(txmngpacket);
|
||||
|
||||
/* Send unknown response */
|
||||
capwap_crypt_sendto_fragmentpacket(&session->ctrldtls, connection->socket.socket[connection->socket.type], responsefragmentpacket, &connection->localaddr, &connection->remoteaddr);
|
||||
|
||||
/* Don't buffering a packets sent */
|
||||
capwap_list_free(responsefragmentpacket);
|
||||
}
|
||||
|
||||
/* */
|
||||
static void ac_session_run(struct ac_session_t* session) {
|
||||
int res;
|
||||
@ -491,7 +532,8 @@ static void ac_session_run(struct ac_session_t* session) {
|
||||
res = capwap_check_message_type(rxmngpacket);
|
||||
if (res != VALID_MESSAGE_TYPE) {
|
||||
if (res == INVALID_REQUEST_MESSAGE_TYPE) {
|
||||
/*TODO wtp_send_invalid_request(rxmngpacket, &connection);*/
|
||||
capwap_logging_warning("Unexpected Unrecognized Request, send Response Packet with error");
|
||||
ac_send_invalid_request(session, rxmngpacket, &connection, CAPWAP_RESULTCODE_MSG_UNEXPECTED_UNRECOGNIZED_REQUEST);
|
||||
}
|
||||
|
||||
ignorepacket = 1;
|
||||
@ -505,14 +547,25 @@ static void ac_session_run(struct ac_session_t* session) {
|
||||
|
||||
/* Parsing packet */
|
||||
if (!ignorepacket) {
|
||||
if (!capwap_parsing_packet(rxmngpacket, &connection, &packet)) {
|
||||
res = capwap_parsing_packet(rxmngpacket, &connection, &packet);
|
||||
if (res == PARSING_COMPLETE) {
|
||||
/* Validate packet */
|
||||
if (capwap_validate_parsed_packet(&packet, NULL)) {
|
||||
/* TODO gestione errore risposta */
|
||||
if (isctrlsocket && capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
||||
capwap_logging_warning("Missing Mandatory Message Element, send Response Packet with error");
|
||||
ac_send_invalid_request(session, rxmngpacket, &connection, CAPWAP_RESULTCODE_FAILURE_MISSING_MANDATORY_MSG_ELEMENT);
|
||||
}
|
||||
|
||||
ignorepacket = 1;
|
||||
capwap_logging_debug("Failed validation parsed packet");
|
||||
}
|
||||
} else {
|
||||
if (isctrlsocket && (res == UNRECOGNIZED_MESSAGE_ELEMENT) && capwap_is_request_type(rxmngpacket->ctrlmsg.type)) {
|
||||
capwap_logging_warning("Unrecognized Message Element, send Response Packet with error");
|
||||
ac_send_invalid_request(session, rxmngpacket, &connection, CAPWAP_RESULTCODE_FAILURE_UNRECOGNIZED_MESSAGE_ELEMENT);
|
||||
/* TODO: add the unrecognized message element */
|
||||
}
|
||||
|
||||
ignorepacket = 1;
|
||||
capwap_logging_debug("Failed parsing packet");
|
||||
}
|
||||
|
@ -137,7 +137,8 @@ int ac_dfa_state_dead(struct ac_session_t* session, struct capwap_parsed_packet*
|
||||
|
||||
/* Soap function */
|
||||
struct ac_soap_response* ac_session_send_soap_request(struct ac_session_t* session, char* method, int numparam, ...);
|
||||
#define ac_soap_authorizejoin(s, wtpid) ac_session_send_soap_request((s), "authorizeJoin", 1, "xs:string", "wtpid", wtpid)
|
||||
#define ac_soap_authorizejoin(s, wtpid) ac_session_send_soap_request((s), "authorizeJoin", 1, "xs:string", "wtpid", wtpid)
|
||||
#define ac_soap_configureStatus(s, wtpid, confstatus) ac_session_send_soap_request((s), "configureStatus", 2, "xs:string", "wtpid", wtpid, "xs:base64Binary", "confstatus", confstatus)
|
||||
|
||||
|
||||
#endif /* __AC_SESSION_HEADER__ */
|
||||
|
Reference in New Issue
Block a user