mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-22 06:29:23 +01:00
network: add support for SAE password identifiers
Adds a new network profile setting [Security].PasswordIdentifier. When set (and the BSS enables SAE password identifiers) the network and handshake object will read this and use it for the SAE exchange. Building the handshake will fail if: - there is no password identifier set and the BSS sets the "exclusive" bit. - there is a password identifier set and the BSS does not set the "in-use" bit.
This commit is contained in:
parent
e8e5d91e5a
commit
3349cdd5f4
@ -70,6 +70,7 @@ struct network {
|
|||||||
struct network_info *info;
|
struct network_info *info;
|
||||||
unsigned char *psk;
|
unsigned char *psk;
|
||||||
char *passphrase;
|
char *passphrase;
|
||||||
|
char *password_identifier;
|
||||||
struct l_ecc_point *sae_pt_19; /* SAE PT for Group 19 */
|
struct l_ecc_point *sae_pt_19; /* SAE PT for Group 19 */
|
||||||
struct l_ecc_point *sae_pt_20; /* SAE PT for Group 20 */
|
struct l_ecc_point *sae_pt_20; /* SAE PT for Group 20 */
|
||||||
unsigned int agent_request;
|
unsigned int agent_request;
|
||||||
@ -124,6 +125,13 @@ static void network_reset_passphrase(struct network *network)
|
|||||||
network->passphrase = NULL;
|
network->passphrase = NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if (network->password_identifier) {
|
||||||
|
explicit_bzero(network->password_identifier,
|
||||||
|
strlen(network->password_identifier));
|
||||||
|
l_free(network->password_identifier);
|
||||||
|
network->password_identifier = NULL;
|
||||||
|
}
|
||||||
|
|
||||||
if (network->sae_pt_19) {
|
if (network->sae_pt_19) {
|
||||||
l_ecc_point_free(network->sae_pt_19);
|
l_ecc_point_free(network->sae_pt_19);
|
||||||
network->sae_pt_19 = NULL;
|
network->sae_pt_19 = NULL;
|
||||||
@ -317,7 +325,8 @@ static struct l_ecc_point *network_generate_sae_pt(struct network *network,
|
|||||||
l_debug("Generating PT for Group %u", group);
|
l_debug("Generating PT for Group %u", group);
|
||||||
|
|
||||||
pt = crypto_derive_sae_pt_ecc(group, network->ssid,
|
pt = crypto_derive_sae_pt_ecc(group, network->ssid,
|
||||||
network->passphrase, NULL);
|
network->passphrase,
|
||||||
|
network->password_identifier);
|
||||||
if (!pt)
|
if (!pt)
|
||||||
l_warn("SAE PT generation for Group %u failed", group);
|
l_warn("SAE PT generation for Group %u failed", group);
|
||||||
|
|
||||||
@ -462,6 +471,10 @@ static int network_set_handshake_secrets_psk(struct network *network,
|
|||||||
|
|
||||||
handshake_state_set_passphrase(hs, network->passphrase);
|
handshake_state_set_passphrase(hs, network->passphrase);
|
||||||
|
|
||||||
|
if (network->password_identifier)
|
||||||
|
handshake_state_set_password_identifier(hs,
|
||||||
|
network->password_identifier);
|
||||||
|
|
||||||
if (ie_rsnxe_capable(hs->authenticator_rsnxe,
|
if (ie_rsnxe_capable(hs->authenticator_rsnxe,
|
||||||
IE_RSNX_SAE_H2E)) {
|
IE_RSNX_SAE_H2E)) {
|
||||||
l_debug("Authenticator is SAE H2E capable");
|
l_debug("Authenticator is SAE H2E capable");
|
||||||
@ -495,6 +508,19 @@ int network_handshake_setup(struct network *network, struct scan_bss *bss,
|
|||||||
|
|
||||||
switch (network->security) {
|
switch (network->security) {
|
||||||
case SECURITY_PSK:
|
case SECURITY_PSK:
|
||||||
|
/* Check the BSS password ID settings match our configuration */
|
||||||
|
if (bss->sae_pw_id_exclusive && !network->password_identifier) {
|
||||||
|
l_error("[Security].PasswordIdentifier is not set but "
|
||||||
|
"BSS requires SAE password identifiers");
|
||||||
|
return -ENOKEY;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!bss->sae_pw_id_used && network->password_identifier) {
|
||||||
|
l_error("[Security].PasswordIdentifier set but BSS "
|
||||||
|
"does not not use password identifiers");
|
||||||
|
return -ENOKEY;
|
||||||
|
}
|
||||||
|
|
||||||
r = network_set_handshake_secrets_psk(network, hs);
|
r = network_set_handshake_secrets_psk(network, hs);
|
||||||
if (r < 0)
|
if (r < 0)
|
||||||
return r;
|
return r;
|
||||||
@ -631,6 +657,9 @@ static int network_load_psk(struct network *network, struct scan_bss *bss)
|
|||||||
_auto_(l_free) char *passphrase =
|
_auto_(l_free) char *passphrase =
|
||||||
l_settings_get_string(network->settings,
|
l_settings_get_string(network->settings,
|
||||||
"Security", "Passphrase");
|
"Security", "Passphrase");
|
||||||
|
_auto_(l_free) char *password_id =
|
||||||
|
l_settings_get_string(network->settings, "Security",
|
||||||
|
"PasswordIdentifier");
|
||||||
_auto_(l_free) char *path =
|
_auto_(l_free) char *path =
|
||||||
storage_get_network_file_path(security, ssid);
|
storage_get_network_file_path(security, ssid);
|
||||||
|
|
||||||
@ -655,6 +684,7 @@ static int network_load_psk(struct network *network, struct scan_bss *bss)
|
|||||||
network_reset_passphrase(network);
|
network_reset_passphrase(network);
|
||||||
network_reset_psk(network);
|
network_reset_psk(network);
|
||||||
network->passphrase = l_steal_ptr(passphrase);
|
network->passphrase = l_steal_ptr(passphrase);
|
||||||
|
network->password_identifier = l_steal_ptr(password_id);
|
||||||
|
|
||||||
if (network_settings_load_pt_ecc(network, path,
|
if (network_settings_load_pt_ecc(network, path,
|
||||||
19, &network->sae_pt_19) > 0)
|
19, &network->sae_pt_19) > 0)
|
||||||
@ -726,6 +756,11 @@ static void network_settings_save(struct network *network,
|
|||||||
l_settings_set_string(settings, "Security", "Passphrase",
|
l_settings_set_string(settings, "Security", "Passphrase",
|
||||||
network->passphrase);
|
network->passphrase);
|
||||||
|
|
||||||
|
if (network->password_identifier)
|
||||||
|
l_settings_set_string(settings, "Security",
|
||||||
|
"PasswordIdentifier",
|
||||||
|
network->password_identifier);
|
||||||
|
|
||||||
if (network->sae_pt_19)
|
if (network->sae_pt_19)
|
||||||
network_settings_save_sae_pt_ecc(settings, network->sae_pt_19);
|
network_settings_save_sae_pt_ecc(settings, network->sae_pt_19);
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user