• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * hostapd - WPA/RSN IE and KDE definitions
3  * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "utils/includes.h"
10 
11 #include "utils/common.h"
12 #include "common/ieee802_11_defs.h"
13 #include "eapol_auth/eapol_auth_sm.h"
14 #include "ap_config.h"
15 #include "ieee802_11.h"
16 #include "wpa_auth.h"
17 #include "pmksa_cache_auth.h"
18 #include "wpa_auth_ie.h"
19 #include "wpa_auth_i.h"
20 
21 
22 #ifdef CONFIG_RSN_TESTING
23 int rsn_testing = 0;
24 #endif /* CONFIG_RSN_TESTING */
25 
26 
wpa_write_wpa_ie(struct wpa_auth_config * conf,u8 * buf,size_t len)27 static int wpa_write_wpa_ie(struct wpa_auth_config *conf, u8 *buf, size_t len)
28 {
29 	struct wpa_ie_hdr *hdr;
30 	int num_suites;
31 	u8 *pos, *count;
32 
33 	hdr = (struct wpa_ie_hdr *) buf;
34 	hdr->elem_id = WLAN_EID_VENDOR_SPECIFIC;
35 	RSN_SELECTOR_PUT(hdr->oui, WPA_OUI_TYPE);
36 	WPA_PUT_LE16(hdr->version, WPA_VERSION);
37 	pos = (u8 *) (hdr + 1);
38 
39 	if (conf->wpa_group == WPA_CIPHER_CCMP) {
40 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
41 	} else if (conf->wpa_group == WPA_CIPHER_TKIP) {
42 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
43 	} else if (conf->wpa_group == WPA_CIPHER_WEP104) {
44 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP104);
45 	} else if (conf->wpa_group == WPA_CIPHER_WEP40) {
46 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_WEP40);
47 	} else {
48 		wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
49 			   conf->wpa_group);
50 		return -1;
51 	}
52 	pos += WPA_SELECTOR_LEN;
53 
54 	num_suites = 0;
55 	count = pos;
56 	pos += 2;
57 
58 	if (conf->wpa_pairwise & WPA_CIPHER_CCMP) {
59 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_CCMP);
60 		pos += WPA_SELECTOR_LEN;
61 		num_suites++;
62 	}
63 	if (conf->wpa_pairwise & WPA_CIPHER_TKIP) {
64 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_TKIP);
65 		pos += WPA_SELECTOR_LEN;
66 		num_suites++;
67 	}
68 	if (conf->wpa_pairwise & WPA_CIPHER_NONE) {
69 		RSN_SELECTOR_PUT(pos, WPA_CIPHER_SUITE_NONE);
70 		pos += WPA_SELECTOR_LEN;
71 		num_suites++;
72 	}
73 
74 	if (num_suites == 0) {
75 		wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
76 			   conf->wpa_pairwise);
77 		return -1;
78 	}
79 	WPA_PUT_LE16(count, num_suites);
80 
81 	num_suites = 0;
82 	count = pos;
83 	pos += 2;
84 
85 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X) {
86 		RSN_SELECTOR_PUT(pos, WPA_AUTH_KEY_MGMT_UNSPEC_802_1X);
87 		pos += WPA_SELECTOR_LEN;
88 		num_suites++;
89 	}
90 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK) {
91 		RSN_SELECTOR_PUT(pos, WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X);
92 		pos += WPA_SELECTOR_LEN;
93 		num_suites++;
94 	}
95 
96 	if (num_suites == 0) {
97 		wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
98 			   conf->wpa_key_mgmt);
99 		return -1;
100 	}
101 	WPA_PUT_LE16(count, num_suites);
102 
103 	/* WPA Capabilities; use defaults, so no need to include it */
104 
105 	hdr->len = (pos - buf) - 2;
106 
107 	return pos - buf;
108 }
109 
110 
wpa_write_rsn_ie(struct wpa_auth_config * conf,u8 * buf,size_t len,const u8 * pmkid)111 int wpa_write_rsn_ie(struct wpa_auth_config *conf, u8 *buf, size_t len,
112 		     const u8 *pmkid)
113 {
114 	struct rsn_ie_hdr *hdr;
115 	int num_suites;
116 	u8 *pos, *count;
117 	u16 capab;
118 
119 	hdr = (struct rsn_ie_hdr *) buf;
120 	hdr->elem_id = WLAN_EID_RSN;
121 	WPA_PUT_LE16(hdr->version, RSN_VERSION);
122 	pos = (u8 *) (hdr + 1);
123 
124 	if (conf->wpa_group == WPA_CIPHER_CCMP) {
125 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
126 	} else if (conf->wpa_group == WPA_CIPHER_TKIP) {
127 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
128 	} else if (conf->wpa_group == WPA_CIPHER_WEP104) {
129 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP104);
130 	} else if (conf->wpa_group == WPA_CIPHER_WEP40) {
131 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_WEP40);
132 	} else {
133 		wpa_printf(MSG_DEBUG, "Invalid group cipher (%d).",
134 			   conf->wpa_group);
135 		return -1;
136 	}
137 	pos += RSN_SELECTOR_LEN;
138 
139 	num_suites = 0;
140 	count = pos;
141 	pos += 2;
142 
143 #ifdef CONFIG_RSN_TESTING
144 	if (rsn_testing) {
145 		RSN_SELECTOR_PUT(pos, RSN_SELECTOR(0x12, 0x34, 0x56, 1));
146 		pos += RSN_SELECTOR_LEN;
147 		num_suites++;
148 	}
149 #endif /* CONFIG_RSN_TESTING */
150 
151 	if (conf->rsn_pairwise & WPA_CIPHER_CCMP) {
152 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_CCMP);
153 		pos += RSN_SELECTOR_LEN;
154 		num_suites++;
155 	}
156 	if (conf->rsn_pairwise & WPA_CIPHER_TKIP) {
157 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_TKIP);
158 		pos += RSN_SELECTOR_LEN;
159 		num_suites++;
160 	}
161 	if (conf->rsn_pairwise & WPA_CIPHER_NONE) {
162 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_NONE);
163 		pos += RSN_SELECTOR_LEN;
164 		num_suites++;
165 	}
166 
167 #ifdef CONFIG_RSN_TESTING
168 	if (rsn_testing) {
169 		RSN_SELECTOR_PUT(pos, RSN_SELECTOR(0x12, 0x34, 0x56, 2));
170 		pos += RSN_SELECTOR_LEN;
171 		num_suites++;
172 	}
173 #endif /* CONFIG_RSN_TESTING */
174 
175 	if (num_suites == 0) {
176 		wpa_printf(MSG_DEBUG, "Invalid pairwise cipher (%d).",
177 			   conf->rsn_pairwise);
178 		return -1;
179 	}
180 	WPA_PUT_LE16(count, num_suites);
181 
182 	num_suites = 0;
183 	count = pos;
184 	pos += 2;
185 
186 #ifdef CONFIG_RSN_TESTING
187 	if (rsn_testing) {
188 		RSN_SELECTOR_PUT(pos, RSN_SELECTOR(0x12, 0x34, 0x56, 1));
189 		pos += RSN_SELECTOR_LEN;
190 		num_suites++;
191 	}
192 #endif /* CONFIG_RSN_TESTING */
193 
194 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X) {
195 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_UNSPEC_802_1X);
196 		pos += RSN_SELECTOR_LEN;
197 		num_suites++;
198 	}
199 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK) {
200 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X);
201 		pos += RSN_SELECTOR_LEN;
202 		num_suites++;
203 	}
204 #ifdef CONFIG_IEEE80211R
205 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X) {
206 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_FT_802_1X);
207 		pos += RSN_SELECTOR_LEN;
208 		num_suites++;
209 	}
210 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_FT_PSK) {
211 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_FT_PSK);
212 		pos += RSN_SELECTOR_LEN;
213 		num_suites++;
214 	}
215 #endif /* CONFIG_IEEE80211R */
216 #ifdef CONFIG_IEEE80211W
217 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256) {
218 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_802_1X_SHA256);
219 		pos += RSN_SELECTOR_LEN;
220 		num_suites++;
221 	}
222 	if (conf->wpa_key_mgmt & WPA_KEY_MGMT_PSK_SHA256) {
223 		RSN_SELECTOR_PUT(pos, RSN_AUTH_KEY_MGMT_PSK_SHA256);
224 		pos += RSN_SELECTOR_LEN;
225 		num_suites++;
226 	}
227 #endif /* CONFIG_IEEE80211W */
228 
229 #ifdef CONFIG_RSN_TESTING
230 	if (rsn_testing) {
231 		RSN_SELECTOR_PUT(pos, RSN_SELECTOR(0x12, 0x34, 0x56, 2));
232 		pos += RSN_SELECTOR_LEN;
233 		num_suites++;
234 	}
235 #endif /* CONFIG_RSN_TESTING */
236 
237 	if (num_suites == 0) {
238 		wpa_printf(MSG_DEBUG, "Invalid key management type (%d).",
239 			   conf->wpa_key_mgmt);
240 		return -1;
241 	}
242 	WPA_PUT_LE16(count, num_suites);
243 
244 	/* RSN Capabilities */
245 	capab = 0;
246 	if (conf->rsn_preauth)
247 		capab |= WPA_CAPABILITY_PREAUTH;
248 	if (conf->peerkey)
249 		capab |= WPA_CAPABILITY_PEERKEY_ENABLED;
250 	if (conf->wmm_enabled) {
251 		/* 4 PTKSA replay counters when using WMM */
252 		capab |= (RSN_NUM_REPLAY_COUNTERS_16 << 2);
253 	}
254 #ifdef CONFIG_IEEE80211W
255 	if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
256 		capab |= WPA_CAPABILITY_MFPC;
257 		if (conf->ieee80211w == MGMT_FRAME_PROTECTION_REQUIRED)
258 			capab |= WPA_CAPABILITY_MFPR;
259 	}
260 #endif /* CONFIG_IEEE80211W */
261 #ifdef CONFIG_RSN_TESTING
262 	if (rsn_testing)
263 		capab |= BIT(8) | BIT(14) | BIT(15);
264 #endif /* CONFIG_RSN_TESTING */
265 	WPA_PUT_LE16(pos, capab);
266 	pos += 2;
267 
268 	if (pmkid) {
269 		if (pos + 2 + PMKID_LEN > buf + len)
270 			return -1;
271 		/* PMKID Count */
272 		WPA_PUT_LE16(pos, 1);
273 		pos += 2;
274 		os_memcpy(pos, pmkid, PMKID_LEN);
275 		pos += PMKID_LEN;
276 	}
277 
278 #ifdef CONFIG_IEEE80211W
279 	if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
280 		if (pos + 2 + 4 > buf + len)
281 			return -1;
282 		if (pmkid == NULL) {
283 			/* PMKID Count */
284 			WPA_PUT_LE16(pos, 0);
285 			pos += 2;
286 		}
287 
288 		/* Management Group Cipher Suite */
289 		RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_AES_128_CMAC);
290 		pos += RSN_SELECTOR_LEN;
291 	}
292 #endif /* CONFIG_IEEE80211W */
293 
294 #ifdef CONFIG_RSN_TESTING
295 	if (rsn_testing) {
296 		/*
297 		 * Fill in any defined fields and add extra data to the end of
298 		 * the element.
299 		 */
300 		int pmkid_count_set = pmkid != NULL;
301 		if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION)
302 			pmkid_count_set = 1;
303 		/* PMKID Count */
304 		WPA_PUT_LE16(pos, 0);
305 		pos += 2;
306 		if (conf->ieee80211w == NO_MGMT_FRAME_PROTECTION) {
307 			/* Management Group Cipher Suite */
308 			RSN_SELECTOR_PUT(pos, RSN_CIPHER_SUITE_AES_128_CMAC);
309 			pos += RSN_SELECTOR_LEN;
310 		}
311 
312 		os_memset(pos, 0x12, 17);
313 		pos += 17;
314 	}
315 #endif /* CONFIG_RSN_TESTING */
316 
317 	hdr->len = (pos - buf) - 2;
318 
319 	return pos - buf;
320 }
321 
322 
wpa_auth_gen_wpa_ie(struct wpa_authenticator * wpa_auth)323 int wpa_auth_gen_wpa_ie(struct wpa_authenticator *wpa_auth)
324 {
325 	u8 *pos, buf[128];
326 	int res;
327 
328 	pos = buf;
329 
330 	if (wpa_auth->conf.wpa & WPA_PROTO_RSN) {
331 		res = wpa_write_rsn_ie(&wpa_auth->conf,
332 				       pos, buf + sizeof(buf) - pos, NULL);
333 		if (res < 0)
334 			return res;
335 		pos += res;
336 	}
337 #ifdef CONFIG_IEEE80211R
338 	if (wpa_key_mgmt_ft(wpa_auth->conf.wpa_key_mgmt)) {
339 		res = wpa_write_mdie(&wpa_auth->conf, pos,
340 				     buf + sizeof(buf) - pos);
341 		if (res < 0)
342 			return res;
343 		pos += res;
344 	}
345 #endif /* CONFIG_IEEE80211R */
346 	if (wpa_auth->conf.wpa & WPA_PROTO_WPA) {
347 		res = wpa_write_wpa_ie(&wpa_auth->conf,
348 				       pos, buf + sizeof(buf) - pos);
349 		if (res < 0)
350 			return res;
351 		pos += res;
352 	}
353 
354 	os_free(wpa_auth->wpa_ie);
355 	wpa_auth->wpa_ie = os_malloc(pos - buf);
356 	if (wpa_auth->wpa_ie == NULL)
357 		return -1;
358 	os_memcpy(wpa_auth->wpa_ie, buf, pos - buf);
359 	wpa_auth->wpa_ie_len = pos - buf;
360 
361 	return 0;
362 }
363 
364 
wpa_add_kde(u8 * pos,u32 kde,const u8 * data,size_t data_len,const u8 * data2,size_t data2_len)365 u8 * wpa_add_kde(u8 *pos, u32 kde, const u8 *data, size_t data_len,
366 		 const u8 *data2, size_t data2_len)
367 {
368 	*pos++ = WLAN_EID_VENDOR_SPECIFIC;
369 	*pos++ = RSN_SELECTOR_LEN + data_len + data2_len;
370 	RSN_SELECTOR_PUT(pos, kde);
371 	pos += RSN_SELECTOR_LEN;
372 	os_memcpy(pos, data, data_len);
373 	pos += data_len;
374 	if (data2) {
375 		os_memcpy(pos, data2, data2_len);
376 		pos += data2_len;
377 	}
378 	return pos;
379 }
380 
381 
382 struct wpa_auth_okc_iter_data {
383 	struct rsn_pmksa_cache_entry *pmksa;
384 	const u8 *aa;
385 	const u8 *spa;
386 	const u8 *pmkid;
387 };
388 
389 
wpa_auth_okc_iter(struct wpa_authenticator * a,void * ctx)390 static int wpa_auth_okc_iter(struct wpa_authenticator *a, void *ctx)
391 {
392 	struct wpa_auth_okc_iter_data *data = ctx;
393 	data->pmksa = pmksa_cache_get_okc(a->pmksa, data->aa, data->spa,
394 					  data->pmkid);
395 	if (data->pmksa)
396 		return 1;
397 	return 0;
398 }
399 
400 
wpa_validate_wpa_ie(struct wpa_authenticator * wpa_auth,struct wpa_state_machine * sm,const u8 * wpa_ie,size_t wpa_ie_len,const u8 * mdie,size_t mdie_len)401 int wpa_validate_wpa_ie(struct wpa_authenticator *wpa_auth,
402 			struct wpa_state_machine *sm,
403 			const u8 *wpa_ie, size_t wpa_ie_len,
404 			const u8 *mdie, size_t mdie_len)
405 {
406 	struct wpa_ie_data data;
407 	int ciphers, key_mgmt, res, version;
408 	u32 selector;
409 	size_t i;
410 	const u8 *pmkid = NULL;
411 
412 	if (wpa_auth == NULL || sm == NULL)
413 		return WPA_NOT_ENABLED;
414 
415 	if (wpa_ie == NULL || wpa_ie_len < 1)
416 		return WPA_INVALID_IE;
417 
418 	if (wpa_ie[0] == WLAN_EID_RSN)
419 		version = WPA_PROTO_RSN;
420 	else
421 		version = WPA_PROTO_WPA;
422 
423 	if (!(wpa_auth->conf.wpa & version)) {
424 		wpa_printf(MSG_DEBUG, "Invalid WPA proto (%d) from " MACSTR,
425 			   version, MAC2STR(sm->addr));
426 		return WPA_INVALID_PROTO;
427 	}
428 
429 	if (version == WPA_PROTO_RSN) {
430 		res = wpa_parse_wpa_ie_rsn(wpa_ie, wpa_ie_len, &data);
431 
432 		selector = RSN_AUTH_KEY_MGMT_UNSPEC_802_1X;
433 		if (0) {
434 		}
435 #ifdef CONFIG_IEEE80211R
436 		else if (data.key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X)
437 			selector = RSN_AUTH_KEY_MGMT_FT_802_1X;
438 		else if (data.key_mgmt & WPA_KEY_MGMT_FT_PSK)
439 			selector = RSN_AUTH_KEY_MGMT_FT_PSK;
440 #endif /* CONFIG_IEEE80211R */
441 #ifdef CONFIG_IEEE80211W
442 		else if (data.key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256)
443 			selector = RSN_AUTH_KEY_MGMT_802_1X_SHA256;
444 		else if (data.key_mgmt & WPA_KEY_MGMT_PSK_SHA256)
445 			selector = RSN_AUTH_KEY_MGMT_PSK_SHA256;
446 #endif /* CONFIG_IEEE80211W */
447 		else if (data.key_mgmt & WPA_KEY_MGMT_IEEE8021X)
448 			selector = RSN_AUTH_KEY_MGMT_UNSPEC_802_1X;
449 		else if (data.key_mgmt & WPA_KEY_MGMT_PSK)
450 			selector = RSN_AUTH_KEY_MGMT_PSK_OVER_802_1X;
451 		wpa_auth->dot11RSNAAuthenticationSuiteSelected = selector;
452 
453 		selector = RSN_CIPHER_SUITE_CCMP;
454 		if (data.pairwise_cipher & WPA_CIPHER_CCMP)
455 			selector = RSN_CIPHER_SUITE_CCMP;
456 		else if (data.pairwise_cipher & WPA_CIPHER_TKIP)
457 			selector = RSN_CIPHER_SUITE_TKIP;
458 		else if (data.pairwise_cipher & WPA_CIPHER_WEP104)
459 			selector = RSN_CIPHER_SUITE_WEP104;
460 		else if (data.pairwise_cipher & WPA_CIPHER_WEP40)
461 			selector = RSN_CIPHER_SUITE_WEP40;
462 		else if (data.pairwise_cipher & WPA_CIPHER_NONE)
463 			selector = RSN_CIPHER_SUITE_NONE;
464 		wpa_auth->dot11RSNAPairwiseCipherSelected = selector;
465 
466 		selector = RSN_CIPHER_SUITE_CCMP;
467 		if (data.group_cipher & WPA_CIPHER_CCMP)
468 			selector = RSN_CIPHER_SUITE_CCMP;
469 		else if (data.group_cipher & WPA_CIPHER_TKIP)
470 			selector = RSN_CIPHER_SUITE_TKIP;
471 		else if (data.group_cipher & WPA_CIPHER_WEP104)
472 			selector = RSN_CIPHER_SUITE_WEP104;
473 		else if (data.group_cipher & WPA_CIPHER_WEP40)
474 			selector = RSN_CIPHER_SUITE_WEP40;
475 		else if (data.group_cipher & WPA_CIPHER_NONE)
476 			selector = RSN_CIPHER_SUITE_NONE;
477 		wpa_auth->dot11RSNAGroupCipherSelected = selector;
478 	} else {
479 		res = wpa_parse_wpa_ie_wpa(wpa_ie, wpa_ie_len, &data);
480 
481 		selector = WPA_AUTH_KEY_MGMT_UNSPEC_802_1X;
482 		if (data.key_mgmt & WPA_KEY_MGMT_IEEE8021X)
483 			selector = WPA_AUTH_KEY_MGMT_UNSPEC_802_1X;
484 		else if (data.key_mgmt & WPA_KEY_MGMT_PSK)
485 			selector = WPA_AUTH_KEY_MGMT_PSK_OVER_802_1X;
486 		wpa_auth->dot11RSNAAuthenticationSuiteSelected = selector;
487 
488 		selector = WPA_CIPHER_SUITE_TKIP;
489 		if (data.pairwise_cipher & WPA_CIPHER_CCMP)
490 			selector = WPA_CIPHER_SUITE_CCMP;
491 		else if (data.pairwise_cipher & WPA_CIPHER_TKIP)
492 			selector = WPA_CIPHER_SUITE_TKIP;
493 		else if (data.pairwise_cipher & WPA_CIPHER_WEP104)
494 			selector = WPA_CIPHER_SUITE_WEP104;
495 		else if (data.pairwise_cipher & WPA_CIPHER_WEP40)
496 			selector = WPA_CIPHER_SUITE_WEP40;
497 		else if (data.pairwise_cipher & WPA_CIPHER_NONE)
498 			selector = WPA_CIPHER_SUITE_NONE;
499 		wpa_auth->dot11RSNAPairwiseCipherSelected = selector;
500 
501 		selector = WPA_CIPHER_SUITE_TKIP;
502 		if (data.group_cipher & WPA_CIPHER_CCMP)
503 			selector = WPA_CIPHER_SUITE_CCMP;
504 		else if (data.group_cipher & WPA_CIPHER_TKIP)
505 			selector = WPA_CIPHER_SUITE_TKIP;
506 		else if (data.group_cipher & WPA_CIPHER_WEP104)
507 			selector = WPA_CIPHER_SUITE_WEP104;
508 		else if (data.group_cipher & WPA_CIPHER_WEP40)
509 			selector = WPA_CIPHER_SUITE_WEP40;
510 		else if (data.group_cipher & WPA_CIPHER_NONE)
511 			selector = WPA_CIPHER_SUITE_NONE;
512 		wpa_auth->dot11RSNAGroupCipherSelected = selector;
513 	}
514 	if (res) {
515 		wpa_printf(MSG_DEBUG, "Failed to parse WPA/RSN IE from "
516 			   MACSTR " (res=%d)", MAC2STR(sm->addr), res);
517 		wpa_hexdump(MSG_DEBUG, "WPA/RSN IE", wpa_ie, wpa_ie_len);
518 		return WPA_INVALID_IE;
519 	}
520 
521 	if (data.group_cipher != wpa_auth->conf.wpa_group) {
522 		wpa_printf(MSG_DEBUG, "Invalid WPA group cipher (0x%x) from "
523 			   MACSTR, data.group_cipher, MAC2STR(sm->addr));
524 		return WPA_INVALID_GROUP;
525 	}
526 
527 	key_mgmt = data.key_mgmt & wpa_auth->conf.wpa_key_mgmt;
528 	if (!key_mgmt) {
529 		wpa_printf(MSG_DEBUG, "Invalid WPA key mgmt (0x%x) from "
530 			   MACSTR, data.key_mgmt, MAC2STR(sm->addr));
531 		return WPA_INVALID_AKMP;
532 	}
533 	if (0) {
534 	}
535 #ifdef CONFIG_IEEE80211R
536 	else if (key_mgmt & WPA_KEY_MGMT_FT_IEEE8021X)
537 		sm->wpa_key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X;
538 	else if (key_mgmt & WPA_KEY_MGMT_FT_PSK)
539 		sm->wpa_key_mgmt = WPA_KEY_MGMT_FT_PSK;
540 #endif /* CONFIG_IEEE80211R */
541 #ifdef CONFIG_IEEE80211W
542 	else if (key_mgmt & WPA_KEY_MGMT_IEEE8021X_SHA256)
543 		sm->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X_SHA256;
544 	else if (key_mgmt & WPA_KEY_MGMT_PSK_SHA256)
545 		sm->wpa_key_mgmt = WPA_KEY_MGMT_PSK_SHA256;
546 #endif /* CONFIG_IEEE80211W */
547 	else if (key_mgmt & WPA_KEY_MGMT_IEEE8021X)
548 		sm->wpa_key_mgmt = WPA_KEY_MGMT_IEEE8021X;
549 	else
550 		sm->wpa_key_mgmt = WPA_KEY_MGMT_PSK;
551 
552 	if (version == WPA_PROTO_RSN)
553 		ciphers = data.pairwise_cipher & wpa_auth->conf.rsn_pairwise;
554 	else
555 		ciphers = data.pairwise_cipher & wpa_auth->conf.wpa_pairwise;
556 	if (!ciphers) {
557 		wpa_printf(MSG_DEBUG, "Invalid %s pairwise cipher (0x%x) "
558 			   "from " MACSTR,
559 			   version == WPA_PROTO_RSN ? "RSN" : "WPA",
560 			   data.pairwise_cipher, MAC2STR(sm->addr));
561 		return WPA_INVALID_PAIRWISE;
562 	}
563 
564 #ifdef CONFIG_IEEE80211W
565 	if (wpa_auth->conf.ieee80211w == MGMT_FRAME_PROTECTION_REQUIRED) {
566 		if (!(data.capabilities & WPA_CAPABILITY_MFPC)) {
567 			wpa_printf(MSG_DEBUG, "Management frame protection "
568 				   "required, but client did not enable it");
569 			return WPA_MGMT_FRAME_PROTECTION_VIOLATION;
570 		}
571 
572 		if (ciphers & WPA_CIPHER_TKIP) {
573 			wpa_printf(MSG_DEBUG, "Management frame protection "
574 				   "cannot use TKIP");
575 			return WPA_MGMT_FRAME_PROTECTION_VIOLATION;
576 		}
577 
578 		if (data.mgmt_group_cipher != WPA_CIPHER_AES_128_CMAC) {
579 			wpa_printf(MSG_DEBUG, "Unsupported management group "
580 				   "cipher %d", data.mgmt_group_cipher);
581 			return WPA_INVALID_MGMT_GROUP_CIPHER;
582 		}
583 	}
584 
585 	if (wpa_auth->conf.ieee80211w == NO_MGMT_FRAME_PROTECTION ||
586 	    !(data.capabilities & WPA_CAPABILITY_MFPC))
587 		sm->mgmt_frame_prot = 0;
588 	else
589 		sm->mgmt_frame_prot = 1;
590 #endif /* CONFIG_IEEE80211W */
591 
592 #ifdef CONFIG_IEEE80211R
593 	if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
594 		if (mdie == NULL || mdie_len < MOBILITY_DOMAIN_ID_LEN + 1) {
595 			wpa_printf(MSG_DEBUG, "RSN: Trying to use FT, but "
596 				   "MDIE not included");
597 			return WPA_INVALID_MDIE;
598 		}
599 		if (os_memcmp(mdie, wpa_auth->conf.mobility_domain,
600 			      MOBILITY_DOMAIN_ID_LEN) != 0) {
601 			wpa_hexdump(MSG_DEBUG, "RSN: Attempted to use unknown "
602 				    "MDIE", mdie, MOBILITY_DOMAIN_ID_LEN);
603 			return WPA_INVALID_MDIE;
604 		}
605 	}
606 #endif /* CONFIG_IEEE80211R */
607 
608 	if (ciphers & WPA_CIPHER_CCMP)
609 		sm->pairwise = WPA_CIPHER_CCMP;
610 	else
611 		sm->pairwise = WPA_CIPHER_TKIP;
612 
613 	/* TODO: clear WPA/WPA2 state if STA changes from one to another */
614 	if (wpa_ie[0] == WLAN_EID_RSN)
615 		sm->wpa = WPA_VERSION_WPA2;
616 	else
617 		sm->wpa = WPA_VERSION_WPA;
618 
619 	sm->pmksa = NULL;
620 	for (i = 0; i < data.num_pmkid; i++) {
621 		wpa_hexdump(MSG_DEBUG, "RSN IE: STA PMKID",
622 			    &data.pmkid[i * PMKID_LEN], PMKID_LEN);
623 		sm->pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sm->addr,
624 						 &data.pmkid[i * PMKID_LEN]);
625 		if (sm->pmksa) {
626 			pmkid = sm->pmksa->pmkid;
627 			break;
628 		}
629 	}
630 	for (i = 0; sm->pmksa == NULL && wpa_auth->conf.okc &&
631 		     i < data.num_pmkid; i++) {
632 		struct wpa_auth_okc_iter_data idata;
633 		idata.pmksa = NULL;
634 		idata.aa = wpa_auth->addr;
635 		idata.spa = sm->addr;
636 		idata.pmkid = &data.pmkid[i * PMKID_LEN];
637 		wpa_auth_for_each_auth(wpa_auth, wpa_auth_okc_iter, &idata);
638 		if (idata.pmksa) {
639 			wpa_auth_vlogger(wpa_auth, sm->addr, LOGGER_DEBUG,
640 					 "OKC match for PMKID");
641 			sm->pmksa = pmksa_cache_add_okc(wpa_auth->pmksa,
642 							idata.pmksa,
643 							wpa_auth->addr,
644 							idata.pmkid);
645 			pmkid = idata.pmkid;
646 			break;
647 		}
648 	}
649 	if (sm->pmksa) {
650 		wpa_auth_vlogger(wpa_auth, sm->addr, LOGGER_DEBUG,
651 				 "PMKID found from PMKSA cache "
652 				 "eap_type=%d vlan_id=%d",
653 				 sm->pmksa->eap_type_authsrv,
654 				 sm->pmksa->vlan_id);
655 		os_memcpy(wpa_auth->dot11RSNAPMKIDUsed, pmkid, PMKID_LEN);
656 	}
657 
658 	if (sm->wpa_ie == NULL || sm->wpa_ie_len < wpa_ie_len) {
659 		os_free(sm->wpa_ie);
660 		sm->wpa_ie = os_malloc(wpa_ie_len);
661 		if (sm->wpa_ie == NULL)
662 			return WPA_ALLOC_FAIL;
663 	}
664 	os_memcpy(sm->wpa_ie, wpa_ie, wpa_ie_len);
665 	sm->wpa_ie_len = wpa_ie_len;
666 
667 	return WPA_IE_OK;
668 }
669 
670 
671 /**
672  * wpa_parse_generic - Parse EAPOL-Key Key Data Generic IEs
673  * @pos: Pointer to the IE header
674  * @end: Pointer to the end of the Key Data buffer
675  * @ie: Pointer to parsed IE data
676  * Returns: 0 on success, 1 if end mark is found, -1 on failure
677  */
wpa_parse_generic(const u8 * pos,const u8 * end,struct wpa_eapol_ie_parse * ie)678 static int wpa_parse_generic(const u8 *pos, const u8 *end,
679 			     struct wpa_eapol_ie_parse *ie)
680 {
681 	if (pos[1] == 0)
682 		return 1;
683 
684 	if (pos[1] >= 6 &&
685 	    RSN_SELECTOR_GET(pos + 2) == WPA_OUI_TYPE &&
686 	    pos[2 + WPA_SELECTOR_LEN] == 1 &&
687 	    pos[2 + WPA_SELECTOR_LEN + 1] == 0) {
688 		ie->wpa_ie = pos;
689 		ie->wpa_ie_len = pos[1] + 2;
690 		return 0;
691 	}
692 
693 	if (pos + 1 + RSN_SELECTOR_LEN < end &&
694 	    pos[1] >= RSN_SELECTOR_LEN + PMKID_LEN &&
695 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_PMKID) {
696 		ie->pmkid = pos + 2 + RSN_SELECTOR_LEN;
697 		return 0;
698 	}
699 
700 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
701 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_GROUPKEY) {
702 		ie->gtk = pos + 2 + RSN_SELECTOR_LEN;
703 		ie->gtk_len = pos[1] - RSN_SELECTOR_LEN;
704 		return 0;
705 	}
706 
707 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
708 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_MAC_ADDR) {
709 		ie->mac_addr = pos + 2 + RSN_SELECTOR_LEN;
710 		ie->mac_addr_len = pos[1] - RSN_SELECTOR_LEN;
711 		return 0;
712 	}
713 
714 #ifdef CONFIG_PEERKEY
715 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
716 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_SMK) {
717 		ie->smk = pos + 2 + RSN_SELECTOR_LEN;
718 		ie->smk_len = pos[1] - RSN_SELECTOR_LEN;
719 		return 0;
720 	}
721 
722 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
723 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_NONCE) {
724 		ie->nonce = pos + 2 + RSN_SELECTOR_LEN;
725 		ie->nonce_len = pos[1] - RSN_SELECTOR_LEN;
726 		return 0;
727 	}
728 
729 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
730 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_LIFETIME) {
731 		ie->lifetime = pos + 2 + RSN_SELECTOR_LEN;
732 		ie->lifetime_len = pos[1] - RSN_SELECTOR_LEN;
733 		return 0;
734 	}
735 
736 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
737 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_ERROR) {
738 		ie->error = pos + 2 + RSN_SELECTOR_LEN;
739 		ie->error_len = pos[1] - RSN_SELECTOR_LEN;
740 		return 0;
741 	}
742 #endif /* CONFIG_PEERKEY */
743 
744 #ifdef CONFIG_IEEE80211W
745 	if (pos[1] > RSN_SELECTOR_LEN + 2 &&
746 	    RSN_SELECTOR_GET(pos + 2) == RSN_KEY_DATA_IGTK) {
747 		ie->igtk = pos + 2 + RSN_SELECTOR_LEN;
748 		ie->igtk_len = pos[1] - RSN_SELECTOR_LEN;
749 		return 0;
750 	}
751 #endif /* CONFIG_IEEE80211W */
752 
753 	return 0;
754 }
755 
756 
757 /**
758  * wpa_parse_kde_ies - Parse EAPOL-Key Key Data IEs
759  * @buf: Pointer to the Key Data buffer
760  * @len: Key Data Length
761  * @ie: Pointer to parsed IE data
762  * Returns: 0 on success, -1 on failure
763  */
wpa_parse_kde_ies(const u8 * buf,size_t len,struct wpa_eapol_ie_parse * ie)764 int wpa_parse_kde_ies(const u8 *buf, size_t len, struct wpa_eapol_ie_parse *ie)
765 {
766 	const u8 *pos, *end;
767 	int ret = 0;
768 
769 	os_memset(ie, 0, sizeof(*ie));
770 	for (pos = buf, end = pos + len; pos + 1 < end; pos += 2 + pos[1]) {
771 		if (pos[0] == 0xdd &&
772 		    ((pos == buf + len - 1) || pos[1] == 0)) {
773 			/* Ignore padding */
774 			break;
775 		}
776 		if (pos + 2 + pos[1] > end) {
777 			wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key Key Data "
778 				   "underflow (ie=%d len=%d pos=%d)",
779 				   pos[0], pos[1], (int) (pos - buf));
780 			wpa_hexdump_key(MSG_DEBUG, "WPA: Key Data",
781 					buf, len);
782 			ret = -1;
783 			break;
784 		}
785 		if (*pos == WLAN_EID_RSN) {
786 			ie->rsn_ie = pos;
787 			ie->rsn_ie_len = pos[1] + 2;
788 #ifdef CONFIG_IEEE80211R
789 		} else if (*pos == WLAN_EID_MOBILITY_DOMAIN) {
790 			ie->mdie = pos;
791 			ie->mdie_len = pos[1] + 2;
792 		} else if (*pos == WLAN_EID_FAST_BSS_TRANSITION) {
793 			ie->ftie = pos;
794 			ie->ftie_len = pos[1] + 2;
795 #endif /* CONFIG_IEEE80211R */
796 		} else if (*pos == WLAN_EID_VENDOR_SPECIFIC) {
797 			ret = wpa_parse_generic(pos, end, ie);
798 			if (ret < 0)
799 				break;
800 			if (ret > 0) {
801 				ret = 0;
802 				break;
803 			}
804 		} else {
805 			wpa_hexdump(MSG_DEBUG, "WPA: Unrecognized EAPOL-Key "
806 				    "Key Data IE", pos, 2 + pos[1]);
807 		}
808 	}
809 
810 	return ret;
811 }
812 
813 
wpa_auth_uses_mfp(struct wpa_state_machine * sm)814 int wpa_auth_uses_mfp(struct wpa_state_machine *sm)
815 {
816 	return sm ? sm->mgmt_frame_prot : 0;
817 }
818