rx_eapol.c 31 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104
  1. /*
  2. * Received Data frame processing for EAPOL messages
  3. * Copyright (c) 2010, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "crypto/aes_wrap.h"
  11. #include "crypto/crypto.h"
  12. #include "common/defs.h"
  13. #include "common/ieee802_11_defs.h"
  14. #include "common/ieee802_11_common.h"
  15. #include "common/eapol_common.h"
  16. #include "common/wpa_common.h"
  17. #include "rsn_supp/wpa_ie.h"
  18. #include "wlantest.h"
  19. extern int wpa_debug_level;
  20. static int is_zero(const u8 *buf, size_t len)
  21. {
  22. size_t i;
  23. for (i = 0; i < len; i++) {
  24. if (buf[i])
  25. return 0;
  26. }
  27. return 1;
  28. }
  29. static int check_mic(const u8 *kck, int ver, const u8 *data, size_t len)
  30. {
  31. u8 *buf;
  32. int ret = -1;
  33. struct ieee802_1x_hdr *hdr;
  34. struct wpa_eapol_key *key;
  35. u8 rx_mic[16];
  36. buf = os_malloc(len);
  37. if (buf == NULL)
  38. return -1;
  39. os_memcpy(buf, data, len);
  40. hdr = (struct ieee802_1x_hdr *) buf;
  41. key = (struct wpa_eapol_key *) (hdr + 1);
  42. os_memcpy(rx_mic, key->key_mic, 16);
  43. os_memset(key->key_mic, 0, 16);
  44. if (wpa_eapol_key_mic(kck, ver, buf, len, key->key_mic) == 0 &&
  45. os_memcmp(rx_mic, key->key_mic, 16) == 0)
  46. ret = 0;
  47. os_free(buf);
  48. return ret;
  49. }
  50. static void rx_data_eapol_key_1_of_4(struct wlantest *wt, const u8 *dst,
  51. const u8 *src, const u8 *data, size_t len)
  52. {
  53. struct wlantest_bss *bss;
  54. struct wlantest_sta *sta;
  55. const struct ieee802_1x_hdr *eapol;
  56. const struct wpa_eapol_key *hdr;
  57. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/4 " MACSTR " -> " MACSTR,
  58. MAC2STR(src), MAC2STR(dst));
  59. bss = bss_get(wt, src);
  60. if (bss == NULL)
  61. return;
  62. sta = sta_get(bss, dst);
  63. if (sta == NULL)
  64. return;
  65. eapol = (const struct ieee802_1x_hdr *) data;
  66. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  67. if (is_zero(hdr->key_nonce, WPA_NONCE_LEN)) {
  68. add_note(wt, MSG_INFO, "EAPOL-Key 1/4 from " MACSTR
  69. " used zero nonce", MAC2STR(src));
  70. }
  71. if (!is_zero(hdr->key_rsc, 8)) {
  72. add_note(wt, MSG_INFO, "EAPOL-Key 1/4 from " MACSTR
  73. " used non-zero Key RSC", MAC2STR(src));
  74. }
  75. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  76. }
  77. static int try_pmk(struct wlantest *wt, struct wlantest_bss *bss,
  78. struct wlantest_sta *sta, u16 ver,
  79. const u8 *data, size_t len,
  80. struct wlantest_pmk *pmk)
  81. {
  82. struct wpa_ptk ptk;
  83. size_t ptk_len = sta->pairwise_cipher == WPA_CIPHER_TKIP ? 64 : 48;
  84. wpa_pmk_to_ptk(pmk->pmk, sizeof(pmk->pmk),
  85. "Pairwise key expansion",
  86. bss->bssid, sta->addr, sta->anonce, sta->snonce,
  87. (u8 *) &ptk, ptk_len,
  88. wpa_key_mgmt_sha256(sta->key_mgmt));
  89. if (check_mic(ptk.kck, ver, data, len) < 0)
  90. return -1;
  91. wpa_printf(MSG_INFO, "Derived PTK for STA " MACSTR " BSSID " MACSTR,
  92. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  93. sta->counters[WLANTEST_STA_COUNTER_PTK_LEARNED]++;
  94. if (sta->ptk_set) {
  95. /*
  96. * Rekeying - use new PTK for EAPOL-Key frames, but continue
  97. * using the old PTK for frame decryption.
  98. */
  99. add_note(wt, MSG_DEBUG, "Derived PTK during rekeying");
  100. os_memcpy(&sta->tptk, &ptk, sizeof(ptk));
  101. wpa_hexdump(MSG_DEBUG, "TPTK:KCK", sta->tptk.kck, 16);
  102. wpa_hexdump(MSG_DEBUG, "TPTK:KEK", sta->tptk.kek, 16);
  103. wpa_hexdump(MSG_DEBUG, "TPTK:TK1", sta->tptk.tk1, 16);
  104. if (ptk_len > 48)
  105. wpa_hexdump(MSG_DEBUG, "TPTK:TK2", sta->tptk.u.tk2,
  106. 16);
  107. sta->tptk_set = 1;
  108. return 0;
  109. }
  110. add_note(wt, MSG_DEBUG, "Derived new PTK");
  111. os_memcpy(&sta->ptk, &ptk, sizeof(ptk));
  112. wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, 16);
  113. wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, 16);
  114. wpa_hexdump(MSG_DEBUG, "PTK:TK1", sta->ptk.tk1, 16);
  115. if (ptk_len > 48)
  116. wpa_hexdump(MSG_DEBUG, "PTK:TK2", sta->ptk.u.tk2, 16);
  117. sta->ptk_set = 1;
  118. os_memset(sta->rsc_tods, 0, sizeof(sta->rsc_tods));
  119. os_memset(sta->rsc_fromds, 0, sizeof(sta->rsc_fromds));
  120. return 0;
  121. }
  122. static void derive_ptk(struct wlantest *wt, struct wlantest_bss *bss,
  123. struct wlantest_sta *sta, u16 ver,
  124. const u8 *data, size_t len)
  125. {
  126. struct wlantest_pmk *pmk;
  127. wpa_printf(MSG_DEBUG, "Trying to derive PTK for " MACSTR,
  128. MAC2STR(sta->addr));
  129. dl_list_for_each(pmk, &bss->pmk, struct wlantest_pmk, list) {
  130. wpa_printf(MSG_DEBUG, "Try per-BSS PMK");
  131. if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0)
  132. return;
  133. }
  134. dl_list_for_each(pmk, &wt->pmk, struct wlantest_pmk, list) {
  135. wpa_printf(MSG_DEBUG, "Try global PMK");
  136. if (try_pmk(wt, bss, sta, ver, data, len, pmk) == 0)
  137. return;
  138. }
  139. if (!sta->ptk_set) {
  140. struct wlantest_ptk *ptk;
  141. int prev_level = wpa_debug_level;
  142. wpa_debug_level = MSG_WARNING;
  143. dl_list_for_each(ptk, &wt->ptk, struct wlantest_ptk, list) {
  144. if (check_mic(ptk->ptk.kck, ver, data, len) < 0)
  145. continue;
  146. wpa_printf(MSG_INFO, "Pre-set PTK matches for STA "
  147. MACSTR " BSSID " MACSTR,
  148. MAC2STR(sta->addr), MAC2STR(bss->bssid));
  149. add_note(wt, MSG_DEBUG, "Using pre-set PTK");
  150. os_memcpy(&sta->ptk, &ptk->ptk, sizeof(ptk->ptk));
  151. wpa_hexdump(MSG_DEBUG, "PTK:KCK", sta->ptk.kck, 16);
  152. wpa_hexdump(MSG_DEBUG, "PTK:KEK", sta->ptk.kek, 16);
  153. wpa_hexdump(MSG_DEBUG, "PTK:TK1", sta->ptk.tk1, 16);
  154. if (ptk->ptk_len > 48)
  155. wpa_hexdump(MSG_DEBUG, "PTK:TK2",
  156. sta->ptk.u.tk2, 16);
  157. sta->ptk_set = 1;
  158. os_memset(sta->rsc_tods, 0, sizeof(sta->rsc_tods));
  159. os_memset(sta->rsc_fromds, 0, sizeof(sta->rsc_fromds));
  160. }
  161. wpa_debug_level = prev_level;
  162. }
  163. add_note(wt, MSG_DEBUG, "No matching PMK found to derive PTK");
  164. }
  165. static void rx_data_eapol_key_2_of_4(struct wlantest *wt, const u8 *dst,
  166. const u8 *src, const u8 *data, size_t len)
  167. {
  168. struct wlantest_bss *bss;
  169. struct wlantest_sta *sta;
  170. const struct ieee802_1x_hdr *eapol;
  171. const struct wpa_eapol_key *hdr;
  172. const u8 *key_data, *kck;
  173. u16 key_info, key_data_len;
  174. struct wpa_eapol_ie_parse ie;
  175. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/4 " MACSTR " -> " MACSTR,
  176. MAC2STR(src), MAC2STR(dst));
  177. bss = bss_get(wt, dst);
  178. if (bss == NULL)
  179. return;
  180. sta = sta_get(bss, src);
  181. if (sta == NULL)
  182. return;
  183. eapol = (const struct ieee802_1x_hdr *) data;
  184. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  185. if (is_zero(hdr->key_nonce, WPA_NONCE_LEN)) {
  186. add_note(wt, MSG_INFO, "EAPOL-Key 2/4 from " MACSTR
  187. " used zero nonce", MAC2STR(src));
  188. }
  189. if (!is_zero(hdr->key_rsc, 8)) {
  190. add_note(wt, MSG_INFO, "EAPOL-Key 2/4 from " MACSTR
  191. " used non-zero Key RSC", MAC2STR(src));
  192. }
  193. os_memcpy(sta->snonce, hdr->key_nonce, WPA_NONCE_LEN);
  194. key_info = WPA_GET_BE16(hdr->key_info);
  195. key_data_len = WPA_GET_BE16(hdr->key_data_length);
  196. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK, data, len);
  197. if (!sta->ptk_set && !sta->tptk_set) {
  198. add_note(wt, MSG_DEBUG,
  199. "No PTK known to process EAPOL-Key 2/4");
  200. return;
  201. }
  202. kck = sta->ptk.kck;
  203. if (sta->tptk_set) {
  204. add_note(wt, MSG_DEBUG,
  205. "Use TPTK for validation EAPOL-Key MIC");
  206. kck = sta->tptk.kck;
  207. }
  208. if (check_mic(kck, key_info & WPA_KEY_INFO_TYPE_MASK, data, len) < 0) {
  209. add_note(wt, MSG_INFO, "Mismatch in EAPOL-Key 2/4 MIC");
  210. return;
  211. }
  212. add_note(wt, MSG_DEBUG, "Valid MIC found in EAPOL-Key 2/4");
  213. key_data = (const u8 *) (hdr + 1);
  214. if (wpa_supplicant_parse_ies(key_data, key_data_len, &ie) < 0) {
  215. add_note(wt, MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  216. return;
  217. }
  218. if (ie.wpa_ie) {
  219. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  220. ie.wpa_ie, ie.wpa_ie_len);
  221. if (os_memcmp(ie.wpa_ie, sta->rsnie, ie.wpa_ie_len) != 0) {
  222. struct ieee802_11_elems elems;
  223. add_note(wt, MSG_INFO,
  224. "Mismatch in WPA IE between EAPOL-Key 2/4 "
  225. "and (Re)Association Request from " MACSTR,
  226. MAC2STR(sta->addr));
  227. wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
  228. ie.wpa_ie, ie.wpa_ie_len);
  229. wpa_hexdump(MSG_INFO, "WPA IE in (Re)Association "
  230. "Request",
  231. sta->rsnie,
  232. sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
  233. /*
  234. * The sniffer may have missed (Re)Association
  235. * Request, so try to survive with the information from
  236. * EAPOL-Key.
  237. */
  238. os_memset(&elems, 0, sizeof(elems));
  239. elems.wpa_ie = ie.wpa_ie + 2;
  240. elems.wpa_ie_len = ie.wpa_ie_len - 2;
  241. wpa_printf(MSG_DEBUG, "Update STA data based on WPA "
  242. "IE in EAPOL-Key 2/4");
  243. sta_update_assoc(sta, &elems);
  244. }
  245. }
  246. if (ie.rsn_ie) {
  247. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  248. ie.rsn_ie, ie.rsn_ie_len);
  249. if (os_memcmp(ie.rsn_ie, sta->rsnie, ie.rsn_ie_len) != 0) {
  250. struct ieee802_11_elems elems;
  251. add_note(wt, MSG_INFO,
  252. "Mismatch in RSN IE between EAPOL-Key 2/4 "
  253. "and (Re)Association Request from " MACSTR,
  254. MAC2STR(sta->addr));
  255. wpa_hexdump(MSG_INFO, "RSN IE in EAPOL-Key",
  256. ie.rsn_ie, ie.rsn_ie_len);
  257. wpa_hexdump(MSG_INFO, "RSN IE in (Re)Association "
  258. "Request",
  259. sta->rsnie,
  260. sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
  261. /*
  262. * The sniffer may have missed (Re)Association
  263. * Request, so try to survive with the information from
  264. * EAPOL-Key.
  265. */
  266. os_memset(&elems, 0, sizeof(elems));
  267. elems.rsn_ie = ie.rsn_ie + 2;
  268. elems.rsn_ie_len = ie.rsn_ie_len - 2;
  269. wpa_printf(MSG_DEBUG, "Update STA data based on RSN "
  270. "IE in EAPOL-Key 2/4");
  271. sta_update_assoc(sta, &elems);
  272. }
  273. }
  274. }
  275. static u8 * decrypt_eapol_key_data_rc4(struct wlantest *wt, const u8 *kek,
  276. const struct wpa_eapol_key *hdr,
  277. size_t *len)
  278. {
  279. u8 ek[32], *buf;
  280. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  281. buf = os_malloc(keydatalen);
  282. if (buf == NULL)
  283. return NULL;
  284. os_memcpy(ek, hdr->key_iv, 16);
  285. os_memcpy(ek + 16, kek, 16);
  286. os_memcpy(buf, hdr + 1, keydatalen);
  287. if (rc4_skip(ek, 32, 256, buf, keydatalen)) {
  288. add_note(wt, MSG_INFO, "RC4 failed");
  289. os_free(buf);
  290. return NULL;
  291. }
  292. *len = keydatalen;
  293. return buf;
  294. }
  295. static u8 * decrypt_eapol_key_data_aes(struct wlantest *wt, const u8 *kek,
  296. const struct wpa_eapol_key *hdr,
  297. size_t *len)
  298. {
  299. u8 *buf;
  300. u16 keydatalen = WPA_GET_BE16(hdr->key_data_length);
  301. if (keydatalen % 8) {
  302. add_note(wt, MSG_INFO, "Unsupported AES-WRAP len %d",
  303. keydatalen);
  304. return NULL;
  305. }
  306. keydatalen -= 8; /* AES-WRAP adds 8 bytes */
  307. buf = os_malloc(keydatalen);
  308. if (buf == NULL)
  309. return NULL;
  310. if (aes_unwrap(kek, keydatalen / 8, (u8 *) (hdr + 1), buf)) {
  311. os_free(buf);
  312. add_note(wt, MSG_INFO,
  313. "AES unwrap failed - could not decrypt EAPOL-Key "
  314. "key data");
  315. return NULL;
  316. }
  317. *len = keydatalen;
  318. return buf;
  319. }
  320. static u8 * decrypt_eapol_key_data(struct wlantest *wt, const u8 *kek, u16 ver,
  321. const struct wpa_eapol_key *hdr,
  322. size_t *len)
  323. {
  324. switch (ver) {
  325. case WPA_KEY_INFO_TYPE_HMAC_MD5_RC4:
  326. return decrypt_eapol_key_data_rc4(wt, kek, hdr, len);
  327. case WPA_KEY_INFO_TYPE_HMAC_SHA1_AES:
  328. case WPA_KEY_INFO_TYPE_AES_128_CMAC:
  329. return decrypt_eapol_key_data_aes(wt, kek, hdr, len);
  330. default:
  331. add_note(wt, MSG_INFO,
  332. "Unsupported EAPOL-Key Key Descriptor Version %u",
  333. ver);
  334. return NULL;
  335. }
  336. }
  337. static void learn_kde_keys(struct wlantest *wt, struct wlantest_bss *bss,
  338. struct wlantest_sta *sta,
  339. const u8 *buf, size_t len, const u8 *rsc)
  340. {
  341. struct wpa_eapol_ie_parse ie;
  342. if (wpa_supplicant_parse_ies(buf, len, &ie) < 0) {
  343. add_note(wt, MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  344. return;
  345. }
  346. if (ie.wpa_ie) {
  347. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
  348. ie.wpa_ie, ie.wpa_ie_len);
  349. }
  350. if (ie.rsn_ie) {
  351. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
  352. ie.rsn_ie, ie.rsn_ie_len);
  353. }
  354. if (ie.gtk) {
  355. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - GTK KDE",
  356. ie.gtk, ie.gtk_len);
  357. if (ie.gtk_len >= 2 && ie.gtk_len <= 2 + 32) {
  358. int id;
  359. id = ie.gtk[0] & 0x03;
  360. add_note(wt, MSG_DEBUG, "GTK KeyID=%u tx=%u",
  361. id, !!(ie.gtk[0] & 0x04));
  362. if ((ie.gtk[0] & 0xf8) || ie.gtk[1]) {
  363. add_note(wt, MSG_INFO,
  364. "GTK KDE: Reserved field set: "
  365. "%02x %02x", ie.gtk[0], ie.gtk[1]);
  366. }
  367. wpa_hexdump(MSG_DEBUG, "GTK", ie.gtk + 2,
  368. ie.gtk_len - 2);
  369. bss->gtk_len[id] = ie.gtk_len - 2;
  370. sta->gtk_len = ie.gtk_len - 2;
  371. os_memcpy(bss->gtk[id], ie.gtk + 2, ie.gtk_len - 2);
  372. os_memcpy(sta->gtk, ie.gtk + 2, ie.gtk_len - 2);
  373. bss->rsc[id][0] = rsc[5];
  374. bss->rsc[id][1] = rsc[4];
  375. bss->rsc[id][2] = rsc[3];
  376. bss->rsc[id][3] = rsc[2];
  377. bss->rsc[id][4] = rsc[1];
  378. bss->rsc[id][5] = rsc[0];
  379. bss->gtk_idx = id;
  380. sta->gtk_idx = id;
  381. wpa_hexdump(MSG_DEBUG, "RSC", bss->rsc[id], 6);
  382. } else {
  383. add_note(wt, MSG_INFO, "Invalid GTK KDE length %u",
  384. (unsigned) ie.gtk_len);
  385. }
  386. }
  387. if (ie.igtk) {
  388. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - IGTK KDE",
  389. ie.igtk, ie.igtk_len);
  390. if (ie.igtk_len == 24) {
  391. u16 id;
  392. id = WPA_GET_LE16(ie.igtk);
  393. if (id > 5) {
  394. add_note(wt, MSG_INFO,
  395. "Unexpected IGTK KeyID %u", id);
  396. } else {
  397. const u8 *ipn;
  398. add_note(wt, MSG_DEBUG, "IGTK KeyID %u", id);
  399. wpa_hexdump(MSG_DEBUG, "IPN", ie.igtk + 2, 6);
  400. wpa_hexdump(MSG_DEBUG, "IGTK", ie.igtk + 8,
  401. 16);
  402. os_memcpy(bss->igtk[id], ie.igtk + 8, 16);
  403. bss->igtk_set[id] = 1;
  404. ipn = ie.igtk + 2;
  405. bss->ipn[id][0] = ipn[5];
  406. bss->ipn[id][1] = ipn[4];
  407. bss->ipn[id][2] = ipn[3];
  408. bss->ipn[id][3] = ipn[2];
  409. bss->ipn[id][4] = ipn[1];
  410. bss->ipn[id][5] = ipn[0];
  411. bss->igtk_idx = id;
  412. }
  413. } else {
  414. add_note(wt, MSG_INFO, "Invalid IGTK KDE length %u",
  415. (unsigned) ie.igtk_len);
  416. }
  417. }
  418. }
  419. static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
  420. const u8 *src, const u8 *data, size_t len)
  421. {
  422. struct wlantest_bss *bss;
  423. struct wlantest_sta *sta;
  424. const struct ieee802_1x_hdr *eapol;
  425. const struct wpa_eapol_key *hdr;
  426. const u8 *key_data, *kck, *kek;
  427. int recalc = 0;
  428. u16 key_info, ver;
  429. u8 *decrypted_buf = NULL;
  430. const u8 *decrypted;
  431. size_t decrypted_len = 0;
  432. struct wpa_eapol_ie_parse ie;
  433. wpa_printf(MSG_DEBUG, "EAPOL-Key 3/4 " MACSTR " -> " MACSTR,
  434. MAC2STR(src), MAC2STR(dst));
  435. bss = bss_get(wt, src);
  436. if (bss == NULL)
  437. return;
  438. sta = sta_get(bss, dst);
  439. if (sta == NULL)
  440. return;
  441. eapol = (const struct ieee802_1x_hdr *) data;
  442. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  443. key_info = WPA_GET_BE16(hdr->key_info);
  444. if (os_memcmp(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN) != 0) {
  445. add_note(wt, MSG_INFO,
  446. "EAPOL-Key ANonce mismatch between 1/4 and 3/4");
  447. recalc = 1;
  448. }
  449. os_memcpy(sta->anonce, hdr->key_nonce, WPA_NONCE_LEN);
  450. if (recalc) {
  451. derive_ptk(wt, bss, sta, key_info & WPA_KEY_INFO_TYPE_MASK,
  452. data, len);
  453. }
  454. if (!sta->ptk_set && !sta->tptk_set) {
  455. add_note(wt, MSG_DEBUG,
  456. "No PTK known to process EAPOL-Key 3/4");
  457. return;
  458. }
  459. kek = sta->ptk.kek;
  460. kck = sta->ptk.kck;
  461. if (sta->tptk_set) {
  462. add_note(wt, MSG_DEBUG,
  463. "Use TPTK for validation EAPOL-Key MIC");
  464. kck = sta->tptk.kck;
  465. kek = sta->tptk.kek;
  466. }
  467. if (check_mic(kck, key_info & WPA_KEY_INFO_TYPE_MASK, data, len) < 0) {
  468. add_note(wt, MSG_INFO, "Mismatch in EAPOL-Key 3/4 MIC");
  469. return;
  470. }
  471. add_note(wt, MSG_DEBUG, "Valid MIC found in EAPOL-Key 3/4");
  472. key_data = (const u8 *) (hdr + 1);
  473. if (!(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
  474. if (sta->proto & WPA_PROTO_RSN)
  475. add_note(wt, MSG_INFO,
  476. "EAPOL-Key 3/4 without EncrKeyData bit");
  477. decrypted = key_data;
  478. decrypted_len = WPA_GET_BE16(hdr->key_data_length);
  479. } else {
  480. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  481. decrypted_buf = decrypt_eapol_key_data(wt, kek, ver, hdr,
  482. &decrypted_len);
  483. if (decrypted_buf == NULL) {
  484. add_note(wt, MSG_INFO,
  485. "Failed to decrypt EAPOL-Key Key Data");
  486. return;
  487. }
  488. decrypted = decrypted_buf;
  489. wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
  490. decrypted, decrypted_len);
  491. }
  492. if (wt->write_pcap_dumper && decrypted != key_data) {
  493. /* Fill in a dummy Data frame header */
  494. u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr)];
  495. struct ieee80211_hdr *h;
  496. struct wpa_eapol_key *k;
  497. const u8 *p;
  498. u8 *pos;
  499. size_t plain_len;
  500. plain_len = decrypted_len;
  501. p = decrypted;
  502. while (p + 1 < decrypted + decrypted_len) {
  503. if (p[0] == 0xdd && p[1] == 0x00) {
  504. /* Remove padding */
  505. plain_len = p - decrypted;
  506. break;
  507. }
  508. p += 2 + p[1];
  509. }
  510. os_memset(buf, 0, sizeof(buf));
  511. h = (struct ieee80211_hdr *) buf;
  512. h->frame_control = host_to_le16(0x0208);
  513. os_memcpy(h->addr1, dst, ETH_ALEN);
  514. os_memcpy(h->addr2, src, ETH_ALEN);
  515. os_memcpy(h->addr3, src, ETH_ALEN);
  516. pos = (u8 *) (h + 1);
  517. os_memcpy(pos, "\xaa\xaa\x03\x00\x00\x00\x88\x8e", 8);
  518. pos += 8;
  519. os_memcpy(pos, eapol, sizeof(*eapol));
  520. pos += sizeof(*eapol);
  521. os_memcpy(pos, hdr, sizeof(*hdr));
  522. k = (struct wpa_eapol_key *) pos;
  523. WPA_PUT_BE16(k->key_info,
  524. key_info & ~WPA_KEY_INFO_ENCR_KEY_DATA);
  525. WPA_PUT_BE16(k->key_data_length, plain_len);
  526. write_pcap_decrypted(wt, buf, sizeof(buf),
  527. decrypted, plain_len);
  528. }
  529. if (wpa_supplicant_parse_ies(decrypted, decrypted_len, &ie) < 0) {
  530. add_note(wt, MSG_INFO, "Failed to parse EAPOL-Key Key Data");
  531. os_free(decrypted_buf);
  532. return;
  533. }
  534. if ((ie.wpa_ie &&
  535. os_memcmp(ie.wpa_ie, bss->wpaie, ie.wpa_ie_len) != 0) ||
  536. (ie.wpa_ie == NULL && bss->wpaie[0])) {
  537. add_note(wt, MSG_INFO,
  538. "Mismatch in WPA IE between EAPOL-Key 3/4 and "
  539. "Beacon/Probe Response from " MACSTR,
  540. MAC2STR(bss->bssid));
  541. wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
  542. ie.wpa_ie, ie.wpa_ie_len);
  543. wpa_hexdump(MSG_INFO, "WPA IE in Beacon/Probe "
  544. "Response",
  545. bss->wpaie,
  546. bss->wpaie[0] ? 2 + bss->wpaie[1] : 0);
  547. }
  548. if ((ie.rsn_ie &&
  549. os_memcmp(ie.rsn_ie, bss->rsnie, ie.rsn_ie_len) != 0) ||
  550. (ie.rsn_ie == NULL && bss->rsnie[0])) {
  551. add_note(wt, MSG_INFO, "Mismatch in RSN IE between EAPOL-Key "
  552. "3/4 and Beacon/Probe Response from " MACSTR,
  553. MAC2STR(bss->bssid));
  554. wpa_hexdump(MSG_INFO, "RSN IE in EAPOL-Key",
  555. ie.rsn_ie, ie.rsn_ie_len);
  556. wpa_hexdump(MSG_INFO, "RSN IE in (Re)Association "
  557. "Request",
  558. bss->rsnie,
  559. bss->rsnie[0] ? 2 + bss->rsnie[1] : 0);
  560. }
  561. learn_kde_keys(wt, bss, sta, decrypted, decrypted_len, hdr->key_rsc);
  562. os_free(decrypted_buf);
  563. }
  564. static void rx_data_eapol_key_4_of_4(struct wlantest *wt, const u8 *dst,
  565. const u8 *src, const u8 *data, size_t len)
  566. {
  567. struct wlantest_bss *bss;
  568. struct wlantest_sta *sta;
  569. const struct ieee802_1x_hdr *eapol;
  570. const struct wpa_eapol_key *hdr;
  571. u16 key_info;
  572. const u8 *kck;
  573. wpa_printf(MSG_DEBUG, "EAPOL-Key 4/4 " MACSTR " -> " MACSTR,
  574. MAC2STR(src), MAC2STR(dst));
  575. bss = bss_get(wt, dst);
  576. if (bss == NULL)
  577. return;
  578. sta = sta_get(bss, src);
  579. if (sta == NULL)
  580. return;
  581. eapol = (const struct ieee802_1x_hdr *) data;
  582. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  583. if (!is_zero(hdr->key_rsc, 8)) {
  584. add_note(wt, MSG_INFO, "EAPOL-Key 4/4 from " MACSTR " used "
  585. "non-zero Key RSC", MAC2STR(src));
  586. }
  587. key_info = WPA_GET_BE16(hdr->key_info);
  588. if (!sta->ptk_set && !sta->tptk_set) {
  589. add_note(wt, MSG_DEBUG,
  590. "No PTK known to process EAPOL-Key 4/4");
  591. return;
  592. }
  593. kck = sta->ptk.kck;
  594. if (sta->tptk_set) {
  595. add_note(wt, MSG_DEBUG,
  596. "Use TPTK for validation EAPOL-Key MIC");
  597. kck = sta->tptk.kck;
  598. }
  599. if (check_mic(kck, key_info & WPA_KEY_INFO_TYPE_MASK, data, len) < 0) {
  600. add_note(wt, MSG_INFO, "Mismatch in EAPOL-Key 4/4 MIC");
  601. return;
  602. }
  603. add_note(wt, MSG_DEBUG, "Valid MIC found in EAPOL-Key 4/4");
  604. if (sta->tptk_set) {
  605. add_note(wt, MSG_DEBUG, "Update PTK (rekeying)");
  606. os_memcpy(&sta->ptk, &sta->tptk, sizeof(sta->ptk));
  607. sta->ptk_set = 1;
  608. sta->tptk_set = 0;
  609. os_memset(sta->rsc_tods, 0, sizeof(sta->rsc_tods));
  610. os_memset(sta->rsc_fromds, 0, sizeof(sta->rsc_fromds));
  611. }
  612. }
  613. static void rx_data_eapol_key_1_of_2(struct wlantest *wt, const u8 *dst,
  614. const u8 *src, const u8 *data, size_t len)
  615. {
  616. struct wlantest_bss *bss;
  617. struct wlantest_sta *sta;
  618. const struct ieee802_1x_hdr *eapol;
  619. const struct wpa_eapol_key *hdr;
  620. u16 key_info, ver;
  621. u8 *decrypted;
  622. size_t decrypted_len = 0;
  623. wpa_printf(MSG_DEBUG, "EAPOL-Key 1/2 " MACSTR " -> " MACSTR,
  624. MAC2STR(src), MAC2STR(dst));
  625. bss = bss_get(wt, src);
  626. if (bss == NULL)
  627. return;
  628. sta = sta_get(bss, dst);
  629. if (sta == NULL)
  630. return;
  631. eapol = (const struct ieee802_1x_hdr *) data;
  632. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  633. key_info = WPA_GET_BE16(hdr->key_info);
  634. if (!sta->ptk_set) {
  635. add_note(wt, MSG_DEBUG,
  636. "No PTK known to process EAPOL-Key 1/2");
  637. return;
  638. }
  639. if (sta->ptk_set &&
  640. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  641. data, len) < 0) {
  642. add_note(wt, MSG_INFO, "Mismatch in EAPOL-Key 1/2 MIC");
  643. return;
  644. }
  645. add_note(wt, MSG_DEBUG, "Valid MIC found in EAPOL-Key 1/2");
  646. if (sta->proto & WPA_PROTO_RSN &&
  647. !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
  648. add_note(wt, MSG_INFO, "EAPOL-Key 1/2 without EncrKeyData bit");
  649. return;
  650. }
  651. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  652. decrypted = decrypt_eapol_key_data(wt, sta->ptk.kek, ver, hdr,
  653. &decrypted_len);
  654. if (decrypted == NULL) {
  655. add_note(wt, MSG_INFO, "Failed to decrypt EAPOL-Key Key Data");
  656. return;
  657. }
  658. wpa_hexdump(MSG_DEBUG, "Decrypted EAPOL-Key Key Data",
  659. decrypted, decrypted_len);
  660. if (wt->write_pcap_dumper) {
  661. /* Fill in a dummy Data frame header */
  662. u8 buf[24 + 8 + sizeof(*eapol) + sizeof(*hdr)];
  663. struct ieee80211_hdr *h;
  664. struct wpa_eapol_key *k;
  665. u8 *pos;
  666. size_t plain_len;
  667. plain_len = decrypted_len;
  668. pos = decrypted;
  669. while (pos + 1 < decrypted + decrypted_len) {
  670. if (pos[0] == 0xdd && pos[1] == 0x00) {
  671. /* Remove padding */
  672. plain_len = pos - decrypted;
  673. break;
  674. }
  675. pos += 2 + pos[1];
  676. }
  677. os_memset(buf, 0, sizeof(buf));
  678. h = (struct ieee80211_hdr *) buf;
  679. h->frame_control = host_to_le16(0x0208);
  680. os_memcpy(h->addr1, dst, ETH_ALEN);
  681. os_memcpy(h->addr2, src, ETH_ALEN);
  682. os_memcpy(h->addr3, src, ETH_ALEN);
  683. pos = (u8 *) (h + 1);
  684. os_memcpy(pos, "\xaa\xaa\x03\x00\x00\x00\x88\x8e", 8);
  685. pos += 8;
  686. os_memcpy(pos, eapol, sizeof(*eapol));
  687. pos += sizeof(*eapol);
  688. os_memcpy(pos, hdr, sizeof(*hdr));
  689. k = (struct wpa_eapol_key *) pos;
  690. WPA_PUT_BE16(k->key_info,
  691. key_info & ~WPA_KEY_INFO_ENCR_KEY_DATA);
  692. WPA_PUT_BE16(k->key_data_length, plain_len);
  693. write_pcap_decrypted(wt, buf, sizeof(buf),
  694. decrypted, plain_len);
  695. }
  696. if (sta->proto & WPA_PROTO_RSN)
  697. learn_kde_keys(wt, bss, sta, decrypted, decrypted_len,
  698. hdr->key_rsc);
  699. else {
  700. int klen = bss->group_cipher == WPA_CIPHER_TKIP ? 32 : 16;
  701. if (decrypted_len == klen) {
  702. const u8 *rsc = hdr->key_rsc;
  703. int id;
  704. id = (key_info & WPA_KEY_INFO_KEY_INDEX_MASK) >>
  705. WPA_KEY_INFO_KEY_INDEX_SHIFT;
  706. add_note(wt, MSG_DEBUG, "GTK key index %d", id);
  707. wpa_hexdump(MSG_DEBUG, "GTK", decrypted,
  708. decrypted_len);
  709. bss->gtk_len[id] = decrypted_len;
  710. os_memcpy(bss->gtk[id], decrypted, decrypted_len);
  711. bss->rsc[id][0] = rsc[5];
  712. bss->rsc[id][1] = rsc[4];
  713. bss->rsc[id][2] = rsc[3];
  714. bss->rsc[id][3] = rsc[2];
  715. bss->rsc[id][4] = rsc[1];
  716. bss->rsc[id][5] = rsc[0];
  717. wpa_hexdump(MSG_DEBUG, "RSC", bss->rsc[id], 6);
  718. } else {
  719. add_note(wt, MSG_INFO, "Unexpected WPA Key Data length "
  720. "in Group Key msg 1/2 from " MACSTR,
  721. MAC2STR(src));
  722. }
  723. }
  724. os_free(decrypted);
  725. }
  726. static void rx_data_eapol_key_2_of_2(struct wlantest *wt, const u8 *dst,
  727. const u8 *src, const u8 *data, size_t len)
  728. {
  729. struct wlantest_bss *bss;
  730. struct wlantest_sta *sta;
  731. const struct ieee802_1x_hdr *eapol;
  732. const struct wpa_eapol_key *hdr;
  733. u16 key_info;
  734. wpa_printf(MSG_DEBUG, "EAPOL-Key 2/2 " MACSTR " -> " MACSTR,
  735. MAC2STR(src), MAC2STR(dst));
  736. bss = bss_get(wt, dst);
  737. if (bss == NULL)
  738. return;
  739. sta = sta_get(bss, src);
  740. if (sta == NULL)
  741. return;
  742. eapol = (const struct ieee802_1x_hdr *) data;
  743. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  744. if (!is_zero(hdr->key_rsc, 8)) {
  745. add_note(wt, MSG_INFO, "EAPOL-Key 2/2 from " MACSTR " used "
  746. "non-zero Key RSC", MAC2STR(src));
  747. }
  748. key_info = WPA_GET_BE16(hdr->key_info);
  749. if (!sta->ptk_set) {
  750. add_note(wt, MSG_DEBUG,
  751. "No PTK known to process EAPOL-Key 2/2");
  752. return;
  753. }
  754. if (sta->ptk_set &&
  755. check_mic(sta->ptk.kck, key_info & WPA_KEY_INFO_TYPE_MASK,
  756. data, len) < 0) {
  757. add_note(wt, MSG_INFO, "Mismatch in EAPOL-Key 2/2 MIC");
  758. return;
  759. }
  760. add_note(wt, MSG_DEBUG, "Valid MIC found in EAPOL-Key 2/2");
  761. }
  762. static void rx_data_eapol_key(struct wlantest *wt, const u8 *dst,
  763. const u8 *src, const u8 *data, size_t len,
  764. int prot)
  765. {
  766. const struct ieee802_1x_hdr *eapol;
  767. const struct wpa_eapol_key *hdr;
  768. const u8 *key_data;
  769. u16 key_info, key_length, ver, key_data_length;
  770. eapol = (const struct ieee802_1x_hdr *) data;
  771. hdr = (const struct wpa_eapol_key *) (eapol + 1);
  772. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key",
  773. (const u8 *) hdr, len - sizeof(*eapol));
  774. if (len < sizeof(*hdr)) {
  775. add_note(wt, MSG_INFO, "Too short EAPOL-Key frame from " MACSTR,
  776. MAC2STR(src));
  777. return;
  778. }
  779. if (hdr->type == EAPOL_KEY_TYPE_RC4) {
  780. /* TODO: EAPOL-Key RC4 for WEP */
  781. wpa_printf(MSG_INFO, "EAPOL-Key Descriptor Type RC4 from "
  782. MACSTR, MAC2STR(src));
  783. return;
  784. }
  785. if (hdr->type != EAPOL_KEY_TYPE_RSN &&
  786. hdr->type != EAPOL_KEY_TYPE_WPA) {
  787. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Descriptor Type "
  788. "%u from " MACSTR, hdr->type, MAC2STR(src));
  789. return;
  790. }
  791. key_info = WPA_GET_BE16(hdr->key_info);
  792. key_length = WPA_GET_BE16(hdr->key_length);
  793. key_data_length = WPA_GET_BE16(hdr->key_data_length);
  794. key_data = (const u8 *) (hdr + 1);
  795. if (key_data + key_data_length > data + len) {
  796. add_note(wt, MSG_INFO, "Truncated EAPOL-Key from " MACSTR,
  797. MAC2STR(src));
  798. return;
  799. }
  800. if (key_data + key_data_length < data + len) {
  801. wpa_hexdump(MSG_DEBUG, "Extra data after EAPOL-Key Key Data "
  802. "field", key_data + key_data_length,
  803. data + len - key_data - key_data_length);
  804. }
  805. ver = key_info & WPA_KEY_INFO_TYPE_MASK;
  806. wpa_printf(MSG_DEBUG, "EAPOL-Key ver=%u %c idx=%u%s%s%s%s%s%s%s%s "
  807. "datalen=%u",
  808. ver, key_info & WPA_KEY_INFO_KEY_TYPE ? 'P' : 'G',
  809. (key_info & WPA_KEY_INFO_KEY_INDEX_MASK) >>
  810. WPA_KEY_INFO_KEY_INDEX_SHIFT,
  811. (key_info & WPA_KEY_INFO_INSTALL) ? " Install" : "",
  812. (key_info & WPA_KEY_INFO_ACK) ? " ACK" : "",
  813. (key_info & WPA_KEY_INFO_MIC) ? " MIC" : "",
  814. (key_info & WPA_KEY_INFO_SECURE) ? " Secure" : "",
  815. (key_info & WPA_KEY_INFO_ERROR) ? " Error" : "",
  816. (key_info & WPA_KEY_INFO_REQUEST) ? " Request" : "",
  817. (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) ? " Encr" : "",
  818. (key_info & WPA_KEY_INFO_SMK_MESSAGE) ? " SMK" : "",
  819. key_data_length);
  820. if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
  821. ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
  822. ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
  823. wpa_printf(MSG_INFO, "Unsupported EAPOL-Key Key Descriptor "
  824. "Version %u from " MACSTR, ver, MAC2STR(src));
  825. return;
  826. }
  827. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Replay Counter",
  828. hdr->replay_counter, WPA_REPLAY_COUNTER_LEN);
  829. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Nonce",
  830. hdr->key_nonce, WPA_NONCE_LEN);
  831. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key IV",
  832. hdr->key_iv, 16);
  833. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key RSC",
  834. hdr->key_rsc, WPA_KEY_RSC_LEN);
  835. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key MIC",
  836. hdr->key_mic, 16);
  837. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data",
  838. key_data, key_data_length);
  839. if (hdr->type == EAPOL_KEY_TYPE_RSN &&
  840. (key_info & (WPA_KEY_INFO_KEY_INDEX_MASK | BIT(14) | BIT(15))) !=
  841. 0) {
  842. wpa_printf(MSG_INFO, "RSN EAPOL-Key with non-zero reserved "
  843. "Key Info bits 0x%x from " MACSTR,
  844. key_info, MAC2STR(src));
  845. }
  846. if (hdr->type == EAPOL_KEY_TYPE_WPA &&
  847. (key_info & (WPA_KEY_INFO_ENCR_KEY_DATA |
  848. WPA_KEY_INFO_SMK_MESSAGE |BIT(14) | BIT(15))) != 0) {
  849. wpa_printf(MSG_INFO, "WPA EAPOL-Key with non-zero reserved "
  850. "Key Info bits 0x%x from " MACSTR,
  851. key_info, MAC2STR(src));
  852. }
  853. if (key_length > 32) {
  854. wpa_printf(MSG_INFO, "EAPOL-Key with invalid Key Length %d "
  855. "from " MACSTR, key_length, MAC2STR(src));
  856. }
  857. if (ver != WPA_KEY_INFO_TYPE_HMAC_MD5_RC4 &&
  858. !is_zero(hdr->key_iv, 16)) {
  859. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key IV "
  860. "(reserved with ver=%d) field from " MACSTR,
  861. ver, MAC2STR(src));
  862. wpa_hexdump(MSG_INFO, "EAPOL-Key Key IV (reserved)",
  863. hdr->key_iv, 16);
  864. }
  865. if (!is_zero(hdr->key_id, 8)) {
  866. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key ID "
  867. "(reserved) field from " MACSTR, MAC2STR(src));
  868. wpa_hexdump(MSG_INFO, "EAPOL-Key Key ID (reserved)",
  869. hdr->key_id, 8);
  870. }
  871. if (hdr->key_rsc[6] || hdr->key_rsc[7]) {
  872. wpa_printf(MSG_INFO, "EAPOL-Key with non-zero Key RSC octets "
  873. "(last two are unused)" MACSTR, MAC2STR(src));
  874. }
  875. if (key_info & (WPA_KEY_INFO_ERROR | WPA_KEY_INFO_REQUEST))
  876. return;
  877. if (key_info & WPA_KEY_INFO_SMK_MESSAGE)
  878. return;
  879. if (key_info & WPA_KEY_INFO_KEY_TYPE) {
  880. /* 4-Way Handshake */
  881. switch (key_info & (WPA_KEY_INFO_SECURE |
  882. WPA_KEY_INFO_MIC |
  883. WPA_KEY_INFO_ACK |
  884. WPA_KEY_INFO_INSTALL)) {
  885. case WPA_KEY_INFO_ACK:
  886. rx_data_eapol_key_1_of_4(wt, dst, src, data, len);
  887. break;
  888. case WPA_KEY_INFO_MIC:
  889. if (key_data_length == 0)
  890. rx_data_eapol_key_4_of_4(wt, dst, src, data,
  891. len);
  892. else
  893. rx_data_eapol_key_2_of_4(wt, dst, src, data,
  894. len);
  895. break;
  896. case WPA_KEY_INFO_MIC | WPA_KEY_INFO_ACK |
  897. WPA_KEY_INFO_INSTALL:
  898. /* WPA does not include Secure bit in 3/4 */
  899. rx_data_eapol_key_3_of_4(wt, dst, src, data, len);
  900. break;
  901. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  902. WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL:
  903. rx_data_eapol_key_3_of_4(wt, dst, src, data, len);
  904. break;
  905. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  906. if (key_data_length == 0)
  907. rx_data_eapol_key_4_of_4(wt, dst, src, data,
  908. len);
  909. else
  910. rx_data_eapol_key_2_of_4(wt, dst, src, data,
  911. len);
  912. break;
  913. default:
  914. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  915. break;
  916. }
  917. } else {
  918. /* Group Key Handshake */
  919. switch (key_info & (WPA_KEY_INFO_SECURE |
  920. WPA_KEY_INFO_MIC |
  921. WPA_KEY_INFO_ACK)) {
  922. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC |
  923. WPA_KEY_INFO_ACK:
  924. rx_data_eapol_key_1_of_2(wt, dst, src, data, len);
  925. break;
  926. case WPA_KEY_INFO_SECURE | WPA_KEY_INFO_MIC:
  927. rx_data_eapol_key_2_of_2(wt, dst, src, data, len);
  928. break;
  929. default:
  930. wpa_printf(MSG_DEBUG, "Unsupported EAPOL-Key frame");
  931. break;
  932. }
  933. }
  934. }
  935. void rx_data_eapol(struct wlantest *wt, const u8 *dst, const u8 *src,
  936. const u8 *data, size_t len, int prot)
  937. {
  938. const struct ieee802_1x_hdr *hdr;
  939. u16 length;
  940. const u8 *p;
  941. wpa_hexdump(MSG_EXCESSIVE, "EAPOL", data, len);
  942. if (len < sizeof(*hdr)) {
  943. wpa_printf(MSG_INFO, "Too short EAPOL frame from " MACSTR,
  944. MAC2STR(src));
  945. return;
  946. }
  947. hdr = (const struct ieee802_1x_hdr *) data;
  948. length = be_to_host16(hdr->length);
  949. wpa_printf(MSG_DEBUG, "RX EAPOL: " MACSTR " -> " MACSTR "%s ver=%u "
  950. "type=%u len=%u",
  951. MAC2STR(src), MAC2STR(dst), prot ? " Prot" : "",
  952. hdr->version, hdr->type, length);
  953. if (hdr->version < 1 || hdr->version > 3) {
  954. wpa_printf(MSG_INFO, "Unexpected EAPOL version %u from "
  955. MACSTR, hdr->version, MAC2STR(src));
  956. }
  957. if (sizeof(*hdr) + length > len) {
  958. wpa_printf(MSG_INFO, "Truncated EAPOL frame from " MACSTR,
  959. MAC2STR(src));
  960. return;
  961. }
  962. if (sizeof(*hdr) + length < len) {
  963. wpa_printf(MSG_INFO, "EAPOL frame with %d extra bytes",
  964. (int) (len - sizeof(*hdr) - length));
  965. }
  966. p = (const u8 *) (hdr + 1);
  967. switch (hdr->type) {
  968. case IEEE802_1X_TYPE_EAP_PACKET:
  969. wpa_hexdump(MSG_MSGDUMP, "EAPOL - EAP packet", p, length);
  970. break;
  971. case IEEE802_1X_TYPE_EAPOL_START:
  972. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Start", p, length);
  973. break;
  974. case IEEE802_1X_TYPE_EAPOL_LOGOFF:
  975. wpa_hexdump(MSG_MSGDUMP, "EAPOL-Logoff", p, length);
  976. break;
  977. case IEEE802_1X_TYPE_EAPOL_KEY:
  978. rx_data_eapol_key(wt, dst, src, data, sizeof(*hdr) + length,
  979. prot);
  980. break;
  981. case IEEE802_1X_TYPE_EAPOL_ENCAPSULATED_ASF_ALERT:
  982. wpa_hexdump(MSG_MSGDUMP, "EAPOL - Encapsulated ASF alert",
  983. p, length);
  984. break;
  985. default:
  986. wpa_hexdump(MSG_MSGDUMP, "Unknown EAPOL payload", p, length);
  987. break;
  988. }
  989. }