mirror of
https://git.kernel.org/pub/scm/network/wireless/iwd.git
synced 2024-11-10 14:09:22 +01:00
1d62f4ec0e
After moving AP EAPoL code into eapol.c there were a few functions that no longer needed to be public API's. These were changed to static's and the header definition was removed.
2408 lines
60 KiB
C
2408 lines
60 KiB
C
/*
|
||
*
|
||
* Wireless daemon for Linux
|
||
*
|
||
* Copyright (C) 2013-2014 Intel Corporation. All rights reserved.
|
||
*
|
||
* This library is free software; you can redistribute it and/or
|
||
* modify it under the terms of the GNU Lesser General Public
|
||
* License as published by the Free Software Foundation; either
|
||
* version 2.1 of the License, or (at your option) any later version.
|
||
*
|
||
* This library is distributed in the hope that it will be useful,
|
||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||
* Lesser General Public License for more details.
|
||
*
|
||
* You should have received a copy of the GNU Lesser General Public
|
||
* License along with this library; if not, write to the Free Software
|
||
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
||
*
|
||
*/
|
||
|
||
#ifdef HAVE_CONFIG_H
|
||
#include <config.h>
|
||
#endif
|
||
|
||
#include <string.h>
|
||
#include <alloca.h>
|
||
#include <linux/if_ether.h>
|
||
#include <ell/ell.h>
|
||
|
||
#include "src/crypto.h"
|
||
#include "src/eapol.h"
|
||
#include "src/ie.h"
|
||
#include "src/util.h"
|
||
#include "src/mpdu.h"
|
||
#include "src/eap.h"
|
||
#include "src/handshake.h"
|
||
#include "src/watchlist.h"
|
||
|
||
struct l_queue *state_machines;
|
||
struct l_queue *preauths;
|
||
struct watchlist frame_watches;
|
||
static uint32_t eapol_4way_handshake_time = 2;
|
||
|
||
eapol_rekey_offload_func_t rekey_offload = NULL;
|
||
|
||
eapol_tx_packet_func_t tx_packet = NULL;
|
||
void *tx_user_data;
|
||
|
||
uint32_t next_frame_watch_id;
|
||
|
||
#define VERIFY_IS_ZERO(field) \
|
||
do { \
|
||
if (!util_mem_is_zero((field), sizeof((field)))) \
|
||
return false; \
|
||
} while (false) \
|
||
|
||
/*
|
||
* MIC calculation depends on the selected hash function. The has function
|
||
* is given in the EAPoL Key Descriptor Version field.
|
||
*
|
||
* The MIC length is always 16 bytes for currently known Key Descriptor
|
||
* Versions.
|
||
*
|
||
* The input struct eapol_key *frame should have a zero-d MIC field
|
||
*/
|
||
bool eapol_calculate_mic(enum ie_rsn_akm_suite akm, const uint8_t *kck,
|
||
const struct eapol_key *frame, uint8_t *mic)
|
||
{
|
||
size_t frame_len = sizeof(struct eapol_key);
|
||
|
||
frame_len += L_BE16_TO_CPU(frame->key_data_len);
|
||
|
||
switch (frame->key_descriptor_version) {
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
||
return hmac_md5(kck, 16, frame, frame_len, mic, 16);
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
||
return hmac_sha1(kck, 16, frame, frame_len, mic, 16);
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
||
return cmac_aes(kck, 16, frame, frame_len, mic, 16);
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED:
|
||
switch (akm) {
|
||
case IE_RSN_AKM_SUITE_SAE_SHA256:
|
||
case IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256:
|
||
return cmac_aes(kck, 16, frame, frame_len, mic, 16);
|
||
default:
|
||
return false;
|
||
}
|
||
default:
|
||
return false;
|
||
}
|
||
}
|
||
|
||
bool eapol_verify_mic(enum ie_rsn_akm_suite akm, const uint8_t *kck,
|
||
const struct eapol_key *frame)
|
||
{
|
||
size_t frame_len = sizeof(struct eapol_key);
|
||
uint8_t mic[16];
|
||
struct iovec iov[3];
|
||
struct l_checksum *checksum = NULL;
|
||
|
||
iov[0].iov_base = (void *) frame;
|
||
iov[0].iov_len = offsetof(struct eapol_key, key_mic_data);
|
||
|
||
memset(mic, 0, sizeof(mic));
|
||
iov[1].iov_base = mic;
|
||
iov[1].iov_len = sizeof(mic);
|
||
|
||
iov[2].iov_base = ((void *) frame) +
|
||
offsetof(struct eapol_key, key_data_len);
|
||
iov[2].iov_len = frame_len - offsetof(struct eapol_key, key_data_len) +
|
||
L_BE16_TO_CPU(frame->key_data_len);
|
||
|
||
switch (frame->key_descriptor_version) {
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
||
checksum = l_checksum_new_hmac(L_CHECKSUM_MD5, kck, 16);
|
||
break;
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
||
checksum = l_checksum_new_hmac(L_CHECKSUM_SHA1, kck, 16);
|
||
break;
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
||
checksum = l_checksum_new_cmac_aes(kck, 16);
|
||
break;
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED:
|
||
switch (akm) {
|
||
case IE_RSN_AKM_SUITE_SAE_SHA256:
|
||
case IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256:
|
||
checksum = l_checksum_new_cmac_aes(kck, 16);
|
||
break;
|
||
default:
|
||
return false;
|
||
}
|
||
|
||
break;
|
||
default:
|
||
return false;
|
||
}
|
||
|
||
if (checksum == NULL)
|
||
return false;
|
||
|
||
l_checksum_updatev(checksum, iov, 3);
|
||
l_checksum_get_digest(checksum, mic, 16);
|
||
l_checksum_free(checksum);
|
||
|
||
if (!memcmp(frame->key_mic_data, mic, 16))
|
||
return true;
|
||
|
||
return false;
|
||
}
|
||
|
||
uint8_t *eapol_decrypt_key_data(enum ie_rsn_akm_suite akm, const uint8_t *kek,
|
||
const struct eapol_key *frame,
|
||
size_t *decrypted_size)
|
||
{
|
||
size_t key_data_len = L_BE16_TO_CPU(frame->key_data_len);
|
||
const uint8_t *key_data = frame->key_data;
|
||
size_t expected_len;
|
||
uint8_t *buf;
|
||
|
||
switch (frame->key_descriptor_version) {
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
||
expected_len = key_data_len;
|
||
break;
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED:
|
||
/*
|
||
* TODO: for now, only SAE is supported under the AKM_DEFINED
|
||
* key descriptor version. Once 8021x suites are added for this
|
||
* type this will need to be expanded to handle the AKM types in
|
||
* its own switch.
|
||
*/
|
||
if (!IE_AKM_IS_SAE(akm))
|
||
return NULL;
|
||
|
||
/* Fall through */
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
||
if (key_data_len < 24 || key_data_len % 8)
|
||
return NULL;
|
||
|
||
expected_len = key_data_len - 8;
|
||
break;
|
||
default:
|
||
return NULL;
|
||
};
|
||
|
||
buf = l_new(uint8_t, expected_len);
|
||
|
||
switch (frame->key_descriptor_version) {
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
||
{
|
||
uint8_t key[32];
|
||
bool ret;
|
||
|
||
memcpy(key, frame->eapol_key_iv, 16);
|
||
memcpy(key + 16, kek, 16);
|
||
|
||
ret = arc4_skip(key, 32, 256, key_data, key_data_len, buf);
|
||
memset(key, 0, sizeof(key));
|
||
|
||
if (!ret)
|
||
goto error;
|
||
|
||
break;
|
||
}
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED:
|
||
if (!aes_unwrap(kek, key_data, key_data_len, buf))
|
||
goto error;
|
||
|
||
break;
|
||
}
|
||
|
||
if (decrypted_size)
|
||
*decrypted_size = expected_len;
|
||
|
||
return buf;
|
||
|
||
error:
|
||
l_free(buf);
|
||
return NULL;
|
||
}
|
||
|
||
/*
|
||
* Pad and encrypt the plaintext Key Data contents in @key_data using
|
||
* the encryption scheme required by @out_frame->key_descriptor_version,
|
||
* write results to @out_frame->key_data and @out_frame->key_data_len.
|
||
*
|
||
* Note that for efficiency @key_data is being modified, including in
|
||
* case of failure, so it must be sufficiently larger than @key_data_len.
|
||
*/
|
||
static bool eapol_encrypt_key_data(const uint8_t *kek, uint8_t *key_data,
|
||
size_t key_data_len,
|
||
struct eapol_key *out_frame)
|
||
{
|
||
switch (out_frame->key_descriptor_version) {
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4:
|
||
/* Not supported */
|
||
return false;
|
||
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES:
|
||
case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES:
|
||
if (key_data_len < 16 || key_data_len % 8)
|
||
key_data[key_data_len++] = 0xdd;
|
||
while (key_data_len < 16 || key_data_len % 8)
|
||
key_data[key_data_len++] = 0x00;
|
||
|
||
if (!aes_wrap(kek, key_data, key_data_len, out_frame->key_data))
|
||
return false;
|
||
|
||
key_data_len += 8;
|
||
|
||
break;
|
||
}
|
||
|
||
out_frame->key_data_len = L_CPU_TO_BE16(key_data_len);
|
||
|
||
return true;
|
||
}
|
||
|
||
static void eapol_key_data_append(struct eapol_key *ek,
|
||
enum handshake_kde selector,
|
||
const uint8_t *data, size_t data_len)
|
||
{
|
||
uint16_t key_data_len = L_BE16_TO_CPU(ek->key_data_len);
|
||
|
||
ek->key_data[key_data_len++] = IE_TYPE_VENDOR_SPECIFIC;
|
||
ek->key_data[key_data_len++] = 4 + data_len; /* OUI + Data type + len */
|
||
l_put_be32(selector, ek->key_data + key_data_len);
|
||
key_data_len += 4;
|
||
|
||
memcpy(ek->key_data + key_data_len, data, data_len);
|
||
key_data_len += data_len;
|
||
|
||
ek->key_data_len = L_CPU_TO_BE16(key_data_len);
|
||
}
|
||
|
||
#define VERIFY_PTK_COMMON(ek) \
|
||
if (!ek->key_type) \
|
||
return false; \
|
||
if (ek->smk_message) \
|
||
return false; \
|
||
if (ek->request) \
|
||
return false; \
|
||
if (ek->error) \
|
||
return false \
|
||
|
||
bool eapol_verify_ptk_1_of_4(const struct eapol_key *ek)
|
||
{
|
||
/* Verify according to 802.11, Section 11.6.6.2 */
|
||
VERIFY_PTK_COMMON(ek);
|
||
|
||
if (ek->install)
|
||
return false;
|
||
|
||
if (!ek->key_ack)
|
||
return false;
|
||
|
||
if (ek->key_mic)
|
||
return false;
|
||
|
||
if (ek->secure)
|
||
return false;
|
||
|
||
if (ek->encrypted_key_data)
|
||
return false;
|
||
|
||
if (ek->wpa_key_id)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->key_rsc);
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
VERIFY_IS_ZERO(ek->key_mic_data);
|
||
|
||
return true;
|
||
}
|
||
|
||
bool eapol_verify_ptk_2_of_4(const struct eapol_key *ek)
|
||
{
|
||
uint16_t key_len;
|
||
|
||
/* Verify according to 802.11, Section 11.6.6.3 */
|
||
VERIFY_PTK_COMMON(ek);
|
||
|
||
if (ek->install)
|
||
return false;
|
||
|
||
if (ek->key_ack)
|
||
return false;
|
||
|
||
if (!ek->key_mic)
|
||
return false;
|
||
|
||
if (ek->secure)
|
||
return false;
|
||
|
||
if (ek->encrypted_key_data)
|
||
return false;
|
||
|
||
if (ek->wpa_key_id)
|
||
return false;
|
||
|
||
if (ek->request)
|
||
return false;
|
||
|
||
key_len = L_BE16_TO_CPU(ek->key_length);
|
||
if (key_len != 0)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
||
VERIFY_IS_ZERO(ek->key_rsc);
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
|
||
return true;
|
||
}
|
||
|
||
bool eapol_verify_ptk_3_of_4(const struct eapol_key *ek, bool is_wpa)
|
||
{
|
||
uint16_t key_len;
|
||
|
||
/* Verify according to 802.11, Section 11.6.6.4 */
|
||
VERIFY_PTK_COMMON(ek);
|
||
|
||
/*
|
||
* TODO: Handle cases where install might be 0:
|
||
* For PTK generation, 0 only if the AP does not support key mapping
|
||
* keys, or if the STA has the No Pairwise bit (in the RSN Capabilities
|
||
* field) equal to 1 and only the group key is used.
|
||
*/
|
||
if (!ek->install)
|
||
return false;
|
||
|
||
if (!ek->key_ack)
|
||
return false;
|
||
|
||
if (!ek->key_mic)
|
||
return false;
|
||
|
||
if (ek->secure != !is_wpa)
|
||
return false;
|
||
|
||
/* Must be encrypted when GTK is present but reserved in WPA */
|
||
if (!ek->encrypted_key_data && !is_wpa)
|
||
return false;
|
||
|
||
if (ek->wpa_key_id)
|
||
return false;
|
||
|
||
key_len = L_BE16_TO_CPU(ek->key_length);
|
||
if (key_len != 16 && key_len != 32)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
|
||
return true;
|
||
}
|
||
|
||
bool eapol_verify_ptk_4_of_4(const struct eapol_key *ek, bool is_wpa)
|
||
{
|
||
uint16_t key_len;
|
||
|
||
/* Verify according to 802.11, Section 11.6.6.5 */
|
||
VERIFY_PTK_COMMON(ek);
|
||
|
||
if (ek->install)
|
||
return false;
|
||
|
||
if (ek->key_ack)
|
||
return false;
|
||
|
||
if (!ek->key_mic)
|
||
return false;
|
||
|
||
if (ek->secure != !is_wpa)
|
||
return false;
|
||
|
||
if (ek->encrypted_key_data)
|
||
return false;
|
||
|
||
if (ek->wpa_key_id)
|
||
return false;
|
||
|
||
if (ek->request)
|
||
return false;
|
||
|
||
key_len = L_BE16_TO_CPU(ek->key_length);
|
||
if (key_len != 0)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->key_nonce);
|
||
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
||
VERIFY_IS_ZERO(ek->key_rsc);
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
|
||
return true;
|
||
}
|
||
|
||
#define VERIFY_GTK_COMMON(ek) \
|
||
if (ek->key_type) \
|
||
return false; \
|
||
if (ek->smk_message) \
|
||
return false; \
|
||
if (ek->request) \
|
||
return false; \
|
||
if (ek->error) \
|
||
return false; \
|
||
if (ek->install) \
|
||
return false \
|
||
|
||
bool eapol_verify_gtk_1_of_2(const struct eapol_key *ek, bool is_wpa)
|
||
{
|
||
uint16_t key_len;
|
||
|
||
VERIFY_GTK_COMMON(ek);
|
||
|
||
if (!ek->key_ack)
|
||
return false;
|
||
|
||
if (!ek->key_mic)
|
||
return false;
|
||
|
||
if (!ek->secure)
|
||
return false;
|
||
|
||
/* Must be encrypted when GTK is present but reserved in WPA */
|
||
if (!ek->encrypted_key_data && !is_wpa)
|
||
return false;
|
||
|
||
/*
|
||
* In P802.11i/D3.0 the Key Length should be 16 for WPA but hostapd
|
||
* uses 16 for CCMP and 32 for TKIP. Since 802.11i-2004 there's
|
||
* inconsistency in the required value, for example 0 is clearly
|
||
* specified in 802.11-2012 11.6.7.2 but 11.6.2 doesn't list 0 and
|
||
* makes the value depend on the pairwise key type.
|
||
*/
|
||
key_len = L_BE16_TO_CPU(ek->key_length);
|
||
if (key_len != 0 && key_len != 16 && key_len != 32)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
|
||
/*
|
||
* WPA_80211_v3_1, Section 2.2.4:
|
||
* "Key Index (bits 4 and 5): specifies the key id of the temporal
|
||
* key of the key derived from the message. The value of this shall be
|
||
* zero (0) if the value of Key Type (bit 4) is Pairwise (1). The Key
|
||
* Type and Key Index shall not both be 0 in the same message.
|
||
*
|
||
* Group keys shall not use key id 0. This means that key ids 1 to 3
|
||
* are available to be used to identify Group keys. This document
|
||
* recommends that implementations reserve key ids 1 and 2 for Group
|
||
* Keys, and that key id 3 is not used.
|
||
*/
|
||
if (is_wpa && !ek->wpa_key_id)
|
||
return false;
|
||
|
||
return true;
|
||
}
|
||
|
||
bool eapol_verify_gtk_2_of_2(const struct eapol_key *ek, bool is_wpa)
|
||
{
|
||
uint16_t key_len;
|
||
|
||
/* Verify according to 802.11, Section 11.6.7.3 */
|
||
VERIFY_GTK_COMMON(ek);
|
||
|
||
if (ek->key_ack)
|
||
return false;
|
||
|
||
if (!ek->key_mic)
|
||
return false;
|
||
|
||
if (!ek->secure)
|
||
return false;
|
||
|
||
if (ek->encrypted_key_data)
|
||
return false;
|
||
|
||
key_len = L_BE16_TO_CPU(ek->key_length);
|
||
if (key_len != 0)
|
||
return false;
|
||
|
||
VERIFY_IS_ZERO(ek->key_nonce);
|
||
VERIFY_IS_ZERO(ek->eapol_key_iv);
|
||
VERIFY_IS_ZERO(ek->key_rsc);
|
||
VERIFY_IS_ZERO(ek->reserved);
|
||
|
||
return true;
|
||
}
|
||
|
||
static struct eapol_key *eapol_create_common(
|
||
enum eapol_protocol_version protocol,
|
||
enum eapol_key_descriptor_version version,
|
||
bool secure,
|
||
uint64_t key_replay_counter,
|
||
const uint8_t snonce[],
|
||
size_t extra_len,
|
||
const uint8_t *extra_data,
|
||
int key_type,
|
||
bool is_wpa)
|
||
{
|
||
size_t to_alloc = sizeof(struct eapol_key);
|
||
struct eapol_key *out_frame = l_malloc(to_alloc + extra_len);
|
||
|
||
memset(out_frame, 0, to_alloc + extra_len);
|
||
|
||
out_frame->header.protocol_version = protocol;
|
||
out_frame->header.packet_type = 0x3;
|
||
out_frame->header.packet_len = L_CPU_TO_BE16(to_alloc + extra_len - 4);
|
||
out_frame->descriptor_type = is_wpa ? EAPOL_DESCRIPTOR_TYPE_WPA :
|
||
EAPOL_DESCRIPTOR_TYPE_80211;
|
||
out_frame->key_descriptor_version = version;
|
||
out_frame->key_type = key_type;
|
||
out_frame->install = false;
|
||
out_frame->key_ack = false;
|
||
out_frame->key_mic = true;
|
||
out_frame->secure = secure;
|
||
out_frame->error = false;
|
||
out_frame->request = false;
|
||
out_frame->encrypted_key_data = false;
|
||
out_frame->smk_message = false;
|
||
out_frame->key_length = 0;
|
||
out_frame->key_replay_counter = L_CPU_TO_BE64(key_replay_counter);
|
||
memcpy(out_frame->key_nonce, snonce, sizeof(out_frame->key_nonce));
|
||
out_frame->key_data_len = L_CPU_TO_BE16(extra_len);
|
||
memcpy(out_frame->key_data, extra_data, extra_len);
|
||
|
||
return out_frame;
|
||
}
|
||
|
||
struct eapol_key *eapol_create_ptk_2_of_4(
|
||
enum eapol_protocol_version protocol,
|
||
enum eapol_key_descriptor_version version,
|
||
uint64_t key_replay_counter,
|
||
const uint8_t snonce[],
|
||
size_t extra_len,
|
||
const uint8_t *extra_data,
|
||
bool is_wpa)
|
||
{
|
||
return eapol_create_common(protocol, version, false, key_replay_counter,
|
||
snonce, extra_len, extra_data, 1,
|
||
is_wpa);
|
||
}
|
||
|
||
struct eapol_key *eapol_create_ptk_4_of_4(
|
||
enum eapol_protocol_version protocol,
|
||
enum eapol_key_descriptor_version version,
|
||
uint64_t key_replay_counter,
|
||
bool is_wpa)
|
||
{
|
||
uint8_t snonce[32];
|
||
|
||
memset(snonce, 0, sizeof(snonce));
|
||
return eapol_create_common(protocol, version,
|
||
is_wpa ? false : true,
|
||
key_replay_counter, snonce, 0, NULL,
|
||
1, is_wpa);
|
||
}
|
||
|
||
struct eapol_key *eapol_create_gtk_2_of_2(
|
||
enum eapol_protocol_version protocol,
|
||
enum eapol_key_descriptor_version version,
|
||
uint64_t key_replay_counter,
|
||
bool is_wpa, uint8_t wpa_key_id)
|
||
{
|
||
uint8_t snonce[32];
|
||
struct eapol_key *step2;
|
||
|
||
memset(snonce, 0, sizeof(snonce));
|
||
step2 = eapol_create_common(protocol, version, true,
|
||
key_replay_counter, snonce, 0, NULL,
|
||
0, is_wpa);
|
||
|
||
if (!step2)
|
||
return step2;
|
||
|
||
/*
|
||
* WPA_80211_v3_1, Section 2.2.4:
|
||
* "The Key Type and Key Index shall not both be 0 in the same message"
|
||
*
|
||
* The above means that even though sending the key index back to the
|
||
* AP has no practical value, we must still do so.
|
||
*/
|
||
if (is_wpa)
|
||
step2->wpa_key_id = wpa_key_id;
|
||
|
||
return step2;
|
||
}
|
||
|
||
struct eapol_frame_watch {
|
||
uint32_t ifindex;
|
||
struct watchlist_item super;
|
||
};
|
||
|
||
static void eapol_frame_watch_free(struct watchlist_item *item)
|
||
{
|
||
struct eapol_frame_watch *efw =
|
||
container_of(item, struct eapol_frame_watch, super);
|
||
|
||
l_free(efw);
|
||
}
|
||
|
||
static const struct watchlist_ops eapol_frame_watch_ops = {
|
||
.item_free = eapol_frame_watch_free,
|
||
};
|
||
|
||
static int32_t eapol_frame_watch_add(uint32_t ifindex,
|
||
eapol_frame_watch_func_t handler,
|
||
void *user_data)
|
||
{
|
||
struct eapol_frame_watch *efw;
|
||
|
||
efw = l_new(struct eapol_frame_watch, 1);
|
||
efw->ifindex = ifindex;
|
||
|
||
return watchlist_link(&frame_watches, &efw->super,
|
||
handler, user_data, NULL);
|
||
}
|
||
|
||
static bool eapol_frame_watch_remove(uint32_t id)
|
||
{
|
||
return watchlist_remove(&frame_watches, id);
|
||
}
|
||
|
||
struct eapol_sm {
|
||
struct handshake_state *handshake;
|
||
enum eapol_protocol_version protocol_version;
|
||
uint64_t replay_counter;
|
||
eapol_sm_event_func_t event_func;
|
||
void *user_data;
|
||
struct l_timeout *timeout;
|
||
struct l_timeout *eapol_start_timeout;
|
||
unsigned int frame_retry;
|
||
uint16_t listen_interval;
|
||
bool have_replay:1;
|
||
bool started:1;
|
||
bool use_eapol_start:1;
|
||
bool require_handshake:1;
|
||
bool eap_exchanged:1;
|
||
struct eap_state *eap;
|
||
struct eapol_frame *early_frame;
|
||
uint32_t watch_id;
|
||
uint8_t installed_gtk_len;
|
||
uint8_t installed_gtk[CRYPTO_MAX_GTK_LEN];
|
||
uint8_t installed_igtk_len;
|
||
uint8_t installed_igtk[CRYPTO_MAX_IGTK_LEN];
|
||
};
|
||
|
||
static void eapol_sm_destroy(void *value)
|
||
{
|
||
struct eapol_sm *sm = value;
|
||
|
||
l_timeout_remove(sm->timeout);
|
||
l_timeout_remove(sm->eapol_start_timeout);
|
||
|
||
if (sm->eap)
|
||
eap_free(sm->eap);
|
||
|
||
l_free(sm->early_frame);
|
||
|
||
eapol_frame_watch_remove(sm->watch_id);
|
||
|
||
sm->installed_gtk_len = 0;
|
||
memset(sm->installed_gtk, 0, sizeof(sm->installed_gtk));
|
||
sm->installed_igtk_len = 0;
|
||
memset(sm->installed_igtk, 0, sizeof(sm->installed_igtk));
|
||
|
||
l_free(sm);
|
||
|
||
l_queue_remove(state_machines, sm);
|
||
}
|
||
|
||
struct eapol_sm *eapol_sm_new(struct handshake_state *hs)
|
||
{
|
||
struct eapol_sm *sm;
|
||
|
||
sm = l_new(struct eapol_sm, 1);
|
||
|
||
sm->handshake = hs;
|
||
|
||
if (hs->settings_8021x)
|
||
sm->use_eapol_start = true;
|
||
|
||
sm->require_handshake = true;
|
||
|
||
return sm;
|
||
}
|
||
|
||
void eapol_sm_free(struct eapol_sm *sm)
|
||
{
|
||
eapol_sm_destroy(sm);
|
||
}
|
||
|
||
void eapol_sm_set_protocol_version(struct eapol_sm *sm,
|
||
enum eapol_protocol_version protocol_version)
|
||
{
|
||
sm->protocol_version = protocol_version;
|
||
}
|
||
|
||
void eapol_sm_set_listen_interval(struct eapol_sm *sm, uint16_t interval)
|
||
{
|
||
sm->listen_interval = interval;
|
||
}
|
||
|
||
void eapol_sm_set_user_data(struct eapol_sm *sm, void *user_data)
|
||
{
|
||
sm->user_data = user_data;
|
||
}
|
||
|
||
void eapol_sm_set_event_func(struct eapol_sm *sm, eapol_sm_event_func_t func)
|
||
{
|
||
sm->event_func = func;
|
||
}
|
||
|
||
static void eapol_sm_write(struct eapol_sm *sm, const struct eapol_frame *ef,
|
||
bool noencrypt)
|
||
{
|
||
__eapol_tx_packet(sm->handshake->ifindex, sm->handshake->aa, ETH_P_PAE,
|
||
ef, noencrypt);
|
||
}
|
||
|
||
static inline void handshake_failed(struct eapol_sm *sm, uint16_t reason_code)
|
||
{
|
||
handshake_event(sm->handshake, HANDSHAKE_EVENT_FAILED, &reason_code);
|
||
|
||
eapol_sm_free(sm);
|
||
}
|
||
|
||
static void eapol_timeout(struct l_timeout *timeout, void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
l_timeout_remove(sm->timeout);
|
||
sm->timeout = NULL;
|
||
|
||
handshake_failed(sm, MMPDU_REASON_CODE_4WAY_HANDSHAKE_TIMEOUT);
|
||
}
|
||
|
||
static void eapol_install_gtk(struct eapol_sm *sm, uint8_t gtk_key_index,
|
||
const uint8_t *gtk, size_t gtk_len,
|
||
const uint8_t *rsc)
|
||
{
|
||
/*
|
||
* Don't install the same GTK. On older kernels this resets the
|
||
* replay counters, etc and can lead to various attacks
|
||
*/
|
||
if (sm->installed_gtk_len == gtk_len &&
|
||
!memcmp(sm->installed_gtk, gtk, gtk_len))
|
||
return;
|
||
|
||
handshake_state_install_gtk(sm->handshake, gtk_key_index,
|
||
gtk, gtk_len, rsc, 6);
|
||
memcpy(sm->installed_gtk, gtk, gtk_len);
|
||
sm->installed_gtk_len = gtk_len;
|
||
}
|
||
|
||
static void eapol_install_igtk(struct eapol_sm *sm, uint8_t igtk_key_index,
|
||
const uint8_t *igtk, size_t igtk_len)
|
||
{
|
||
/*
|
||
* Don't install the same IGTK. On older kernels this resets the
|
||
* replay counters, etc and can lead to various attacks
|
||
*/
|
||
if (sm->installed_igtk_len == igtk_len - 6 &&
|
||
!memcmp(sm->installed_igtk, igtk + 6, igtk_len - 6))
|
||
return;
|
||
|
||
handshake_state_install_igtk(sm->handshake, igtk_key_index,
|
||
igtk + 6, igtk_len - 6, igtk);
|
||
memcpy(sm->installed_igtk, igtk + 6, igtk_len - 6);
|
||
sm->installed_igtk_len = igtk_len - 6;
|
||
}
|
||
|
||
static void send_eapol_start(struct l_timeout *timeout, void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
uint8_t buf[sizeof(struct eapol_frame)];
|
||
struct eapol_frame *frame = (struct eapol_frame *) buf;
|
||
|
||
handshake_event(sm->handshake, HANDSHAKE_EVENT_STARTED, NULL);
|
||
|
||
l_timeout_remove(sm->eapol_start_timeout);
|
||
sm->eapol_start_timeout = NULL;
|
||
|
||
if (!sm->protocol_version)
|
||
sm->protocol_version = EAPOL_PROTOCOL_VERSION_2001;
|
||
|
||
frame->header.protocol_version = sm->protocol_version;
|
||
frame->header.packet_type = 1;
|
||
l_put_be16(0, &frame->header.packet_len);
|
||
|
||
eapol_sm_write(sm, frame, false);
|
||
}
|
||
|
||
static void eapol_set_key_timeout(struct eapol_sm *sm,
|
||
l_timeout_notify_cb_t cb)
|
||
{
|
||
/*
|
||
* 802.11-2016 12.7.6.6: "The retransmit timeout value shall be
|
||
* 100 ms for the first timeout, half the listen interval for the
|
||
* second timeout, and the listen interval for subsequent timeouts.
|
||
* If there is no listen interval or the listen interval is zero,
|
||
* then 100 ms shall be used for all timeout values."
|
||
*/
|
||
unsigned int timeout_ms = 100;
|
||
unsigned int beacon_us = 100 * 1024;
|
||
|
||
sm->frame_retry++;
|
||
|
||
if (sm->frame_retry == 2 &&
|
||
sm->listen_interval != 0)
|
||
timeout_ms = sm->listen_interval * beacon_us / 2000;
|
||
else if (sm->frame_retry > 2 &&
|
||
sm->listen_interval != 0)
|
||
timeout_ms = sm->listen_interval * beacon_us / 1000;
|
||
|
||
if (sm->frame_retry > 1)
|
||
l_timeout_modify_ms(sm->timeout, timeout_ms);
|
||
else {
|
||
if (sm->timeout)
|
||
l_timeout_remove(sm->timeout);
|
||
|
||
sm->timeout = l_timeout_create_ms(timeout_ms, cb, sm,
|
||
NULL);
|
||
}
|
||
}
|
||
|
||
/* 802.11-2016 Section 12.7.6.2 */
|
||
static void eapol_send_ptk_1_of_4(struct eapol_sm *sm)
|
||
{
|
||
uint32_t ifindex = sm->handshake->ifindex;
|
||
const uint8_t *aa = sm->handshake->aa;
|
||
uint8_t frame_buf[512];
|
||
struct eapol_key *ek = (struct eapol_key *) frame_buf;
|
||
enum crypto_cipher cipher = ie_rsn_cipher_suite_to_cipher(
|
||
sm->handshake->pairwise_cipher);
|
||
uint8_t pmkid[16];
|
||
|
||
handshake_state_new_anonce(sm->handshake);
|
||
|
||
sm->handshake->ptk_complete = false;
|
||
|
||
sm->replay_counter++;
|
||
|
||
memset(ek, 0, sizeof(struct eapol_key));
|
||
ek->header.protocol_version = sm->protocol_version;
|
||
ek->header.packet_type = 0x3;
|
||
ek->descriptor_type = EAPOL_DESCRIPTOR_TYPE_80211;
|
||
/* Must be HMAC-SHA1-128 + AES when using CCMP with PSK or 8021X */
|
||
ek->key_descriptor_version = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES;
|
||
ek->key_type = true;
|
||
ek->key_ack = true;
|
||
ek->key_length = L_CPU_TO_BE16(crypto_cipher_key_len(cipher));
|
||
ek->key_replay_counter = L_CPU_TO_BE64(sm->replay_counter);
|
||
memcpy(ek->key_nonce, sm->handshake->anonce, sizeof(ek->key_nonce));
|
||
|
||
/* Write the PMKID KDE into Key Data field unencrypted */
|
||
crypto_derive_pmkid(sm->handshake->pmk, sm->handshake->spa, aa,
|
||
pmkid, false);
|
||
eapol_key_data_append(ek, HANDSHAKE_KDE_PMKID, pmkid, 16);
|
||
|
||
ek->header.packet_len = L_CPU_TO_BE16(sizeof(struct eapol_key) +
|
||
L_BE16_TO_CPU(ek->key_data_len) - 4);
|
||
|
||
l_debug("STA: "MAC" retries=%u", MAC_STR(sm->handshake->spa),
|
||
sm->frame_retry);
|
||
|
||
__eapol_tx_packet(ifindex, sm->handshake->spa, ETH_P_PAE,
|
||
(struct eapol_frame *) ek, false);
|
||
}
|
||
|
||
static void eapol_ptk_1_of_4_retry(struct l_timeout *timeout, void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
if (sm->frame_retry >= 3) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_4WAY_HANDSHAKE_TIMEOUT);
|
||
return;
|
||
}
|
||
|
||
eapol_send_ptk_1_of_4(sm);
|
||
|
||
eapol_set_key_timeout(sm, eapol_ptk_1_of_4_retry);
|
||
}
|
||
|
||
static void eapol_handle_ptk_1_of_4(struct eapol_sm *sm,
|
||
const struct eapol_key *ek)
|
||
{
|
||
const struct crypto_ptk *ptk;
|
||
struct eapol_key *step2;
|
||
uint8_t mic[16];
|
||
uint8_t *ies;
|
||
size_t ies_len;
|
||
const uint8_t *own_ie = sm->handshake->supplicant_ie;
|
||
const uint8_t *pmkid;
|
||
struct ie_rsn_info rsn_info;
|
||
|
||
l_debug("ifindex=%u", sm->handshake->ifindex);
|
||
|
||
if (!eapol_verify_ptk_1_of_4(ek))
|
||
goto error_unspecified;
|
||
|
||
pmkid = handshake_util_find_pmkid_kde(ek->key_data,
|
||
L_BE16_TO_CPU(ek->key_data_len));
|
||
|
||
ie_parse_rsne_from_data(own_ie, own_ie[1] + 2, &rsn_info);
|
||
|
||
/*
|
||
* Require the PMKID KDE whenever we've sent a list of PMKIDs in
|
||
* our RSNE and we've haven't seen any EAPOL-EAP frame since
|
||
* (sm->eap_exchanged is false), otherwise treat it as optional and
|
||
* only validate it against our PMK. Some 802.11-2012 sections
|
||
* show message 1/4 without a PMKID KDE and there are APs that
|
||
* send no PMKID KDE.
|
||
*/
|
||
if (!sm->eap_exchanged && !sm->handshake->wpa_ie &&
|
||
rsn_info.num_pmkids) {
|
||
bool found = false;
|
||
int i;
|
||
|
||
if (!pmkid)
|
||
goto error_unspecified;
|
||
|
||
for (i = 0; i < rsn_info.num_pmkids; i++)
|
||
if (!memcmp(rsn_info.pmkids + i * 16, pmkid, 16)) {
|
||
found = true;
|
||
break;
|
||
}
|
||
|
||
if (!found)
|
||
goto error_unspecified;
|
||
} else if (pmkid) {
|
||
uint8_t own_pmkid[16];
|
||
|
||
if (handshake_state_get_pmkid(sm->handshake, own_pmkid) &&
|
||
memcmp(pmkid, own_pmkid, 16)) {
|
||
l_debug("Authenticator sent a PMKID that didn't match");
|
||
|
||
/*
|
||
* If the AP has a different PMKSA from ours and we
|
||
* have means to create a new PMKSA through EAP then
|
||
* try that, otherwise give up.
|
||
*/
|
||
if (sm->eap) {
|
||
send_eapol_start(NULL, sm);
|
||
return;
|
||
}
|
||
|
||
/*
|
||
* Some APs are known to send a PMKID KDE with all
|
||
* zeros for the PMKID. Likely we can still
|
||
* successfully negotiate a handshake, so ignore this
|
||
* for now and treat it as if the PMKID KDE was not
|
||
* included
|
||
*/
|
||
if (util_mem_is_zero(pmkid, 16))
|
||
l_debug("PMKID is all zero, ignoring");
|
||
else
|
||
goto error_unspecified;
|
||
}
|
||
}
|
||
|
||
/*
|
||
* If we're in a state where we have successfully processed Message 3,
|
||
* then assume that the new message 1 is a PTK rekey and start a new
|
||
* handshake
|
||
*/
|
||
if (!sm->handshake->have_snonce ||
|
||
memcmp(sm->handshake->anonce,
|
||
ek->key_nonce, sizeof(ek->key_nonce)) ||
|
||
sm->handshake->ptk_complete) {
|
||
handshake_state_new_snonce(sm->handshake);
|
||
handshake_state_set_anonce(sm->handshake, ek->key_nonce);
|
||
|
||
if (!handshake_state_derive_ptk(sm->handshake))
|
||
goto error_unspecified;
|
||
}
|
||
|
||
if (sm->handshake->akm_suite &
|
||
(IE_RSN_AKM_SUITE_FT_OVER_8021X |
|
||
IE_RSN_AKM_SUITE_FT_USING_PSK |
|
||
IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256)) {
|
||
const uint8_t *mde = sm->handshake->mde;
|
||
const uint8_t *fte = sm->handshake->fte;
|
||
|
||
/*
|
||
* Rebuild the RSNE to include the PMKR1Name and append
|
||
* MDE + FTE.
|
||
*/
|
||
ies = alloca(512);
|
||
|
||
rsn_info.num_pmkids = 1;
|
||
rsn_info.pmkids = sm->handshake->pmk_r1_name;
|
||
|
||
ie_build_rsne(&rsn_info, ies);
|
||
ies_len = ies[1] + 2;
|
||
|
||
memcpy(ies + ies_len, mde, mde[1] + 2);
|
||
ies_len += mde[1] + 2;
|
||
|
||
memcpy(ies + ies_len, fte, fte[1] + 2);
|
||
ies_len += fte[1] + 2;
|
||
} else {
|
||
ies_len = own_ie[1] + 2;
|
||
ies = (uint8_t *) own_ie;
|
||
}
|
||
|
||
step2 = eapol_create_ptk_2_of_4(sm->protocol_version,
|
||
ek->key_descriptor_version,
|
||
L_BE64_TO_CPU(ek->key_replay_counter),
|
||
sm->handshake->snonce, ies_len, ies,
|
||
sm->handshake->wpa_ie);
|
||
|
||
ptk = handshake_state_get_ptk(sm->handshake);
|
||
|
||
if (!eapol_calculate_mic(sm->handshake->akm_suite, ptk->kck,
|
||
step2, mic)) {
|
||
l_info("MIC calculation failed. "
|
||
"Ensure Kernel Crypto is available.");
|
||
l_free(step2);
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
|
||
return;
|
||
}
|
||
|
||
memcpy(step2->key_mic_data, mic, sizeof(mic));
|
||
eapol_sm_write(sm, (struct eapol_frame *) step2, false);
|
||
l_free(step2);
|
||
|
||
l_timeout_remove(sm->eapol_start_timeout);
|
||
sm->eapol_start_timeout = NULL;
|
||
|
||
return;
|
||
|
||
error_unspecified:
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
}
|
||
|
||
#define EAPOL_PAIRWISE_UPDATE_COUNT 3
|
||
|
||
/* 802.11-2016 Section 12.7.6.4 */
|
||
static void eapol_send_ptk_3_of_4(struct eapol_sm *sm)
|
||
{
|
||
uint32_t ifindex = sm->handshake->ifindex;
|
||
uint8_t frame_buf[512];
|
||
uint8_t key_data_buf[128];
|
||
struct eapol_key *ek = (struct eapol_key *) frame_buf;
|
||
size_t key_data_len;
|
||
enum crypto_cipher cipher = ie_rsn_cipher_suite_to_cipher(
|
||
sm->handshake->pairwise_cipher);
|
||
enum crypto_cipher group_cipher = ie_rsn_cipher_suite_to_cipher(
|
||
sm->handshake->group_cipher);
|
||
const struct crypto_ptk *ptk = (struct crypto_ptk *) sm->handshake->ptk;
|
||
struct ie_rsn_info rsn;
|
||
uint8_t *rsne;
|
||
|
||
sm->replay_counter++;
|
||
|
||
memset(ek, 0, sizeof(struct eapol_key));
|
||
ek->header.protocol_version = sm->protocol_version;
|
||
ek->header.packet_type = 0x3;
|
||
ek->descriptor_type = EAPOL_DESCRIPTOR_TYPE_80211;
|
||
/* Must be HMAC-SHA1-128 + AES when using CCMP with PSK or 8021X */
|
||
ek->key_descriptor_version = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES;
|
||
ek->key_type = true;
|
||
ek->install = true;
|
||
ek->key_ack = true;
|
||
ek->key_mic = true;
|
||
ek->secure = true;
|
||
ek->encrypted_key_data = true;
|
||
ek->key_length = L_CPU_TO_BE16(crypto_cipher_key_len(cipher));
|
||
ek->key_replay_counter = L_CPU_TO_BE64(sm->replay_counter);
|
||
memcpy(ek->key_nonce, sm->handshake->anonce, sizeof(ek->key_nonce));
|
||
memcpy(ek->key_rsc, sm->handshake->gtk_rsc, 6);
|
||
ek->key_rsc[6] = 0;
|
||
ek->key_rsc[7] = 0;
|
||
|
||
/*
|
||
* Just one RSNE in Key Data as we only set one cipher in ap->ciphers
|
||
* currently.
|
||
*/
|
||
|
||
memset(&rsn, 0, sizeof(rsn));
|
||
rsn.akm_suites = IE_RSN_AKM_SUITE_PSK;
|
||
rsn.pairwise_ciphers = sm->handshake->pairwise_cipher;
|
||
rsn.group_cipher = sm->handshake->group_cipher;
|
||
|
||
rsne = key_data_buf;
|
||
if (!ie_build_rsne(&rsn, rsne))
|
||
return;
|
||
|
||
key_data_len = rsne[1] + 2;
|
||
|
||
if (group_cipher) {
|
||
uint8_t *gtk_kde = key_data_buf + key_data_len;
|
||
|
||
handshake_util_build_gtk_kde(group_cipher,
|
||
sm->handshake->gtk,
|
||
sm->handshake->gtk_index,
|
||
gtk_kde);
|
||
key_data_len += gtk_kde[1] + 2;
|
||
}
|
||
|
||
if (!eapol_encrypt_key_data(ptk->kek, key_data_buf,
|
||
key_data_len, ek))
|
||
return;
|
||
|
||
key_data_len = L_BE16_TO_CPU(ek->key_data_len);
|
||
ek->header.packet_len = L_CPU_TO_BE16(sizeof(struct eapol_key) +
|
||
key_data_len - 4);
|
||
|
||
if (!eapol_calculate_mic(sm->handshake->akm_suite, ptk->kck, ek,
|
||
ek->key_mic_data))
|
||
return;
|
||
|
||
l_debug("STA: "MAC" retries=%u", MAC_STR(sm->handshake->spa),
|
||
sm->frame_retry);
|
||
|
||
__eapol_tx_packet(ifindex, sm->handshake->spa, ETH_P_PAE,
|
||
(struct eapol_frame *) ek, false);
|
||
}
|
||
|
||
static void eapol_ptk_3_of_4_retry(struct l_timeout *timeout,
|
||
void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
if (sm->frame_retry >= EAPOL_PAIRWISE_UPDATE_COUNT) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_4WAY_HANDSHAKE_TIMEOUT);
|
||
return;
|
||
}
|
||
|
||
eapol_send_ptk_3_of_4(sm);
|
||
|
||
eapol_set_key_timeout(sm, eapol_ptk_3_of_4_retry);
|
||
|
||
l_debug("attempt %i", sm->frame_retry);
|
||
}
|
||
|
||
static const uint8_t *eapol_find_rsne(const uint8_t *data, size_t data_len,
|
||
const uint8_t **optional)
|
||
{
|
||
struct ie_tlv_iter iter;
|
||
const uint8_t *first = NULL;
|
||
|
||
ie_tlv_iter_init(&iter, data, data_len);
|
||
|
||
while (ie_tlv_iter_next(&iter)) {
|
||
if (ie_tlv_iter_get_tag(&iter) != IE_TYPE_RSN)
|
||
continue;
|
||
|
||
if (!first) {
|
||
first = ie_tlv_iter_get_data(&iter) - 2;
|
||
continue;
|
||
}
|
||
|
||
if (optional)
|
||
*optional = ie_tlv_iter_get_data(&iter) - 2;
|
||
|
||
return first;
|
||
}
|
||
|
||
return first;
|
||
}
|
||
|
||
/* 802.11-2016 Section 12.7.6.3 */
|
||
static void eapol_handle_ptk_2_of_4(struct eapol_sm *sm,
|
||
const struct eapol_key *ek)
|
||
{
|
||
const uint8_t *rsne;
|
||
enum crypto_cipher cipher;
|
||
size_t ptk_size;
|
||
uint8_t ptk_buf[64];
|
||
struct crypto_ptk *ptk = (struct crypto_ptk *) ptk_buf;
|
||
const uint8_t *aa = sm->handshake->aa;
|
||
|
||
l_debug("ifindex=%u", sm->handshake->ifindex);
|
||
|
||
if (!eapol_verify_ptk_2_of_4(ek))
|
||
return;
|
||
|
||
if (L_BE64_TO_CPU(ek->key_replay_counter) != sm->replay_counter)
|
||
return;
|
||
|
||
cipher = ie_rsn_cipher_suite_to_cipher(sm->handshake->pairwise_cipher);
|
||
ptk_size = sizeof(struct crypto_ptk) + crypto_cipher_key_len(cipher);
|
||
|
||
if (!crypto_derive_pairwise_ptk(sm->handshake->pmk, sm->handshake->spa,
|
||
aa, sm->handshake->anonce,
|
||
ek->key_nonce, ptk, ptk_size, false))
|
||
return;
|
||
|
||
if (!eapol_verify_mic(sm->handshake->akm_suite, ptk->kck, ek))
|
||
return;
|
||
|
||
/*
|
||
* 12.7.6.3 b) 2) "the Authenticator checks that the RSNE bitwise
|
||
* matches that from the (Re)Association Request frame.
|
||
*/
|
||
rsne = eapol_find_rsne(ek->key_data,
|
||
L_BE16_TO_CPU(ek->key_data_len), NULL);
|
||
if (!rsne || rsne[1] != sm->handshake->supplicant_ie[1] ||
|
||
memcmp(rsne + 2, sm->handshake->supplicant_ie + 2,
|
||
rsne[1])) {
|
||
|
||
handshake_failed(sm, MMPDU_REASON_CODE_IE_DIFFERENT);
|
||
return;
|
||
}
|
||
|
||
memcpy(sm->handshake->ptk, ptk_buf, ptk_size);
|
||
memcpy(sm->handshake->snonce, ek->key_nonce,
|
||
sizeof(sm->handshake->snonce));
|
||
sm->handshake->have_snonce = true;
|
||
sm->handshake->ptk_complete = true;
|
||
|
||
sm->frame_retry = 0;
|
||
|
||
eapol_ptk_3_of_4_retry(NULL, sm);
|
||
}
|
||
|
||
static const uint8_t *eapol_find_wpa_ie(const uint8_t *data, size_t data_len)
|
||
{
|
||
struct ie_tlv_iter iter;
|
||
|
||
ie_tlv_iter_init(&iter, data, data_len);
|
||
|
||
while (ie_tlv_iter_next(&iter)) {
|
||
if (ie_tlv_iter_get_tag(&iter) != IE_TYPE_VENDOR_SPECIFIC)
|
||
continue;
|
||
|
||
if (is_ie_wpa_ie(ie_tlv_iter_get_data(&iter),
|
||
ie_tlv_iter_get_length(&iter)))
|
||
return ie_tlv_iter_get_data(&iter) - 2;
|
||
}
|
||
|
||
return NULL;
|
||
}
|
||
|
||
static void eapol_handle_ptk_3_of_4(struct eapol_sm *sm,
|
||
const struct eapol_key *ek,
|
||
const uint8_t *decrypted_key_data,
|
||
size_t decrypted_key_data_size)
|
||
{
|
||
const struct crypto_ptk *ptk;
|
||
struct eapol_key *step4;
|
||
uint8_t mic[16];
|
||
const uint8_t *gtk = NULL;
|
||
size_t gtk_len;
|
||
const uint8_t *igtk = NULL;
|
||
size_t igtk_len;
|
||
const uint8_t *rsne;
|
||
const uint8_t *optional_rsne = NULL;
|
||
uint8_t gtk_key_index;
|
||
uint8_t igtk_key_index;
|
||
|
||
l_debug("ifindex=%u", sm->handshake->ifindex);
|
||
|
||
if (!eapol_verify_ptk_3_of_4(ek, sm->handshake->wpa_ie)) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
/*
|
||
* 802.11-2016, Section 12.7.6.4:
|
||
* "On reception of message 3, the Supplicant silently discards the
|
||
* message if the Key Replay Counter field value has already been used
|
||
* or if the ANonce value in message 3 differs from the ANonce value
|
||
* in message 1."
|
||
*/
|
||
if (memcmp(sm->handshake->anonce, ek->key_nonce, sizeof(ek->key_nonce)))
|
||
return;
|
||
|
||
/*
|
||
* 11.6.6.4: "Verifies the RSNE. If it is part of a Fast BSS Transition
|
||
* Initial Mobility Domain Association, see 12.4.2. Otherwise, if it is
|
||
* not identical to that the STA received in the Beacon or Probe
|
||
* Response frame, the STA shall disassociate.
|
||
*/
|
||
if (!sm->handshake->wpa_ie)
|
||
rsne = eapol_find_rsne(decrypted_key_data,
|
||
decrypted_key_data_size,
|
||
&optional_rsne);
|
||
else
|
||
rsne = eapol_find_wpa_ie(decrypted_key_data,
|
||
decrypted_key_data_size);
|
||
|
||
if (!rsne)
|
||
goto error_ie_different;
|
||
|
||
if (!handshake_util_ap_ie_matches(rsne, sm->handshake->authenticator_ie,
|
||
sm->handshake->wpa_ie))
|
||
goto error_ie_different;
|
||
|
||
if (sm->handshake->akm_suite &
|
||
(IE_RSN_AKM_SUITE_FT_OVER_8021X |
|
||
IE_RSN_AKM_SUITE_FT_USING_PSK |
|
||
IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256)) {
|
||
struct ie_tlv_iter iter;
|
||
struct ie_rsn_info ie_info;
|
||
const uint8_t *mde = sm->handshake->mde;
|
||
const uint8_t *fte = sm->handshake->fte;
|
||
|
||
ie_parse_rsne_from_data(rsne, rsne[1] + 2, &ie_info);
|
||
|
||
if (ie_info.num_pmkids != 1 || memcmp(ie_info.pmkids,
|
||
sm->handshake->pmk_r1_name, 16))
|
||
goto error_ie_different;
|
||
|
||
ie_tlv_iter_init(&iter, decrypted_key_data,
|
||
decrypted_key_data_size);
|
||
|
||
while (ie_tlv_iter_next(&iter))
|
||
switch (ie_tlv_iter_get_tag(&iter)) {
|
||
case IE_TYPE_MOBILITY_DOMAIN:
|
||
if (memcmp(ie_tlv_iter_get_data(&iter) - 2,
|
||
mde, mde[1] + 2))
|
||
goto error_ie_different;
|
||
|
||
break;
|
||
|
||
case IE_TYPE_FAST_BSS_TRANSITION:
|
||
if (memcmp(ie_tlv_iter_get_data(&iter) - 2,
|
||
fte, fte[1] + 2))
|
||
goto error_ie_different;
|
||
|
||
break;
|
||
}
|
||
}
|
||
|
||
/*
|
||
* If ptk_complete is set, then we are receiving Message 3 again.
|
||
* It must be a retransmission, otherwise the anonce wouldn't match
|
||
* and we wouldn't get here. Skip processing the rest of the message
|
||
* and send our reply. Do not install the keys again.
|
||
*/
|
||
if (sm->handshake->ptk_complete)
|
||
goto retransmit;
|
||
|
||
/*
|
||
* 11.6.6.4: "If a second RSNE is provided in the message, the
|
||
* Supplicant uses the pairwise cipher suite specified in the second
|
||
* RSNE or deauthenticates."
|
||
*/
|
||
if (optional_rsne) {
|
||
struct ie_rsn_info info1;
|
||
struct ie_rsn_info info2;
|
||
uint16_t override;
|
||
|
||
if (ie_parse_rsne_from_data(rsne, rsne[1] + 2, &info1) < 0)
|
||
goto error_ie_different;
|
||
|
||
if (ie_parse_rsne_from_data(optional_rsne, optional_rsne[1] + 2,
|
||
&info2) < 0)
|
||
goto error_ie_different;
|
||
|
||
/*
|
||
* 11.6.2:
|
||
* It may happen, for example, that a Supplicant selects a
|
||
* pairwise cipher suite which is advertised by an AP, but
|
||
* which policy disallows for this particular STA. An
|
||
* Authenticator may, therefore, insert a second RSNE to
|
||
* overrule the STA’s selection. An Authenticator’s SME shall
|
||
* insert the second RSNE, after the first RSNE, only for this
|
||
* purpose. The pairwise cipher suite in the second RSNE
|
||
* included shall be one of the ciphers advertised by the
|
||
* Authenticator. All other fields in the second RSNE shall be
|
||
* identical to the first RSNE.
|
||
*
|
||
* - Check that akm_suites and group_cipher are the same
|
||
* between rsne1 and rsne2
|
||
* - Check that pairwise_ciphers is not the same between rsne1
|
||
* and rsne2
|
||
* - Check that rsne2 pairwise_ciphers is a subset of rsne
|
||
*/
|
||
if (info1.akm_suites != info2.akm_suites ||
|
||
info1.group_cipher != info2.group_cipher)
|
||
goto error_ie_different;
|
||
|
||
override = info2.pairwise_ciphers;
|
||
|
||
if (override == info1.pairwise_ciphers ||
|
||
!(info1.pairwise_ciphers & override) ||
|
||
__builtin_popcount(override) != 1) {
|
||
handshake_failed(sm,
|
||
MMPDU_REASON_CODE_INVALID_PAIRWISE_CIPHER);
|
||
return;
|
||
}
|
||
|
||
handshake_state_override_pairwise_cipher(sm->handshake,
|
||
override);
|
||
}
|
||
|
||
if (!sm->handshake->wpa_ie && sm->handshake->group_cipher !=
|
||
IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC) {
|
||
gtk = handshake_util_find_gtk_kde(decrypted_key_data,
|
||
decrypted_key_data_size,
|
||
>k_len);
|
||
if (!gtk) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
/* TODO: Handle tx bit */
|
||
|
||
gtk_key_index = util_bit_field(gtk[0], 0, 2);
|
||
gtk += 2;
|
||
gtk_len -= 2;
|
||
} else
|
||
gtk = NULL;
|
||
|
||
if (sm->handshake->mfp) {
|
||
igtk = handshake_util_find_igtk_kde(decrypted_key_data,
|
||
decrypted_key_data_size,
|
||
&igtk_len);
|
||
if (!igtk) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
igtk_key_index = l_get_le16(igtk);;
|
||
igtk += 2;
|
||
igtk_len -= 2;
|
||
} else
|
||
igtk = NULL;
|
||
|
||
retransmit:
|
||
/*
|
||
* 802.11-2016, Section 12.7.6.4:
|
||
* "b) Verifies the message 3 MIC. If the calculated MIC does not match
|
||
* the MIC that the Authenticator included in the EAPOL-Key frame, the
|
||
* Supplicant silently discards message 3."
|
||
* "c) Updates the last-seen value of the Key Replay Counter field."
|
||
*
|
||
* Note that part b was done in eapol_key_handle
|
||
*/
|
||
sm->replay_counter = L_BE64_TO_CPU(ek->key_replay_counter);
|
||
sm->have_replay = true;
|
||
|
||
step4 = eapol_create_ptk_4_of_4(sm->protocol_version,
|
||
ek->key_descriptor_version,
|
||
sm->replay_counter,
|
||
sm->handshake->wpa_ie);
|
||
|
||
ptk = handshake_state_get_ptk(sm->handshake);
|
||
|
||
if (!eapol_calculate_mic(sm->handshake->akm_suite, ptk->kck,
|
||
step4, mic)) {
|
||
l_free(step4);
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
memcpy(step4->key_mic_data, mic, sizeof(mic));
|
||
eapol_sm_write(sm, (struct eapol_frame *) step4, false);
|
||
l_free(step4);
|
||
|
||
if (sm->handshake->ptk_complete)
|
||
return;
|
||
|
||
/*
|
||
* For WPA1 the group handshake should be happening after we set the
|
||
* ptk, this flag tells netdev to wait for the gtk/igtk before
|
||
* completing the connection.
|
||
*/
|
||
if (!gtk && sm->handshake->group_cipher !=
|
||
IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC)
|
||
sm->handshake->wait_for_gtk = true;
|
||
|
||
if (gtk)
|
||
eapol_install_gtk(sm, gtk_key_index, gtk, gtk_len, ek->key_rsc);
|
||
|
||
if (igtk)
|
||
eapol_install_igtk(sm, igtk_key_index, igtk, igtk_len);
|
||
|
||
handshake_state_install_ptk(sm->handshake);
|
||
|
||
if (rekey_offload)
|
||
rekey_offload(sm->handshake->ifindex, ptk->kek, ptk->kck,
|
||
sm->replay_counter, sm->user_data);
|
||
|
||
l_timeout_remove(sm->timeout);
|
||
sm->timeout = NULL;
|
||
|
||
return;
|
||
|
||
error_ie_different:
|
||
handshake_failed(sm, MMPDU_REASON_CODE_IE_DIFFERENT);
|
||
}
|
||
|
||
/* 802.11-2016 Section 12.7.6.5 */
|
||
static void eapol_handle_ptk_4_of_4(struct eapol_sm *sm,
|
||
const struct eapol_key *ek)
|
||
{
|
||
const struct crypto_ptk *ptk = (struct crypto_ptk *) sm->handshake->ptk;
|
||
|
||
l_debug("ifindex=%u", sm->handshake->ifindex);
|
||
|
||
if (!eapol_verify_ptk_4_of_4(ek, false))
|
||
return;
|
||
|
||
if (L_BE64_TO_CPU(ek->key_replay_counter) != sm->replay_counter)
|
||
return;
|
||
|
||
if (!eapol_verify_mic(sm->handshake->akm_suite, ptk->kck, ek))
|
||
return;
|
||
|
||
l_timeout_remove(sm->timeout);
|
||
sm->timeout = NULL;
|
||
|
||
handshake_state_install_ptk(sm->handshake);
|
||
}
|
||
|
||
static void eapol_handle_gtk_1_of_2(struct eapol_sm *sm,
|
||
const struct eapol_key *ek,
|
||
const uint8_t *decrypted_key_data,
|
||
size_t decrypted_key_data_size)
|
||
{
|
||
const struct crypto_ptk *ptk;
|
||
struct eapol_key *step2;
|
||
uint8_t mic[16];
|
||
const uint8_t *gtk;
|
||
size_t gtk_len;
|
||
uint8_t gtk_key_index;
|
||
const uint8_t *igtk;
|
||
size_t igtk_len;
|
||
uint8_t igtk_key_index;
|
||
|
||
if (!eapol_verify_gtk_1_of_2(ek, sm->handshake->wpa_ie)) {
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
if (!sm->handshake->wpa_ie) {
|
||
gtk = handshake_util_find_gtk_kde(decrypted_key_data,
|
||
decrypted_key_data_size,
|
||
>k_len);
|
||
if (!gtk)
|
||
return;
|
||
|
||
gtk_key_index = util_bit_field(gtk[0], 0, 2);
|
||
gtk += 2;
|
||
gtk_len -= 2;
|
||
} else {
|
||
gtk = decrypted_key_data;
|
||
gtk_len = decrypted_key_data_size;
|
||
|
||
if (!gtk || gtk_len < CRYPTO_MIN_GTK_LEN ||
|
||
gtk_len > CRYPTO_MAX_GTK_LEN)
|
||
return;
|
||
|
||
gtk_key_index = ek->wpa_key_id;
|
||
}
|
||
|
||
if (sm->handshake->mfp) {
|
||
igtk = handshake_util_find_igtk_kde(decrypted_key_data,
|
||
decrypted_key_data_size,
|
||
&igtk_len);
|
||
if (!igtk)
|
||
return;
|
||
|
||
igtk_key_index = l_get_le16(igtk);;
|
||
igtk += 2;
|
||
igtk_len -= 2;
|
||
} else
|
||
igtk = NULL;
|
||
|
||
/*
|
||
* 802.11-2016, Section 12.7.7.2:
|
||
* "
|
||
* a) Verifies that the Key Replay Counter field value has not yet been
|
||
* seen before, i.e., its value is strictly larger than that in any
|
||
* other EAPOL-Key frame received thus far during this session.
|
||
* b) Verifies that the MIC is valid, i.e., it uses the KCK that is
|
||
* part of the PTK to verify that there is no data integrity error.
|
||
* c) Uses the MLME-SETKEYS.request primitive to configure the temporal
|
||
* GTK and, when present, IGTK into its IEEE 802.11 MAC.
|
||
* d) Responds by creating and sending message 2 of the group key
|
||
* handshake to the Authenticator and incrementing the replay counter.
|
||
* "
|
||
* Note: steps a & b are performed in eapol_key_handle
|
||
*/
|
||
sm->replay_counter = L_BE64_TO_CPU(ek->key_replay_counter);
|
||
sm->have_replay = true;
|
||
|
||
step2 = eapol_create_gtk_2_of_2(sm->protocol_version,
|
||
ek->key_descriptor_version,
|
||
sm->replay_counter,
|
||
sm->handshake->wpa_ie, ek->wpa_key_id);
|
||
|
||
ptk = handshake_state_get_ptk(sm->handshake);
|
||
|
||
if (!eapol_calculate_mic(sm->handshake->akm_suite, ptk->kck,
|
||
step2, mic)) {
|
||
l_free(step2);
|
||
handshake_failed(sm, MMPDU_REASON_CODE_UNSPECIFIED);
|
||
return;
|
||
}
|
||
|
||
memcpy(step2->key_mic_data, mic, sizeof(mic));
|
||
eapol_sm_write(sm, (struct eapol_frame *) step2, false);
|
||
l_free(step2);
|
||
|
||
eapol_install_gtk(sm, gtk_key_index, gtk, gtk_len, ek->key_rsc);
|
||
|
||
if (igtk)
|
||
eapol_install_igtk(sm, igtk_key_index, igtk, igtk_len);
|
||
}
|
||
|
||
static struct eapol_sm *eapol_find_sm(uint32_t ifindex, const uint8_t *aa)
|
||
{
|
||
const struct l_queue_entry *entry;
|
||
struct eapol_sm *sm;
|
||
|
||
for (entry = l_queue_get_entries(state_machines); entry;
|
||
entry = entry->next) {
|
||
sm = entry->data;
|
||
|
||
if (sm->handshake->ifindex != ifindex)
|
||
continue;
|
||
|
||
if (memcmp(sm->handshake->aa, aa, ETH_ALEN))
|
||
continue;
|
||
|
||
return sm;
|
||
}
|
||
|
||
return NULL;
|
||
}
|
||
|
||
static void eapol_key_handle(struct eapol_sm *sm,
|
||
const struct eapol_frame *frame)
|
||
{
|
||
const struct eapol_key *ek;
|
||
const struct crypto_ptk *ptk;
|
||
uint8_t *decrypted_key_data = NULL;
|
||
size_t key_data_len = 0;
|
||
uint64_t replay_counter;
|
||
|
||
ek = eapol_key_validate((const uint8_t *) frame,
|
||
sizeof(struct eapol_header) +
|
||
L_BE16_TO_CPU(frame->header.packet_len));
|
||
if (!ek)
|
||
return;
|
||
|
||
/* Wrong direction */
|
||
if (!ek->key_ack)
|
||
return;
|
||
|
||
/* Further Descriptor Type check */
|
||
if (!sm->handshake->wpa_ie &&
|
||
ek->descriptor_type != EAPOL_DESCRIPTOR_TYPE_80211)
|
||
return;
|
||
else if (sm->handshake->wpa_ie &&
|
||
ek->descriptor_type != EAPOL_DESCRIPTOR_TYPE_WPA)
|
||
return;
|
||
|
||
replay_counter = L_BE64_TO_CPU(ek->key_replay_counter);
|
||
|
||
/*
|
||
* 802.11-2016, Section 12.7.2:
|
||
* "The Supplicant and Authenticator shall track the key replay counter
|
||
* per security association. The key replay counter shall be
|
||
* initialized to 0 on (re)association. The Authenticator shall
|
||
* increment the key replay counter on each successive EAPOL-Key frame."
|
||
*
|
||
* and
|
||
*
|
||
* "The Supplicant should also use the key replay counter and ignore
|
||
* EAPOL-Key frames with a Key Replay Counter field value smaller than
|
||
* or equal to any received in a valid message. The local Key Replay
|
||
* Counter field should not be updated until after the EAPOL-Key MIC is
|
||
* checked and is found to be valid. In other words, the Supplicant
|
||
* never updates the Key Replay Counter field for message 1 in the
|
||
* 4-way handshake, as it includes no MIC. This implies the Supplicant
|
||
* needs to allow for retransmission of message 1 when checking for
|
||
* the key replay counter of message 3."
|
||
*
|
||
* Note: The latter condition implies that Message 1 and Message 3
|
||
* can have the same replay counter, though other parts of the spec
|
||
* mandate that the Authenticator has to increment the replay counter
|
||
* for each frame sent. Contradictory.
|
||
*/
|
||
if (sm->have_replay && sm->replay_counter >= replay_counter)
|
||
return;
|
||
|
||
ptk = handshake_state_get_ptk(sm->handshake);
|
||
|
||
if (ek->key_mic) {
|
||
/* Haven't received step 1 yet, so no ptk */
|
||
if (!sm->handshake->have_snonce)
|
||
return;
|
||
|
||
if (!eapol_verify_mic(sm->handshake->akm_suite, ptk->kck, ek))
|
||
return;
|
||
}
|
||
|
||
if ((ek->encrypted_key_data && !sm->handshake->wpa_ie) ||
|
||
(ek->key_type == 0 && sm->handshake->wpa_ie)) {
|
||
/* Haven't received step 1 yet, so no ptk */
|
||
if (!sm->handshake->have_snonce)
|
||
return;
|
||
|
||
decrypted_key_data = eapol_decrypt_key_data(
|
||
sm->handshake->akm_suite, ptk->kek,
|
||
ek, &key_data_len);
|
||
if (!decrypted_key_data)
|
||
return;
|
||
} else
|
||
key_data_len = L_BE16_TO_CPU(ek->key_data_len);
|
||
|
||
if (ek->key_type == 0) {
|
||
/* GTK handshake allowed only after PTK handshake complete */
|
||
if (!sm->handshake->ptk_complete)
|
||
goto done;
|
||
|
||
if (sm->handshake->group_cipher ==
|
||
IE_RSN_CIPHER_SUITE_NO_GROUP_TRAFFIC)
|
||
goto done;
|
||
|
||
if (!decrypted_key_data)
|
||
goto done;
|
||
|
||
eapol_handle_gtk_1_of_2(sm, ek, decrypted_key_data,
|
||
key_data_len);
|
||
goto done;
|
||
}
|
||
|
||
/* If no MIC, then assume packet 1, otherwise packet 3 */
|
||
if (!ek->key_mic)
|
||
eapol_handle_ptk_1_of_4(sm, ek);
|
||
else {
|
||
if (!key_data_len)
|
||
goto done;
|
||
|
||
eapol_handle_ptk_3_of_4(sm, ek,
|
||
decrypted_key_data ?: ek->key_data,
|
||
key_data_len);
|
||
}
|
||
|
||
done:
|
||
l_free(decrypted_key_data);
|
||
}
|
||
|
||
/* This respresentes the eapMsg message in 802.1X Figure 8-1 */
|
||
static void eapol_eap_msg_cb(const uint8_t *eap_data, size_t len,
|
||
void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
uint8_t buf[sizeof(struct eapol_frame) + len];
|
||
struct eapol_frame *frame = (struct eapol_frame *) buf;
|
||
|
||
frame->header.protocol_version = sm->protocol_version;
|
||
frame->header.packet_type = 0;
|
||
l_put_be16(len, &frame->header.packet_len);
|
||
|
||
memcpy(frame->data, eap_data, len);
|
||
|
||
eapol_sm_write(sm, frame, false);
|
||
}
|
||
|
||
/* This respresentes the eapTimout, eapFail and eapSuccess messages */
|
||
static void eapol_eap_complete_cb(enum eap_result result, void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
l_info("EAP completed with %s", result == EAP_RESULT_SUCCESS ?
|
||
"eapSuccess" : (result == EAP_RESULT_FAIL ?
|
||
"eapFail" : "eapTimeout"));
|
||
|
||
if (result != EAP_RESULT_SUCCESS) {
|
||
eap_free(sm->eap);
|
||
sm->eap = NULL;
|
||
handshake_failed(sm, MMPDU_REASON_CODE_IEEE8021X_FAILED);
|
||
return;
|
||
}
|
||
|
||
eap_reset(sm->eap);
|
||
}
|
||
|
||
/* This respresentes the eapResults message */
|
||
static void eapol_eap_results_cb(const uint8_t *msk_data, size_t msk_len,
|
||
const uint8_t *emsk_data, size_t emsk_len,
|
||
const uint8_t *iv, size_t iv_len,
|
||
void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
l_debug("EAP key material received");
|
||
|
||
/*
|
||
* 802.11i 8.5.1.2:
|
||
* "When not using a PSK, the PMK is derived from the AAA key.
|
||
* The PMK shall be computed as the first 256 bits (bits 0–255)
|
||
* of the AAA key: PMK ← L(PTK, 0, 256)."
|
||
* 802.11-2016 12.7.1.3:
|
||
* "When not using a PSK, the PMK is derived from the MSK.
|
||
* The PMK shall be computed as the first PMK_bits bits
|
||
* (bits 0 to PMK_bits–1) of the MSK: PMK = L(MSK, 0, PMK_bits)."
|
||
* RFC5247 explains AAA-Key refers to the MSK and confirms the
|
||
* first 32 bytes of the MSK are used. MSK is at least 64 octets
|
||
* long per RFC3748. Note WEP derives the PTK from MSK differently.
|
||
*
|
||
* In a Fast Transition initial mobility domain association the PMK
|
||
* maps to the XXKey, except with EAP:
|
||
* 802.11-2016 12.7.1.7.3:
|
||
* "If the AKM negotiated is 00-0F-AC:3, then [...] XXKey shall be
|
||
* the second 256 bits of the MSK (which is derived from the IEEE
|
||
* 802.1X authentication), i.e., XXKey = L(MSK, 256, 256)."
|
||
* So we need to save the first 64 bytes at minimum.
|
||
*/
|
||
|
||
if (sm->handshake->akm_suite == IE_RSN_AKM_SUITE_FT_OVER_8021X) {
|
||
if (msk_len < 64)
|
||
goto msk_short;
|
||
} else {
|
||
if (msk_len < 32)
|
||
goto msk_short;
|
||
}
|
||
|
||
if (msk_len > sizeof(sm->handshake->pmk))
|
||
msk_len = sizeof(sm->handshake->pmk);
|
||
|
||
handshake_state_set_pmk(sm->handshake, msk_data, msk_len);
|
||
|
||
return;
|
||
|
||
msk_short:
|
||
l_error("EAP method's MSK too short for AKM suite %u",
|
||
sm->handshake->akm_suite);
|
||
|
||
handshake_failed(sm, MMPDU_REASON_CODE_IEEE8021X_FAILED);
|
||
}
|
||
|
||
static void eapol_eap_event_cb(unsigned int event,
|
||
const void *event_data, void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
if (!sm->event_func)
|
||
return;
|
||
|
||
sm->event_func(event, event_data, sm->user_data);
|
||
}
|
||
|
||
void eapol_sm_set_use_eapol_start(struct eapol_sm *sm, bool enabled)
|
||
{
|
||
sm->use_eapol_start = enabled;
|
||
}
|
||
|
||
void eapol_sm_set_require_handshake(struct eapol_sm *sm, bool enabled)
|
||
{
|
||
sm->require_handshake = enabled;
|
||
|
||
if (!sm->require_handshake)
|
||
sm->use_eapol_start = false;
|
||
}
|
||
|
||
static void eapol_auth_key_handle(struct eapol_sm *sm,
|
||
const struct eapol_frame *frame)
|
||
{
|
||
size_t frame_len = 4 + L_BE16_TO_CPU(frame->header.packet_len);
|
||
const struct eapol_key *ek = eapol_key_validate((const void *) frame,
|
||
frame_len);
|
||
|
||
if (!ek)
|
||
return;
|
||
|
||
/* Wrong direction */
|
||
if (ek->key_ack)
|
||
return;
|
||
|
||
if (ek->request)
|
||
return; /* Not supported */
|
||
|
||
if (!sm->handshake->have_anonce)
|
||
return; /* Not expecting an EAPoL-Key yet */
|
||
|
||
if (!sm->handshake->ptk_complete)
|
||
eapol_handle_ptk_2_of_4(sm, ek);
|
||
else
|
||
eapol_handle_ptk_4_of_4(sm, ek);
|
||
}
|
||
|
||
static void eapol_rx_auth_packet(uint16_t proto, const uint8_t *from,
|
||
const struct eapol_frame *frame,
|
||
void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
if (!sm->protocol_version)
|
||
sm->protocol_version = frame->header.protocol_version;
|
||
|
||
switch (frame->header.packet_type) {
|
||
case 3: /* EAPOL-Key */
|
||
eapol_auth_key_handle(sm, frame);
|
||
break;
|
||
|
||
default:
|
||
l_error("Authenticator received unknown packet type %i from %s",
|
||
frame->header.packet_type,
|
||
util_address_to_string(from));
|
||
return;
|
||
}
|
||
}
|
||
|
||
static void eapol_rx_packet(uint16_t proto, const uint8_t *from,
|
||
const struct eapol_frame *frame,
|
||
void *user_data)
|
||
{
|
||
struct eapol_sm *sm = user_data;
|
||
|
||
if (proto != ETH_P_PAE || memcmp(from, sm->handshake->aa, 6))
|
||
return;
|
||
|
||
if (!sm->started) {
|
||
size_t len = sizeof(struct eapol_header) +
|
||
L_BE16_TO_CPU(frame->header.packet_len);
|
||
|
||
/*
|
||
* If the state machine hasn't started yet save the frame
|
||
* for processing later.
|
||
*/
|
||
if (sm->early_frame) /* Is the 1-element queue full */
|
||
return;
|
||
|
||
sm->early_frame = l_memdup(frame, len);
|
||
|
||
return;
|
||
}
|
||
|
||
if (!sm->protocol_version)
|
||
sm->protocol_version = frame->header.protocol_version;
|
||
|
||
switch (frame->header.packet_type) {
|
||
case 0: /* EAPOL-EAP */
|
||
l_timeout_remove(sm->eapol_start_timeout);
|
||
sm->eapol_start_timeout = 0;
|
||
|
||
if (!sm->eap) {
|
||
/* If we're not configured for EAP, send a NAK */
|
||
sm->eap = eap_new(eapol_eap_msg_cb,
|
||
eapol_eap_complete_cb, sm);
|
||
|
||
if (!sm->eap)
|
||
return;
|
||
|
||
eap_set_key_material_func(sm->eap,
|
||
eapol_eap_results_cb);
|
||
}
|
||
|
||
sm->eap_exchanged = true;
|
||
|
||
eap_rx_packet(sm->eap, frame->data,
|
||
L_BE16_TO_CPU(frame->header.packet_len));
|
||
|
||
break;
|
||
|
||
case 3: /* EAPOL-Key */
|
||
if (!sm->handshake->have_pmk) {
|
||
if (!sm->eap)
|
||
return;
|
||
|
||
/*
|
||
* Either this is an error (EAP negotiation in
|
||
* progress) or the server is giving us a chance to
|
||
* use a cached PMK. We don't yet cache PMKs so
|
||
* send an EAPOL-Start if we haven't sent one yet.
|
||
*/
|
||
if (sm->eapol_start_timeout)
|
||
send_eapol_start(NULL, sm);
|
||
|
||
return;
|
||
}
|
||
|
||
eapol_key_handle(sm, frame);
|
||
break;
|
||
|
||
default:
|
||
return;
|
||
}
|
||
}
|
||
|
||
void __eapol_update_replay_counter(uint32_t ifindex, const uint8_t *spa,
|
||
const uint8_t *aa, uint64_t replay_counter)
|
||
{
|
||
struct eapol_sm *sm;
|
||
|
||
sm = eapol_find_sm(ifindex, aa);
|
||
|
||
if (!sm)
|
||
return;
|
||
|
||
if (sm->replay_counter >= replay_counter)
|
||
return;
|
||
|
||
sm->replay_counter = replay_counter;
|
||
}
|
||
|
||
void __eapol_set_tx_packet_func(eapol_tx_packet_func_t func)
|
||
{
|
||
tx_packet = func;
|
||
}
|
||
|
||
void __eapol_set_tx_user_data(void *user_data)
|
||
{
|
||
tx_user_data = user_data;
|
||
}
|
||
|
||
void __eapol_set_rekey_offload_func(eapol_rekey_offload_func_t func)
|
||
{
|
||
rekey_offload = func;
|
||
}
|
||
|
||
void eapol_register(struct eapol_sm *sm)
|
||
{
|
||
l_queue_push_head(state_machines, sm);
|
||
|
||
if (sm->handshake->authenticator) {
|
||
sm->watch_id = eapol_frame_watch_add(sm->handshake->ifindex,
|
||
eapol_rx_auth_packet, sm);
|
||
|
||
sm->started = true;
|
||
|
||
/* kick off handshake */
|
||
eapol_ptk_1_of_4_retry(NULL, sm);
|
||
} else
|
||
sm->watch_id = eapol_frame_watch_add(sm->handshake->ifindex,
|
||
eapol_rx_packet, sm);
|
||
}
|
||
|
||
bool eapol_start(struct eapol_sm *sm)
|
||
{
|
||
if (sm->handshake->settings_8021x) {
|
||
sm->eap = eap_new(eapol_eap_msg_cb, eapol_eap_complete_cb, sm);
|
||
|
||
if (!sm->eap)
|
||
goto eap_error;
|
||
|
||
if (!eap_load_settings(sm->eap, sm->handshake->settings_8021x,
|
||
"EAP-")) {
|
||
eap_free(sm->eap);
|
||
sm->eap = NULL;
|
||
|
||
goto eap_error;
|
||
}
|
||
|
||
eap_set_key_material_func(sm->eap, eapol_eap_results_cb);
|
||
eap_set_event_func(sm->eap, eapol_eap_event_cb);
|
||
}
|
||
|
||
sm->started = true;
|
||
|
||
if (sm->require_handshake)
|
||
sm->timeout = l_timeout_create(eapol_4way_handshake_time,
|
||
eapol_timeout, sm, NULL);
|
||
|
||
if (sm->use_eapol_start) {
|
||
/*
|
||
* We start a short timeout, if EAP packets are not received
|
||
* from AP, then we send the EAPoL-Start
|
||
*/
|
||
sm->eapol_start_timeout =
|
||
l_timeout_create(1, send_eapol_start, sm, NULL);
|
||
}
|
||
|
||
/* Process any frames received early due to scheduling */
|
||
if (sm->early_frame) {
|
||
eapol_rx_packet(ETH_P_PAE, sm->handshake->aa,
|
||
sm->early_frame, sm);
|
||
l_free(sm->early_frame);
|
||
sm->early_frame = NULL;
|
||
}
|
||
|
||
return true;
|
||
|
||
eap_error:
|
||
l_error("Error initializing EAP for ifindex %i",
|
||
(int) sm->handshake->ifindex);
|
||
|
||
return false;
|
||
}
|
||
|
||
struct preauth_sm {
|
||
uint32_t ifindex;
|
||
uint8_t aa[6];
|
||
uint8_t spa[6];
|
||
struct eap_state *eap;
|
||
uint8_t pmk[32];
|
||
eapol_preauth_cb_t cb;
|
||
eapol_preauth_destroy_func_t destroy;
|
||
void *user_data;
|
||
struct l_timeout *timeout;
|
||
uint32_t watch_id;
|
||
bool initial_rx:1;
|
||
};
|
||
|
||
#define EAPOL_TIMEOUT_SEC 1
|
||
|
||
static void preauth_sm_destroy(void *value)
|
||
{
|
||
struct preauth_sm *sm = value;
|
||
|
||
if (sm->destroy)
|
||
sm->destroy(sm->user_data);
|
||
|
||
eap_free(sm->eap);
|
||
l_timeout_remove(sm->timeout);
|
||
eapol_frame_watch_remove(sm->watch_id);
|
||
l_free(sm);
|
||
}
|
||
|
||
static void preauth_frame(struct preauth_sm *sm, uint8_t packet_type,
|
||
const uint8_t *data, size_t data_len)
|
||
{
|
||
uint8_t buf[sizeof(struct eapol_frame) + data_len];
|
||
struct eapol_frame *frame = (struct eapol_frame *) buf;
|
||
|
||
frame->header.protocol_version = EAPOL_PROTOCOL_VERSION_2001;
|
||
frame->header.packet_type = packet_type;
|
||
l_put_be16(data_len, &frame->header.packet_len);
|
||
|
||
if (data_len)
|
||
memcpy(frame->data, data, data_len);
|
||
|
||
__eapol_tx_packet(sm->ifindex, sm->aa, 0x88c7, frame, false);
|
||
}
|
||
|
||
static void preauth_rx_packet(uint16_t proto, const uint8_t *from,
|
||
const struct eapol_frame *frame,
|
||
void *user_data)
|
||
{
|
||
struct preauth_sm *sm = user_data;
|
||
|
||
if (proto != 0x88c7 || memcmp(from, sm->aa, 6))
|
||
return;
|
||
|
||
if (frame->header.packet_type != 0) /* EAPOL-EAP */
|
||
return;
|
||
|
||
if (!sm->initial_rx) {
|
||
sm->initial_rx = true;
|
||
|
||
/*
|
||
* Initial frame from authenticator received, it's alive
|
||
* so set a longer timeout. The timeout is for the whole
|
||
* EAP exchange as we have no way to monitor the
|
||
* negotiation progress and keep rearming the timer each
|
||
* time progress is made.
|
||
*/
|
||
l_timeout_modify(sm->timeout, EAPOL_TIMEOUT_SEC * 3);
|
||
}
|
||
|
||
eap_rx_packet(sm->eap, frame->data,
|
||
L_BE16_TO_CPU(frame->header.packet_len));
|
||
}
|
||
|
||
static void preauth_eap_msg_cb(const uint8_t *eap_data, size_t len,
|
||
void *user_data)
|
||
{
|
||
struct preauth_sm *sm = user_data;
|
||
|
||
preauth_frame(sm, 0, eap_data, len);
|
||
}
|
||
|
||
static void preauth_eap_complete_cb(enum eap_result result, void *user_data)
|
||
{
|
||
struct preauth_sm *sm = user_data;
|
||
|
||
l_info("Preauthentication completed with %s",
|
||
result == EAP_RESULT_SUCCESS ? "eapSuccess" :
|
||
(result == EAP_RESULT_FAIL ? "eapFail" : "eapTimeout"));
|
||
|
||
l_queue_remove(preauths, sm);
|
||
|
||
if (result == EAP_RESULT_SUCCESS)
|
||
sm->cb(sm->pmk, sm->user_data);
|
||
else
|
||
sm->cb(NULL, sm->user_data);
|
||
|
||
preauth_sm_destroy(sm);
|
||
}
|
||
|
||
/* See eapol_eap_results_cb for documentation */
|
||
static void preauth_eap_results_cb(const uint8_t *msk_data, size_t msk_len,
|
||
const uint8_t *emsk_data, size_t emsk_len,
|
||
const uint8_t *iv, size_t iv_len,
|
||
void *user_data)
|
||
{
|
||
struct preauth_sm *sm = user_data;
|
||
|
||
l_debug("Preauthentication EAP key material received");
|
||
|
||
if (msk_len < 32)
|
||
goto msk_short;
|
||
|
||
memcpy(sm->pmk, msk_data, 32);
|
||
|
||
return;
|
||
|
||
msk_short:
|
||
l_error("Preauthentication MSK too short");
|
||
|
||
l_queue_remove(preauths, sm);
|
||
|
||
sm->cb(NULL, sm->user_data);
|
||
|
||
preauth_sm_destroy(sm);
|
||
}
|
||
|
||
static void preauth_timeout(struct l_timeout *timeout, void *user_data)
|
||
{
|
||
struct preauth_sm *sm = user_data;
|
||
|
||
l_error("Preauthentication timeout");
|
||
|
||
l_queue_remove(preauths, sm);
|
||
|
||
sm->cb(NULL, sm->user_data);
|
||
|
||
preauth_sm_destroy(sm);
|
||
}
|
||
|
||
struct preauth_sm *eapol_preauth_start(const uint8_t *aa,
|
||
const struct handshake_state *hs,
|
||
eapol_preauth_cb_t cb, void *user_data,
|
||
eapol_preauth_destroy_func_t destroy)
|
||
{
|
||
struct preauth_sm *sm;
|
||
|
||
sm = l_new(struct preauth_sm, 1);
|
||
|
||
sm->ifindex = hs->ifindex;
|
||
memcpy(sm->aa, aa, 6);
|
||
memcpy(sm->spa, hs->spa, 6);
|
||
sm->cb = cb;
|
||
sm->destroy = destroy;
|
||
sm->user_data = user_data;
|
||
|
||
sm->eap = eap_new(preauth_eap_msg_cb, preauth_eap_complete_cb, sm);
|
||
if (!sm->eap)
|
||
goto err_free_sm;
|
||
|
||
if (!eap_load_settings(sm->eap, hs->settings_8021x, "EAP-"))
|
||
goto err_free_eap;
|
||
|
||
eap_set_key_material_func(sm->eap, preauth_eap_results_cb);
|
||
|
||
sm->timeout = l_timeout_create(EAPOL_TIMEOUT_SEC, preauth_timeout,
|
||
sm, NULL);
|
||
|
||
sm->watch_id = eapol_frame_watch_add(sm->ifindex,
|
||
preauth_rx_packet, sm);
|
||
|
||
l_queue_push_head(preauths, sm);
|
||
|
||
/* Send EAPOL-Start */
|
||
preauth_frame(sm, 1, NULL, 0);
|
||
|
||
return sm;
|
||
|
||
err_free_eap:
|
||
eap_free(sm->eap);
|
||
err_free_sm:
|
||
l_free(sm);
|
||
|
||
return NULL;
|
||
}
|
||
|
||
static bool preauth_remove_by_ifindex(void *data, void *user_data)
|
||
{
|
||
struct preauth_sm *sm = data;
|
||
|
||
if (sm->ifindex != L_PTR_TO_UINT(user_data))
|
||
return false;
|
||
|
||
preauth_sm_destroy(sm);
|
||
|
||
return true;
|
||
}
|
||
|
||
void eapol_preauth_cancel(uint32_t ifindex)
|
||
{
|
||
l_queue_foreach_remove(preauths, preauth_remove_by_ifindex,
|
||
L_UINT_TO_PTR(ifindex));
|
||
}
|
||
|
||
static bool eapol_frame_watch_match_ifindex(const void *a, const void *b)
|
||
{
|
||
struct eapol_frame_watch *efw =
|
||
container_of(a, struct eapol_frame_watch, super);
|
||
|
||
return efw->ifindex == L_PTR_TO_UINT(b);
|
||
}
|
||
|
||
void __eapol_rx_packet(uint32_t ifindex, const uint8_t *src, uint16_t proto,
|
||
const uint8_t *frame, size_t len,
|
||
bool noencrypt)
|
||
{
|
||
const struct eapol_header *eh;
|
||
|
||
/* Validate Header */
|
||
if (len < sizeof(struct eapol_header))
|
||
return;
|
||
|
||
eh = (const struct eapol_header *) frame;
|
||
|
||
switch (eh->protocol_version) {
|
||
case EAPOL_PROTOCOL_VERSION_2001:
|
||
case EAPOL_PROTOCOL_VERSION_2004:
|
||
break;
|
||
default:
|
||
return;
|
||
}
|
||
|
||
if (len < sizeof(struct eapol_header) + L_BE16_TO_CPU(eh->packet_len))
|
||
return;
|
||
|
||
WATCHLIST_NOTIFY_MATCHES(&frame_watches,
|
||
eapol_frame_watch_match_ifindex,
|
||
L_UINT_TO_PTR(ifindex),
|
||
eapol_frame_watch_func_t, proto, src,
|
||
(const struct eapol_frame *) eh);
|
||
}
|
||
|
||
void __eapol_tx_packet(uint32_t ifindex, const uint8_t *dst, uint16_t proto,
|
||
const struct eapol_frame *frame, bool noencrypt)
|
||
{
|
||
if (!tx_packet)
|
||
return;
|
||
|
||
tx_packet(ifindex, dst, proto, frame, noencrypt, tx_user_data);
|
||
}
|
||
|
||
void __eapol_set_config(struct l_settings *config)
|
||
{
|
||
if (!l_settings_get_uint(config, "EAPoL",
|
||
"max_4way_handshake_time", &eapol_4way_handshake_time))
|
||
eapol_4way_handshake_time = 2;
|
||
}
|
||
|
||
bool eapol_init()
|
||
{
|
||
state_machines = l_queue_new();
|
||
preauths = l_queue_new();
|
||
watchlist_init(&frame_watches, &eapol_frame_watch_ops);
|
||
|
||
return true;
|
||
}
|
||
|
||
bool eapol_exit()
|
||
{
|
||
if (!l_queue_isempty(state_machines))
|
||
l_warn("stale eapol state machines found");
|
||
|
||
l_queue_destroy(state_machines, eapol_sm_destroy);
|
||
|
||
if (!l_queue_isempty(preauths))
|
||
l_warn("stale preauth state machines found");
|
||
|
||
l_queue_destroy(preauths, preauth_sm_destroy);
|
||
|
||
watchlist_destroy(&frame_watches);
|
||
|
||
return true;
|
||
}
|