|
@@ -0,0 +1,973 @@
|
|
1
|
+/*
|
|
2
|
+ * Copyright (c) 2009 Joshua Oreman <oremanj@rwcr.net>.
|
|
3
|
+ *
|
|
4
|
+ * This program is free software; you can redistribute it and/or
|
|
5
|
+ * modify it under the terms of the GNU General Public License as
|
|
6
|
+ * published by the Free Software Foundation; either version 2 of the
|
|
7
|
+ * License, or any later version.
|
|
8
|
+ *
|
|
9
|
+ * This program is distributed in the hope that it will be useful, but
|
|
10
|
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
11
|
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
12
|
+ * General Public License for more details.
|
|
13
|
+ *
|
|
14
|
+ * You should have received a copy of the GNU General Public License
|
|
15
|
+ * along with this program; if not, write to the Free Software
|
|
16
|
+ * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
17
|
+ */
|
|
18
|
+
|
|
19
|
+FILE_LICENCE ( GPL2_OR_LATER );
|
|
20
|
+
|
|
21
|
+#include <gpxe/net80211.h>
|
|
22
|
+#include <gpxe/sec80211.h>
|
|
23
|
+#include <gpxe/wpa.h>
|
|
24
|
+#include <gpxe/eapol.h>
|
|
25
|
+#include <gpxe/crypto.h>
|
|
26
|
+#include <gpxe/arc4.h>
|
|
27
|
+#include <gpxe/crc32.h>
|
|
28
|
+#include <gpxe/sha1.h>
|
|
29
|
+#include <gpxe/hmac.h>
|
|
30
|
+#include <gpxe/list.h>
|
|
31
|
+#include <gpxe/ethernet.h>
|
|
32
|
+#include <stdlib.h>
|
|
33
|
+#include <string.h>
|
|
34
|
+#include <errno.h>
|
|
35
|
+
|
|
36
|
+/** @file
|
|
37
|
+ *
|
|
38
|
+ * Handler for the aspects of WPA handshaking that are independent of
|
|
39
|
+ * 802.1X/PSK or TKIP/CCMP; this mostly involves the 4-Way Handshake.
|
|
40
|
+ */
|
|
41
|
+
|
|
42
|
+/** List of WPA contexts in active use. */
|
|
43
|
+struct list_head wpa_contexts = LIST_HEAD_INIT ( wpa_contexts );
|
|
44
|
+
|
|
45
|
+
|
|
46
|
+/**
|
|
47
|
+ * Return an error code and deauthenticate
|
|
48
|
+ *
|
|
49
|
+ * @v ctx WPA common context
|
|
50
|
+ * @v rc Return status code
|
|
51
|
+ * @ret rc The passed return status code
|
|
52
|
+ */
|
|
53
|
+static int wpa_fail ( struct wpa_common_ctx *ctx, int rc )
|
|
54
|
+{
|
|
55
|
+ net80211_deauthenticate ( ctx->dev, rc );
|
|
56
|
+ return rc;
|
|
57
|
+}
|
|
58
|
+
|
|
59
|
+
|
|
60
|
+/**
|
|
61
|
+ * Find a cryptosystem handler structure from a crypto ID
|
|
62
|
+ *
|
|
63
|
+ * @v crypt Cryptosystem ID
|
|
64
|
+ * @ret crypto Cryptosystem handler structure
|
|
65
|
+ *
|
|
66
|
+ * If support for @a crypt is not compiled in to gPXE, or if @a crypt
|
|
67
|
+ * is NET80211_CRYPT_UNKNOWN, returns @c NULL.
|
|
68
|
+ */
|
|
69
|
+static struct net80211_crypto *
|
|
70
|
+wpa_find_cryptosystem ( enum net80211_crypto_alg crypt )
|
|
71
|
+{
|
|
72
|
+ struct net80211_crypto *crypto;
|
|
73
|
+
|
|
74
|
+ for_each_table_entry ( crypto, NET80211_CRYPTOS ) {
|
|
75
|
+ if ( crypto->algorithm == crypt )
|
|
76
|
+ return crypto;
|
|
77
|
+ }
|
|
78
|
+
|
|
79
|
+ return NULL;
|
|
80
|
+}
|
|
81
|
+
|
|
82
|
+
|
|
83
|
+/**
|
|
84
|
+ * Find WPA key integrity and encryption handler from key version field
|
|
85
|
+ *
|
|
86
|
+ * @v ver Version bits of EAPOL-Key info field
|
|
87
|
+ * @ret kie Key integrity and encryption handler
|
|
88
|
+ */
|
|
89
|
+struct wpa_kie * wpa_find_kie ( int version )
|
|
90
|
+{
|
|
91
|
+ struct wpa_kie *kie;
|
|
92
|
+
|
|
93
|
+ for_each_table_entry ( kie, WPA_KIES ) {
|
|
94
|
+ if ( kie->version == version )
|
|
95
|
+ return kie;
|
|
96
|
+ }
|
|
97
|
+
|
|
98
|
+ return NULL;
|
|
99
|
+}
|
|
100
|
+
|
|
101
|
+
|
|
102
|
+/**
|
|
103
|
+ * Construct RSN or WPA information element
|
|
104
|
+ *
|
|
105
|
+ * @v dev 802.11 device
|
|
106
|
+ * @ret ie_ret RSN or WPA information element
|
|
107
|
+ * @ret rc Return status code
|
|
108
|
+ *
|
|
109
|
+ * This function allocates, fills, and returns a RSN or WPA
|
|
110
|
+ * information element suitable for including in an association
|
|
111
|
+ * request frame to the network identified by @c dev->associating.
|
|
112
|
+ * If it is impossible to construct an information element consistent
|
|
113
|
+ * with gPXE's capabilities that is compatible with that network, or
|
|
114
|
+ * if none should be sent because that network's beacon included no
|
|
115
|
+ * security information, returns an error indication and leaves
|
|
116
|
+ * @a ie_ret unchanged.
|
|
117
|
+ *
|
|
118
|
+ * The returned IE will be of the same type (RSN or WPA) as was
|
|
119
|
+ * included in the beacon for the network it is destined for.
|
|
120
|
+ */
|
|
121
|
+int wpa_make_rsn_ie ( struct net80211_device *dev, union ieee80211_ie **ie_ret )
|
|
122
|
+{
|
|
123
|
+ u8 *rsn, *rsn_end;
|
|
124
|
+ int is_rsn;
|
|
125
|
+ u32 group_cipher;
|
|
126
|
+ enum net80211_crypto_alg gcrypt;
|
|
127
|
+ int ie_len;
|
|
128
|
+ u8 *iep;
|
|
129
|
+ struct ieee80211_ie_rsn *ie;
|
|
130
|
+ struct ieee80211_frame *hdr;
|
|
131
|
+ struct ieee80211_beacon *beacon;
|
|
132
|
+
|
|
133
|
+ if ( ! dev->associating ) {
|
|
134
|
+ DBG ( "WPA: Can't make RSN IE for a non-associating device\n" );
|
|
135
|
+ return -EINVAL;
|
|
136
|
+ }
|
|
137
|
+
|
|
138
|
+ hdr = dev->associating->beacon->data;
|
|
139
|
+ beacon = ( struct ieee80211_beacon * ) hdr->data;
|
|
140
|
+ rsn = sec80211_find_rsn ( beacon->info_element,
|
|
141
|
+ dev->associating->beacon->tail, &is_rsn,
|
|
142
|
+ &rsn_end );
|
|
143
|
+ if ( ! rsn ) {
|
|
144
|
+ DBG ( "WPA: Can't make RSN IE when we didn't get one\n" );
|
|
145
|
+ return -EINVAL;
|
|
146
|
+ }
|
|
147
|
+
|
|
148
|
+ rsn += 2; /* skip version */
|
|
149
|
+ group_cipher = *( u32 * ) rsn;
|
|
150
|
+ gcrypt = sec80211_rsn_get_net80211_crypt ( group_cipher );
|
|
151
|
+
|
|
152
|
+ if ( ! wpa_find_cryptosystem ( gcrypt ) ||
|
|
153
|
+ ! wpa_find_cryptosystem ( dev->associating->crypto ) ) {
|
|
154
|
+ DBG ( "WPA: No support for (GC:%d, PC:%d)\n",
|
|
155
|
+ gcrypt, dev->associating->crypto );
|
|
156
|
+ return -ENOTSUP;
|
|
157
|
+ }
|
|
158
|
+
|
|
159
|
+ /* Everything looks good - make our IE. */
|
|
160
|
+
|
|
161
|
+ /* WPA IEs need 4 more bytes for the OUI+type */
|
|
162
|
+ ie_len = ieee80211_rsn_size ( 1, 1, 0, is_rsn ) + ( 4 * ! is_rsn );
|
|
163
|
+ iep = malloc ( ie_len );
|
|
164
|
+ if ( ! iep )
|
|
165
|
+ return -ENOMEM;
|
|
166
|
+
|
|
167
|
+ *ie_ret = ( union ieee80211_ie * ) iep;
|
|
168
|
+
|
|
169
|
+ /* Store ID and length bytes. */
|
|
170
|
+ *iep++ = ( is_rsn ? IEEE80211_IE_RSN : IEEE80211_IE_VENDOR );
|
|
171
|
+ *iep++ = ie_len - 2;
|
|
172
|
+
|
|
173
|
+ /* Store OUI+type for WPA IEs. */
|
|
174
|
+ if ( ! is_rsn ) {
|
|
175
|
+ *( u32 * ) iep = IEEE80211_WPA_OUI_VEN;
|
|
176
|
+ iep += 4;
|
|
177
|
+ }
|
|
178
|
+
|
|
179
|
+ /* If this is a WPA IE, the id and len bytes in the
|
|
180
|
+ ieee80211_ie_rsn structure will not be valid, but by doing
|
|
181
|
+ the cast we can fill all the other fields much more
|
|
182
|
+ readily. */
|
|
183
|
+
|
|
184
|
+ ie = ( struct ieee80211_ie_rsn * ) ( iep - 2 );
|
|
185
|
+ ie->version = IEEE80211_RSN_VERSION;
|
|
186
|
+ ie->group_cipher = group_cipher;
|
|
187
|
+ ie->pairwise_count = 1;
|
|
188
|
+ ie->pairwise_cipher[0] =
|
|
189
|
+ sec80211_rsn_get_crypto_desc ( dev->associating->crypto,
|
|
190
|
+ is_rsn );
|
|
191
|
+ ie->akm_count = 1;
|
|
192
|
+ ie->akm_list[0] =
|
|
193
|
+ sec80211_rsn_get_akm_desc ( dev->associating->handshaking,
|
|
194
|
+ is_rsn );
|
|
195
|
+ if ( is_rsn ) {
|
|
196
|
+ ie->rsn_capab = 0;
|
|
197
|
+ ie->pmkid_count = 0;
|
|
198
|
+ }
|
|
199
|
+
|
|
200
|
+ return 0;
|
|
201
|
+}
|
|
202
|
+
|
|
203
|
+
|
|
204
|
+/**
|
|
205
|
+ * Set up generic WPA support to handle 4-Way Handshake
|
|
206
|
+ *
|
|
207
|
+ * @v dev 802.11 device
|
|
208
|
+ * @v ctx WPA common context
|
|
209
|
+ * @v pmk Pairwise Master Key to use for session
|
|
210
|
+ * @v pmk_len Length of PMK, almost always 32
|
|
211
|
+ * @ret rc Return status code
|
|
212
|
+ */
|
|
213
|
+int wpa_start ( struct net80211_device *dev, struct wpa_common_ctx *ctx,
|
|
214
|
+ const void *pmk, size_t pmk_len )
|
|
215
|
+{
|
|
216
|
+ struct io_buffer *iob;
|
|
217
|
+ struct ieee80211_frame *hdr;
|
|
218
|
+ struct ieee80211_beacon *beacon;
|
|
219
|
+ u8 *ap_rsn_ie = NULL, *ap_rsn_ie_end;
|
|
220
|
+
|
|
221
|
+ if ( ! dev->rsn_ie || ! dev->associating )
|
|
222
|
+ return -EINVAL;
|
|
223
|
+
|
|
224
|
+ ctx->dev = dev;
|
|
225
|
+ memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len );
|
|
226
|
+ ctx->state = WPA_READY;
|
|
227
|
+ ctx->replay = ~0ULL;
|
|
228
|
+
|
|
229
|
+ iob = dev->associating->beacon;
|
|
230
|
+ hdr = iob->data;
|
|
231
|
+ beacon = ( struct ieee80211_beacon * ) hdr->data;
|
|
232
|
+ ap_rsn_ie = sec80211_find_rsn ( beacon->info_element, iob->tail,
|
|
233
|
+ &ctx->ap_rsn_is_rsn, &ap_rsn_ie_end );
|
|
234
|
+ if ( ap_rsn_ie ) {
|
|
235
|
+ ctx->ap_rsn_ie = malloc ( ap_rsn_ie_end - ap_rsn_ie );
|
|
236
|
+ if ( ! ctx->ap_rsn_ie )
|
|
237
|
+ return -ENOMEM;
|
|
238
|
+ memcpy ( ctx->ap_rsn_ie, ap_rsn_ie, ap_rsn_ie_end - ap_rsn_ie );
|
|
239
|
+ ctx->ap_rsn_ie_len = ap_rsn_ie_end - ap_rsn_ie;
|
|
240
|
+ } else {
|
|
241
|
+ return -ENOENT;
|
|
242
|
+ }
|
|
243
|
+
|
|
244
|
+ ctx->crypt = dev->associating->crypto;
|
|
245
|
+ ctx->gcrypt = NET80211_CRYPT_UNKNOWN;
|
|
246
|
+
|
|
247
|
+ list_add_tail ( &ctx->list, &wpa_contexts );
|
|
248
|
+ return 0;
|
|
249
|
+}
|
|
250
|
+
|
|
251
|
+
|
|
252
|
+/**
|
|
253
|
+ * Disable handling of received WPA handshake frames
|
|
254
|
+ *
|
|
255
|
+ * @v dev 802.11 device
|
|
256
|
+ */
|
|
257
|
+void wpa_stop ( struct net80211_device *dev )
|
|
258
|
+{
|
|
259
|
+ struct wpa_common_ctx *ctx, *tmp;
|
|
260
|
+
|
|
261
|
+ list_for_each_entry_safe ( ctx, tmp, &wpa_contexts, list ) {
|
|
262
|
+ if ( ctx->dev == dev ) {
|
|
263
|
+ free ( ctx->ap_rsn_ie );
|
|
264
|
+ ctx->ap_rsn_ie = NULL;
|
|
265
|
+ list_del ( &ctx->list );
|
|
266
|
+ }
|
|
267
|
+ }
|
|
268
|
+}
|
|
269
|
+
|
|
270
|
+
|
|
271
|
+/**
|
|
272
|
+ * Check PMKID consistency
|
|
273
|
+ *
|
|
274
|
+ * @v ctx WPA common context
|
|
275
|
+ * @v pmkid PMKID to check against (16 bytes long)
|
|
276
|
+ * @ret rc Zero if they match, or a negative error code if not
|
|
277
|
+ */
|
|
278
|
+int wpa_check_pmkid ( struct wpa_common_ctx *ctx, const u8 *pmkid )
|
|
279
|
+{
|
|
280
|
+ u8 sha1_ctx[SHA1_CTX_SIZE];
|
|
281
|
+ u8 my_pmkid[SHA1_SIZE];
|
|
282
|
+ u8 pmk[ctx->pmk_len];
|
|
283
|
+ size_t pmk_len;
|
|
284
|
+ struct {
|
|
285
|
+ char name[8];
|
|
286
|
+ u8 aa[ETH_ALEN];
|
|
287
|
+ u8 spa[ETH_ALEN];
|
|
288
|
+ } __attribute__ (( packed )) pmkid_data;
|
|
289
|
+
|
|
290
|
+ memcpy ( pmk, ctx->pmk, ctx->pmk_len );
|
|
291
|
+ pmk_len = ctx->pmk_len;
|
|
292
|
+
|
|
293
|
+ memcpy ( pmkid_data.name, "PMK Name", 8 );
|
|
294
|
+ memcpy ( pmkid_data.aa, ctx->dev->bssid, ETH_ALEN );
|
|
295
|
+ memcpy ( pmkid_data.spa, ctx->dev->netdev->ll_addr, ETH_ALEN );
|
|
296
|
+
|
|
297
|
+ hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len );
|
|
298
|
+ hmac_update ( &sha1_algorithm, sha1_ctx, &pmkid_data,
|
|
299
|
+ sizeof ( pmkid_data ) );
|
|
300
|
+ hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid );
|
|
301
|
+
|
|
302
|
+ if ( memcmp ( my_pmkid, pmkid, WPA_PMKID_LEN ) != 0 )
|
|
303
|
+ return -EACCES;
|
|
304
|
+
|
|
305
|
+ return 0;
|
|
306
|
+}
|
|
307
|
+
|
|
308
|
+
|
|
309
|
+/**
|
|
310
|
+ * Derive pairwise transient key
|
|
311
|
+ *
|
|
312
|
+ * @v ctx WPA common context
|
|
313
|
+ */
|
|
314
|
+static void wpa_derive_ptk ( struct wpa_common_ctx *ctx )
|
|
315
|
+{
|
|
316
|
+ struct {
|
|
317
|
+ u8 mac1[ETH_ALEN];
|
|
318
|
+ u8 mac2[ETH_ALEN];
|
|
319
|
+ u8 nonce1[WPA_NONCE_LEN];
|
|
320
|
+ u8 nonce2[WPA_NONCE_LEN];
|
|
321
|
+ } __attribute__ (( packed )) ptk_data;
|
|
322
|
+
|
|
323
|
+ /* The addresses and nonces are stored in numerical order (!) */
|
|
324
|
+
|
|
325
|
+ if ( memcmp ( ctx->dev->netdev->ll_addr, ctx->dev->bssid,
|
|
326
|
+ ETH_ALEN ) < 0 ) {
|
|
327
|
+ memcpy ( ptk_data.mac1, ctx->dev->netdev->ll_addr, ETH_ALEN );
|
|
328
|
+ memcpy ( ptk_data.mac2, ctx->dev->bssid, ETH_ALEN );
|
|
329
|
+ } else {
|
|
330
|
+ memcpy ( ptk_data.mac1, ctx->dev->bssid, ETH_ALEN );
|
|
331
|
+ memcpy ( ptk_data.mac2, ctx->dev->netdev->ll_addr, ETH_ALEN );
|
|
332
|
+ }
|
|
333
|
+
|
|
334
|
+ if ( memcmp ( ctx->Anonce, ctx->Snonce, WPA_NONCE_LEN ) < 0 ) {
|
|
335
|
+ memcpy ( ptk_data.nonce1, ctx->Anonce, WPA_NONCE_LEN );
|
|
336
|
+ memcpy ( ptk_data.nonce2, ctx->Snonce, WPA_NONCE_LEN );
|
|
337
|
+ } else {
|
|
338
|
+ memcpy ( ptk_data.nonce1, ctx->Snonce, WPA_NONCE_LEN );
|
|
339
|
+ memcpy ( ptk_data.nonce2, ctx->Anonce, WPA_NONCE_LEN );
|
|
340
|
+ }
|
|
341
|
+
|
|
342
|
+ DBGC2 ( ctx, "WPA %p A1 %s, A2 %s\n", ctx, eth_ntoa ( ptk_data.mac1 ),
|
|
343
|
+ eth_ntoa ( ptk_data.mac2 ) );
|
|
344
|
+ DBGC2 ( ctx, "WPA %p Nonce1, Nonce2:\n", ctx );
|
|
345
|
+ DBGC2_HD ( ctx, ptk_data.nonce1, WPA_NONCE_LEN );
|
|
346
|
+ DBGC2_HD ( ctx, ptk_data.nonce2, WPA_NONCE_LEN );
|
|
347
|
+
|
|
348
|
+ prf_sha1 ( ctx->pmk, ctx->pmk_len,
|
|
349
|
+ "Pairwise key expansion",
|
|
350
|
+ &ptk_data, sizeof ( ptk_data ),
|
|
351
|
+ &ctx->ptk, sizeof ( ctx->ptk ) );
|
|
352
|
+
|
|
353
|
+ DBGC2 ( ctx, "WPA %p PTK:\n", ctx );
|
|
354
|
+ DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) );
|
|
355
|
+}
|
|
356
|
+
|
|
357
|
+
|
|
358
|
+/**
|
|
359
|
+ * Install pairwise transient key
|
|
360
|
+ *
|
|
361
|
+ * @v ctx WPA common context
|
|
362
|
+ * @v len Key length (16 for CCMP, 32 for TKIP)
|
|
363
|
+ * @ret rc Return status code
|
|
364
|
+ */
|
|
365
|
+static inline int wpa_install_ptk ( struct wpa_common_ctx *ctx, int len )
|
|
366
|
+{
|
|
367
|
+ DBGC ( ctx, "WPA %p: installing %d-byte pairwise transient key\n",
|
|
368
|
+ ctx, len );
|
|
369
|
+ DBGC2_HD ( ctx, &ctx->ptk.tk, len );
|
|
370
|
+
|
|
371
|
+ return sec80211_install ( &ctx->dev->crypto, ctx->crypt,
|
|
372
|
+ &ctx->ptk.tk, len, NULL );
|
|
373
|
+}
|
|
374
|
+
|
|
375
|
+/**
|
|
376
|
+ * Install group transient key
|
|
377
|
+ *
|
|
378
|
+ * @v ctx WPA common context
|
|
379
|
+ * @v len Key length (16 for CCMP, 32 for TKIP)
|
|
380
|
+ * @v rsc Receive sequence counter field in EAPOL-Key packet
|
|
381
|
+ * @ret rc Return status code
|
|
382
|
+ */
|
|
383
|
+static inline int wpa_install_gtk ( struct wpa_common_ctx *ctx, int len,
|
|
384
|
+ const void *rsc )
|
|
385
|
+{
|
|
386
|
+ DBGC ( ctx, "WPA %p: installing %d-byte group transient key\n",
|
|
387
|
+ ctx, len );
|
|
388
|
+ DBGC2_HD ( ctx, &ctx->gtk.tk, len );
|
|
389
|
+
|
|
390
|
+ return sec80211_install ( &ctx->dev->gcrypto, ctx->gcrypt,
|
|
391
|
+ &ctx->gtk.tk, len, rsc );
|
|
392
|
+}
|
|
393
|
+
|
|
394
|
+/**
|
|
395
|
+ * Search for group transient key, and install it if found
|
|
396
|
+ *
|
|
397
|
+ * @v ctx WPA common context
|
|
398
|
+ * @v ie Pointer to first IE in key data field
|
|
399
|
+ * @v ie_end Pointer to first byte not in key data field
|
|
400
|
+ * @v rsc Receive sequence counter field in EAPOL-Key packet
|
|
401
|
+ * @ret rc Return status code
|
|
402
|
+ */
|
|
403
|
+static int wpa_maybe_install_gtk ( struct wpa_common_ctx *ctx,
|
|
404
|
+ union ieee80211_ie *ie, void *ie_end,
|
|
405
|
+ const void *rsc )
|
|
406
|
+{
|
|
407
|
+ struct wpa_kde *kde;
|
|
408
|
+
|
|
409
|
+ if ( ! ieee80211_ie_bound ( ie, ie_end ) )
|
|
410
|
+ return -ENOENT;
|
|
411
|
+
|
|
412
|
+ while ( ie ) {
|
|
413
|
+ if ( ie->id == IEEE80211_IE_VENDOR &&
|
|
414
|
+ ie->vendor.oui == WPA_KDE_GTK )
|
|
415
|
+ break;
|
|
416
|
+
|
|
417
|
+ ie = ieee80211_next_ie ( ie, ie_end );
|
|
418
|
+ }
|
|
419
|
+
|
|
420
|
+ if ( ! ie )
|
|
421
|
+ return -ENOENT;
|
|
422
|
+
|
|
423
|
+ if ( ie->len - 6u > sizeof ( ctx->gtk.tk ) ) {
|
|
424
|
+ DBGC ( ctx, "WPA %p: GTK KDE is too long (%d bytes, max %d)\n",
|
|
425
|
+ ctx, ie->len - 4, sizeof ( ctx->gtk.tk ) );
|
|
426
|
+ return -EINVAL;
|
|
427
|
+ }
|
|
428
|
+
|
|
429
|
+ /* XXX We ignore key ID for now. */
|
|
430
|
+ kde = ( struct wpa_kde * ) ie;
|
|
431
|
+ memcpy ( &ctx->gtk.tk, &kde->gtk_encap.gtk, kde->len - 6 );
|
|
432
|
+
|
|
433
|
+ return wpa_install_gtk ( ctx, kde->len - 6, rsc );
|
|
434
|
+}
|
|
435
|
+
|
|
436
|
+
|
|
437
|
+/**
|
|
438
|
+ * Allocate I/O buffer for construction of outgoing EAPOL-Key frame
|
|
439
|
+ *
|
|
440
|
+ * @v kdlen Maximum number of bytes in the Key Data field
|
|
441
|
+ * @ret iob Newly allocated I/O buffer
|
|
442
|
+ *
|
|
443
|
+ * The returned buffer will have space reserved for the link-layer and
|
|
444
|
+ * EAPOL headers, and will have @c iob->tail pointing to the start of
|
|
445
|
+ * the Key Data field. Thus, it is necessary to use iob_put() in
|
|
446
|
+ * filling the Key Data.
|
|
447
|
+ */
|
|
448
|
+static struct io_buffer * wpa_alloc_frame ( int kdlen )
|
|
449
|
+{
|
|
450
|
+ struct io_buffer *ret = alloc_iob ( sizeof ( struct eapol_key_pkt ) +
|
|
451
|
+ kdlen + EAPOL_HDR_LEN +
|
|
452
|
+ MAX_LL_HEADER_LEN );
|
|
453
|
+ if ( ! ret )
|
|
454
|
+ return NULL;
|
|
455
|
+
|
|
456
|
+ iob_reserve ( ret, MAX_LL_HEADER_LEN + EAPOL_HDR_LEN );
|
|
457
|
+ memset ( iob_put ( ret, sizeof ( struct eapol_key_pkt ) ), 0,
|
|
458
|
+ sizeof ( struct eapol_key_pkt ) );
|
|
459
|
+
|
|
460
|
+ return ret;
|
|
461
|
+}
|
|
462
|
+
|
|
463
|
+
|
|
464
|
+/**
|
|
465
|
+ * Send EAPOL-Key packet
|
|
466
|
+ *
|
|
467
|
+ * @v iob I/O buffer, with sufficient headroom for headers
|
|
468
|
+ * @v dev 802.11 device
|
|
469
|
+ * @v kie Key integrity and encryption handler
|
|
470
|
+ * @v is_rsn If TRUE, handshake uses new RSN format
|
|
471
|
+ * @ret rc Return status code
|
|
472
|
+ *
|
|
473
|
+ * If a KIE is specified, the MIC will be filled in before transmission.
|
|
474
|
+ */
|
|
475
|
+static int wpa_send_eapol ( struct io_buffer *iob, struct wpa_common_ctx *ctx,
|
|
476
|
+ struct wpa_kie *kie )
|
|
477
|
+{
|
|
478
|
+ struct eapol_key_pkt *pkt = iob->data;
|
|
479
|
+ struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN );
|
|
480
|
+
|
|
481
|
+ pkt->info = htons ( pkt->info );
|
|
482
|
+ pkt->keysize = htons ( pkt->keysize );
|
|
483
|
+ pkt->datalen = htons ( pkt->datalen );
|
|
484
|
+ pkt->replay = cpu_to_be64 ( pkt->replay );
|
|
485
|
+ eapol->version = EAPOL_THIS_VERSION;
|
|
486
|
+ eapol->type = EAPOL_TYPE_KEY;
|
|
487
|
+ eapol->length = htons ( iob->tail - iob->data - sizeof ( *eapol ) );
|
|
488
|
+
|
|
489
|
+ memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
|
|
490
|
+ if ( kie )
|
|
491
|
+ kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN +
|
|
492
|
+ sizeof ( *pkt ) + ntohs ( pkt->datalen ),
|
|
493
|
+ pkt->mic );
|
|
494
|
+
|
|
495
|
+ return net_tx ( iob, ctx->dev->netdev, &eapol_protocol,
|
|
496
|
+ ctx->dev->bssid );
|
|
497
|
+}
|
|
498
|
+
|
|
499
|
+
|
|
500
|
+/**
|
|
501
|
+ * Send second frame in 4-Way Handshake
|
|
502
|
+ *
|
|
503
|
+ * @v ctx WPA common context
|
|
504
|
+ * @v pkt First frame, to which this is a reply
|
|
505
|
+ * @v is_rsn If TRUE, handshake uses new RSN format
|
|
506
|
+ * @v kie Key integrity and encryption handler
|
|
507
|
+ * @ret rc Return status code
|
|
508
|
+ */
|
|
509
|
+static int wpa_send_2_of_4 ( struct wpa_common_ctx *ctx,
|
|
510
|
+ struct eapol_key_pkt *pkt, int is_rsn,
|
|
511
|
+ struct wpa_kie *kie )
|
|
512
|
+{
|
|
513
|
+ struct io_buffer *iob = wpa_alloc_frame ( ctx->dev->rsn_ie->len + 2 );
|
|
514
|
+ struct eapol_key_pkt *npkt;
|
|
515
|
+
|
|
516
|
+ if ( ! iob )
|
|
517
|
+ return -ENOMEM;
|
|
518
|
+
|
|
519
|
+ npkt = iob->data;
|
|
520
|
+ memcpy ( npkt, pkt, sizeof ( *pkt ) );
|
|
521
|
+ npkt->info &= ~EAPOL_KEY_INFO_KEY_ACK;
|
|
522
|
+ npkt->info |= EAPOL_KEY_INFO_KEY_MIC;
|
|
523
|
+ if ( is_rsn )
|
|
524
|
+ npkt->keysize = 0;
|
|
525
|
+ memcpy ( npkt->nonce, ctx->Snonce, sizeof ( npkt->nonce ) );
|
|
526
|
+ npkt->datalen = ctx->dev->rsn_ie->len + 2;
|
|
527
|
+ memcpy ( iob_put ( iob, npkt->datalen ), ctx->dev->rsn_ie,
|
|
528
|
+ npkt->datalen );
|
|
529
|
+
|
|
530
|
+ DBGC ( ctx, "WPA %p: sending 2/4\n", ctx );
|
|
531
|
+
|
|
532
|
+ return wpa_send_eapol ( iob, ctx, kie );
|
|
533
|
+}
|
|
534
|
+
|
|
535
|
+
|
|
536
|
+/**
|
|
537
|
+ * Handle receipt of first frame in 4-Way Handshake
|
|
538
|
+ *
|
|
539
|
+ * @v ctx WPA common context
|
|
540
|
+ * @v pkt EAPOL-Key packet
|
|
541
|
+ * @v is_rsn If TRUE, frame uses new RSN format
|
|
542
|
+ * @v kie Key integrity and encryption handler
|
|
543
|
+ * @ret rc Return status code
|
|
544
|
+ */
|
|
545
|
+static int wpa_handle_1_of_4 ( struct wpa_common_ctx *ctx,
|
|
546
|
+ struct eapol_key_pkt *pkt, int is_rsn,
|
|
547
|
+ struct wpa_kie *kie )
|
|
548
|
+{
|
|
549
|
+ int rc;
|
|
550
|
+
|
|
551
|
+ if ( ctx->state == WPA_WAITING )
|
|
552
|
+ return -EINVAL;
|
|
553
|
+
|
|
554
|
+ ctx->state = WPA_WORKING;
|
|
555
|
+ memcpy ( ctx->Anonce, pkt->nonce, sizeof ( ctx->Anonce ) );
|
|
556
|
+ if ( ! ctx->have_Snonce ) {
|
|
557
|
+ get_random_bytes ( ctx->Snonce, sizeof ( ctx->Snonce ) );
|
|
558
|
+ ctx->have_Snonce = 1;
|
|
559
|
+ }
|
|
560
|
+
|
|
561
|
+ if ( is_rsn && pkt->datalen ) {
|
|
562
|
+ union ieee80211_ie *ie = ( union ieee80211_ie * ) pkt->data;
|
|
563
|
+ void *ie_end = pkt->data + pkt->datalen;
|
|
564
|
+
|
|
565
|
+ if ( ! ieee80211_ie_bound ( ie, ie_end ) ) {
|
|
566
|
+ DBGC ( ctx, "WPA %p: malformed PMKID KDE\n", ctx );
|
|
567
|
+ return wpa_fail ( ctx, -EINVAL );
|
|
568
|
+ }
|
|
569
|
+
|
|
570
|
+ while ( ie ) {
|
|
571
|
+ if ( ie->id == IEEE80211_IE_VENDOR &&
|
|
572
|
+ ie->vendor.oui == WPA_KDE_PMKID ) {
|
|
573
|
+ rc = wpa_check_pmkid ( ctx, ie->vendor.data );
|
|
574
|
+ if ( rc < 0 ) {
|
|
575
|
+ DBGC ( ctx, "WPA %p ALERT: PMKID "
|
|
576
|
+ "mismatch in 1/4\n", ctx );
|
|
577
|
+ return wpa_fail ( ctx, rc );
|
|
578
|
+ }
|
|
579
|
+ }
|
|
580
|
+
|
|
581
|
+ ie = ieee80211_next_ie ( ie, ie_end );
|
|
582
|
+ }
|
|
583
|
+ }
|
|
584
|
+
|
|
585
|
+ DBGC ( ctx, "WPA %p: received 1/4, looks OK\n", ctx );
|
|
586
|
+
|
|
587
|
+ wpa_derive_ptk ( ctx );
|
|
588
|
+
|
|
589
|
+ return wpa_send_2_of_4 ( ctx, pkt, is_rsn, kie );
|
|
590
|
+}
|
|
591
|
+
|
|
592
|
+
|
|
593
|
+/**
|
|
594
|
+ * Send fourth frame in 4-Way Handshake, or second in Group Key Handshake
|
|
595
|
+ *
|
|
596
|
+ * @v ctx WPA common context
|
|
597
|
+ * @v pkt EAPOL-Key packet for frame to which we're replying
|
|
598
|
+ * @v is_rsn If TRUE, frame uses new RSN format
|
|
599
|
+ * @v kie Key integrity and encryption handler
|
|
600
|
+ * @ret rc Return status code
|
|
601
|
+ */
|
|
602
|
+static int wpa_send_final ( struct wpa_common_ctx *ctx,
|
|
603
|
+ struct eapol_key_pkt *pkt, int is_rsn,
|
|
604
|
+ struct wpa_kie *kie )
|
|
605
|
+{
|
|
606
|
+ struct io_buffer *iob = wpa_alloc_frame ( 0 );
|
|
607
|
+ struct eapol_key_pkt *npkt;
|
|
608
|
+
|
|
609
|
+ if ( ! iob )
|
|
610
|
+ return -ENOMEM;
|
|
611
|
+
|
|
612
|
+ npkt = iob->data;
|
|
613
|
+ memcpy ( npkt, pkt, sizeof ( *pkt ) );
|
|
614
|
+ npkt->info &= ~( EAPOL_KEY_INFO_KEY_ACK | EAPOL_KEY_INFO_INSTALL |
|
|
615
|
+ EAPOL_KEY_INFO_KEY_ENC );
|
|
616
|
+ if ( is_rsn )
|
|
617
|
+ npkt->keysize = 0;
|
|
618
|
+ memset ( npkt->nonce, 0, sizeof ( npkt->nonce ) );
|
|
619
|
+ memset ( npkt->iv, 0, sizeof ( npkt->iv ) );
|
|
620
|
+ npkt->datalen = 0;
|
|
621
|
+
|
|
622
|
+ if ( npkt->info & EAPOL_KEY_INFO_TYPE )
|
|
623
|
+ DBGC ( ctx, "WPA %p: sending 4/4\n", ctx );
|
|
624
|
+ else
|
|
625
|
+ DBGC ( ctx, "WPA %p: sending 2/2\n", ctx );
|
|
626
|
+
|
|
627
|
+ return wpa_send_eapol ( iob, ctx, kie );
|
|
628
|
+
|
|
629
|
+}
|
|
630
|
+
|
|
631
|
+
|
|
632
|
+/**
|
|
633
|
+ * Handle receipt of third frame in 4-Way Handshake
|
|
634
|
+ *
|
|
635
|
+ * @v ctx WPA common context
|
|
636
|
+ * @v pkt EAPOL-Key packet
|
|
637
|
+ * @v is_rsn If TRUE, frame uses new RSN format
|
|
638
|
+ * @v kie Key integrity and encryption handler
|
|
639
|
+ * @ret rc Return status code
|
|
640
|
+ */
|
|
641
|
+static int wpa_handle_3_of_4 ( struct wpa_common_ctx *ctx,
|
|
642
|
+ struct eapol_key_pkt *pkt, int is_rsn,
|
|
643
|
+ struct wpa_kie *kie )
|
|
644
|
+{
|
|
645
|
+ int rc;
|
|
646
|
+ u8 *this_rsn, *this_rsn_end;
|
|
647
|
+ u8 *new_rsn, *new_rsn_end;
|
|
648
|
+ int this_is_rsn, new_is_rsn;
|
|
649
|
+
|
|
650
|
+ if ( ctx->state == WPA_WAITING )
|
|
651
|
+ return -EINVAL;
|
|
652
|
+
|
|
653
|
+ ctx->state = WPA_WORKING;
|
|
654
|
+
|
|
655
|
+ /* Check nonce */
|
|
656
|
+ if ( memcmp ( ctx->Anonce, pkt->nonce, WPA_NONCE_LEN ) != 0 ) {
|
|
657
|
+ DBGC ( ctx, "WPA %p ALERT: nonce mismatch in 3/4\n", ctx );
|
|
658
|
+ return wpa_fail ( ctx, -EACCES );
|
|
659
|
+ }
|
|
660
|
+
|
|
661
|
+ /* Check RSN IE */
|
|
662
|
+ this_rsn = sec80211_find_rsn ( ( union ieee80211_ie * ) pkt->data,
|
|
663
|
+ pkt->data + pkt->datalen,
|
|
664
|
+ &this_is_rsn, &this_rsn_end );
|
|
665
|
+ if ( this_rsn )
|
|
666
|
+ new_rsn = sec80211_find_rsn ( ( union ieee80211_ie * )
|
|
667
|
+ this_rsn_end,
|
|
668
|
+ pkt->data + pkt->datalen,
|
|
669
|
+ &new_is_rsn, &new_rsn_end );
|
|
670
|
+ else
|
|
671
|
+ new_rsn = NULL;
|
|
672
|
+
|
|
673
|
+ if ( ! ctx->ap_rsn_ie || ! this_rsn ||
|
|
674
|
+ ctx->ap_rsn_ie_len != ( this_rsn_end - this_rsn ) ||
|
|
675
|
+ ctx->ap_rsn_is_rsn != this_is_rsn ||
|
|
676
|
+ memcmp ( ctx->ap_rsn_ie, this_rsn, ctx->ap_rsn_ie_len ) != 0 ) {
|
|
677
|
+ DBGC ( ctx, "WPA %p ALERT: RSN mismatch in 3/4\n", ctx );
|
|
678
|
+ DBGC2 ( ctx, "WPA %p RSNs (in 3/4, in beacon):\n", ctx );
|
|
679
|
+ DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
|
|
680
|
+ DBGC2_HD ( ctx, ctx->ap_rsn_ie, ctx->ap_rsn_ie_len );
|
|
681
|
+ return wpa_fail ( ctx, -EACCES );
|
|
682
|
+ }
|
|
683
|
+
|
|
684
|
+ /* Don't switch if they just supplied both styles of IE
|
|
685
|
+ simultaneously; we need two RSN IEs or two WPA IEs to
|
|
686
|
+ switch ciphers. They'll be immediately consecutive because
|
|
687
|
+ of ordering guarantees. */
|
|
688
|
+ if ( new_rsn && this_is_rsn == new_is_rsn ) {
|
|
689
|
+ struct net80211_wlan *assoc = ctx->dev->associating;
|
|
690
|
+ DBGC ( ctx, "WPA %p: accommodating bait-and-switch tactics\n",
|
|
691
|
+ ctx );
|
|
692
|
+ DBGC2 ( ctx, "WPA %p RSNs (in 3/4+beacon, new in 3/4):\n",
|
|
693
|
+ ctx );
|
|
694
|
+ DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
|
|
695
|
+ DBGC2_HD ( ctx, new_rsn, new_rsn_end - new_rsn );
|
|
696
|
+
|
|
697
|
+ if ( ( rc = sec80211_detect_ie ( new_is_rsn, new_rsn,
|
|
698
|
+ new_rsn_end,
|
|
699
|
+ &assoc->handshaking,
|
|
700
|
+ &assoc->crypto ) ) != 0 )
|
|
701
|
+ DBGC ( ctx, "WPA %p: bait-and-switch invalid, staying "
|
|
702
|
+ "with original request\n", ctx );
|
|
703
|
+ } else {
|
|
704
|
+ new_rsn = this_rsn;
|
|
705
|
+ new_is_rsn = this_is_rsn;
|
|
706
|
+ new_rsn_end = this_rsn_end;
|
|
707
|
+ }
|
|
708
|
+
|
|
709
|
+ /* Grab group cryptosystem ID */
|
|
710
|
+ ctx->gcrypt = sec80211_rsn_get_net80211_crypt ( *( u32 * )
|
|
711
|
+ ( new_rsn + 2 ) );
|
|
712
|
+
|
|
713
|
+ /* Check for a GTK, if info field is encrypted */
|
|
714
|
+ if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
|
|
715
|
+ rc = wpa_maybe_install_gtk ( ctx,
|
|
716
|
+ ( union ieee80211_ie * ) pkt->data,
|
|
717
|
+ pkt->data + pkt->datalen,
|
|
718
|
+ pkt->rsc );
|
|
719
|
+ if ( rc < 0 ) {
|
|
720
|
+ DBGC ( ctx, "WPA %p did not install GTK in 3/4: %s\n",
|
|
721
|
+ ctx, strerror ( rc ) );
|
|
722
|
+ if ( rc != -ENOENT )
|
|
723
|
+ return wpa_fail ( ctx, rc );
|
|
724
|
+ }
|
|
725
|
+ }
|
|
726
|
+
|
|
727
|
+ DBGC ( ctx, "WPA %p: received 3/4, looks OK\n", ctx );
|
|
728
|
+
|
|
729
|
+ /* Send final message */
|
|
730
|
+ rc = wpa_send_final ( ctx, pkt, is_rsn, kie );
|
|
731
|
+ if ( rc < 0 )
|
|
732
|
+ return wpa_fail ( ctx, rc );
|
|
733
|
+
|
|
734
|
+ /* Install PTK */
|
|
735
|
+ rc = wpa_install_ptk ( ctx, pkt->keysize );
|
|
736
|
+ if ( rc < 0 ) {
|
|
737
|
+ DBGC ( ctx, "WPA %p failed to install PTK: %s\n", ctx,
|
|
738
|
+ strerror ( rc ) );
|
|
739
|
+ return wpa_fail ( ctx, rc );
|
|
740
|
+ }
|
|
741
|
+
|
|
742
|
+ /* Mark us as needing a new Snonce if we rekey */
|
|
743
|
+ ctx->have_Snonce = 0;
|
|
744
|
+
|
|
745
|
+ /* Done! */
|
|
746
|
+ ctx->state = WPA_SUCCESS;
|
|
747
|
+ return 0;
|
|
748
|
+}
|
|
749
|
+
|
|
750
|
+
|
|
751
|
+/**
|
|
752
|
+ * Handle receipt of first frame in Group Key Handshake
|
|
753
|
+ *
|
|
754
|
+ * @v ctx WPA common context
|
|
755
|
+ * @v pkt EAPOL-Key packet
|
|
756
|
+ * @v is_rsn If TRUE, frame uses new RSN format
|
|
757
|
+ * @v kie Key integrity and encryption handler
|
|
758
|
+ * @ret rc Return status code
|
|
759
|
+ */
|
|
760
|
+static int wpa_handle_1_of_2 ( struct wpa_common_ctx *ctx,
|
|
761
|
+ struct eapol_key_pkt *pkt, int is_rsn,
|
|
762
|
+ struct wpa_kie *kie )
|
|
763
|
+{
|
|
764
|
+ int rc;
|
|
765
|
+
|
|
766
|
+ /*
|
|
767
|
+ * WPA and RSN do this completely differently.
|
|
768
|
+ *
|
|
769
|
+ * The idea of encoding the GTK (or PMKID, or various other
|
|
770
|
+ * things) into a KDE that looks like an information element
|
|
771
|
+ * is an RSN innovation; old WPA code never encapsulates
|
|
772
|
+ * things like that. If it looks like an info element, it
|
|
773
|
+ * really is (for the WPA IE check in frames 2/4 and 3/4). The
|
|
774
|
+ * "key data encrypted" bit in the info field is also specific
|
|
775
|
+ * to RSN.
|
|
776
|
+ *
|
|
777
|
+ * So from an old WPA host, 3/4 does not contain an
|
|
778
|
+ * encapsulated GTK. The first frame of the GK handshake
|
|
779
|
+ * contains it, encrypted, but without a KDE wrapper, and with
|
|
780
|
+ * the key ID field (which gPXE doesn't use) shoved away in
|
|
781
|
+ * the reserved bits in the info field, and the TxRx bit
|
|
782
|
+ * stealing the Install bit's spot.
|
|
783
|
+ */
|
|
784
|
+
|
|
785
|
+ if ( is_rsn && ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) ) {
|
|
786
|
+ rc = wpa_maybe_install_gtk ( ctx,
|
|
787
|
+ ( union ieee80211_ie * ) pkt->data,
|
|
788
|
+ pkt->data + pkt->datalen,
|
|
789
|
+ pkt->rsc );
|
|
790
|
+ if ( rc < 0 ) {
|
|
791
|
+ DBGC ( ctx, "WPA %p: failed to install GTK in 1/2: "
|
|
792
|
+ "%s\n", ctx, strerror ( rc ) );
|
|
793
|
+ return wpa_fail ( ctx, rc );
|
|
794
|
+ }
|
|
795
|
+ } else {
|
|
796
|
+ rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
|
|
797
|
+ &pkt->datalen );
|
|
798
|
+ if ( rc < 0 ) {
|
|
799
|
+ DBGC ( ctx, "WPA %p: failed to decrypt GTK: %s\n",
|
|
800
|
+ ctx, strerror ( rc ) );
|
|
801
|
+ return rc; /* non-fatal */
|
|
802
|
+ }
|
|
803
|
+ if ( pkt->datalen > sizeof ( ctx->gtk.tk ) ) {
|
|
804
|
+ DBGC ( ctx, "WPA %p: too much GTK data (%d > %d)\n",
|
|
805
|
+ ctx, pkt->datalen, sizeof ( ctx->gtk.tk ) );
|
|
806
|
+ return wpa_fail ( ctx, -EINVAL );
|
|
807
|
+ }
|
|
808
|
+
|
|
809
|
+ memcpy ( &ctx->gtk.tk, pkt->data, pkt->datalen );
|
|
810
|
+ wpa_install_gtk ( ctx, pkt->datalen, pkt->rsc );
|
|
811
|
+ }
|
|
812
|
+
|
|
813
|
+ DBGC ( ctx, "WPA %p: received 1/2, looks OK\n", ctx );
|
|
814
|
+
|
|
815
|
+ return wpa_send_final ( ctx, pkt, is_rsn, kie );
|
|
816
|
+}
|
|
817
|
+
|
|
818
|
+
|
|
819
|
+/**
|
|
820
|
+ * Handle receipt of EAPOL-Key frame for WPA
|
|
821
|
+ *
|
|
822
|
+ * @v iob I/O buffer
|
|
823
|
+ * @v netdev Network device
|
|
824
|
+ * @v ll_source Source link-layer address
|
|
825
|
+ */
|
|
826
|
+static int eapol_key_rx ( struct io_buffer *iob, struct net_device *netdev,
|
|
827
|
+ const void *ll_source )
|
|
828
|
+{
|
|
829
|
+ struct net80211_device *dev = net80211_get ( netdev );
|
|
830
|
+ struct eapol_key_pkt *pkt = iob->data;
|
|
831
|
+ int is_rsn, found_ctx;
|
|
832
|
+ struct wpa_common_ctx *ctx;
|
|
833
|
+ int rc = 0;
|
|
834
|
+ struct wpa_kie *kie;
|
|
835
|
+ u8 their_mic[16], our_mic[16];
|
|
836
|
+
|
|
837
|
+ if ( pkt->type != EAPOL_KEY_TYPE_WPA &&
|
|
838
|
+ pkt->type != EAPOL_KEY_TYPE_RSN ) {
|
|
839
|
+ DBG ( "EAPOL-Key: packet not of 802.11 type\n" );
|
|
840
|
+ rc = -EINVAL;
|
|
841
|
+ goto drop;
|
|
842
|
+ }
|
|
843
|
+
|
|
844
|
+ is_rsn = ( pkt->type == EAPOL_KEY_TYPE_RSN );
|
|
845
|
+
|
|
846
|
+ if ( ! dev ) {
|
|
847
|
+ DBG ( "EAPOL-Key: packet not from 802.11\n" );
|
|
848
|
+ rc = -EINVAL;
|
|
849
|
+ goto drop;
|
|
850
|
+ }
|
|
851
|
+
|
|
852
|
+ if ( memcmp ( dev->bssid, ll_source, ETH_ALEN ) != 0 ) {
|
|
853
|
+ DBG ( "EAPOL-Key: packet not from associated AP\n" );
|
|
854
|
+ rc = -EINVAL;
|
|
855
|
+ goto drop;
|
|
856
|
+ }
|
|
857
|
+
|
|
858
|
+ if ( ! ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_ACK ) ) {
|
|
859
|
+ DBG ( "EAPOL-Key: packet sent in wrong direction\n" );
|
|
860
|
+ rc = -EINVAL;
|
|
861
|
+ goto drop;
|
|
862
|
+ }
|
|
863
|
+
|
|
864
|
+ found_ctx = 0;
|
|
865
|
+ list_for_each_entry ( ctx, &wpa_contexts, list ) {
|
|
866
|
+ if ( ctx->dev == dev ) {
|
|
867
|
+ found_ctx = 1;
|
|
868
|
+ break;
|
|
869
|
+ }
|
|
870
|
+ }
|
|
871
|
+
|
|
872
|
+ if ( ! found_ctx ) {
|
|
873
|
+ DBG ( "EAPOL-Key: no WPA context to handle packet for %p\n",
|
|
874
|
+ dev );
|
|
875
|
+ rc = -ENOENT;
|
|
876
|
+ goto drop;
|
|
877
|
+ }
|
|
878
|
+
|
|
879
|
+ if ( ( void * ) ( pkt + 1 ) + ntohs ( pkt->datalen ) > iob->tail ) {
|
|
880
|
+ DBGC ( ctx, "WPA %p: packet truncated (has %d extra bytes, "
|
|
881
|
+ "states %d)\n", ctx, iob->tail - ( void * ) ( pkt + 1 ),
|
|
882
|
+ ntohs ( pkt->datalen ) );
|
|
883
|
+ rc = -EINVAL;
|
|
884
|
+ goto drop;
|
|
885
|
+ }
|
|
886
|
+
|
|
887
|
+ /* Get a handle on key integrity/encryption handler */
|
|
888
|
+ kie = wpa_find_kie ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
|
|
889
|
+ if ( ! kie ) {
|
|
890
|
+ DBGC ( ctx, "WPA %p: no support for packet version %d\n", ctx,
|
|
891
|
+ ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
|
|
892
|
+ rc = wpa_fail ( ctx, -ENOTSUP );
|
|
893
|
+ goto drop;
|
|
894
|
+ }
|
|
895
|
+
|
|
896
|
+ /* Check MIC */
|
|
897
|
+ if ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_MIC ) {
|
|
898
|
+ memcpy ( their_mic, pkt->mic, sizeof ( pkt->mic ) );
|
|
899
|
+ memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
|
|
900
|
+ kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN,
|
|
901
|
+ EAPOL_HDR_LEN + sizeof ( *pkt ) +
|
|
902
|
+ ntohs ( pkt->datalen ), our_mic );
|
|
903
|
+ DBGC2 ( ctx, "WPA %p MIC comparison (theirs, ours):\n", ctx );
|
|
904
|
+ DBGC2_HD ( ctx, their_mic, 16 );
|
|
905
|
+ DBGC2_HD ( ctx, our_mic, 16 );
|
|
906
|
+ if ( memcmp ( their_mic, our_mic, sizeof ( pkt->mic ) ) != 0 ) {
|
|
907
|
+ DBGC ( ctx, "WPA %p: EAPOL MIC failure\n", ctx );
|
|
908
|
+ goto drop;
|
|
909
|
+ }
|
|
910
|
+ }
|
|
911
|
+
|
|
912
|
+ /* Fix byte order to local */
|
|
913
|
+ pkt->info = ntohs ( pkt->info );
|
|
914
|
+ pkt->keysize = ntohs ( pkt->keysize );
|
|
915
|
+ pkt->datalen = ntohs ( pkt->datalen );
|
|
916
|
+ pkt->replay = be64_to_cpu ( pkt->replay );
|
|
917
|
+
|
|
918
|
+ /* Check replay counter */
|
|
919
|
+ if ( ctx->replay != ~0ULL && ctx->replay >= pkt->replay ) {
|
|
920
|
+ DBGC ( ctx, "WPA %p ALERT: Replay detected! "
|
|
921
|
+ "(%08x:%08x >= %08x:%08x)\n", ctx,
|
|
922
|
+ ( u32 ) ( ctx->replay >> 32 ), ( u32 ) ctx->replay,
|
|
923
|
+ ( u32 ) ( pkt->replay >> 32 ), ( u32 ) pkt->replay );
|
|
924
|
+ rc = 0; /* ignore without error */
|
|
925
|
+ goto drop;
|
|
926
|
+ }
|
|
927
|
+ ctx->replay = pkt->replay;
|
|
928
|
+
|
|
929
|
+ /* Decrypt key data */
|
|
930
|
+ if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
|
|
931
|
+ rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
|
|
932
|
+ &pkt->datalen );
|
|
933
|
+ if ( rc < 0 ) {
|
|
934
|
+ DBGC ( ctx, "WPA %p: failed to decrypt packet: %s\n",
|
|
935
|
+ ctx, strerror ( rc ) );
|
|
936
|
+ goto drop;
|
|
937
|
+ }
|
|
938
|
+ }
|
|
939
|
+
|
|
940
|
+ /* Hand it off to appropriate handler */
|
|
941
|
+ switch ( pkt->info & ( EAPOL_KEY_INFO_TYPE |
|
|
942
|
+ EAPOL_KEY_INFO_KEY_MIC ) ) {
|
|
943
|
+ case EAPOL_KEY_TYPE_PTK:
|
|
944
|
+ rc = wpa_handle_1_of_4 ( ctx, pkt, is_rsn, kie );
|
|
945
|
+ break;
|
|
946
|
+
|
|
947
|
+ case EAPOL_KEY_TYPE_PTK | EAPOL_KEY_INFO_KEY_MIC:
|
|
948
|
+ rc = wpa_handle_3_of_4 ( ctx, pkt, is_rsn, kie );
|
|
949
|
+ break;
|
|
950
|
+
|
|
951
|
+ case EAPOL_KEY_TYPE_GTK | EAPOL_KEY_INFO_KEY_MIC:
|
|
952
|
+ rc = wpa_handle_1_of_2 ( ctx, pkt, is_rsn, kie );
|
|
953
|
+ break;
|
|
954
|
+
|
|
955
|
+ default:
|
|
956
|
+ DBGC ( ctx, "WPA %p: Invalid combination of key flags %04x\n",
|
|
957
|
+ ctx, pkt->info );
|
|
958
|
+ rc = -EINVAL;
|
|
959
|
+ break;
|
|
960
|
+ }
|
|
961
|
+
|
|
962
|
+ drop:
|
|
963
|
+ free_iob ( iob );
|
|
964
|
+ return rc;
|
|
965
|
+}
|
|
966
|
+
|
|
967
|
+struct eapol_handler eapol_key_handler __eapol_handler = {
|
|
968
|
+ .type = EAPOL_TYPE_KEY,
|
|
969
|
+ .rx = eapol_key_rx,
|
|
970
|
+};
|
|
971
|
+
|
|
972
|
+/* WPA always needs EAPOL in order to be useful */
|
|
973
|
+REQUIRE_OBJECT ( eapol );
|