[e16e8f2] | 1 | /* |
---|
| 2 | * Copyright (c) 2009 Joshua Oreman <oremanj@rwcr.net>. |
---|
| 3 | * |
---|
| 4 | * This program is free software; you can redistribute it and/or |
---|
| 5 | * modify it under the terms of the GNU General Public License as |
---|
| 6 | * published by the Free Software Foundation; either version 2 of the |
---|
| 7 | * License, or any later version. |
---|
| 8 | * |
---|
| 9 | * This program is distributed in the hope that it will be useful, but |
---|
| 10 | * WITHOUT ANY WARRANTY; without even the implied warranty of |
---|
| 11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
---|
| 12 | * General Public License for more details. |
---|
| 13 | * |
---|
| 14 | * You should have received a copy of the GNU General Public License |
---|
| 15 | * along with this program; if not, write to the Free Software |
---|
| 16 | * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. |
---|
| 17 | */ |
---|
| 18 | |
---|
| 19 | FILE_LICENCE ( GPL2_OR_LATER ); |
---|
| 20 | |
---|
| 21 | #include <gpxe/net80211.h> |
---|
| 22 | #include <gpxe/sec80211.h> |
---|
| 23 | #include <gpxe/wpa.h> |
---|
| 24 | #include <gpxe/eapol.h> |
---|
| 25 | #include <gpxe/crypto.h> |
---|
| 26 | #include <gpxe/arc4.h> |
---|
| 27 | #include <gpxe/crc32.h> |
---|
| 28 | #include <gpxe/sha1.h> |
---|
| 29 | #include <gpxe/hmac.h> |
---|
| 30 | #include <gpxe/list.h> |
---|
| 31 | #include <gpxe/ethernet.h> |
---|
| 32 | #include <stdlib.h> |
---|
| 33 | #include <string.h> |
---|
| 34 | #include <errno.h> |
---|
| 35 | |
---|
| 36 | /** @file |
---|
| 37 | * |
---|
| 38 | * Handler for the aspects of WPA handshaking that are independent of |
---|
| 39 | * 802.1X/PSK or TKIP/CCMP; this mostly involves the 4-Way Handshake. |
---|
| 40 | */ |
---|
| 41 | |
---|
| 42 | /** List of WPA contexts in active use. */ |
---|
| 43 | struct list_head wpa_contexts = LIST_HEAD_INIT ( wpa_contexts ); |
---|
| 44 | |
---|
| 45 | |
---|
| 46 | /** |
---|
| 47 | * Return an error code and deauthenticate |
---|
| 48 | * |
---|
| 49 | * @v ctx WPA common context |
---|
| 50 | * @v rc Return status code |
---|
| 51 | * @ret rc The passed return status code |
---|
| 52 | */ |
---|
| 53 | static int wpa_fail ( struct wpa_common_ctx *ctx, int rc ) |
---|
| 54 | { |
---|
| 55 | net80211_deauthenticate ( ctx->dev, rc ); |
---|
| 56 | return rc; |
---|
| 57 | } |
---|
| 58 | |
---|
| 59 | |
---|
| 60 | /** |
---|
| 61 | * Find a cryptosystem handler structure from a crypto ID |
---|
| 62 | * |
---|
| 63 | * @v crypt Cryptosystem ID |
---|
| 64 | * @ret crypto Cryptosystem handler structure |
---|
| 65 | * |
---|
| 66 | * If support for @a crypt is not compiled in to gPXE, or if @a crypt |
---|
| 67 | * is NET80211_CRYPT_UNKNOWN, returns @c NULL. |
---|
| 68 | */ |
---|
| 69 | static struct net80211_crypto * |
---|
| 70 | wpa_find_cryptosystem ( enum net80211_crypto_alg crypt ) |
---|
| 71 | { |
---|
| 72 | struct net80211_crypto *crypto; |
---|
| 73 | |
---|
| 74 | for_each_table_entry ( crypto, NET80211_CRYPTOS ) { |
---|
| 75 | if ( crypto->algorithm == crypt ) |
---|
| 76 | return crypto; |
---|
| 77 | } |
---|
| 78 | |
---|
| 79 | return NULL; |
---|
| 80 | } |
---|
| 81 | |
---|
| 82 | |
---|
| 83 | /** |
---|
| 84 | * Find WPA key integrity and encryption handler from key version field |
---|
| 85 | * |
---|
| 86 | * @v ver Version bits of EAPOL-Key info field |
---|
| 87 | * @ret kie Key integrity and encryption handler |
---|
| 88 | */ |
---|
| 89 | struct wpa_kie * wpa_find_kie ( int version ) |
---|
| 90 | { |
---|
| 91 | struct wpa_kie *kie; |
---|
| 92 | |
---|
| 93 | for_each_table_entry ( kie, WPA_KIES ) { |
---|
| 94 | if ( kie->version == version ) |
---|
| 95 | return kie; |
---|
| 96 | } |
---|
| 97 | |
---|
| 98 | return NULL; |
---|
| 99 | } |
---|
| 100 | |
---|
| 101 | |
---|
| 102 | /** |
---|
| 103 | * Construct RSN or WPA information element |
---|
| 104 | * |
---|
| 105 | * @v dev 802.11 device |
---|
| 106 | * @ret ie_ret RSN or WPA information element |
---|
| 107 | * @ret rc Return status code |
---|
| 108 | * |
---|
| 109 | * This function allocates, fills, and returns a RSN or WPA |
---|
| 110 | * information element suitable for including in an association |
---|
| 111 | * request frame to the network identified by @c dev->associating. |
---|
| 112 | * If it is impossible to construct an information element consistent |
---|
| 113 | * with gPXE's capabilities that is compatible with that network, or |
---|
| 114 | * if none should be sent because that network's beacon included no |
---|
| 115 | * security information, returns an error indication and leaves |
---|
| 116 | * @a ie_ret unchanged. |
---|
| 117 | * |
---|
| 118 | * The returned IE will be of the same type (RSN or WPA) as was |
---|
| 119 | * included in the beacon for the network it is destined for. |
---|
| 120 | */ |
---|
| 121 | int wpa_make_rsn_ie ( struct net80211_device *dev, union ieee80211_ie **ie_ret ) |
---|
| 122 | { |
---|
| 123 | u8 *rsn, *rsn_end; |
---|
| 124 | int is_rsn; |
---|
| 125 | u32 group_cipher; |
---|
| 126 | enum net80211_crypto_alg gcrypt; |
---|
| 127 | int ie_len; |
---|
| 128 | u8 *iep; |
---|
| 129 | struct ieee80211_ie_rsn *ie; |
---|
| 130 | struct ieee80211_frame *hdr; |
---|
| 131 | struct ieee80211_beacon *beacon; |
---|
| 132 | |
---|
| 133 | if ( ! dev->associating ) { |
---|
| 134 | DBG ( "WPA: Can't make RSN IE for a non-associating device\n" ); |
---|
| 135 | return -EINVAL; |
---|
| 136 | } |
---|
| 137 | |
---|
| 138 | hdr = dev->associating->beacon->data; |
---|
| 139 | beacon = ( struct ieee80211_beacon * ) hdr->data; |
---|
| 140 | rsn = sec80211_find_rsn ( beacon->info_element, |
---|
| 141 | dev->associating->beacon->tail, &is_rsn, |
---|
| 142 | &rsn_end ); |
---|
| 143 | if ( ! rsn ) { |
---|
| 144 | DBG ( "WPA: Can't make RSN IE when we didn't get one\n" ); |
---|
| 145 | return -EINVAL; |
---|
| 146 | } |
---|
| 147 | |
---|
| 148 | rsn += 2; /* skip version */ |
---|
| 149 | group_cipher = *( u32 * ) rsn; |
---|
| 150 | gcrypt = sec80211_rsn_get_net80211_crypt ( group_cipher ); |
---|
| 151 | |
---|
| 152 | if ( ! wpa_find_cryptosystem ( gcrypt ) || |
---|
| 153 | ! wpa_find_cryptosystem ( dev->associating->crypto ) ) { |
---|
| 154 | DBG ( "WPA: No support for (GC:%d, PC:%d)\n", |
---|
| 155 | gcrypt, dev->associating->crypto ); |
---|
| 156 | return -ENOTSUP; |
---|
| 157 | } |
---|
| 158 | |
---|
| 159 | /* Everything looks good - make our IE. */ |
---|
| 160 | |
---|
| 161 | /* WPA IEs need 4 more bytes for the OUI+type */ |
---|
| 162 | ie_len = ieee80211_rsn_size ( 1, 1, 0, is_rsn ) + ( 4 * ! is_rsn ); |
---|
| 163 | iep = malloc ( ie_len ); |
---|
| 164 | if ( ! iep ) |
---|
| 165 | return -ENOMEM; |
---|
| 166 | |
---|
| 167 | *ie_ret = ( union ieee80211_ie * ) iep; |
---|
| 168 | |
---|
| 169 | /* Store ID and length bytes. */ |
---|
| 170 | *iep++ = ( is_rsn ? IEEE80211_IE_RSN : IEEE80211_IE_VENDOR ); |
---|
| 171 | *iep++ = ie_len - 2; |
---|
| 172 | |
---|
| 173 | /* Store OUI+type for WPA IEs. */ |
---|
| 174 | if ( ! is_rsn ) { |
---|
| 175 | *( u32 * ) iep = IEEE80211_WPA_OUI_VEN; |
---|
| 176 | iep += 4; |
---|
| 177 | } |
---|
| 178 | |
---|
| 179 | /* If this is a WPA IE, the id and len bytes in the |
---|
| 180 | ieee80211_ie_rsn structure will not be valid, but by doing |
---|
| 181 | the cast we can fill all the other fields much more |
---|
| 182 | readily. */ |
---|
| 183 | |
---|
| 184 | ie = ( struct ieee80211_ie_rsn * ) ( iep - 2 ); |
---|
| 185 | ie->version = IEEE80211_RSN_VERSION; |
---|
| 186 | ie->group_cipher = group_cipher; |
---|
| 187 | ie->pairwise_count = 1; |
---|
| 188 | ie->pairwise_cipher[0] = |
---|
| 189 | sec80211_rsn_get_crypto_desc ( dev->associating->crypto, |
---|
| 190 | is_rsn ); |
---|
| 191 | ie->akm_count = 1; |
---|
| 192 | ie->akm_list[0] = |
---|
| 193 | sec80211_rsn_get_akm_desc ( dev->associating->handshaking, |
---|
| 194 | is_rsn ); |
---|
| 195 | if ( is_rsn ) { |
---|
| 196 | ie->rsn_capab = 0; |
---|
| 197 | ie->pmkid_count = 0; |
---|
| 198 | } |
---|
| 199 | |
---|
| 200 | return 0; |
---|
| 201 | } |
---|
| 202 | |
---|
| 203 | |
---|
| 204 | /** |
---|
| 205 | * Set up generic WPA support to handle 4-Way Handshake |
---|
| 206 | * |
---|
| 207 | * @v dev 802.11 device |
---|
| 208 | * @v ctx WPA common context |
---|
| 209 | * @v pmk Pairwise Master Key to use for session |
---|
| 210 | * @v pmk_len Length of PMK, almost always 32 |
---|
| 211 | * @ret rc Return status code |
---|
| 212 | */ |
---|
| 213 | int wpa_start ( struct net80211_device *dev, struct wpa_common_ctx *ctx, |
---|
| 214 | const void *pmk, size_t pmk_len ) |
---|
| 215 | { |
---|
| 216 | struct io_buffer *iob; |
---|
| 217 | struct ieee80211_frame *hdr; |
---|
| 218 | struct ieee80211_beacon *beacon; |
---|
| 219 | u8 *ap_rsn_ie = NULL, *ap_rsn_ie_end; |
---|
| 220 | |
---|
| 221 | if ( ! dev->rsn_ie || ! dev->associating ) |
---|
| 222 | return -EINVAL; |
---|
| 223 | |
---|
| 224 | ctx->dev = dev; |
---|
| 225 | memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len ); |
---|
| 226 | ctx->state = WPA_READY; |
---|
| 227 | ctx->replay = ~0ULL; |
---|
| 228 | |
---|
| 229 | iob = dev->associating->beacon; |
---|
| 230 | hdr = iob->data; |
---|
| 231 | beacon = ( struct ieee80211_beacon * ) hdr->data; |
---|
| 232 | ap_rsn_ie = sec80211_find_rsn ( beacon->info_element, iob->tail, |
---|
| 233 | &ctx->ap_rsn_is_rsn, &ap_rsn_ie_end ); |
---|
| 234 | if ( ap_rsn_ie ) { |
---|
| 235 | ctx->ap_rsn_ie = malloc ( ap_rsn_ie_end - ap_rsn_ie ); |
---|
| 236 | if ( ! ctx->ap_rsn_ie ) |
---|
| 237 | return -ENOMEM; |
---|
| 238 | memcpy ( ctx->ap_rsn_ie, ap_rsn_ie, ap_rsn_ie_end - ap_rsn_ie ); |
---|
| 239 | ctx->ap_rsn_ie_len = ap_rsn_ie_end - ap_rsn_ie; |
---|
| 240 | } else { |
---|
| 241 | return -ENOENT; |
---|
| 242 | } |
---|
| 243 | |
---|
| 244 | ctx->crypt = dev->associating->crypto; |
---|
| 245 | ctx->gcrypt = NET80211_CRYPT_UNKNOWN; |
---|
| 246 | |
---|
| 247 | list_add_tail ( &ctx->list, &wpa_contexts ); |
---|
| 248 | return 0; |
---|
| 249 | } |
---|
| 250 | |
---|
| 251 | |
---|
| 252 | /** |
---|
| 253 | * Disable handling of received WPA handshake frames |
---|
| 254 | * |
---|
| 255 | * @v dev 802.11 device |
---|
| 256 | */ |
---|
| 257 | void wpa_stop ( struct net80211_device *dev ) |
---|
| 258 | { |
---|
| 259 | struct wpa_common_ctx *ctx, *tmp; |
---|
| 260 | |
---|
| 261 | list_for_each_entry_safe ( ctx, tmp, &wpa_contexts, list ) { |
---|
| 262 | if ( ctx->dev == dev ) { |
---|
| 263 | free ( ctx->ap_rsn_ie ); |
---|
| 264 | ctx->ap_rsn_ie = NULL; |
---|
| 265 | list_del ( &ctx->list ); |
---|
| 266 | } |
---|
| 267 | } |
---|
| 268 | } |
---|
| 269 | |
---|
| 270 | |
---|
| 271 | /** |
---|
| 272 | * Check PMKID consistency |
---|
| 273 | * |
---|
| 274 | * @v ctx WPA common context |
---|
| 275 | * @v pmkid PMKID to check against (16 bytes long) |
---|
| 276 | * @ret rc Zero if they match, or a negative error code if not |
---|
| 277 | */ |
---|
| 278 | int wpa_check_pmkid ( struct wpa_common_ctx *ctx, const u8 *pmkid ) |
---|
| 279 | { |
---|
| 280 | u8 sha1_ctx[SHA1_CTX_SIZE]; |
---|
| 281 | u8 my_pmkid[SHA1_SIZE]; |
---|
| 282 | u8 pmk[ctx->pmk_len]; |
---|
| 283 | size_t pmk_len; |
---|
| 284 | struct { |
---|
| 285 | char name[8]; |
---|
| 286 | u8 aa[ETH_ALEN]; |
---|
| 287 | u8 spa[ETH_ALEN]; |
---|
| 288 | } __attribute__ (( packed )) pmkid_data; |
---|
| 289 | |
---|
| 290 | memcpy ( pmk, ctx->pmk, ctx->pmk_len ); |
---|
| 291 | pmk_len = ctx->pmk_len; |
---|
| 292 | |
---|
| 293 | memcpy ( pmkid_data.name, "PMK Name", 8 ); |
---|
| 294 | memcpy ( pmkid_data.aa, ctx->dev->bssid, ETH_ALEN ); |
---|
| 295 | memcpy ( pmkid_data.spa, ctx->dev->netdev->ll_addr, ETH_ALEN ); |
---|
| 296 | |
---|
| 297 | hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len ); |
---|
| 298 | hmac_update ( &sha1_algorithm, sha1_ctx, &pmkid_data, |
---|
| 299 | sizeof ( pmkid_data ) ); |
---|
| 300 | hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid ); |
---|
| 301 | |
---|
| 302 | if ( memcmp ( my_pmkid, pmkid, WPA_PMKID_LEN ) != 0 ) |
---|
| 303 | return -EACCES; |
---|
| 304 | |
---|
| 305 | return 0; |
---|
| 306 | } |
---|
| 307 | |
---|
| 308 | |
---|
| 309 | /** |
---|
| 310 | * Derive pairwise transient key |
---|
| 311 | * |
---|
| 312 | * @v ctx WPA common context |
---|
| 313 | */ |
---|
| 314 | static void wpa_derive_ptk ( struct wpa_common_ctx *ctx ) |
---|
| 315 | { |
---|
| 316 | struct { |
---|
| 317 | u8 mac1[ETH_ALEN]; |
---|
| 318 | u8 mac2[ETH_ALEN]; |
---|
| 319 | u8 nonce1[WPA_NONCE_LEN]; |
---|
| 320 | u8 nonce2[WPA_NONCE_LEN]; |
---|
| 321 | } __attribute__ (( packed )) ptk_data; |
---|
| 322 | |
---|
| 323 | /* The addresses and nonces are stored in numerical order (!) */ |
---|
| 324 | |
---|
| 325 | if ( memcmp ( ctx->dev->netdev->ll_addr, ctx->dev->bssid, |
---|
| 326 | ETH_ALEN ) < 0 ) { |
---|
| 327 | memcpy ( ptk_data.mac1, ctx->dev->netdev->ll_addr, ETH_ALEN ); |
---|
| 328 | memcpy ( ptk_data.mac2, ctx->dev->bssid, ETH_ALEN ); |
---|
| 329 | } else { |
---|
| 330 | memcpy ( ptk_data.mac1, ctx->dev->bssid, ETH_ALEN ); |
---|
| 331 | memcpy ( ptk_data.mac2, ctx->dev->netdev->ll_addr, ETH_ALEN ); |
---|
| 332 | } |
---|
| 333 | |
---|
| 334 | if ( memcmp ( ctx->Anonce, ctx->Snonce, WPA_NONCE_LEN ) < 0 ) { |
---|
| 335 | memcpy ( ptk_data.nonce1, ctx->Anonce, WPA_NONCE_LEN ); |
---|
| 336 | memcpy ( ptk_data.nonce2, ctx->Snonce, WPA_NONCE_LEN ); |
---|
| 337 | } else { |
---|
| 338 | memcpy ( ptk_data.nonce1, ctx->Snonce, WPA_NONCE_LEN ); |
---|
| 339 | memcpy ( ptk_data.nonce2, ctx->Anonce, WPA_NONCE_LEN ); |
---|
| 340 | } |
---|
| 341 | |
---|
| 342 | DBGC2 ( ctx, "WPA %p A1 %s, A2 %s\n", ctx, eth_ntoa ( ptk_data.mac1 ), |
---|
| 343 | eth_ntoa ( ptk_data.mac2 ) ); |
---|
| 344 | DBGC2 ( ctx, "WPA %p Nonce1, Nonce2:\n", ctx ); |
---|
| 345 | DBGC2_HD ( ctx, ptk_data.nonce1, WPA_NONCE_LEN ); |
---|
| 346 | DBGC2_HD ( ctx, ptk_data.nonce2, WPA_NONCE_LEN ); |
---|
| 347 | |
---|
| 348 | prf_sha1 ( ctx->pmk, ctx->pmk_len, |
---|
| 349 | "Pairwise key expansion", |
---|
| 350 | &ptk_data, sizeof ( ptk_data ), |
---|
| 351 | &ctx->ptk, sizeof ( ctx->ptk ) ); |
---|
| 352 | |
---|
| 353 | DBGC2 ( ctx, "WPA %p PTK:\n", ctx ); |
---|
| 354 | DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) ); |
---|
| 355 | } |
---|
| 356 | |
---|
| 357 | |
---|
| 358 | /** |
---|
| 359 | * Install pairwise transient key |
---|
| 360 | * |
---|
| 361 | * @v ctx WPA common context |
---|
| 362 | * @v len Key length (16 for CCMP, 32 for TKIP) |
---|
| 363 | * @ret rc Return status code |
---|
| 364 | */ |
---|
| 365 | static inline int wpa_install_ptk ( struct wpa_common_ctx *ctx, int len ) |
---|
| 366 | { |
---|
| 367 | DBGC ( ctx, "WPA %p: installing %d-byte pairwise transient key\n", |
---|
| 368 | ctx, len ); |
---|
| 369 | DBGC2_HD ( ctx, &ctx->ptk.tk, len ); |
---|
| 370 | |
---|
| 371 | return sec80211_install ( &ctx->dev->crypto, ctx->crypt, |
---|
| 372 | &ctx->ptk.tk, len, NULL ); |
---|
| 373 | } |
---|
| 374 | |
---|
| 375 | /** |
---|
| 376 | * Install group transient key |
---|
| 377 | * |
---|
| 378 | * @v ctx WPA common context |
---|
| 379 | * @v len Key length (16 for CCMP, 32 for TKIP) |
---|
| 380 | * @v rsc Receive sequence counter field in EAPOL-Key packet |
---|
| 381 | * @ret rc Return status code |
---|
| 382 | */ |
---|
| 383 | static inline int wpa_install_gtk ( struct wpa_common_ctx *ctx, int len, |
---|
| 384 | const void *rsc ) |
---|
| 385 | { |
---|
| 386 | DBGC ( ctx, "WPA %p: installing %d-byte group transient key\n", |
---|
| 387 | ctx, len ); |
---|
| 388 | DBGC2_HD ( ctx, &ctx->gtk.tk, len ); |
---|
| 389 | |
---|
| 390 | return sec80211_install ( &ctx->dev->gcrypto, ctx->gcrypt, |
---|
| 391 | &ctx->gtk.tk, len, rsc ); |
---|
| 392 | } |
---|
| 393 | |
---|
| 394 | /** |
---|
| 395 | * Search for group transient key, and install it if found |
---|
| 396 | * |
---|
| 397 | * @v ctx WPA common context |
---|
| 398 | * @v ie Pointer to first IE in key data field |
---|
| 399 | * @v ie_end Pointer to first byte not in key data field |
---|
| 400 | * @v rsc Receive sequence counter field in EAPOL-Key packet |
---|
| 401 | * @ret rc Return status code |
---|
| 402 | */ |
---|
| 403 | static int wpa_maybe_install_gtk ( struct wpa_common_ctx *ctx, |
---|
| 404 | union ieee80211_ie *ie, void *ie_end, |
---|
| 405 | const void *rsc ) |
---|
| 406 | { |
---|
| 407 | struct wpa_kde *kde; |
---|
| 408 | |
---|
| 409 | if ( ! ieee80211_ie_bound ( ie, ie_end ) ) |
---|
| 410 | return -ENOENT; |
---|
| 411 | |
---|
| 412 | while ( ie ) { |
---|
| 413 | if ( ie->id == IEEE80211_IE_VENDOR && |
---|
| 414 | ie->vendor.oui == WPA_KDE_GTK ) |
---|
| 415 | break; |
---|
| 416 | |
---|
| 417 | ie = ieee80211_next_ie ( ie, ie_end ); |
---|
| 418 | } |
---|
| 419 | |
---|
| 420 | if ( ! ie ) |
---|
| 421 | return -ENOENT; |
---|
| 422 | |
---|
| 423 | if ( ie->len - 6u > sizeof ( ctx->gtk.tk ) ) { |
---|
| 424 | DBGC ( ctx, "WPA %p: GTK KDE is too long (%d bytes, max %d)\n", |
---|
| 425 | ctx, ie->len - 4, sizeof ( ctx->gtk.tk ) ); |
---|
| 426 | return -EINVAL; |
---|
| 427 | } |
---|
| 428 | |
---|
| 429 | /* XXX We ignore key ID for now. */ |
---|
| 430 | kde = ( struct wpa_kde * ) ie; |
---|
| 431 | memcpy ( &ctx->gtk.tk, &kde->gtk_encap.gtk, kde->len - 6 ); |
---|
| 432 | |
---|
| 433 | return wpa_install_gtk ( ctx, kde->len - 6, rsc ); |
---|
| 434 | } |
---|
| 435 | |
---|
| 436 | |
---|
| 437 | /** |
---|
| 438 | * Allocate I/O buffer for construction of outgoing EAPOL-Key frame |
---|
| 439 | * |
---|
| 440 | * @v kdlen Maximum number of bytes in the Key Data field |
---|
| 441 | * @ret iob Newly allocated I/O buffer |
---|
| 442 | * |
---|
| 443 | * The returned buffer will have space reserved for the link-layer and |
---|
| 444 | * EAPOL headers, and will have @c iob->tail pointing to the start of |
---|
| 445 | * the Key Data field. Thus, it is necessary to use iob_put() in |
---|
| 446 | * filling the Key Data. |
---|
| 447 | */ |
---|
| 448 | static struct io_buffer * wpa_alloc_frame ( int kdlen ) |
---|
| 449 | { |
---|
| 450 | struct io_buffer *ret = alloc_iob ( sizeof ( struct eapol_key_pkt ) + |
---|
| 451 | kdlen + EAPOL_HDR_LEN + |
---|
| 452 | MAX_LL_HEADER_LEN ); |
---|
| 453 | if ( ! ret ) |
---|
| 454 | return NULL; |
---|
| 455 | |
---|
| 456 | iob_reserve ( ret, MAX_LL_HEADER_LEN + EAPOL_HDR_LEN ); |
---|
| 457 | memset ( iob_put ( ret, sizeof ( struct eapol_key_pkt ) ), 0, |
---|
| 458 | sizeof ( struct eapol_key_pkt ) ); |
---|
| 459 | |
---|
| 460 | return ret; |
---|
| 461 | } |
---|
| 462 | |
---|
| 463 | |
---|
| 464 | /** |
---|
| 465 | * Send EAPOL-Key packet |
---|
| 466 | * |
---|
| 467 | * @v iob I/O buffer, with sufficient headroom for headers |
---|
| 468 | * @v dev 802.11 device |
---|
| 469 | * @v kie Key integrity and encryption handler |
---|
| 470 | * @v is_rsn If TRUE, handshake uses new RSN format |
---|
| 471 | * @ret rc Return status code |
---|
| 472 | * |
---|
| 473 | * If a KIE is specified, the MIC will be filled in before transmission. |
---|
| 474 | */ |
---|
| 475 | static int wpa_send_eapol ( struct io_buffer *iob, struct wpa_common_ctx *ctx, |
---|
| 476 | struct wpa_kie *kie ) |
---|
| 477 | { |
---|
| 478 | struct eapol_key_pkt *pkt = iob->data; |
---|
| 479 | struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN ); |
---|
| 480 | |
---|
| 481 | pkt->info = htons ( pkt->info ); |
---|
| 482 | pkt->keysize = htons ( pkt->keysize ); |
---|
| 483 | pkt->datalen = htons ( pkt->datalen ); |
---|
| 484 | pkt->replay = cpu_to_be64 ( pkt->replay ); |
---|
| 485 | eapol->version = EAPOL_THIS_VERSION; |
---|
| 486 | eapol->type = EAPOL_TYPE_KEY; |
---|
| 487 | eapol->length = htons ( iob->tail - iob->data - sizeof ( *eapol ) ); |
---|
| 488 | |
---|
| 489 | memset ( pkt->mic, 0, sizeof ( pkt->mic ) ); |
---|
| 490 | if ( kie ) |
---|
| 491 | kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN + |
---|
| 492 | sizeof ( *pkt ) + ntohs ( pkt->datalen ), |
---|
| 493 | pkt->mic ); |
---|
| 494 | |
---|
| 495 | return net_tx ( iob, ctx->dev->netdev, &eapol_protocol, |
---|
| 496 | ctx->dev->bssid ); |
---|
| 497 | } |
---|
| 498 | |
---|
| 499 | |
---|
| 500 | /** |
---|
| 501 | * Send second frame in 4-Way Handshake |
---|
| 502 | * |
---|
| 503 | * @v ctx WPA common context |
---|
| 504 | * @v pkt First frame, to which this is a reply |
---|
| 505 | * @v is_rsn If TRUE, handshake uses new RSN format |
---|
| 506 | * @v kie Key integrity and encryption handler |
---|
| 507 | * @ret rc Return status code |
---|
| 508 | */ |
---|
| 509 | static int wpa_send_2_of_4 ( struct wpa_common_ctx *ctx, |
---|
| 510 | struct eapol_key_pkt *pkt, int is_rsn, |
---|
| 511 | struct wpa_kie *kie ) |
---|
| 512 | { |
---|
| 513 | struct io_buffer *iob = wpa_alloc_frame ( ctx->dev->rsn_ie->len + 2 ); |
---|
| 514 | struct eapol_key_pkt *npkt; |
---|
| 515 | |
---|
| 516 | if ( ! iob ) |
---|
| 517 | return -ENOMEM; |
---|
| 518 | |
---|
| 519 | npkt = iob->data; |
---|
| 520 | memcpy ( npkt, pkt, sizeof ( *pkt ) ); |
---|
| 521 | npkt->info &= ~EAPOL_KEY_INFO_KEY_ACK; |
---|
| 522 | npkt->info |= EAPOL_KEY_INFO_KEY_MIC; |
---|
| 523 | if ( is_rsn ) |
---|
| 524 | npkt->keysize = 0; |
---|
| 525 | memcpy ( npkt->nonce, ctx->Snonce, sizeof ( npkt->nonce ) ); |
---|
| 526 | npkt->datalen = ctx->dev->rsn_ie->len + 2; |
---|
| 527 | memcpy ( iob_put ( iob, npkt->datalen ), ctx->dev->rsn_ie, |
---|
| 528 | npkt->datalen ); |
---|
| 529 | |
---|
| 530 | DBGC ( ctx, "WPA %p: sending 2/4\n", ctx ); |
---|
| 531 | |
---|
| 532 | return wpa_send_eapol ( iob, ctx, kie ); |
---|
| 533 | } |
---|
| 534 | |
---|
| 535 | |
---|
| 536 | /** |
---|
| 537 | * Handle receipt of first frame in 4-Way Handshake |
---|
| 538 | * |
---|
| 539 | * @v ctx WPA common context |
---|
| 540 | * @v pkt EAPOL-Key packet |
---|
| 541 | * @v is_rsn If TRUE, frame uses new RSN format |
---|
| 542 | * @v kie Key integrity and encryption handler |
---|
| 543 | * @ret rc Return status code |
---|
| 544 | */ |
---|
| 545 | static int wpa_handle_1_of_4 ( struct wpa_common_ctx *ctx, |
---|
| 546 | struct eapol_key_pkt *pkt, int is_rsn, |
---|
| 547 | struct wpa_kie *kie ) |
---|
| 548 | { |
---|
| 549 | int rc; |
---|
| 550 | |
---|
| 551 | if ( ctx->state == WPA_WAITING ) |
---|
| 552 | return -EINVAL; |
---|
| 553 | |
---|
| 554 | ctx->state = WPA_WORKING; |
---|
| 555 | memcpy ( ctx->Anonce, pkt->nonce, sizeof ( ctx->Anonce ) ); |
---|
| 556 | if ( ! ctx->have_Snonce ) { |
---|
| 557 | get_random_bytes ( ctx->Snonce, sizeof ( ctx->Snonce ) ); |
---|
| 558 | ctx->have_Snonce = 1; |
---|
| 559 | } |
---|
| 560 | |
---|
| 561 | if ( is_rsn && pkt->datalen ) { |
---|
| 562 | union ieee80211_ie *ie = ( union ieee80211_ie * ) pkt->data; |
---|
| 563 | void *ie_end = pkt->data + pkt->datalen; |
---|
| 564 | |
---|
| 565 | if ( ! ieee80211_ie_bound ( ie, ie_end ) ) { |
---|
| 566 | DBGC ( ctx, "WPA %p: malformed PMKID KDE\n", ctx ); |
---|
| 567 | return wpa_fail ( ctx, -EINVAL ); |
---|
| 568 | } |
---|
| 569 | |
---|
| 570 | while ( ie ) { |
---|
| 571 | if ( ie->id == IEEE80211_IE_VENDOR && |
---|
| 572 | ie->vendor.oui == WPA_KDE_PMKID ) { |
---|
| 573 | rc = wpa_check_pmkid ( ctx, ie->vendor.data ); |
---|
| 574 | if ( rc < 0 ) { |
---|
| 575 | DBGC ( ctx, "WPA %p ALERT: PMKID " |
---|
| 576 | "mismatch in 1/4\n", ctx ); |
---|
| 577 | return wpa_fail ( ctx, rc ); |
---|
| 578 | } |
---|
| 579 | } |
---|
| 580 | |
---|
| 581 | ie = ieee80211_next_ie ( ie, ie_end ); |
---|
| 582 | } |
---|
| 583 | } |
---|
| 584 | |
---|
| 585 | DBGC ( ctx, "WPA %p: received 1/4, looks OK\n", ctx ); |
---|
| 586 | |
---|
| 587 | wpa_derive_ptk ( ctx ); |
---|
| 588 | |
---|
| 589 | return wpa_send_2_of_4 ( ctx, pkt, is_rsn, kie ); |
---|
| 590 | } |
---|
| 591 | |
---|
| 592 | |
---|
| 593 | /** |
---|
| 594 | * Send fourth frame in 4-Way Handshake, or second in Group Key Handshake |
---|
| 595 | * |
---|
| 596 | * @v ctx WPA common context |
---|
| 597 | * @v pkt EAPOL-Key packet for frame to which we're replying |
---|
| 598 | * @v is_rsn If TRUE, frame uses new RSN format |
---|
| 599 | * @v kie Key integrity and encryption handler |
---|
| 600 | * @ret rc Return status code |
---|
| 601 | */ |
---|
| 602 | static int wpa_send_final ( struct wpa_common_ctx *ctx, |
---|
| 603 | struct eapol_key_pkt *pkt, int is_rsn, |
---|
| 604 | struct wpa_kie *kie ) |
---|
| 605 | { |
---|
| 606 | struct io_buffer *iob = wpa_alloc_frame ( 0 ); |
---|
| 607 | struct eapol_key_pkt *npkt; |
---|
| 608 | |
---|
| 609 | if ( ! iob ) |
---|
| 610 | return -ENOMEM; |
---|
| 611 | |
---|
| 612 | npkt = iob->data; |
---|
| 613 | memcpy ( npkt, pkt, sizeof ( *pkt ) ); |
---|
| 614 | npkt->info &= ~( EAPOL_KEY_INFO_KEY_ACK | EAPOL_KEY_INFO_INSTALL | |
---|
| 615 | EAPOL_KEY_INFO_KEY_ENC ); |
---|
| 616 | if ( is_rsn ) |
---|
| 617 | npkt->keysize = 0; |
---|
| 618 | memset ( npkt->nonce, 0, sizeof ( npkt->nonce ) ); |
---|
| 619 | memset ( npkt->iv, 0, sizeof ( npkt->iv ) ); |
---|
| 620 | npkt->datalen = 0; |
---|
| 621 | |
---|
| 622 | if ( npkt->info & EAPOL_KEY_INFO_TYPE ) |
---|
| 623 | DBGC ( ctx, "WPA %p: sending 4/4\n", ctx ); |
---|
| 624 | else |
---|
| 625 | DBGC ( ctx, "WPA %p: sending 2/2\n", ctx ); |
---|
| 626 | |
---|
| 627 | return wpa_send_eapol ( iob, ctx, kie ); |
---|
| 628 | |
---|
| 629 | } |
---|
| 630 | |
---|
| 631 | |
---|
| 632 | /** |
---|
| 633 | * Handle receipt of third frame in 4-Way Handshake |
---|
| 634 | * |
---|
| 635 | * @v ctx WPA common context |
---|
| 636 | * @v pkt EAPOL-Key packet |
---|
| 637 | * @v is_rsn If TRUE, frame uses new RSN format |
---|
| 638 | * @v kie Key integrity and encryption handler |
---|
| 639 | * @ret rc Return status code |
---|
| 640 | */ |
---|
| 641 | static int wpa_handle_3_of_4 ( struct wpa_common_ctx *ctx, |
---|
| 642 | struct eapol_key_pkt *pkt, int is_rsn, |
---|
| 643 | struct wpa_kie *kie ) |
---|
| 644 | { |
---|
| 645 | int rc; |
---|
| 646 | u8 *this_rsn, *this_rsn_end; |
---|
| 647 | u8 *new_rsn, *new_rsn_end; |
---|
| 648 | int this_is_rsn, new_is_rsn; |
---|
| 649 | |
---|
| 650 | if ( ctx->state == WPA_WAITING ) |
---|
| 651 | return -EINVAL; |
---|
| 652 | |
---|
| 653 | ctx->state = WPA_WORKING; |
---|
| 654 | |
---|
| 655 | /* Check nonce */ |
---|
| 656 | if ( memcmp ( ctx->Anonce, pkt->nonce, WPA_NONCE_LEN ) != 0 ) { |
---|
| 657 | DBGC ( ctx, "WPA %p ALERT: nonce mismatch in 3/4\n", ctx ); |
---|
| 658 | return wpa_fail ( ctx, -EACCES ); |
---|
| 659 | } |
---|
| 660 | |
---|
| 661 | /* Check RSN IE */ |
---|
| 662 | this_rsn = sec80211_find_rsn ( ( union ieee80211_ie * ) pkt->data, |
---|
| 663 | pkt->data + pkt->datalen, |
---|
| 664 | &this_is_rsn, &this_rsn_end ); |
---|
| 665 | if ( this_rsn ) |
---|
| 666 | new_rsn = sec80211_find_rsn ( ( union ieee80211_ie * ) |
---|
| 667 | this_rsn_end, |
---|
| 668 | pkt->data + pkt->datalen, |
---|
| 669 | &new_is_rsn, &new_rsn_end ); |
---|
| 670 | else |
---|
| 671 | new_rsn = NULL; |
---|
| 672 | |
---|
| 673 | if ( ! ctx->ap_rsn_ie || ! this_rsn || |
---|
| 674 | ctx->ap_rsn_ie_len != ( this_rsn_end - this_rsn ) || |
---|
| 675 | ctx->ap_rsn_is_rsn != this_is_rsn || |
---|
| 676 | memcmp ( ctx->ap_rsn_ie, this_rsn, ctx->ap_rsn_ie_len ) != 0 ) { |
---|
| 677 | DBGC ( ctx, "WPA %p ALERT: RSN mismatch in 3/4\n", ctx ); |
---|
| 678 | DBGC2 ( ctx, "WPA %p RSNs (in 3/4, in beacon):\n", ctx ); |
---|
| 679 | DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn ); |
---|
| 680 | DBGC2_HD ( ctx, ctx->ap_rsn_ie, ctx->ap_rsn_ie_len ); |
---|
| 681 | return wpa_fail ( ctx, -EACCES ); |
---|
| 682 | } |
---|
| 683 | |
---|
| 684 | /* Don't switch if they just supplied both styles of IE |
---|
| 685 | simultaneously; we need two RSN IEs or two WPA IEs to |
---|
| 686 | switch ciphers. They'll be immediately consecutive because |
---|
| 687 | of ordering guarantees. */ |
---|
| 688 | if ( new_rsn && this_is_rsn == new_is_rsn ) { |
---|
| 689 | struct net80211_wlan *assoc = ctx->dev->associating; |
---|
| 690 | DBGC ( ctx, "WPA %p: accommodating bait-and-switch tactics\n", |
---|
| 691 | ctx ); |
---|
| 692 | DBGC2 ( ctx, "WPA %p RSNs (in 3/4+beacon, new in 3/4):\n", |
---|
| 693 | ctx ); |
---|
| 694 | DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn ); |
---|
| 695 | DBGC2_HD ( ctx, new_rsn, new_rsn_end - new_rsn ); |
---|
| 696 | |
---|
| 697 | if ( ( rc = sec80211_detect_ie ( new_is_rsn, new_rsn, |
---|
| 698 | new_rsn_end, |
---|
| 699 | &assoc->handshaking, |
---|
| 700 | &assoc->crypto ) ) != 0 ) |
---|
| 701 | DBGC ( ctx, "WPA %p: bait-and-switch invalid, staying " |
---|
| 702 | "with original request\n", ctx ); |
---|
| 703 | } else { |
---|
| 704 | new_rsn = this_rsn; |
---|
| 705 | new_is_rsn = this_is_rsn; |
---|
| 706 | new_rsn_end = this_rsn_end; |
---|
| 707 | } |
---|
| 708 | |
---|
| 709 | /* Grab group cryptosystem ID */ |
---|
| 710 | ctx->gcrypt = sec80211_rsn_get_net80211_crypt ( *( u32 * ) |
---|
| 711 | ( new_rsn + 2 ) ); |
---|
| 712 | |
---|
| 713 | /* Check for a GTK, if info field is encrypted */ |
---|
| 714 | if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) { |
---|
| 715 | rc = wpa_maybe_install_gtk ( ctx, |
---|
| 716 | ( union ieee80211_ie * ) pkt->data, |
---|
| 717 | pkt->data + pkt->datalen, |
---|
| 718 | pkt->rsc ); |
---|
| 719 | if ( rc < 0 ) { |
---|
| 720 | DBGC ( ctx, "WPA %p did not install GTK in 3/4: %s\n", |
---|
| 721 | ctx, strerror ( rc ) ); |
---|
| 722 | if ( rc != -ENOENT ) |
---|
| 723 | return wpa_fail ( ctx, rc ); |
---|
| 724 | } |
---|
| 725 | } |
---|
| 726 | |
---|
| 727 | DBGC ( ctx, "WPA %p: received 3/4, looks OK\n", ctx ); |
---|
| 728 | |
---|
| 729 | /* Send final message */ |
---|
| 730 | rc = wpa_send_final ( ctx, pkt, is_rsn, kie ); |
---|
| 731 | if ( rc < 0 ) |
---|
| 732 | return wpa_fail ( ctx, rc ); |
---|
| 733 | |
---|
| 734 | /* Install PTK */ |
---|
| 735 | rc = wpa_install_ptk ( ctx, pkt->keysize ); |
---|
| 736 | if ( rc < 0 ) { |
---|
| 737 | DBGC ( ctx, "WPA %p failed to install PTK: %s\n", ctx, |
---|
| 738 | strerror ( rc ) ); |
---|
| 739 | return wpa_fail ( ctx, rc ); |
---|
| 740 | } |
---|
| 741 | |
---|
| 742 | /* Mark us as needing a new Snonce if we rekey */ |
---|
| 743 | ctx->have_Snonce = 0; |
---|
| 744 | |
---|
| 745 | /* Done! */ |
---|
| 746 | ctx->state = WPA_SUCCESS; |
---|
| 747 | return 0; |
---|
| 748 | } |
---|
| 749 | |
---|
| 750 | |
---|
| 751 | /** |
---|
| 752 | * Handle receipt of first frame in Group Key Handshake |
---|
| 753 | * |
---|
| 754 | * @v ctx WPA common context |
---|
| 755 | * @v pkt EAPOL-Key packet |
---|
| 756 | * @v is_rsn If TRUE, frame uses new RSN format |
---|
| 757 | * @v kie Key integrity and encryption handler |
---|
| 758 | * @ret rc Return status code |
---|
| 759 | */ |
---|
| 760 | static int wpa_handle_1_of_2 ( struct wpa_common_ctx *ctx, |
---|
| 761 | struct eapol_key_pkt *pkt, int is_rsn, |
---|
| 762 | struct wpa_kie *kie ) |
---|
| 763 | { |
---|
| 764 | int rc; |
---|
| 765 | |
---|
| 766 | /* |
---|
| 767 | * WPA and RSN do this completely differently. |
---|
| 768 | * |
---|
| 769 | * The idea of encoding the GTK (or PMKID, or various other |
---|
| 770 | * things) into a KDE that looks like an information element |
---|
| 771 | * is an RSN innovation; old WPA code never encapsulates |
---|
| 772 | * things like that. If it looks like an info element, it |
---|
| 773 | * really is (for the WPA IE check in frames 2/4 and 3/4). The |
---|
| 774 | * "key data encrypted" bit in the info field is also specific |
---|
| 775 | * to RSN. |
---|
| 776 | * |
---|
| 777 | * So from an old WPA host, 3/4 does not contain an |
---|
| 778 | * encapsulated GTK. The first frame of the GK handshake |
---|
| 779 | * contains it, encrypted, but without a KDE wrapper, and with |
---|
| 780 | * the key ID field (which gPXE doesn't use) shoved away in |
---|
| 781 | * the reserved bits in the info field, and the TxRx bit |
---|
| 782 | * stealing the Install bit's spot. |
---|
| 783 | */ |
---|
| 784 | |
---|
| 785 | if ( is_rsn && ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) ) { |
---|
| 786 | rc = wpa_maybe_install_gtk ( ctx, |
---|
| 787 | ( union ieee80211_ie * ) pkt->data, |
---|
| 788 | pkt->data + pkt->datalen, |
---|
| 789 | pkt->rsc ); |
---|
| 790 | if ( rc < 0 ) { |
---|
| 791 | DBGC ( ctx, "WPA %p: failed to install GTK in 1/2: " |
---|
| 792 | "%s\n", ctx, strerror ( rc ) ); |
---|
| 793 | return wpa_fail ( ctx, rc ); |
---|
| 794 | } |
---|
| 795 | } else { |
---|
| 796 | rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, |
---|
| 797 | &pkt->datalen ); |
---|
| 798 | if ( rc < 0 ) { |
---|
| 799 | DBGC ( ctx, "WPA %p: failed to decrypt GTK: %s\n", |
---|
| 800 | ctx, strerror ( rc ) ); |
---|
| 801 | return rc; /* non-fatal */ |
---|
| 802 | } |
---|
| 803 | if ( pkt->datalen > sizeof ( ctx->gtk.tk ) ) { |
---|
| 804 | DBGC ( ctx, "WPA %p: too much GTK data (%d > %d)\n", |
---|
| 805 | ctx, pkt->datalen, sizeof ( ctx->gtk.tk ) ); |
---|
| 806 | return wpa_fail ( ctx, -EINVAL ); |
---|
| 807 | } |
---|
| 808 | |
---|
| 809 | memcpy ( &ctx->gtk.tk, pkt->data, pkt->datalen ); |
---|
| 810 | wpa_install_gtk ( ctx, pkt->datalen, pkt->rsc ); |
---|
| 811 | } |
---|
| 812 | |
---|
| 813 | DBGC ( ctx, "WPA %p: received 1/2, looks OK\n", ctx ); |
---|
| 814 | |
---|
| 815 | return wpa_send_final ( ctx, pkt, is_rsn, kie ); |
---|
| 816 | } |
---|
| 817 | |
---|
| 818 | |
---|
| 819 | /** |
---|
| 820 | * Handle receipt of EAPOL-Key frame for WPA |
---|
| 821 | * |
---|
| 822 | * @v iob I/O buffer |
---|
| 823 | * @v netdev Network device |
---|
| 824 | * @v ll_source Source link-layer address |
---|
| 825 | */ |
---|
| 826 | static int eapol_key_rx ( struct io_buffer *iob, struct net_device *netdev, |
---|
| 827 | const void *ll_source ) |
---|
| 828 | { |
---|
| 829 | struct net80211_device *dev = net80211_get ( netdev ); |
---|
| 830 | struct eapol_key_pkt *pkt = iob->data; |
---|
| 831 | int is_rsn, found_ctx; |
---|
| 832 | struct wpa_common_ctx *ctx; |
---|
| 833 | int rc = 0; |
---|
| 834 | struct wpa_kie *kie; |
---|
| 835 | u8 their_mic[16], our_mic[16]; |
---|
| 836 | |
---|
| 837 | if ( pkt->type != EAPOL_KEY_TYPE_WPA && |
---|
| 838 | pkt->type != EAPOL_KEY_TYPE_RSN ) { |
---|
| 839 | DBG ( "EAPOL-Key: packet not of 802.11 type\n" ); |
---|
| 840 | rc = -EINVAL; |
---|
| 841 | goto drop; |
---|
| 842 | } |
---|
| 843 | |
---|
| 844 | is_rsn = ( pkt->type == EAPOL_KEY_TYPE_RSN ); |
---|
| 845 | |
---|
| 846 | if ( ! dev ) { |
---|
| 847 | DBG ( "EAPOL-Key: packet not from 802.11\n" ); |
---|
| 848 | rc = -EINVAL; |
---|
| 849 | goto drop; |
---|
| 850 | } |
---|
| 851 | |
---|
| 852 | if ( memcmp ( dev->bssid, ll_source, ETH_ALEN ) != 0 ) { |
---|
| 853 | DBG ( "EAPOL-Key: packet not from associated AP\n" ); |
---|
| 854 | rc = -EINVAL; |
---|
| 855 | goto drop; |
---|
| 856 | } |
---|
| 857 | |
---|
| 858 | if ( ! ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_ACK ) ) { |
---|
| 859 | DBG ( "EAPOL-Key: packet sent in wrong direction\n" ); |
---|
| 860 | rc = -EINVAL; |
---|
| 861 | goto drop; |
---|
| 862 | } |
---|
| 863 | |
---|
| 864 | found_ctx = 0; |
---|
| 865 | list_for_each_entry ( ctx, &wpa_contexts, list ) { |
---|
| 866 | if ( ctx->dev == dev ) { |
---|
| 867 | found_ctx = 1; |
---|
| 868 | break; |
---|
| 869 | } |
---|
| 870 | } |
---|
| 871 | |
---|
| 872 | if ( ! found_ctx ) { |
---|
| 873 | DBG ( "EAPOL-Key: no WPA context to handle packet for %p\n", |
---|
| 874 | dev ); |
---|
| 875 | rc = -ENOENT; |
---|
| 876 | goto drop; |
---|
| 877 | } |
---|
| 878 | |
---|
| 879 | if ( ( void * ) ( pkt + 1 ) + ntohs ( pkt->datalen ) > iob->tail ) { |
---|
| 880 | DBGC ( ctx, "WPA %p: packet truncated (has %d extra bytes, " |
---|
| 881 | "states %d)\n", ctx, iob->tail - ( void * ) ( pkt + 1 ), |
---|
| 882 | ntohs ( pkt->datalen ) ); |
---|
| 883 | rc = -EINVAL; |
---|
| 884 | goto drop; |
---|
| 885 | } |
---|
| 886 | |
---|
| 887 | /* Get a handle on key integrity/encryption handler */ |
---|
| 888 | kie = wpa_find_kie ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION ); |
---|
| 889 | if ( ! kie ) { |
---|
| 890 | DBGC ( ctx, "WPA %p: no support for packet version %d\n", ctx, |
---|
| 891 | ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION ); |
---|
| 892 | rc = wpa_fail ( ctx, -ENOTSUP ); |
---|
| 893 | goto drop; |
---|
| 894 | } |
---|
| 895 | |
---|
| 896 | /* Check MIC */ |
---|
| 897 | if ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_MIC ) { |
---|
| 898 | memcpy ( their_mic, pkt->mic, sizeof ( pkt->mic ) ); |
---|
| 899 | memset ( pkt->mic, 0, sizeof ( pkt->mic ) ); |
---|
| 900 | kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN, |
---|
| 901 | EAPOL_HDR_LEN + sizeof ( *pkt ) + |
---|
| 902 | ntohs ( pkt->datalen ), our_mic ); |
---|
| 903 | DBGC2 ( ctx, "WPA %p MIC comparison (theirs, ours):\n", ctx ); |
---|
| 904 | DBGC2_HD ( ctx, their_mic, 16 ); |
---|
| 905 | DBGC2_HD ( ctx, our_mic, 16 ); |
---|
| 906 | if ( memcmp ( their_mic, our_mic, sizeof ( pkt->mic ) ) != 0 ) { |
---|
| 907 | DBGC ( ctx, "WPA %p: EAPOL MIC failure\n", ctx ); |
---|
| 908 | goto drop; |
---|
| 909 | } |
---|
| 910 | } |
---|
| 911 | |
---|
| 912 | /* Fix byte order to local */ |
---|
| 913 | pkt->info = ntohs ( pkt->info ); |
---|
| 914 | pkt->keysize = ntohs ( pkt->keysize ); |
---|
| 915 | pkt->datalen = ntohs ( pkt->datalen ); |
---|
| 916 | pkt->replay = be64_to_cpu ( pkt->replay ); |
---|
| 917 | |
---|
| 918 | /* Check replay counter */ |
---|
| 919 | if ( ctx->replay != ~0ULL && ctx->replay >= pkt->replay ) { |
---|
| 920 | DBGC ( ctx, "WPA %p ALERT: Replay detected! " |
---|
| 921 | "(%08x:%08x >= %08x:%08x)\n", ctx, |
---|
| 922 | ( u32 ) ( ctx->replay >> 32 ), ( u32 ) ctx->replay, |
---|
| 923 | ( u32 ) ( pkt->replay >> 32 ), ( u32 ) pkt->replay ); |
---|
| 924 | rc = 0; /* ignore without error */ |
---|
| 925 | goto drop; |
---|
| 926 | } |
---|
| 927 | ctx->replay = pkt->replay; |
---|
| 928 | |
---|
| 929 | /* Decrypt key data */ |
---|
| 930 | if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) { |
---|
| 931 | rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data, |
---|
| 932 | &pkt->datalen ); |
---|
| 933 | if ( rc < 0 ) { |
---|
| 934 | DBGC ( ctx, "WPA %p: failed to decrypt packet: %s\n", |
---|
| 935 | ctx, strerror ( rc ) ); |
---|
| 936 | goto drop; |
---|
| 937 | } |
---|
| 938 | } |
---|
| 939 | |
---|
| 940 | /* Hand it off to appropriate handler */ |
---|
| 941 | switch ( pkt->info & ( EAPOL_KEY_INFO_TYPE | |
---|
| 942 | EAPOL_KEY_INFO_KEY_MIC ) ) { |
---|
| 943 | case EAPOL_KEY_TYPE_PTK: |
---|
| 944 | rc = wpa_handle_1_of_4 ( ctx, pkt, is_rsn, kie ); |
---|
| 945 | break; |
---|
| 946 | |
---|
| 947 | case EAPOL_KEY_TYPE_PTK | EAPOL_KEY_INFO_KEY_MIC: |
---|
| 948 | rc = wpa_handle_3_of_4 ( ctx, pkt, is_rsn, kie ); |
---|
| 949 | break; |
---|
| 950 | |
---|
| 951 | case EAPOL_KEY_TYPE_GTK | EAPOL_KEY_INFO_KEY_MIC: |
---|
| 952 | rc = wpa_handle_1_of_2 ( ctx, pkt, is_rsn, kie ); |
---|
| 953 | break; |
---|
| 954 | |
---|
| 955 | default: |
---|
| 956 | DBGC ( ctx, "WPA %p: Invalid combination of key flags %04x\n", |
---|
| 957 | ctx, pkt->info ); |
---|
| 958 | rc = -EINVAL; |
---|
| 959 | break; |
---|
| 960 | } |
---|
| 961 | |
---|
| 962 | drop: |
---|
| 963 | free_iob ( iob ); |
---|
| 964 | return rc; |
---|
| 965 | } |
---|
| 966 | |
---|
| 967 | struct eapol_handler eapol_key_handler __eapol_handler = { |
---|
| 968 | .type = EAPOL_TYPE_KEY, |
---|
| 969 | .rx = eapol_key_rx, |
---|
| 970 | }; |
---|
| 971 | |
---|
| 972 | /* WPA always needs EAPOL in order to be useful */ |
---|
| 973 | REQUIRE_OBJECT ( eapol ); |
---|