WPS 2.0: Add tool for testing protocol extensibility
[libeap.git] / src / wps / wps_attr_parse.c
1 /*
2  * Wi-Fi Protected Setup - attribute parsing
3  * Copyright (c) 2008, Jouni Malinen <j@w1.fi>
4  *
5  * This program is free software; you can redistribute it and/or modify
6  * it under the terms of the GNU General Public License version 2 as
7  * published by the Free Software Foundation.
8  *
9  * Alternatively, this software may be distributed under the terms of BSD
10  * license.
11  *
12  * See README and COPYING for more details.
13  */
14
15 #include "includes.h"
16
17 #include "common.h"
18 #include "wps_i.h"
19
20 #ifndef CONFIG_WPS_STRICT
21 #define WPS_WORKAROUNDS
22 #endif /* CONFIG_WPS_STRICT */
23
24
25 static int wps_set_attr(struct wps_parse_attr *attr, u16 type,
26                         const u8 *pos, u16 len)
27 {
28         switch (type) {
29         case ATTR_VERSION:
30                 if (len != 1) {
31                         wpa_printf(MSG_DEBUG, "WPS: Invalid Version length %u",
32                                    len);
33                         return -1;
34                 }
35                 attr->version = pos;
36                 break;
37         case ATTR_VERSION2:
38                 if (len != 1) {
39                         wpa_printf(MSG_DEBUG, "WPS: Invalid Version2 length "
40                                    "%u", len);
41                         return -1;
42                 }
43                 attr->version2 = pos;
44                 break;
45         case ATTR_MSG_TYPE:
46                 if (len != 1) {
47                         wpa_printf(MSG_DEBUG, "WPS: Invalid Message Type "
48                                    "length %u", len);
49                         return -1;
50                 }
51                 attr->msg_type = pos;
52                 break;
53         case ATTR_ENROLLEE_NONCE:
54                 if (len != WPS_NONCE_LEN) {
55                         wpa_printf(MSG_DEBUG, "WPS: Invalid Enrollee Nonce "
56                                    "length %u", len);
57                         return -1;
58                 }
59                 attr->enrollee_nonce = pos;
60                 break;
61         case ATTR_REGISTRAR_NONCE:
62                 if (len != WPS_NONCE_LEN) {
63                         wpa_printf(MSG_DEBUG, "WPS: Invalid Registrar Nonce "
64                                    "length %u", len);
65                         return -1;
66                 }
67                 attr->registrar_nonce = pos;
68                 break;
69         case ATTR_UUID_E:
70                 if (len != WPS_UUID_LEN) {
71                         wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-E length %u",
72                                    len);
73                         return -1;
74                 }
75                 attr->uuid_e = pos;
76                 break;
77         case ATTR_UUID_R:
78                 if (len != WPS_UUID_LEN) {
79                         wpa_printf(MSG_DEBUG, "WPS: Invalid UUID-R length %u",
80                                    len);
81                         return -1;
82                 }
83                 attr->uuid_r = pos;
84                 break;
85         case ATTR_AUTH_TYPE_FLAGS:
86                 if (len != 2) {
87                         wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication "
88                                    "Type Flags length %u", len);
89                         return -1;
90                 }
91                 attr->auth_type_flags = pos;
92                 break;
93         case ATTR_ENCR_TYPE_FLAGS:
94                 if (len != 2) {
95                         wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption Type "
96                                    "Flags length %u", len);
97                         return -1;
98                 }
99                 attr->encr_type_flags = pos;
100                 break;
101         case ATTR_CONN_TYPE_FLAGS:
102                 if (len != 1) {
103                         wpa_printf(MSG_DEBUG, "WPS: Invalid Connection Type "
104                                    "Flags length %u", len);
105                         return -1;
106                 }
107                 attr->conn_type_flags = pos;
108                 break;
109         case ATTR_CONFIG_METHODS:
110                 if (len != 2) {
111                         wpa_printf(MSG_DEBUG, "WPS: Invalid Config Methods "
112                                    "length %u", len);
113                         return -1;
114                 }
115                 attr->config_methods = pos;
116                 break;
117         case ATTR_SELECTED_REGISTRAR_CONFIG_METHODS:
118                 if (len != 2) {
119                         wpa_printf(MSG_DEBUG, "WPS: Invalid Selected "
120                                    "Registrar Config Methods length %u", len);
121                         return -1;
122                 }
123                 attr->sel_reg_config_methods = pos;
124                 break;
125         case ATTR_PRIMARY_DEV_TYPE:
126                 if (len != WPS_DEV_TYPE_LEN) {
127                         wpa_printf(MSG_DEBUG, "WPS: Invalid Primary Device "
128                                    "Type length %u", len);
129                         return -1;
130                 }
131                 attr->primary_dev_type = pos;
132                 break;
133         case ATTR_RF_BANDS:
134                 if (len != 1) {
135                         wpa_printf(MSG_DEBUG, "WPS: Invalid RF Bands length "
136                                    "%u", len);
137                         return -1;
138                 }
139                 attr->rf_bands = pos;
140                 break;
141         case ATTR_ASSOC_STATE:
142                 if (len != 2) {
143                         wpa_printf(MSG_DEBUG, "WPS: Invalid Association State "
144                                    "length %u", len);
145                         return -1;
146                 }
147                 attr->assoc_state = pos;
148                 break;
149         case ATTR_CONFIG_ERROR:
150                 if (len != 2) {
151                         wpa_printf(MSG_DEBUG, "WPS: Invalid Configuration "
152                                    "Error length %u", len);
153                         return -1;
154                 }
155                 attr->config_error = pos;
156                 break;
157         case ATTR_DEV_PASSWORD_ID:
158                 if (len != 2) {
159                         wpa_printf(MSG_DEBUG, "WPS: Invalid Device Password "
160                                    "ID length %u", len);
161                         return -1;
162                 }
163                 attr->dev_password_id = pos;
164                 break;
165         case ATTR_OOB_DEVICE_PASSWORD:
166                 if (len != WPS_OOB_DEVICE_PASSWORD_ATTR_LEN) {
167                         wpa_printf(MSG_DEBUG, "WPS: Invalid OOB Device "
168                                    "Password length %u", len);
169                         return -1;
170                 }
171                 attr->oob_dev_password = pos;
172                 break;
173         case ATTR_OS_VERSION:
174                 if (len != 4) {
175                         wpa_printf(MSG_DEBUG, "WPS: Invalid OS Version length "
176                                    "%u", len);
177                         return -1;
178                 }
179                 attr->os_version = pos;
180                 break;
181         case ATTR_WPS_STATE:
182                 if (len != 1) {
183                         wpa_printf(MSG_DEBUG, "WPS: Invalid Wi-Fi Protected "
184                                    "Setup State length %u", len);
185                         return -1;
186                 }
187                 attr->wps_state = pos;
188                 break;
189         case ATTR_AUTHENTICATOR:
190                 if (len != WPS_AUTHENTICATOR_LEN) {
191                         wpa_printf(MSG_DEBUG, "WPS: Invalid Authenticator "
192                                    "length %u", len);
193                         return -1;
194                 }
195                 attr->authenticator = pos;
196                 break;
197         case ATTR_R_HASH1:
198                 if (len != WPS_HASH_LEN) {
199                         wpa_printf(MSG_DEBUG, "WPS: Invalid R-Hash1 length %u",
200                                    len);
201                         return -1;
202                 }
203                 attr->r_hash1 = pos;
204                 break;
205         case ATTR_R_HASH2:
206                 if (len != WPS_HASH_LEN) {
207                         wpa_printf(MSG_DEBUG, "WPS: Invalid R-Hash2 length %u",
208                                    len);
209                         return -1;
210                 }
211                 attr->r_hash2 = pos;
212                 break;
213         case ATTR_E_HASH1:
214                 if (len != WPS_HASH_LEN) {
215                         wpa_printf(MSG_DEBUG, "WPS: Invalid E-Hash1 length %u",
216                                    len);
217                         return -1;
218                 }
219                 attr->e_hash1 = pos;
220                 break;
221         case ATTR_E_HASH2:
222                 if (len != WPS_HASH_LEN) {
223                         wpa_printf(MSG_DEBUG, "WPS: Invalid E-Hash2 length %u",
224                                    len);
225                         return -1;
226                 }
227                 attr->e_hash2 = pos;
228                 break;
229         case ATTR_R_SNONCE1:
230                 if (len != WPS_SECRET_NONCE_LEN) {
231                         wpa_printf(MSG_DEBUG, "WPS: Invalid R-SNonce1 length "
232                                    "%u", len);
233                         return -1;
234                 }
235                 attr->r_snonce1 = pos;
236                 break;
237         case ATTR_R_SNONCE2:
238                 if (len != WPS_SECRET_NONCE_LEN) {
239                         wpa_printf(MSG_DEBUG, "WPS: Invalid R-SNonce2 length "
240                                    "%u", len);
241                         return -1;
242                 }
243                 attr->r_snonce2 = pos;
244                 break;
245         case ATTR_E_SNONCE1:
246                 if (len != WPS_SECRET_NONCE_LEN) {
247                         wpa_printf(MSG_DEBUG, "WPS: Invalid E-SNonce1 length "
248                                    "%u", len);
249                         return -1;
250                 }
251                 attr->e_snonce1 = pos;
252                 break;
253         case ATTR_E_SNONCE2:
254                 if (len != WPS_SECRET_NONCE_LEN) {
255                         wpa_printf(MSG_DEBUG, "WPS: Invalid E-SNonce2 length "
256                                    "%u", len);
257                         return -1;
258                 }
259                 attr->e_snonce2 = pos;
260                 break;
261         case ATTR_KEY_WRAP_AUTH:
262                 if (len != WPS_KWA_LEN) {
263                         wpa_printf(MSG_DEBUG, "WPS: Invalid Key Wrap "
264                                    "Authenticator length %u", len);
265                         return -1;
266                 }
267                 attr->key_wrap_auth = pos;
268                 break;
269         case ATTR_AUTH_TYPE:
270                 if (len != 2) {
271                         wpa_printf(MSG_DEBUG, "WPS: Invalid Authentication "
272                                    "Type length %u", len);
273                         return -1;
274                 }
275                 attr->auth_type = pos;
276                 break;
277         case ATTR_ENCR_TYPE:
278                 if (len != 2) {
279                         wpa_printf(MSG_DEBUG, "WPS: Invalid Encryption "
280                                    "Type length %u", len);
281                         return -1;
282                 }
283                 attr->encr_type = pos;
284                 break;
285         case ATTR_NETWORK_INDEX:
286                 if (len != 1) {
287                         wpa_printf(MSG_DEBUG, "WPS: Invalid Network Index "
288                                    "length %u", len);
289                         return -1;
290                 }
291                 attr->network_idx = pos;
292                 break;
293         case ATTR_NETWORK_KEY_INDEX:
294                 if (len != 1) {
295                         wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key Index "
296                                    "length %u", len);
297                         return -1;
298                 }
299                 attr->network_key_idx = pos;
300                 break;
301         case ATTR_MAC_ADDR:
302                 if (len != ETH_ALEN) {
303                         wpa_printf(MSG_DEBUG, "WPS: Invalid MAC Address "
304                                    "length %u", len);
305                         return -1;
306                 }
307                 attr->mac_addr = pos;
308                 break;
309         case ATTR_KEY_PROVIDED_AUTO:
310                 if (len != 1) {
311                         wpa_printf(MSG_DEBUG, "WPS: Invalid Key Provided "
312                                    "Automatically length %u", len);
313                         return -1;
314                 }
315                 attr->key_prov_auto = pos;
316                 break;
317         case ATTR_802_1X_ENABLED:
318                 if (len != 1) {
319                         wpa_printf(MSG_DEBUG, "WPS: Invalid 802.1X Enabled "
320                                    "length %u", len);
321                         return -1;
322                 }
323                 attr->dot1x_enabled = pos;
324                 break;
325         case ATTR_SELECTED_REGISTRAR:
326                 if (len != 1) {
327                         wpa_printf(MSG_DEBUG, "WPS: Invalid Selected Registrar"
328                                    " length %u", len);
329                         return -1;
330                 }
331                 attr->selected_registrar = pos;
332                 break;
333         case ATTR_REQUEST_TYPE:
334                 if (len != 1) {
335                         wpa_printf(MSG_DEBUG, "WPS: Invalid Request Type "
336                                    "length %u", len);
337                         return -1;
338                 }
339                 attr->request_type = pos;
340                 break;
341         case ATTR_RESPONSE_TYPE:
342                 if (len != 1) {
343                         wpa_printf(MSG_DEBUG, "WPS: Invalid Response Type "
344                                    "length %u", len);
345                         return -1;
346                 }
347                 attr->response_type = pos;
348                 break;
349         case ATTR_MANUFACTURER:
350                 attr->manufacturer = pos;
351                 attr->manufacturer_len = len;
352                 break;
353         case ATTR_MODEL_NAME:
354                 attr->model_name = pos;
355                 attr->model_name_len = len;
356                 break;
357         case ATTR_MODEL_NUMBER:
358                 attr->model_number = pos;
359                 attr->model_number_len = len;
360                 break;
361         case ATTR_SERIAL_NUMBER:
362                 attr->serial_number = pos;
363                 attr->serial_number_len = len;
364                 break;
365         case ATTR_DEV_NAME:
366                 attr->dev_name = pos;
367                 attr->dev_name_len = len;
368                 break;
369         case ATTR_PUBLIC_KEY:
370                 attr->public_key = pos;
371                 attr->public_key_len = len;
372                 break;
373         case ATTR_ENCR_SETTINGS:
374                 attr->encr_settings = pos;
375                 attr->encr_settings_len = len;
376                 break;
377         case ATTR_CRED:
378                 if (attr->num_cred >= MAX_CRED_COUNT) {
379                         wpa_printf(MSG_DEBUG, "WPS: Skipped Credential "
380                                    "attribute (max %d credentials)",
381                                    MAX_CRED_COUNT);
382                         break;
383                 }
384                 attr->cred[attr->num_cred] = pos;
385                 attr->cred_len[attr->num_cred] = len;
386                 attr->num_cred++;
387                 break;
388         case ATTR_SSID:
389                 attr->ssid = pos;
390                 attr->ssid_len = len;
391                 break;
392         case ATTR_NETWORK_KEY:
393                 attr->network_key = pos;
394                 attr->network_key_len = len;
395                 break;
396         case ATTR_EAP_TYPE:
397                 attr->eap_type = pos;
398                 attr->eap_type_len = len;
399                 break;
400         case ATTR_EAP_IDENTITY:
401                 attr->eap_identity = pos;
402                 attr->eap_identity_len = len;
403                 break;
404         case ATTR_AP_SETUP_LOCKED:
405                 if (len != 1) {
406                         wpa_printf(MSG_DEBUG, "WPS: Invalid AP Setup Locked "
407                                    "length %u", len);
408                         return -1;
409                 }
410                 attr->ap_setup_locked = pos;
411                 break;
412         case ATTR_SETTINGS_DELAY_TIME:
413                 if (len != 1) {
414                         wpa_printf(MSG_DEBUG, "WPS: Invalid Settings Delay "
415                                    "Time length %u", len);
416                         return -1;
417                 }
418                 attr->settings_delay_time = pos;
419                 break;
420         case ATTR_NETWORK_KEY_SHAREABLE:
421                 if (len != 1) {
422                         wpa_printf(MSG_DEBUG, "WPS: Invalid Network Key "
423                                    "Shareable length %u", len);
424                         return -1;
425                 }
426                 attr->network_key_shareable = pos;
427                 break;
428         case ATTR_REQUEST_TO_ENROLL:
429                 if (len != 1) {
430                         wpa_printf(MSG_DEBUG, "WPS: Invalid Request to Enroll "
431                                    "length %u", len);
432                         return -1;
433                 }
434                 attr->request_to_enroll = pos;
435                 break;
436         case ATTR_AUTHORIZED_MACS:
437                 attr->authorized_macs = pos;
438                 attr->authorized_macs_len = len;
439                 break;
440         case ATTR_REQUESTED_DEV_TYPE:
441                 if (len != WPS_DEV_TYPE_LEN) {
442                         wpa_printf(MSG_DEBUG, "WPS: Invalid Requested Device "
443                                    "Type length %u", len);
444                         return -1;
445                 }
446                 if (attr->num_req_dev_type >= MAX_REQ_DEV_TYPE_COUNT) {
447                         wpa_printf(MSG_DEBUG, "WPS: Skipped Requested Device "
448                                    "Type attribute (max %u types)",
449                                    MAX_REQ_DEV_TYPE_COUNT);
450                         break;
451                 }
452                 attr->req_dev_type[attr->num_req_dev_type] = pos;
453                 attr->num_req_dev_type++;
454                 break;
455         default:
456                 wpa_printf(MSG_DEBUG, "WPS: Unsupported attribute type 0x%x "
457                            "len=%u", type, len);
458                 break;
459         }
460
461         return 0;
462 }
463
464
465 int wps_parse_msg(const struct wpabuf *msg, struct wps_parse_attr *attr)
466 {
467         const u8 *pos, *end;
468         u16 type, len;
469
470         os_memset(attr, 0, sizeof(*attr));
471         pos = wpabuf_head(msg);
472         end = pos + wpabuf_len(msg);
473
474         while (pos < end) {
475                 if (end - pos < 4) {
476                         wpa_printf(MSG_DEBUG, "WPS: Invalid message - "
477                                    "%lu bytes remaining",
478                                    (unsigned long) (end - pos));
479                         return -1;
480                 }
481
482                 type = WPA_GET_BE16(pos);
483                 pos += 2;
484                 len = WPA_GET_BE16(pos);
485                 pos += 2;
486                 wpa_printf(MSG_MSGDUMP, "WPS: attr type=0x%x len=%u",
487                            type, len);
488                 if (len > end - pos) {
489                         wpa_printf(MSG_DEBUG, "WPS: Attribute overflow");
490                         return -1;
491                 }
492
493 #ifdef WPS_WORKAROUNDS
494                 if (type == 0 && len == 0) {
495                         /*
496                          * Mac OS X 10.6 seems to be adding 0x00 padding to the
497                          * end of M1. Skip those to avoid interop issues.
498                          */
499                         int i;
500                         for (i = 0; i < end - pos; i++) {
501                                 if (pos[i])
502                                         break;
503                         }
504                         if (i == end - pos) {
505                                 wpa_printf(MSG_DEBUG, "WPS: Workaround - skip "
506                                            "unexpected message padding");
507                                 break;
508                         }
509                 }
510 #endif /* WPS_WORKAROUNDS */
511
512                 if (wps_set_attr(attr, type, pos, len) < 0)
513                         return -1;
514
515                 pos += len;
516         }
517
518         return 0;
519 }