LCOV - code coverage report
Current view: top level - src/ap - tkip_countermeasures.c (source / functions) Hit Total Coverage
Test: wpa_supplicant/hostapd combined for hwsim test run 1443382998 Lines: 35 44 79.5 %
Date: 2015-09-27 Functions: 3 4 75.0 %

          Line data    Source code
       1             : /*
       2             :  * hostapd / TKIP countermeasures
       3             :  * Copyright (c) 2002-2012, Jouni Malinen <j@w1.fi>
       4             :  *
       5             :  * This software may be distributed under the terms of the BSD license.
       6             :  * See README for more details.
       7             :  */
       8             : 
       9             : #include "utils/includes.h"
      10             : 
      11             : #include "utils/common.h"
      12             : #include "utils/eloop.h"
      13             : #include "common/ieee802_11_defs.h"
      14             : #include "radius/radius.h"
      15             : #include "hostapd.h"
      16             : #include "sta_info.h"
      17             : #include "ap_mlme.h"
      18             : #include "wpa_auth.h"
      19             : #include "ap_drv_ops.h"
      20             : #include "tkip_countermeasures.h"
      21             : 
      22             : 
      23           0 : static void ieee80211_tkip_countermeasures_stop(void *eloop_ctx,
      24             :                                                 void *timeout_ctx)
      25             : {
      26           0 :         struct hostapd_data *hapd = eloop_ctx;
      27           0 :         hapd->tkip_countermeasures = 0;
      28           0 :         hostapd_drv_set_countermeasures(hapd, 0);
      29           0 :         hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
      30             :                        HOSTAPD_LEVEL_INFO, "TKIP countermeasures ended");
      31           0 : }
      32             : 
      33             : 
      34           3 : static void ieee80211_tkip_countermeasures_start(struct hostapd_data *hapd)
      35             : {
      36             :         struct sta_info *sta;
      37             : 
      38           3 :         hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE80211,
      39             :                        HOSTAPD_LEVEL_INFO, "TKIP countermeasures initiated");
      40             : 
      41           3 :         wpa_auth_countermeasures_start(hapd->wpa_auth);
      42           3 :         hapd->tkip_countermeasures = 1;
      43           3 :         hostapd_drv_set_countermeasures(hapd, 1);
      44           3 :         wpa_gtk_rekey(hapd->wpa_auth);
      45           3 :         eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
      46           3 :         eloop_register_timeout(60, 0, ieee80211_tkip_countermeasures_stop,
      47             :                                hapd, NULL);
      48           9 :         while ((sta = hapd->sta_list)) {
      49           3 :                 sta->acct_terminate_cause =
      50             :                         RADIUS_ACCT_TERMINATE_CAUSE_ADMIN_RESET;
      51           3 :                 if (sta->flags & WLAN_STA_AUTH) {
      52           3 :                         mlme_deauthenticate_indication(
      53             :                                 hapd, sta,
      54             :                                 WLAN_REASON_MICHAEL_MIC_FAILURE);
      55             :                 }
      56           3 :                 hostapd_drv_sta_deauth(hapd, sta->addr,
      57             :                                        WLAN_REASON_MICHAEL_MIC_FAILURE);
      58           3 :                 ap_free_sta(hapd, sta);
      59             :         }
      60           3 : }
      61             : 
      62             : 
      63        2055 : void ieee80211_tkip_countermeasures_deinit(struct hostapd_data *hapd)
      64             : {
      65        2055 :         eloop_cancel_timeout(ieee80211_tkip_countermeasures_stop, hapd, NULL);
      66        2055 : }
      67             : 
      68             : 
      69           6 : int michael_mic_failure(struct hostapd_data *hapd, const u8 *addr, int local)
      70             : {
      71             :         struct os_reltime now;
      72           6 :         int ret = 0;
      73             : 
      74           6 :         if (addr && local) {
      75           2 :                 struct sta_info *sta = ap_get_sta(hapd, addr);
      76           2 :                 if (sta != NULL) {
      77           2 :                         wpa_auth_sta_local_mic_failure_report(sta->wpa_sm);
      78           2 :                         hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE80211,
      79             :                                        HOSTAPD_LEVEL_INFO,
      80             :                                        "Michael MIC failure detected in "
      81             :                                        "received frame");
      82           2 :                         mlme_michaelmicfailure_indication(hapd, addr);
      83             :                 } else {
      84           0 :                         wpa_printf(MSG_DEBUG,
      85             :                                    "MLME-MICHAELMICFAILURE.indication "
      86             :                                    "for not associated STA (" MACSTR
      87           0 :                                    ") ignored", MAC2STR(addr));
      88           0 :                         return ret;
      89             :                 }
      90             :         }
      91             : 
      92           6 :         os_get_reltime(&now);
      93           6 :         if (os_reltime_expired(&now, &hapd->michael_mic_failure, 60)) {
      94           3 :                 hapd->michael_mic_failures = 1;
      95             :         } else {
      96           3 :                 hapd->michael_mic_failures++;
      97           3 :                 if (hapd->michael_mic_failures > 1) {
      98           3 :                         ieee80211_tkip_countermeasures_start(hapd);
      99           3 :                         ret = 1;
     100             :                 }
     101             :         }
     102           6 :         hapd->michael_mic_failure = now;
     103             : 
     104           6 :         return ret;
     105             : }

Generated by: LCOV version 1.10