2014-12-19 01:10:10 +01:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
|
|
|
* Copyright (C) 2013-2014 Intel Corporation. All rights reserved.
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <ell/ell.h>
|
|
|
|
|
2014-12-28 05:37:39 +01:00
|
|
|
#include "sha1.h"
|
2015-02-19 03:51:54 +01:00
|
|
|
#include "crypto.h"
|
2014-12-19 01:10:10 +01:00
|
|
|
#include "eapol.h"
|
|
|
|
|
2015-02-24 18:08:03 +01:00
|
|
|
struct l_hashmap *state_machines;
|
2015-02-24 18:10:42 +01:00
|
|
|
eapol_tx_packet_func_t tx_packet = NULL;
|
2015-02-24 18:09:42 +01:00
|
|
|
eapol_get_nonce_func_t get_nonce = NULL;
|
2015-02-24 18:08:03 +01:00
|
|
|
enum eapol_protocol_version protocol_version = EAPOL_PROTOCOL_VERSION_2004;
|
|
|
|
|
2014-12-28 05:31:03 +01:00
|
|
|
#define VERIFY_IS_ZERO(field) \
|
|
|
|
do { \
|
|
|
|
unsigned int i; \
|
|
|
|
for (i = 0; i < sizeof(field); i++) \
|
|
|
|
if ((field)[i] != 0) \
|
|
|
|
return false; \
|
|
|
|
} while (false) \
|
|
|
|
|
2014-12-28 05:37:39 +01:00
|
|
|
/*
|
|
|
|
* MIC calculation depends on the selected hash function. The has function
|
|
|
|
* is given in the EAPoL Key Descriptor Version field.
|
|
|
|
*
|
|
|
|
* The MIC length is always 16 bytes for currently known Key Descriptor
|
|
|
|
* Versions.
|
|
|
|
*
|
|
|
|
* The input struct eapol_key *frame should have a zero-d MIC field
|
|
|
|
*/
|
|
|
|
bool eapol_calculate_mic(const uint8_t *kck, const struct eapol_key *frame,
|
|
|
|
uint8_t *mic)
|
|
|
|
{
|
|
|
|
size_t frame_len = sizeof(struct eapol_key);
|
|
|
|
|
|
|
|
frame_len += L_BE16_TO_CPU(frame->key_data_len);
|
|
|
|
|
|
|
|
switch (frame->key_descriptor_version) {
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
2015-02-13 21:31:23 +01:00
|
|
|
return hmac_md5(kck, 16, frame, frame_len, mic, 16);
|
2014-12-28 05:37:39 +01:00
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
2015-02-13 21:31:23 +01:00
|
|
|
return hmac_sha1(kck, 16, frame, frame_len, mic, 16);
|
2014-12-28 05:37:39 +01:00
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
2015-02-13 21:52:48 +01:00
|
|
|
return cmac_aes(kck, 16, frame, frame_len, mic, 16);
|
2014-12-28 05:37:39 +01:00
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-19 04:13:09 +01:00
|
|
|
bool eapol_verify_mic(const uint8_t *kck, const struct eapol_key *frame)
|
|
|
|
{
|
|
|
|
size_t frame_len = sizeof(struct eapol_key);
|
|
|
|
uint8_t mic[16];
|
|
|
|
struct iovec iov[3];
|
|
|
|
struct l_checksum *checksum = NULL;
|
|
|
|
|
|
|
|
iov[0].iov_base = (void *) frame;
|
|
|
|
iov[0].iov_len = offsetof(struct eapol_key, key_mic_data);
|
|
|
|
|
|
|
|
memset(mic, 0, sizeof(mic));
|
|
|
|
iov[1].iov_base = mic;
|
|
|
|
iov[1].iov_len = sizeof(mic);
|
|
|
|
|
|
|
|
iov[2].iov_base = ((void *) frame) +
|
|
|
|
offsetof(struct eapol_key, key_data_len);
|
2015-02-24 17:42:20 +01:00
|
|
|
iov[2].iov_len = frame_len - offsetof(struct eapol_key, key_data_len) +
|
2015-02-19 04:13:09 +01:00
|
|
|
L_BE16_TO_CPU(frame->key_data_len);
|
|
|
|
|
|
|
|
switch (frame->key_descriptor_version) {
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
|
|
|
checksum = l_checksum_new_hmac(L_CHECKSUM_MD5, kck, 16);
|
|
|
|
break;
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
|
|
|
checksum = l_checksum_new_hmac(L_CHECKSUM_SHA1, kck, 16);
|
|
|
|
break;
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
|
|
|
checksum = l_checksum_new_cmac_aes(kck, 16);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (checksum == NULL)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
l_checksum_updatev(checksum, iov, 3);
|
|
|
|
l_checksum_get_digest(checksum, mic, 16);
|
|
|
|
l_free(checksum);
|
|
|
|
|
|
|
|
if (!memcmp(frame->key_mic_data, mic, 16))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-02-14 03:37:17 +01:00
|
|
|
uint8_t *eapol_decrypt_key_data(const uint8_t *kek,
|
|
|
|
const struct eapol_key *frame)
|
|
|
|
{
|
|
|
|
size_t key_data_len = L_BE16_TO_CPU(frame->key_data_len);
|
2015-02-18 00:39:23 +01:00
|
|
|
const uint8_t *key_data = frame->key_data;
|
|
|
|
size_t expected_len;
|
2015-02-14 03:37:17 +01:00
|
|
|
uint8_t *buf;
|
|
|
|
|
|
|
|
switch (frame->key_descriptor_version) {
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
2015-02-18 00:39:23 +01:00
|
|
|
expected_len = key_data_len;
|
2015-02-14 03:37:17 +01:00
|
|
|
break;
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
2015-02-18 00:39:23 +01:00
|
|
|
expected_len = key_data_len - 8;
|
2015-02-14 03:37:17 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
};
|
|
|
|
|
2015-02-18 00:39:23 +01:00
|
|
|
buf = l_new(uint8_t, expected_len);
|
2015-02-14 03:37:17 +01:00
|
|
|
|
2015-02-18 00:39:23 +01:00
|
|
|
switch (frame->key_descriptor_version) {
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
|
|
|
{
|
|
|
|
uint8_t key[32];
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
memcpy(key, frame->eapol_key_iv, 16);
|
|
|
|
memcpy(key + 16, kek, 16);
|
|
|
|
|
|
|
|
ret = arc4_skip(key, 32, 256, key_data, key_data_len, buf);
|
|
|
|
memset(key, 0, sizeof(key));
|
|
|
|
|
|
|
|
if (!ret)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
|
|
|
if (key_data_len < 8 || key_data_len % 8)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
if (!aes_unwrap(kek, key_data, key_data_len, buf))
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
break;
|
2015-02-14 03:37:17 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return buf;
|
2015-02-18 00:39:23 +01:00
|
|
|
|
|
|
|
error:
|
|
|
|
l_free(buf);
|
|
|
|
return NULL;
|
2015-02-14 03:37:17 +01:00
|
|
|
}
|
|
|
|
|
2015-01-22 16:58:23 +01:00
|
|
|
const struct eapol_key *eapol_key_validate(const uint8_t *frame, size_t len)
|
2014-12-24 20:43:59 +01:00
|
|
|
{
|
2015-01-22 16:58:23 +01:00
|
|
|
const struct eapol_key *ek;
|
2014-12-24 20:43:59 +01:00
|
|
|
uint16_t key_data_len;
|
|
|
|
|
|
|
|
if (len < sizeof(struct eapol_key))
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 20:43:59 +01:00
|
|
|
|
2015-01-22 16:58:23 +01:00
|
|
|
ek = (const struct eapol_key *) frame;
|
2014-12-24 20:43:59 +01:00
|
|
|
|
|
|
|
if (ek->protocol_version != EAPOL_PROTOCOL_VERSION_2001 &&
|
|
|
|
ek->protocol_version != EAPOL_PROTOCOL_VERSION_2004)
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 20:43:59 +01:00
|
|
|
|
|
|
|
if (ek->packet_type != 3)
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 20:43:59 +01:00
|
|
|
|
|
|
|
switch (ek->descriptor_type) {
|
|
|
|
case EAPOL_DESCRIPTOR_TYPE_RC4:
|
|
|
|
case EAPOL_DESCRIPTOR_TYPE_80211:
|
|
|
|
case EAPOL_DESCRIPTOR_TYPE_WPA:
|
|
|
|
break;
|
|
|
|
default:
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 20:43:59 +01:00
|
|
|
}
|
|
|
|
|
2014-12-24 22:04:22 +01:00
|
|
|
switch (ek->key_descriptor_version) {
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
|
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
|
|
|
break;
|
|
|
|
default:
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 22:04:22 +01:00
|
|
|
}
|
|
|
|
|
2014-12-24 20:43:59 +01:00
|
|
|
key_data_len = L_BE16_TO_CPU(ek->key_data_len);
|
|
|
|
if (len < sizeof(struct eapol_key) + key_data_len)
|
2015-01-22 16:58:23 +01:00
|
|
|
return NULL;
|
2014-12-24 20:43:59 +01:00
|
|
|
|
2015-01-22 16:58:23 +01:00
|
|
|
return ek;
|
2014-12-24 20:43:59 +01:00
|
|
|
}
|
2014-12-28 05:31:03 +01:00
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
#define VERIFY_PTK_COMMON(ek) \
|
|
|
|
if (!ek->key_type) \
|
|
|
|
return false; \
|
|
|
|
if (ek->smk_message) \
|
|
|
|
return false; \
|
|
|
|
if (ek->request) \
|
|
|
|
return false; \
|
|
|
|
if (ek->error) \
|
|
|
|
return false \
|
|
|
|
|
|
|
|
bool eapol_verify_ptk_1_of_4(const struct eapol_key *ek)
|
2014-12-28 05:31:03 +01:00
|
|
|
{
|
|
|
|
/* Verify according to 802.11, Section 11.6.6.2 */
|
2015-02-23 22:39:26 +01:00
|
|
|
VERIFY_PTK_COMMON(ek);
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
if (ek->install)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
if (!ek->key_ack)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
if (ek->key_mic)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
if (ek->secure)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
if (ek->encrypted_key_data)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:31:03 +01:00
|
|
|
|
|
|
|
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
|
|
|
VERIFY_IS_ZERO(ek->key_rsc);
|
|
|
|
VERIFY_IS_ZERO(ek->reserved);
|
|
|
|
VERIFY_IS_ZERO(ek->key_mic_data);
|
|
|
|
|
2015-02-13 23:08:33 +01:00
|
|
|
return ek;
|
2014-12-28 05:31:03 +01:00
|
|
|
}
|
2014-12-28 05:32:07 +01:00
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
bool eapol_verify_ptk_2_of_4(const struct eapol_key *ek)
|
2014-12-28 05:32:07 +01:00
|
|
|
{
|
|
|
|
uint16_t key_len;
|
|
|
|
|
2015-02-13 23:12:43 +01:00
|
|
|
/* Verify according to 802.11, Section 11.6.6.3 */
|
2015-02-23 22:39:26 +01:00
|
|
|
VERIFY_PTK_COMMON(ek);
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
if (ek->install)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
if (ek->key_ack)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
if (!ek->key_mic)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
if (ek->secure)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
if (ek->encrypted_key_data)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
|
|
|
key_len = L_BE16_TO_CPU(ek->key_length);
|
|
|
|
if (key_len != 0)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2014-12-28 05:32:07 +01:00
|
|
|
|
2015-02-13 23:36:24 +01:00
|
|
|
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
|
|
|
VERIFY_IS_ZERO(ek->key_rsc);
|
|
|
|
VERIFY_IS_ZERO(ek->reserved);
|
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
return true;
|
2014-12-28 05:32:07 +01:00
|
|
|
}
|
2014-12-28 05:33:46 +01:00
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
bool eapol_verify_ptk_3_of_4(const struct eapol_key *ek)
|
2015-02-13 23:36:52 +01:00
|
|
|
{
|
|
|
|
uint16_t key_len;
|
|
|
|
|
|
|
|
/* Verify according to 802.11, Section 11.6.6.4 */
|
2015-02-23 22:39:26 +01:00
|
|
|
VERIFY_PTK_COMMON(ek);
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
if (!ek->key_ack)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
if (!ek->key_mic)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
if (!ek->secure)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
if (!ek->encrypted_key_data)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
key_len = L_BE16_TO_CPU(ek->key_length);
|
|
|
|
if (key_len != 16)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-13 23:36:52 +01:00
|
|
|
|
|
|
|
VERIFY_IS_ZERO(ek->reserved);
|
|
|
|
|
|
|
|
/* 0 (Version 2) or random (Version 1) */
|
|
|
|
if (ek->key_descriptor_version ==
|
|
|
|
EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4)
|
|
|
|
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
return true;
|
2015-02-13 23:36:52 +01:00
|
|
|
}
|
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
bool eapol_verify_ptk_4_of_4(const struct eapol_key *ek)
|
2015-02-14 01:38:10 +01:00
|
|
|
{
|
|
|
|
uint16_t key_len;
|
|
|
|
|
|
|
|
/* Verify according to 802.11, Section 11.6.6.5 */
|
2015-02-23 22:39:26 +01:00
|
|
|
VERIFY_PTK_COMMON(ek);
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
if (ek->key_ack)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
if (!ek->key_mic)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
if (!ek->secure)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
if (ek->encrypted_key_data)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
key_len = L_BE16_TO_CPU(ek->key_length);
|
|
|
|
if (key_len != 0)
|
2015-02-23 22:39:26 +01:00
|
|
|
return false;
|
2015-02-14 01:38:10 +01:00
|
|
|
|
|
|
|
VERIFY_IS_ZERO(ek->key_nonce);
|
|
|
|
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
|
|
|
VERIFY_IS_ZERO(ek->key_rsc);
|
|
|
|
VERIFY_IS_ZERO(ek->reserved);
|
|
|
|
|
2015-02-23 22:39:26 +01:00
|
|
|
return true;
|
2015-02-14 01:38:10 +01:00
|
|
|
}
|
|
|
|
|
2015-02-13 21:10:28 +01:00
|
|
|
static struct eapol_key *eapol_create_common(
|
2014-12-28 05:33:46 +01:00
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
2015-02-13 21:10:28 +01:00
|
|
|
bool secure,
|
2015-02-13 20:54:50 +01:00
|
|
|
uint64_t key_replay_counter,
|
2014-12-28 05:33:46 +01:00
|
|
|
const uint8_t snonce[],
|
|
|
|
size_t extra_len,
|
|
|
|
const uint8_t *extra_data)
|
|
|
|
{
|
|
|
|
size_t to_alloc = sizeof(struct eapol_key);
|
|
|
|
struct eapol_key *out_frame = l_malloc(to_alloc + extra_len);
|
|
|
|
|
|
|
|
memset(out_frame, 0, to_alloc + extra_len);
|
|
|
|
|
|
|
|
out_frame->protocol_version = protocol;
|
|
|
|
out_frame->packet_type = 0x3;
|
|
|
|
out_frame->packet_len = L_CPU_TO_BE16(to_alloc + extra_len - 4);
|
|
|
|
out_frame->descriptor_type = EAPOL_DESCRIPTOR_TYPE_80211;
|
|
|
|
out_frame->key_descriptor_version = version;
|
|
|
|
out_frame->key_type = true;
|
|
|
|
out_frame->install = false;
|
|
|
|
out_frame->key_ack = false;
|
|
|
|
out_frame->key_mic = true;
|
2015-02-13 21:10:28 +01:00
|
|
|
out_frame->secure = secure;
|
2014-12-28 05:33:46 +01:00
|
|
|
out_frame->error = false;
|
|
|
|
out_frame->request = false;
|
|
|
|
out_frame->encrypted_key_data = false;
|
|
|
|
out_frame->smk_message = false;
|
2015-02-13 20:54:50 +01:00
|
|
|
out_frame->key_length = 0;
|
|
|
|
out_frame->key_replay_counter = L_CPU_TO_BE64(key_replay_counter);
|
2014-12-28 05:33:46 +01:00
|
|
|
memcpy(out_frame->key_nonce, snonce, sizeof(out_frame->key_nonce));
|
|
|
|
out_frame->key_data_len = L_CPU_TO_BE16(extra_len);
|
|
|
|
memcpy(out_frame->key_data, extra_data, extra_len);
|
|
|
|
|
|
|
|
return out_frame;
|
|
|
|
}
|
2015-02-13 21:10:28 +01:00
|
|
|
|
|
|
|
struct eapol_key *eapol_create_ptk_2_of_4(
|
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
|
|
|
uint64_t key_replay_counter,
|
|
|
|
const uint8_t snonce[],
|
|
|
|
size_t extra_len,
|
|
|
|
const uint8_t *extra_data)
|
|
|
|
{
|
|
|
|
return eapol_create_common(protocol, version, false, key_replay_counter,
|
|
|
|
snonce, extra_len, extra_data);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct eapol_key *eapol_create_ptk_4_of_4(
|
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
2015-02-24 17:52:12 +01:00
|
|
|
uint64_t key_replay_counter)
|
2015-02-13 21:10:28 +01:00
|
|
|
{
|
2015-02-24 17:52:12 +01:00
|
|
|
uint8_t snonce[32];
|
|
|
|
|
|
|
|
memset(snonce, 0, sizeof(snonce));
|
2015-02-13 21:10:28 +01:00
|
|
|
return eapol_create_common(protocol, version, true, key_replay_counter,
|
|
|
|
snonce, 0, NULL);
|
|
|
|
}
|
2015-02-24 17:54:23 +01:00
|
|
|
|
|
|
|
struct eapol_sm {
|
|
|
|
uint8_t pmk[32];
|
|
|
|
uint64_t replay_counter;
|
|
|
|
uint8_t sta_addr[6];
|
|
|
|
uint8_t snonce[32];
|
|
|
|
uint8_t aa_addr[6];
|
|
|
|
uint8_t anonce[32];
|
|
|
|
uint8_t ptk[64];
|
|
|
|
uint8_t *ap_rsn;
|
|
|
|
size_t ap_rsn_size;
|
|
|
|
uint8_t *own_rsn;
|
|
|
|
size_t own_rsn_size;
|
|
|
|
bool have_snonce:1;
|
|
|
|
bool have_replay:1;
|
|
|
|
};
|
|
|
|
|
|
|
|
static void eapol_sm_destroy(void *value)
|
|
|
|
{
|
|
|
|
struct eapol_sm *sm = value;
|
|
|
|
|
|
|
|
l_free(sm->ap_rsn);
|
|
|
|
l_free(sm->own_rsn);
|
|
|
|
l_free(sm);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct eapol_sm *eapol_sm_new()
|
|
|
|
{
|
|
|
|
struct eapol_sm *sm;
|
|
|
|
|
|
|
|
sm = l_new(struct eapol_sm, 1);
|
|
|
|
|
|
|
|
return sm;
|
|
|
|
}
|
|
|
|
|
|
|
|
void eapol_sm_free(struct eapol_sm *sm)
|
|
|
|
{
|
|
|
|
eapol_sm_destroy(sm);
|
|
|
|
}
|
2015-02-24 17:55:50 +01:00
|
|
|
|
|
|
|
void eapol_sm_set_sta_address(struct eapol_sm *sm, const uint8_t *sta_addr)
|
|
|
|
{
|
|
|
|
memcpy(sm->sta_addr, sta_addr, sizeof(sm->sta_addr));
|
|
|
|
}
|
2015-02-24 17:56:39 +01:00
|
|
|
|
|
|
|
void eapol_sm_set_aa_address(struct eapol_sm *sm, const uint8_t *aa_addr)
|
|
|
|
{
|
|
|
|
memcpy(sm->aa_addr, aa_addr, sizeof(sm->aa_addr));
|
|
|
|
}
|
2015-02-24 17:57:25 +01:00
|
|
|
|
|
|
|
void eapol_sm_set_pmk(struct eapol_sm *sm, const uint8_t *pmk)
|
|
|
|
{
|
|
|
|
memcpy(sm->pmk, pmk, sizeof(sm->pmk));
|
|
|
|
}
|
2015-02-24 17:58:03 +01:00
|
|
|
|
|
|
|
void eapol_sm_set_ap_rsn(struct eapol_sm *sm, const uint8_t *rsn_ie,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
sm->ap_rsn_size = len;
|
|
|
|
l_free(sm->ap_rsn);
|
|
|
|
sm->ap_rsn = l_memdup(rsn_ie, len);
|
|
|
|
}
|
2015-02-24 17:58:43 +01:00
|
|
|
|
|
|
|
void eapol_sm_set_own_rsn(struct eapol_sm *sm, const uint8_t *rsn_ie,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
sm->own_rsn_size = len;
|
|
|
|
l_free(sm->own_rsn);
|
|
|
|
sm->own_rsn = l_memdup(rsn_ie, len);
|
|
|
|
}
|
2015-02-24 18:08:03 +01:00
|
|
|
|
2015-02-24 18:10:42 +01:00
|
|
|
void __eapol_set_tx_packet_func(eapol_tx_packet_func_t func)
|
|
|
|
{
|
|
|
|
tx_packet = func;
|
|
|
|
}
|
2015-02-24 18:09:42 +01:00
|
|
|
|
|
|
|
void __eapol_set_get_nonce_func(eapol_get_nonce_func_t func)
|
|
|
|
{
|
|
|
|
get_nonce = func;
|
|
|
|
}
|
|
|
|
|
2015-02-24 18:11:40 +01:00
|
|
|
void __eapol_set_protocol_version(enum eapol_protocol_version version)
|
|
|
|
{
|
|
|
|
protocol_version = version;
|
|
|
|
}
|
|
|
|
|
2015-02-24 18:08:03 +01:00
|
|
|
bool eapol_init()
|
|
|
|
{
|
|
|
|
state_machines = l_hashmap_new();
|
|
|
|
protocol_version = EAPOL_PROTOCOL_VERSION_2004;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool eapol_exit()
|
|
|
|
{
|
|
|
|
l_hashmap_destroy(state_machines, eapol_sm_destroy);
|
2015-02-24 18:09:42 +01:00
|
|
|
get_nonce = NULL;
|
2015-02-24 18:10:42 +01:00
|
|
|
tx_packet = NULL;
|
2015-02-24 18:08:03 +01:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|