rx_data.c 37 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337
  1. /*
  2. * Received Data frame processing
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "utils/includes.h"
  15. #include "utils/common.h"
  16. #include "crypto/aes_wrap.h"
  17. #include "crypto/crypto.h"
  18. #include "common/defs.h"
  19. #include "common/ieee802_11_defs.h"
  20. #include "common/eapol_common.h"
  21. #include "common/wpa_common.h"
  22. #include "rsn_supp/wpa_ie.h"
  23. #include "wlantest.h"
  24. static int is_zero(const u8 *buf, size_t len)
  25. {
  26. size_t i;
  27. for (i = 0; i < len; i++) {
  28. if (buf[i])
  29. return 0;
  30. }
  31. return 1;
  32. }
  33. static const char * data_stype(u16 stype)
  34. {
  35. switch (stype) {
  36. case WLAN_FC_STYPE_DATA:
  37. return "DATA";
  38. case WLAN_FC_STYPE_DATA_CFACK:
  39. return "DATA-CFACK";
  40. case WLAN_FC_STYPE_DATA_CFPOLL:
  41. return "DATA-CFPOLL";
  42. case WLAN_FC_STYPE_DATA_CFACKPOLL:
  43. return "DATA-CFACKPOLL";
  44. case WLAN_FC_STYPE_NULLFUNC:
  45. return "NULLFUNC";
  46. case WLAN_FC_STYPE_CFACK:
  47. return "CFACK";
  48. case WLAN_FC_STYPE_CFPOLL:
  49. return "CFPOLL";
  50. case WLAN_FC_STYPE_CFACKPOLL:
  51. return "CFACKPOLL";
  52. case WLAN_FC_STYPE_QOS_DATA:
  53. return "QOSDATA";
  54. case WLAN_FC_STYPE_QOS_DATA_CFACK:
  55. return "QOSDATA-CFACK";
  56. case WLAN_FC_STYPE_QOS_DATA_CFPOLL:
  57. return "QOSDATA-CFPOLL";
  58. case WLAN_FC_STYPE_QOS_DATA_CFACKPOLL:
  59. return "QOSDATA-CFACKPOLL";
  60. case WLAN_FC_STYPE_QOS_NULL:
  61. return "QOS-NULL";
  62. case WLAN_FC_STYPE_QOS_CFPOLL:
  63. return "QOS-CFPOLL";
  64. case WLAN_FC_STYPE_QOS_CFACKPOLL:
  65. return "QOS-CFACKPOLL";
  66. }
  67. return "??";
  68. }
  69. static int check_mic(const u8 *kck, int ver, const u8 *data, size_t len)
  70. {
  71. u8 *buf;
  72. int ret = -1;
  73. struct ieee802_1x_hdr *hdr;
  74. struct wpa_eapol_key *key;
  75. u8 rx_mic[16];
  76. buf = os_malloc(len);
  77. if (buf == NULL)
  78. return -1;
  79. os_memcpy(buf, data, len);
  80. hdr = (struct ieee802_1x_hdr *) buf;
  81. key = (struct wpa_eapol_key *) (hdr + 1);
  82. os_memcpy(rx_mic, key->key_mic, 16);
  83. os_memset(key->key_mic, 0, 16);
  84. if (wpa_eapol_key_mic(kck, ver, buf, len, key->key_mic) == 0 &&
  85. os_memcmp(rx_mic, key->key_mic, 16) == 0)
  86. ret = 0;
  87. os_free(buf);
  88. return ret;
  89. }
  90. static void rx_data_eapol_key_1_of_4(struct wlantest *wt, const u8 *dst,
  91. const u8 *src, const u8 *data, size_t len)
  92. {
  93. struct wlantest_bss *bss;
  94. struct wlantest_sta *sta;
  95. const struct ieee802_1x_hdr *eapol;
  96. const struct wpa_eapol_key *hdr;
  97. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/4 " MACSTR " -> " MACSTR,
  98. MAC2STR(src), MAC2STR(dst));
  99. bss = bss_get(wt, src);
  100. if (bss == NULL)
  101. return;
  102. sta = sta_get(bss, dst);
  103. if (sta == NULL)
  104. return;
  105. eapol = (const struct ieee802_1x_hdr *) data;
  106. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  107. if (is_zero(hdr->key_nonce, WPA_NONCE_LEN)) {
  108. wpa_printf(MSG_INFO, "EAPOL-Key 1/4 from " MACSTR " used "
  109. "zero nonce", MAC2STR(src));
  110. }
  111. if (!is_zero(hdr->key_rsc, 8)) {
  112. wpa_printf(MSG_INFO, "EAPOL-Key 1/4 from " MACSTR " used "
  113. "non-zero Key RSC", MAC2STR(src));
  114. }
  115. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  116. }
  117. static int try_pmk(struct wlantest_bss *bss, struct wlantest_sta *sta,
  118. u16 ver, const u8 *data, size_t len,
  119. struct wlantest_pmk *pmk)
  120. {
  121. struct wpa_ptk ptk;
  122. size_t ptk_len = sta->pairwise_cipher == WPA_CIPHER_TKIP ? 64 : 48;
  123. wpa_pmk_to_ptk(pmk->pmk, sizeof(pmk->pmk),
  124. "Pairwise key expansion",
  125. bss->bssid, sta->addr, sta->anonce, sta->snonce,
  126. (u8 *) &ptk, ptk_len,
  127. wpa_key_mgmt_sha256(sta->key_mgmt));
  128. if (check_mic(ptk.kck, ver, data, len) < 0)
  129. return -1;
  130. wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR,
  131. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  132. sta->counters[WLANTEST_STA_COUNTER_PTK_LEARNED]++;
  133. os_memcpy(&sta->ptk, &ptk, sizeof(ptk));
  134. wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, 16);
  135. wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, 16);
  136. wpa_hexdump(MSG_DEBUG, "PTK:TK1", sta->ptk.tk1, 16);
  137. if (ptk_len > 48)
  138. wpa_hexdump(MSG_DEBUG, "PTK:TK2", sta->ptk.u.tk2, 16);
  139. sta->ptk_set = 1;
  140. os_memset(sta->rsc_tods, 0, sizeof(sta->rsc_tods));
  141. os_memset(sta->rsc_fromds, 0, sizeof(sta->rsc_fromds));
  142. return 0;
  143. }
  144. static void derive_ptk(struct wlantest *wt, struct wlantest_bss *bss,
  145. struct wlantest_sta *sta, u16 ver,
  146. const u8 *data, size_t len)
  147. {
  148. struct wlantest_pmk *pmk;
  149. dl_list_for_each(pmk, &bss->pmk, struct wlantest_pmk, list) {
  150. if (try_pmk(bss, sta, ver, data, len, pmk) == 0)
  151. return;
  152. }
  153. dl_list_for_each(pmk, &wt->pmk, struct wlantest_pmk, list) {
  154. if (try_pmk(bss, sta, ver, data, len, pmk) == 0)
  155. return;
  156. }
  157. }
  158. static void rx_data_eapol_key_2_of_4(struct wlantest *wt, const u8 *dst,
  159. const u8 *src, const u8 *data, size_t len)
  160. {
  161. struct wlantest_bss *bss;
  162. struct wlantest_sta *sta;
  163. const struct ieee802_1x_hdr *eapol;
  164. const struct wpa_eapol_key *hdr;
  165. const u8 *key_data;
  166. u16 key_info, key_data_len;
  167. struct wpa_eapol_ie_parse ie;
  168. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/4 " MACSTR " -> " MACSTR,
  169. MAC2STR(src), MAC2STR(dst));
  170. bss = bss_get(wt, dst);
  171. if (bss == NULL)
  172. return;
  173. sta = sta_get(bss, src);
  174. if (sta == NULL)
  175. return;
  176. eapol = (const struct ieee802_1x_hdr *) data;
  177. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  178. if (is_zero(hdr->key_nonce, WPA_NONCE_LEN)) {
  179. wpa_printf(MSG_INFO, "EAPOL-Key 2/4 from " MACSTR " used "
  180. "zero nonce", MAC2STR(src));
  181. }
  182. if (!is_zero(hdr->key_rsc, 8)) {
  183. wpa_printf(MSG_INFO, "EAPOL-Key 2/4 from " MACSTR " used "
  184. "non-zero Key RSC", MAC2STR(src));
  185. }
  186. os_memcpy(sta->snonce, hdr->key_nonce, WPA_NONCE_LEN);
  187. key_info = WPA_GET_BE16(hdr->key_info);
  188. key_data_len = WPA_GET_BE16(hdr->key_data_length);
  189. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK, data, len);
  190. if (!sta->ptk_set) {
  191. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 2/4");
  192. return;
  193. }
  194. if (check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  195. data, len) < 0) {
  196. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 2/4 MIC");
  197. return;
  198. }
  199. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 2/4");
  200. key_data = (const u8 *) (hdr + 1);
  201. if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) {
  202. wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  203. return;
  204. }
  205. if (ie.wpa_ie) {
  206. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  207. ie.wpa_ie, ie.wpa_ie_len);
  208. if (os_memcmp(ie.wpa_ie, sta->rsnie, ie.wpa_ie_len) != 0) {
  209. wpa_printf(MSG_INFO, "Mismatch in WPA IE between "
  210. "EAPOL-Key 2/4 and (Re)Association "
  211. "Request from " MACSTR, MAC2STR(sta->addr));
  212. wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
  213. ie.wpa_ie, ie.wpa_ie_len);
  214. wpa_hexdump(MSG_INFO, "WPA IE in (Re)Association "
  215. "Request",
  216. sta->rsnie,
  217. sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
  218. }
  219. }
  220. if (ie.rsn_ie) {
  221. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  222. ie.rsn_ie, ie.rsn_ie_len);
  223. if (os_memcmp(ie.rsn_ie, sta->rsnie, ie.rsn_ie_len) != 0) {
  224. wpa_printf(MSG_INFO, "Mismatch in RSN IE between "
  225. "EAPOL-Key 2/4 and (Re)Association "
  226. "Request from " MACSTR, MAC2STR(sta->addr));
  227. wpa_hexdump(MSG_INFO, "RSN IE in EAPOL-Key",
  228. ie.rsn_ie, ie.rsn_ie_len);
  229. wpa_hexdump(MSG_INFO, "RSN IE in (Re)Association "
  230. "Request",
  231. sta->rsnie,
  232. sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
  233. }
  234. }
  235. }
  236. static u8 * decrypt_eapol_key_data_rc4(const u8 *kek,
  237. const struct wpa_eapol_key *hdr,
  238. size_t *len)
  239. {
  240. u8 ek[32], *buf;
  241. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  242. buf = os_malloc(keydatalen);
  243. if (buf == NULL)
  244. return NULL;
  245. os_memcpy(ek, hdr->key_iv, 16);
  246. os_memcpy(ek + 16, kek, 16);
  247. os_memcpy(buf, hdr + 1, keydatalen);
  248. if (rc4_skip(ek, 32, 256, buf, keydatalen)) {
  249. wpa_printf(MSG_INFO, "RC4 failed");
  250. os_free(buf);
  251. return NULL;
  252. }
  253. *len = keydatalen;
  254. return buf;
  255. }
  256. static u8 * decrypt_eapol_key_data_aes(const u8 *kek,
  257. const struct wpa_eapol_key *hdr,
  258. size_t *len)
  259. {
  260. u8 *buf;
  261. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  262. if (keydatalen % 8) {
  263. wpa_printf(MSG_INFO, "Unsupported AES-WRAP len %d",
  264. keydatalen);
  265. return NULL;
  266. }
  267. keydatalen -= 8; /* AES-WRAP adds 8 bytes */
  268. buf = os_malloc(keydatalen);
  269. if (buf == NULL)
  270. return NULL;
  271. if (aes_unwrap(kek, keydatalen / 8, (u8 *) (hdr + 1), buf)) {
  272. os_free(buf);
  273. wpa_printf(MSG_INFO, "AES unwrap failed - "
  274. "could not decrypt EAPOL-Key key data");
  275. return NULL;
  276. }
  277. *len = keydatalen;
  278. return buf;
  279. }
  280. static u8 * decrypt_eapol_key_data(const u8 *kek, u16 ver,
  281. const struct wpa_eapol_key *hdr,
  282. size_t *len)
  283. {
  284. switch (ver) {
  285. case WPA_KEY_INFO_TYPE_HMAC_MD5_RC4:
  286. return decrypt_eapol_key_data_rc4(kek, hdr, len);
  287. case WPA_KEY_INFO_TYPE_HMAC_SHA1_AES:
  288. case WPA_KEY_INFO_TYPE_AES_128_CMAC:
  289. return decrypt_eapol_key_data_aes(kek, hdr, len);
  290. default:
  291. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Key Descriptor "
  292. "Version %u", ver);
  293. return NULL;
  294. }
  295. }
  296. static void learn_kde_keys(struct wlantest_bss *bss, const u8 *buf, size_t len,
  297. const u8 *rsc)
  298. {
  299. struct wpa_eapol_ie_parse ie;
  300. if (wpa_supplicant_parse_ies(buf, len, &ie) < 0) {
  301. wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  302. return;
  303. }
  304. if (ie.wpa_ie) {
  305. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  306. ie.wpa_ie, ie.wpa_ie_len);
  307. }
  308. if (ie.rsn_ie) {
  309. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  310. ie.rsn_ie, ie.rsn_ie_len);
  311. }
  312. if (ie.gtk) {
  313. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - GTK KDE",
  314. ie.gtk, ie.gtk_len);
  315. if (ie.gtk_len >= 2 && ie.gtk_len <= 2 + 32) {
  316. int id;
  317. id = ie.gtk[0] & 0x03;
  318. wpa_printf(MSG_DEBUG, "GTK KeyID=%u tx=%u",
  319. id, !!(ie.gtk[0] & 0x04));
  320. if ((ie.gtk[0] & 0xf8) || ie.gtk[1])
  321. wpa_printf(MSG_INFO, "GTK KDE: Reserved field "
  322. "set: %02x %02x",
  323. ie.gtk[0], ie.gtk[1]);
  324. wpa_hexdump(MSG_DEBUG, "GTK", ie.gtk + 2,
  325. ie.gtk_len - 2);
  326. bss->gtk_len[id] = ie.gtk_len - 2;
  327. os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2);
  328. bss->rsc[id][0] = rsc[5];
  329. bss->rsc[id][1] = rsc[4];
  330. bss->rsc[id][2] = rsc[3];
  331. bss->rsc[id][3] = rsc[2];
  332. bss->rsc[id][4] = rsc[1];
  333. bss->rsc[id][5] = rsc[0];
  334. wpa_hexdump(MSG_DEBUG, "RSC", bss->rsc[id], 6);
  335. } else {
  336. wpa_printf(MSG_INFO, "Invalid GTK KDE length %u",
  337. (unsigned) ie.gtk_len);
  338. }
  339. }
  340. if (ie.igtk) {
  341. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - IGTK KDE",
  342. ie.igtk, ie.igtk_len);
  343. if (ie.igtk_len == 24) {
  344. u16 id;
  345. id = WPA_GET_LE16(ie.igtk);
  346. if (id > 5) {
  347. wpa_printf(MSG_INFO, "Unexpected IGTK KeyID "
  348. "%u", id);
  349. } else {
  350. wpa_printf(MSG_DEBUG, "IGTK KeyID %u", id);
  351. wpa_hexdump(MSG_DEBUG, "IPN", ie.igtk + 2, 6);
  352. wpa_hexdump(MSG_DEBUG, "IGTK", ie.igtk + 8,
  353. 16);
  354. os_memcpy(bss->igtk[id], ie.igtk + 8, 16);
  355. bss->igtk_set[id] = 1;
  356. }
  357. } else {
  358. wpa_printf(MSG_INFO, "Invalid IGTK KDE length %u",
  359. (unsigned) ie.igtk_len);
  360. }
  361. }
  362. }
  363. static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
  364. const u8 *src, const u8 *data, size_t len)
  365. {
  366. struct wlantest_bss *bss;
  367. struct wlantest_sta *sta;
  368. const struct ieee802_1x_hdr *eapol;
  369. const struct wpa_eapol_key *hdr;
  370. const u8 *key_data;
  371. int recalc = 0;
  372. u16 key_info, ver;
  373. u8 *decrypted_buf = NULL;
  374. const u8 *decrypted;
  375. size_t decrypted_len = 0;
  376. struct wpa_eapol_ie_parse ie;
  377. wpa_printf(MSG_DEBUG, "EAPOL-Key 3/4 " MACSTR " -> " MACSTR,
  378. MAC2STR(src), MAC2STR(dst));
  379. bss = bss_get(wt, src);
  380. if (bss == NULL)
  381. return;
  382. sta = sta_get(bss, dst);
  383. if (sta == NULL)
  384. return;
  385. eapol = (const struct ieee802_1x_hdr *) data;
  386. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  387. key_info = WPA_GET_BE16(hdr->key_info);
  388. if (os_memcmp(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN) != 0) {
  389. wpa_printf(MSG_INFO, "EAPOL-Key ANonce mismatch between 1/4 "
  390. "and 3/4");
  391. recalc = 1;
  392. }
  393. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  394. if (recalc) {
  395. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK,
  396. data, len);
  397. }
  398. if (!sta->ptk_set) {
  399. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 3/4");
  400. return;
  401. }
  402. if (check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  403. data, len) < 0) {
  404. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 3/4 MIC");
  405. return;
  406. }
  407. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 3/4");
  408. key_data = (const u8 *) (hdr + 1);
  409. if (!(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
  410. if (sta->proto & WPA_PROTO_RSN)
  411. wpa_printf(MSG_INFO, "EAPOL-Key 3/4 without "
  412. "EncrKeyData bit");
  413. decrypted = key_data;
  414. decrypted_len = WPA_GET_BE16(hdr->key_data_length);
  415. } else {
  416. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  417. decrypted_buf = decrypt_eapol_key_data(sta->ptk.kek, ver, hdr,
  418. &decrypted_len);
  419. if (decrypted_buf == NULL) {
  420. wpa_printf(MSG_INFO, "Failed to decrypt EAPOL-Key Key "
  421. "Data");
  422. return;
  423. }
  424. decrypted = decrypted_buf;
  425. wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
  426. decrypted, decrypted_len);
  427. }
  428. if (wt->write_pcap_dumper && decrypted != key_data) {
  429. /* Fill in a dummy Data frame header */
  430. u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr)];
  431. struct ieee80211_hdr *h;
  432. struct wpa_eapol_key *k;
  433. const u8 *p;
  434. u8 *pos;
  435. size_t plain_len;
  436. plain_len = decrypted_len;
  437. p = decrypted;
  438. while (p + 1 < decrypted + decrypted_len) {
  439. if (p[0] == 0xdd && p[1] == 0x00) {
  440. /* Remove padding */
  441. plain_len = p - decrypted;
  442. break;
  443. }
  444. p += 2 + p[1];
  445. }
  446. os_memset(buf, 0, sizeof(buf));
  447. h = (struct ieee80211_hdr *) buf;
  448. h->frame_control = host_to_le16(0x0208);
  449. os_memcpy(h->addr1, dst, ETH_ALEN);
  450. os_memcpy(h->addr2, src, ETH_ALEN);
  451. os_memcpy(h->addr3, src, ETH_ALEN);
  452. pos = (u8 *) (h + 1);
  453. os_memcpy(pos, "\xaa\xaa\x03\x00\x00\x00\x88\x8e", 8);
  454. pos += 8;
  455. os_memcpy(pos, eapol, sizeof(*eapol));
  456. pos += sizeof(*eapol);
  457. os_memcpy(pos, hdr, sizeof(*hdr));
  458. k = (struct wpa_eapol_key *) pos;
  459. WPA_PUT_BE16(k->key_info,
  460. key_info & ~WPA_KEY_INFO_ENCR_KEY_DATA);
  461. WPA_PUT_BE16(k->key_data_length, plain_len);
  462. write_pcap_decrypted(wt, buf, sizeof(buf),
  463. decrypted, plain_len);
  464. }
  465. if (wpa_supplicant_parse_ies(decrypted, decrypted_len, &ie) < 0) {
  466. wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  467. os_free(decrypted_buf);
  468. return;
  469. }
  470. if ((ie.wpa_ie &&
  471. os_memcmp(ie.wpa_ie, bss->wpaie, ie.wpa_ie_len) != 0) ||
  472. (ie.wpa_ie == NULL && bss->wpaie[0])) {
  473. wpa_printf(MSG_INFO, "Mismatch in WPA IE between "
  474. "EAPOL-Key 3/4 and Beacon/Probe Response "
  475. "from " MACSTR, MAC2STR(bss->bssid));
  476. wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
  477. ie.wpa_ie, ie.wpa_ie_len);
  478. wpa_hexdump(MSG_INFO, "WPA IE in Beacon/Probe "
  479. "Response",
  480. bss->wpaie,
  481. bss->wpaie[0] ? 2 + bss->wpaie[1] : 0);
  482. }
  483. if ((ie.rsn_ie &&
  484. os_memcmp(ie.rsn_ie, bss->rsnie, ie.rsn_ie_len) != 0) ||
  485. (ie.rsn_ie == NULL && bss->rsnie[0])) {
  486. wpa_printf(MSG_INFO, "Mismatch in RSN IE between "
  487. "EAPOL-Key 3/4 and Beacon/Probe Response "
  488. "from " MACSTR, MAC2STR(bss->bssid));
  489. wpa_hexdump(MSG_INFO, "RSN IE in EAPOL-Key",
  490. ie.rsn_ie, ie.rsn_ie_len);
  491. wpa_hexdump(MSG_INFO, "RSN IE in (Re)Association "
  492. "Request",
  493. bss->rsnie,
  494. bss->rsnie[0] ? 2 + bss->rsnie[1] : 0);
  495. }
  496. learn_kde_keys(bss, decrypted, decrypted_len, hdr->key_rsc);
  497. os_free(decrypted_buf);
  498. }
  499. static void rx_data_eapol_key_4_of_4(struct wlantest *wt, const u8 *dst,
  500. const u8 *src, const u8 *data, size_t len)
  501. {
  502. struct wlantest_bss *bss;
  503. struct wlantest_sta *sta;
  504. const struct ieee802_1x_hdr *eapol;
  505. const struct wpa_eapol_key *hdr;
  506. u16 key_info;
  507. wpa_printf(MSG_DEBUG, "EAPOL-Key 4/4 " MACSTR " -> " MACSTR,
  508. MAC2STR(src), MAC2STR(dst));
  509. bss = bss_get(wt, dst);
  510. if (bss == NULL)
  511. return;
  512. sta = sta_get(bss, src);
  513. if (sta == NULL)
  514. return;
  515. eapol = (const struct ieee802_1x_hdr *) data;
  516. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  517. if (!is_zero(hdr->key_rsc, 8)) {
  518. wpa_printf(MSG_INFO, "EAPOL-Key 4/4 from " MACSTR " used "
  519. "non-zero Key RSC", MAC2STR(src));
  520. }
  521. key_info = WPA_GET_BE16(hdr->key_info);
  522. if (!sta->ptk_set) {
  523. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 4/4");
  524. return;
  525. }
  526. if (sta->ptk_set &&
  527. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  528. data, len) < 0) {
  529. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 4/4 MIC");
  530. return;
  531. }
  532. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 4/4");
  533. }
  534. static void rx_data_eapol_key_1_of_2(struct wlantest *wt, const u8 *dst,
  535. const u8 *src, const u8 *data, size_t len)
  536. {
  537. struct wlantest_bss *bss;
  538. struct wlantest_sta *sta;
  539. const struct ieee802_1x_hdr *eapol;
  540. const struct wpa_eapol_key *hdr;
  541. const u8 *key_data;
  542. u16 key_info, ver;
  543. u8 *decrypted;
  544. size_t decrypted_len = 0;
  545. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/2 " MACSTR " -> " MACSTR,
  546. MAC2STR(src), MAC2STR(dst));
  547. bss = bss_get(wt, src);
  548. if (bss == NULL)
  549. return;
  550. sta = sta_get(bss, dst);
  551. if (sta == NULL)
  552. return;
  553. eapol = (const struct ieee802_1x_hdr *) data;
  554. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  555. key_info = WPA_GET_BE16(hdr->key_info);
  556. if (!sta->ptk_set) {
  557. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 1/2");
  558. return;
  559. }
  560. if (sta->ptk_set &&
  561. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  562. data, len) < 0) {
  563. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 1/2 MIC");
  564. return;
  565. }
  566. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 1/2");
  567. key_data = (const u8 *) (hdr + 1);
  568. if (sta->proto & WPA_PROTO_RSN &&
  569. !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
  570. wpa_printf(MSG_INFO, "EAPOL-Key 1/2 without EncrKeyData bit");
  571. return;
  572. }
  573. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  574. decrypted = decrypt_eapol_key_data(sta->ptk.kek, ver, hdr,
  575. &decrypted_len);
  576. if (decrypted == NULL) {
  577. wpa_printf(MSG_INFO, "Failed to decrypt EAPOL-Key Key Data");
  578. return;
  579. }
  580. wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
  581. decrypted, decrypted_len);
  582. if (wt->write_pcap_dumper) {
  583. /* Fill in a dummy Data frame header */
  584. u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr)];
  585. struct ieee80211_hdr *h;
  586. struct wpa_eapol_key *k;
  587. u8 *pos;
  588. size_t plain_len;
  589. plain_len = decrypted_len;
  590. pos = decrypted;
  591. while (pos + 1 < decrypted + decrypted_len) {
  592. if (pos[0] == 0xdd && pos[1] == 0x00) {
  593. /* Remove padding */
  594. plain_len = pos - decrypted;
  595. break;
  596. }
  597. pos += 2 + pos[1];
  598. }
  599. os_memset(buf, 0, sizeof(buf));
  600. h = (struct ieee80211_hdr *) buf;
  601. h->frame_control = host_to_le16(0x0208);
  602. os_memcpy(h->addr1, dst, ETH_ALEN);
  603. os_memcpy(h->addr2, src, ETH_ALEN);
  604. os_memcpy(h->addr3, src, ETH_ALEN);
  605. pos = (u8 *) (h + 1);
  606. os_memcpy(pos, "\xaa\xaa\x03\x00\x00\x00\x88\x8e", 8);
  607. pos += 8;
  608. os_memcpy(pos, eapol, sizeof(*eapol));
  609. pos += sizeof(*eapol);
  610. os_memcpy(pos, hdr, sizeof(*hdr));
  611. k = (struct wpa_eapol_key *) pos;
  612. WPA_PUT_BE16(k->key_info,
  613. key_info & ~WPA_KEY_INFO_ENCR_KEY_DATA);
  614. WPA_PUT_BE16(k->key_data_length, plain_len);
  615. write_pcap_decrypted(wt, buf, sizeof(buf),
  616. decrypted, plain_len);
  617. }
  618. if (sta->proto & WPA_PROTO_RSN)
  619. learn_kde_keys(bss, decrypted, decrypted_len, hdr->key_rsc);
  620. else {
  621. int len = bss->group_cipher == WPA_CIPHER_TKIP ? 32 : 16;
  622. if (decrypted_len == len) {
  623. const u8 *rsc = hdr->key_rsc;
  624. int id;
  625. id = (key_info & WPA_KEY_INFO_KEY_INDEX_MASK) >>
  626. WPA_KEY_INFO_KEY_INDEX_SHIFT;
  627. wpa_printf(MSG_DEBUG, "GTK key index %d", id);
  628. wpa_hexdump(MSG_DEBUG, "GTK", decrypted,
  629. decrypted_len);
  630. bss->gtk_len[id] = decrypted_len;
  631. os_memcpy(bss->gtk[id], decrypted, decrypted_len);
  632. bss->rsc[id][0] = rsc[5];
  633. bss->rsc[id][1] = rsc[4];
  634. bss->rsc[id][2] = rsc[3];
  635. bss->rsc[id][3] = rsc[2];
  636. bss->rsc[id][4] = rsc[1];
  637. bss->rsc[id][5] = rsc[0];
  638. wpa_hexdump(MSG_DEBUG, "RSC", bss->rsc[id], 6);
  639. } else {
  640. wpa_printf(MSG_INFO, "Unexpected WPA Key Data length "
  641. "in Group Key msg 1/2 from " MACSTR,
  642. MAC2STR(src));
  643. }
  644. }
  645. os_free(decrypted);
  646. }
  647. static void rx_data_eapol_key_2_of_2(struct wlantest *wt, const u8 *dst,
  648. const u8 *src, const u8 *data, size_t len)
  649. {
  650. struct wlantest_bss *bss;
  651. struct wlantest_sta *sta;
  652. const struct ieee802_1x_hdr *eapol;
  653. const struct wpa_eapol_key *hdr;
  654. u16 key_info;
  655. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/2 " MACSTR " -> " MACSTR,
  656. MAC2STR(src), MAC2STR(dst));
  657. bss = bss_get(wt, dst);
  658. if (bss == NULL)
  659. return;
  660. sta = sta_get(bss, src);
  661. if (sta == NULL)
  662. return;
  663. eapol = (const struct ieee802_1x_hdr *) data;
  664. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  665. if (!is_zero(hdr->key_rsc, 8)) {
  666. wpa_printf(MSG_INFO, "EAPOL-Key 2/2 from " MACSTR " used "
  667. "non-zero Key RSC", MAC2STR(src));
  668. }
  669. key_info = WPA_GET_BE16(hdr->key_info);
  670. if (!sta->ptk_set) {
  671. wpa_printf(MSG_DEBUG, "No PTK known to process EAPOL-Key 2/2");
  672. return;
  673. }
  674. if (sta->ptk_set &&
  675. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  676. data, len) < 0) {
  677. wpa_printf(MSG_INFO, "Mismatch in EAPOL-Key 2/2 MIC");
  678. return;
  679. }
  680. wpa_printf(MSG_DEBUG, "Valid MIC found in EAPOL-Key 2/2");
  681. }
  682. static void rx_data_eapol_key(struct wlantest *wt, const u8 *dst,
  683. const u8 *src, const u8 *data, size_t len,
  684. int prot)
  685. {
  686. const struct ieee802_1x_hdr *eapol;
  687. const struct wpa_eapol_key *hdr;
  688. const u8 *key_data;
  689. u16 key_info, key_length, ver, key_data_length;
  690. eapol = (const struct ieee802_1x_hdr *) data;
  691. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  692. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key",
  693. (const u8 *) hdr, len - sizeof(*eapol));
  694. if (len < sizeof(*hdr)) {
  695. wpa_printf(MSG_INFO, "Too short EAPOL-Key frame from " MACSTR,
  696. MAC2STR(src));
  697. return;
  698. }
  699. if (hdr->type == EAPOL_KEY_TYPE_RC4) {
  700. /* TODO: EAPOL-Key RC4 for WEP */
  701. wpa_printf(MSG_INFO, "EAPOL-Key Descriptor Type RC4 from "
  702. MACSTR, MAC2STR(src));
  703. return;
  704. }
  705. if (hdr->type != EAPOL_KEY_TYPE_RSN &&
  706. hdr->type != EAPOL_KEY_TYPE_WPA) {
  707. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Descriptor Type "
  708. "%u from " MACSTR, hdr->type, MAC2STR(src));
  709. return;
  710. }
  711. key_info = WPA_GET_BE16(hdr->key_info);
  712. key_length = WPA_GET_BE16(hdr->key_length);
  713. key_data_length = WPA_GET_BE16(hdr->key_data_length);
  714. key_data = (const u8 *) (hdr + 1);
  715. if (key_data + key_data_length > data + len) {
  716. wpa_printf(MSG_INFO, "Truncated EAPOL-Key from " MACSTR,
  717. MAC2STR(src));
  718. return;
  719. }
  720. if (key_data + key_data_length < data + len) {
  721. wpa_hexdump(MSG_DEBUG, "Extra data after EAPOL-Key Key Data "
  722. "field", key_data + key_data_length,
  723. data + len - key_data - key_data_length);
  724. }
  725. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  726. wpa_printf(MSG_DEBUG, "EAPOL-Key ver=%u %c idx=%u%s%s%s%s%s%s%s%s "
  727. "datalen=%u",
  728. ver, key_info & WPA_KEY_INFO_KEY_TYPE ? 'P' : 'G',
  729. (key_info & WPA_KEY_INFO_KEY_INDEX_MASK) >>
  730. WPA_KEY_INFO_KEY_INDEX_SHIFT,
  731. (key_info & WPA_KEY_INFO_INSTALL) ? " Install" : "",
  732. (key_info & WPA_KEY_INFO_ACK) ? " ACK" : "",
  733. (key_info & WPA_KEY_INFO_MIC) ? " MIC" : "",
  734. (key_info & WPA_KEY_INFO_SECURE) ? " Secure" : "",
  735. (key_info & WPA_KEY_INFO_ERROR) ? " Error" : "",
  736. (key_info & WPA_KEY_INFO_REQUEST) ? " Request" : "",
  737. (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) ? " Encr" : "",
  738. (key_info & WPA_KEY_INFO_SMK_MESSAGE) ? " SMK" : "",
  739. key_data_length);
  740. if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
  741. ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
  742. ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
  743. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Key Descriptor "
  744. "Version %u from " MACSTR, ver, MAC2STR(src));
  745. return;
  746. }
  747. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Replay Counter",
  748. hdr->replay_counter, WPA_REPLAY_COUNTER_LEN);
  749. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Nonce",
  750. hdr->key_nonce, WPA_NONCE_LEN);
  751. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key IV",
  752. hdr->key_iv, 16);
  753. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key RSC",
  754. hdr->key_rsc, WPA_KEY_RSC_LEN);
  755. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key MIC",
  756. hdr->key_mic, 16);
  757. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data",
  758. key_data, key_data_length);
  759. if (hdr->type == EAPOL_KEY_TYPE_RSN &&
  760. (key_info & (WPA_KEY_INFO_KEY_INDEX_MASK | BIT(14) | BIT(15))) !=
  761. 0) {
  762. wpa_printf(MSG_INFO, "RSN EAPOL-Key with non-zero reserved "
  763. "Key Info bits 0x%x from " MACSTR,
  764. key_info, MAC2STR(src));
  765. }
  766. if (hdr->type == EAPOL_KEY_TYPE_WPA &&
  767. (key_info & (WPA_KEY_INFO_ENCR_KEY_DATA |
  768. WPA_KEY_INFO_SMK_MESSAGE |BIT(14) | BIT(15))) != 0) {
  769. wpa_printf(MSG_INFO, "WPA EAPOL-Key with non-zero reserved "
  770. "Key Info bits 0x%x from " MACSTR,
  771. key_info, MAC2STR(src));
  772. }
  773. if (key_length > 32) {
  774. wpa_printf(MSG_INFO, "EAPOL-Key with invalid Key Length %d "
  775. "from " MACSTR, key_length, MAC2STR(src));
  776. }
  777. if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
  778. !is_zero(hdr->key_iv, 16)) {
  779. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key IV "
  780. "(reserved with ver=%d) field from " MACSTR,
  781. ver, MAC2STR(src));
  782. wpa_hexdump(MSG_INFO, "EAPOL-Key Key IV (reserved)",
  783. hdr->key_iv, 16);
  784. }
  785. if (!is_zero(hdr->key_id, 8)) {
  786. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key ID "
  787. "(reserved) field from " MACSTR, MAC2STR(src));
  788. wpa_hexdump(MSG_INFO, "EAPOL-Key Key ID (reserved)",
  789. hdr->key_id, 8);
  790. }
  791. if (hdr->key_rsc[6] || hdr->key_rsc[7]) {
  792. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key RSC octets "
  793. "(last two are unused)" MACSTR, MAC2STR(src));
  794. }
  795. if (key_info & (WPA_KEY_INFO_ERROR | WPA_KEY_INFO_REQUEST))
  796. return;
  797. if (key_info & WPA_KEY_INFO_SMK_MESSAGE)
  798. return;
  799. if (key_info & WPA_KEY_INFO_KEY_TYPE) {
  800. /* 4-Way Handshake */
  801. switch (key_info & (WPA_KEY_INFO_SECURE |
  802. WPA_KEY_INFO_MIC |
  803. WPA_KEY_INFO_ACK |
  804. WPA_KEY_INFO_INSTALL)) {
  805. case WPA_KEY_INFO_ACK:
  806. rx_data_eapol_key_1_of_4(wt, dst, src, data, len);
  807. break;
  808. case WPA_KEY_INFO_MIC:
  809. if (key_data_length == 0)
  810. rx_data_eapol_key_4_of_4(wt, dst, src, data,
  811. len);
  812. else
  813. rx_data_eapol_key_2_of_4(wt, dst, src, data,
  814. len);
  815. break;
  816. case WPA_KEY_INFO_MIC | WPA_KEY_INFO_ACK |
  817. WPA_KEY_INFO_INSTALL:
  818. /* WPA does not include Secure bit in 3/4 */
  819. rx_data_eapol_key_3_of_4(wt, dst, src, data, len);
  820. break;
  821. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  822. WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL:
  823. rx_data_eapol_key_3_of_4(wt, dst, src, data, len);
  824. break;
  825. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  826. rx_data_eapol_key_4_of_4(wt, dst, src, data, len);
  827. break;
  828. default:
  829. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  830. break;
  831. }
  832. } else {
  833. /* Group Key Handshake */
  834. switch (key_info & (WPA_KEY_INFO_SECURE |
  835. WPA_KEY_INFO_MIC |
  836. WPA_KEY_INFO_ACK)) {
  837. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  838. WPA_KEY_INFO_ACK:
  839. rx_data_eapol_key_1_of_2(wt, dst, src, data, len);
  840. break;
  841. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  842. rx_data_eapol_key_2_of_2(wt, dst, src, data, len);
  843. break;
  844. default:
  845. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  846. break;
  847. }
  848. }
  849. }
  850. static void rx_data_eapol(struct wlantest *wt, const u8 *dst, const u8 *src,
  851. const u8 *data, size_t len, int prot)
  852. {
  853. const struct ieee802_1x_hdr *hdr;
  854. u16 length;
  855. const u8 *p;
  856. wpa_hexdump(MSG_EXCESSIVE, "EAPOL", data, len);
  857. if (len < sizeof(*hdr)) {
  858. wpa_printf(MSG_INFO, "Too short EAPOL frame from " MACSTR,
  859. MAC2STR(src));
  860. return;
  861. }
  862. hdr = (const struct ieee802_1x_hdr *) data;
  863. length = be_to_host16(hdr->length);
  864. wpa_printf(MSG_DEBUG, "RX EAPOL: " MACSTR " -> " MACSTR "%s ver=%u "
  865. "type=%u len=%u",
  866. MAC2STR(src), MAC2STR(dst), prot ? " Prot" : "",
  867. hdr->version, hdr->type, length);
  868. if (hdr->version < 1 || hdr->version > 3) {
  869. wpa_printf(MSG_INFO, "Unexpected EAPOL version %u from "
  870. MACSTR, hdr->version, MAC2STR(src));
  871. }
  872. if (sizeof(*hdr) + length > len) {
  873. wpa_printf(MSG_INFO, "Truncated EAPOL frame from " MACSTR,
  874. MAC2STR(src));
  875. return;
  876. }
  877. if (sizeof(*hdr) + length < len) {
  878. wpa_printf(MSG_INFO, "EAPOL frame with %d extra bytes",
  879. (int) (len - sizeof(*hdr) - length));
  880. }
  881. p = (const u8 *) (hdr + 1);
  882. switch (hdr->type) {
  883. case IEEE802_1X_TYPE_EAP_PACKET:
  884. wpa_hexdump(MSG_MSGDUMP, "EAPOL - EAP packet", p, length);
  885. break;
  886. case IEEE802_1X_TYPE_EAPOL_START:
  887. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Start", p, length);
  888. break;
  889. case IEEE802_1X_TYPE_EAPOL_LOGOFF:
  890. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Logoff", p, length);
  891. break;
  892. case IEEE802_1X_TYPE_EAPOL_KEY:
  893. rx_data_eapol_key(wt, dst, src, data, sizeof(*hdr) + length,
  894. prot);
  895. break;
  896. case IEEE802_1X_TYPE_EAPOL_ENCAPSULATED_ASF_ALERT:
  897. wpa_hexdump(MSG_MSGDUMP, "EAPOL - Encapsulated ASF alert",
  898. p, length);
  899. break;
  900. default:
  901. wpa_hexdump(MSG_MSGDUMP, "Unknown EAPOL payload", p, length);
  902. break;
  903. }
  904. }
  905. static void rx_data_eth(struct wlantest *wt, const u8 *dst, const u8 *src,
  906. u16 ethertype, const u8 *data, size_t len, int prot)
  907. {
  908. if (ethertype == ETH_P_PAE)
  909. rx_data_eapol(wt, dst, src, data, len, prot);
  910. }
  911. static void rx_data_process(struct wlantest *wt, const u8 *dst, const u8 *src,
  912. const u8 *data, size_t len, int prot)
  913. {
  914. if (len == 0)
  915. return;
  916. if (len >= 8 && os_memcmp(data, "\xaa\xaa\x03\x00\x00\x00", 6) == 0) {
  917. rx_data_eth(wt, dst, src, WPA_GET_BE16(data + 6),
  918. data + 8, len - 8, prot);
  919. return;
  920. }
  921. wpa_hexdump(MSG_DEBUG, "Unrecognized LLC", data, len > 8 ? 8 : len);
  922. }
  923. static void rx_data_bss_prot_group(struct wlantest *wt,
  924. const struct ieee80211_hdr *hdr,
  925. const u8 *qos, const u8 *dst, const u8 *src,
  926. const u8 *data, size_t len)
  927. {
  928. struct wlantest_bss *bss;
  929. int keyid;
  930. u8 *decrypted;
  931. size_t dlen;
  932. u8 pn[6];
  933. bss = bss_get(wt, hdr->addr2);
  934. if (bss == NULL)
  935. return;
  936. if (len < 4) {
  937. wpa_printf(MSG_INFO, "Too short group addressed data frame");
  938. return;
  939. }
  940. if (bss->group_cipher & (WPA_CIPHER_TKIP | WPA_CIPHER_CCMP) &&
  941. !(data[3] & 0x20)) {
  942. wpa_printf(MSG_INFO, "Expected TKIP/CCMP frame from "
  943. MACSTR " did not have ExtIV bit set to 1",
  944. MAC2STR(bss->bssid));
  945. return;
  946. }
  947. if (bss->group_cipher == WPA_CIPHER_TKIP) {
  948. if (data[3] & 0x1f) {
  949. wpa_printf(MSG_INFO, "TKIP frame from " MACSTR " used "
  950. "non-zero reserved bit",
  951. MAC2STR(bss->bssid));
  952. }
  953. if (data[1] != ((data[0] | 0x20) & 0x7f)) {
  954. wpa_printf(MSG_INFO, "TKIP frame from " MACSTR " used "
  955. "incorrect WEPSeed[1] (was 0x%x, expected "
  956. "0x%x)",
  957. MAC2STR(bss->bssid), data[1],
  958. (data[0] | 0x20) & 0x7f);
  959. }
  960. } else if (bss->group_cipher == WPA_CIPHER_CCMP) {
  961. if (data[2] != 0 || (data[3] & 0x1f) != 0) {
  962. wpa_printf(MSG_INFO, "CCMP frame from " MACSTR " used "
  963. "non-zero reserved bit",
  964. MAC2STR(bss->bssid));
  965. }
  966. }
  967. keyid = data[3] >> 6;
  968. if (bss->gtk_len[keyid] == 0) {
  969. wpa_printf(MSG_MSGDUMP, "No GTK known to decrypt the frame "
  970. "(A2=" MACSTR " KeyID=%d)",
  971. MAC2STR(hdr->addr2), keyid);
  972. return;
  973. }
  974. if (bss->group_cipher == WPA_CIPHER_TKIP)
  975. tkip_get_pn(pn, data);
  976. else
  977. ccmp_get_pn(pn, data);
  978. if (os_memcmp(pn, bss->rsc[keyid], 6) <= 0) {
  979. wpa_printf(MSG_INFO, "CCMP/TKIP replay detected: SA=" MACSTR,
  980. MAC2STR(hdr->addr2));
  981. wpa_hexdump(MSG_INFO, "RX PN", pn, 6);
  982. wpa_hexdump(MSG_INFO, "RSC", bss->rsc[keyid], 6);
  983. }
  984. if (bss->group_cipher == WPA_CIPHER_TKIP)
  985. decrypted = tkip_decrypt(bss->gtk[keyid], hdr, data, len,
  986. &dlen);
  987. else
  988. decrypted = ccmp_decrypt(bss->gtk[keyid], hdr, data, len,
  989. &dlen);
  990. if (decrypted) {
  991. rx_data_process(wt, dst, src, decrypted, dlen, 1);
  992. os_memcpy(bss->rsc[keyid], pn, 6);
  993. write_pcap_decrypted(wt, (const u8 *) hdr, 24 + (qos ? 2 : 0),
  994. decrypted, dlen);
  995. }
  996. os_free(decrypted);
  997. }
  998. static void rx_data_bss_prot(struct wlantest *wt,
  999. const struct ieee80211_hdr *hdr, const u8 *qos,
  1000. const u8 *dst, const u8 *src, const u8 *data,
  1001. size_t len)
  1002. {
  1003. struct wlantest_bss *bss;
  1004. struct wlantest_sta *sta;
  1005. int keyid;
  1006. u16 fc = le_to_host16(hdr->frame_control);
  1007. u8 *decrypted;
  1008. size_t dlen;
  1009. int tid;
  1010. u8 pn[6], *rsc;
  1011. if (hdr->addr1[0] & 0x01) {
  1012. rx_data_bss_prot_group(wt, hdr, qos, dst, src, data, len);
  1013. return;
  1014. }
  1015. if (fc & WLAN_FC_TODS) {
  1016. bss = bss_get(wt, hdr->addr1);
  1017. if (bss == NULL)
  1018. return;
  1019. sta = sta_get(bss, hdr->addr2);
  1020. } else {
  1021. bss = bss_get(wt, hdr->addr2);
  1022. if (bss == NULL)
  1023. return;
  1024. sta = sta_get(bss, hdr->addr1);
  1025. }
  1026. if (sta == NULL || !sta->ptk_set) {
  1027. wpa_printf(MSG_MSGDUMP, "No PTK known to decrypt the frame");
  1028. return;
  1029. }
  1030. if (len < 4) {
  1031. wpa_printf(MSG_INFO, "Too short encrypted data frame");
  1032. return;
  1033. }
  1034. if (sta->pairwise_cipher & (WPA_CIPHER_TKIP | WPA_CIPHER_CCMP) &&
  1035. !(data[3] & 0x20)) {
  1036. wpa_printf(MSG_INFO, "Expected TKIP/CCMP frame from "
  1037. MACSTR " did not have ExtIV bit set to 1",
  1038. MAC2STR(src));
  1039. return;
  1040. }
  1041. if (sta->pairwise_cipher == WPA_CIPHER_TKIP) {
  1042. if (data[3] & 0x1f) {
  1043. wpa_printf(MSG_INFO, "TKIP frame from " MACSTR " used "
  1044. "non-zero reserved bit",
  1045. MAC2STR(hdr->addr2));
  1046. }
  1047. if (data[1] != ((data[0] | 0x20) & 0x7f)) {
  1048. wpa_printf(MSG_INFO, "TKIP frame from " MACSTR " used "
  1049. "incorrect WEPSeed[1] (was 0x%x, expected "
  1050. "0x%x)",
  1051. MAC2STR(hdr->addr2), data[1],
  1052. (data[0] | 0x20) & 0x7f);
  1053. }
  1054. } else if (sta->pairwise_cipher == WPA_CIPHER_CCMP) {
  1055. if (data[2] != 0 || (data[3] & 0x1f) != 0) {
  1056. wpa_printf(MSG_INFO, "CCMP frame from " MACSTR " used "
  1057. "non-zero reserved bit",
  1058. MAC2STR(hdr->addr2));
  1059. }
  1060. }
  1061. keyid = data[3] >> 6;
  1062. if (keyid != 0) {
  1063. wpa_printf(MSG_INFO, "Unexpected non-zero KeyID %d in "
  1064. "individually addressed Data frame from " MACSTR,
  1065. keyid, MAC2STR(hdr->addr2));
  1066. }
  1067. if (qos)
  1068. tid = qos[0] & 0x0f;
  1069. else
  1070. tid = 0;
  1071. if (fc & WLAN_FC_TODS)
  1072. rsc = sta->rsc_tods[tid];
  1073. else
  1074. rsc = sta->rsc_fromds[tid];
  1075. if (sta->pairwise_cipher == WPA_CIPHER_TKIP)
  1076. tkip_get_pn(pn, data);
  1077. else
  1078. ccmp_get_pn(pn, data);
  1079. if (os_memcmp(pn, rsc, 6) <= 0) {
  1080. wpa_printf(MSG_INFO, "CCMP/TKIP replay detected: SA=" MACSTR,
  1081. MAC2STR(hdr->addr2));
  1082. wpa_hexdump(MSG_INFO, "RX PN", pn, 6);
  1083. wpa_hexdump(MSG_INFO, "RSC", rsc, 6);
  1084. }
  1085. if (sta->pairwise_cipher == WPA_CIPHER_TKIP)
  1086. decrypted = tkip_decrypt(sta->ptk.tk1, hdr, data, len, &dlen);
  1087. else
  1088. decrypted = ccmp_decrypt(sta->ptk.tk1, hdr, data, len, &dlen);
  1089. if (decrypted) {
  1090. rx_data_process(wt, dst, src, decrypted, dlen, 1);
  1091. os_memcpy(rsc, pn, 6);
  1092. write_pcap_decrypted(wt, (const u8 *) hdr, 24 + (qos ? 2 : 0),
  1093. decrypted, dlen);
  1094. }
  1095. os_free(decrypted);
  1096. }
  1097. static void rx_data_bss(struct wlantest *wt, const struct ieee80211_hdr *hdr,
  1098. const u8 *qos, const u8 *dst, const u8 *src,
  1099. const u8 *data, size_t len)
  1100. {
  1101. u16 fc = le_to_host16(hdr->frame_control);
  1102. int prot = !!(fc & WLAN_FC_ISWEP);
  1103. if (qos) {
  1104. u8 ack = (qos[0] & 0x60) >> 5;
  1105. wpa_printf(MSG_MSGDUMP, "BSS DATA: " MACSTR " -> " MACSTR
  1106. " len=%u%s tid=%u%s%s",
  1107. MAC2STR(src), MAC2STR(dst), (unsigned int) len,
  1108. prot ? " Prot" : "", qos[0] & 0x0f,
  1109. (qos[0] & 0x10) ? " EOSP" : "",
  1110. ack == 0 ? "" :
  1111. (ack == 1 ? " NoAck" :
  1112. (ack == 2 ? " NoExpAck" : " BA")));
  1113. } else {
  1114. wpa_printf(MSG_MSGDUMP, "BSS DATA: " MACSTR " -> " MACSTR
  1115. " len=%u%s",
  1116. MAC2STR(src), MAC2STR(dst), (unsigned int) len,
  1117. prot ? " Prot" : "");
  1118. }
  1119. if (prot)
  1120. rx_data_bss_prot(wt, hdr, qos, dst, src, data, len);
  1121. else
  1122. rx_data_process(wt, dst, src, data, len, 0);
  1123. }
  1124. void rx_data(struct wlantest *wt, const u8 *data, size_t len)
  1125. {
  1126. const struct ieee80211_hdr *hdr;
  1127. u16 fc, stype;
  1128. size_t hdrlen;
  1129. const u8 *qos = NULL;
  1130. if (len < 24)
  1131. return;
  1132. hdr = (const struct ieee80211_hdr *) data;
  1133. fc = le_to_host16(hdr->frame_control);
  1134. stype = WLAN_FC_GET_STYPE(fc);
  1135. hdrlen = 24;
  1136. if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
  1137. (WLAN_FC_TODS | WLAN_FC_FROMDS))
  1138. hdrlen += ETH_ALEN;
  1139. if (stype & 0x08) {
  1140. qos = data + hdrlen;
  1141. hdrlen += 2;
  1142. }
  1143. if (len < hdrlen)
  1144. return;
  1145. wt->rx_data++;
  1146. switch (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) {
  1147. case 0:
  1148. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s IBSS DA=" MACSTR " SA="
  1149. MACSTR " BSSID=" MACSTR,
  1150. data_stype(WLAN_FC_GET_STYPE(fc)),
  1151. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  1152. fc & WLAN_FC_ISWEP ? " Prot" : "",
  1153. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  1154. MAC2STR(hdr->addr3));
  1155. break;
  1156. case WLAN_FC_FROMDS:
  1157. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s FromDS DA=" MACSTR
  1158. " BSSID=" MACSTR " SA=" MACSTR,
  1159. data_stype(WLAN_FC_GET_STYPE(fc)),
  1160. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  1161. fc & WLAN_FC_ISWEP ? " Prot" : "",
  1162. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  1163. MAC2STR(hdr->addr3));
  1164. rx_data_bss(wt, hdr, qos, hdr->addr1, hdr->addr2,
  1165. data + hdrlen, len - hdrlen);
  1166. break;
  1167. case WLAN_FC_TODS:
  1168. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s ToDS BSSID=" MACSTR
  1169. " SA=" MACSTR " DA=" MACSTR,
  1170. data_stype(WLAN_FC_GET_STYPE(fc)),
  1171. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  1172. fc & WLAN_FC_ISWEP ? " Prot" : "",
  1173. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  1174. MAC2STR(hdr->addr3));
  1175. rx_data_bss(wt, hdr, qos, hdr->addr3, hdr->addr2,
  1176. data + hdrlen, len - hdrlen);
  1177. break;
  1178. case WLAN_FC_TODS | WLAN_FC_FROMDS:
  1179. wpa_printf(MSG_EXCESSIVE, "DATA %s%s%s WDS RA=" MACSTR " TA="
  1180. MACSTR " DA=" MACSTR " SA=" MACSTR,
  1181. data_stype(WLAN_FC_GET_STYPE(fc)),
  1182. fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
  1183. fc & WLAN_FC_ISWEP ? " Prot" : "",
  1184. MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
  1185. MAC2STR(hdr->addr3),
  1186. MAC2STR((const u8 *) (hdr + 1)));
  1187. break;
  1188. }
  1189. }