1214501Srpaulo/* 2214501Srpaulo * hostapd / IEEE 802.11F-2003 Inter-Access Point Protocol (IAPP) 3214501Srpaulo * Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi> 4214501Srpaulo * 5214501Srpaulo * This program is free software; you can redistribute it and/or modify 6214501Srpaulo * it under the terms of the GNU General Public License version 2 as 7214501Srpaulo * published by the Free Software Foundation. 8214501Srpaulo * 9214501Srpaulo * Alternatively, this software may be distributed under the terms of BSD 10214501Srpaulo * license. 11214501Srpaulo * 12214501Srpaulo * See README and COPYING for more details. 13214501Srpaulo * 14214501Srpaulo * Note: IEEE 802.11F-2003 was a experimental use specification. It has expired 15214501Srpaulo * and IEEE has withdrawn it. In other words, it is likely better to look at 16214501Srpaulo * using some other mechanism for AP-to-AP communication than extending the 17214501Srpaulo * implementation here. 18214501Srpaulo */ 19214501Srpaulo 20214501Srpaulo/* TODO: 21214501Srpaulo * Level 1: no administrative or security support 22214501Srpaulo * (e.g., static BSSID to IP address mapping in each AP) 23214501Srpaulo * Level 2: support for dynamic mapping of BSSID to IP address 24214501Srpaulo * Level 3: support for encryption and authentication of IAPP messages 25214501Srpaulo * - add support for MOVE-notify and MOVE-response (this requires support for 26214501Srpaulo * finding out IP address for previous AP using RADIUS) 27214501Srpaulo * - add support for Send- and ACK-Security-Block to speedup IEEE 802.1X during 28214501Srpaulo * reassociation to another AP 29214501Srpaulo * - implement counters etc. for IAPP MIB 30214501Srpaulo * - verify endianness of fields in IAPP messages; are they big-endian as 31214501Srpaulo * used here? 32214501Srpaulo * - RADIUS connection for AP registration and BSSID to IP address mapping 33214501Srpaulo * - TCP connection for IAPP MOVE, CACHE 34214501Srpaulo * - broadcast ESP for IAPP ADD-notify 35214501Srpaulo * - ESP for IAPP MOVE messages 36214501Srpaulo * - security block sending/processing 37214501Srpaulo * - IEEE 802.11 context transfer 38214501Srpaulo */ 39214501Srpaulo 40214501Srpaulo#include "utils/includes.h" 41214501Srpaulo#include <net/if.h> 42214501Srpaulo#include <sys/ioctl.h> 43214501Srpaulo#ifdef USE_KERNEL_HEADERS 44214501Srpaulo#include <linux/if_packet.h> 45214501Srpaulo#else /* USE_KERNEL_HEADERS */ 46214501Srpaulo#include <netpacket/packet.h> 47214501Srpaulo#endif /* USE_KERNEL_HEADERS */ 48214501Srpaulo 49214501Srpaulo#include "utils/common.h" 50214501Srpaulo#include "utils/eloop.h" 51214501Srpaulo#include "common/ieee802_11_defs.h" 52214501Srpaulo#include "hostapd.h" 53214501Srpaulo#include "ap_config.h" 54214501Srpaulo#include "ieee802_11.h" 55214501Srpaulo#include "sta_info.h" 56214501Srpaulo#include "iapp.h" 57214501Srpaulo 58214501Srpaulo 59214501Srpaulo#define IAPP_MULTICAST "224.0.1.178" 60214501Srpaulo#define IAPP_UDP_PORT 3517 61214501Srpaulo#define IAPP_TCP_PORT 3517 62214501Srpaulo 63214501Srpaulostruct iapp_hdr { 64214501Srpaulo u8 version; 65214501Srpaulo u8 command; 66214501Srpaulo be16 identifier; 67214501Srpaulo be16 length; 68214501Srpaulo /* followed by length-6 octets of data */ 69214501Srpaulo} __attribute__ ((packed)); 70214501Srpaulo 71214501Srpaulo#define IAPP_VERSION 0 72214501Srpaulo 73214501Srpauloenum IAPP_COMMAND { 74214501Srpaulo IAPP_CMD_ADD_notify = 0, 75214501Srpaulo IAPP_CMD_MOVE_notify = 1, 76214501Srpaulo IAPP_CMD_MOVE_response = 2, 77214501Srpaulo IAPP_CMD_Send_Security_Block = 3, 78214501Srpaulo IAPP_CMD_ACK_Security_Block = 4, 79214501Srpaulo IAPP_CMD_CACHE_notify = 5, 80214501Srpaulo IAPP_CMD_CACHE_response = 6, 81214501Srpaulo}; 82214501Srpaulo 83214501Srpaulo 84214501Srpaulo/* ADD-notify - multicast UDP on the local LAN */ 85214501Srpaulostruct iapp_add_notify { 86214501Srpaulo u8 addr_len; /* ETH_ALEN */ 87214501Srpaulo u8 reserved; 88214501Srpaulo u8 mac_addr[ETH_ALEN]; 89214501Srpaulo be16 seq_num; 90214501Srpaulo} __attribute__ ((packed)); 91214501Srpaulo 92214501Srpaulo 93214501Srpaulo/* Layer 2 Update frame (802.2 Type 1 LLC XID Update response) */ 94214501Srpaulostruct iapp_layer2_update { 95214501Srpaulo u8 da[ETH_ALEN]; /* broadcast */ 96214501Srpaulo u8 sa[ETH_ALEN]; /* STA addr */ 97214501Srpaulo be16 len; /* 6 */ 98214501Srpaulo u8 dsap; /* null DSAP address */ 99214501Srpaulo u8 ssap; /* null SSAP address, CR=Response */ 100214501Srpaulo u8 control; 101214501Srpaulo u8 xid_info[3]; 102214501Srpaulo} __attribute__ ((packed)); 103214501Srpaulo 104214501Srpaulo 105214501Srpaulo/* MOVE-notify - unicast TCP */ 106214501Srpaulostruct iapp_move_notify { 107214501Srpaulo u8 addr_len; /* ETH_ALEN */ 108214501Srpaulo u8 reserved; 109214501Srpaulo u8 mac_addr[ETH_ALEN]; 110214501Srpaulo u16 seq_num; 111214501Srpaulo u16 ctx_block_len; 112214501Srpaulo /* followed by ctx_block_len bytes */ 113214501Srpaulo} __attribute__ ((packed)); 114214501Srpaulo 115214501Srpaulo 116214501Srpaulo/* MOVE-response - unicast TCP */ 117214501Srpaulostruct iapp_move_response { 118214501Srpaulo u8 addr_len; /* ETH_ALEN */ 119214501Srpaulo u8 status; 120214501Srpaulo u8 mac_addr[ETH_ALEN]; 121214501Srpaulo u16 seq_num; 122214501Srpaulo u16 ctx_block_len; 123214501Srpaulo /* followed by ctx_block_len bytes */ 124214501Srpaulo} __attribute__ ((packed)); 125214501Srpaulo 126214501Srpauloenum { 127214501Srpaulo IAPP_MOVE_SUCCESSFUL = 0, 128214501Srpaulo IAPP_MOVE_DENIED = 1, 129214501Srpaulo IAPP_MOVE_STALE_MOVE = 2, 130214501Srpaulo}; 131214501Srpaulo 132214501Srpaulo 133214501Srpaulo/* CACHE-notify */ 134214501Srpaulostruct iapp_cache_notify { 135214501Srpaulo u8 addr_len; /* ETH_ALEN */ 136214501Srpaulo u8 reserved; 137214501Srpaulo u8 mac_addr[ETH_ALEN]; 138214501Srpaulo u16 seq_num; 139214501Srpaulo u8 current_ap[ETH_ALEN]; 140214501Srpaulo u16 ctx_block_len; 141214501Srpaulo /* ctx_block_len bytes of context block followed by 16-bit context 142214501Srpaulo * timeout */ 143214501Srpaulo} __attribute__ ((packed)); 144214501Srpaulo 145214501Srpaulo 146214501Srpaulo/* CACHE-response - unicast TCP */ 147214501Srpaulostruct iapp_cache_response { 148214501Srpaulo u8 addr_len; /* ETH_ALEN */ 149214501Srpaulo u8 status; 150214501Srpaulo u8 mac_addr[ETH_ALEN]; 151214501Srpaulo u16 seq_num; 152214501Srpaulo} __attribute__ ((packed)); 153214501Srpaulo 154214501Srpauloenum { 155214501Srpaulo IAPP_CACHE_SUCCESSFUL = 0, 156214501Srpaulo IAPP_CACHE_STALE_CACHE = 1, 157214501Srpaulo}; 158214501Srpaulo 159214501Srpaulo 160214501Srpaulo/* Send-Security-Block - unicast TCP */ 161214501Srpaulostruct iapp_send_security_block { 162214501Srpaulo u8 iv[8]; 163214501Srpaulo u16 sec_block_len; 164214501Srpaulo /* followed by sec_block_len bytes of security block */ 165214501Srpaulo} __attribute__ ((packed)); 166214501Srpaulo 167214501Srpaulo 168214501Srpaulo/* ACK-Security-Block - unicast TCP */ 169214501Srpaulostruct iapp_ack_security_block { 170214501Srpaulo u8 iv[8]; 171214501Srpaulo u8 new_ap_ack_authenticator[48]; 172214501Srpaulo} __attribute__ ((packed)); 173214501Srpaulo 174214501Srpaulo 175214501Srpaulostruct iapp_data { 176214501Srpaulo struct hostapd_data *hapd; 177214501Srpaulo u16 identifier; /* next IAPP identifier */ 178214501Srpaulo struct in_addr own, multicast; 179214501Srpaulo int udp_sock; 180214501Srpaulo int packet_sock; 181214501Srpaulo}; 182214501Srpaulo 183214501Srpaulo 184214501Srpaulostatic void iapp_send_add(struct iapp_data *iapp, u8 *mac_addr, u16 seq_num) 185214501Srpaulo{ 186214501Srpaulo char buf[128]; 187214501Srpaulo struct iapp_hdr *hdr; 188214501Srpaulo struct iapp_add_notify *add; 189214501Srpaulo struct sockaddr_in addr; 190214501Srpaulo 191214501Srpaulo /* Send IAPP ADD-notify to remove possible association from other APs 192214501Srpaulo */ 193214501Srpaulo 194214501Srpaulo hdr = (struct iapp_hdr *) buf; 195214501Srpaulo hdr->version = IAPP_VERSION; 196214501Srpaulo hdr->command = IAPP_CMD_ADD_notify; 197214501Srpaulo hdr->identifier = host_to_be16(iapp->identifier++); 198214501Srpaulo hdr->length = host_to_be16(sizeof(*hdr) + sizeof(*add)); 199214501Srpaulo 200214501Srpaulo add = (struct iapp_add_notify *) (hdr + 1); 201214501Srpaulo add->addr_len = ETH_ALEN; 202214501Srpaulo add->reserved = 0; 203214501Srpaulo os_memcpy(add->mac_addr, mac_addr, ETH_ALEN); 204214501Srpaulo 205214501Srpaulo add->seq_num = host_to_be16(seq_num); 206214501Srpaulo 207214501Srpaulo os_memset(&addr, 0, sizeof(addr)); 208214501Srpaulo addr.sin_family = AF_INET; 209214501Srpaulo addr.sin_addr.s_addr = iapp->multicast.s_addr; 210214501Srpaulo addr.sin_port = htons(IAPP_UDP_PORT); 211214501Srpaulo if (sendto(iapp->udp_sock, buf, (char *) (add + 1) - buf, 0, 212214501Srpaulo (struct sockaddr *) &addr, sizeof(addr)) < 0) 213214501Srpaulo perror("sendto[IAPP-ADD]"); 214214501Srpaulo} 215214501Srpaulo 216214501Srpaulo 217214501Srpaulostatic void iapp_send_layer2_update(struct iapp_data *iapp, u8 *addr) 218214501Srpaulo{ 219214501Srpaulo struct iapp_layer2_update msg; 220214501Srpaulo 221214501Srpaulo /* Send Level 2 Update Frame to update forwarding tables in layer 2 222214501Srpaulo * bridge devices */ 223214501Srpaulo 224214501Srpaulo /* 802.2 Type 1 Logical Link Control (LLC) Exchange Identifier (XID) 225214501Srpaulo * Update response frame; IEEE Std 802.2-1998, 5.4.1.2.1 */ 226214501Srpaulo 227214501Srpaulo os_memset(msg.da, 0xff, ETH_ALEN); 228214501Srpaulo os_memcpy(msg.sa, addr, ETH_ALEN); 229214501Srpaulo msg.len = host_to_be16(6); 230214501Srpaulo msg.dsap = 0; /* NULL DSAP address */ 231214501Srpaulo msg.ssap = 0x01; /* NULL SSAP address, CR Bit: Response */ 232214501Srpaulo msg.control = 0xaf; /* XID response lsb.1111F101. 233214501Srpaulo * F=0 (no poll command; unsolicited frame) */ 234214501Srpaulo msg.xid_info[0] = 0x81; /* XID format identifier */ 235214501Srpaulo msg.xid_info[1] = 1; /* LLC types/classes: Type 1 LLC */ 236214501Srpaulo msg.xid_info[2] = 1 << 1; /* XID sender's receive window size (RW) 237214501Srpaulo * FIX: what is correct RW with 802.11? */ 238214501Srpaulo 239214501Srpaulo if (send(iapp->packet_sock, &msg, sizeof(msg), 0) < 0) 240214501Srpaulo perror("send[L2 Update]"); 241214501Srpaulo} 242214501Srpaulo 243214501Srpaulo 244214501Srpaulo/** 245214501Srpaulo * iapp_new_station - IAPP processing for a new STA 246214501Srpaulo * @iapp: IAPP data 247214501Srpaulo * @sta: The associated station 248214501Srpaulo */ 249214501Srpaulovoid iapp_new_station(struct iapp_data *iapp, struct sta_info *sta) 250214501Srpaulo{ 251214501Srpaulo struct ieee80211_mgmt *assoc; 252214501Srpaulo u16 seq; 253214501Srpaulo 254214501Srpaulo if (iapp == NULL) 255214501Srpaulo return; 256214501Srpaulo 257214501Srpaulo assoc = sta->last_assoc_req; 258214501Srpaulo seq = assoc ? WLAN_GET_SEQ_SEQ(le_to_host16(assoc->seq_ctrl)) : 0; 259214501Srpaulo 260214501Srpaulo /* IAPP-ADD.request(MAC Address, Sequence Number, Timeout) */ 261214501Srpaulo hostapd_logger(iapp->hapd, sta->addr, HOSTAPD_MODULE_IAPP, 262214501Srpaulo HOSTAPD_LEVEL_DEBUG, "IAPP-ADD.request(seq=%d)", seq); 263214501Srpaulo iapp_send_layer2_update(iapp, sta->addr); 264214501Srpaulo iapp_send_add(iapp, sta->addr, seq); 265214501Srpaulo 266214501Srpaulo if (assoc && WLAN_FC_GET_STYPE(le_to_host16(assoc->frame_control)) == 267214501Srpaulo WLAN_FC_STYPE_REASSOC_REQ) { 268214501Srpaulo /* IAPP-MOVE.request(MAC Address, Sequence Number, Old AP, 269214501Srpaulo * Context Block, Timeout) 270214501Srpaulo */ 271214501Srpaulo /* TODO: Send IAPP-MOVE to the old AP; Map Old AP BSSID to 272214501Srpaulo * IP address */ 273214501Srpaulo } 274214501Srpaulo} 275214501Srpaulo 276214501Srpaulo 277214501Srpaulostatic void iapp_process_add_notify(struct iapp_data *iapp, 278214501Srpaulo struct sockaddr_in *from, 279214501Srpaulo struct iapp_hdr *hdr, int len) 280214501Srpaulo{ 281214501Srpaulo struct iapp_add_notify *add = (struct iapp_add_notify *) (hdr + 1); 282214501Srpaulo struct sta_info *sta; 283214501Srpaulo 284214501Srpaulo if (len != sizeof(*add)) { 285214501Srpaulo printf("Invalid IAPP-ADD packet length %d (expected %lu)\n", 286214501Srpaulo len, (unsigned long) sizeof(*add)); 287214501Srpaulo return; 288214501Srpaulo } 289214501Srpaulo 290214501Srpaulo sta = ap_get_sta(iapp->hapd, add->mac_addr); 291214501Srpaulo 292214501Srpaulo /* IAPP-ADD.indication(MAC Address, Sequence Number) */ 293214501Srpaulo hostapd_logger(iapp->hapd, add->mac_addr, HOSTAPD_MODULE_IAPP, 294214501Srpaulo HOSTAPD_LEVEL_INFO, 295214501Srpaulo "Received IAPP ADD-notify (seq# %d) from %s:%d%s", 296214501Srpaulo be_to_host16(add->seq_num), 297214501Srpaulo inet_ntoa(from->sin_addr), ntohs(from->sin_port), 298214501Srpaulo sta ? "" : " (STA not found)"); 299214501Srpaulo 300214501Srpaulo if (!sta) 301214501Srpaulo return; 302214501Srpaulo 303214501Srpaulo /* TODO: could use seq_num to try to determine whether last association 304214501Srpaulo * to this AP is newer than the one advertised in IAPP-ADD. Although, 305214501Srpaulo * this is not really a reliable verification. */ 306214501Srpaulo 307214501Srpaulo hostapd_logger(iapp->hapd, add->mac_addr, HOSTAPD_MODULE_IAPP, 308214501Srpaulo HOSTAPD_LEVEL_DEBUG, 309214501Srpaulo "Removing STA due to IAPP ADD-notify"); 310214501Srpaulo ap_sta_disconnect(iapp->hapd, sta, NULL, 0); 311214501Srpaulo} 312214501Srpaulo 313214501Srpaulo 314214501Srpaulo/** 315214501Srpaulo * iapp_receive_udp - Process IAPP UDP frames 316214501Srpaulo * @sock: File descriptor for the socket 317214501Srpaulo * @eloop_ctx: IAPP data (struct iapp_data *) 318214501Srpaulo * @sock_ctx: Not used 319214501Srpaulo */ 320214501Srpaulostatic void iapp_receive_udp(int sock, void *eloop_ctx, void *sock_ctx) 321214501Srpaulo{ 322214501Srpaulo struct iapp_data *iapp = eloop_ctx; 323214501Srpaulo int len, hlen; 324214501Srpaulo unsigned char buf[128]; 325214501Srpaulo struct sockaddr_in from; 326214501Srpaulo socklen_t fromlen; 327214501Srpaulo struct iapp_hdr *hdr; 328214501Srpaulo 329214501Srpaulo /* Handle incoming IAPP frames (over UDP/IP) */ 330214501Srpaulo 331214501Srpaulo fromlen = sizeof(from); 332214501Srpaulo len = recvfrom(iapp->udp_sock, buf, sizeof(buf), 0, 333214501Srpaulo (struct sockaddr *) &from, &fromlen); 334214501Srpaulo if (len < 0) { 335214501Srpaulo perror("recvfrom"); 336214501Srpaulo return; 337214501Srpaulo } 338214501Srpaulo 339214501Srpaulo if (from.sin_addr.s_addr == iapp->own.s_addr) 340214501Srpaulo return; /* ignore own IAPP messages */ 341214501Srpaulo 342214501Srpaulo hostapd_logger(iapp->hapd, NULL, HOSTAPD_MODULE_IAPP, 343214501Srpaulo HOSTAPD_LEVEL_DEBUG, 344214501Srpaulo "Received %d byte IAPP frame from %s%s\n", 345214501Srpaulo len, inet_ntoa(from.sin_addr), 346214501Srpaulo len < (int) sizeof(*hdr) ? " (too short)" : ""); 347214501Srpaulo 348214501Srpaulo if (len < (int) sizeof(*hdr)) 349214501Srpaulo return; 350214501Srpaulo 351214501Srpaulo hdr = (struct iapp_hdr *) buf; 352214501Srpaulo hlen = be_to_host16(hdr->length); 353214501Srpaulo hostapd_logger(iapp->hapd, NULL, HOSTAPD_MODULE_IAPP, 354214501Srpaulo HOSTAPD_LEVEL_DEBUG, 355214501Srpaulo "RX: version=%d command=%d id=%d len=%d\n", 356214501Srpaulo hdr->version, hdr->command, 357214501Srpaulo be_to_host16(hdr->identifier), hlen); 358214501Srpaulo if (hdr->version != IAPP_VERSION) { 359214501Srpaulo printf("Dropping IAPP frame with unknown version %d\n", 360214501Srpaulo hdr->version); 361214501Srpaulo return; 362214501Srpaulo } 363214501Srpaulo if (hlen > len) { 364214501Srpaulo printf("Underflow IAPP frame (hlen=%d len=%d)\n", hlen, len); 365214501Srpaulo return; 366214501Srpaulo } 367214501Srpaulo if (hlen < len) { 368214501Srpaulo printf("Ignoring %d extra bytes from IAPP frame\n", 369214501Srpaulo len - hlen); 370214501Srpaulo len = hlen; 371214501Srpaulo } 372214501Srpaulo 373214501Srpaulo switch (hdr->command) { 374214501Srpaulo case IAPP_CMD_ADD_notify: 375214501Srpaulo iapp_process_add_notify(iapp, &from, hdr, hlen - sizeof(*hdr)); 376214501Srpaulo break; 377214501Srpaulo case IAPP_CMD_MOVE_notify: 378214501Srpaulo /* TODO: MOVE is using TCP; so move this to TCP handler once it 379214501Srpaulo * is implemented.. */ 380214501Srpaulo /* IAPP-MOVE.indication(MAC Address, New BSSID, 381214501Srpaulo * Sequence Number, AP Address, Context Block) */ 382214501Srpaulo /* TODO: process */ 383214501Srpaulo break; 384214501Srpaulo default: 385214501Srpaulo printf("Unknown IAPP command %d\n", hdr->command); 386214501Srpaulo break; 387214501Srpaulo } 388214501Srpaulo} 389214501Srpaulo 390214501Srpaulo 391214501Srpaulostruct iapp_data * iapp_init(struct hostapd_data *hapd, const char *iface) 392214501Srpaulo{ 393214501Srpaulo struct ifreq ifr; 394214501Srpaulo struct sockaddr_ll addr; 395214501Srpaulo int ifindex; 396214501Srpaulo struct sockaddr_in *paddr, uaddr; 397214501Srpaulo struct iapp_data *iapp; 398214501Srpaulo struct ip_mreqn mreq; 399214501Srpaulo 400214501Srpaulo iapp = os_zalloc(sizeof(*iapp)); 401214501Srpaulo if (iapp == NULL) 402214501Srpaulo return NULL; 403214501Srpaulo iapp->hapd = hapd; 404214501Srpaulo iapp->udp_sock = iapp->packet_sock = -1; 405214501Srpaulo 406214501Srpaulo /* TODO: 407214501Srpaulo * open socket for sending and receiving IAPP frames over TCP 408214501Srpaulo */ 409214501Srpaulo 410214501Srpaulo iapp->udp_sock = socket(PF_INET, SOCK_DGRAM, 0); 411214501Srpaulo if (iapp->udp_sock < 0) { 412214501Srpaulo perror("socket[PF_INET,SOCK_DGRAM]"); 413214501Srpaulo iapp_deinit(iapp); 414214501Srpaulo return NULL; 415214501Srpaulo } 416214501Srpaulo 417214501Srpaulo os_memset(&ifr, 0, sizeof(ifr)); 418214501Srpaulo os_strlcpy(ifr.ifr_name, iface, sizeof(ifr.ifr_name)); 419214501Srpaulo if (ioctl(iapp->udp_sock, SIOCGIFINDEX, &ifr) != 0) { 420214501Srpaulo perror("ioctl(SIOCGIFINDEX)"); 421214501Srpaulo iapp_deinit(iapp); 422214501Srpaulo return NULL; 423214501Srpaulo } 424214501Srpaulo ifindex = ifr.ifr_ifindex; 425214501Srpaulo 426214501Srpaulo if (ioctl(iapp->udp_sock, SIOCGIFADDR, &ifr) != 0) { 427214501Srpaulo perror("ioctl(SIOCGIFADDR)"); 428214501Srpaulo iapp_deinit(iapp); 429214501Srpaulo return NULL; 430214501Srpaulo } 431214501Srpaulo paddr = (struct sockaddr_in *) &ifr.ifr_addr; 432214501Srpaulo if (paddr->sin_family != AF_INET) { 433214501Srpaulo printf("Invalid address family %i (SIOCGIFADDR)\n", 434214501Srpaulo paddr->sin_family); 435214501Srpaulo iapp_deinit(iapp); 436214501Srpaulo return NULL; 437214501Srpaulo } 438214501Srpaulo iapp->own.s_addr = paddr->sin_addr.s_addr; 439214501Srpaulo 440214501Srpaulo if (ioctl(iapp->udp_sock, SIOCGIFBRDADDR, &ifr) != 0) { 441214501Srpaulo perror("ioctl(SIOCGIFBRDADDR)"); 442214501Srpaulo iapp_deinit(iapp); 443214501Srpaulo return NULL; 444214501Srpaulo } 445214501Srpaulo paddr = (struct sockaddr_in *) &ifr.ifr_addr; 446214501Srpaulo if (paddr->sin_family != AF_INET) { 447214501Srpaulo printf("Invalid address family %i (SIOCGIFBRDADDR)\n", 448214501Srpaulo paddr->sin_family); 449214501Srpaulo iapp_deinit(iapp); 450214501Srpaulo return NULL; 451214501Srpaulo } 452214501Srpaulo inet_aton(IAPP_MULTICAST, &iapp->multicast); 453214501Srpaulo 454214501Srpaulo os_memset(&uaddr, 0, sizeof(uaddr)); 455214501Srpaulo uaddr.sin_family = AF_INET; 456214501Srpaulo uaddr.sin_port = htons(IAPP_UDP_PORT); 457214501Srpaulo if (bind(iapp->udp_sock, (struct sockaddr *) &uaddr, 458214501Srpaulo sizeof(uaddr)) < 0) { 459214501Srpaulo perror("bind[UDP]"); 460214501Srpaulo iapp_deinit(iapp); 461214501Srpaulo return NULL; 462214501Srpaulo } 463214501Srpaulo 464214501Srpaulo os_memset(&mreq, 0, sizeof(mreq)); 465214501Srpaulo mreq.imr_multiaddr = iapp->multicast; 466214501Srpaulo mreq.imr_address.s_addr = INADDR_ANY; 467214501Srpaulo mreq.imr_ifindex = 0; 468214501Srpaulo if (setsockopt(iapp->udp_sock, SOL_IP, IP_ADD_MEMBERSHIP, &mreq, 469214501Srpaulo sizeof(mreq)) < 0) { 470214501Srpaulo perror("setsockopt[UDP,IP_ADD_MEMBERSHIP]"); 471214501Srpaulo iapp_deinit(iapp); 472214501Srpaulo return NULL; 473214501Srpaulo } 474214501Srpaulo 475214501Srpaulo iapp->packet_sock = socket(PF_PACKET, SOCK_RAW, htons(ETH_P_ALL)); 476214501Srpaulo if (iapp->packet_sock < 0) { 477214501Srpaulo perror("socket[PF_PACKET,SOCK_RAW]"); 478214501Srpaulo iapp_deinit(iapp); 479214501Srpaulo return NULL; 480214501Srpaulo } 481214501Srpaulo 482214501Srpaulo os_memset(&addr, 0, sizeof(addr)); 483214501Srpaulo addr.sll_family = AF_PACKET; 484214501Srpaulo addr.sll_ifindex = ifindex; 485214501Srpaulo if (bind(iapp->packet_sock, (struct sockaddr *) &addr, 486214501Srpaulo sizeof(addr)) < 0) { 487214501Srpaulo perror("bind[PACKET]"); 488214501Srpaulo iapp_deinit(iapp); 489214501Srpaulo return NULL; 490214501Srpaulo } 491214501Srpaulo 492214501Srpaulo if (eloop_register_read_sock(iapp->udp_sock, iapp_receive_udp, 493214501Srpaulo iapp, NULL)) { 494214501Srpaulo printf("Could not register read socket for IAPP.\n"); 495214501Srpaulo iapp_deinit(iapp); 496214501Srpaulo return NULL; 497214501Srpaulo } 498214501Srpaulo 499214501Srpaulo printf("IEEE 802.11F (IAPP) using interface %s\n", iface); 500214501Srpaulo 501214501Srpaulo /* TODO: For levels 2 and 3: send RADIUS Initiate-Request, receive 502214501Srpaulo * RADIUS Initiate-Accept or Initiate-Reject. IAPP port should actually 503214501Srpaulo * be openned only after receiving Initiate-Accept. If Initiate-Reject 504214501Srpaulo * is received, IAPP is not started. */ 505214501Srpaulo 506214501Srpaulo return iapp; 507214501Srpaulo} 508214501Srpaulo 509214501Srpaulo 510214501Srpaulovoid iapp_deinit(struct iapp_data *iapp) 511214501Srpaulo{ 512214501Srpaulo struct ip_mreqn mreq; 513214501Srpaulo 514214501Srpaulo if (iapp == NULL) 515214501Srpaulo return; 516214501Srpaulo 517214501Srpaulo if (iapp->udp_sock >= 0) { 518214501Srpaulo os_memset(&mreq, 0, sizeof(mreq)); 519214501Srpaulo mreq.imr_multiaddr = iapp->multicast; 520214501Srpaulo mreq.imr_address.s_addr = INADDR_ANY; 521214501Srpaulo mreq.imr_ifindex = 0; 522214501Srpaulo if (setsockopt(iapp->udp_sock, SOL_IP, IP_DROP_MEMBERSHIP, 523214501Srpaulo &mreq, sizeof(mreq)) < 0) { 524214501Srpaulo perror("setsockopt[UDP,IP_DEL_MEMBERSHIP]"); 525214501Srpaulo } 526214501Srpaulo 527214501Srpaulo eloop_unregister_read_sock(iapp->udp_sock); 528214501Srpaulo close(iapp->udp_sock); 529214501Srpaulo } 530214501Srpaulo if (iapp->packet_sock >= 0) { 531214501Srpaulo eloop_unregister_read_sock(iapp->packet_sock); 532214501Srpaulo close(iapp->packet_sock); 533214501Srpaulo } 534214501Srpaulo os_free(iapp); 535214501Srpaulo} 536