wps_attr_build.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435
  1. /*
  2. * Wi-Fi Protected Setup - attribute building
  3. * Copyright (c) 2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/aes_wrap.h"
  11. #include "crypto/crypto.h"
  12. #include "crypto/dh_group5.h"
  13. #include "crypto/sha256.h"
  14. #include "crypto/random.h"
  15. #include "common/ieee802_11_defs.h"
  16. #include "wps_i.h"
  17. int wps_build_public_key(struct wps_data *wps, struct wpabuf *msg)
  18. {
  19. struct wpabuf *pubkey;
  20. wpa_printf(MSG_DEBUG, "WPS: * Public Key");
  21. wpabuf_free(wps->dh_privkey);
  22. if (wps->dev_pw_id != DEV_PW_DEFAULT && wps->wps->dh_privkey) {
  23. wpa_printf(MSG_DEBUG, "WPS: Using pre-configured DH keys");
  24. wps->dh_privkey = wpabuf_dup(wps->wps->dh_privkey);
  25. wps->dh_ctx = wps->wps->dh_ctx;
  26. wps->wps->dh_ctx = NULL;
  27. pubkey = wpabuf_dup(wps->wps->dh_pubkey);
  28. #ifdef CONFIG_WPS_NFC
  29. } else if (wps->dev_pw_id >= 0x10 && wps->wps->ap &&
  30. wps->dev_pw_id == wps->wps->ap_nfc_dev_pw_id) {
  31. wpa_printf(MSG_DEBUG, "WPS: Using NFC password token DH keys");
  32. wps->dh_privkey = wpabuf_dup(wps->wps->ap_nfc_dh_privkey);
  33. pubkey = wpabuf_dup(wps->wps->ap_nfc_dh_pubkey);
  34. wps->dh_ctx = dh5_init_fixed(wps->dh_privkey, pubkey);
  35. #endif /* CONFIG_WPS_NFC */
  36. } else {
  37. wpa_printf(MSG_DEBUG, "WPS: Generate new DH keys");
  38. wps->dh_privkey = NULL;
  39. dh5_free(wps->dh_ctx);
  40. wps->dh_ctx = dh5_init(&wps->dh_privkey, &pubkey);
  41. pubkey = wpabuf_zeropad(pubkey, 192);
  42. }
  43. if (wps->dh_ctx == NULL || wps->dh_privkey == NULL || pubkey == NULL) {
  44. wpa_printf(MSG_DEBUG, "WPS: Failed to initialize "
  45. "Diffie-Hellman handshake");
  46. wpabuf_free(pubkey);
  47. return -1;
  48. }
  49. wpa_hexdump_buf_key(MSG_DEBUG, "WPS: DH Private Key", wps->dh_privkey);
  50. wpa_hexdump_buf(MSG_DEBUG, "WPS: DH own Public Key", pubkey);
  51. wpabuf_put_be16(msg, ATTR_PUBLIC_KEY);
  52. wpabuf_put_be16(msg, wpabuf_len(pubkey));
  53. wpabuf_put_buf(msg, pubkey);
  54. if (wps->registrar) {
  55. wpabuf_free(wps->dh_pubkey_r);
  56. wps->dh_pubkey_r = pubkey;
  57. } else {
  58. wpabuf_free(wps->dh_pubkey_e);
  59. wps->dh_pubkey_e = pubkey;
  60. }
  61. return 0;
  62. }
  63. int wps_build_req_type(struct wpabuf *msg, enum wps_request_type type)
  64. {
  65. wpa_printf(MSG_DEBUG, "WPS: * Request Type");
  66. wpabuf_put_be16(msg, ATTR_REQUEST_TYPE);
  67. wpabuf_put_be16(msg, 1);
  68. wpabuf_put_u8(msg, type);
  69. return 0;
  70. }
  71. int wps_build_resp_type(struct wpabuf *msg, enum wps_response_type type)
  72. {
  73. wpa_printf(MSG_DEBUG, "WPS: * Response Type (%d)", type);
  74. wpabuf_put_be16(msg, ATTR_RESPONSE_TYPE);
  75. wpabuf_put_be16(msg, 1);
  76. wpabuf_put_u8(msg, type);
  77. return 0;
  78. }
  79. int wps_build_config_methods(struct wpabuf *msg, u16 methods)
  80. {
  81. wpa_printf(MSG_DEBUG, "WPS: * Config Methods (%x)", methods);
  82. wpabuf_put_be16(msg, ATTR_CONFIG_METHODS);
  83. wpabuf_put_be16(msg, 2);
  84. wpabuf_put_be16(msg, methods);
  85. return 0;
  86. }
  87. int wps_build_uuid_e(struct wpabuf *msg, const u8 *uuid)
  88. {
  89. wpa_printf(MSG_DEBUG, "WPS: * UUID-E");
  90. wpabuf_put_be16(msg, ATTR_UUID_E);
  91. wpabuf_put_be16(msg, WPS_UUID_LEN);
  92. wpabuf_put_data(msg, uuid, WPS_UUID_LEN);
  93. return 0;
  94. }
  95. int wps_build_dev_password_id(struct wpabuf *msg, u16 id)
  96. {
  97. wpa_printf(MSG_DEBUG, "WPS: * Device Password ID (%d)", id);
  98. wpabuf_put_be16(msg, ATTR_DEV_PASSWORD_ID);
  99. wpabuf_put_be16(msg, 2);
  100. wpabuf_put_be16(msg, id);
  101. return 0;
  102. }
  103. int wps_build_config_error(struct wpabuf *msg, u16 err)
  104. {
  105. wpa_printf(MSG_DEBUG, "WPS: * Configuration Error (%d)", err);
  106. wpabuf_put_be16(msg, ATTR_CONFIG_ERROR);
  107. wpabuf_put_be16(msg, 2);
  108. wpabuf_put_be16(msg, err);
  109. return 0;
  110. }
  111. int wps_build_authenticator(struct wps_data *wps, struct wpabuf *msg)
  112. {
  113. u8 hash[SHA256_MAC_LEN];
  114. const u8 *addr[2];
  115. size_t len[2];
  116. if (wps->last_msg == NULL) {
  117. wpa_printf(MSG_DEBUG, "WPS: Last message not available for "
  118. "building authenticator");
  119. return -1;
  120. }
  121. /* Authenticator = HMAC-SHA256_AuthKey(M_prev || M_curr*)
  122. * (M_curr* is M_curr without the Authenticator attribute)
  123. */
  124. addr[0] = wpabuf_head(wps->last_msg);
  125. len[0] = wpabuf_len(wps->last_msg);
  126. addr[1] = wpabuf_head(msg);
  127. len[1] = wpabuf_len(msg);
  128. hmac_sha256_vector(wps->authkey, WPS_AUTHKEY_LEN, 2, addr, len, hash);
  129. wpa_printf(MSG_DEBUG, "WPS: * Authenticator");
  130. wpabuf_put_be16(msg, ATTR_AUTHENTICATOR);
  131. wpabuf_put_be16(msg, WPS_AUTHENTICATOR_LEN);
  132. wpabuf_put_data(msg, hash, WPS_AUTHENTICATOR_LEN);
  133. return 0;
  134. }
  135. int wps_build_version(struct wpabuf *msg)
  136. {
  137. /*
  138. * Note: This attribute is deprecated and set to hardcoded 0x10 for
  139. * backwards compatibility reasons. The real version negotiation is
  140. * done with Version2.
  141. */
  142. wpa_printf(MSG_DEBUG, "WPS: * Version (hardcoded 0x10)");
  143. wpabuf_put_be16(msg, ATTR_VERSION);
  144. wpabuf_put_be16(msg, 1);
  145. wpabuf_put_u8(msg, 0x10);
  146. return 0;
  147. }
  148. int wps_build_wfa_ext(struct wpabuf *msg, int req_to_enroll,
  149. const u8 *auth_macs, size_t auth_macs_count)
  150. {
  151. #ifdef CONFIG_WPS2
  152. u8 *len;
  153. wpabuf_put_be16(msg, ATTR_VENDOR_EXT);
  154. len = wpabuf_put(msg, 2); /* to be filled */
  155. wpabuf_put_be24(msg, WPS_VENDOR_ID_WFA);
  156. wpa_printf(MSG_DEBUG, "WPS: * Version2 (0x%x)", WPS_VERSION);
  157. wpabuf_put_u8(msg, WFA_ELEM_VERSION2);
  158. wpabuf_put_u8(msg, 1);
  159. wpabuf_put_u8(msg, WPS_VERSION);
  160. if (req_to_enroll) {
  161. wpa_printf(MSG_DEBUG, "WPS: * Request to Enroll (1)");
  162. wpabuf_put_u8(msg, WFA_ELEM_REQUEST_TO_ENROLL);
  163. wpabuf_put_u8(msg, 1);
  164. wpabuf_put_u8(msg, 1);
  165. }
  166. if (auth_macs && auth_macs_count) {
  167. size_t i;
  168. wpa_printf(MSG_DEBUG, "WPS: * AuthorizedMACs (count=%d)",
  169. (int) auth_macs_count);
  170. wpabuf_put_u8(msg, WFA_ELEM_AUTHORIZEDMACS);
  171. wpabuf_put_u8(msg, auth_macs_count * ETH_ALEN);
  172. wpabuf_put_data(msg, auth_macs, auth_macs_count * ETH_ALEN);
  173. for (i = 0; i < auth_macs_count; i++)
  174. wpa_printf(MSG_DEBUG, "WPS: AuthorizedMAC: " MACSTR,
  175. MAC2STR(&auth_macs[i * ETH_ALEN]));
  176. }
  177. WPA_PUT_BE16(len, (u8 *) wpabuf_put(msg, 0) - len - 2);
  178. #endif /* CONFIG_WPS2 */
  179. #ifdef CONFIG_WPS_TESTING
  180. if (WPS_VERSION > 0x20) {
  181. wpa_printf(MSG_DEBUG, "WPS: * Extensibility Testing - extra "
  182. "attribute");
  183. wpabuf_put_be16(msg, ATTR_EXTENSIBILITY_TEST);
  184. wpabuf_put_be16(msg, 1);
  185. wpabuf_put_u8(msg, 42);
  186. }
  187. #endif /* CONFIG_WPS_TESTING */
  188. return 0;
  189. }
  190. int wps_build_msg_type(struct wpabuf *msg, enum wps_msg_type msg_type)
  191. {
  192. wpa_printf(MSG_DEBUG, "WPS: * Message Type (%d)", msg_type);
  193. wpabuf_put_be16(msg, ATTR_MSG_TYPE);
  194. wpabuf_put_be16(msg, 1);
  195. wpabuf_put_u8(msg, msg_type);
  196. return 0;
  197. }
  198. int wps_build_enrollee_nonce(struct wps_data *wps, struct wpabuf *msg)
  199. {
  200. wpa_printf(MSG_DEBUG, "WPS: * Enrollee Nonce");
  201. wpabuf_put_be16(msg, ATTR_ENROLLEE_NONCE);
  202. wpabuf_put_be16(msg, WPS_NONCE_LEN);
  203. wpabuf_put_data(msg, wps->nonce_e, WPS_NONCE_LEN);
  204. return 0;
  205. }
  206. int wps_build_registrar_nonce(struct wps_data *wps, struct wpabuf *msg)
  207. {
  208. wpa_printf(MSG_DEBUG, "WPS: * Registrar Nonce");
  209. wpabuf_put_be16(msg, ATTR_REGISTRAR_NONCE);
  210. wpabuf_put_be16(msg, WPS_NONCE_LEN);
  211. wpabuf_put_data(msg, wps->nonce_r, WPS_NONCE_LEN);
  212. return 0;
  213. }
  214. int wps_build_auth_type_flags(struct wps_data *wps, struct wpabuf *msg)
  215. {
  216. u16 auth_types = WPS_AUTH_TYPES;
  217. #ifdef CONFIG_WPS2
  218. auth_types &= ~WPS_AUTH_SHARED;
  219. #endif /* CONFIG_WPS2 */
  220. wpa_printf(MSG_DEBUG, "WPS: * Authentication Type Flags");
  221. wpabuf_put_be16(msg, ATTR_AUTH_TYPE_FLAGS);
  222. wpabuf_put_be16(msg, 2);
  223. wpabuf_put_be16(msg, auth_types);
  224. return 0;
  225. }
  226. int wps_build_encr_type_flags(struct wps_data *wps, struct wpabuf *msg)
  227. {
  228. u16 encr_types = WPS_ENCR_TYPES;
  229. #ifdef CONFIG_WPS2
  230. encr_types &= ~WPS_ENCR_WEP;
  231. #endif /* CONFIG_WPS2 */
  232. wpa_printf(MSG_DEBUG, "WPS: * Encryption Type Flags");
  233. wpabuf_put_be16(msg, ATTR_ENCR_TYPE_FLAGS);
  234. wpabuf_put_be16(msg, 2);
  235. wpabuf_put_be16(msg, encr_types);
  236. return 0;
  237. }
  238. int wps_build_conn_type_flags(struct wps_data *wps, struct wpabuf *msg)
  239. {
  240. wpa_printf(MSG_DEBUG, "WPS: * Connection Type Flags");
  241. wpabuf_put_be16(msg, ATTR_CONN_TYPE_FLAGS);
  242. wpabuf_put_be16(msg, 1);
  243. wpabuf_put_u8(msg, WPS_CONN_ESS);
  244. return 0;
  245. }
  246. int wps_build_assoc_state(struct wps_data *wps, struct wpabuf *msg)
  247. {
  248. wpa_printf(MSG_DEBUG, "WPS: * Association State");
  249. wpabuf_put_be16(msg, ATTR_ASSOC_STATE);
  250. wpabuf_put_be16(msg, 2);
  251. wpabuf_put_be16(msg, WPS_ASSOC_NOT_ASSOC);
  252. return 0;
  253. }
  254. int wps_build_key_wrap_auth(struct wps_data *wps, struct wpabuf *msg)
  255. {
  256. u8 hash[SHA256_MAC_LEN];
  257. wpa_printf(MSG_DEBUG, "WPS: * Key Wrap Authenticator");
  258. hmac_sha256(wps->authkey, WPS_AUTHKEY_LEN, wpabuf_head(msg),
  259. wpabuf_len(msg), hash);
  260. wpabuf_put_be16(msg, ATTR_KEY_WRAP_AUTH);
  261. wpabuf_put_be16(msg, WPS_KWA_LEN);
  262. wpabuf_put_data(msg, hash, WPS_KWA_LEN);
  263. return 0;
  264. }
  265. int wps_build_encr_settings(struct wps_data *wps, struct wpabuf *msg,
  266. struct wpabuf *plain)
  267. {
  268. size_t pad_len;
  269. const size_t block_size = 16;
  270. u8 *iv, *data;
  271. wpa_printf(MSG_DEBUG, "WPS: * Encrypted Settings");
  272. /* PKCS#5 v2.0 pad */
  273. pad_len = block_size - wpabuf_len(plain) % block_size;
  274. os_memset(wpabuf_put(plain, pad_len), pad_len, pad_len);
  275. wpabuf_put_be16(msg, ATTR_ENCR_SETTINGS);
  276. wpabuf_put_be16(msg, block_size + wpabuf_len(plain));
  277. iv = wpabuf_put(msg, block_size);
  278. if (random_get_bytes(iv, block_size) < 0)
  279. return -1;
  280. data = wpabuf_put(msg, 0);
  281. wpabuf_put_buf(msg, plain);
  282. if (aes_128_cbc_encrypt(wps->keywrapkey, iv, data, wpabuf_len(plain)))
  283. return -1;
  284. return 0;
  285. }
  286. #ifdef CONFIG_WPS_OOB
  287. int wps_build_oob_dev_pw(struct wpabuf *msg, u16 dev_pw_id,
  288. const struct wpabuf *pubkey, const u8 *dev_pw,
  289. size_t dev_pw_len)
  290. {
  291. size_t hash_len;
  292. const u8 *addr[1];
  293. u8 pubkey_hash[WPS_HASH_LEN];
  294. addr[0] = wpabuf_head(pubkey);
  295. hash_len = wpabuf_len(pubkey);
  296. sha256_vector(1, addr, &hash_len, pubkey_hash);
  297. wpabuf_put_be16(msg, ATTR_OOB_DEVICE_PASSWORD);
  298. wpabuf_put_be16(msg, WPS_OOB_PUBKEY_HASH_LEN + 2 + dev_pw_len);
  299. wpabuf_put_data(msg, pubkey_hash, WPS_OOB_PUBKEY_HASH_LEN);
  300. wpabuf_put_be16(msg, dev_pw_id);
  301. wpabuf_put_data(msg, dev_pw, dev_pw_len);
  302. return 0;
  303. }
  304. int wps_build_oob_dev_password(struct wpabuf *msg, struct wps_context *wps)
  305. {
  306. u8 dev_password_bin[WPS_OOB_DEVICE_PASSWORD_LEN];
  307. wpa_printf(MSG_DEBUG, "WPS: * OOB Device Password");
  308. if (os_get_random((u8 *) &wps->oob_dev_pw_id, sizeof(u16)) < 0) {
  309. wpa_printf(MSG_ERROR, "WPS: device password id "
  310. "generation error");
  311. return -1;
  312. }
  313. wps->oob_dev_pw_id |= 0x0010;
  314. if (random_get_bytes(dev_password_bin, WPS_OOB_DEVICE_PASSWORD_LEN) <
  315. 0) {
  316. wpa_printf(MSG_ERROR, "WPS: OOB device password "
  317. "generation error");
  318. return -1;
  319. }
  320. wpa_snprintf_hex_uppercase(
  321. wpabuf_put(wps->oob_conf.dev_password,
  322. wpabuf_size(wps->oob_conf.dev_password)),
  323. wpabuf_size(wps->oob_conf.dev_password),
  324. dev_password_bin, WPS_OOB_DEVICE_PASSWORD_LEN);
  325. return wps_build_oob_dev_pw(msg, wps->oob_dev_pw_id, wps->dh_pubkey,
  326. dev_password_bin,
  327. WPS_OOB_DEVICE_PASSWORD_LEN);
  328. }
  329. #endif /* CONFIG_WPS_OOB */
  330. /* Encapsulate WPS IE data with one (or more, if needed) IE headers */
  331. struct wpabuf * wps_ie_encapsulate(struct wpabuf *data)
  332. {
  333. struct wpabuf *ie;
  334. const u8 *pos, *end;
  335. ie = wpabuf_alloc(wpabuf_len(data) + 100);
  336. if (ie == NULL) {
  337. wpabuf_free(data);
  338. return NULL;
  339. }
  340. pos = wpabuf_head(data);
  341. end = pos + wpabuf_len(data);
  342. while (end > pos) {
  343. size_t frag_len = end - pos;
  344. if (frag_len > 251)
  345. frag_len = 251;
  346. wpabuf_put_u8(ie, WLAN_EID_VENDOR_SPECIFIC);
  347. wpabuf_put_u8(ie, 4 + frag_len);
  348. wpabuf_put_be32(ie, WPS_DEV_OUI_WFA);
  349. wpabuf_put_data(ie, pos, frag_len);
  350. pos += frag_len;
  351. }
  352. wpabuf_free(data);
  353. return ie;
  354. }