| /* |
| * |
| * Wireless daemon for Linux |
| * |
| * Copyright (C) 2013-2019 Intel Corporation. All rights reserved. |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #include <stdio.h> |
| #include <errno.h> |
| #include <ell/ell.h> |
| |
| #include "src/eapolutil.h" |
| #include "src/ie.h" |
| |
| const struct eapol_key *eapol_key_validate(const uint8_t *frame, size_t len, |
| size_t mic_len) |
| { |
| const struct eapol_key *ek; |
| |
| /* |
| * Since EAPOL_KEY_DATA_LEN actually gets the key data length bytes we |
| * have to check this first, otherwise we could potentially overrun the |
| * frame buffer |
| */ |
| if (len < EAPOL_FRAME_LEN(mic_len)) |
| return NULL; |
| |
| ek = (const struct eapol_key *) frame; |
| |
| if (len < EAPOL_FRAME_LEN(mic_len) + EAPOL_KEY_DATA_LEN(ek, mic_len)) |
| return NULL; |
| |
| switch (ek->header.protocol_version) { |
| case EAPOL_PROTOCOL_VERSION_2001: |
| case EAPOL_PROTOCOL_VERSION_2004: |
| case EAPOL_PROTOCOL_VERSION_2010: |
| break; |
| default: |
| return NULL; |
| } |
| |
| if (ek->header.packet_type != 3) |
| return NULL; |
| |
| switch (ek->descriptor_type) { |
| case EAPOL_DESCRIPTOR_TYPE_RC4: |
| case EAPOL_DESCRIPTOR_TYPE_80211: |
| case EAPOL_DESCRIPTOR_TYPE_WPA: |
| break; |
| default: |
| return NULL; |
| } |
| |
| switch (ek->key_descriptor_version) { |
| case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4: |
| case EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES: |
| case EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES: |
| case EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED: |
| break; |
| default: |
| return NULL; |
| } |
| |
| return ek; |
| } |
| |
| int eapol_key_descriptor_version_from_akm(enum ie_rsn_akm_suite akm, |
| enum ie_rsn_cipher_suite pairwise, |
| uint8_t *outv) |
| { |
| /* 802.11-2020 Section 12.7.2 */ |
| switch (akm) { |
| case IE_RSN_AKM_SUITE_8021X: |
| case IE_RSN_AKM_SUITE_PSK: |
| if (pairwise == IE_RSN_CIPHER_SUITE_USE_GROUP_CIPHER || |
| pairwise == IE_RSN_CIPHER_SUITE_TKIP) |
| *outv = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_MD5_ARC4; |
| else |
| *outv = EAPOL_KEY_DESCRIPTOR_VERSION_HMAC_SHA1_AES; |
| |
| return 0; |
| case IE_RSN_AKM_SUITE_FT_OVER_8021X: |
| case IE_RSN_AKM_SUITE_FT_USING_PSK: |
| case IE_RSN_AKM_SUITE_8021X_SHA256: |
| case IE_RSN_AKM_SUITE_PSK_SHA256: |
| *outv = EAPOL_KEY_DESCRIPTOR_VERSION_AES_128_CMAC_AES; |
| return 0; |
| case IE_RSN_AKM_SUITE_SAE_SHA256: |
| case IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256: |
| case IE_RSN_AKM_SUITE_8021X_SUITE_B_SHA256: |
| case IE_RSN_AKM_SUITE_8021X_SUITE_B_SHA384: |
| case IE_RSN_AKM_SUITE_FT_OVER_8021X_SHA384: |
| case IE_RSN_AKM_SUITE_FILS_SHA256: |
| case IE_RSN_AKM_SUITE_FILS_SHA384: |
| case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256: |
| case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384: |
| case IE_RSN_AKM_SUITE_OWE: |
| case IE_RSN_AKM_SUITE_OSEN: |
| *outv = EAPOL_KEY_DESCRIPTOR_VERSION_AKM_DEFINED; |
| return 0; |
| case IE_RSN_AKM_SUITE_TDLS: |
| case IE_RSN_AKM_SUITE_AP_PEER_KEY_SHA256: |
| break; |
| } |
| |
| return -ENOTSUP; |
| }; |