| /* |
| * |
| * Wireless daemon for Linux |
| * |
| * Copyright (C) 2013-2019 Intel Corporation. All rights reserved. |
| * |
| * This library is free software; you can redistribute it and/or |
| * modify it under the terms of the GNU Lesser General Public |
| * License as published by the Free Software Foundation; either |
| * version 2.1 of the License, or (at your option) any later version. |
| * |
| * This library is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * Lesser General Public License for more details. |
| * |
| * You should have received a copy of the GNU Lesser General Public |
| * License along with this library; if not, write to the Free Software |
| * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA |
| * |
| */ |
| |
| #ifdef HAVE_CONFIG_H |
| #include <config.h> |
| #endif |
| |
| #define _GNU_SOURCE |
| #include <string.h> |
| #include <unistd.h> |
| #include <errno.h> |
| #include <sys/socket.h> |
| #include <linux/if.h> |
| #include <linux/if_packet.h> |
| #include <linux/if_ether.h> |
| #include <arpa/inet.h> |
| #include <linux/filter.h> |
| |
| #include <ell/ell.h> |
| |
| #include "src/missing.h" |
| #include "src/crypto.h" |
| #include "src/ie.h" |
| #include "src/util.h" |
| #include "src/handshake.h" |
| #include "src/erp.h" |
| #include "src/band.h" |
| #include "src/pmksa.h" |
| |
| static inline unsigned int n_ecc_groups(void) |
| { |
| const unsigned int *groups = l_ecc_supported_ike_groups(); |
| unsigned int j = 0; |
| |
| while (groups[j]) |
| j += 1; |
| |
| return j; |
| } |
| |
| static inline int ecc_group_index(unsigned int group) |
| { |
| const unsigned int *groups = l_ecc_supported_ike_groups(); |
| int j; |
| |
| for (j = 0; groups[j]; j++) |
| if (groups[j] == group) |
| return j; |
| |
| return -ENOENT; |
| } |
| |
| static bool handshake_get_nonce(uint8_t nonce[]) |
| { |
| return l_getrandom(nonce, 32); |
| } |
| |
| static handshake_get_nonce_func_t get_nonce = handshake_get_nonce; |
| static handshake_install_tk_func_t install_tk = NULL; |
| static handshake_install_gtk_func_t install_gtk = NULL; |
| static handshake_install_igtk_func_t install_igtk = NULL; |
| static handshake_install_ext_tk_func_t install_ext_tk = NULL; |
| |
| void __handshake_set_get_nonce_func(handshake_get_nonce_func_t func) |
| { |
| get_nonce = func; |
| } |
| |
| void __handshake_set_install_tk_func(handshake_install_tk_func_t func) |
| { |
| install_tk = func; |
| } |
| |
| void __handshake_set_install_gtk_func(handshake_install_gtk_func_t func) |
| { |
| install_gtk = func; |
| } |
| |
| void __handshake_set_install_igtk_func(handshake_install_igtk_func_t func) |
| { |
| install_igtk = func; |
| } |
| |
| void __handshake_set_install_ext_tk_func(handshake_install_ext_tk_func_t func) |
| { |
| install_ext_tk = func; |
| } |
| |
| struct handshake_state *handshake_state_ref(struct handshake_state *s) |
| { |
| __sync_fetch_and_add(&s->refcount, 1); |
| |
| return s; |
| } |
| |
| void handshake_state_unref(struct handshake_state *s) |
| { |
| __typeof__(s->free) destroy; |
| |
| if (!s) |
| return; |
| |
| destroy = s->free; |
| |
| if (s->in_event) { |
| s->in_event = false; |
| return; |
| } |
| |
| if (__sync_sub_and_fetch(&s->refcount, 1)) |
| return; |
| |
| l_free(s->authenticator_ie); |
| l_free(s->supplicant_ie); |
| l_free(s->authenticator_rsnxe); |
| l_free(s->supplicant_rsnxe); |
| l_free(s->mde); |
| l_free(s->authenticator_fte); |
| l_free(s->supplicant_fte); |
| l_free(s->fils_ip_req_ie); |
| l_free(s->fils_ip_resp_ie); |
| l_free(s->vendor_ies); |
| |
| if (s->have_pmksa) |
| l_free(s->pmksa); |
| |
| if (s->erp_cache) |
| erp_cache_put(s->erp_cache); |
| |
| l_free(s->chandef); |
| |
| if (s->passphrase) { |
| explicit_bzero(s->passphrase, strlen(s->passphrase)); |
| l_free(s->passphrase); |
| } |
| |
| if (s->password_identifier) { |
| explicit_bzero(s->password_identifier, |
| strlen(s->password_identifier)); |
| l_free(s->password_identifier); |
| } |
| |
| if (s->ecc_sae_pts) { |
| unsigned int i; |
| |
| for (i = 0; i < n_ecc_groups(); i++) |
| l_ecc_point_free(s->ecc_sae_pts[i]); |
| |
| l_free(s->ecc_sae_pts); |
| } |
| |
| explicit_bzero(s, sizeof(*s)); |
| |
| if (destroy) |
| destroy(s); |
| } |
| |
| void handshake_state_set_supplicant_address(struct handshake_state *s, |
| const uint8_t *spa) |
| { |
| memcpy(s->spa, spa, sizeof(s->spa)); |
| } |
| |
| void handshake_state_set_authenticator_address(struct handshake_state *s, |
| const uint8_t *aa) |
| { |
| memcpy(s->aa, aa, sizeof(s->aa)); |
| } |
| |
| void handshake_state_set_authenticator(struct handshake_state *s, bool auth) |
| { |
| s->authenticator = auth; |
| } |
| |
| void handshake_state_set_pmk(struct handshake_state *s, const uint8_t *pmk, |
| size_t pmk_len) |
| { |
| memcpy(s->pmk, pmk, pmk_len); |
| s->pmk_len = pmk_len; |
| s->have_pmk = true; |
| } |
| |
| void handshake_state_set_ptk(struct handshake_state *s, const uint8_t *ptk, |
| size_t ptk_len) |
| { |
| memcpy(s->ptk, ptk, ptk_len); |
| s->ptk_complete = true; |
| } |
| |
| void handshake_state_set_8021x_config(struct handshake_state *s, |
| struct l_settings *settings) |
| { |
| s->settings_8021x = settings; |
| } |
| |
| bool handshake_state_set_authenticator_ie(struct handshake_state *s, |
| const uint8_t *ie) |
| { |
| struct ie_rsn_info info; |
| |
| if (!ie_parse_rsne_from_data(ie, ie[1] + 2, &info)) |
| goto valid_ie; |
| |
| if (!ie_parse_wpa_from_data(ie, ie[1] + 2, &info)) |
| goto valid_ie; |
| |
| if (ie_parse_osen_from_data(ie, ie[1] + 2, &info) < 0) |
| return false; |
| |
| valid_ie: |
| l_free(s->authenticator_ie); |
| s->authenticator_ie = l_memdup(ie, ie[1] + 2u); |
| |
| s->authenticator_ocvc = info.ocvc; |
| |
| return true; |
| } |
| |
| bool handshake_state_set_supplicant_ie(struct handshake_state *s, |
| const uint8_t *ie) |
| { |
| struct ie_rsn_info info; |
| bool wpa_ie = false; |
| bool osen_ie = false; |
| |
| if (!ie_parse_rsne_from_data(ie, ie[1] + 2, &info)) |
| goto valid_ie; |
| |
| if (!ie_parse_wpa_from_data(ie, ie[1] + 2, &info)) { |
| wpa_ie = true; |
| goto valid_ie; |
| } |
| |
| if (ie_parse_osen_from_data(ie, ie[1] + 2, &info) < 0) |
| return false; |
| |
| osen_ie = true; |
| |
| valid_ie: |
| if (__builtin_popcount(info.pairwise_ciphers) != 1) |
| return false; |
| |
| if (__builtin_popcount(info.akm_suites) != 1) |
| return false; |
| |
| l_free(s->supplicant_ie); |
| s->supplicant_ie = l_memdup(ie, ie[1] + 2u); |
| |
| s->osen_ie = osen_ie; |
| s->wpa_ie = wpa_ie; |
| |
| s->pairwise_cipher = info.pairwise_ciphers; |
| s->group_cipher = info.group_cipher; |
| s->group_management_cipher = info.group_management_cipher; |
| s->akm_suite = info.akm_suites; |
| s->supplicant_ocvc = info.ocvc; |
| s->ext_key_id_capable = info.extended_key_id; |
| |
| /* |
| * Don't set MFP for OSEN otherwise EAPoL will attempt to negotiate a |
| * iGTK which is not allowed for OSEN. |
| */ |
| if (!s->osen_ie) |
| s->mfp = info.mfpc; |
| |
| return true; |
| } |
| |
| static void replace_ie(uint8_t **old, const uint8_t *new) |
| { |
| if (*old == NULL) { |
| *old = new ? l_memdup(new, new[1] + 2) : NULL; |
| return; |
| } |
| |
| if (!new) { |
| l_free(*old); |
| *old = NULL; |
| return; |
| } |
| |
| if ((*old)[1] == new[1] && !memcmp(*old, new, new[1] + 2)) |
| return; |
| |
| l_free(*old); |
| *old = l_memdup(new, new[1] + 2); |
| } |
| |
| void handshake_state_set_authenticator_rsnxe(struct handshake_state *s, |
| const uint8_t *ie) |
| { |
| l_free(s->authenticator_rsnxe); |
| s->authenticator_rsnxe = ie ? l_memdup(ie, ie[1] + 2) : NULL; |
| } |
| |
| void handshake_state_set_supplicant_rsnxe(struct handshake_state *s, |
| const uint8_t *ie) |
| { |
| replace_ie(&s->supplicant_rsnxe, ie); |
| } |
| |
| void handshake_state_set_ssid(struct handshake_state *s, const uint8_t *ssid, |
| size_t ssid_len) |
| { |
| memcpy(s->ssid, ssid, ssid_len); |
| s->ssid_len = ssid_len; |
| } |
| |
| void handshake_state_set_mde(struct handshake_state *s, const uint8_t *mde) |
| { |
| replace_ie(&s->mde, mde); |
| } |
| |
| void handshake_state_set_authenticator_fte(struct handshake_state *s, |
| const uint8_t *fte) |
| { |
| replace_ie(&s->authenticator_fte, fte); |
| } |
| |
| void handshake_state_set_supplicant_fte(struct handshake_state *s, |
| const uint8_t *fte) |
| { |
| replace_ie(&s->supplicant_fte, fte); |
| } |
| |
| void handshake_state_set_vendor_ies(struct handshake_state *s, |
| const struct iovec *iov, |
| size_t n_iovs) |
| { |
| size_t i; |
| size_t len; |
| |
| l_free(s->vendor_ies); |
| s->vendor_ies = NULL; |
| |
| if (n_iovs == 0) { |
| s->vendor_ies_len = 0; |
| return; |
| } |
| |
| for (i = 0, len = 0; i < n_iovs; i++) |
| len += iov[i].iov_len; |
| |
| s->vendor_ies_len = len; |
| s->vendor_ies = l_malloc(len); |
| |
| for (i = 0, len = 0; i < n_iovs; i++) { |
| memcpy(s->vendor_ies + len, iov[i].iov_base, iov[i].iov_len); |
| len += iov[i].iov_len; |
| } |
| } |
| |
| void handshake_state_set_vendor_quirks(struct handshake_state *s, |
| struct vendor_quirk quirks) |
| { |
| s->vendor_quirks = quirks; |
| } |
| |
| void handshake_state_set_kh_ids(struct handshake_state *s, |
| const uint8_t *r0khid, size_t r0khid_len, |
| const uint8_t *r1khid) |
| { |
| memcpy(s->r0khid, r0khid, r0khid_len); |
| s->r0khid_len = r0khid_len; |
| |
| memcpy(s->r1khid, r1khid, 6); |
| } |
| |
| void handshake_state_set_event_func(struct handshake_state *s, |
| handshake_event_func_t func, |
| void *user_data) |
| { |
| s->event_func = func; |
| s->user_data = user_data; |
| } |
| |
| void handshake_state_set_passphrase(struct handshake_state *s, |
| const char *passphrase) |
| { |
| s->passphrase = l_strdup(passphrase); |
| } |
| |
| void handshake_state_set_password_identifier(struct handshake_state *s, |
| const char *id) |
| { |
| s->password_identifier = l_strdup(id); |
| } |
| |
| void handshake_state_set_no_rekey(struct handshake_state *s, bool no_rekey) |
| { |
| s->no_rekey = no_rekey; |
| } |
| |
| void handshake_state_set_fils_ft(struct handshake_state *s, |
| const uint8_t *fils_ft, |
| size_t fils_ft_len) |
| { |
| memcpy(s->fils_ft, fils_ft, fils_ft_len); |
| s->fils_ft_len = fils_ft_len; |
| } |
| |
| /* |
| * Override the protocol version used for EAPoL packets. The selection is as |
| * follows: |
| * 0 -> Automatic, use same proto as the request for the response and |
| * 2004 when in authenticator mode |
| * 1 -> Chooses 2001 Protocol Version |
| * 2 -> Chooses 2004 Protocol Version |
| * 3 -> Chooses 2010 Protocol Version |
| */ |
| void handshake_state_set_protocol_version(struct handshake_state *s, |
| uint8_t proto_version) |
| { |
| s->proto_version = proto_version; |
| } |
| |
| void handshake_state_new_snonce(struct handshake_state *s) |
| { |
| get_nonce(s->snonce); |
| |
| s->have_snonce = true; |
| } |
| |
| void handshake_state_new_anonce(struct handshake_state *s) |
| { |
| get_nonce(s->anonce); |
| |
| s->have_anonce = true; |
| } |
| |
| void handshake_state_set_anonce(struct handshake_state *s, |
| const uint8_t *anonce) |
| { |
| memcpy(s->anonce, anonce, 32); |
| } |
| |
| /* A multi-purpose getter for key sizes */ |
| static bool handshake_get_key_sizes(struct handshake_state *s, size_t *ptk_size, |
| size_t *kck_size, size_t *kek_size) |
| { |
| size_t kck; |
| size_t kek; |
| size_t tk; |
| enum crypto_cipher cipher = |
| ie_rsn_cipher_suite_to_cipher(s->pairwise_cipher); |
| |
| tk = crypto_cipher_key_len(cipher); |
| |
| /* |
| * IEEE 802.11-2016 Table 12-8: Integrity and key-wrap algorithms |
| * |
| * From the table, only 00-0F-AC:12 and 00-0F-AC:13 use longer KCK and |
| * KEK keys, which are 24 and 32 bytes respectively. The remainder use |
| * 16 and 16 respectively. |
| */ |
| switch (s->akm_suite) { |
| case IE_RSN_AKM_SUITE_8021X_SUITE_B_SHA256: |
| case IE_RSN_AKM_SUITE_FT_OVER_8021X_SHA384: |
| kck = 24; |
| kek = 32; |
| break; |
| case IE_RSN_AKM_SUITE_OWE: |
| /* |
| * RFC 8110 Section 4.4 Table 2 |
| * |
| * Luckily with OWE we can deduce the key lengths from the PMK |
| * size, since the PMK size maps to unique KCK/KEK lengths. |
| */ |
| switch (s->pmk_len) { |
| case 32: |
| /* SHA-256 used for PMK */ |
| kck = 16; |
| kek = 16; |
| break; |
| case 48: |
| /* SHA-384 used for PMK */ |
| kck = 24; |
| kek = 32; |
| break; |
| case 64: |
| /* SHA-512 used for PMK */ |
| kck = 32; |
| kek = 32; |
| break; |
| default: |
| l_error("Invalid PMK length for OWE %zu\n", s->pmk_len); |
| return false; |
| } |
| |
| break; |
| case IE_RSN_AKM_SUITE_FILS_SHA256: |
| case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256: |
| kck = 0; |
| kek = 32; |
| break; |
| case IE_RSN_AKM_SUITE_FILS_SHA384: |
| case IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384: |
| kck = 0; |
| kek = 64; |
| break; |
| default: |
| kck = 16; |
| kek = 16; |
| break; |
| } |
| |
| if (ptk_size) { |
| *ptk_size = kck + kek + tk; |
| if (s->akm_suite == IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256) |
| *ptk_size += 32; |
| else if (s->akm_suite == IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384) |
| *ptk_size += 56; |
| } |
| |
| if (kck_size) |
| *kck_size = kck; |
| |
| if (kek_size) |
| *kek_size = kek; |
| |
| return true; |
| } |
| |
| bool handshake_state_derive_ptk(struct handshake_state *s) |
| { |
| size_t ptk_size; |
| enum l_checksum_type type; |
| |
| if (!(s->akm_suite & (IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384))) |
| if (!s->have_snonce || !s->have_pmk) |
| return false; |
| |
| if ((s->akm_suite & (IE_RSN_AKM_SUITE_FT_OVER_8021X | |
| IE_RSN_AKM_SUITE_FT_USING_PSK | |
| IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384)) && |
| (!s->mde || !s->authenticator_fte)) |
| return false; |
| |
| s->ptk_complete = false; |
| |
| if (s->akm_suite & IE_RSN_AKM_SUITE_OWE) { |
| if (s->pmk_len == 32) |
| type = L_CHECKSUM_SHA256; |
| else if (s->pmk_len == 48) |
| type = L_CHECKSUM_SHA384; |
| else if (s->pmk_len == 64) |
| type = L_CHECKSUM_SHA512; |
| else |
| return false; |
| } else if (s->akm_suite & (IE_RSN_AKM_SUITE_FILS_SHA384 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384)) |
| type = L_CHECKSUM_SHA384; |
| else if (s->akm_suite & (IE_RSN_AKM_SUITE_8021X_SHA256 | |
| IE_RSN_AKM_SUITE_PSK_SHA256 | |
| IE_RSN_AKM_SUITE_SAE_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256 | |
| IE_RSN_AKM_SUITE_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_OSEN)) |
| type = L_CHECKSUM_SHA256; |
| else |
| type = L_CHECKSUM_SHA1; |
| |
| ptk_size = handshake_state_get_ptk_size(s); |
| |
| if (s->akm_suite & (IE_RSN_AKM_SUITE_FT_OVER_8021X | |
| IE_RSN_AKM_SUITE_FT_USING_PSK | |
| IE_RSN_AKM_SUITE_FT_OVER_SAE_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384)) { |
| uint16_t mdid; |
| uint8_t ptk_name[16]; |
| const uint8_t *xxkey = s->pmk; |
| size_t xxkey_len = 32; |
| bool sha384 = (s->akm_suite & |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384); |
| |
| /* |
| * In a Fast Transition initial mobility domain association |
| * the PMK maps to the XXKey, except with EAP: |
| * 802.11-2016 12.7.1.7.3: |
| * "If the AKM negotiated is 00-0F-AC:3, then [...] XXKey |
| * shall be the second 256 bits of the MSK (which is |
| * derived from the IEEE 802.1X authentication), i.e., |
| * XXKey = L(MSK, 256, 256)." |
| */ |
| if (s->akm_suite == IE_RSN_AKM_SUITE_FT_OVER_8021X) |
| xxkey = s->pmk + 32; |
| else if (s->akm_suite & (IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384)) { |
| xxkey = s->fils_ft; |
| xxkey_len = s->fils_ft_len; |
| } |
| |
| ie_parse_mobility_domain_from_data(s->mde, s->mde[1] + 2, |
| &mdid, NULL, NULL); |
| |
| if (!crypto_derive_pmk_r0(xxkey, xxkey_len, s->ssid, |
| s->ssid_len, mdid, |
| s->r0khid, s->r0khid_len, |
| s->spa, sha384, |
| s->pmk_r0, s->pmk_r0_name)) |
| return false; |
| |
| if (!crypto_derive_pmk_r1(s->pmk_r0, s->r1khid, s->spa, |
| s->pmk_r0_name, sha384, |
| s->pmk_r1, s->pmk_r1_name)) |
| return false; |
| |
| if (!crypto_derive_ft_ptk(s->pmk_r1, s->pmk_r1_name, s->aa, |
| s->spa, s->snonce, s->anonce, |
| sha384, s->ptk, ptk_size, |
| ptk_name)) |
| return false; |
| } else |
| if (!crypto_derive_pairwise_ptk(s->pmk, s->pmk_len, s->spa, |
| s->aa, s->anonce, s->snonce, |
| s->ptk, ptk_size, type)) |
| return false; |
| |
| return true; |
| } |
| |
| size_t handshake_state_get_ptk_size(struct handshake_state *s) |
| { |
| size_t ptk_size; |
| |
| if (!handshake_get_key_sizes(s, &ptk_size, NULL, NULL)) |
| return 0; |
| |
| return ptk_size; |
| } |
| |
| const uint8_t *handshake_state_get_kck(struct handshake_state *s) |
| { |
| /* |
| * FILS itself does not derive a KCK, but FILS-FT derives additional |
| * key bytes at the end of the PTK, which contains a special KCK used |
| * for fast transition. Since the normal FILS protocol will never call |
| * this, we can assume that its only being called for FILS-FT and is |
| * requesting this special KCK. |
| */ |
| if (s->akm_suite & IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256) |
| return s->ptk + 48; |
| else if (s->akm_suite & IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384) |
| return s->ptk + 80; |
| |
| return s->ptk; |
| } |
| |
| size_t handshake_state_get_kck_len(struct handshake_state *s) |
| { |
| if (s->akm_suite & IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384) |
| return 24; |
| |
| return 16; |
| } |
| |
| size_t handshake_state_get_kek_len(struct handshake_state *s) |
| { |
| size_t kek_size; |
| |
| if (!handshake_get_key_sizes(s, NULL, NULL, &kek_size)) |
| return 0; |
| |
| return kek_size; |
| } |
| |
| const uint8_t *handshake_state_get_kek(struct handshake_state *s) |
| { |
| size_t kck_size; |
| |
| if (!handshake_get_key_sizes(s, NULL, &kck_size, NULL)) |
| return NULL; |
| |
| return s->ptk + kck_size; |
| } |
| |
| static const uint8_t *handshake_get_tk(struct handshake_state *s) |
| { |
| size_t kck_size, kek_size; |
| |
| if (!handshake_get_key_sizes(s, NULL, &kck_size, &kek_size)) |
| return NULL; |
| |
| return s->ptk + kck_size + kek_size; |
| } |
| |
| void handshake_state_install_ptk(struct handshake_state *s) |
| { |
| s->ptk_complete = true; |
| |
| if (!s->have_pmksa && IE_AKM_IS_SAE(s->akm_suite)) { |
| l_debug("Adding PMKSA expiration"); |
| s->expiration = l_time_now() + pmksa_lifetime(); |
| } |
| |
| if (install_tk) { |
| uint32_t cipher = ie_rsn_cipher_suite_to_cipher( |
| s->pairwise_cipher); |
| |
| handshake_event(s, HANDSHAKE_EVENT_SETTING_KEYS); |
| |
| install_tk(s, s->active_tk_index, handshake_get_tk(s), cipher); |
| } |
| } |
| |
| void handshake_state_install_ext_ptk(struct handshake_state *s, |
| uint8_t key_idx, |
| struct eapol_frame *ek, uint16_t proto, |
| bool noencrypt) |
| { |
| s->ptk_complete = true; |
| |
| if (install_ext_tk) { |
| uint32_t cipher = |
| ie_rsn_cipher_suite_to_cipher(s->pairwise_cipher); |
| |
| install_ext_tk(s, key_idx, handshake_get_tk(s), cipher, ek, |
| proto, noencrypt); |
| } |
| } |
| |
| |
| void handshake_state_install_gtk(struct handshake_state *s, |
| uint16_t gtk_key_index, |
| const uint8_t *gtk, size_t gtk_len, |
| const uint8_t *rsc, uint8_t rsc_len) |
| { |
| if (install_gtk) { |
| uint32_t cipher = |
| ie_rsn_cipher_suite_to_cipher(s->group_cipher); |
| |
| install_gtk(s, gtk_key_index, gtk, gtk_len, |
| rsc, rsc_len, cipher); |
| } |
| } |
| |
| void handshake_state_install_igtk(struct handshake_state *s, |
| uint16_t igtk_key_index, |
| const uint8_t *igtk, size_t igtk_len, |
| const uint8_t *ipn) |
| { |
| if (install_igtk) { |
| uint32_t cipher = |
| ie_rsn_cipher_suite_to_cipher( |
| s->group_management_cipher); |
| |
| install_igtk(s, igtk_key_index, igtk, igtk_len, |
| ipn, 6, cipher); |
| } |
| } |
| |
| void handshake_state_override_pairwise_cipher(struct handshake_state *s, |
| enum ie_rsn_cipher_suite pairwise) |
| { |
| s->pairwise_cipher = pairwise; |
| } |
| |
| void handshake_state_set_pmkid(struct handshake_state *s, const uint8_t *pmkid) |
| { |
| memcpy(s->pmkid, pmkid, 16); |
| s->have_pmkid = true; |
| } |
| |
| bool handshake_state_get_pmkid(struct handshake_state *s, uint8_t *out_pmkid, |
| enum l_checksum_type sha) |
| { |
| /* SAE exports pmkid */ |
| if (s->have_pmkid) { |
| memcpy(out_pmkid, s->pmkid, 16); |
| return true; |
| } |
| |
| if (!s->have_pmk) |
| return false; |
| |
| return crypto_derive_pmkid(s->pmk, 32, s->spa, s->aa, out_pmkid, |
| sha); |
| } |
| |
| bool handshake_state_pmkid_matches(struct handshake_state *s, |
| const uint8_t *check) |
| { |
| uint8_t own_pmkid[16]; |
| enum l_checksum_type sha; |
| |
| /* |
| * 802.11-2020 Table 9-151 defines the hashing algorithm to use |
| * for various AKM's. Note some AKMs are omitted here because they |
| * export the PMKID individually (SAE/FILS/FT-PSK) |
| * |
| * SHA1: |
| * 00-0F-AC:1 (8021X) |
| * 00-0F-AC:2 (PSK) |
| * |
| * SHA256: |
| * 00-0F-AC:3 (FT-8021X) |
| * 00-0F-AC:5 (8021X-SHA256) |
| * 00-0F-AC:6 (PSK-SHA256) |
| * |
| * SHA384: |
| * 00-0F-AC:13 (FT-8021X-SHA384) |
| */ |
| if (s->akm_suite & (IE_RSN_AKM_SUITE_8021X_SHA256 | |
| IE_RSN_AKM_SUITE_PSK_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_8021X)) |
| sha = L_CHECKSUM_SHA256; |
| else |
| sha = L_CHECKSUM_SHA1; |
| |
| if (!handshake_state_get_pmkid(s, own_pmkid, sha)) |
| return false; |
| |
| if (l_secure_memcmp(own_pmkid, check, 16)) { |
| if (s->akm_suite != IE_RSN_AKM_SUITE_FT_OVER_8021X) |
| return false; |
| |
| l_debug("PMKID did not match, trying SHA1 derivation"); |
| |
| if (!handshake_state_get_pmkid(s, own_pmkid, L_CHECKSUM_SHA1)) |
| return false; |
| |
| return l_secure_memcmp(own_pmkid, check, 16) == 0; |
| } |
| |
| return true; |
| } |
| |
| void handshake_state_set_gtk(struct handshake_state *s, const uint8_t *key, |
| unsigned int key_index, const uint8_t *rsc) |
| { |
| enum crypto_cipher cipher = |
| ie_rsn_cipher_suite_to_cipher(s->group_cipher); |
| int key_len = crypto_cipher_key_len(cipher); |
| |
| if (!key_len) |
| return; |
| |
| memcpy(s->gtk, key, key_len); |
| s->gtk_index = key_index; |
| memcpy(s->gtk_rsc, rsc, 6); |
| } |
| |
| void handshake_state_set_igtk(struct handshake_state *s, const uint8_t *key, |
| unsigned int key_index, const uint8_t *rsc) |
| { |
| enum crypto_cipher cipher = |
| ie_rsn_cipher_suite_to_cipher(s->group_management_cipher); |
| int key_len = crypto_cipher_key_len(cipher); |
| |
| if (!key_len) |
| return; |
| |
| memcpy(s->igtk, key, key_len); |
| s->igtk_index = key_index; |
| memcpy(s->igtk_rsc, rsc, 6); |
| } |
| |
| /* |
| * This function performs a match of the RSN/WPA IE obtained from the scan |
| * results vs the RSN/WPA IE obtained as part of the 4-way handshake. If they |
| * don't match, the EAPoL packet must be silently discarded. |
| */ |
| bool handshake_util_ap_ie_matches(struct handshake_state *s, |
| const struct ie_rsn_info *msg_info, |
| const uint8_t *scan_ie, bool is_wpa) |
| { |
| struct ie_rsn_info scan_info; |
| int r; |
| |
| if (!is_wpa) |
| r = ie_parse_rsne_from_data(scan_ie, |
| scan_ie[1] + 2, &scan_info); |
| else |
| r = ie_parse_wpa_from_data(scan_ie, scan_ie[1] + 2, &scan_info); |
| |
| if (r < 0) |
| return false; |
| |
| if (msg_info->group_cipher != scan_info.group_cipher) |
| return false; |
| |
| if (msg_info->pairwise_ciphers != scan_info.pairwise_ciphers) |
| return false; |
| |
| if (msg_info->akm_suites != scan_info.akm_suites) |
| return false; |
| |
| if (msg_info->preauthentication != scan_info.preauthentication) |
| return false; |
| |
| if (msg_info->no_pairwise != scan_info.no_pairwise) |
| return false; |
| |
| if (!(s->vendor_quirks.replay_counter_mismatch)) { |
| if (msg_info->ptksa_replay_counter != |
| scan_info.ptksa_replay_counter) |
| return false; |
| |
| if (msg_info->gtksa_replay_counter != |
| scan_info.gtksa_replay_counter) |
| return false; |
| } |
| |
| if (msg_info->mfpr != scan_info.mfpr) |
| return false; |
| |
| if (msg_info->mfpc != scan_info.mfpc) |
| return false; |
| |
| if (msg_info->peerkey_enabled != scan_info.peerkey_enabled) |
| return false; |
| |
| if (msg_info->spp_a_msdu_capable != scan_info.spp_a_msdu_capable) |
| return false; |
| |
| if (msg_info->spp_a_msdu_required != scan_info.spp_a_msdu_required) |
| return false; |
| |
| if (msg_info->pbac != scan_info.pbac) |
| return false; |
| |
| if (msg_info->extended_key_id != scan_info.extended_key_id) |
| return false; |
| |
| if (msg_info->ocvc != scan_info.ocvc) |
| return false; |
| |
| /* We don't check the PMKIDs since these might actually be different */ |
| |
| if (msg_info->group_management_cipher != |
| scan_info.group_management_cipher) |
| return false; |
| |
| return true; |
| } |
| |
| const uint8_t *handshake_util_find_kde(enum handshake_kde selector, |
| const uint8_t *data, size_t data_len, |
| size_t *out_kde_len) |
| { |
| struct ie_tlv_iter iter; |
| const uint8_t *result; |
| unsigned int len; |
| |
| ie_tlv_iter_init(&iter, data, data_len); |
| |
| while (ie_tlv_iter_next(&iter)) { |
| if (ie_tlv_iter_get_tag(&iter) != IE_TYPE_VENDOR_SPECIFIC) |
| continue; |
| |
| len = ie_tlv_iter_get_length(&iter); |
| if (len < 4) /* Take care of padding */ |
| return NULL; |
| |
| /* Check OUI */ |
| result = ie_tlv_iter_get_data(&iter); |
| if (l_get_be32(result) != selector) |
| continue; |
| |
| if (out_kde_len) |
| *out_kde_len = len - 4; |
| |
| return result + 4; |
| } |
| |
| return NULL; |
| } |
| |
| const uint8_t *handshake_util_find_gtk_kde(const uint8_t *data, size_t data_len, |
| size_t *out_gtk_len) |
| { |
| size_t gtk_len; |
| const uint8_t *gtk = handshake_util_find_kde(HANDSHAKE_KDE_GTK, |
| data, data_len, >k_len); |
| |
| if (!gtk) |
| return NULL; |
| |
| /* |
| * Account for KeyId, TX and Reserved octet |
| * See 802.11-2016, Figure 12-35 |
| */ |
| if (gtk_len < CRYPTO_MIN_GTK_LEN + 2) |
| return NULL; |
| |
| if (gtk_len > CRYPTO_MAX_GTK_LEN + 2) |
| return NULL; |
| |
| if (out_gtk_len) |
| *out_gtk_len = gtk_len; |
| |
| return gtk; |
| } |
| |
| const uint8_t *handshake_util_find_igtk_kde(const uint8_t *data, |
| size_t data_len, |
| size_t *out_igtk_len) |
| { |
| size_t igtk_len; |
| const uint8_t *igtk = handshake_util_find_kde(HANDSHAKE_KDE_IGTK, |
| data, data_len, &igtk_len); |
| |
| if (!igtk) |
| return NULL; |
| |
| /* |
| * Account for KeyId and IPN |
| * See 802.11-2016, Figure 12-42 |
| */ |
| if (igtk_len < CRYPTO_MIN_IGTK_LEN + 8) |
| return NULL; |
| |
| if (igtk_len > CRYPTO_MAX_IGTK_LEN + 8) |
| return NULL; |
| |
| if (out_igtk_len) |
| *out_igtk_len = igtk_len; |
| |
| return igtk; |
| } |
| |
| const uint8_t *handshake_util_find_pmkid_kde(const uint8_t *data, |
| size_t data_len) |
| { |
| const uint8_t *pmkid; |
| size_t pmkid_len; |
| |
| pmkid = handshake_util_find_kde(HANDSHAKE_KDE_PMKID, data, data_len, |
| &pmkid_len); |
| |
| if (pmkid && pmkid_len != 16) |
| return NULL; |
| |
| return pmkid; |
| } |
| |
| /* Defined in 802.11-2016 12.7.2 j), Figure 12-34 */ |
| void handshake_util_build_gtk_kde(enum crypto_cipher cipher, const uint8_t *key, |
| unsigned int key_index, uint8_t *to) |
| { |
| size_t key_len = crypto_cipher_key_len(cipher); |
| |
| *to++ = IE_TYPE_VENDOR_SPECIFIC; |
| *to++ = 6 + key_len; |
| l_put_be32(HANDSHAKE_KDE_GTK, to); |
| to += 4; |
| *to++ = key_index; |
| *to++ = 0; |
| memcpy(to, key, key_len); |
| } |
| |
| void handshake_util_build_igtk_kde(enum crypto_cipher cipher, const uint8_t *key, |
| unsigned int key_index, uint8_t *to) |
| { |
| size_t key_len = crypto_cipher_key_len(cipher); |
| |
| *to++ = IE_TYPE_VENDOR_SPECIFIC; |
| *to++ = 12 + key_len; |
| l_put_be32(HANDSHAKE_KDE_IGTK, to); |
| to += 4; |
| *to++ = key_index; |
| *to++ = 0; |
| |
| /** Initialize PN to zero **/ |
| memset(to, 0, 6); |
| to += 6; |
| |
| memcpy(to, key, key_len); |
| } |
| |
| static const uint8_t *handshake_state_get_ft_fils_kek(struct handshake_state *s, |
| size_t *len) |
| { |
| if (s->akm_suite & IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256) { |
| if (len) |
| *len = 16; |
| |
| return s->ptk + 64; |
| } else if (s->akm_suite & IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384) { |
| if (len) |
| *len = 32; |
| |
| return s->ptk + 104; |
| } |
| |
| return NULL; |
| } |
| |
| /* |
| * Unwrap a GTK / IGTK included in an FTE following 802.11-2012, Section 12.8.5: |
| * |
| * "If a GTK or an IGTK are included, the Key field of the subelement shall be |
| * encrypted using KEK and the NIST AES key wrap algorithm. The Key field shall |
| * be padded before encrypting if the key length is less than 16 octets or if |
| * it is not a multiple of 8. The padding consists of appending a single octet |
| * 0xdd followed by zero or more 0x00 octets. When processing a received |
| * message, the receiver shall ignore this trailing padding. Addition of |
| * padding does not change the value of the Key Length field. Note that the |
| * length of the encrypted Key field can be determined from the length of the |
| * GTK or IGTK subelement. |
| */ |
| bool handshake_decode_fte_key(struct handshake_state *s, const uint8_t *wrapped, |
| size_t key_len, uint8_t *key_out) |
| { |
| const uint8_t *kek; |
| size_t kek_len = handshake_state_get_kek_len(s); |
| size_t padded_len = key_len < 16 ? 16 : align_len(key_len, 8); |
| |
| if (s->akm_suite & (IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA256 | |
| IE_RSN_AKM_SUITE_FT_OVER_FILS_SHA384)) |
| kek = handshake_state_get_ft_fils_kek(s, &kek_len); |
| else |
| kek = handshake_state_get_kek(s); |
| |
| if (!aes_unwrap(kek, kek_len, wrapped, padded_len + 8, key_out)) |
| return false; |
| |
| if (key_len < padded_len && key_out[key_len++] != 0xdd) |
| return false; |
| |
| while (key_len < padded_len) |
| if (key_out[key_len++] != 0x00) |
| return false; |
| |
| return true; |
| } |
| |
| /* Add SAE-PT for ECC groups. The group is carried by the point itself */ |
| bool handshake_state_add_ecc_sae_pt(struct handshake_state *s, |
| const struct l_ecc_point *pt) |
| { |
| const struct l_ecc_curve *curve; |
| int i; |
| |
| if (!pt) |
| return false; |
| |
| curve = l_ecc_point_get_curve(pt); |
| |
| if (!s->ecc_sae_pts) |
| s->ecc_sae_pts = l_new(struct l_ecc_point *, n_ecc_groups()); |
| |
| if ((i = ecc_group_index(l_ecc_curve_get_ike_group(curve))) < 0) |
| return false; |
| |
| if (s->ecc_sae_pts[i]) |
| return false; |
| |
| s->ecc_sae_pts[i] = l_ecc_point_clone(pt); |
| return true; |
| } |
| |
| void handshake_state_set_chandef(struct handshake_state *s, |
| struct band_chandef *chandef) |
| { |
| if (s->chandef) |
| l_free(s->chandef); |
| |
| s->chandef = chandef; |
| } |
| |
| int handshake_state_verify_oci(struct handshake_state *s, const uint8_t *oci, |
| size_t oci_len) |
| { |
| int r = -ENOENT; |
| bool ocvc; |
| |
| l_debug("oci_len: %zu", oci ? oci_len : 0); |
| |
| if (!oci) |
| goto done; |
| |
| r = -EBADMSG; |
| if (oci_len != 3) |
| goto done; |
| |
| l_debug("operating_class: %hu", oci[0]); |
| l_debug("primary_channel_number: %hu", oci[1]); |
| l_debug("frequency segment 1 channel number: %hu", oci[2]); |
| |
| r = -EINVAL; |
| |
| if (!s->chandef) { |
| l_debug("Own chandef unavailable"); |
| goto done; |
| } |
| |
| r = oci_verify(oci, s->chandef); |
| if (r < 0) |
| l_debug("OCI verification failed: %s", strerror(-r)); |
| |
| done: |
| if (!r) |
| return r; |
| |
| /* Only enforce validation if we're configured to do so */ |
| ocvc = s->authenticator ? s->authenticator_ocvc : s->supplicant_ocvc; |
| if (!ocvc) |
| r = 0; |
| |
| return r; |
| } |
| |
| bool handshake_state_set_pmksa(struct handshake_state *s, |
| struct pmksa *pmksa) |
| { |
| /* checks for both expiration || pmksa being set */ |
| if (s->expiration) |
| return false; |
| |
| s->pmksa = pmksa; |
| s->have_pmksa = true; |
| |
| handshake_state_set_pmkid(s, pmksa->pmkid); |
| handshake_state_set_pmk(s, pmksa->pmk, pmksa->pmk_len); |
| |
| return true; |
| } |
| |
| static struct pmksa *handshake_state_steal_pmksa(struct handshake_state *s) |
| { |
| struct pmksa *pmksa; |
| uint64_t now = l_time_now(); |
| |
| if (s->have_pmksa) { |
| pmksa = l_steal_ptr(s->pmksa); |
| s->have_pmksa = false; |
| |
| if (l_time_after(now, pmksa->expiration)) { |
| pmksa_cache_free(pmksa); |
| pmksa = NULL; |
| } |
| |
| return pmksa; |
| } |
| |
| if (s->expiration && l_time_after(now, s->expiration)) { |
| s->expiration = 0; |
| return NULL; |
| } |
| |
| if (!s->have_pmkid) |
| return NULL; |
| |
| pmksa = l_new(struct pmksa, 1); |
| pmksa->expiration = s->expiration; |
| s->expiration = 0; |
| memcpy(pmksa->spa, s->spa, sizeof(s->spa)); |
| memcpy(pmksa->aa, s->aa, sizeof(s->aa)); |
| memcpy(pmksa->ssid, s->ssid, s->ssid_len); |
| pmksa->ssid_len = s->ssid_len; |
| pmksa->akm = s->akm_suite; |
| memcpy(pmksa->pmkid, s->pmkid, sizeof(s->pmkid)); |
| pmksa->pmk_len = s->pmk_len; |
| memcpy(pmksa->pmk, s->pmk, s->pmk_len); |
| |
| return pmksa; |
| } |
| |
| void handshake_state_cache_pmksa(struct handshake_state *s) |
| { |
| struct pmksa *pmksa = handshake_state_steal_pmksa(s); |
| |
| if (!pmksa) { |
| l_debug("No PMKSA for "MAC, MAC_STR(s->aa)); |
| return; |
| } |
| |
| l_debug("Caching PMKSA for "MAC, MAC_STR(s->aa)); |
| |
| if (L_WARN_ON(pmksa_cache_put(pmksa) < 0)) |
| pmksa_cache_free(pmksa); |
| } |
| |
| bool handshake_state_remove_pmksa(struct handshake_state *s) |
| { |
| struct pmksa *pmksa; |
| |
| if (!s->have_pmksa) |
| return false; |
| |
| pmksa = handshake_state_steal_pmksa(s); |
| if (!pmksa) |
| return false; |
| |
| pmksa_cache_free(pmksa); |
| |
| return true; |
| } |