mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-22 23:09:34 +01:00
127 lines
3.4 KiB
C
127 lines
3.4 KiB
C
/*
|
|
*
|
|
* Wireless daemon for Linux
|
|
*
|
|
* Copyright (C) 2013-2019 Intel Corporation. All rights reserved.
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#include <stdio.h>
|
|
#include <errno.h>
|
|
#include <ell/ell.h>
|
|
|
|
#include "src/eapolutil.h"
|
|
#include "src/ie.h"
|
|
|
|
const struct eapol_key *eapol_key_validate(const uint8_t *frame, size_t len,
|
|
size_t mic_len)
|
|
{
|
|
const struct eapol_key *ek;
|
|
|
|
/*
|
|
* Since EAPOL_KEY_DATA_LEN actually gets the key data length bytes we
|
|
* have to check this first, otherwise we could potentially overrun the
|
|
* frame buffer
|
|
*/
|
|
if (len < EAPOL_FRAME_LEN(mic_len))
|
|
return NULL;
|
|
|
|
ek = (const struct eapol_key *) frame;
|
|
|
|
if (len < EAPOL_FRAME_LEN(mic_len) + EAPOL_KEY_DATA_LEN(ek, mic_len))
|
|
return NULL;
|
|
|
|
switch (ek->header.protocol_version) {
|
|
case EAPOL_PROTOCOL_VERSION_2001:
|
|
case EAPOL_PROTOCOL_VERSION_2004:
|
|
case EAPOL_PROTOCOL_VERSION_2010:
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
|
|
if (ek->header.packet_type != 3)
|
|
return NULL;
|
|
|
|
switch (ek->descriptor_type) {
|
|
case EAPOL_DESCRIPTOR_TYPE_RC4:
|
|
case EAPOL_DESCRIPTOR_TYPE_80211:
|
|
case EAPOL_DESCRIPTOR_TYPE_WPA:
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
|
|
switch (ek->key_descriptor_version) {
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
|
case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED:
|
|
break;
|
|
default:
|
|
return NULL;
|
|
}
|
|
|
|
return ek;
|
|
}
|
|
|
|
int eapol_key_descriptor_version_from_akm(enum ie_rsn_akm_suite akm,
|
|
enum ie_rsn_cipher_suite pairwise,
|
|
uint8_t *outv)
|
|
{
|
|
/* 802.11-2020 Section 12.7.2 */
|
|
switch (akm) {
|
|
case IE_RSN_AKM_SUITE_8021X:
|
|
case IE_RSN_AKM_SUITE_PSK:
|
|
if (pairwise == IE_RSN_CIPHER_SUITE_USE_GROUP_CIPHER ||
|
|
pairwise == IE_RSN_CIPHER_SUITE_TKIP)
|
|
*outv = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4;
|
|
else
|
|
*outv = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES;
|
|
|
|
return 0;
|
|
case IE_RSN_AKM_SUITE_FT_OVER_8021X:
|
|
case IE_RSN_AKM_SUITE_FT_USING_PSK:
|
|
case IE_RSN_AKM_SUITE_8021X_SHA256:
|
|
case IE_RSN_AKM_SUITE_PSK_SHA256:
|
|
*outv = EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES;
|
|
return 0;
|
|
case IE_RSN_AKM_SUITE_SAE_SHA256:
|
|
case IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256:
|
|
case IE_RSN_AKM_SUITE_8021X_SUITE_B_SHA256:
|
|
case IE_RSN_AKM_SUITE_8021X_SUITE_B_SHA384:
|
|
case IE_RSN_AKM_SUITE_FT_OVER_8021X_SHA384:
|
|
case IE_RSN_AKM_SUITE_FILS_SHA256:
|
|
case IE_RSN_AKM_SUITE_FILS_SHA384:
|
|
case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256:
|
|
case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384:
|
|
case IE_RSN_AKM_SUITE_OWE:
|
|
case IE_RSN_AKM_SUITE_OSEN:
|
|
*outv = EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED;
|
|
return 0;
|
|
case IE_RSN_AKM_SUITE_TDLS:
|
|
case IE_RSN_AKM_SUITE_AP_PEER_KEY_SHA256:
|
|
break;
|
|
}
|
|
|
|
return -ENOTSUP;
|
|
};
|