Przeglądaj źródła

qcacld-3.0: Fix interop issue due to RSNXE

STA DUT sends RSNXE IE with PASN related capabilities by
default based on the target capability. But, connection
failure happens with some APs if the PASN capabilities are
set in the RSNXE IE.

Therefore, update the RSNXE stripping logic as follows:
For WPA3 connection where the AP doesn't broadcast RSNXE IE,
strip all capabilities other than WPA3 capabilities(SAE_H2E
and SAE_PK).

Change-Id: Ifba2894054635962dcb923e4d98418ad1d3ffc7f
CRs-Fixed: 3415097
Surya Prakash Sivaraj 2 lat temu
rodzic
commit
652e3606f1

+ 86 - 29
core/mac/src/pe/lim/lim_process_sme_req_messages.c

@@ -3765,30 +3765,44 @@ lim_is_rsnxe_cap_set(struct mac_context *mac_ctx,
 	return false;
 }
 
-/**
- * lim_is_akm_wpa_wpa2() - Check if the AKM is legacy than wpa3
+/*
+ * lim_rebuild_rsnxe() - Rebuild the RSNXE for STA
  *
- * @session: PE session
+ * @rsnx_ie: RSNX IE
  *
- * This is to check if the AKM is older than WPA3. This helps to determine if
- * RSNXE needs to be carried or not.
+ * This API is used to construct new RSNX IE for a WPA3
+ * connection where the AP doesn't advertise the RSNX IE,
+ * mask all bits other than WPA3 caps(SAE_H2E and SAE_PK)
  *
- * return true - If AKM is WPA/WPA2 which means it's older than WPA3
- *        false - If AKM is not older than WPA3
+ * Return: Newly constructed RSNX IE
  */
-static inline bool
-lim_is_akm_wpa_wpa2(struct pe_session *session)
+static inline uint8_t *lim_rebuild_rsnxe(uint8_t *rsnx_ie)
 {
-	int32_t akm;
+	const uint8_t *rsnxe_cap;
+	uint16_t cap_mask, capab;
+	uint8_t cap_len;
+	uint8_t *new_rsnxe = NULL;
 
-	akm = wlan_crypto_get_param(session->vdev, WLAN_CRYPTO_PARAM_KEY_MGMT);
-	if (akm == -1)
-		return false;
+	rsnxe_cap = wlan_crypto_parse_rsnxe_ie(rsnx_ie, &cap_len);
+	if (!rsnxe_cap || !cap_len)
+		return NULL;
 
-	if (WLAN_CRYPTO_IS_WPA_WPA2(akm))
-		return true;
+	cap_mask = WLAN_CRYPTO_RSNX_CAP_SAE_H2E | WLAN_CRYPTO_RSNX_CAP_SAE_PK;
+	capab = (rsnxe_cap[RSNXE_CAP_POS_0] & cap_mask);
 
-	return false;
+	if (capab) {
+		cap_len = 1;
+		capab |= cap_len - 1;
+
+		new_rsnxe = qdf_mem_malloc(RSNXE_CAP_FOR_SAE_LEN);
+		if (!new_rsnxe)
+			return NULL;
+		new_rsnxe[0] = WLAN_ELEMID_RSNXE;
+		new_rsnxe[1] = cap_len;
+		new_rsnxe[2] = capab & 0x00ff;
+		return new_rsnxe;
+	}
+	return NULL;
 }
 
 static inline void
@@ -3796,6 +3810,13 @@ lim_strip_rsnx_ie(struct mac_context *mac_ctx,
 		  struct pe_session *session,
 		  struct cm_vdev_join_req *req)
 {
+	int32_t akm;
+	uint8_t *rsnxe = NULL, *new_rsnxe = NULL, *assoc_ie = NULL;
+	uint8_t assoc_ie_len;
+
+	akm = wlan_crypto_get_param(session->vdev, WLAN_CRYPTO_PARAM_KEY_MGMT);
+	if (akm == -1)
+		return;
 	/*
 	 * Userspace may send RSNXE also in connect request irrespective
 	 * of the connecting AP capabilities. This allows the driver to chose
@@ -3806,24 +3827,60 @@ lim_strip_rsnx_ie(struct mac_context *mac_ctx,
 	 * may misbahave due to the new IE. It's observed that few
 	 * legacy APs which don't support the RSNXE reject the
 	 * connection at EAPOL stage.
-	 * So, strip the IE when below conditions are met to avoid
-	 * sending the RSNXE to legacy APs,
+	 * So, modify the IE when below conditions are met to avoid
+	 * the interop issues due to RSNXE,
 	 * 1. If AP doesn't support/advertise the RSNXE
-	 * 2. If the connection is in a older mode than WPA3 i.e. WPA/WPA2 mode
-	 * 3. If no other bits are set than SAE_H2E, SAE_PK, SECURE_LTF,
+	 * 2. If no other bits are set than SAE_H2E, SAE_PK, SECURE_LTF,
 	 * SECURE_RTT, PROT_RANGE_NEGOTIOATION in RSNXE capabilities
 	 * field.
-
+	 *
+	 * For WPA2 and older security - Remove the RSNXE completely.
+	 * For WPA3 security - Mask all caps others than SAE_H2E and SAE_PK.
 	 */
-	if (!util_scan_entry_rsnxe(req->entry) &&
-	    lim_is_akm_wpa_wpa2(session) &&
-	    !lim_is_rsnxe_cap_set(mac_ctx, req)) {
-		mlme_debug("Strip RSNXE as it's not supported by AP");
-		lim_strip_ie(mac_ctx, req->assoc_ie.ptr,
-			     (uint16_t *)&req->assoc_ie.len,
-			     WLAN_ELEMID_RSNXE, ONE_BYTE,
-			     NULL, 0, NULL, WLAN_MAX_IE_LEN);
+
+	if (util_scan_entry_rsnxe(req->entry) ||
+	    lim_is_rsnxe_cap_set(mac_ctx, req)) {
+		return;
 	}
+
+	rsnxe = qdf_mem_malloc(WLAN_MAX_IE_LEN + 2);
+	if (!rsnxe)
+		return;
+
+	lim_strip_ie(mac_ctx, req->assoc_ie.ptr,
+		     (uint16_t *)&req->assoc_ie.len, WLAN_ELEMID_RSNXE,
+		     ONE_BYTE, NULL, 0, rsnxe, WLAN_MAX_IE_LEN);
+
+	if (WLAN_CRYPTO_IS_WPA_WPA2(akm)) {
+		mlme_debug("Strip RSNXE as it is not supported by AP");
+		goto end;
+	} else if (WLAN_CRYPTO_IS_WPA3(akm)) {
+		new_rsnxe = lim_rebuild_rsnxe(rsnxe);
+		if (!new_rsnxe)
+			goto end;
+
+		assoc_ie = qdf_mem_malloc(req->assoc_ie.len + new_rsnxe[1] + 2);
+		if (!assoc_ie) {
+			qdf_mem_free(new_rsnxe);
+			goto end;
+		}
+
+		/* Append the new RSNXE to the assoc ie */
+		qdf_mem_copy(assoc_ie, req->assoc_ie.ptr, req->assoc_ie.len);
+		assoc_ie_len = req->assoc_ie.len;
+		qdf_mem_copy(&assoc_ie[assoc_ie_len], new_rsnxe,
+			     new_rsnxe[1] + 2);
+		assoc_ie_len += new_rsnxe[1] + 2;
+		qdf_mem_free(new_rsnxe);
+
+		/* Replace the assoc ie with new assoc_ie */
+		qdf_mem_free(req->assoc_ie.ptr);
+		req->assoc_ie.ptr = &assoc_ie[0];
+		req->assoc_ie.len = assoc_ie_len;
+		mlme_debug("Update the RSNXE for WPA3 connection");
+	}
+end:
+	qdf_mem_free(rsnxe);
 }
 
 void

+ 5 - 0
core/mac/src/pe/lim/lim_utils.h

@@ -119,6 +119,11 @@
 /* SR is disabled if NON_SRG is disallowed and SRG INFO is not present */
 #define SR_DISABLE NON_SRG_PD_SR_DISALLOWED & (~SRG_INFO_PRESENT & 0x0F)
 
+/* Length of RSNXE element ID + length + one octet of capability */
+#define RSNXE_CAP_FOR_SAE_LEN     3
+/* Position of WPA3 capabilities in the RSNX element */
+#define RSNXE_CAP_POS_0           0
+
 typedef union uPmfSaQueryTimerId {
 	struct {
 		uint8_t sessionId;