rx_data.c 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884
  1. /*
  2. * Received Data frame processing
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include "utils/common.h"
  16. #include "crypto/aes_wrap.h"
  17. #include "crypto/crypto.h"
  18. #include "common/ieee802_11_defs.h"
  19. #include "common/eapol_common.h"
  20. #include "common/wpa_common.h"
  21. #include "rsn_supp/wpa_ie.h"
  22. #include "wlantest.h"
  23. static const char * data_stype(u16 stype)
  24. {
  25. switch (stype) {
  26. case WLAN_FC_STYPE_DATA:
  27. return "DATA";
  28. case WLAN_FC_STYPE_DATA_CFACK:
  29. return "DATA-CFACK";
  30. case WLAN_FC_STYPE_DATA_CFPOLL:
  31. return "DATA-CFPOLL";
  32. case WLAN_FC_STYPE_DATA_CFACKPOLL:
  33. return "DATA-CFACKPOLL";
  34. case WLAN_FC_STYPE_NULLFUNC:
  35. return "NULLFUNC";
  36. case WLAN_FC_STYPE_CFACK:
  37. return "CFACK";
  38. case WLAN_FC_STYPE_CFPOLL:
  39. return "CFPOLL";
  40. case WLAN_FC_STYPE_CFACKPOLL:
  41. return "CFACKPOLL";
  42. case WLAN_FC_STYPE_QOS_DATA:
  43. return "QOSDATA";
  44. case WLAN_FC_STYPE_QOS_DATA_CFACK:
  45. return "QOSDATA-CFACK";
  46. case WLAN_FC_STYPE_QOS_DATA_CFPOLL:
  47. return "QOSDATA-CFPOLL";
  48. case WLAN_FC_STYPE_QOS_DATA_CFACKPOLL:
  49. return "QOSDATA-CFACKPOLL";
  50. case WLAN_FC_STYPE_QOS_NULL:
  51. return "QOS-NULL";
  52. case WLAN_FC_STYPE_QOS_CFPOLL:
  53. return "QOS-CFPOLL";
  54. case WLAN_FC_STYPE_QOS_CFACKPOLL:
  55. return "QOS-CFACKPOLL";
  56. }
  57. return "??";
  58. }
  59. static int check_mic(const u8 *kck, int ver, const u8 *data, size_t len)
  60. {
  61. u8 *buf;
  62. int ret = -1;
  63. struct ieee802_1x_hdr *hdr;
  64. struct wpa_eapol_key *key;
  65. u8 rx_mic[16];
  66. buf = os_malloc(len);
  67. if (buf == NULL)
  68. return -1;
  69. os_memcpy(buf, data, len);
  70. hdr = (struct ieee802_1x_hdr *) buf;
  71. key = (struct wpa_eapol_key *) (hdr + 1);
  72. os_memcpy(rx_mic, key->key_mic, 16);
  73. os_memset(key->key_mic, 0, 16);
  74. if (wpa_eapol_key_mic(kck, ver, buf, len, key->key_mic) == 0 &&
  75. os_memcmp(rx_mic, key->key_mic, 16) == 0)
  76. ret = 0;
  77. os_free(buf);
  78. return ret;
  79. }
  80. static void rx_data_eapol_key_1_of_4(struct wlantest *wt, const u8 *dst,
  81. const u8 *src, const u8 *data, size_t len)
  82. {
  83. struct wlantest_bss *bss;
  84. struct wlantest_sta *sta;
  85. const struct ieee802_1x_hdr *eapol;
  86. const struct wpa_eapol_key *hdr;
  87. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/4 " MACSTR " -> " MACSTR,
  88. MAC2STR(src), MAC2STR(dst));
  89. bss = bss_get(wt, src);
  90. if (bss == NULL)
  91. return;
  92. sta = sta_get(bss, dst);
  93. if (sta == NULL)
  94. return;
  95. eapol = (const struct ieee802_1x_hdr *) data;
  96. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  97. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  98. }
  99. static int try_pmk(struct wlantest_bss *bss, struct wlantest_sta *sta,
  100. u16 ver, const u8 *data, size_t len,
  101. struct wlantest_pmk *pmk)
  102. {
  103. struct wpa_ptk ptk;
  104. size_t ptk_len = 48; /* FIX: 64 for TKIP */
  105. wpa_pmk_to_ptk(pmk->pmk, sizeof(pmk->pmk),
  106. "Pairwise key expansion",
  107. bss->bssid, sta->addr, sta->anonce, sta->snonce,
  108. (u8 *) &ptk, ptk_len,
  109. 0 /* FIX: SHA256 based on AKM */);
  110. if (check_mic(ptk.kck, ver, data, len) < 0)
  111. return -1;
  112. wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR,
  113. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  114. os_memcpy(&sta->ptk, &ptk, sizeof(ptk));
  115. wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, 16);
  116. wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, 16);
  117. wpa_hexdump(MSG_DEBUG, "PTK:TK1", sta->ptk.tk1, 16);
  118. if (ptk_len > 48)
  119. wpa_hexdump(MSG_DEBUG, "PTK:TK2", sta->ptk.u.tk2, 16);
  120. sta->ptk_set = 1;
  121. return 0;
  122. }
  123. static void derive_ptk(struct wlantest *wt, struct wlantest_bss *bss,
  124. struct wlantest_sta *sta, u16 ver,
  125. const u8 *data, size_t len)
  126. {
  127. struct wlantest_pmk *pmk;
  128. dl_list_for_each(pmk, &bss->pmk, struct wlantest_pmk, list) {
  129. if (try_pmk(bss, sta, ver, data, len, pmk) == 0)
  130. return;
  131. }
  132. dl_list_for_each(pmk, &wt->pmk, struct wlantest_pmk, list) {
  133. if (try_pmk(bss, sta, ver, data, len, pmk) == 0)
  134. return;
  135. }
  136. }
  137. static void rx_data_eapol_key_2_of_4(struct wlantest *wt, const u8 *dst,
  138. const u8 *src, const u8 *data, size_t len)
  139. {
  140. struct wlantest_bss *bss;
  141. struct wlantest_sta *sta;
  142. const struct ieee802_1x_hdr *eapol;
  143. const struct wpa_eapol_key *hdr;
  144. const u8 *key_data;
  145. u16 key_info, key_data_len;
  146. struct wpa_eapol_ie_parse ie;
  147. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/4 " MACSTR " -> " MACSTR,
  148. MAC2STR(src), MAC2STR(dst));
  149. bss = bss_get(wt, dst);
  150. if (bss == NULL)
  151. return;
  152. sta = sta_get(bss, src);
  153. if (sta == NULL)
  154. return;
  155. eapol = (const struct ieee802_1x_hdr *) data;
  156. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  157. os_memcpy(sta->snonce, hdr->key_nonce, WPA_NONCE_LEN);
  158. key_info = WPA_GET_BE16(hdr->key_info);
  159. key_data_len = WPA_GET_BE16(hdr->key_data_length);
  160. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK, data, len);
  161. if (!sta->ptk_set) {
  162. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 2/4");
  163. return;
  164. }
  165. if (check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  166. data, len) < 0) {
  167. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 2/4 MIC");
  168. return;
  169. }
  170. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 2/4");
  171. key_data = (const u8 *) (hdr + 1);
  172. if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) {
  173. wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  174. return;
  175. }
  176. if (ie.wpa_ie) {
  177. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  178. ie.wpa_ie, ie.wpa_ie_len);
  179. }
  180. if (ie.rsn_ie) {
  181. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  182. ie.rsn_ie, ie.rsn_ie_len);
  183. }
  184. }
  185. static u8 * decrypt_eapol_key_data_rc4(const u8 *kek,
  186. const struct wpa_eapol_key *hdr,
  187. size_t *len)
  188. {
  189. u8 ek[32], *buf;
  190. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  191. buf = os_malloc(keydatalen);
  192. if (buf == NULL)
  193. return NULL;
  194. os_memcpy(ek, hdr->key_iv, 16);
  195. os_memcpy(ek + 16, kek, 16);
  196. os_memcpy(buf, hdr + 1, keydatalen);
  197. if (rc4_skip(ek, 32, 256, buf, keydatalen)) {
  198. wpa_printf(MSG_INFO, "RC4 failed");
  199. os_free(buf);
  200. return NULL;
  201. }
  202. *len = keydatalen;
  203. return buf;
  204. }
  205. static u8 * decrypt_eapol_key_data_aes(const u8 *kek,
  206. const struct wpa_eapol_key *hdr,
  207. size_t *len)
  208. {
  209. u8 *buf;
  210. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  211. if (keydatalen % 8) {
  212. wpa_printf(MSG_INFO, "Unsupported AES-WRAP len %d",
  213. keydatalen);
  214. return NULL;
  215. }
  216. keydatalen -= 8; /* AES-WRAP adds 8 bytes */
  217. buf = os_malloc(keydatalen);
  218. if (buf == NULL)
  219. return NULL;
  220. if (aes_unwrap(kek, keydatalen / 8, (u8 *) (hdr + 1), buf)) {
  221. os_free(buf);
  222. wpa_printf(MSG_INFO, "AES unwrap failed - "
  223. "could not decrypt EAPOL-Key key data");
  224. return NULL;
  225. }
  226. *len = keydatalen;
  227. return buf;
  228. }
  229. static u8 * decrypt_eapol_key_data(const u8 *kek, u16 ver,
  230. const struct wpa_eapol_key *hdr,
  231. size_t *len)
  232. {
  233. switch (ver) {
  234. case WPA_KEY_INFO_TYPE_HMAC_MD5_RC4:
  235. return decrypt_eapol_key_data_rc4(kek, hdr, len);
  236. case WPA_KEY_INFO_TYPE_HMAC_SHA1_AES:
  237. case WPA_KEY_INFO_TYPE_AES_128_CMAC:
  238. return decrypt_eapol_key_data_aes(kek, hdr, len);
  239. default:
  240. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Key Descriptor "
  241. "Version %u", ver);
  242. return NULL;
  243. }
  244. }
  245. static void learn_kde_keys(struct wlantest_bss *bss, u8 *buf, size_t len)
  246. {
  247. struct wpa_eapol_ie_parse ie;
  248. if (wpa_supplicant_parse_ies(buf, len, &ie) < 0) {
  249. wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  250. return;
  251. }
  252. if (ie.wpa_ie) {
  253. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  254. ie.wpa_ie, ie.wpa_ie_len);
  255. }
  256. if (ie.rsn_ie) {
  257. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  258. ie.rsn_ie, ie.rsn_ie_len);
  259. }
  260. if (ie.gtk) {
  261. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - GTK KDE",
  262. ie.gtk, ie.gtk_len);
  263. if (ie.gtk_len >= 2 && ie.gtk_len <= 2 + 32) {
  264. int id;
  265. id = ie.gtk[0] & 0x03;
  266. wpa_printf(MSG_DEBUG, "GTK KeyID=%u tx=%u",
  267. id, !!(ie.gtk[0] & 0x04));
  268. if ((ie.gtk[0] & 0xf8) || ie.gtk[1])
  269. wpa_printf(MSG_INFO, "GTK KDE: Reserved field "
  270. "set: %02x %02x",
  271. ie.gtk[0], ie.gtk[1]);
  272. wpa_hexdump(MSG_DEBUG, "GTK", ie.gtk + 2,
  273. ie.gtk_len - 2);
  274. bss->gtk_len[id] = ie.gtk_len - 2;
  275. os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2);
  276. } else {
  277. wpa_printf(MSG_INFO, "Invalid GTK KDE length %u",
  278. (unsigned) ie.gtk_len);
  279. }
  280. }
  281. if (ie.igtk) {
  282. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - IGTK KDE",
  283. ie.igtk, ie.igtk_len);
  284. if (ie.igtk_len == 24) {
  285. u16 id;
  286. id = WPA_GET_LE16(ie.igtk);
  287. if (id > 5) {
  288. wpa_printf(MSG_INFO, "Unexpected IGTK KeyID "
  289. "%u", id);
  290. } else {
  291. wpa_printf(MSG_DEBUG, "IGTK KeyID %u", id);
  292. wpa_hexdump(MSG_DEBUG, "IPN", ie.igtk + 2, 6);
  293. wpa_hexdump(MSG_DEBUG, "IGTK", ie.igtk + 8,
  294. 16);
  295. os_memcpy(bss->igtk[id], ie.igtk + 8, 16);
  296. bss->igtk_set[id] = 1;
  297. }
  298. } else {
  299. wpa_printf(MSG_INFO, "Invalid IGTK KDE length %u",
  300. (unsigned) ie.igtk_len);
  301. }
  302. }
  303. }
  304. static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
  305. const u8 *src, const u8 *data, size_t len)
  306. {
  307. struct wlantest_bss *bss;
  308. struct wlantest_sta *sta;
  309. const struct ieee802_1x_hdr *eapol;
  310. const struct wpa_eapol_key *hdr;
  311. const u8 *key_data;
  312. int recalc = 0;
  313. u16 key_info, ver, key_data_len;
  314. u8 *decrypted;
  315. size_t decrypted_len = 0;
  316. wpa_printf(MSG_DEBUG, "EAPOL-Key 3/4 " MACSTR " -> " MACSTR,
  317. MAC2STR(src), MAC2STR(dst));
  318. bss = bss_get(wt, src);
  319. if (bss == NULL)
  320. return;
  321. sta = sta_get(bss, dst);
  322. if (sta == NULL)
  323. return;
  324. eapol = (const struct ieee802_1x_hdr *) data;
  325. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  326. key_info = WPA_GET_BE16(hdr->key_info);
  327. key_data_len = WPA_GET_BE16(hdr->key_data_length);
  328. if (os_memcmp(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN) != 0) {
  329. wpa_printf(MSG_INFO, "EAPOL-Key ANonce mismatch between 1/4 "
  330. "and 3/4");
  331. recalc = 1;
  332. }
  333. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  334. if (recalc) {
  335. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK,
  336. data, len);
  337. }
  338. if (!sta->ptk_set) {
  339. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 3/4");
  340. return;
  341. }
  342. if (check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  343. data, len) < 0) {
  344. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 3/4 MIC");
  345. return;
  346. }
  347. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 3/4");
  348. key_data = (const u8 *) (hdr + 1);
  349. /* TODO: handle WPA without EncrKeyData bit */
  350. if (!(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
  351. wpa_printf(MSG_INFO, "EAPOL-Key 3/4 without EncrKeyData bit");
  352. return;
  353. }
  354. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  355. decrypted = decrypt_eapol_key_data(sta->ptk.kek, ver, hdr,
  356. &decrypted_len);
  357. if (decrypted == NULL) {
  358. wpa_printf(MSG_INFO, "Failed to decrypt EAPOL-Key Key Data");
  359. return;
  360. }
  361. wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
  362. decrypted, decrypted_len);
  363. learn_kde_keys(bss, decrypted, decrypted_len);
  364. os_free(decrypted);
  365. }
  366. static void rx_data_eapol_key_4_of_4(struct wlantest *wt, const u8 *dst,
  367. const u8 *src, const u8 *data, size_t len)
  368. {
  369. struct wlantest_bss *bss;
  370. struct wlantest_sta *sta;
  371. const struct ieee802_1x_hdr *eapol;
  372. const struct wpa_eapol_key *hdr;
  373. u16 key_info;
  374. wpa_printf(MSG_DEBUG, "EAPOL-Key 4/4 " MACSTR " -> " MACSTR,
  375. MAC2STR(src), MAC2STR(dst));
  376. bss = bss_get(wt, dst);
  377. if (bss == NULL)
  378. return;
  379. sta = sta_get(bss, src);
  380. if (sta == NULL)
  381. return;
  382. eapol = (const struct ieee802_1x_hdr *) data;
  383. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  384. key_info = WPA_GET_BE16(hdr->key_info);
  385. if (!sta->ptk_set) {
  386. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 4/4");
  387. return;
  388. }
  389. if (sta->ptk_set &&
  390. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  391. data, len) < 0) {
  392. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 4/4 MIC");
  393. return;
  394. }
  395. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 4/4");
  396. }
  397. static void rx_data_eapol_key_1_of_2(struct wlantest *wt, const u8 *dst,
  398. const u8 *src, const u8 *data, size_t len)
  399. {
  400. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/2 " MACSTR " -> " MACSTR,
  401. MAC2STR(src), MAC2STR(dst));
  402. }
  403. static void rx_data_eapol_key_2_of_2(struct wlantest *wt, const u8 *dst,
  404. const u8 *src, const u8 *data, size_t len)
  405. {
  406. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/2 " MACSTR " -> " MACSTR,
  407. MAC2STR(src), MAC2STR(dst));
  408. }
  409. static void rx_data_eapol_key(struct wlantest *wt, const u8 *dst,
  410. const u8 *src, const u8 *data, size_t len,
  411. int prot)
  412. {
  413. const struct ieee802_1x_hdr *eapol;
  414. const struct wpa_eapol_key *hdr;
  415. const u8 *key_data;
  416. u16 key_info, key_length, ver, key_data_length;
  417. eapol = (const struct ieee802_1x_hdr *) data;
  418. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  419. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key",
  420. (const u8 *) hdr, len - sizeof(*eapol));
  421. if (len < sizeof(*hdr)) {
  422. wpa_printf(MSG_INFO, "Too short EAPOL-Key frame from " MACSTR,
  423. MAC2STR(src));
  424. return;
  425. }
  426. if (hdr->type == EAPOL_KEY_TYPE_RC4) {
  427. /* TODO: EAPOL-Key RC4 for WEP */
  428. return;
  429. }
  430. if (hdr->type != EAPOL_KEY_TYPE_RSN &&
  431. hdr->type != EAPOL_KEY_TYPE_WPA) {
  432. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key type %u",
  433. hdr->type);
  434. return;
  435. }
  436. key_info = WPA_GET_BE16(hdr->key_info);
  437. key_length = WPA_GET_BE16(hdr->key_length);
  438. key_data_length = WPA_GET_BE16(hdr->key_data_length);
  439. key_data = (const u8 *) (hdr + 1);
  440. if (key_data + key_data_length > data + len) {
  441. wpa_printf(MSG_INFO, "Truncated EAPOL-Key from " MACSTR,
  442. MAC2STR(src));
  443. return;
  444. }
  445. if (key_data + key_data_length < data + len) {
  446. wpa_hexdump(MSG_DEBUG, "Extra data after EAPOL-Key Key Data "
  447. "field", key_data + key_data_length,
  448. data + len - key_data - key_data_length);
  449. }
  450. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  451. wpa_printf(MSG_DEBUG, "EAPOL-Key ver=%u %c idx=%u%s%s%s%s%s%s%s%s "
  452. "datalen=%u",
  453. ver, key_info & WPA_KEY_INFO_KEY_TYPE ? 'P' : 'G',
  454. (key_info & WPA_KEY_INFO_KEY_INDEX_MASK) >>
  455. WPA_KEY_INFO_KEY_INDEX_SHIFT,
  456. (key_info & WPA_KEY_INFO_INSTALL) ? " Install" : "",
  457. (key_info & WPA_KEY_INFO_ACK) ? " ACK" : "",
  458. (key_info & WPA_KEY_INFO_MIC) ? " MIC" : "",
  459. (key_info & WPA_KEY_INFO_SECURE) ? " Secure" : "",
  460. (key_info & WPA_KEY_INFO_ERROR) ? " Error" : "",
  461. (key_info & WPA_KEY_INFO_REQUEST) ? " Request" : "",
  462. (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) ? " Encr" : "",
  463. (key_info & WPA_KEY_INFO_SMK_MESSAGE) ? " SMK" : "",
  464. key_data_length);
  465. if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
  466. ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
  467. ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
  468. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key Key Descriptor "
  469. "Version %u", ver);
  470. return;
  471. }
  472. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Replay Counter",
  473. hdr->replay_counter, WPA_REPLAY_COUNTER_LEN);
  474. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Nonce",
  475. hdr->key_nonce, WPA_NONCE_LEN);
  476. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key IV",
  477. hdr->key_iv, 16);
  478. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key RSC",
  479. hdr->key_nonce, WPA_KEY_RSC_LEN);
  480. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key MIC",
  481. hdr->key_mic, 16);
  482. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data",
  483. key_data, key_data_length);
  484. if (key_info & (WPA_KEY_INFO_ERROR | WPA_KEY_INFO_REQUEST))
  485. return;
  486. if (key_info & WPA_KEY_INFO_SMK_MESSAGE)
  487. return;
  488. if (key_info & WPA_KEY_INFO_KEY_TYPE) {
  489. /* 4-Way Handshake */
  490. switch (key_info & (WPA_KEY_INFO_SECURE |
  491. WPA_KEY_INFO_MIC |
  492. WPA_KEY_INFO_ACK |
  493. WPA_KEY_INFO_INSTALL)) {
  494. case WPA_KEY_INFO_ACK:
  495. rx_data_eapol_key_1_of_4(wt, dst, src, data, len);
  496. break;
  497. case WPA_KEY_INFO_MIC:
  498. rx_data_eapol_key_2_of_4(wt, dst, src, data, len);
  499. break;
  500. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  501. WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL:
  502. rx_data_eapol_key_3_of_4(wt, dst, src, data, len);
  503. break;
  504. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  505. rx_data_eapol_key_4_of_4(wt, dst, src, data, len);
  506. break;
  507. default:
  508. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  509. break;
  510. }
  511. } else {
  512. /* Group Key Handshake */
  513. switch (key_info & (WPA_KEY_INFO_SECURE |
  514. WPA_KEY_INFO_MIC |
  515. WPA_KEY_INFO_ACK)) {
  516. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  517. WPA_KEY_INFO_ACK:
  518. rx_data_eapol_key_1_of_2(wt, dst, src, data, len);
  519. break;
  520. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  521. rx_data_eapol_key_2_of_2(wt, dst, src, data, len);
  522. break;
  523. default:
  524. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  525. break;
  526. }
  527. }
  528. }
  529. static void rx_data_eapol(struct wlantest *wt, const u8 *dst, const u8 *src,
  530. const u8 *data, size_t len, int prot)
  531. {
  532. const struct ieee802_1x_hdr *hdr;
  533. u16 length;
  534. const u8 *p;
  535. wpa_hexdump(MSG_EXCESSIVE, "EAPOL", data, len);
  536. if (len < sizeof(*hdr)) {
  537. wpa_printf(MSG_INFO, "Too short EAPOL frame from " MACSTR,
  538. MAC2STR(src));
  539. return;
  540. }
  541. hdr = (const struct ieee802_1x_hdr *) data;
  542. length = be_to_host16(hdr->length);
  543. wpa_printf(MSG_DEBUG, "RX EAPOL: " MACSTR " -> " MACSTR "%s ver=%u "
  544. "type=%u len=%u",
  545. MAC2STR(src), MAC2STR(dst), prot ? " Prot" : "",
  546. hdr->version, hdr->type, length);
  547. if (sizeof(*hdr) + length > len) {
  548. wpa_printf(MSG_INFO, "Truncated EAPOL frame from " MACSTR,
  549. MAC2STR(src));
  550. return;
  551. }
  552. if (sizeof(*hdr) + length < len) {
  553. wpa_printf(MSG_INFO, "EAPOL frame with %d extra bytes",
  554. (int) (len - sizeof(*hdr) - length));
  555. }
  556. p = (const u8 *) (hdr + 1);
  557. switch (hdr->type) {
  558. case IEEE802_1X_TYPE_EAP_PACKET:
  559. wpa_hexdump(MSG_MSGDUMP, "EAPOL - EAP packet", p, length);
  560. break;
  561. case IEEE802_1X_TYPE_EAPOL_START:
  562. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Start", p, length);
  563. break;
  564. case IEEE802_1X_TYPE_EAPOL_LOGOFF:
  565. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Logoff", p, length);
  566. break;
  567. case IEEE802_1X_TYPE_EAPOL_KEY:
  568. rx_data_eapol_key(wt, dst, src, data, sizeof(*hdr) + length,
  569. prot);
  570. break;
  571. case IEEE802_1X_TYPE_EAPOL_ENCAPSULATED_ASF_ALERT:
  572. wpa_hexdump(MSG_MSGDUMP, "EAPOL - Encapsulated ASF alert",
  573. p, length);
  574. break;
  575. default:
  576. wpa_hexdump(MSG_MSGDUMP, "Unknown EAPOL payload", p, length);
  577. break;
  578. }
  579. }
  580. static void rx_data_eth(struct wlantest *wt, const u8 *dst, const u8 *src,
  581. u16 ethertype, const u8 *data, size_t len, int prot)
  582. {
  583. if (ethertype == ETH_P_PAE)
  584. rx_data_eapol(wt, dst, src, data, len, prot);
  585. }
  586. static void rx_data_process(struct wlantest *wt, const u8 *dst, const u8 *src,
  587. const u8 *data, size_t len, int prot)
  588. {
  589. if (len == 0)
  590. return;
  591. if (len >= 8 && os_memcmp(data, "\xaa\xaa\x03\x00\x00\x00", 6) == 0) {
  592. rx_data_eth(wt, dst, src, WPA_GET_BE16(data + 6),
  593. data + 8, len - 8, prot);
  594. return;
  595. }
  596. wpa_hexdump(MSG_DEBUG, "Unrecognized LLC", data, len > 8 ? 8 : len);
  597. }
  598. static void rx_data_bss_prot_group(struct wlantest *wt,
  599. const struct ieee80211_hdr *hdr,
  600. const u8 *qos, const u8 *dst, const u8 *src,
  601. const u8 *data, size_t len)
  602. {
  603. struct wlantest_bss *bss;
  604. int keyid;
  605. u8 *decrypted;
  606. size_t dlen;
  607. bss = bss_get(wt, hdr->addr2);
  608. if (bss == NULL)
  609. return;
  610. if (len < 4) {
  611. wpa_printf(MSG_INFO, "Too short group addressed data frame");
  612. return;
  613. }
  614. keyid = data[3] >> 6;
  615. if (bss->gtk_len[keyid] == 0) {
  616. wpa_printf(MSG_MSGDUMP, "No GTK known to decrypt the frame "
  617. "(A2=" MACSTR " KeyID=%d)",
  618. MAC2STR(hdr->addr2), keyid);
  619. return;
  620. }
  621. /* TODO: check PN for replay */
  622. /* TODO: TKIP */
  623. decrypted = ccmp_decrypt(bss->gtk[keyid], hdr, data, len, &dlen);
  624. if (decrypted)
  625. rx_data_process(wt, dst, src, decrypted, dlen, 1);
  626. os_free(decrypted);
  627. }
  628. static void rx_data_bss_prot(struct wlantest *wt,
  629. const struct ieee80211_hdr *hdr, const u8 *qos,
  630. const u8 *dst, const u8 *src, const u8 *data,
  631. size_t len)
  632. {
  633. struct wlantest_bss *bss;
  634. struct wlantest_sta *sta;
  635. int keyid;
  636. u16 fc = le_to_host16(hdr->frame_control);
  637. u8 *decrypted;
  638. size_t dlen;
  639. if (hdr->addr1[0] & 0x01) {
  640. rx_data_bss_prot_group(wt, hdr, qos, dst, src, data, len);
  641. return;
  642. }
  643. if (fc & WLAN_FC_TODS) {
  644. bss = bss_get(wt, hdr->addr1);
  645. if (bss == NULL)
  646. return;
  647. sta = sta_get(bss, hdr->addr2);
  648. } else {
  649. bss = bss_get(wt, hdr->addr2);
  650. if (bss == NULL)
  651. return;
  652. sta = sta_get(bss, hdr->addr1);
  653. }
  654. if (sta == NULL || !sta->ptk_set) {
  655. wpa_printf(MSG_MSGDUMP, "No PTK known to decrypt the frame");
  656. return;
  657. }
  658. if (len < 4) {
  659. wpa_printf(MSG_INFO, "Too short encrypted data frame");
  660. return;
  661. }
  662. keyid = data[3] >> 6;
  663. if (keyid != 0) {
  664. wpa_printf(MSG_INFO, "Unexpected non-zero KeyID %d in "
  665. "individually addressed Data frame from " MACSTR,
  666. keyid, MAC2STR(hdr->addr2));
  667. }
  668. /* TODO: check PN for replay */
  669. /* TODO: TKIP */
  670. decrypted = ccmp_decrypt(sta->ptk.tk1, hdr, data, len, &dlen);
  671. if (decrypted)
  672. rx_data_process(wt, dst, src, decrypted, dlen, 1);
  673. os_free(decrypted);
  674. }
  675. static void rx_data_bss(struct wlantest *wt, const struct ieee80211_hdr *hdr,
  676. const u8 *qos, const u8 *dst, const u8 *src,
  677. const u8 *data, size_t len)
  678. {
  679. u16 fc = le_to_host16(hdr->frame_control);
  680. int prot = !!(fc & WLAN_FC_ISWEP);
  681. if (qos) {
  682. u8 ack = (qos[0] & 0x60) >> 5;
  683. wpa_printf(MSG_MSGDUMP, "BSS DATA: " MACSTR " -> " MACSTR
  684. " len=%u%s tid=%u%s%s",
  685. MAC2STR(src), MAC2STR(dst), (unsigned int) len,
  686. prot ? " Prot" : "", qos[0] & 0x0f,
  687. (qos[0] & 0x10) ? " EOSP" : "",
  688. ack == 0 ? "" :
  689. (ack == 1 ? " NoAck" :
  690. (ack == 2 ? " NoExpAck" : " BA")));
  691. } else {
  692. wpa_printf(MSG_MSGDUMP, "BSS DATA: " MACSTR " -> " MACSTR
  693. " len=%u%s",
  694. MAC2STR(src), MAC2STR(dst), (unsigned int) len,
  695. prot ? " Prot" : "");
  696. }
  697. if (prot)
  698. rx_data_bss_prot(wt, hdr, qos, dst, src, data, len);
  699. else
  700. rx_data_process(wt, dst, src, data, len, 0);
  701. }
  702. void rx_data(struct wlantest *wt, const u8 *data, size_t len)
  703. {
  704. const struct ieee80211_hdr *hdr;
  705. u16 fc, stype;
  706. size_t hdrlen;
  707. const u8 *qos = NULL;
  708. if (len < 24)
  709. return;
  710. hdr = (const struct ieee80211_hdr *) data;
  711. fc = le_to_host16(hdr->frame_control);
  712. stype = WLAN_FC_GET_STYPE(fc);
  713. hdrlen = 24;
  714. if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
  715. (WLAN_FC_TODS | WLAN_FC_FROMDS))
  716. hdrlen += ETH_ALEN;
  717. if (stype & 0x08) {
  718. qos = data + hdrlen;
  719. hdrlen += 2;
  720. }
  721. if (len < hdrlen)
  722. return;
  723. wt->rx_data++;
  724. switch (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) {
  725. case 0:
  726. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s IBSS DA=" MACSTR " SA="
  727. MACSTR " BSSID=" MACSTR,
  728. data_stype(WLAN_FC_GET_STYPE(fc)),
  729. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  730. fc & WLAN_FC_ISWEP ? " Prot" : "",
  731. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  732. MAC2STR(hdr->addr3));
  733. break;
  734. case WLAN_FC_FROMDS:
  735. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s FromDS DA=" MACSTR
  736. " BSSID=" MACSTR " SA=" MACSTR,
  737. data_stype(WLAN_FC_GET_STYPE(fc)),
  738. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  739. fc & WLAN_FC_ISWEP ? " Prot" : "",
  740. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  741. MAC2STR(hdr->addr3));
  742. rx_data_bss(wt, hdr, qos, hdr->addr1, hdr->addr2,
  743. data + hdrlen, len - hdrlen);
  744. break;
  745. case WLAN_FC_TODS:
  746. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s ToDS BSSID=" MACSTR
  747. " SA=" MACSTR " DA=" MACSTR,
  748. data_stype(WLAN_FC_GET_STYPE(fc)),
  749. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  750. fc & WLAN_FC_ISWEP ? " Prot" : "",
  751. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  752. MAC2STR(hdr->addr3));
  753. rx_data_bss(wt, hdr, qos, hdr->addr3, hdr->addr2,
  754. data + hdrlen, len - hdrlen);
  755. break;
  756. case WLAN_FC_TODS | WLAN_FC_FROMDS:
  757. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s WDS RA=" MACSTR " TA="
  758. MACSTR " DA=" MACSTR " SA=" MACSTR,
  759. data_stype(WLAN_FC_GET_STYPE(fc)),
  760. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  761. fc & WLAN_FC_ISWEP ? " Prot" : "",
  762. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  763. MAC2STR(hdr->addr3),
  764. MAC2STR((const u8 *) (hdr + 1)));
  765. break;
  766. }
  767. }