2010-11-06 17:01:24 +01:00
|
|
|
/*
|
|
|
|
* Received Management frame processing
|
2020-05-23 20:11:33 +02:00
|
|
|
* Copyright (c) 2010-2020, Jouni Malinen <j@w1.fi>
|
2010-11-06 17:01:24 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2010-11-06 17:01:24 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "utils/includes.h"
|
|
|
|
|
|
|
|
#include "utils/common.h"
|
2015-01-24 11:21:49 +01:00
|
|
|
#include "common/defs.h"
|
2010-11-06 17:01:24 +01:00
|
|
|
#include "common/ieee802_11_defs.h"
|
|
|
|
#include "common/ieee802_11_common.h"
|
2017-09-05 18:01:59 +02:00
|
|
|
#include "common/wpa_common.h"
|
|
|
|
#include "crypto/aes.h"
|
|
|
|
#include "crypto/aes_siv.h"
|
2010-11-10 01:06:59 +01:00
|
|
|
#include "crypto/aes_wrap.h"
|
2010-11-06 17:01:24 +01:00
|
|
|
#include "wlantest.h"
|
|
|
|
|
|
|
|
|
2020-02-21 18:40:32 +01:00
|
|
|
static int check_mmie_mic(unsigned int mgmt_group_cipher,
|
|
|
|
const u8 *igtk, size_t igtk_len,
|
|
|
|
const u8 *data, size_t len);
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static const char * mgmt_stype(u16 stype)
|
|
|
|
{
|
|
|
|
switch (stype) {
|
|
|
|
case WLAN_FC_STYPE_ASSOC_REQ:
|
|
|
|
return "ASSOC-REQ";
|
|
|
|
case WLAN_FC_STYPE_ASSOC_RESP:
|
|
|
|
return "ASSOC-RESP";
|
|
|
|
case WLAN_FC_STYPE_REASSOC_REQ:
|
|
|
|
return "REASSOC-REQ";
|
|
|
|
case WLAN_FC_STYPE_REASSOC_RESP:
|
|
|
|
return "REASSOC-RESP";
|
|
|
|
case WLAN_FC_STYPE_PROBE_REQ:
|
|
|
|
return "PROBE-REQ";
|
|
|
|
case WLAN_FC_STYPE_PROBE_RESP:
|
|
|
|
return "PROBE-RESP";
|
|
|
|
case WLAN_FC_STYPE_BEACON:
|
|
|
|
return "BEACON";
|
|
|
|
case WLAN_FC_STYPE_ATIM:
|
|
|
|
return "ATIM";
|
|
|
|
case WLAN_FC_STYPE_DISASSOC:
|
|
|
|
return "DISASSOC";
|
|
|
|
case WLAN_FC_STYPE_AUTH:
|
|
|
|
return "AUTH";
|
|
|
|
case WLAN_FC_STYPE_DEAUTH:
|
|
|
|
return "DEAUTH";
|
|
|
|
case WLAN_FC_STYPE_ACTION:
|
|
|
|
return "ACTION";
|
2021-02-07 11:00:12 +01:00
|
|
|
case WLAN_FC_STYPE_ACTION_NO_ACK:
|
|
|
|
return "ACTION-NO-ACK";
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
return "??";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-08-10 10:27:21 +02:00
|
|
|
static void parse_basic_ml(const u8 *ie, size_t len, bool ap,
|
2023-09-01 18:24:40 +02:00
|
|
|
struct wlantest_sta *sta, size_t fields_len)
|
2023-02-13 20:34:58 +01:00
|
|
|
{
|
2023-09-01 17:29:18 +02:00
|
|
|
const u8 *pos, *end, *ci_end, *info_end, *li_end;
|
2023-02-13 20:34:58 +01:00
|
|
|
u16 ctrl, eml, cap;
|
|
|
|
const struct element *elem;
|
2023-09-01 17:53:56 +02:00
|
|
|
struct wpabuf *profile = NULL;
|
2023-02-13 20:34:58 +01:00
|
|
|
|
2023-09-01 17:29:18 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "Basic MLE", ie, len);
|
2023-02-13 20:34:58 +01:00
|
|
|
pos = ie;
|
|
|
|
end = ie + len;
|
|
|
|
|
|
|
|
if (end - pos < 2)
|
|
|
|
return;
|
|
|
|
ctrl = WPA_GET_LE16(pos);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Multi-Link Control: Type=%u Reserved=%u Presence Bitmap=0x%x",
|
|
|
|
ctrl & MULTI_LINK_CONTROL_TYPE_MASK,
|
|
|
|
ctrl & BIT(3),
|
|
|
|
ctrl >> 4);
|
|
|
|
pos += 2;
|
|
|
|
|
|
|
|
/* Common Info */
|
|
|
|
|
|
|
|
if (end - pos < 1)
|
|
|
|
return;
|
|
|
|
len = *pos;
|
|
|
|
if (len > end - pos) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated Multi-Link Common Info (len=%zu left=%zu)",
|
|
|
|
len, (size_t) (end - pos));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (len < 1 + ETH_ALEN) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for MLD MAC Address in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
ci_end = pos + len;
|
2023-08-31 19:47:00 +02:00
|
|
|
|
|
|
|
pos++;
|
2023-09-01 17:29:18 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "Basic MLE - Common Info", pos, ci_end - pos);
|
2023-08-31 19:47:00 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "MLD MAC Address: " MACSTR, MAC2STR(pos));
|
|
|
|
if (!ap && sta && is_zero_ether_addr(sta->mld_mac_addr)) {
|
|
|
|
os_memcpy(sta->mld_mac_addr, pos, ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Learned non-AP STA MLD MAC Address from Basic MLE: "
|
|
|
|
MACSTR, MAC2STR(sta->mld_mac_addr));
|
|
|
|
}
|
|
|
|
pos += ETH_ALEN;
|
2023-02-13 20:34:58 +01:00
|
|
|
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_LINK_ID) {
|
|
|
|
if (ci_end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for Link ID Info in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "Link ID Info: 0x%x", *pos);
|
|
|
|
if (!ap)
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Unexpected Link ID Info in Common Info from a non-AP STA");
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_BSS_PARAM_CH_COUNT) {
|
|
|
|
if (ci_end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for BSS Parameters Change Count in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS Parameters Change Count: %u", *pos);
|
|
|
|
if (!ap)
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Unexpected BSS Parameters Change Count in Common Info from a non-AP STA");
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_MSD_INFO) {
|
|
|
|
if (ci_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for Medium Synchronization Delay Information in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Medium Synchronization Delay Information: 0x%x",
|
|
|
|
WPA_GET_LE16(pos));
|
|
|
|
if (!ap)
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Unexpected Medium Synchronization Delay Information in Common Info from a non-AP STA");
|
|
|
|
pos += 2;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_EML_CAPA) {
|
|
|
|
if (ci_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for EML Capabilities in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
eml = WPA_GET_LE16(pos);
|
|
|
|
pos += 2;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"EML Capabilities: 0x%x (EMLSR=%u EMLSR_Padding_Delay=%u EMLSR_Transition_Delay=%u EMLMR=%u EMLMR_Delay=%u Transition_Timeout=%u Reserved=%u)",
|
|
|
|
eml,
|
|
|
|
!!(eml & EHT_ML_EML_CAPA_EMLSR_SUPP),
|
|
|
|
(eml & EHT_ML_EML_CAPA_EMLSR_PADDING_DELAY_MASK) >>
|
|
|
|
1,
|
|
|
|
(eml & EHT_ML_EML_CAPA_EMLSR_TRANS_DELAY_MASK) >> 4,
|
|
|
|
!!(eml & EHT_ML_EML_CAPA_EMLMR_SUPP),
|
|
|
|
(eml & EHT_ML_EML_CAPA_EMLMR_DELAY_MASK) >> 8,
|
|
|
|
(eml & EHT_ML_EML_CAPA_TRANSITION_TIMEOUT_MASK) >>
|
|
|
|
11,
|
|
|
|
!!(eml & BIT(15)));
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_MLD_CAPA) {
|
|
|
|
if (ci_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for MLD Capabilities and Operations in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
cap = WPA_GET_LE16(pos);
|
|
|
|
pos += 2;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"MLD Capabilities and Operations: 0x%x (Max_Simultaneous_Links=%u SRS=%u T2L=0x%x Freq_Sep_STR=0x%x AAR=%u Reserved=0x%x)",
|
|
|
|
cap,
|
|
|
|
cap & EHT_ML_MLD_CAPA_MAX_NUM_SIM_LINKS_MASK,
|
|
|
|
!!(cap & EHT_ML_MLD_CAPA_SRS_SUPP),
|
|
|
|
(cap &
|
|
|
|
EHT_ML_MLD_CAPA_TID_TO_LINK_MAP_NEG_SUPP_MSK) >> 5,
|
|
|
|
(cap & EHT_ML_MLD_CAPA_FREQ_SEP_FOR_STR_MASK) >> 7,
|
|
|
|
!!(cap & EHT_ML_MLD_CAPA_AAR_SUPP),
|
|
|
|
(cap & 0xe000) >> 13);
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MULTI_LINK_CTRL_PRES_AP_MLD_ID) {
|
|
|
|
if (ci_end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"No room for AP MLD ID in Multi-Link Common Info");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "AP MLD ID: %u", *pos);
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pos < ci_end) {
|
|
|
|
wpa_hexdump(MSG_INFO,
|
|
|
|
"Extra information at the end of Common Info",
|
|
|
|
pos, ci_end - pos);
|
|
|
|
pos = ci_end;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Link Info */
|
2023-09-01 17:29:18 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "Basic MLE - Link Info", pos, end - pos);
|
2023-02-13 20:34:58 +01:00
|
|
|
|
2023-09-01 17:29:18 +02:00
|
|
|
li_end = end;
|
|
|
|
for_each_element(elem, pos, li_end - pos) {
|
2023-08-10 10:27:21 +02:00
|
|
|
u8 link_id;
|
2023-09-01 17:53:56 +02:00
|
|
|
const u8 *fpos;
|
|
|
|
u8 flen;
|
|
|
|
|
|
|
|
if (elem->id == EHT_ML_SUB_ELEM_FRAGMENT)
|
|
|
|
continue;
|
2023-08-10 10:27:21 +02:00
|
|
|
|
2023-02-13 20:34:58 +01:00
|
|
|
if (elem->id != EHT_ML_SUB_ELEM_PER_STA_PROFILE) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Link Info subelement id=%u",
|
|
|
|
elem->id);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "Link Info subelement data",
|
|
|
|
elem->data, elem->datalen);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2023-09-01 17:53:56 +02:00
|
|
|
wpabuf_free(profile);
|
|
|
|
profile = wpabuf_alloc_copy(elem->data, elem->datalen);
|
|
|
|
if (!profile)
|
|
|
|
continue;
|
|
|
|
flen = elem->datalen;
|
|
|
|
fpos = elem->data + flen;
|
|
|
|
while (flen == 255 && li_end - fpos >= 2 &&
|
|
|
|
*fpos == EHT_ML_SUB_ELEM_FRAGMENT &&
|
|
|
|
li_end - fpos >= 2 + fpos[1]) {
|
|
|
|
/* Reassemble truncated subelement */
|
|
|
|
fpos++;
|
|
|
|
flen = *fpos++;
|
|
|
|
if (wpabuf_resize(&profile, flen) < 0)
|
|
|
|
continue;
|
|
|
|
wpabuf_put_data(profile, fpos, flen);
|
|
|
|
fpos += flen;
|
|
|
|
}
|
|
|
|
pos = wpabuf_head(profile);
|
|
|
|
end = pos + wpabuf_len(profile);
|
2023-02-13 20:34:58 +01:00
|
|
|
|
|
|
|
if (end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated Per-STA Profile subelement");
|
|
|
|
continue;
|
|
|
|
}
|
2023-09-01 17:29:18 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "Basic MLE - Per-STA Profile",
|
|
|
|
pos, end - pos);
|
2023-02-13 20:34:58 +01:00
|
|
|
ctrl = WPA_GET_LE16(pos);
|
|
|
|
pos += 2;
|
|
|
|
|
2023-08-10 10:27:21 +02:00
|
|
|
link_id = ctrl & BASIC_MLE_STA_CTRL_LINK_ID_MASK;
|
2023-09-01 17:53:56 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "Per-STA Profile: len=%zu Link_ID=%u Complete=%u Reserved=0x%x",
|
|
|
|
wpabuf_len(profile),
|
2023-08-10 10:27:21 +02:00
|
|
|
link_id,
|
2023-02-13 20:34:58 +01:00
|
|
|
!!(ctrl & BASIC_MLE_STA_CTRL_COMPLETE_PROFILE),
|
|
|
|
(ctrl & 0xf000) >> 12);
|
|
|
|
|
|
|
|
if (end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO, "No room for STA Info field");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
len = *pos;
|
|
|
|
if (len < 1 || len > end - pos) {
|
|
|
|
wpa_printf(MSG_INFO, "Truncated STA Info field");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
info_end = pos + len;
|
|
|
|
pos++;
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_PRES_STA_MAC) {
|
|
|
|
if (info_end - pos < ETH_ALEN) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated STA MAC Address in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "STA MAC Address: " MACSTR,
|
|
|
|
MAC2STR(pos));
|
2023-08-10 10:27:21 +02:00
|
|
|
if (sta && link_id < MAX_NUM_MLO_LINKS) {
|
|
|
|
os_memcpy(sta->link_addr[link_id], pos,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Learned Link ID %u MAC address "
|
|
|
|
MACSTR
|
|
|
|
" from Association Request",
|
|
|
|
link_id, MAC2STR(pos));
|
|
|
|
}
|
2023-02-13 20:34:58 +01:00
|
|
|
pos += ETH_ALEN;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_PRES_BEACON_INT) {
|
|
|
|
if (info_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated Beacon Interval in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "Beacon Interval: %u",
|
|
|
|
WPA_GET_LE16(pos));
|
|
|
|
pos += 2;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_PRES_TSF_OFFSET) {
|
|
|
|
if (info_end - pos < 8) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated TSF Offset in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "TSF Offset: 0x%llx",
|
|
|
|
(long long unsigned) WPA_GET_LE64(pos));
|
|
|
|
pos += 8;
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_PRES_DTIM_INFO) {
|
|
|
|
if (info_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated DTIM Info in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "DTIM Info: 0x%x",
|
|
|
|
WPA_GET_LE16(pos));
|
|
|
|
pos += 2;
|
|
|
|
}
|
|
|
|
if ((ctrl & (BASIC_MLE_STA_CTRL_COMPLETE_PROFILE |
|
|
|
|
BASIC_MLE_STA_CTRL_PRES_NSTR_LINK_PAIR)) ==
|
|
|
|
(BASIC_MLE_STA_CTRL_COMPLETE_PROFILE |
|
|
|
|
BASIC_MLE_STA_CTRL_PRES_NSTR_LINK_PAIR)) {
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_NSTR_BITMAP) {
|
|
|
|
if (info_end - pos < 2) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated NSTR Indication Bitmap in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "NSTR Indication Bitmap: 0x%04x",
|
|
|
|
WPA_GET_LE16(pos));
|
|
|
|
pos += 2;
|
|
|
|
} else {
|
|
|
|
if (info_end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated NSTR Indication Bitmap in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "NSTR Indication Bitmap: 0x%02x",
|
|
|
|
*pos);
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (ctrl & BASIC_MLE_STA_CTRL_PRES_BSS_PARAM_COUNT) {
|
|
|
|
if (info_end - pos < 1) {
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"Truncated BSS Parameters Change Count in STA Info");
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "BSS Parameters Change Count: %u",
|
|
|
|
*pos);
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
if (info_end > pos) {
|
|
|
|
wpa_hexdump(MSG_INFO,
|
|
|
|
"Extra information at the end of STA Info",
|
|
|
|
pos, ci_end - pos);
|
|
|
|
pos = info_end;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "STA Profile", pos, end - pos);
|
2023-09-01 18:24:40 +02:00
|
|
|
if (end - pos > fields_len) {
|
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
|
|
|
|
if (ieee802_11_parse_elems(pos + fields_len,
|
|
|
|
end - pos - fields_len,
|
|
|
|
&elems, 0) != ParseFailed) {
|
|
|
|
if (elems.rsn_ie)
|
|
|
|
wpa_hexdump(MSG_DEBUG, "RSNE",
|
|
|
|
elems.rsn_ie,
|
|
|
|
elems.rsn_ie_len);
|
|
|
|
if (elems.rsnxe)
|
|
|
|
wpa_hexdump(MSG_DEBUG, "RSNXE",
|
|
|
|
elems.rsnxe,
|
|
|
|
elems.rsnxe_len);
|
|
|
|
}
|
|
|
|
}
|
2023-02-13 20:34:58 +01:00
|
|
|
}
|
2023-09-01 17:53:56 +02:00
|
|
|
|
|
|
|
wpabuf_free(profile);
|
2023-02-13 20:34:58 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-09-01 17:29:18 +02:00
|
|
|
static void parse_basic_ml_elems(struct ieee802_11_elems *elems, bool ap,
|
2023-09-01 18:24:40 +02:00
|
|
|
struct wlantest_sta *sta, size_t fields_len)
|
2023-09-01 17:29:18 +02:00
|
|
|
{
|
|
|
|
struct wpabuf *mlbuf;
|
|
|
|
|
2023-11-21 00:51:18 +01:00
|
|
|
mlbuf = ieee802_11_defrag(elems->basic_mle, elems->basic_mle_len, true);
|
2023-09-01 17:29:18 +02:00
|
|
|
if (mlbuf) {
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml(wpabuf_head(mlbuf), wpabuf_len(mlbuf), ap, sta,
|
|
|
|
fields_len);
|
2023-09-01 17:29:18 +02:00
|
|
|
wpabuf_free(mlbuf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static void rx_mgmt_beacon(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct ieee802_11_elems elems;
|
2015-04-18 16:59:30 +02:00
|
|
|
size_t offset;
|
2020-02-21 18:40:32 +01:00
|
|
|
const u8 *mme;
|
|
|
|
size_t mic_len;
|
|
|
|
u16 keyid;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
2015-04-18 16:59:30 +02:00
|
|
|
offset = mgmt->u.beacon.variable - data;
|
|
|
|
if (len < offset)
|
|
|
|
return;
|
2010-11-06 17:01:24 +01:00
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
2022-09-28 22:02:31 +02:00
|
|
|
/* do not override with Beacon data */
|
|
|
|
if (!bss->proberesp_seen)
|
|
|
|
bss->capab_info = le_to_host16(mgmt->u.beacon.capab_info);
|
2015-04-18 16:59:30 +02:00
|
|
|
if (ieee802_11_parse_elems(mgmt->u.beacon.variable, len - offset,
|
2010-11-06 17:01:24 +01:00
|
|
|
&elems, 0) == ParseFailed) {
|
|
|
|
if (bss->parse_error_reported)
|
|
|
|
return;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Invalid IEs in a Beacon frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
bss->parse_error_reported = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-03-01 20:21:38 +01:00
|
|
|
if (elems.rsnxe) {
|
|
|
|
os_memcpy(bss->rsnxe, elems.rsnxe, elems.rsnxe_len);
|
|
|
|
bss->rsnxe_len = elems.rsnxe_len;
|
|
|
|
} else {
|
|
|
|
bss->rsnxe_len = 0;
|
|
|
|
}
|
|
|
|
|
2022-09-28 22:02:31 +02:00
|
|
|
if (!bss->proberesp_seen)
|
|
|
|
bss_update(wt, bss, &elems, 1);
|
2020-02-21 18:40:32 +01:00
|
|
|
|
|
|
|
mme = get_ie(mgmt->u.beacon.variable, len - offset, WLAN_EID_MMIE);
|
|
|
|
if (!mme) {
|
|
|
|
if (bss->bigtk_idx) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Unexpected unprotected Beacon frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_MISSING_BIP_MMIE]++;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mic_len = bss->mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC ? 8 : 16;
|
|
|
|
if (len < 24 + 10 + mic_len ||
|
|
|
|
data[len - (10 + mic_len)] != WLAN_EID_MMIE ||
|
|
|
|
data[len - (10 + mic_len - 1)] != 8 + mic_len) {
|
|
|
|
add_note(wt, MSG_INFO, "Invalid MME in a Beacon frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
mme += 2;
|
|
|
|
keyid = WPA_GET_LE16(mme);
|
|
|
|
if (keyid < 6 || keyid > 7) {
|
|
|
|
add_note(wt, MSG_INFO, "Unexpected MME KeyID %u from " MACSTR,
|
|
|
|
keyid, MAC2STR(mgmt->sa));
|
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_INVALID_BIP_MMIE]++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Beacon frame MME KeyID %u", keyid);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "MME IPN", mme + 2, 6);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "MME MIC", mme + 8, mic_len);
|
|
|
|
|
|
|
|
if (!bss->igtk_len[keyid]) {
|
2022-09-28 23:03:27 +02:00
|
|
|
add_note(wt, MSG_DEBUG,
|
|
|
|
"No BIGTK known to validate BIP frame from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2020-02-21 18:40:32 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp(mme + 2, bss->ipn[keyid], 6) <= 0) {
|
|
|
|
add_note(wt, MSG_INFO, "BIP replay detected: SA=" MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
wpa_hexdump(MSG_INFO, "RX IPN", mme + 2, 6);
|
|
|
|
wpa_hexdump(MSG_INFO, "Last RX IPN", bss->ipn[keyid], 6);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (check_mmie_mic(bss->mgmt_group_cipher, bss->igtk[keyid],
|
|
|
|
bss->igtk_len[keyid], data, len) < 0) {
|
|
|
|
add_note(wt, MSG_INFO, "Invalid MME MIC in a Beacon frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_INVALID_BIP_MMIE]++;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_DEBUG, "Valid MME MIC in Beacon frame");
|
|
|
|
os_memcpy(bss->ipn[keyid], mme + 2, 6);
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_probe_resp(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct ieee802_11_elems elems;
|
2015-04-18 16:59:30 +02:00
|
|
|
size_t offset;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
2015-04-18 16:59:30 +02:00
|
|
|
offset = mgmt->u.probe_resp.variable - data;
|
|
|
|
if (len < offset)
|
|
|
|
return;
|
2010-11-06 17:01:24 +01:00
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
|
|
|
|
2013-12-25 17:37:33 +01:00
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_PROBE_RESPONSE]++;
|
2010-11-06 17:01:24 +01:00
|
|
|
bss->capab_info = le_to_host16(mgmt->u.probe_resp.capab_info);
|
2015-04-18 16:59:30 +02:00
|
|
|
if (ieee802_11_parse_elems(mgmt->u.probe_resp.variable, len - offset,
|
2010-11-06 17:01:24 +01:00
|
|
|
&elems, 0) == ParseFailed) {
|
|
|
|
if (bss->parse_error_reported)
|
|
|
|
return;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Invalid IEs in a Probe Response frame "
|
|
|
|
"from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
bss->parse_error_reported = 1;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2020-02-27 23:51:07 +01:00
|
|
|
bss_update(wt, bss, &elems, 2);
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
static void process_fils_auth(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt, size_t len)
|
|
|
|
{
|
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
u16 trans;
|
|
|
|
struct wpa_ie_data data;
|
|
|
|
|
|
|
|
if (sta->auth_alg != WLAN_AUTH_FILS_SK ||
|
|
|
|
len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth))
|
|
|
|
return;
|
|
|
|
|
|
|
|
trans = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
|
|
|
|
|
|
if (ieee802_11_parse_elems(mgmt->u.auth.variable,
|
|
|
|
len - IEEE80211_HDRLEN -
|
|
|
|
sizeof(mgmt->u.auth), &elems, 0) ==
|
|
|
|
ParseFailed)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (trans == 1) {
|
|
|
|
if (!elems.rsn_ie) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FILS Authentication frame missing RSNE");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
if (wpa_parse_wpa_ie_rsn(elems.rsn_ie - 2,
|
|
|
|
elems.rsn_ie_len + 2, &data) < 0) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Invalid RSNE in FILS Authentication frame");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
sta->key_mgmt = data.key_mgmt;
|
|
|
|
sta->pairwise_cipher = data.pairwise_cipher;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!elems.fils_nonce) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FILS Authentication frame missing nonce");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2017-09-05 18:01:59 +02:00
|
|
|
os_memcpy(sta->anonce, elems.fils_nonce, FILS_NONCE_LEN);
|
|
|
|
else
|
|
|
|
os_memcpy(sta->snonce, elems.fils_nonce, FILS_NONCE_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-08-22 21:14:47 +02:00
|
|
|
static void process_ft_auth(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt, size_t len)
|
|
|
|
{
|
|
|
|
u16 trans;
|
|
|
|
struct wpa_ft_ies parse;
|
|
|
|
struct wpa_ptk ptk;
|
|
|
|
u8 ptk_name[WPA_PMK_NAME_LEN];
|
|
|
|
struct wlantest_bss *old_bss;
|
|
|
|
struct wlantest_sta *old_sta = NULL;
|
2023-08-31 20:10:54 +02:00
|
|
|
const u8 *spa, *aa;
|
2023-08-31 19:47:00 +02:00
|
|
|
struct ieee802_11_elems elems;
|
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
|
|
|
if (sta->auth_alg != WLAN_AUTH_FT ||
|
|
|
|
len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth))
|
|
|
|
return;
|
|
|
|
|
|
|
|
trans = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
|
|
|
2023-08-31 19:47:00 +02:00
|
|
|
ie = mgmt->u.auth.variable;
|
|
|
|
ie_len = len - IEEE80211_HDRLEN - sizeof(mgmt->u.auth);
|
|
|
|
if (wpa_ft_parse_ies(ie, ie_len, &parse, 0, false)) {
|
2019-08-22 21:14:47 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Could not parse FT Authentication Response frame");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-31 19:47:00 +02:00
|
|
|
if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed)
|
|
|
|
wpa_printf(MSG_INFO,
|
|
|
|
"FT: Failed to parse IEs in FT Authentication frame");
|
|
|
|
|
2019-08-22 21:14:47 +02:00
|
|
|
if (trans == 1) {
|
2023-08-31 19:47:00 +02:00
|
|
|
if (elems.basic_mle)
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml_elems(&elems, false, sta, 6);
|
2019-08-22 21:14:47 +02:00
|
|
|
sta->key_mgmt = parse.key_mgmt;
|
|
|
|
sta->pairwise_cipher = parse.pairwise_cipher;
|
2023-08-28 11:16:42 +02:00
|
|
|
if (parse.fte_snonce)
|
|
|
|
os_memcpy(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (trans != 2)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2023-08-31 19:47:00 +02:00
|
|
|
spa = elems.basic_mle ? sta->mld_mac_addr : sta->addr;
|
2023-08-31 20:10:54 +02:00
|
|
|
aa = elems.basic_mle ? bss->mld_mac_addr : bss->bssid;
|
2023-08-31 19:47:00 +02:00
|
|
|
|
2023-08-28 11:16:42 +02:00
|
|
|
if (!parse.fte_snonce ||
|
|
|
|
os_memcmp(sta->snonce, parse.fte_snonce, WPA_NONCE_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: SNonce mismatch in FTE");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
|
|
|
|
parse.fte_snonce, WPA_NONCE_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce",
|
|
|
|
sta->snonce, WPA_NONCE_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (parse.fte_anonce)
|
|
|
|
os_memcpy(sta->anonce, parse.fte_anonce, WPA_NONCE_LEN);
|
|
|
|
|
2019-08-22 21:14:47 +02:00
|
|
|
/* TODO: Should find the latest updated PMK-R0 value here instead
|
|
|
|
* copying the one from the first found matching old STA entry. */
|
|
|
|
dl_list_for_each(old_bss, &wt->bss, struct wlantest_bss, list) {
|
|
|
|
if (old_bss == bss)
|
|
|
|
continue;
|
|
|
|
old_sta = sta_find(old_bss, sta->addr);
|
|
|
|
if (old_sta)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (!old_sta)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2020-05-23 20:24:01 +02:00
|
|
|
os_memcpy(sta->pmk_r0, old_sta->pmk_r0, old_sta->pmk_r0_len);
|
|
|
|
sta->pmk_r0_len = old_sta->pmk_r0_len;
|
2019-08-22 21:14:47 +02:00
|
|
|
os_memcpy(sta->pmk_r0_name, old_sta->pmk_r0_name,
|
|
|
|
sizeof(sta->pmk_r0_name));
|
|
|
|
|
|
|
|
if (parse.r1kh_id)
|
|
|
|
os_memcpy(bss->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN);
|
|
|
|
|
2020-05-23 20:24:01 +02:00
|
|
|
if (wpa_derive_pmk_r1(sta->pmk_r0, sta->pmk_r0_len, sta->pmk_r0_name,
|
2023-08-31 19:47:00 +02:00
|
|
|
bss->r1kh_id, spa, sta->pmk_r1,
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_name) < 0)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_len = sta->pmk_r0_len;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
|
|
|
if (!parse.fte_anonce || !parse.fte_snonce ||
|
2020-05-23 20:43:36 +02:00
|
|
|
wpa_pmk_r1_to_ptk(sta->pmk_r1, sta->pmk_r1_len, parse.fte_snonce,
|
2023-08-31 20:10:54 +02:00
|
|
|
parse.fte_anonce, spa, aa,
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_name, &ptk, ptk_name, sta->key_mgmt,
|
2020-12-16 12:00:18 +01:00
|
|
|
sta->pairwise_cipher, 0) < 0)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2022-11-09 21:39:01 +01:00
|
|
|
sta_new_ptk(wt, sta, &ptk);
|
2023-08-25 18:34:44 +02:00
|
|
|
out:
|
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-10-12 21:33:27 +02:00
|
|
|
static void process_sae_auth(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt, size_t len)
|
|
|
|
{
|
|
|
|
u16 trans, status, group;
|
|
|
|
|
|
|
|
if (sta->auth_alg != WLAN_AUTH_SAE ||
|
|
|
|
len < IEEE80211_HDRLEN + sizeof(mgmt->u.auth) + 2)
|
|
|
|
return;
|
|
|
|
|
|
|
|
trans = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
|
|
if (trans != 1)
|
|
|
|
return;
|
|
|
|
|
|
|
|
status = le_to_host16(mgmt->u.auth.status_code);
|
|
|
|
if (status != WLAN_STATUS_SUCCESS &&
|
|
|
|
status != WLAN_STATUS_SAE_HASH_TO_ELEMENT &&
|
|
|
|
status != WLAN_STATUS_SAE_PK)
|
|
|
|
return;
|
|
|
|
|
|
|
|
group = WPA_GET_LE16(mgmt->u.auth.variable);
|
|
|
|
wpa_printf(MSG_DEBUG, "SAE Commit using group %u", group);
|
|
|
|
sta->sae_group = group;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static void rx_mgmt_auth(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
u16 alg, trans, status;
|
2022-09-29 10:59:54 +02:00
|
|
|
bool from_ap;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
from_ap = ether_addr_equal(mgmt->sa, mgmt->bssid);
|
2022-09-29 10:59:54 +02:00
|
|
|
if (from_ap)
|
2010-11-06 17:01:24 +01:00
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (len < 24 + 6) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Authentication frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
alg = le_to_host16(mgmt->u.auth.auth_alg);
|
2017-09-05 18:01:59 +02:00
|
|
|
sta->auth_alg = alg;
|
2010-11-06 17:01:24 +01:00
|
|
|
trans = le_to_host16(mgmt->u.auth.auth_transaction);
|
|
|
|
status = le_to_host16(mgmt->u.auth.status_code);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH " MACSTR " -> " MACSTR
|
|
|
|
" (alg=%u trans=%u status=%u)",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), alg, trans, status);
|
|
|
|
|
2022-09-29 10:59:54 +02:00
|
|
|
if (status == WLAN_STATUS_SUCCESS &&
|
|
|
|
((alg == WLAN_AUTH_OPEN && trans == 2) ||
|
|
|
|
(alg == WLAN_AUTH_SAE && trans == 2 && from_ap))) {
|
2010-11-06 17:01:24 +01:00
|
|
|
if (sta->state == STATE1) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 2 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-06 17:01:24 +01:00
|
|
|
sta->state = STATE2;
|
|
|
|
}
|
|
|
|
}
|
2010-11-18 18:05:29 +01:00
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[WLANTEST_STA_COUNTER_AUTH_RX]++;
|
|
|
|
else
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_AUTH_TX]++;
|
2017-09-05 18:01:59 +02:00
|
|
|
|
|
|
|
process_fils_auth(wt, bss, sta, mgmt, len);
|
2019-08-22 21:14:47 +02:00
|
|
|
process_ft_auth(wt, bss, sta, mgmt, len);
|
2022-10-12 21:33:27 +02:00
|
|
|
process_sae_auth(wt, bss, sta, mgmt, len);
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
static void deauth_all_stas(struct wlantest *wt, struct wlantest_bss *bss)
|
2010-11-23 13:37:21 +01:00
|
|
|
{
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
dl_list_for_each(sta, &bss->sta, struct wlantest_sta, list) {
|
|
|
|
if (sta->state == STATE1)
|
|
|
|
continue;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 1 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-23 13:37:21 +01:00
|
|
|
sta->state = STATE1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
static void tdls_link_down(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta)
|
2011-01-24 13:33:48 +01:00
|
|
|
{
|
|
|
|
struct wlantest_tdls *tdls;
|
|
|
|
dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) {
|
|
|
|
if ((tdls->init == sta || tdls->resp == sta) && tdls->link_up)
|
|
|
|
{
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "TDLS: Set link down based on "
|
|
|
|
"STA deauth/disassoc");
|
2011-01-24 13:33:48 +01:00
|
|
|
tdls->link_up = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-11 19:46:15 +01:00
|
|
|
static void rx_mgmt_deauth(struct wlantest *wt, const u8 *data, size_t len,
|
|
|
|
int valid)
|
2010-11-06 17:01:24 +01:00
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
2011-10-25 23:06:06 +02:00
|
|
|
u16 fc, reason;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2010-11-06 17:01:24 +01:00
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
|
|
|
|
if (len < 24 + 2) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Deauthentication frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-10-25 23:06:06 +02:00
|
|
|
reason = le_to_host16(mgmt->u.deauth.reason_code);
|
2010-11-06 17:01:24 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "DEAUTH " MACSTR " -> " MACSTR
|
2010-11-23 12:16:23 +01:00
|
|
|
" (reason=%u) (valid=%d)",
|
2010-11-06 17:01:24 +01:00
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
|
2011-10-25 23:06:06 +02:00
|
|
|
reason, valid);
|
2010-11-11 19:46:15 +01:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "DEAUTH payload", data + 24, len - 24);
|
|
|
|
|
2010-11-23 13:37:21 +01:00
|
|
|
if (sta == NULL) {
|
|
|
|
if (valid && mgmt->da[0] == 0xff)
|
2013-05-26 19:58:50 +02:00
|
|
|
deauth_all_stas(wt, bss);
|
2010-11-23 12:16:23 +01:00
|
|
|
return;
|
2010-11-23 13:37:21 +01:00
|
|
|
}
|
2010-11-23 12:16:23 +01:00
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid)) {
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_RX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DEAUTH_RX]++;
|
2011-01-07 15:52:56 +01:00
|
|
|
if (sta->pwrmgt && !sta->pspoll)
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DEAUTH_RX_ASLEEP]++;
|
|
|
|
else
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DEAUTH_RX_AWAKE]++;
|
2011-10-25 23:06:06 +02:00
|
|
|
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
if (!(fc & WLAN_FC_ISWEP) && reason == 6)
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DEAUTH_RX_RC6]++;
|
|
|
|
else if (!(fc & WLAN_FC_ISWEP) && reason == 7)
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DEAUTH_RX_RC7]++;
|
2011-01-07 15:52:56 +01:00
|
|
|
} else
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DEAUTH_TX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DEAUTH_TX]++;
|
|
|
|
|
2010-11-11 19:46:15 +01:00
|
|
|
if (!valid) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Do not change STA " MACSTR " State "
|
|
|
|
"since Disassociation frame was not protected "
|
|
|
|
"correctly", MAC2STR(sta->addr));
|
2010-11-11 19:46:15 +01:00
|
|
|
return;
|
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
if (sta->state != STATE1) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 1 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-06 17:01:24 +01:00
|
|
|
sta->state = STATE1;
|
|
|
|
}
|
2013-05-26 19:58:50 +02:00
|
|
|
tdls_link_down(wt, bss, sta);
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
static const u8 * get_fils_session(const u8 *ies, size_t ies_len)
|
|
|
|
{
|
|
|
|
const u8 *ie, *end;
|
|
|
|
|
|
|
|
ie = ies;
|
|
|
|
end = ((const u8 *) ie) + ies_len;
|
|
|
|
while (ie + 1 < end) {
|
|
|
|
if (ie + 2 + ie[1] > end)
|
|
|
|
break;
|
|
|
|
if (ie[0] == WLAN_EID_EXTENSION &&
|
|
|
|
ie[1] >= 1 + FILS_SESSION_LEN &&
|
|
|
|
ie[2] == WLAN_EID_EXT_FILS_SESSION)
|
|
|
|
return ie;
|
|
|
|
ie += 2 + ie[1];
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int try_rmsk(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta, struct wlantest_pmk *pmk,
|
|
|
|
const u8 *frame_start, const u8 *frame_ad,
|
|
|
|
const u8 *frame_ad_end, const u8 *encr_end)
|
|
|
|
{
|
|
|
|
size_t pmk_len = 0;
|
|
|
|
u8 pmk_buf[PMK_LEN_MAX];
|
|
|
|
struct wpa_ptk ptk;
|
|
|
|
u8 ick[FILS_ICK_MAX_LEN];
|
|
|
|
size_t ick_len;
|
|
|
|
const u8 *aad[5];
|
|
|
|
size_t aad_len[5];
|
|
|
|
u8 buf[2000];
|
|
|
|
|
|
|
|
if (fils_rmsk_to_pmk(sta->key_mgmt, pmk->pmk, pmk->pmk_len,
|
|
|
|
sta->snonce, sta->anonce, NULL, 0,
|
|
|
|
pmk_buf, &pmk_len) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (fils_pmk_to_ptk(pmk_buf, pmk_len, sta->addr, bss->bssid,
|
2017-09-13 20:36:05 +02:00
|
|
|
sta->snonce, sta->anonce, NULL, 0,
|
|
|
|
&ptk, ick, &ick_len,
|
2017-09-05 18:01:59 +02:00
|
|
|
sta->key_mgmt, sta->pairwise_cipher,
|
2020-12-16 12:00:19 +01:00
|
|
|
NULL, NULL, 0) < 0)
|
2017-09-05 18:01:59 +02:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* Check AES-SIV decryption with the derived key */
|
|
|
|
|
|
|
|
/* AES-SIV AAD vectors */
|
|
|
|
|
|
|
|
/* The STA's MAC address */
|
|
|
|
aad[0] = sta->addr;
|
|
|
|
aad_len[0] = ETH_ALEN;
|
|
|
|
/* The AP's BSSID */
|
|
|
|
aad[1] = bss->bssid;
|
|
|
|
aad_len[1] = ETH_ALEN;
|
|
|
|
/* The STA's nonce */
|
|
|
|
aad[2] = sta->snonce;
|
|
|
|
aad_len[2] = FILS_NONCE_LEN;
|
|
|
|
/* The AP's nonce */
|
|
|
|
aad[3] = sta->anonce;
|
|
|
|
aad_len[3] = FILS_NONCE_LEN;
|
|
|
|
/*
|
|
|
|
* The (Re)Association Request frame from the Capability Information
|
|
|
|
* field to the FILS Session element (both inclusive).
|
|
|
|
*/
|
|
|
|
aad[4] = frame_ad;
|
|
|
|
aad_len[4] = frame_ad_end - frame_ad;
|
|
|
|
|
|
|
|
if (encr_end - frame_ad_end < AES_BLOCK_SIZE ||
|
|
|
|
encr_end - frame_ad_end > sizeof(buf))
|
|
|
|
return -1;
|
|
|
|
if (aes_siv_decrypt(ptk.kek, ptk.kek_len,
|
|
|
|
frame_ad_end, encr_end - frame_ad_end,
|
|
|
|
5, aad, aad_len, buf) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FILS: Derived PTK did not match AES-SIV data");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_DEBUG, "Derived FILS PTK");
|
|
|
|
os_memcpy(&sta->ptk, &ptk, sizeof(ptk));
|
|
|
|
sta->ptk_set = 1;
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_PTK_LEARNED]++;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FILS: Decrypted Association Request elements",
|
|
|
|
buf, encr_end - frame_ad_end - AES_BLOCK_SIZE);
|
|
|
|
|
|
|
|
if (wt->write_pcap_dumper || wt->pcapng) {
|
|
|
|
write_pcap_decrypted(wt, frame_start,
|
|
|
|
frame_ad_end - frame_start,
|
|
|
|
buf,
|
|
|
|
encr_end - frame_ad_end - AES_BLOCK_SIZE);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void derive_fils_keys(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta, const u8 *frame_start,
|
|
|
|
const u8 *frame_ad, const u8 *frame_ad_end,
|
|
|
|
const u8 *encr_end)
|
|
|
|
{
|
|
|
|
struct wlantest_pmk *pmk;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Trying to derive PTK for " MACSTR
|
|
|
|
" from FILS rMSK", MAC2STR(sta->addr));
|
|
|
|
|
|
|
|
dl_list_for_each(pmk, &bss->pmk, struct wlantest_pmk,
|
|
|
|
list) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Try per-BSS PMK");
|
|
|
|
if (try_rmsk(wt, bss, sta, pmk, frame_start, frame_ad,
|
|
|
|
frame_ad_end, encr_end) == 0)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
dl_list_for_each(pmk, &wt->pmk, struct wlantest_pmk, list) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Try global PMK");
|
|
|
|
if (try_rmsk(wt, bss, sta, pmk, frame_start, frame_ad,
|
|
|
|
frame_ad_end, encr_end) == 0)
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-08-28 11:32:26 +02:00
|
|
|
static void dump_mld_info(struct wlantest *wt, struct wlantest_sta *sta)
|
|
|
|
{
|
|
|
|
int link_id;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
u8 zero[ETH_ALEN];
|
|
|
|
const u8 *bssid;
|
|
|
|
|
|
|
|
wpa_printf(MSG_INFO, "MLO association - AP MLD: " MACSTR
|
|
|
|
" STA MLD: " MACSTR,
|
|
|
|
MAC2STR(sta->bss->mld_mac_addr), MAC2STR(sta->mld_mac_addr));
|
|
|
|
|
|
|
|
os_memset(zero, 0, ETH_ALEN);
|
|
|
|
|
|
|
|
for (link_id = 0; link_id < MAX_NUM_MLO_LINKS; link_id++) {
|
|
|
|
bss = bss_find_mld(wt, sta->bss->mld_mac_addr, link_id);
|
|
|
|
if (!bss &&
|
|
|
|
is_zero_ether_addr(sta->link_addr[link_id]))
|
|
|
|
continue;
|
|
|
|
if (bss)
|
|
|
|
bssid = bss->bssid;
|
|
|
|
else
|
|
|
|
bssid = zero;
|
|
|
|
wpa_printf(MSG_INFO, " Link %u - AP: " MACSTR " STA: " MACSTR,
|
|
|
|
link_id, MAC2STR(bssid),
|
|
|
|
MAC2STR(sta->link_addr[link_id]));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static void rx_mgmt_assoc_req(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
2010-11-06 17:10:34 +01:00
|
|
|
struct ieee802_11_elems elems;
|
2017-09-05 18:01:59 +02:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (len < 24 + 4) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Association Request frame "
|
|
|
|
"from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "ASSOCREQ " MACSTR " -> " MACSTR
|
|
|
|
" (capab=0x%x listen_int=%u)",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
|
|
|
|
le_to_host16(mgmt->u.assoc_req.capab_info),
|
|
|
|
le_to_host16(mgmt->u.assoc_req.listen_interval));
|
2010-11-06 17:10:34 +01:00
|
|
|
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[WLANTEST_STA_COUNTER_ASSOCREQ_TX]++;
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
ie = mgmt->u.assoc_req.variable;
|
|
|
|
ie_len = len - (mgmt->u.assoc_req.variable - data);
|
|
|
|
|
|
|
|
if (sta->auth_alg == WLAN_AUTH_FILS_SK) {
|
|
|
|
const u8 *session, *frame_ad, *frame_ad_end, *encr_end;
|
|
|
|
|
|
|
|
session = get_fils_session(ie, ie_len);
|
|
|
|
if (session) {
|
|
|
|
frame_ad = (const u8 *) &mgmt->u.assoc_req.capab_info;
|
|
|
|
frame_ad_end = session + 2 + session[1];
|
|
|
|
encr_end = data + len;
|
|
|
|
derive_fils_keys(wt, bss, sta, data, frame_ad,
|
|
|
|
frame_ad_end, encr_end);
|
|
|
|
ie_len = session - ie;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Invalid IEs in Association Request "
|
|
|
|
"frame from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:10:34 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-03-01 20:21:38 +01:00
|
|
|
if (elems.rsnxe) {
|
|
|
|
os_memcpy(sta->rsnxe, elems.rsnxe, elems.rsnxe_len);
|
|
|
|
sta->rsnxe_len = elems.rsnxe_len;
|
|
|
|
}
|
|
|
|
|
2023-08-08 09:30:10 +02:00
|
|
|
if (elems.owe_dh && elems.owe_dh_len >= 2) {
|
|
|
|
sta->owe_group = WPA_GET_LE16(elems.owe_dh);
|
|
|
|
wpa_printf(MSG_DEBUG, "OWE using group %u", sta->owe_group);
|
|
|
|
}
|
|
|
|
|
2010-11-19 16:09:02 +01:00
|
|
|
sta->assocreq_capab_info = le_to_host16(mgmt->u.assoc_req.capab_info);
|
|
|
|
sta->assocreq_listen_int =
|
|
|
|
le_to_host16(mgmt->u.assoc_req.listen_interval);
|
|
|
|
os_free(sta->assocreq_ies);
|
|
|
|
sta->assocreq_ies_len = len - (mgmt->u.assoc_req.variable - data);
|
|
|
|
sta->assocreq_ies = os_malloc(sta->assocreq_ies_len);
|
|
|
|
if (sta->assocreq_ies)
|
|
|
|
os_memcpy(sta->assocreq_ies, mgmt->u.assoc_req.variable,
|
|
|
|
sta->assocreq_ies_len);
|
|
|
|
|
2020-02-27 23:31:33 +01:00
|
|
|
sta->assocreq_seen = 1;
|
2010-11-06 17:10:34 +01:00
|
|
|
sta_update_assoc(sta, &elems);
|
2023-08-24 16:34:37 +02:00
|
|
|
if (elems.basic_mle) {
|
|
|
|
if (bss->link_id_set) {
|
|
|
|
os_memcpy(sta->link_addr[bss->link_id], mgmt->sa,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Learned Link ID %u MAC address "
|
|
|
|
MACSTR
|
|
|
|
" from Association Request (assoc link)",
|
|
|
|
bss->link_id, MAC2STR(mgmt->sa));
|
|
|
|
}
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml_elems(&elems, false, sta, 2);
|
2023-08-28 11:32:26 +02:00
|
|
|
dump_mld_info(wt, sta);
|
2023-08-24 16:34:37 +02:00
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
static void decrypt_fils_assoc_resp(struct wlantest *wt,
|
|
|
|
struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *frame_start, const u8 *frame_ad,
|
|
|
|
const u8 *frame_ad_end, const u8 *encr_end)
|
|
|
|
{
|
|
|
|
const u8 *aad[5];
|
|
|
|
size_t aad_len[5];
|
|
|
|
u8 buf[2000];
|
|
|
|
|
|
|
|
if (!sta->ptk_set)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Check AES-SIV decryption with the derived key */
|
|
|
|
|
|
|
|
/* AES-SIV AAD vectors */
|
|
|
|
|
|
|
|
/* The AP's BSSID */
|
|
|
|
aad[0] = bss->bssid;
|
|
|
|
aad_len[0] = ETH_ALEN;
|
|
|
|
/* The STA's MAC address */
|
|
|
|
aad[1] = sta->addr;
|
|
|
|
aad_len[1] = ETH_ALEN;
|
|
|
|
/* The AP's nonce */
|
|
|
|
aad[2] = sta->anonce;
|
|
|
|
aad_len[2] = FILS_NONCE_LEN;
|
|
|
|
/* The STA's nonce */
|
|
|
|
aad[3] = sta->snonce;
|
|
|
|
aad_len[3] = FILS_NONCE_LEN;
|
|
|
|
/*
|
|
|
|
* The (Re)Association Response frame from the Capability Information
|
|
|
|
* field to the FILS Session element (both inclusive).
|
|
|
|
*/
|
|
|
|
aad[4] = frame_ad;
|
|
|
|
aad_len[4] = frame_ad_end - frame_ad;
|
|
|
|
|
|
|
|
if (encr_end - frame_ad_end < AES_BLOCK_SIZE ||
|
|
|
|
encr_end - frame_ad_end > sizeof(buf))
|
|
|
|
return;
|
|
|
|
if (aes_siv_decrypt(sta->ptk.kek, sta->ptk.kek_len,
|
|
|
|
frame_ad_end, encr_end - frame_ad_end,
|
|
|
|
5, aad, aad_len, buf) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FILS: Derived PTK did not match AES-SIV data");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FILS: Decrypted Association Response elements",
|
|
|
|
buf, encr_end - frame_ad_end - AES_BLOCK_SIZE);
|
|
|
|
|
|
|
|
if (wt->write_pcap_dumper || wt->pcapng) {
|
|
|
|
write_pcap_decrypted(wt, frame_start,
|
|
|
|
frame_ad_end - frame_start,
|
|
|
|
buf,
|
|
|
|
encr_end - frame_ad_end - AES_BLOCK_SIZE);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static void rx_mgmt_assoc_resp(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
u16 capab, status, aid;
|
2023-08-08 09:30:10 +02:00
|
|
|
struct ieee802_11_elems elems;
|
2015-08-06 14:51:36 +02:00
|
|
|
const u8 *ies;
|
|
|
|
size_t ies_len;
|
|
|
|
struct wpa_ft_ies parse;
|
2023-02-13 20:34:58 +01:00
|
|
|
const u8 *ml;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (len < 24 + 6) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Association Response frame "
|
|
|
|
"from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-08-06 14:51:36 +02:00
|
|
|
ies = mgmt->u.assoc_resp.variable;
|
|
|
|
ies_len = len - (mgmt->u.assoc_resp.variable - data);
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
capab = le_to_host16(mgmt->u.assoc_resp.capab_info);
|
|
|
|
status = le_to_host16(mgmt->u.assoc_resp.status_code);
|
|
|
|
aid = le_to_host16(mgmt->u.assoc_resp.aid);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "ASSOCRESP " MACSTR " -> " MACSTR
|
|
|
|
" (capab=0x%x status=%u aid=%u)",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
|
|
|
|
aid & 0x3fff);
|
|
|
|
|
2023-02-13 20:34:58 +01:00
|
|
|
ml = get_ml_ie(ies, ies_len, MULTI_LINK_CONTROL_TYPE_BASIC);
|
2023-09-01 17:29:18 +02:00
|
|
|
if (ml &&
|
|
|
|
ieee802_11_parse_elems(ies, ies_len, &elems, 0) != ParseFailed)
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml_elems(&elems, true, NULL, 4);
|
2023-02-13 20:34:58 +01:00
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
if (sta->auth_alg == WLAN_AUTH_FILS_SK) {
|
|
|
|
const u8 *session, *frame_ad, *frame_ad_end, *encr_end;
|
|
|
|
|
|
|
|
session = get_fils_session(ies, ies_len);
|
|
|
|
if (session) {
|
|
|
|
frame_ad = (const u8 *) &mgmt->u.assoc_resp.capab_info;
|
|
|
|
frame_ad_end = session + 2 + session[1];
|
|
|
|
encr_end = data + len;
|
|
|
|
decrypt_fils_assoc_resp(wt, bss, sta, data, frame_ad,
|
|
|
|
frame_ad_end, encr_end);
|
|
|
|
ies_len = session - ies;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-08-08 09:30:10 +02:00
|
|
|
if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Failed to parse IEs in AssocResp from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
}
|
|
|
|
|
2010-11-21 20:24:20 +01:00
|
|
|
if (status == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) {
|
2023-08-08 09:30:10 +02:00
|
|
|
if (!elems.timeout_int ||
|
|
|
|
elems.timeout_int[0] != WLAN_TIMEOUT_ASSOC_COMEBACK) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "No valid Timeout Interval IE "
|
|
|
|
"with Assoc Comeback time in AssocResp "
|
|
|
|
"(status=30) from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-21 20:24:20 +01:00
|
|
|
} else {
|
|
|
|
sta->counters[
|
|
|
|
WLANTEST_STA_COUNTER_ASSOCRESP_COMEBACK]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if ((aid & 0xc000) != 0xc000) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
|
|
|
|
"in Association Response from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
sta->aid = aid & 0xc000;
|
|
|
|
|
|
|
|
if (sta->state < STATE2) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG,
|
|
|
|
"STA " MACSTR " was not in State 2 when "
|
|
|
|
"getting associated", MAC2STR(sta->addr));
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sta->state < STATE3) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 3 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-06 17:01:24 +01:00
|
|
|
sta->state = STATE3;
|
|
|
|
}
|
2015-08-06 14:51:36 +02:00
|
|
|
|
2023-08-08 12:32:32 +02:00
|
|
|
if (wpa_ft_parse_ies(ies, ies_len, &parse, 0, false) == 0) {
|
2015-08-06 14:51:36 +02:00
|
|
|
if (parse.r0kh_id) {
|
|
|
|
os_memcpy(bss->r0kh_id, parse.r0kh_id,
|
|
|
|
parse.r0kh_id_len);
|
|
|
|
bss->r0kh_id_len = parse.r0kh_id_len;
|
|
|
|
}
|
|
|
|
if (parse.r1kh_id)
|
|
|
|
os_memcpy(bss->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2015-08-06 14:51:36 +02:00
|
|
|
}
|
2023-08-08 09:30:10 +02:00
|
|
|
|
|
|
|
if (elems.owe_dh && elems.owe_dh_len >= 2) {
|
|
|
|
sta->owe_group = WPA_GET_LE16(elems.owe_dh);
|
|
|
|
wpa_printf(MSG_DEBUG, "OWE using group %u", sta->owe_group);
|
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_reassoc_req(struct wlantest *wt, const u8 *data,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
2010-11-06 17:10:34 +01:00
|
|
|
struct ieee802_11_elems elems;
|
2017-09-05 18:01:59 +02:00
|
|
|
const u8 *ie;
|
|
|
|
size_t ie_len;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (len < 24 + 4 + ETH_ALEN) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Reassociation Request frame "
|
|
|
|
"from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "REASSOCREQ " MACSTR " -> " MACSTR
|
|
|
|
" (capab=0x%x listen_int=%u current_ap=" MACSTR ")",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
|
|
|
|
le_to_host16(mgmt->u.reassoc_req.capab_info),
|
|
|
|
le_to_host16(mgmt->u.reassoc_req.listen_interval),
|
|
|
|
MAC2STR(mgmt->u.reassoc_req.current_ap));
|
2010-11-06 17:10:34 +01:00
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
ie = mgmt->u.reassoc_req.variable;
|
|
|
|
ie_len = len - (mgmt->u.reassoc_req.variable - data);
|
|
|
|
|
2023-08-14 17:25:08 +02:00
|
|
|
if (ieee802_11_parse_elems(ie, ie_len, &elems, 0) == ParseFailed) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Invalid IEs in Reassociation Request frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
sta = sta_find_mlo(wt, bss, mgmt->sa);
|
|
|
|
/*
|
|
|
|
* In the case of FT over-the-DS roaming, STA entry was created with the
|
|
|
|
* MLD MAC address and attached to one of the BSSs affiliated with the
|
|
|
|
* AP MLD but that BSS might not be in the STA's requested reassociation
|
|
|
|
* links, so move it to reassociation link BSS and update STA link
|
|
|
|
* address.
|
|
|
|
*/
|
|
|
|
if (!sta && elems.basic_mle) {
|
|
|
|
const u8 *mld_addr;
|
|
|
|
struct wlantest_sta *sta1;
|
|
|
|
|
|
|
|
mld_addr = get_basic_mle_mld_addr(elems.basic_mle,
|
|
|
|
elems.basic_mle_len);
|
|
|
|
if (!mld_addr)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sta1 = sta_find_mlo(wt, bss, mld_addr);
|
|
|
|
if (sta1 && sta1->ft_over_ds) {
|
|
|
|
dl_list_del(&sta1->list);
|
|
|
|
dl_list_add(&bss->sta, &sta1->list);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Move existing STA entry from another affiliated BSS to the reassociation BSS (addr "
|
|
|
|
MACSTR " -> " MACSTR ")",
|
|
|
|
MAC2STR(sta1->addr), MAC2STR(mgmt->sa));
|
|
|
|
os_memcpy(sta1->addr, mgmt->sa, ETH_ALEN);
|
|
|
|
sta = sta1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
if (!sta)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_REASSOCREQ_TX]++;
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
if (sta->auth_alg == WLAN_AUTH_FILS_SK) {
|
|
|
|
const u8 *session, *frame_ad, *frame_ad_end, *encr_end;
|
|
|
|
|
|
|
|
session = get_fils_session(ie, ie_len);
|
|
|
|
if (session) {
|
|
|
|
frame_ad = (const u8 *) &mgmt->u.reassoc_req.capab_info;
|
|
|
|
frame_ad_end = session + 2 + session[1];
|
|
|
|
encr_end = data + len;
|
|
|
|
derive_fils_keys(wt, bss, sta, data, frame_ad,
|
|
|
|
frame_ad_end, encr_end);
|
|
|
|
ie_len = session - ie;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-03-01 20:21:38 +01:00
|
|
|
if (elems.rsnxe) {
|
|
|
|
os_memcpy(sta->rsnxe, elems.rsnxe, elems.rsnxe_len);
|
|
|
|
sta->rsnxe_len = elems.rsnxe_len;
|
|
|
|
}
|
|
|
|
|
2023-08-08 09:30:10 +02:00
|
|
|
if (elems.owe_dh && elems.owe_dh_len >= 2) {
|
|
|
|
sta->owe_group = WPA_GET_LE16(elems.owe_dh);
|
|
|
|
wpa_printf(MSG_DEBUG, "OWE using group %u", sta->owe_group);
|
|
|
|
}
|
|
|
|
|
2010-11-19 16:09:02 +01:00
|
|
|
sta->assocreq_capab_info =
|
|
|
|
le_to_host16(mgmt->u.reassoc_req.capab_info);
|
|
|
|
sta->assocreq_listen_int =
|
|
|
|
le_to_host16(mgmt->u.reassoc_req.listen_interval);
|
|
|
|
os_free(sta->assocreq_ies);
|
|
|
|
sta->assocreq_ies_len = len - (mgmt->u.reassoc_req.variable - data);
|
|
|
|
sta->assocreq_ies = os_malloc(sta->assocreq_ies_len);
|
|
|
|
if (sta->assocreq_ies)
|
|
|
|
os_memcpy(sta->assocreq_ies, mgmt->u.reassoc_req.variable,
|
|
|
|
sta->assocreq_ies_len);
|
|
|
|
|
2020-02-27 23:31:33 +01:00
|
|
|
sta->assocreq_seen = 1;
|
2010-11-06 17:10:34 +01:00
|
|
|
sta_update_assoc(sta, &elems);
|
2023-08-24 16:34:37 +02:00
|
|
|
if (elems.basic_mle) {
|
|
|
|
os_memset(sta->link_addr, 0, sizeof(sta->link_addr));
|
|
|
|
if (bss->link_id_set) {
|
|
|
|
os_memcpy(sta->link_addr[bss->link_id], mgmt->sa,
|
|
|
|
ETH_ALEN);
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Learned Link ID %u MAC address "
|
|
|
|
MACSTR
|
|
|
|
" from Reassociation Request (assoc link)",
|
|
|
|
bss->link_id, MAC2STR(mgmt->sa));
|
|
|
|
}
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml_elems(&elems, false, sta, 2);
|
2023-08-28 11:32:26 +02:00
|
|
|
dump_mld_info(wt, sta);
|
2023-08-24 16:34:37 +02:00
|
|
|
}
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2020-05-23 20:44:16 +02:00
|
|
|
if (elems.ftie) {
|
|
|
|
struct wpa_ft_ies parse;
|
|
|
|
int use_sha384;
|
|
|
|
struct rsn_mdie *mde;
|
|
|
|
const u8 *anonce, *snonce, *fte_mic;
|
|
|
|
u8 fte_elem_count;
|
|
|
|
unsigned int count;
|
|
|
|
u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN];
|
|
|
|
size_t mic_len = 16;
|
|
|
|
const u8 *kck;
|
|
|
|
size_t kck_len;
|
2023-08-24 17:00:31 +02:00
|
|
|
const u8 *aa, *spa;
|
2023-08-25 10:28:44 +02:00
|
|
|
struct wpabuf *extra = NULL;
|
2023-08-24 17:00:31 +02:00
|
|
|
|
|
|
|
if (elems.basic_mle) {
|
|
|
|
aa = bss->mld_mac_addr;
|
|
|
|
spa = sta->mld_mac_addr;
|
|
|
|
} else {
|
|
|
|
aa = bss->bssid;
|
|
|
|
spa = sta->addr;
|
|
|
|
}
|
2020-05-23 20:44:16 +02:00
|
|
|
|
|
|
|
use_sha384 = wpa_key_mgmt_sha384(sta->key_mgmt);
|
|
|
|
|
2023-08-08 12:32:32 +02:00
|
|
|
if (wpa_ft_parse_ies(ie, ie_len, &parse, sta->key_mgmt,
|
|
|
|
false) < 0) {
|
2020-05-23 20:44:16 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Failed to parse FT IEs");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.rsn) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No RSNE in Reassoc Req");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.rsn_pmkid) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No PMKID in RSNE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name,
|
|
|
|
WPA_PMK_NAME_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: PMKID in Reassoc Req did not match PMKR1Name");
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
"FT: Received RSNE[PMKR1Name]",
|
|
|
|
parse.rsn_pmkid, WPA_PMK_NAME_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
"FT: Previously derived PMKR1Name",
|
|
|
|
sta->pmk_r1_name, WPA_PMK_NAME_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
mde = (struct rsn_mdie *) parse.mdie;
|
|
|
|
if (!mde || parse.mdie_len < sizeof(*mde) ||
|
|
|
|
os_memcmp(mde->mobility_domain, bss->mdid,
|
|
|
|
MOBILITY_DOMAIN_ID_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid MDE");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (use_sha384) {
|
|
|
|
struct rsn_ftie_sha384 *fte;
|
|
|
|
|
|
|
|
fte = (struct rsn_ftie_sha384 *) parse.ftie;
|
|
|
|
if (!fte || parse.ftie_len < sizeof(*fte)) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
anonce = fte->anonce;
|
|
|
|
snonce = fte->snonce;
|
|
|
|
fte_elem_count = fte->mic_control[1];
|
|
|
|
fte_mic = fte->mic;
|
|
|
|
} else {
|
|
|
|
struct rsn_ftie *fte;
|
|
|
|
|
|
|
|
fte = (struct rsn_ftie *) parse.ftie;
|
|
|
|
if (!fte || parse.ftie_len < sizeof(*fte)) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid FTIE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
anonce = fte->anonce;
|
|
|
|
snonce = fte->snonce;
|
|
|
|
fte_elem_count = fte->mic_control[1];
|
|
|
|
fte_mic = fte->mic;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp(snonce, sta->snonce, WPA_NONCE_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: SNonce mismatch in FTIE");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
|
|
|
|
snonce, WPA_NONCE_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce",
|
|
|
|
sta->snonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp(anonce, sta->anonce, WPA_NONCE_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: ANonce mismatch in FTIE");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received ANonce",
|
|
|
|
anonce, WPA_NONCE_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Expected ANonce",
|
|
|
|
sta->anonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.r0kh_id) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No R0KH-ID subelem in FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
os_memcpy(bss->r0kh_id, parse.r0kh_id, parse.r0kh_id_len);
|
|
|
|
bss->r0kh_id_len = parse.r0kh_id_len;
|
|
|
|
|
|
|
|
if (!parse.r1kh_id) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No R1KH-ID subelem in FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
os_memcpy(bss->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN);
|
|
|
|
|
|
|
|
if (!parse.rsn_pmkid ||
|
|
|
|
os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name,
|
|
|
|
WPA_PMK_NAME_LEN)) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: No matching PMKR1Name (PMKID) in RSNE (pmkid=%d)",
|
|
|
|
!!parse.rsn_pmkid);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
count = 3;
|
|
|
|
if (parse.ric)
|
|
|
|
count += ieee802_11_ie_count(parse.ric, parse.ric_len);
|
|
|
|
if (parse.rsnxe)
|
|
|
|
count++;
|
|
|
|
if (fte_elem_count != count) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Unexpected IE count in MIC Control: received %u expected %u",
|
|
|
|
fte_elem_count, count);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_key_mgmt_fils(sta->key_mgmt)) {
|
|
|
|
kck = sta->ptk.kck2;
|
|
|
|
kck_len = sta->ptk.kck2_len;
|
|
|
|
} else {
|
|
|
|
kck = sta->ptk.kck;
|
|
|
|
kck_len = sta->ptk.kck_len;
|
|
|
|
}
|
2023-08-25 10:28:44 +02:00
|
|
|
|
|
|
|
if (elems.basic_mle) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
extra = wpabuf_alloc(MAX_NUM_MLO_LINKS * ETH_ALEN);
|
|
|
|
if (!extra)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2023-08-25 10:28:44 +02:00
|
|
|
for (i = 0; i < MAX_NUM_MLO_LINKS; i++) {
|
|
|
|
if (!is_zero_ether_addr(sta->link_addr[i]))
|
|
|
|
wpabuf_put_data(extra,
|
|
|
|
sta->link_addr[i],
|
|
|
|
ETH_ALEN);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-10-16 15:38:27 +02:00
|
|
|
if (wpa_ft_mic(sta->key_mgmt, kck, kck_len,
|
2023-08-24 17:00:31 +02:00
|
|
|
spa, aa, 5,
|
2020-05-23 20:44:16 +02:00
|
|
|
parse.mdie - 2, parse.mdie_len + 2,
|
|
|
|
parse.ftie - 2, parse.ftie_len + 2,
|
|
|
|
parse.rsn - 2, parse.rsn_len + 2,
|
|
|
|
parse.ric, parse.ric_len,
|
|
|
|
parse.rsnxe ? parse.rsnxe - 2 : NULL,
|
|
|
|
parse.rsnxe ? parse.rsnxe_len + 2 : 0,
|
2023-08-25 10:28:44 +02:00
|
|
|
extra,
|
2020-05-23 20:44:16 +02:00
|
|
|
mic) < 0) {
|
2023-08-25 10:28:44 +02:00
|
|
|
wpabuf_free(extra);
|
2020-05-23 20:44:16 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Failed to calculate MIC");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
2023-08-25 10:28:44 +02:00
|
|
|
wpabuf_free(extra);
|
2020-05-23 20:44:16 +02:00
|
|
|
|
|
|
|
if (os_memcmp_const(mic, fte_mic, mic_len) != 0) {
|
2023-08-24 17:00:31 +02:00
|
|
|
int link_id;
|
|
|
|
|
2020-05-23 20:44:16 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid MIC in FTE");
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: addr=" MACSTR " auth_addr=" MACSTR,
|
2023-08-24 17:00:31 +02:00
|
|
|
MAC2STR(spa), MAC2STR(aa));
|
2020-05-23 20:44:16 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC",
|
|
|
|
fte_mic, mic_len);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC",
|
|
|
|
mic, mic_len);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: MDE",
|
|
|
|
parse.mdie - 2, parse.mdie_len + 2);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: FTE",
|
|
|
|
parse.ftie - 2, parse.ftie_len + 2);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: RSN",
|
|
|
|
parse.rsn - 2, parse.rsn_len + 2);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: RSNXE",
|
|
|
|
parse.rsnxe ? parse.rsnxe - 2 : NULL,
|
|
|
|
parse.rsnxe ? parse.rsnxe_len + 2 : 0);
|
2023-08-24 17:00:31 +02:00
|
|
|
for (link_id = 0; link_id < MAX_NUM_MLO_LINKS;
|
|
|
|
link_id++) {
|
|
|
|
if (is_zero_ether_addr(sta->link_addr[link_id]))
|
|
|
|
continue;
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: STA link %d address: " MACSTR,
|
|
|
|
link_id,
|
|
|
|
MAC2STR(sta->link_addr[link_id]));
|
|
|
|
}
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_INFO, "FT: Valid FTE MIC");
|
2023-08-25 18:34:44 +02:00
|
|
|
out:
|
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2020-05-23 20:44:16 +02:00
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-05-23 23:35:13 +02:00
|
|
|
static void process_gtk_subelem(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *kek, size_t kek_len,
|
|
|
|
const u8 *gtk_elem,
|
2023-09-01 10:51:47 +02:00
|
|
|
size_t gtk_elem_len, bool mlo)
|
2020-05-23 23:35:13 +02:00
|
|
|
{
|
|
|
|
u8 gtk[32];
|
|
|
|
int keyidx;
|
|
|
|
enum wpa_alg alg;
|
|
|
|
size_t gtk_len, keylen;
|
|
|
|
const u8 *rsc;
|
2023-09-01 10:51:47 +02:00
|
|
|
size_t hlen;
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
if (!gtk_elem) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No GTK included in FTE");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received GTK in Reassoc Resp",
|
|
|
|
gtk_elem, gtk_elem_len);
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
hlen = 2 + 1 + 8;
|
|
|
|
if (mlo)
|
|
|
|
hlen++;
|
|
|
|
if (gtk_elem_len < hlen + 24 || (gtk_elem_len - hlen) % 8 ||
|
|
|
|
gtk_elem_len - (hlen + 8) > sizeof(gtk)) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid GTK sub-elem length %zu",
|
|
|
|
gtk_elem_len);
|
|
|
|
return;
|
|
|
|
}
|
2023-09-01 10:51:47 +02:00
|
|
|
gtk_len = gtk_elem_len - (hlen + 8);
|
|
|
|
if (aes_unwrap(kek, kek_len, gtk_len / 8, gtk_elem + hlen, gtk)) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: AES unwrap failed - could not decrypt GTK");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
keylen = wpa_cipher_key_len(bss->group_cipher);
|
|
|
|
alg = wpa_cipher_to_alg(bss->group_cipher);
|
|
|
|
if (alg == WPA_ALG_NONE) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Unsupported Group Cipher %d",
|
|
|
|
bss->group_cipher);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (gtk_len < keylen) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Too short GTK in FTE");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
/* Key Info[2] | [Link ID Info[1] | Key Length[1] | RSC[8] |
|
|
|
|
* Key[5..32]. */
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
keyidx = WPA_GET_LE16(gtk_elem) & 0x03;
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
if (gtk_elem[hlen - 8 - 1] != keylen) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: GTK length mismatch: received %u negotiated %zu",
|
2023-09-01 10:51:47 +02:00
|
|
|
gtk_elem[hlen - 8 - 1], keylen);
|
2020-05-23 23:35:13 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_DEBUG, "GTK KeyID=%u", keyidx);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: GTK from Reassoc Resp", gtk, keylen);
|
|
|
|
if (bss->group_cipher == WPA_CIPHER_TKIP) {
|
|
|
|
/* Swap Tx/Rx keys for Michael MIC */
|
|
|
|
u8 tmp[8];
|
|
|
|
|
|
|
|
os_memcpy(tmp, gtk + 16, 8);
|
|
|
|
os_memcpy(gtk + 16, gtk + 24, 8);
|
|
|
|
os_memcpy(gtk + 24, tmp, 8);
|
|
|
|
}
|
|
|
|
|
|
|
|
bss->gtk_len[keyidx] = gtk_len;
|
2023-09-01 10:51:47 +02:00
|
|
|
if (sta)
|
|
|
|
sta->gtk_len = gtk_len;
|
2020-05-23 23:35:13 +02:00
|
|
|
os_memcpy(bss->gtk[keyidx], gtk, gtk_len);
|
2023-09-01 10:51:47 +02:00
|
|
|
if (sta)
|
|
|
|
os_memcpy(sta->gtk, gtk, gtk_len);
|
|
|
|
rsc = gtk_elem + hlen - 8;
|
2020-05-23 23:35:13 +02:00
|
|
|
bss->rsc[keyidx][0] = rsc[5];
|
|
|
|
bss->rsc[keyidx][1] = rsc[4];
|
|
|
|
bss->rsc[keyidx][2] = rsc[3];
|
|
|
|
bss->rsc[keyidx][3] = rsc[2];
|
|
|
|
bss->rsc[keyidx][4] = rsc[1];
|
|
|
|
bss->rsc[keyidx][5] = rsc[0];
|
|
|
|
bss->gtk_idx = keyidx;
|
2023-09-01 10:51:47 +02:00
|
|
|
if (sta)
|
|
|
|
sta->gtk_idx = keyidx;
|
2020-05-23 23:35:13 +02:00
|
|
|
wpa_hexdump(MSG_DEBUG, "RSC", bss->rsc[keyidx], 6);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void process_igtk_subelem(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *kek, size_t kek_len,
|
2023-09-01 10:51:47 +02:00
|
|
|
const u8 *igtk_elem, size_t igtk_elem_len,
|
|
|
|
bool mlo)
|
2020-05-23 23:35:13 +02:00
|
|
|
{
|
|
|
|
u8 igtk[WPA_IGTK_MAX_LEN];
|
|
|
|
size_t igtk_len;
|
|
|
|
u16 keyidx;
|
|
|
|
const u8 *ipn;
|
2023-09-01 10:51:47 +02:00
|
|
|
size_t hlen;
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
if (bss->mgmt_group_cipher != WPA_CIPHER_AES_128_CMAC &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_GMAC_128 &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_GMAC_256 &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_CMAC_256)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!igtk_elem) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No IGTK included in FTE");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received IGTK in Reassoc Resp",
|
|
|
|
igtk_elem, igtk_elem_len);
|
|
|
|
|
|
|
|
igtk_len = wpa_cipher_key_len(bss->mgmt_group_cipher);
|
2023-09-01 10:51:47 +02:00
|
|
|
hlen = 2 + 6 + 1;
|
|
|
|
if (mlo)
|
|
|
|
hlen++;
|
|
|
|
if (igtk_elem_len != hlen + igtk_len + 8) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid IGTK sub-elem length %zu",
|
|
|
|
igtk_elem_len);
|
|
|
|
return;
|
|
|
|
}
|
2023-09-01 10:51:47 +02:00
|
|
|
if (igtk_elem[hlen - 1] != igtk_len) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Invalid IGTK sub-elem Key Length %d",
|
2023-09-01 10:51:47 +02:00
|
|
|
igtk_elem[hlen - 1]);
|
2020-05-23 23:35:13 +02:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
if (aes_unwrap(kek, kek_len, igtk_len / 8, igtk_elem + hlen, igtk)) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: AES unwrap failed - could not decrypt IGTK");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
/* KeyID[2] | IPN[6] | [Link ID info[1]] | Key Length[1] | Key[16+8] */
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
keyidx = WPA_GET_LE16(igtk_elem);
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: IGTK from Reassoc Resp", igtk, igtk_len);
|
|
|
|
|
|
|
|
if (keyidx < 4 || keyidx > 5) {
|
|
|
|
add_note(wt, MSG_INFO, "Unexpected IGTK KeyID %u", keyidx);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_DEBUG, "IGTK KeyID %u", keyidx);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "IPN", igtk_elem + 2, 6);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "IGTK", igtk, igtk_len);
|
|
|
|
os_memcpy(bss->igtk[keyidx], igtk, igtk_len);
|
|
|
|
bss->igtk_len[keyidx] = igtk_len;
|
|
|
|
ipn = igtk_elem + 2;
|
|
|
|
bss->ipn[keyidx][0] = ipn[5];
|
|
|
|
bss->ipn[keyidx][1] = ipn[4];
|
|
|
|
bss->ipn[keyidx][2] = ipn[3];
|
|
|
|
bss->ipn[keyidx][3] = ipn[2];
|
|
|
|
bss->ipn[keyidx][4] = ipn[1];
|
|
|
|
bss->ipn[keyidx][5] = ipn[0];
|
|
|
|
bss->igtk_idx = keyidx;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void process_bigtk_subelem(struct wlantest *wt, struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *kek, size_t kek_len,
|
2023-09-01 10:51:47 +02:00
|
|
|
const u8 *bigtk_elem, size_t bigtk_elem_len,
|
|
|
|
bool mlo)
|
2020-05-23 23:35:13 +02:00
|
|
|
{
|
|
|
|
u8 bigtk[WPA_BIGTK_MAX_LEN];
|
|
|
|
size_t bigtk_len;
|
|
|
|
u16 keyidx;
|
|
|
|
const u8 *ipn;
|
2023-09-01 10:51:47 +02:00
|
|
|
size_t hlen;
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
if (!bigtk_elem ||
|
|
|
|
(bss->mgmt_group_cipher != WPA_CIPHER_AES_128_CMAC &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_GMAC_128 &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_GMAC_256 &&
|
|
|
|
bss->mgmt_group_cipher != WPA_CIPHER_BIP_CMAC_256))
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "FT: Received BIGTK in Reassoc Resp",
|
|
|
|
bigtk_elem, bigtk_elem_len);
|
|
|
|
|
|
|
|
bigtk_len = wpa_cipher_key_len(bss->mgmt_group_cipher);
|
2023-09-01 10:51:47 +02:00
|
|
|
hlen = 2 + 6 + 1;
|
|
|
|
if (mlo)
|
|
|
|
hlen++;
|
|
|
|
if (bigtk_elem_len != hlen + bigtk_len + 8) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Invalid BIGTK sub-elem length %zu",
|
|
|
|
bigtk_elem_len);
|
|
|
|
return;
|
|
|
|
}
|
2023-09-01 10:51:47 +02:00
|
|
|
if (bigtk_elem[hlen - 1] != bigtk_len) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Invalid BIGTK sub-elem Key Length %d",
|
|
|
|
bigtk_elem[8]);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
if (aes_unwrap(kek, kek_len, bigtk_len / 8, bigtk_elem + hlen, bigtk)) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: AES unwrap failed - could not decrypt BIGTK");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
/* KeyID[2] | IPN[6] | [Link ID Info[1]] | Key Length[1] | Key[16+8] */
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
keyidx = WPA_GET_LE16(bigtk_elem);
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: BIGTK from Reassoc Resp", bigtk, bigtk_len);
|
|
|
|
|
|
|
|
if (keyidx < 6 || keyidx > 7) {
|
|
|
|
add_note(wt, MSG_INFO, "Unexpected BIGTK KeyID %u", keyidx);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_DEBUG, "BIGTK KeyID %u", keyidx);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "BIPN", bigtk_elem + 2, 6);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "BIGTK", bigtk, bigtk_len);
|
|
|
|
os_memcpy(bss->igtk[keyidx], bigtk, bigtk_len);
|
|
|
|
bss->igtk_len[keyidx] = bigtk_len;
|
|
|
|
ipn = bigtk_elem + 2;
|
|
|
|
bss->ipn[keyidx][0] = ipn[5];
|
|
|
|
bss->ipn[keyidx][1] = ipn[4];
|
|
|
|
bss->ipn[keyidx][2] = ipn[3];
|
|
|
|
bss->ipn[keyidx][3] = ipn[2];
|
|
|
|
bss->ipn[keyidx][4] = ipn[1];
|
|
|
|
bss->ipn[keyidx][5] = ipn[0];
|
|
|
|
bss->bigtk_idx = keyidx;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
static void process_fte_group_keys(struct wlantest *wt,
|
|
|
|
struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *kek, size_t kek_len,
|
|
|
|
struct wpa_ft_ies *parse)
|
|
|
|
{
|
|
|
|
process_gtk_subelem(wt, bss, sta, kek, kek_len,
|
|
|
|
parse->gtk, parse->gtk_len, false);
|
|
|
|
process_igtk_subelem(wt, bss, sta, kek, kek_len,
|
|
|
|
parse->igtk, parse->igtk_len, false);
|
|
|
|
process_bigtk_subelem(wt, bss, sta, kek, kek_len,
|
|
|
|
parse->bigtk, parse->bigtk_len, false);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void process_fte_group_keys_mlo(struct wlantest *wt,
|
|
|
|
struct wlantest_bss *bss,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const u8 *kek, size_t kek_len,
|
|
|
|
struct wpa_ft_ies *parse)
|
|
|
|
{
|
|
|
|
int link_id;
|
|
|
|
|
|
|
|
for (link_id = 0; link_id < MAX_NUM_MLO_LINKS; link_id++) {
|
|
|
|
struct wlantest_bss *l_bss;
|
|
|
|
struct wlantest_sta *l_sta;
|
|
|
|
|
|
|
|
if (!(parse->valid_mlo_gtks & BIT(link_id)))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
l_bss = bss_find_mld(wt, bss->mld_mac_addr, link_id);
|
|
|
|
if (!l_bss) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: No BSS entry found for AP MLD " MACSTR
|
|
|
|
" link ID %u",
|
|
|
|
MAC2STR(bss->mld_mac_addr),link_id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"Trying to learn group keys for Link ID %u",
|
|
|
|
link_id);
|
|
|
|
l_sta = bss == l_bss ? sta : NULL;
|
|
|
|
|
|
|
|
process_gtk_subelem(wt, l_bss, l_sta, kek, kek_len,
|
|
|
|
parse->mlo_gtk[link_id],
|
|
|
|
parse->mlo_gtk_len[link_id], true);
|
|
|
|
process_igtk_subelem(wt, l_bss, l_sta, kek, kek_len,
|
|
|
|
parse->mlo_igtk[link_id],
|
|
|
|
parse->mlo_igtk_len[link_id], true);
|
|
|
|
process_bigtk_subelem(wt, l_bss, l_sta, kek, kek_len,
|
|
|
|
parse->mlo_bigtk[link_id],
|
|
|
|
parse->mlo_bigtk_len[link_id], true);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
static void rx_mgmt_reassoc_resp(struct wlantest *wt, const u8 *data,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
u16 capab, status, aid;
|
2017-09-05 18:01:59 +02:00
|
|
|
const u8 *ies;
|
|
|
|
size_t ies_len;
|
2020-05-23 23:35:13 +02:00
|
|
|
struct ieee802_11_elems elems;
|
2023-02-13 20:34:58 +01:00
|
|
|
const u8 *ml;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
2023-08-10 10:31:26 +02:00
|
|
|
sta = sta_find_mlo(wt, bss, mgmt->da);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, mgmt->da);
|
2010-11-06 17:01:24 +01:00
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (len < 24 + 6) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Reassociation Response frame "
|
|
|
|
"from " MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
ies = mgmt->u.reassoc_resp.variable;
|
|
|
|
ies_len = len - (mgmt->u.reassoc_resp.variable - data);
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
capab = le_to_host16(mgmt->u.reassoc_resp.capab_info);
|
|
|
|
status = le_to_host16(mgmt->u.reassoc_resp.status_code);
|
|
|
|
aid = le_to_host16(mgmt->u.reassoc_resp.aid);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "REASSOCRESP " MACSTR " -> " MACSTR
|
|
|
|
" (capab=0x%x status=%u aid=%u)",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), capab, status,
|
|
|
|
aid & 0x3fff);
|
|
|
|
|
2023-02-13 20:34:58 +01:00
|
|
|
ml = get_ml_ie(ies, ies_len, MULTI_LINK_CONTROL_TYPE_BASIC);
|
2023-09-01 17:29:18 +02:00
|
|
|
if (ml &&
|
|
|
|
ieee802_11_parse_elems(ies, ies_len, &elems, 0) != ParseFailed)
|
2023-09-01 18:24:40 +02:00
|
|
|
parse_basic_ml_elems(&elems, true, NULL, 4);
|
2023-02-13 20:34:58 +01:00
|
|
|
|
2017-09-05 18:01:59 +02:00
|
|
|
if (sta->auth_alg == WLAN_AUTH_FILS_SK) {
|
|
|
|
const u8 *session, *frame_ad, *frame_ad_end, *encr_end;
|
|
|
|
|
|
|
|
session = get_fils_session(ies, ies_len);
|
|
|
|
if (session) {
|
|
|
|
frame_ad = (const u8 *)
|
|
|
|
&mgmt->u.reassoc_resp.capab_info;
|
|
|
|
frame_ad_end = session + 2 + session[1];
|
|
|
|
encr_end = data + len;
|
|
|
|
decrypt_fils_assoc_resp(wt, bss, sta, data, frame_ad,
|
|
|
|
frame_ad_end, encr_end);
|
|
|
|
ies_len = session - ies;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-23 23:35:13 +02:00
|
|
|
if (ieee802_11_parse_elems(ies, ies_len, &elems, 0) == ParseFailed) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Failed to parse IEs in ReassocResp from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
}
|
2017-09-05 18:01:59 +02:00
|
|
|
|
2020-05-23 23:35:13 +02:00
|
|
|
if (status == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) {
|
|
|
|
if (!elems.timeout_int ||
|
|
|
|
elems.timeout_int[0] != WLAN_TIMEOUT_ASSOC_COMEBACK) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "No valid Timeout Interval IE "
|
|
|
|
"with Assoc Comeback time in ReassocResp "
|
|
|
|
"(status=30) from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-21 20:24:20 +01:00
|
|
|
} else {
|
|
|
|
sta->counters[
|
|
|
|
WLANTEST_STA_COUNTER_REASSOCRESP_COMEBACK]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
if (status)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if ((aid & 0xc000) != 0xc000) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "Two MSBs of the AID were not set to 1 "
|
|
|
|
"in Reassociation Response from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
sta->aid = aid & 0xc000;
|
|
|
|
|
2020-05-23 20:11:33 +02:00
|
|
|
if (sta->state < STATE2 && !sta->ft_over_ds) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG,
|
|
|
|
"STA " MACSTR " was not in State 2 when "
|
|
|
|
"getting associated", MAC2STR(sta->addr));
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sta->state < STATE3) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 3 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-06 17:01:24 +01:00
|
|
|
sta->state = STATE3;
|
|
|
|
}
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
if (elems.ftie) {
|
|
|
|
struct wpa_ft_ies parse;
|
|
|
|
int use_sha384;
|
|
|
|
struct rsn_mdie *mde;
|
|
|
|
const u8 *anonce, *snonce, *fte_mic;
|
|
|
|
u8 fte_elem_count;
|
|
|
|
unsigned int count;
|
|
|
|
u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN];
|
|
|
|
size_t mic_len = 16;
|
|
|
|
const u8 *kck, *kek;
|
|
|
|
size_t kck_len, kek_len;
|
2023-08-25 19:15:22 +02:00
|
|
|
const u8 *aa, *spa;
|
|
|
|
struct wpabuf *extra = NULL, *rsne = NULL, *rsnxe = NULL;
|
|
|
|
|
|
|
|
if (ml) {
|
|
|
|
aa = bss->mld_mac_addr;
|
|
|
|
spa = sta->mld_mac_addr;
|
|
|
|
} else {
|
|
|
|
aa = bss->bssid;
|
|
|
|
spa = sta->addr;
|
|
|
|
}
|
2020-05-23 23:35:13 +02:00
|
|
|
|
|
|
|
use_sha384 = wpa_key_mgmt_sha384(sta->key_mgmt);
|
|
|
|
|
2023-08-08 12:32:32 +02:00
|
|
|
if (wpa_ft_parse_ies(ies, ies_len, &parse, sta->key_mgmt,
|
|
|
|
true) < 0) {
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Failed to parse FT IEs");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.rsn) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No RSNE in Reassoc Resp");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.rsn_pmkid) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No PMKID in RSNE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp_const(parse.rsn_pmkid, sta->pmk_r1_name,
|
|
|
|
WPA_PMK_NAME_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: PMKID in Reassoc Resp did not match PMKR1Name");
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
"FT: Received RSNE[PMKR1Name]",
|
|
|
|
parse.rsn_pmkid, WPA_PMK_NAME_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG,
|
|
|
|
"FT: Previously derived PMKR1Name",
|
|
|
|
sta->pmk_r1_name, WPA_PMK_NAME_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
mde = (struct rsn_mdie *) parse.mdie;
|
|
|
|
if (!mde || parse.mdie_len < sizeof(*mde) ||
|
|
|
|
os_memcmp(mde->mobility_domain, bss->mdid,
|
|
|
|
MOBILITY_DOMAIN_ID_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid MDE");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (use_sha384) {
|
|
|
|
struct rsn_ftie_sha384 *fte;
|
|
|
|
|
|
|
|
fte = (struct rsn_ftie_sha384 *) parse.ftie;
|
|
|
|
if (!fte || parse.ftie_len < sizeof(*fte)) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
anonce = fte->anonce;
|
|
|
|
snonce = fte->snonce;
|
|
|
|
fte_elem_count = fte->mic_control[1];
|
|
|
|
fte_mic = fte->mic;
|
|
|
|
} else {
|
|
|
|
struct rsn_ftie *fte;
|
|
|
|
|
|
|
|
fte = (struct rsn_ftie *) parse.ftie;
|
|
|
|
if (!fte || parse.ftie_len < sizeof(*fte)) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid FTIE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
anonce = fte->anonce;
|
|
|
|
snonce = fte->snonce;
|
|
|
|
fte_elem_count = fte->mic_control[1];
|
|
|
|
fte_mic = fte->mic;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp(snonce, sta->snonce, WPA_NONCE_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: SNonce mismatch in FTIE");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received SNonce",
|
|
|
|
snonce, WPA_NONCE_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Expected SNonce",
|
|
|
|
sta->snonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp(anonce, sta->anonce, WPA_NONCE_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: ANonce mismatch in FTIE");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Received ANonce",
|
|
|
|
anonce, WPA_NONCE_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: Expected ANonce",
|
|
|
|
sta->anonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.r0kh_id) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No R0KH-ID subelem in FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (parse.r0kh_id_len != bss->r0kh_id_len ||
|
|
|
|
os_memcmp_const(parse.r0kh_id, bss->r0kh_id,
|
|
|
|
parse.r0kh_id_len) != 0) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: R0KH-ID in FTE did not match the current R0KH-ID");
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: R0KH-ID in FTIE",
|
|
|
|
parse.r0kh_id, parse.r0kh_id_len);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT: The current R0KH-ID",
|
|
|
|
bss->r0kh_id, bss->r0kh_id_len);
|
|
|
|
os_memcpy(bss->r0kh_id, parse.r0kh_id,
|
|
|
|
parse.r0kh_id_len);
|
|
|
|
bss->r0kh_id_len = parse.r0kh_id_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!parse.r1kh_id) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: No R1KH-ID subelem in FTE");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp_const(parse.r1kh_id, bss->r1kh_id,
|
|
|
|
FT_R1KH_ID_LEN) != 0) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Unknown R1KH-ID used in ReassocResp");
|
|
|
|
os_memcpy(bss->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN);
|
|
|
|
}
|
|
|
|
|
2023-08-25 19:15:22 +02:00
|
|
|
count = 2; /* MDE and FTE */
|
|
|
|
if (ml) {
|
|
|
|
int link_id;
|
|
|
|
struct wlantest_bss *l_bss;
|
2023-08-31 23:03:16 +02:00
|
|
|
u8 rsne_buf[257];
|
|
|
|
size_t rsne_len;
|
2023-08-25 19:15:22 +02:00
|
|
|
|
|
|
|
extra = wpabuf_alloc(MAX_NUM_MLO_LINKS * ETH_ALEN);
|
|
|
|
rsne = wpabuf_alloc(MAX_NUM_MLO_LINKS * 256);
|
|
|
|
rsnxe = wpabuf_alloc(MAX_NUM_MLO_LINKS * 256);
|
|
|
|
if (!extra || !rsne || !rsnxe)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
for (link_id = 0; link_id < MAX_NUM_MLO_LINKS;
|
|
|
|
link_id++) {
|
2023-08-31 23:03:16 +02:00
|
|
|
struct wpa_ie_data ie_data;
|
|
|
|
|
2023-08-25 19:15:22 +02:00
|
|
|
if (is_zero_ether_addr(sta->link_addr[link_id]))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
l_bss = bss_find_mld(wt, bss->mld_mac_addr,
|
|
|
|
link_id);
|
|
|
|
if (!l_bss) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: No BSS entry found for AP MLD "
|
|
|
|
MACSTR " link ID %u",
|
|
|
|
MAC2STR(bss->mld_mac_addr),
|
|
|
|
link_id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2023-08-31 23:03:16 +02:00
|
|
|
/* Insert PMKID=PMKR1Name into each RSNE */
|
|
|
|
rsne_len = 2 + l_bss->rsnie[1];
|
|
|
|
if (wpa_parse_wpa_ie_rsn(l_bss->rsnie,
|
|
|
|
rsne_len, &ie_data) <
|
|
|
|
0 ||
|
|
|
|
rsne_len > 200) {
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: Could not parse AP RSNE (or too long element) for link ID %u ",
|
|
|
|
link_id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memcpy(rsne_buf, l_bss->rsnie, rsne_len);
|
|
|
|
if (wpa_insert_pmkid(rsne_buf, &rsne_len,
|
2024-02-03 19:13:46 +01:00
|
|
|
sta->pmk_r1_name,
|
|
|
|
true) < 0) {
|
2023-08-31 23:03:16 +02:00
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: Could not insert PMKR1Name into AP RSNE for link ID %u ",
|
|
|
|
link_id);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2023-08-25 19:15:22 +02:00
|
|
|
count++; /* RSNE */
|
2023-08-31 23:03:16 +02:00
|
|
|
wpabuf_put_data(rsne, rsne_buf, rsne_len);
|
2023-08-25 19:15:22 +02:00
|
|
|
|
|
|
|
if (l_bss->rsnxe_len) {
|
|
|
|
count++;
|
|
|
|
wpabuf_put_u8(rsnxe, WLAN_EID_RSNX);
|
|
|
|
wpabuf_put_u8(rsnxe, l_bss->rsnxe_len);
|
|
|
|
wpabuf_put_data(rsnxe,
|
|
|
|
l_bss->rsnxe,
|
|
|
|
l_bss->rsnxe_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpabuf_put_data(extra, l_bss->bssid, ETH_ALEN);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
count++; /* RSNE */
|
|
|
|
rsne = wpabuf_alloc_copy(parse.rsn - 2,
|
|
|
|
parse.rsn_len + 2);
|
|
|
|
if (!rsne)
|
|
|
|
goto out;
|
|
|
|
if (parse.rsnxe) {
|
|
|
|
count++;
|
|
|
|
rsnxe = wpabuf_alloc_copy(parse.rsnxe - 2,
|
|
|
|
parse.rsnxe_len + 2);
|
|
|
|
if (!rsnxe)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2020-05-23 23:35:13 +02:00
|
|
|
if (parse.ric)
|
|
|
|
count += ieee802_11_ie_count(parse.ric, parse.ric_len);
|
|
|
|
if (fte_elem_count != count) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: Unexpected IE count in MIC Control: received %u expected %u",
|
|
|
|
fte_elem_count, count);
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (wpa_key_mgmt_fils(sta->key_mgmt)) {
|
|
|
|
kck = sta->ptk.kck2;
|
|
|
|
kck_len = sta->ptk.kck2_len;
|
|
|
|
kek = sta->ptk.kek2;
|
|
|
|
kek_len = sta->ptk.kek2_len;
|
|
|
|
} else {
|
|
|
|
kck = sta->ptk.kck;
|
|
|
|
kck_len = sta->ptk.kck_len;
|
|
|
|
kek = sta->ptk.kek;
|
|
|
|
kek_len = sta->ptk.kek_len;
|
|
|
|
}
|
2023-08-25 19:15:22 +02:00
|
|
|
|
|
|
|
/* FTE might be fragmented. If it is, the separate Fragment
|
|
|
|
* elements are included in MIC calculation as full elements. */
|
2022-10-16 15:38:27 +02:00
|
|
|
if (wpa_ft_mic(sta->key_mgmt, kck, kck_len,
|
2023-08-25 19:15:22 +02:00
|
|
|
spa, aa, 6,
|
2020-05-23 23:35:13 +02:00
|
|
|
parse.mdie - 2, parse.mdie_len + 2,
|
2023-08-25 19:15:22 +02:00
|
|
|
elems.ftie - 2, elems.fte_defrag_len + 2,
|
|
|
|
wpabuf_head(rsne), wpabuf_len(rsne),
|
2020-05-23 23:35:13 +02:00
|
|
|
parse.ric, parse.ric_len,
|
2023-08-25 19:15:22 +02:00
|
|
|
rsnxe ? wpabuf_head(rsnxe) : NULL,
|
|
|
|
rsnxe ? wpabuf_len(rsnxe) : 0,
|
|
|
|
extra,
|
2020-05-23 23:35:13 +02:00
|
|
|
mic) < 0) {
|
|
|
|
add_note(wt, MSG_INFO, "FT: Failed to calculate MIC");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (os_memcmp_const(mic, fte_mic, mic_len) != 0) {
|
2023-08-25 19:15:22 +02:00
|
|
|
int link_id;
|
|
|
|
|
2020-05-23 23:35:13 +02:00
|
|
|
add_note(wt, MSG_INFO, "FT: Invalid MIC in FTE");
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: addr=" MACSTR " auth_addr=" MACSTR,
|
2023-08-25 19:15:22 +02:00
|
|
|
MAC2STR(spa), MAC2STR(aa));
|
2020-05-23 23:35:13 +02:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: Received MIC",
|
|
|
|
fte_mic, mic_len);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: Calculated MIC",
|
|
|
|
mic, mic_len);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: MDE",
|
|
|
|
parse.mdie - 2, parse.mdie_len + 2);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "FT: FTE",
|
2023-08-25 19:15:22 +02:00
|
|
|
elems.ftie - 2, elems.fte_defrag_len + 2);
|
|
|
|
wpa_hexdump_buf(MSG_MSGDUMP, "FT: RSNE", rsne);
|
|
|
|
wpa_hexdump_buf(MSG_MSGDUMP, "FT: RSNXE", rsnxe);
|
|
|
|
for (link_id = 0; link_id < MAX_NUM_MLO_LINKS;
|
|
|
|
link_id++) {
|
|
|
|
struct wlantest_bss *l_bss;
|
|
|
|
|
|
|
|
if (is_zero_ether_addr(sta->link_addr[link_id]))
|
|
|
|
continue;
|
|
|
|
l_bss = bss_find_mld(wt, bss->mld_mac_addr,
|
|
|
|
link_id);
|
|
|
|
if (l_bss)
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"FT: AP link %d address: "
|
|
|
|
MACSTR, link_id,
|
|
|
|
MAC2STR(l_bss->bssid));
|
|
|
|
}
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
add_note(wt, MSG_INFO, "FT: Valid FTE MIC");
|
|
|
|
|
|
|
|
if (wpa_compare_rsn_ie(wpa_key_mgmt_ft(sta->key_mgmt),
|
|
|
|
bss->rsnie, 2 + bss->rsnie[1],
|
|
|
|
parse.rsn - 2, parse.rsn_len + 2)) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"FT: RSNE mismatch between Beacon/ProbeResp and FT protocol Reassociation Response frame");
|
|
|
|
wpa_hexdump(MSG_INFO, "RSNE in Beacon/ProbeResp",
|
|
|
|
&bss->rsnie[2], bss->rsnie[1]);
|
|
|
|
wpa_hexdump(MSG_INFO,
|
|
|
|
"RSNE in FT protocol Reassociation Response frame",
|
|
|
|
parse.rsn ? parse.rsn - 2 : NULL,
|
|
|
|
parse.rsn ? parse.rsn_len + 2 : 0);
|
|
|
|
}
|
|
|
|
|
2023-09-01 10:51:47 +02:00
|
|
|
if (ml)
|
|
|
|
process_fte_group_keys_mlo(wt, bss, sta, kek, kek_len,
|
|
|
|
&parse);
|
|
|
|
else
|
|
|
|
process_fte_group_keys(wt, bss, sta, kek, kek_len,
|
|
|
|
&parse);
|
2023-08-25 18:34:44 +02:00
|
|
|
|
|
|
|
out:
|
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2023-08-25 19:15:22 +02:00
|
|
|
wpabuf_free(rsne);
|
|
|
|
wpabuf_free(rsnxe);
|
|
|
|
wpabuf_free(extra);
|
2020-05-23 23:35:13 +02:00
|
|
|
}
|
2023-08-08 09:30:10 +02:00
|
|
|
|
|
|
|
if (elems.owe_dh && elems.owe_dh_len >= 2) {
|
|
|
|
sta->owe_group = WPA_GET_LE16(elems.owe_dh);
|
|
|
|
wpa_printf(MSG_DEBUG, "OWE using group %u", sta->owe_group);
|
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
static void disassoc_all_stas(struct wlantest *wt, struct wlantest_bss *bss)
|
2010-11-23 13:37:21 +01:00
|
|
|
{
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
dl_list_for_each(sta, &bss->sta, struct wlantest_sta, list) {
|
|
|
|
if (sta->state <= STATE2)
|
|
|
|
continue;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 2 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-23 13:37:21 +01:00
|
|
|
sta->state = STATE2;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-11 19:46:15 +01:00
|
|
|
static void rx_mgmt_disassoc(struct wlantest *wt, const u8 *data, size_t len,
|
|
|
|
int valid)
|
2010-11-06 17:01:24 +01:00
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
2011-10-25 23:06:06 +02:00
|
|
|
u16 fc, reason;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2010-11-06 17:01:24 +01:00
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
|
|
|
|
if (len < 24 + 2) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short Disassociation frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-06 17:01:24 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-10-25 23:06:06 +02:00
|
|
|
reason = le_to_host16(mgmt->u.disassoc.reason_code);
|
2010-11-06 17:01:24 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "DISASSOC " MACSTR " -> " MACSTR
|
2010-11-23 12:16:23 +01:00
|
|
|
" (reason=%u) (valid=%d)",
|
2010-11-06 17:01:24 +01:00
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da),
|
2011-10-25 23:06:06 +02:00
|
|
|
reason, valid);
|
2010-11-11 19:46:15 +01:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "DISASSOC payload", data + 24, len - 24);
|
|
|
|
|
2010-11-23 13:37:21 +01:00
|
|
|
if (sta == NULL) {
|
|
|
|
if (valid && mgmt->da[0] == 0xff)
|
2013-05-26 19:58:50 +02:00
|
|
|
disassoc_all_stas(wt, bss);
|
2010-11-23 12:16:23 +01:00
|
|
|
return;
|
2010-11-23 13:37:21 +01:00
|
|
|
}
|
2010-11-23 12:16:23 +01:00
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid)) {
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DISASSOC_RX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DISASSOC_RX]++;
|
2011-01-07 15:52:56 +01:00
|
|
|
if (sta->pwrmgt && !sta->pspoll)
|
|
|
|
sta->counters[
|
|
|
|
WLANTEST_STA_COUNTER_DISASSOC_RX_ASLEEP]++;
|
|
|
|
else
|
|
|
|
sta->counters[
|
|
|
|
WLANTEST_STA_COUNTER_DISASSOC_RX_AWAKE]++;
|
2011-10-25 23:06:06 +02:00
|
|
|
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
if (!(fc & WLAN_FC_ISWEP) && reason == 6)
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DISASSOC_RX_RC6]++;
|
|
|
|
else if (!(fc & WLAN_FC_ISWEP) && reason == 7)
|
|
|
|
sta->counters[WLANTEST_STA_COUNTER_DISASSOC_RX_RC7]++;
|
2011-01-07 15:52:56 +01:00
|
|
|
} else
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[valid ? WLANTEST_STA_COUNTER_VALID_DISASSOC_TX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DISASSOC_TX]++;
|
|
|
|
|
2010-11-11 19:46:15 +01:00
|
|
|
if (!valid) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Do not change STA " MACSTR " State "
|
|
|
|
"since Disassociation frame was not protected "
|
|
|
|
"correctly", MAC2STR(sta->addr));
|
2010-11-11 19:46:15 +01:00
|
|
|
return;
|
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
if (sta->state < STATE2) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG,
|
|
|
|
"STA " MACSTR " was not in State 2 or 3 "
|
|
|
|
"when getting disassociated", MAC2STR(sta->addr));
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (sta->state > STATE2) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "STA " MACSTR
|
|
|
|
" moved to State 2 with " MACSTR,
|
|
|
|
MAC2STR(sta->addr), MAC2STR(bss->bssid));
|
2010-11-06 17:01:24 +01:00
|
|
|
sta->state = STATE2;
|
|
|
|
}
|
2013-05-26 19:58:50 +02:00
|
|
|
tdls_link_down(wt, bss, sta);
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-08-22 21:14:47 +02:00
|
|
|
static void rx_mgmt_action_ft_request(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
const u8 *ies;
|
|
|
|
size_t ies_len;
|
|
|
|
struct wpa_ft_ies parse;
|
2023-08-14 17:25:08 +02:00
|
|
|
const u8 *spa, *aa;
|
2023-08-14 17:25:08 +02:00
|
|
|
struct wlantest_bss *bss, *bss2;
|
2019-08-22 21:14:47 +02:00
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
if (len < 24 + 2 + 2 * ETH_ALEN) {
|
|
|
|
add_note(wt, MSG_INFO, "Too short FT Request frame");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-14 17:25:08 +02:00
|
|
|
spa = mgmt->u.action.u.ft_action_resp.sta_addr;
|
|
|
|
aa = mgmt->u.action.u.ft_action_resp.target_ap_addr;
|
2019-08-22 21:14:47 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "FT Request: STA Address: " MACSTR
|
|
|
|
" Target AP Address: " MACSTR,
|
2023-08-14 17:25:08 +02:00
|
|
|
MAC2STR(spa), MAC2STR(aa));
|
2019-08-22 21:14:47 +02:00
|
|
|
ies = mgmt->u.action.u.ft_action_req.variable;
|
|
|
|
ies_len = len - (24 + 2 + 2 * ETH_ALEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT Request frame body", ies, ies_len);
|
|
|
|
|
2023-08-08 12:32:32 +02:00
|
|
|
if (wpa_ft_parse_ies(ies, ies_len, &parse, 0, false)) {
|
2019-08-22 21:14:47 +02:00
|
|
|
add_note(wt, MSG_INFO, "Could not parse FT Request frame body");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-14 17:25:08 +02:00
|
|
|
bss = bss_find(wt, aa);
|
2023-08-25 10:19:24 +02:00
|
|
|
bss2 = bss_find_mld(wt, aa, -1);
|
2023-08-14 17:25:08 +02:00
|
|
|
if (!bss)
|
|
|
|
bss = bss2;
|
|
|
|
if (bss && bss2 && bss != bss2 && !sta_find(bss, spa))
|
|
|
|
bss = bss2;
|
|
|
|
if (!bss)
|
|
|
|
bss = bss_get(wt, aa);
|
2019-08-22 21:14:47 +02:00
|
|
|
if (!bss) {
|
|
|
|
add_note(wt, MSG_INFO, "No BSS entry for Target AP");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
2023-08-24 15:57:40 +02:00
|
|
|
sta = sta_find_mlo(wt, bss, spa);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, spa);
|
2019-08-22 21:14:47 +02:00
|
|
|
if (!sta)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2020-05-23 20:11:33 +02:00
|
|
|
sta->ft_over_ds = true;
|
2019-08-22 21:14:47 +02:00
|
|
|
sta->key_mgmt = parse.key_mgmt;
|
|
|
|
sta->pairwise_cipher = parse.pairwise_cipher;
|
2023-08-25 18:34:44 +02:00
|
|
|
out:
|
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_action_ft_response(struct wlantest *wt,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len)
|
|
|
|
{
|
2023-08-10 10:42:06 +02:00
|
|
|
struct wlantest_bss *bss, *bss2;
|
2019-08-22 21:14:47 +02:00
|
|
|
struct wlantest_sta *new_sta;
|
2023-08-14 17:25:08 +02:00
|
|
|
const u8 *spa, *aa;
|
2019-08-22 21:14:47 +02:00
|
|
|
const u8 *ies;
|
|
|
|
size_t ies_len;
|
|
|
|
struct wpa_ft_ies parse;
|
|
|
|
struct wpa_ptk ptk;
|
|
|
|
u8 ptk_name[WPA_PMK_NAME_LEN];
|
|
|
|
|
|
|
|
if (len < 24 + 2 + 2 * ETH_ALEN + 2) {
|
|
|
|
add_note(wt, MSG_INFO, "Too short FT Response frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-14 17:25:08 +02:00
|
|
|
spa = mgmt->u.action.u.ft_action_resp.sta_addr;
|
|
|
|
aa = mgmt->u.action.u.ft_action_resp.target_ap_addr;
|
2019-08-22 21:14:47 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "FT Response: STA Address: " MACSTR
|
|
|
|
" Target AP Address: " MACSTR " Status Code: %u",
|
2023-08-14 17:25:08 +02:00
|
|
|
MAC2STR(spa), MAC2STR(aa),
|
2019-08-22 21:14:47 +02:00
|
|
|
le_to_host16(mgmt->u.action.u.ft_action_resp.status_code));
|
|
|
|
ies = mgmt->u.action.u.ft_action_req.variable;
|
|
|
|
ies_len = len - (24 + 2 + 2 * ETH_ALEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "FT Response frame body", ies, ies_len);
|
|
|
|
|
2023-08-08 12:32:32 +02:00
|
|
|
if (wpa_ft_parse_ies(ies, ies_len, &parse, 0, false)) {
|
2019-08-22 21:14:47 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Could not parse FT Response frame body");
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2023-08-14 17:25:08 +02:00
|
|
|
bss = bss_find(wt, aa);
|
2023-08-25 10:19:24 +02:00
|
|
|
bss2 = bss_find_mld(wt, aa, -1);
|
2023-08-10 10:42:06 +02:00
|
|
|
if (!bss)
|
|
|
|
bss = bss2;
|
2023-08-14 17:25:08 +02:00
|
|
|
if (bss && bss2 && bss != bss2 && !sta_find(bss, spa))
|
2023-08-10 10:42:06 +02:00
|
|
|
bss = bss2;
|
|
|
|
if (!bss)
|
2023-08-14 17:25:08 +02:00
|
|
|
bss = bss_get(wt, aa);
|
2023-08-10 10:42:06 +02:00
|
|
|
|
2019-08-22 21:14:47 +02:00
|
|
|
if (!bss) {
|
|
|
|
add_note(wt, MSG_INFO, "No BSS entry for Target AP");
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if (parse.r1kh_id)
|
|
|
|
os_memcpy(bss->r1kh_id, parse.r1kh_id, FT_R1KH_ID_LEN);
|
|
|
|
|
2020-05-23 20:24:01 +02:00
|
|
|
if (wpa_derive_pmk_r1(sta->pmk_r0, sta->pmk_r0_len, sta->pmk_r0_name,
|
2023-08-14 17:25:08 +02:00
|
|
|
bss->r1kh_id, spa, sta->pmk_r1,
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_name) < 0)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_len = sta->pmk_r0_len;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2023-08-24 15:57:40 +02:00
|
|
|
new_sta = sta_find_mlo(wt, bss, spa);
|
|
|
|
if (!new_sta)
|
|
|
|
new_sta = sta_get(bss, spa);
|
2019-08-22 21:14:47 +02:00
|
|
|
if (!new_sta)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2020-05-23 20:24:01 +02:00
|
|
|
os_memcpy(new_sta->pmk_r0, sta->pmk_r0, sta->pmk_r0_len);
|
|
|
|
new_sta->pmk_r0_len = sta->pmk_r0_len;
|
2019-08-22 21:14:47 +02:00
|
|
|
os_memcpy(new_sta->pmk_r0_name, sta->pmk_r0_name,
|
|
|
|
sizeof(sta->pmk_r0_name));
|
2020-05-23 20:43:36 +02:00
|
|
|
os_memcpy(new_sta->pmk_r1, sta->pmk_r1, sta->pmk_r1_len);
|
|
|
|
new_sta->pmk_r1_len = sta->pmk_r1_len;
|
|
|
|
os_memcpy(new_sta->pmk_r1_name, sta->pmk_r1_name,
|
|
|
|
sizeof(sta->pmk_r1_name));
|
2019-08-22 21:14:47 +02:00
|
|
|
if (!parse.fte_anonce || !parse.fte_snonce ||
|
2020-05-23 20:43:36 +02:00
|
|
|
wpa_pmk_r1_to_ptk(sta->pmk_r1, sta->pmk_r1_len, parse.fte_snonce,
|
2023-08-14 17:25:08 +02:00
|
|
|
parse.fte_anonce, spa, aa,
|
2020-05-23 20:43:36 +02:00
|
|
|
sta->pmk_r1_name, &ptk, ptk_name,
|
2020-12-16 12:00:18 +01:00
|
|
|
new_sta->key_mgmt, new_sta->pairwise_cipher,
|
|
|
|
0) < 0)
|
2023-08-25 18:34:44 +02:00
|
|
|
goto out;
|
2019-08-22 21:14:47 +02:00
|
|
|
|
2022-11-09 21:39:01 +01:00
|
|
|
sta_new_ptk(wt, new_sta, &ptk);
|
2020-05-23 20:44:16 +02:00
|
|
|
os_memcpy(new_sta->snonce, parse.fte_snonce, WPA_NONCE_LEN);
|
|
|
|
os_memcpy(new_sta->anonce, parse.fte_anonce, WPA_NONCE_LEN);
|
2023-08-25 18:34:44 +02:00
|
|
|
out:
|
|
|
|
wpa_ft_parse_ies_free(&parse);
|
2019-08-22 21:14:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_action_ft(struct wlantest *wt, struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, int valid)
|
|
|
|
{
|
|
|
|
if (len < 24 + 2) {
|
|
|
|
add_note(wt, MSG_INFO, "Too short FT Action frame from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (mgmt->u.action.u.ft_action_req.action) {
|
|
|
|
case 1:
|
|
|
|
rx_mgmt_action_ft_request(wt, mgmt, len);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
rx_mgmt_action_ft_response(wt, sta, mgmt, len);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
add_note(wt, MSG_INFO, "Unsupported FT action value %u from "
|
|
|
|
MACSTR, mgmt->u.action.u.ft_action_req.action,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-18 18:05:29 +01:00
|
|
|
static void rx_mgmt_action_sa_query_req(struct wlantest *wt,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, int valid)
|
|
|
|
{
|
|
|
|
const u8 *rx_id;
|
|
|
|
u8 *id;
|
|
|
|
|
|
|
|
rx_id = (const u8 *) mgmt->u.action.u.sa_query_req.trans_id;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2010-11-18 18:05:29 +01:00
|
|
|
id = sta->ap_sa_query_tr;
|
|
|
|
else
|
|
|
|
id = sta->sta_sa_query_tr;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "SA Query Request " MACSTR " -> " MACSTR
|
|
|
|
" (trans_id=%02x%02x)%s",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), rx_id[0], rx_id[1],
|
|
|
|
valid ? "" : " (invalid protection)");
|
2010-11-18 18:05:29 +01:00
|
|
|
os_memcpy(id, mgmt->u.action.u.sa_query_req.trans_id, 2);
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, sta->addr))
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[valid ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_SAQUERYREQ_TX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_SAQUERYREQ_TX]++;
|
|
|
|
else
|
|
|
|
sta->counters[valid ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_SAQUERYREQ_RX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_SAQUERYREQ_RX]++;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_action_sa_query_resp(struct wlantest *wt,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, int valid)
|
|
|
|
{
|
|
|
|
const u8 *rx_id;
|
|
|
|
u8 *id;
|
|
|
|
int match;
|
|
|
|
|
|
|
|
rx_id = (const u8 *) mgmt->u.action.u.sa_query_resp.trans_id;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2010-11-18 18:05:29 +01:00
|
|
|
id = sta->sta_sa_query_tr;
|
|
|
|
else
|
|
|
|
id = sta->ap_sa_query_tr;
|
|
|
|
match = os_memcmp(rx_id, id, 2) == 0;
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "SA Query Response " MACSTR " -> " MACSTR
|
|
|
|
" (trans_id=%02x%02x; %s)%s",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), rx_id[0], rx_id[1],
|
|
|
|
match ? "match" : "mismatch",
|
|
|
|
valid ? "" : " (invalid protection)");
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, sta->addr))
|
2010-11-18 18:05:29 +01:00
|
|
|
sta->counters[(valid && match) ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_SAQUERYRESP_TX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_SAQUERYRESP_TX]++;
|
|
|
|
else
|
|
|
|
sta->counters[(valid && match) ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_SAQUERYRESP_RX :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_SAQUERYRESP_RX]++;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-11 20:34:06 +01:00
|
|
|
static void rx_mgmt_action_sa_query(struct wlantest *wt,
|
|
|
|
struct wlantest_sta *sta,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
2010-11-12 22:17:20 +01:00
|
|
|
size_t len, int valid)
|
2010-11-11 20:34:06 +01:00
|
|
|
{
|
|
|
|
if (len < 24 + 2 + WLAN_SA_QUERY_TR_ID_LEN) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Too short SA Query frame from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-11 20:34:06 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len > 24 + 2 + WLAN_SA_QUERY_TR_ID_LEN) {
|
|
|
|
size_t elen = len - (24 + 2 + WLAN_SA_QUERY_TR_ID_LEN);
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Unexpected %u octets of extra data at "
|
|
|
|
"the end of SA Query frame from " MACSTR,
|
|
|
|
(unsigned) elen, MAC2STR(mgmt->sa));
|
2010-11-11 20:34:06 +01:00
|
|
|
wpa_hexdump(MSG_INFO, "SA Query extra data",
|
|
|
|
((const u8 *) mgmt) + len - elen, elen);
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (mgmt->u.action.u.sa_query_req.action) {
|
|
|
|
case WLAN_SA_QUERY_REQUEST:
|
2010-11-18 18:05:29 +01:00
|
|
|
rx_mgmt_action_sa_query_req(wt, sta, mgmt, len, valid);
|
2010-11-11 20:34:06 +01:00
|
|
|
break;
|
|
|
|
case WLAN_SA_QUERY_RESPONSE:
|
2010-11-18 18:05:29 +01:00
|
|
|
rx_mgmt_action_sa_query_resp(wt, sta, mgmt, len, valid);
|
2010-11-11 20:34:06 +01:00
|
|
|
break;
|
|
|
|
default:
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Unexpected SA Query action value %u "
|
|
|
|
"from " MACSTR,
|
|
|
|
mgmt->u.action.u.sa_query_req.action,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-11 20:34:06 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2021-02-07 12:11:34 +01:00
|
|
|
static void
|
|
|
|
rx_mgmt_location_measurement_report(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
const u8 *pos = mgmt->u.action.u.public_action.variable;
|
|
|
|
const u8 *end = ((const u8 *) mgmt) + len;
|
|
|
|
|
|
|
|
if (end - pos < 1) {
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Too short Location Measurement Report frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Location Measurement Report " MACSTR " --> "
|
|
|
|
MACSTR " (dialog token %u)",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), *pos);
|
|
|
|
pos++;
|
|
|
|
|
|
|
|
if (!no_ack)
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Protected Fine Timing Measurement Report incorrectly as an Action frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "Location Measurement Report contents",
|
|
|
|
pos, end - pos);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_action_no_bss_public(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
switch (mgmt->u.action.u.public_action.action) {
|
|
|
|
case WLAN_PA_LOCATION_MEASUREMENT_REPORT:
|
|
|
|
rx_mgmt_location_measurement_report(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_prot_ftm_request(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "Protected Fine Timing Measurement Request "
|
|
|
|
MACSTR " --> " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
|
|
|
if (no_ack)
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Protected Fine Timing Measurement Request incorrectly as an Action No Ack frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_prot_ftm(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "Protected Fine Timing Measurement "
|
|
|
|
MACSTR " --> " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
|
|
|
if (no_ack)
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Protected Fine Timing Measurement incorrectly as an Action No Ack frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_prot_ftm_report(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "Protected Fine Timing Measurement Report "
|
|
|
|
MACSTR " --> " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
|
|
|
if (!no_ack)
|
|
|
|
add_note(wt, MSG_INFO,
|
|
|
|
"Protected Fine Timing Measurement Report incorrectly as an Action frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void
|
|
|
|
rx_mgmt_action_no_bss_protected_ftm(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt,
|
|
|
|
size_t len, bool no_ack)
|
|
|
|
{
|
|
|
|
switch (mgmt->u.action.u.public_action.action) {
|
|
|
|
case WLAN_PROT_FTM_REQUEST:
|
|
|
|
rx_mgmt_prot_ftm_request(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
case WLAN_PROT_FTM:
|
|
|
|
rx_mgmt_prot_ftm(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
case WLAN_PROT_FTM_REPORT:
|
|
|
|
rx_mgmt_prot_ftm_report(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_action_no_bss(struct wlantest *wt,
|
|
|
|
const struct ieee80211_mgmt *mgmt, size_t len,
|
|
|
|
bool no_ack)
|
|
|
|
{
|
|
|
|
switch (mgmt->u.action.category) {
|
|
|
|
case WLAN_ACTION_PUBLIC:
|
|
|
|
rx_mgmt_action_no_bss_public(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
case WLAN_ACTION_PROTECTED_FTM:
|
|
|
|
rx_mgmt_action_no_bss_protected_ftm(wt, mgmt, len, no_ack);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-12 22:17:20 +01:00
|
|
|
static void rx_mgmt_action(struct wlantest *wt, const u8 *data, size_t len,
|
2021-02-07 12:11:34 +01:00
|
|
|
int valid, bool no_ack)
|
2010-11-11 20:34:06 +01:00
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
2010-11-13 12:18:09 +01:00
|
|
|
if (mgmt->da[0] & 0x01) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "Group addressed Action frame: DA="
|
|
|
|
MACSTR " SA=" MACSTR " BSSID=" MACSTR
|
|
|
|
" category=%u",
|
|
|
|
MAC2STR(mgmt->da), MAC2STR(mgmt->sa),
|
|
|
|
MAC2STR(mgmt->bssid), mgmt->u.action.category);
|
2010-11-11 20:34:06 +01:00
|
|
|
return; /* Ignore group addressed Action frames for now */
|
2010-11-13 12:18:09 +01:00
|
|
|
}
|
2021-02-07 12:11:34 +01:00
|
|
|
|
|
|
|
if (len < 24 + 2) {
|
|
|
|
add_note(wt, MSG_INFO, "Too short Action frame from " MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "ACTION%s " MACSTR " -> " MACSTR
|
|
|
|
" BSSID=" MACSTR " (category=%u) (valid=%d)",
|
|
|
|
no_ack ? "-NO-ACK" : "",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da), MAC2STR(mgmt->bssid),
|
|
|
|
mgmt->u.action.category, valid);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "ACTION payload", data + 24, len - 24);
|
|
|
|
|
|
|
|
if (is_broadcast_ether_addr(mgmt->bssid)) {
|
|
|
|
rx_mgmt_action_no_bss(wt, mgmt, len, no_ack);
|
|
|
|
return;
|
|
|
|
}
|
2010-11-11 20:34:06 +01:00
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid)) {
|
2022-09-29 12:08:37 +02:00
|
|
|
sta = sta_find_mlo(wt, bss, mgmt->da);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
} else {
|
|
|
|
sta = sta_find_mlo(wt, bss, mgmt->sa);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
}
|
2010-11-11 20:34:06 +01:00
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (mgmt->u.action.category != WLAN_ACTION_PUBLIC &&
|
|
|
|
sta->state < STATE3) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Action frame sent when STA is not in "
|
|
|
|
"State 3 (SA=" MACSTR " DATA=" MACSTR ")",
|
|
|
|
MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
2010-11-11 20:34:06 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
switch (mgmt->u.action.category) {
|
2019-08-22 21:14:47 +02:00
|
|
|
case WLAN_ACTION_FT:
|
|
|
|
rx_mgmt_action_ft(wt, sta, mgmt, len, valid);
|
|
|
|
break;
|
2010-11-11 20:34:06 +01:00
|
|
|
case WLAN_ACTION_SA_QUERY:
|
2010-11-12 22:17:20 +01:00
|
|
|
rx_mgmt_action_sa_query(wt, sta, mgmt, len, valid);
|
2010-11-11 20:34:06 +01:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-01-24 11:21:49 +01:00
|
|
|
static int check_mmie_mic(unsigned int mgmt_group_cipher,
|
|
|
|
const u8 *igtk, size_t igtk_len,
|
2015-01-23 16:24:24 +01:00
|
|
|
const u8 *data, size_t len)
|
2010-11-10 01:06:59 +01:00
|
|
|
{
|
|
|
|
u8 *buf;
|
|
|
|
u8 mic[16];
|
|
|
|
u16 fc;
|
|
|
|
const struct ieee80211_hdr *hdr;
|
2015-01-23 16:24:24 +01:00
|
|
|
int ret, mic_len;
|
|
|
|
|
2015-01-24 11:21:49 +01:00
|
|
|
if (!mgmt_group_cipher || igtk_len < 16)
|
2015-01-23 16:24:24 +01:00
|
|
|
return -1;
|
2015-01-24 11:21:49 +01:00
|
|
|
mic_len = mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC ? 8 : 16;
|
2015-01-23 16:24:24 +01:00
|
|
|
|
|
|
|
if (len < 24 || len - 24 < mic_len)
|
|
|
|
return -1;
|
2010-11-10 01:06:59 +01:00
|
|
|
|
|
|
|
buf = os_malloc(len + 20 - 24);
|
|
|
|
if (buf == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* BIP AAD: FC(masked) A1 A2 A3 */
|
|
|
|
hdr = (const struct ieee80211_hdr *) data;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
fc &= ~(WLAN_FC_RETRY | WLAN_FC_PWRMGT | WLAN_FC_MOREDATA);
|
|
|
|
WPA_PUT_LE16(buf, fc);
|
|
|
|
os_memcpy(buf + 2, hdr->addr1, 3 * ETH_ALEN);
|
|
|
|
|
|
|
|
/* Frame body with MMIE MIC masked to zero */
|
2015-01-23 16:24:24 +01:00
|
|
|
os_memcpy(buf + 20, data + 24, len - 24 - mic_len);
|
|
|
|
os_memset(buf + 20 + len - 24 - mic_len, 0, mic_len);
|
2010-11-10 01:06:59 +01:00
|
|
|
|
2020-02-21 18:40:32 +01:00
|
|
|
if (WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_BEACON) {
|
|
|
|
/* Timestamp field masked to zero */
|
|
|
|
os_memset(buf + 20, 0, 8);
|
|
|
|
}
|
|
|
|
|
2010-11-10 01:06:59 +01:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "BIP: AAD|Body(masked)", buf, len + 20 - 24);
|
|
|
|
/* MIC = L(AES-128-CMAC(AAD || Frame Body(masked)), 0, 64) */
|
2015-01-24 11:21:49 +01:00
|
|
|
if (mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC) {
|
2015-01-23 16:24:24 +01:00
|
|
|
ret = omac1_aes_128(igtk, buf, len + 20 - 24, mic);
|
2015-01-24 11:21:49 +01:00
|
|
|
} else if (mgmt_group_cipher == WPA_CIPHER_BIP_CMAC_256) {
|
|
|
|
ret = omac1_aes_256(igtk, buf, len + 20 - 24, mic);
|
|
|
|
} else if (mgmt_group_cipher == WPA_CIPHER_BIP_GMAC_128 ||
|
|
|
|
mgmt_group_cipher == WPA_CIPHER_BIP_GMAC_256) {
|
|
|
|
u8 nonce[12], *npos;
|
|
|
|
const u8 *ipn;
|
|
|
|
|
|
|
|
ipn = data + len - mic_len - 6;
|
|
|
|
|
|
|
|
/* Nonce: A2 | IPN */
|
|
|
|
os_memcpy(nonce, hdr->addr2, ETH_ALEN);
|
|
|
|
npos = nonce + ETH_ALEN;
|
|
|
|
*npos++ = ipn[5];
|
|
|
|
*npos++ = ipn[4];
|
|
|
|
*npos++ = ipn[3];
|
|
|
|
*npos++ = ipn[2];
|
|
|
|
*npos++ = ipn[1];
|
|
|
|
*npos++ = ipn[0];
|
|
|
|
|
|
|
|
ret = aes_gmac(igtk, igtk_len, nonce, sizeof(nonce),
|
|
|
|
buf, len + 20 - 24, mic);
|
|
|
|
} else {
|
|
|
|
ret = -1;
|
|
|
|
}
|
2015-01-23 16:24:24 +01:00
|
|
|
if (ret < 0) {
|
2010-11-10 01:06:59 +01:00
|
|
|
os_free(buf);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(buf);
|
|
|
|
|
2015-01-23 16:24:24 +01:00
|
|
|
if (os_memcmp(data + len - mic_len, mic, mic_len) != 0)
|
2010-11-10 01:06:59 +01:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int check_bip(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
u16 fc, stype;
|
|
|
|
const u8 *mmie;
|
2010-11-13 12:14:09 +01:00
|
|
|
u16 keyid;
|
2010-11-10 01:06:59 +01:00
|
|
|
struct wlantest_bss *bss;
|
2015-01-23 16:24:24 +01:00
|
|
|
size_t mic_len;
|
2010-11-10 01:06:59 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
|
2021-02-07 11:00:12 +01:00
|
|
|
if (stype == WLAN_FC_STYPE_ACTION ||
|
|
|
|
stype == WLAN_FC_STYPE_ACTION_NO_ACK) {
|
2010-11-10 01:06:59 +01:00
|
|
|
if (len < 24 + 1)
|
|
|
|
return 0;
|
|
|
|
if (mgmt->u.action.category == WLAN_ACTION_PUBLIC)
|
|
|
|
return 0; /* Not a robust management frame */
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return 0; /* No key known yet */
|
|
|
|
|
2015-01-24 11:21:49 +01:00
|
|
|
mic_len = bss->mgmt_group_cipher == WPA_CIPHER_AES_128_CMAC ? 8 : 16;
|
2015-01-23 16:24:24 +01:00
|
|
|
|
|
|
|
if (len < 24 + 10 + mic_len ||
|
|
|
|
data[len - (10 + mic_len)] != WLAN_EID_MMIE ||
|
|
|
|
data[len - (10 + mic_len - 1)] != 8 + mic_len) {
|
2010-11-10 01:06:59 +01:00
|
|
|
/* No MMIE */
|
2010-11-12 22:01:56 +01:00
|
|
|
if (bss->rsn_capab & WPA_CAPABILITY_MFPC) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Robust group-addressed "
|
|
|
|
"management frame sent without BIP by "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-18 18:05:29 +01:00
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_MISSING_BIP_MMIE]++;
|
2010-11-10 01:06:59 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-23 16:24:24 +01:00
|
|
|
mmie = data + len - (8 + mic_len);
|
2010-11-10 01:06:59 +01:00
|
|
|
keyid = WPA_GET_LE16(mmie);
|
2010-11-13 12:14:09 +01:00
|
|
|
if (keyid & 0xf000) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "MMIE KeyID reserved bits not zero "
|
|
|
|
"(%04x) from " MACSTR, keyid, MAC2STR(mgmt->sa));
|
2010-11-13 12:14:09 +01:00
|
|
|
keyid &= 0x0fff;
|
|
|
|
}
|
2010-11-10 01:06:59 +01:00
|
|
|
if (keyid < 4 || keyid > 5) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Unexpected MMIE KeyID %u from " MACSTR,
|
|
|
|
keyid, MAC2STR(mgmt->sa));
|
2010-11-18 18:05:29 +01:00
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_INVALID_BIP_MMIE]++;
|
2010-11-10 01:06:59 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "MMIE KeyID %u", keyid);
|
|
|
|
wpa_hexdump(MSG_MSGDUMP, "MMIE IPN", mmie + 2, 6);
|
2015-01-23 16:24:24 +01:00
|
|
|
wpa_hexdump(MSG_MSGDUMP, "MMIE MIC", mmie + 8, mic_len);
|
2010-11-10 01:06:59 +01:00
|
|
|
|
2015-01-23 16:24:24 +01:00
|
|
|
if (!bss->igtk_len[keyid]) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "No IGTK known to validate BIP frame");
|
2010-11-10 01:06:59 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-11-10 15:59:45 +01:00
|
|
|
if (os_memcmp(mmie + 2, bss->ipn[keyid], 6) <= 0) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "BIP replay detected: SA=" MACSTR,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-10 01:06:59 +01:00
|
|
|
wpa_hexdump(MSG_INFO, "RX IPN", mmie + 2, 6);
|
|
|
|
wpa_hexdump(MSG_INFO, "Last RX IPN", bss->ipn[keyid], 6);
|
|
|
|
}
|
|
|
|
|
2015-01-24 11:21:49 +01:00
|
|
|
if (check_mmie_mic(bss->mgmt_group_cipher, bss->igtk[keyid],
|
|
|
|
bss->igtk_len[keyid], data, len) < 0) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Invalid MMIE MIC in a frame from "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa));
|
2010-11-18 18:05:29 +01:00
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_INVALID_BIP_MMIE]++;
|
2010-11-10 01:06:59 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "Valid MMIE MIC");
|
2010-11-10 01:06:59 +01:00
|
|
|
os_memcpy(bss->ipn[keyid], mmie + 2, 6);
|
2010-11-18 18:05:29 +01:00
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_VALID_BIP_MMIE]++;
|
2010-11-10 01:06:59 +01:00
|
|
|
|
2010-11-21 20:50:28 +01:00
|
|
|
if (stype == WLAN_FC_STYPE_DEAUTH)
|
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_BIP_DEAUTH]++;
|
|
|
|
else if (stype == WLAN_FC_STYPE_DISASSOC)
|
|
|
|
bss->counters[WLANTEST_BSS_COUNTER_BIP_DISASSOC]++;
|
|
|
|
|
2010-11-10 01:06:59 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2024-02-01 18:51:56 +01:00
|
|
|
static u8 * try_tk(struct wpa_ptk *ptk,
|
2022-08-29 20:46:09 +02:00
|
|
|
const u8 *data, size_t len, size_t *dlen)
|
2021-02-07 10:37:58 +01:00
|
|
|
{
|
|
|
|
const struct ieee80211_hdr *hdr;
|
|
|
|
u8 *decrypted, *frame;
|
|
|
|
|
|
|
|
hdr = (const struct ieee80211_hdr *) data;
|
2024-02-01 18:51:56 +01:00
|
|
|
if (ptk->tk_len == 16) {
|
2023-01-10 11:38:59 +01:00
|
|
|
decrypted = ccmp_decrypt(ptk->tk, hdr, NULL, NULL, NULL,
|
2022-09-05 22:08:43 +02:00
|
|
|
data + 24, len - 24, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
if (!decrypted)
|
2022-09-05 22:08:43 +02:00
|
|
|
decrypted = gcmp_decrypt(ptk->tk, 16, hdr, NULL, NULL,
|
2023-01-10 11:38:59 +01:00
|
|
|
NULL,
|
2022-09-05 22:08:43 +02:00
|
|
|
data + 24, len - 24, dlen);
|
2024-02-01 18:51:56 +01:00
|
|
|
} else if (ptk->tk_len == 32) {
|
2023-01-10 11:38:59 +01:00
|
|
|
decrypted = ccmp_256_decrypt(ptk->tk, hdr, NULL, NULL, NULL,
|
2022-09-05 22:08:43 +02:00
|
|
|
data + 24, len - 24, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
if (!decrypted)
|
2022-09-05 22:08:43 +02:00
|
|
|
decrypted = gcmp_decrypt(ptk->tk, 32, hdr, NULL, NULL,
|
2023-01-10 11:38:59 +01:00
|
|
|
NULL,
|
2022-09-05 22:08:43 +02:00
|
|
|
data + 24, len - 24, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
} else {
|
|
|
|
decrypted = NULL;
|
|
|
|
}
|
2021-02-07 10:37:58 +01:00
|
|
|
if (!decrypted)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
frame = os_malloc(24 + *dlen);
|
|
|
|
if (frame) {
|
|
|
|
os_memcpy(frame, data, 24);
|
|
|
|
os_memcpy(frame + 24, decrypted, *dlen);
|
|
|
|
*dlen += 24;
|
|
|
|
}
|
|
|
|
os_free(decrypted);
|
|
|
|
return frame;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-08-29 20:46:09 +02:00
|
|
|
static u8 * mgmt_decrypt_tk(struct wlantest *wt, const u8 *data, size_t len,
|
|
|
|
size_t *dlen)
|
2021-02-07 10:37:58 +01:00
|
|
|
{
|
|
|
|
struct wlantest_ptk *ptk;
|
|
|
|
u8 *decrypted;
|
|
|
|
int prev_level = wpa_debug_level;
|
|
|
|
int keyid;
|
|
|
|
|
|
|
|
keyid = data[24 + 3] >> 6;
|
|
|
|
|
|
|
|
wpa_debug_level = MSG_WARNING;
|
|
|
|
dl_list_for_each(ptk, &wt->ptk, struct wlantest_ptk, list) {
|
2024-02-01 18:51:56 +01:00
|
|
|
decrypted = try_tk(&ptk->ptk, data, len, dlen);
|
2021-02-07 10:37:58 +01:00
|
|
|
if (decrypted) {
|
|
|
|
wpa_debug_level = prev_level;
|
|
|
|
add_note(wt, MSG_DEBUG,
|
|
|
|
"Found TK match from the list of all known TKs");
|
|
|
|
write_decrypted_note(wt, decrypted, ptk->ptk.tk,
|
|
|
|
ptk->ptk.tk_len, keyid);
|
|
|
|
return decrypted;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
wpa_debug_level = prev_level;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-08-29 20:46:09 +02:00
|
|
|
static u8 * mgmt_decrypt(struct wlantest *wt, const u8 *data, size_t len,
|
|
|
|
size_t *dlen)
|
2010-11-11 19:46:15 +01:00
|
|
|
{
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
const struct ieee80211_hdr *hdr;
|
|
|
|
int keyid;
|
2010-11-12 22:28:43 +01:00
|
|
|
u8 *decrypted, *frame = NULL;
|
2010-11-11 19:46:15 +01:00
|
|
|
u8 pn[6], *rsc;
|
2021-02-07 11:30:03 +01:00
|
|
|
u16 fc;
|
|
|
|
u8 mask;
|
2023-06-22 21:44:51 +02:00
|
|
|
size_t hdrlen = 24;
|
2010-11-11 19:46:15 +01:00
|
|
|
|
|
|
|
hdr = (const struct ieee80211_hdr *) data;
|
2021-02-07 11:30:03 +01:00
|
|
|
fc = le_to_host16(hdr->frame_control);
|
2010-11-11 19:46:15 +01:00
|
|
|
|
2023-06-22 21:44:51 +02:00
|
|
|
if (fc & WLAN_FC_HTC)
|
|
|
|
hdrlen += 4; /* HT Control field */
|
|
|
|
|
|
|
|
if (len < hdrlen + 4)
|
2010-11-13 11:54:07 +01:00
|
|
|
return NULL;
|
|
|
|
|
2023-06-22 21:44:51 +02:00
|
|
|
if (!(data[hdrlen + 3] & 0x20)) {
|
2022-08-29 20:46:09 +02:00
|
|
|
add_note(wt, MSG_INFO, "Expected CCMP/GCMP frame from " MACSTR
|
2013-05-26 19:58:50 +02:00
|
|
|
" did not have ExtIV bit set to 1",
|
|
|
|
MAC2STR(hdr->addr2));
|
2010-11-13 11:54:07 +01:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2021-02-07 11:30:03 +01:00
|
|
|
mask = 0x1f;
|
|
|
|
if (WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION ||
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION_NO_ACK)
|
|
|
|
mask &= ~0x10; /* FTM */
|
2023-06-22 21:44:51 +02:00
|
|
|
if (data[hdrlen + 2] != 0 || (data[hdrlen + 3] & mask) != 0) {
|
2022-08-29 20:46:09 +02:00
|
|
|
add_note(wt, MSG_INFO, "CCMP/GCMP mgmt frame from " MACSTR
|
|
|
|
" used non-zero reserved bit", MAC2STR(hdr->addr2));
|
2010-11-13 12:03:21 +01:00
|
|
|
}
|
|
|
|
|
2023-06-22 21:44:51 +02:00
|
|
|
keyid = data[hdrlen + 3] >> 6;
|
2010-11-11 19:46:15 +01:00
|
|
|
if (keyid != 0) {
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_INFO, "Unexpected non-zero KeyID %d in "
|
|
|
|
"individually addressed Management frame from "
|
|
|
|
MACSTR, keyid, MAC2STR(hdr->addr2));
|
2010-11-11 19:46:15 +01:00
|
|
|
}
|
|
|
|
|
2021-02-07 10:37:58 +01:00
|
|
|
bss = bss_get(wt, hdr->addr3);
|
|
|
|
if (bss == NULL)
|
2022-08-29 20:46:09 +02:00
|
|
|
return mgmt_decrypt_tk(wt, data, len, dlen);
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(hdr->addr1, hdr->addr3)) {
|
2022-09-29 12:08:37 +02:00
|
|
|
sta = sta_find_mlo(wt, bss, hdr->addr2);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, hdr->addr2);
|
|
|
|
} else {
|
|
|
|
sta = sta_find_mlo(wt, bss, hdr->addr1);
|
|
|
|
if (!sta)
|
|
|
|
sta = sta_get(bss, hdr->addr1);
|
|
|
|
}
|
2021-02-07 10:37:58 +01:00
|
|
|
if (sta == NULL || !sta->ptk_set) {
|
2022-08-29 20:46:09 +02:00
|
|
|
decrypted = mgmt_decrypt_tk(wt, data, len, dlen);
|
2021-02-07 10:37:58 +01:00
|
|
|
if (!decrypted)
|
|
|
|
add_note(wt, MSG_MSGDUMP,
|
|
|
|
"No PTK known to decrypt the frame");
|
|
|
|
return decrypted;
|
|
|
|
}
|
|
|
|
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(hdr->addr1, hdr->addr3))
|
2010-11-11 19:46:15 +01:00
|
|
|
rsc = sta->rsc_tods[16];
|
|
|
|
else
|
|
|
|
rsc = sta->rsc_fromds[16];
|
|
|
|
|
2023-06-22 21:44:51 +02:00
|
|
|
ccmp_get_pn(pn, data + hdrlen);
|
2010-11-11 19:46:15 +01:00
|
|
|
if (os_memcmp(pn, rsc, 6) <= 0) {
|
2011-01-07 13:17:08 +01:00
|
|
|
u16 seq_ctrl = le_to_host16(hdr->seq_ctrl);
|
2022-08-29 20:46:09 +02:00
|
|
|
add_note(wt, MSG_INFO, "replay detected: A1=" MACSTR
|
2014-08-29 15:04:08 +02:00
|
|
|
" A2=" MACSTR " A3=" MACSTR " seq=%u frag=%u%s",
|
2013-05-26 19:58:50 +02:00
|
|
|
MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
|
|
|
|
MAC2STR(hdr->addr3),
|
|
|
|
WLAN_GET_SEQ_SEQ(seq_ctrl),
|
2014-08-29 15:04:08 +02:00
|
|
|
WLAN_GET_SEQ_FRAG(seq_ctrl),
|
|
|
|
(le_to_host16(hdr->frame_control) & WLAN_FC_RETRY) ?
|
|
|
|
" Retry" : "");
|
2010-11-11 19:46:15 +01:00
|
|
|
wpa_hexdump(MSG_INFO, "RX PN", pn, 6);
|
|
|
|
wpa_hexdump(MSG_INFO, "RSC", rsc, 6);
|
|
|
|
}
|
|
|
|
|
2022-08-29 20:46:09 +02:00
|
|
|
if (sta->pairwise_cipher == WPA_CIPHER_CCMP_256) {
|
2023-01-10 11:38:59 +01:00
|
|
|
decrypted = ccmp_256_decrypt(sta->ptk.tk, hdr, NULL, NULL, NULL,
|
2023-06-22 21:44:51 +02:00
|
|
|
data + hdrlen, len - hdrlen, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
write_decrypted_note(wt, decrypted, sta->ptk.tk, 32, keyid);
|
|
|
|
} else if (sta->pairwise_cipher == WPA_CIPHER_GCMP ||
|
|
|
|
sta->pairwise_cipher == WPA_CIPHER_GCMP_256) {
|
|
|
|
decrypted = gcmp_decrypt(sta->ptk.tk, sta->ptk.tk_len, hdr,
|
2023-01-10 11:38:59 +01:00
|
|
|
NULL, NULL, NULL,
|
2023-06-22 21:44:51 +02:00
|
|
|
data + hdrlen, len - hdrlen, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
write_decrypted_note(wt, decrypted, sta->ptk.tk,
|
|
|
|
sta->ptk.tk_len, keyid);
|
|
|
|
} else {
|
2023-01-10 11:38:59 +01:00
|
|
|
decrypted = ccmp_decrypt(sta->ptk.tk, hdr, NULL, NULL, NULL,
|
2023-06-22 21:44:51 +02:00
|
|
|
data + hdrlen, len - hdrlen, dlen);
|
2022-08-29 20:46:09 +02:00
|
|
|
write_decrypted_note(wt, decrypted, sta->ptk.tk, 16, keyid);
|
|
|
|
}
|
2010-11-12 22:28:43 +01:00
|
|
|
if (decrypted) {
|
2010-11-11 19:46:15 +01:00
|
|
|
os_memcpy(rsc, pn, 6);
|
2023-06-22 21:44:51 +02:00
|
|
|
frame = os_malloc(hdrlen + *dlen);
|
2010-11-12 22:28:43 +01:00
|
|
|
if (frame) {
|
2023-06-22 21:44:51 +02:00
|
|
|
os_memcpy(frame, data, hdrlen);
|
|
|
|
os_memcpy(frame + hdrlen, decrypted, *dlen);
|
|
|
|
*dlen += hdrlen;
|
2010-11-12 22:28:43 +01:00
|
|
|
}
|
2019-06-12 21:23:30 +02:00
|
|
|
} else {
|
|
|
|
/* Assume the frame was corrupted and there was no FCS to check.
|
|
|
|
* Allow retry of this particular frame to be processed so that
|
|
|
|
* it could end up getting decrypted if it was received without
|
|
|
|
* corruption. */
|
|
|
|
sta->allow_duplicate = 1;
|
2010-11-11 19:46:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
os_free(decrypted);
|
|
|
|
|
|
|
|
return frame;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-09-05 20:56:08 +02:00
|
|
|
static bool is_robust_action_category(u8 category)
|
|
|
|
{
|
|
|
|
return category != WLAN_ACTION_PUBLIC &&
|
|
|
|
category != WLAN_ACTION_HT &&
|
|
|
|
category != WLAN_ACTION_UNPROTECTED_WNM &&
|
|
|
|
category != WLAN_ACTION_SELF_PROTECTED &&
|
|
|
|
category != WLAN_ACTION_UNPROTECTED_DMG &&
|
|
|
|
category != WLAN_ACTION_VHT &&
|
|
|
|
category != WLAN_ACTION_UNPROTECTED_S1G &&
|
|
|
|
category != WLAN_ACTION_HE &&
|
|
|
|
category != WLAN_ACTION_EHT &&
|
|
|
|
category != WLAN_ACTION_VENDOR_SPECIFIC;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2022-08-29 20:46:09 +02:00
|
|
|
static int check_mgmt_ccmp_gcmp(struct wlantest *wt, const u8 *data, size_t len)
|
2010-11-12 22:17:20 +01:00
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
u16 fc;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
2022-09-05 20:56:08 +02:00
|
|
|
int category = -1;
|
2010-11-12 22:17:20 +01:00
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) data;
|
|
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
|
|
|
2022-09-05 20:56:08 +02:00
|
|
|
if ((WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION ||
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION_NO_ACK) &&
|
|
|
|
len > 24) {
|
|
|
|
category = mgmt->u.action.category;
|
|
|
|
if (!is_robust_action_category(category))
|
2010-11-12 22:17:20 +01:00
|
|
|
return 0; /* Not a robust management frame */
|
|
|
|
}
|
|
|
|
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return 0;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->da, mgmt->bssid))
|
2010-11-12 22:17:20 +01:00
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
if (sta == NULL)
|
|
|
|
return 0;
|
|
|
|
|
2020-03-14 17:20:31 +01:00
|
|
|
if ((bss->rsn_capab & WPA_CAPABILITY_MFPC) &&
|
|
|
|
(sta->rsn_capab & WPA_CAPABILITY_MFPC) &&
|
2010-11-23 12:15:25 +01:00
|
|
|
(sta->state == STATE3 ||
|
2021-02-07 11:00:12 +01:00
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION ||
|
|
|
|
WLAN_FC_GET_STYPE(fc) == WLAN_FC_STYPE_ACTION_NO_ACK)) {
|
2022-08-29 20:46:09 +02:00
|
|
|
add_note(wt, MSG_INFO,
|
2022-09-05 20:56:08 +02:00
|
|
|
"Robust individually-addressed management frame (stype=%u category=%d) sent without CCMP/GCMP by "
|
|
|
|
MACSTR, WLAN_FC_GET_STYPE(fc), category,
|
|
|
|
MAC2STR(mgmt->sa));
|
2010-11-12 22:17:20 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
void rx_mgmt(struct wlantest *wt, const u8 *data, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_hdr *hdr;
|
|
|
|
u16 fc, stype;
|
2010-11-11 19:46:15 +01:00
|
|
|
int valid = 1;
|
|
|
|
u8 *decrypted = NULL;
|
|
|
|
size_t dlen;
|
2010-11-06 17:01:24 +01:00
|
|
|
|
|
|
|
if (len < 24)
|
|
|
|
return;
|
|
|
|
|
|
|
|
hdr = (const struct ieee80211_hdr *) data;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
wt->rx_mgmt++;
|
|
|
|
stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
|
2010-11-10 01:06:59 +01:00
|
|
|
if ((hdr->addr1[0] & 0x01) &&
|
|
|
|
(stype == WLAN_FC_STYPE_DEAUTH ||
|
|
|
|
stype == WLAN_FC_STYPE_DISASSOC ||
|
2021-02-07 11:00:12 +01:00
|
|
|
stype == WLAN_FC_STYPE_ACTION ||
|
|
|
|
stype == WLAN_FC_STYPE_ACTION_NO_ACK)) {
|
2010-11-12 22:17:20 +01:00
|
|
|
if (check_bip(wt, data, len) < 0)
|
|
|
|
valid = 0;
|
|
|
|
}
|
2010-11-10 01:06:59 +01:00
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
wpa_printf((stype == WLAN_FC_STYPE_BEACON ||
|
|
|
|
stype == WLAN_FC_STYPE_PROBE_RESP ||
|
|
|
|
stype == WLAN_FC_STYPE_PROBE_REQ) ?
|
|
|
|
MSG_EXCESSIVE : MSG_MSGDUMP,
|
|
|
|
"MGMT %s%s%s DA=" MACSTR " SA=" MACSTR " BSSID=" MACSTR,
|
|
|
|
mgmt_stype(stype),
|
|
|
|
fc & WLAN_FC_PWRMGT ? " PwrMgt" : "",
|
|
|
|
fc & WLAN_FC_ISWEP ? " Prot" : "",
|
|
|
|
MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
|
|
|
|
MAC2STR(hdr->addr3));
|
|
|
|
|
2010-11-11 19:46:15 +01:00
|
|
|
if ((fc & WLAN_FC_ISWEP) &&
|
|
|
|
!(hdr->addr1[0] & 0x01) &&
|
|
|
|
(stype == WLAN_FC_STYPE_DEAUTH ||
|
|
|
|
stype == WLAN_FC_STYPE_DISASSOC ||
|
2021-02-07 11:00:12 +01:00
|
|
|
stype == WLAN_FC_STYPE_ACTION ||
|
|
|
|
stype == WLAN_FC_STYPE_ACTION_NO_ACK)) {
|
2022-08-29 20:46:09 +02:00
|
|
|
decrypted = mgmt_decrypt(wt, data, len, &dlen);
|
2010-11-11 19:46:15 +01:00
|
|
|
if (decrypted) {
|
2010-11-12 00:00:31 +01:00
|
|
|
write_pcap_decrypted(wt, decrypted, dlen, NULL, 0);
|
2010-11-11 19:46:15 +01:00
|
|
|
data = decrypted;
|
|
|
|
len = dlen;
|
|
|
|
} else
|
|
|
|
valid = 0;
|
|
|
|
}
|
|
|
|
|
2010-11-12 22:17:20 +01:00
|
|
|
if (!(fc & WLAN_FC_ISWEP) &&
|
|
|
|
!(hdr->addr1[0] & 0x01) &&
|
|
|
|
(stype == WLAN_FC_STYPE_DEAUTH ||
|
|
|
|
stype == WLAN_FC_STYPE_DISASSOC ||
|
2021-02-07 11:00:12 +01:00
|
|
|
stype == WLAN_FC_STYPE_ACTION ||
|
|
|
|
stype == WLAN_FC_STYPE_ACTION_NO_ACK)) {
|
2022-08-29 20:46:09 +02:00
|
|
|
if (check_mgmt_ccmp_gcmp(wt, data, len) < 0)
|
2010-11-12 22:17:20 +01:00
|
|
|
valid = 0;
|
|
|
|
}
|
2010-11-11 19:46:15 +01:00
|
|
|
|
2010-11-06 17:01:24 +01:00
|
|
|
switch (stype) {
|
|
|
|
case WLAN_FC_STYPE_BEACON:
|
|
|
|
rx_mgmt_beacon(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_PROBE_RESP:
|
|
|
|
rx_mgmt_probe_resp(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_AUTH:
|
|
|
|
rx_mgmt_auth(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_DEAUTH:
|
2010-11-11 19:46:15 +01:00
|
|
|
rx_mgmt_deauth(wt, data, len, valid);
|
2010-11-06 17:01:24 +01:00
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_ASSOC_REQ:
|
|
|
|
rx_mgmt_assoc_req(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_ASSOC_RESP:
|
|
|
|
rx_mgmt_assoc_resp(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_REASSOC_REQ:
|
|
|
|
rx_mgmt_reassoc_req(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_REASSOC_RESP:
|
|
|
|
rx_mgmt_reassoc_resp(wt, data, len);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_DISASSOC:
|
2010-11-11 19:46:15 +01:00
|
|
|
rx_mgmt_disassoc(wt, data, len, valid);
|
2010-11-06 17:01:24 +01:00
|
|
|
break;
|
2010-11-11 20:34:06 +01:00
|
|
|
case WLAN_FC_STYPE_ACTION:
|
2021-02-07 12:11:34 +01:00
|
|
|
rx_mgmt_action(wt, data, len, valid, false);
|
2010-11-11 20:34:06 +01:00
|
|
|
break;
|
2021-02-07 11:00:12 +01:00
|
|
|
case WLAN_FC_STYPE_ACTION_NO_ACK:
|
2021-02-07 12:11:34 +01:00
|
|
|
rx_mgmt_action(wt, data, len, valid, true);
|
2021-02-07 11:00:12 +01:00
|
|
|
break;
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|
2010-11-11 19:46:15 +01:00
|
|
|
|
|
|
|
os_free(decrypted);
|
2011-01-03 18:28:40 +01:00
|
|
|
|
|
|
|
wt->last_mgmt_valid = valid;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_deauth_ack(struct wlantest *wt,
|
|
|
|
const struct ieee80211_hdr *hdr)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) hdr;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2011-01-03 18:28:40 +01:00
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "DEAUTH from " MACSTR " acknowledged by "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid)) {
|
2011-01-03 18:28:40 +01:00
|
|
|
int c;
|
|
|
|
c = wt->last_mgmt_valid ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_DEAUTH_RX_ACK :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DEAUTH_RX_ACK;
|
|
|
|
sta->counters[c]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void rx_mgmt_disassoc_ack(struct wlantest *wt,
|
|
|
|
const struct ieee80211_hdr *hdr)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *mgmt;
|
|
|
|
struct wlantest_bss *bss;
|
|
|
|
struct wlantest_sta *sta;
|
|
|
|
|
|
|
|
mgmt = (const struct ieee80211_mgmt *) hdr;
|
|
|
|
bss = bss_get(wt, mgmt->bssid);
|
|
|
|
if (bss == NULL)
|
|
|
|
return;
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid))
|
2011-01-03 18:28:40 +01:00
|
|
|
sta = sta_get(bss, mgmt->da);
|
|
|
|
else
|
|
|
|
sta = sta_get(bss, mgmt->sa);
|
|
|
|
if (sta == NULL)
|
|
|
|
return;
|
|
|
|
|
2013-05-26 19:58:50 +02:00
|
|
|
add_note(wt, MSG_DEBUG, "DISASSOC from " MACSTR " acknowledged by "
|
|
|
|
MACSTR, MAC2STR(mgmt->sa), MAC2STR(mgmt->da));
|
Use ether_addr_equal() to compare whether two MAC addresses are equal
This was done with spatch using the following semantic patch and minor
manual edits to clean up coding style and avoid compiler warnings in
driver_wext.c:
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) == 0
+ ether_addr_equal(a, b)
@@
expression a,b;
@@
- os_memcmp(a, b, ETH_ALEN) != 0
+ !ether_addr_equal(a, b)
@@
expression a,b;
@@
- !os_memcmp(a, b, ETH_ALEN)
+ ether_addr_equal(a, b)
Signed-off-by: Jouni Malinen <j@w1.fi>
2024-01-13 22:15:36 +01:00
|
|
|
if (ether_addr_equal(mgmt->sa, mgmt->bssid)) {
|
2011-01-03 18:28:40 +01:00
|
|
|
int c;
|
|
|
|
c = wt->last_mgmt_valid ?
|
|
|
|
WLANTEST_STA_COUNTER_VALID_DISASSOC_RX_ACK :
|
|
|
|
WLANTEST_STA_COUNTER_INVALID_DISASSOC_RX_ACK;
|
|
|
|
sta->counters[c]++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void rx_mgmt_ack(struct wlantest *wt, const struct ieee80211_hdr *hdr)
|
|
|
|
{
|
|
|
|
u16 fc, stype;
|
|
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
stype = WLAN_FC_GET_STYPE(fc);
|
|
|
|
|
|
|
|
wpa_printf(MSG_MSGDUMP, "MGMT ACK: stype=%u a1=" MACSTR " a2=" MACSTR
|
|
|
|
" a3=" MACSTR,
|
|
|
|
stype, MAC2STR(hdr->addr1), MAC2STR(hdr->addr2),
|
|
|
|
MAC2STR(hdr->addr3));
|
|
|
|
|
|
|
|
switch (stype) {
|
|
|
|
case WLAN_FC_STYPE_DEAUTH:
|
|
|
|
rx_mgmt_deauth_ack(wt, hdr);
|
|
|
|
break;
|
|
|
|
case WLAN_FC_STYPE_DISASSOC:
|
|
|
|
rx_mgmt_disassoc_ack(wt, hdr);
|
|
|
|
break;
|
|
|
|
}
|
2010-11-06 17:01:24 +01:00
|
|
|
}
|