P2P: Add support for IP address assignment in 4-way handshake
This new mechanism allows P2P Client to request an IPv4 address from the GO as part of the 4-way handshake to avoid use of DHCP exchange after 4-way handshake. If the new mechanism is used, the assigned IP address is shown in the P2P-GROUP-STARTED event on the client side with following new parameters: ip_addr, ip_mask, go_ip_addr. The assigned IP address is included in the AP-STA-CONNECTED event on the GO side as a new ip_addr parameter. The IP address is valid for the duration of the association. The IP address pool for this new mechanism is configured as global wpa_supplicant configuration file parameters ip_addr_go, ip_addr_mask, ip_addr_star, ip_addr_end. For example: ip_addr_go=192.168.42.1 ip_addr_mask=255.255.255.0 ip_addr_start=192.168.42.2 ip_addr_end=192.168.42.100 DHCP mechanism is expected to be enabled at the same time to support P2P Devices that do not use the new mechanism. The easiest way of managing the IP addresses is by splitting the IP address range into two parts and assign a separate range for wpa_supplicant and DHCP server. Signed-hostap: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
fdd48ff6e0
commit
25ef8529c1
26 changed files with 327 additions and 8 deletions
|
@ -379,6 +379,8 @@ static void wpa_supplicant_process_1_of_4(struct wpa_sm *sm,
|
|||
struct wpa_ptk *ptk;
|
||||
u8 buf[8];
|
||||
int res;
|
||||
u8 *kde, *kde_buf = NULL;
|
||||
size_t kde_len;
|
||||
|
||||
if (wpa_sm_get_network_ctx(sm) == NULL) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING, "WPA: No SSID info "
|
||||
|
@ -435,15 +437,39 @@ static void wpa_supplicant_process_1_of_4(struct wpa_sm *sm,
|
|||
os_memcpy(ptk->u.auth.rx_mic_key, buf, 8);
|
||||
sm->tptk_set = 1;
|
||||
|
||||
kde = sm->assoc_wpa_ie;
|
||||
kde_len = sm->assoc_wpa_ie_len;
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
if (sm->p2p) {
|
||||
kde_buf = os_malloc(kde_len + 2 + RSN_SELECTOR_LEN + 1);
|
||||
if (kde_buf) {
|
||||
u8 *pos;
|
||||
wpa_printf(MSG_DEBUG, "P2P: Add IP Address Request KDE "
|
||||
"into EAPOL-Key 2/4");
|
||||
os_memcpy(kde_buf, kde, kde_len);
|
||||
kde = kde_buf;
|
||||
pos = kde + kde_len;
|
||||
*pos++ = WLAN_EID_VENDOR_SPECIFIC;
|
||||
*pos++ = RSN_SELECTOR_LEN + 1;
|
||||
RSN_SELECTOR_PUT(pos, WFA_KEY_DATA_IP_ADDR_REQ);
|
||||
pos += RSN_SELECTOR_LEN;
|
||||
*pos++ = 0x01;
|
||||
kde_len = pos - kde;
|
||||
}
|
||||
}
|
||||
#endif /* CONFIG_P2P */
|
||||
|
||||
if (wpa_supplicant_send_2_of_4(sm, sm->bssid, key, ver, sm->snonce,
|
||||
sm->assoc_wpa_ie, sm->assoc_wpa_ie_len,
|
||||
ptk))
|
||||
kde, kde_len, ptk))
|
||||
goto failed;
|
||||
|
||||
os_free(kde_buf);
|
||||
os_memcpy(sm->anonce, key->key_nonce, WPA_NONCE_LEN);
|
||||
return;
|
||||
|
||||
failed:
|
||||
os_free(kde_buf);
|
||||
wpa_sm_deauthenticate(sm, WLAN_REASON_UNSPECIFIED);
|
||||
}
|
||||
|
||||
|
@ -1090,6 +1116,14 @@ static void wpa_supplicant_process_3_of_4(struct wpa_sm *sm,
|
|||
goto failed;
|
||||
}
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
if (ie.ip_addr_alloc) {
|
||||
os_memcpy(sm->p2p_ip_addr, ie.ip_addr_alloc, 3 * 4);
|
||||
wpa_hexdump(MSG_DEBUG, "P2P: IP address info",
|
||||
sm->p2p_ip_addr, sizeof(sm->p2p_ip_addr));
|
||||
}
|
||||
#endif /* CONFIG_P2P */
|
||||
|
||||
if (wpa_supplicant_send_4_of_4(sm, sm->bssid, key, ver, key_info,
|
||||
NULL, 0, &sm->ptk)) {
|
||||
goto failed;
|
||||
|
@ -2086,6 +2120,10 @@ void wpa_sm_notify_assoc(struct wpa_sm *sm, const u8 *bssid)
|
|||
#ifdef CONFIG_TDLS
|
||||
wpa_tdls_assoc(sm);
|
||||
#endif /* CONFIG_TDLS */
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
os_memset(sm->p2p_ip_addr, 0, sizeof(sm->p2p_ip_addr));
|
||||
#endif /* CONFIG_P2P */
|
||||
}
|
||||
|
||||
|
||||
|
@ -2209,6 +2247,7 @@ void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config)
|
|||
} else
|
||||
sm->ssid_len = 0;
|
||||
sm->wpa_ptk_rekey = config->wpa_ptk_rekey;
|
||||
sm->p2p = config->p2p;
|
||||
} else {
|
||||
sm->network_ctx = NULL;
|
||||
sm->peerkey_enabled = 0;
|
||||
|
@ -2218,6 +2257,7 @@ void wpa_sm_set_config(struct wpa_sm *sm, struct rsn_supp_config *config)
|
|||
sm->eap_conf_ctx = NULL;
|
||||
sm->ssid_len = 0;
|
||||
sm->wpa_ptk_rekey = 0;
|
||||
sm->p2p = 0;
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -2731,3 +2771,16 @@ int wpa_sm_rx_eapol_peerkey(struct wpa_sm *sm, const u8 *src_addr,
|
|||
return 1;
|
||||
}
|
||||
#endif /* CONFIG_PEERKEY */
|
||||
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
|
||||
int wpa_sm_get_p2p_ip_addr(struct wpa_sm *sm, u8 *buf)
|
||||
{
|
||||
if (sm == NULL || WPA_GET_BE32(sm->p2p_ip_addr) == 0)
|
||||
return -1;
|
||||
os_memcpy(buf, sm->p2p_ip_addr, 3 * 4);
|
||||
return 0;
|
||||
}
|
||||
|
||||
#endif /* CONFIG_P2P */
|
||||
|
|
|
@ -95,6 +95,7 @@ struct rsn_supp_config {
|
|||
const u8 *ssid;
|
||||
size_t ssid_len;
|
||||
int wpa_ptk_rekey;
|
||||
int p2p;
|
||||
};
|
||||
|
||||
#ifndef CONFIG_NO_WPA
|
||||
|
@ -145,6 +146,8 @@ void wpa_sm_update_replay_ctr(struct wpa_sm *sm, const u8 *replay_ctr);
|
|||
|
||||
void wpa_sm_pmksa_cache_flush(struct wpa_sm *sm, void *network_ctx);
|
||||
|
||||
int wpa_sm_get_p2p_ip_addr(struct wpa_sm *sm, u8 *buf);
|
||||
|
||||
#else /* CONFIG_NO_WPA */
|
||||
|
||||
static inline struct wpa_sm * wpa_sm_init(struct wpa_sm_ctx *ctx)
|
||||
|
|
|
@ -58,6 +58,7 @@ struct wpa_sm {
|
|||
u8 ssid[32];
|
||||
size_t ssid_len;
|
||||
int wpa_ptk_rekey;
|
||||
int p2p;
|
||||
|
||||
u8 own_addr[ETH_ALEN];
|
||||
const char *ifname;
|
||||
|
@ -122,6 +123,10 @@ struct wpa_sm {
|
|||
u8 *assoc_resp_ies; /* MDIE and FTIE from (Re)Association Response */
|
||||
size_t assoc_resp_ies_len;
|
||||
#endif /* CONFIG_IEEE80211R */
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
u8 p2p_ip_addr[3 * 4];
|
||||
#endif /* CONFIG_P2P */
|
||||
};
|
||||
|
||||
|
||||
|
|
|
@ -345,6 +345,25 @@ static int wpa_parse_generic(const u8 *pos, const u8 *end,
|
|||
}
|
||||
#endif /* CONFIG_IEEE80211W */
|
||||
|
||||
#ifdef CONFIG_P2P
|
||||
if (pos[1] >= RSN_SELECTOR_LEN + 1 &&
|
||||
RSN_SELECTOR_GET(pos + 2) == WFA_KEY_DATA_IP_ADDR_REQ) {
|
||||
ie->ip_addr_req = pos + 2 + RSN_SELECTOR_LEN;
|
||||
wpa_hexdump(MSG_DEBUG, "WPA: IP Address Request in EAPOL-Key",
|
||||
ie->ip_addr_req, pos[1] - RSN_SELECTOR_LEN);
|
||||
return 0;
|
||||
}
|
||||
|
||||
if (pos[1] >= RSN_SELECTOR_LEN + 3 * 4 &&
|
||||
RSN_SELECTOR_GET(pos + 2) == WFA_KEY_DATA_IP_ADDR_ALLOC) {
|
||||
ie->ip_addr_alloc = pos + 2 + RSN_SELECTOR_LEN;
|
||||
wpa_hexdump(MSG_DEBUG,
|
||||
"WPA: IP Address Allocation in EAPOL-Key",
|
||||
ie->ip_addr_alloc, pos[1] - RSN_SELECTOR_LEN);
|
||||
return 0;
|
||||
}
|
||||
#endif /* CONFIG_P2P */
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
|
|
@ -59,6 +59,10 @@ struct wpa_eapol_ie_parse {
|
|||
size_t supp_oper_classes_len;
|
||||
u8 qosinfo;
|
||||
u16 aid;
|
||||
#ifdef CONFIG_P2P
|
||||
const u8 *ip_addr_req;
|
||||
const u8 *ip_addr_alloc;
|
||||
#endif /* CONFIG_P2P */
|
||||
};
|
||||
|
||||
int wpa_supplicant_parse_ies(const u8 *buf, size_t len,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue