Make struct wpa_eapol_key easier to use with variable length MIC
Suite B 192-bit addition from IEEE Std 802.11ac-2013 replaced the previous fixed length Key MIC field with a variable length field. That change was addressed with an addition of a new struct defined for the second MIC length. This is not really scalable and with FILS coming up with a zero-length MIC case for AEAD, a more thorough change to support variable length MIC is needed. Remove the Key MIC and Key Data Length fields from the struct wpa_eapol_key and find their location based on the MIC length information (which is determined by the AKMP). This change allows the separate struct wpa_eapol_key_192 to be removed since struct wpa_eapol_key will now include only the fixed length fields that are shared with all EAPOL-Key cases in IEEE Std 802.11. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
94f66e8a26
commit
6d014ffc6e
8 changed files with 181 additions and 205 deletions
|
@ -65,10 +65,9 @@ static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
|
|||
{
|
||||
size_t rlen;
|
||||
struct wpa_eapol_key *err;
|
||||
struct wpa_eapol_key_192 *err192;
|
||||
struct rsn_error_kde error;
|
||||
u8 *rbuf, *pos;
|
||||
size_t kde_len;
|
||||
u8 *rbuf, *pos, *mic;
|
||||
size_t kde_len, mic_len = 16;
|
||||
u16 key_info;
|
||||
|
||||
kde_len = 2 + RSN_SELECTOR_LEN + sizeof(error);
|
||||
|
@ -76,11 +75,11 @@ static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
|
|||
kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN;
|
||||
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY,
|
||||
NULL, sizeof(*err) + kde_len, &rlen,
|
||||
(void *) &err);
|
||||
NULL, sizeof(*err) + mic_len + 2 + kde_len,
|
||||
&rlen, (void *) &err);
|
||||
if (rbuf == NULL)
|
||||
return -1;
|
||||
err192 = (struct wpa_eapol_key_192 *) err;
|
||||
mic = (u8 *) (err + 1);
|
||||
|
||||
err->type = EAPOL_KEY_TYPE_RSN;
|
||||
key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
|
||||
|
@ -92,8 +91,8 @@ static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
|
|||
WPA_REPLAY_COUNTER_LEN);
|
||||
inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
WPA_PUT_BE16(err->key_data_length, (u16) kde_len);
|
||||
pos = (u8 *) (err + 1);
|
||||
WPA_PUT_BE16(mic + mic_len, (u16) kde_len);
|
||||
pos = mic + mic_len + 2;
|
||||
|
||||
if (peer) {
|
||||
/* Peer MAC Address KDE */
|
||||
|
@ -115,7 +114,7 @@ static int wpa_supplicant_send_smk_error(struct wpa_sm *sm, const u8 *dst,
|
|||
}
|
||||
|
||||
wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, dst,
|
||||
ETH_P_EAPOL, rbuf, rlen, err192->key_mic);
|
||||
ETH_P_EAPOL, rbuf, rlen, mic);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -128,9 +127,8 @@ static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
|
|||
{
|
||||
size_t rlen;
|
||||
struct wpa_eapol_key *reply;
|
||||
struct wpa_eapol_key_192 *reply192;
|
||||
u8 *rbuf, *pos;
|
||||
size_t kde_len;
|
||||
u8 *rbuf, *pos, *mic;
|
||||
size_t kde_len, mic_len = 16;
|
||||
u16 key_info;
|
||||
|
||||
/* KDEs: Peer RSN IE, Initiator MAC Address, Initiator Nonce */
|
||||
|
@ -139,11 +137,10 @@ static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
|
|||
2 + RSN_SELECTOR_LEN + WPA_NONCE_LEN;
|
||||
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY,
|
||||
NULL, sizeof(*reply) + kde_len, &rlen,
|
||||
(void *) &reply);
|
||||
NULL, sizeof(*reply) + mic_len + 2 + kde_len,
|
||||
&rlen, (void *) &reply);
|
||||
if (rbuf == NULL)
|
||||
return -1;
|
||||
reply192 = (struct wpa_eapol_key_192 *) reply;
|
||||
|
||||
reply->type = EAPOL_KEY_TYPE_RSN;
|
||||
key_info = ver | WPA_KEY_INFO_SMK_MESSAGE | WPA_KEY_INFO_MIC |
|
||||
|
@ -155,8 +152,9 @@ static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
|
|||
|
||||
os_memcpy(reply->key_nonce, peerkey->pnonce, WPA_NONCE_LEN);
|
||||
|
||||
WPA_PUT_BE16(reply->key_data_length, (u16) kde_len);
|
||||
pos = (u8 *) (reply + 1);
|
||||
mic = (u8 *) (reply + 1);
|
||||
WPA_PUT_BE16(mic + mic_len, (u16) kde_len);
|
||||
pos = mic + mic_len + 2;
|
||||
|
||||
/* Peer RSN IE */
|
||||
pos = wpa_add_ie(pos, peerkey->rsnie_p, peerkey->rsnie_p_len);
|
||||
|
@ -169,7 +167,7 @@ static int wpa_supplicant_send_smk_m3(struct wpa_sm *sm,
|
|||
|
||||
wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key SMK M3");
|
||||
wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, src_addr,
|
||||
ETH_P_EAPOL, rbuf, rlen, reply192->key_mic);
|
||||
ETH_P_EAPOL, rbuf, rlen, mic);
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
@ -324,18 +322,19 @@ static void wpa_supplicant_send_stk_1_of_4(struct wpa_sm *sm,
|
|||
{
|
||||
size_t mlen;
|
||||
struct wpa_eapol_key *msg;
|
||||
u8 *mbuf;
|
||||
size_t kde_len;
|
||||
u8 *mbuf, *mic;
|
||||
size_t kde_len, mic_len = 16;
|
||||
u16 key_info, ver;
|
||||
|
||||
kde_len = 2 + RSN_SELECTOR_LEN + PMKID_LEN;
|
||||
|
||||
mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
sizeof(*msg) + kde_len, &mlen,
|
||||
sizeof(*msg) + mic_len + 2 + kde_len, &mlen,
|
||||
(void *) &msg);
|
||||
if (mbuf == NULL)
|
||||
return;
|
||||
|
||||
mic = (u8 *) (msg + 1);
|
||||
msg->type = EAPOL_KEY_TYPE_RSN;
|
||||
|
||||
if (peerkey->cipher != WPA_CIPHER_TKIP)
|
||||
|
@ -355,8 +354,8 @@ static void wpa_supplicant_send_stk_1_of_4(struct wpa_sm *sm,
|
|||
WPA_REPLAY_COUNTER_LEN);
|
||||
inc_byte_array(peerkey->replay_counter, WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
WPA_PUT_BE16(msg->key_data_length, kde_len);
|
||||
wpa_add_kde((u8 *) (msg + 1), RSN_KEY_DATA_PMKID,
|
||||
WPA_PUT_BE16(mic + mic_len, kde_len);
|
||||
wpa_add_kde(mic + mic_len + 2, RSN_KEY_DATA_PMKID,
|
||||
peerkey->smkid, PMKID_LEN);
|
||||
|
||||
if (random_get_bytes(peerkey->inonce, WPA_NONCE_LEN)) {
|
||||
|
@ -381,8 +380,8 @@ static void wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm,
|
|||
{
|
||||
size_t mlen;
|
||||
struct wpa_eapol_key *msg;
|
||||
u8 *mbuf, *pos;
|
||||
size_t kde_len;
|
||||
u8 *mbuf, *pos, *mic;
|
||||
size_t kde_len, mic_len = 16;
|
||||
u16 key_info, ver;
|
||||
be32 lifetime;
|
||||
|
||||
|
@ -390,11 +389,12 @@ static void wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm,
|
|||
2 + RSN_SELECTOR_LEN + sizeof(lifetime);
|
||||
|
||||
mbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
sizeof(*msg) + kde_len, &mlen,
|
||||
sizeof(*msg) + mic_len + 2 + kde_len, &mlen,
|
||||
(void *) &msg);
|
||||
if (mbuf == NULL)
|
||||
return;
|
||||
|
||||
mic = (u8 *) (msg + 1);
|
||||
msg->type = EAPOL_KEY_TYPE_RSN;
|
||||
|
||||
if (peerkey->cipher != WPA_CIPHER_TKIP)
|
||||
|
@ -415,8 +415,8 @@ static void wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm,
|
|||
WPA_REPLAY_COUNTER_LEN);
|
||||
inc_byte_array(peerkey->replay_counter, WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
WPA_PUT_BE16(msg->key_data_length, kde_len);
|
||||
pos = (u8 *) (msg + 1);
|
||||
WPA_PUT_BE16(mic + mic_len, kde_len);
|
||||
pos = mic + mic_len;
|
||||
pos = wpa_add_ie(pos, peerkey->rsnie_i, peerkey->rsnie_i_len);
|
||||
lifetime = host_to_be32(peerkey->lifetime);
|
||||
wpa_add_kde(pos, RSN_KEY_DATA_LIFETIME,
|
||||
|
@ -427,8 +427,7 @@ static void wpa_supplicant_send_stk_3_of_4(struct wpa_sm *sm,
|
|||
wpa_printf(MSG_DEBUG, "RSN: Sending EAPOL-Key STK 3/4 to " MACSTR,
|
||||
MAC2STR(peerkey->addr));
|
||||
wpa_eapol_key_send(sm, peerkey->stk.kck, peerkey->stk.kck_len, ver,
|
||||
peerkey->addr, ETH_P_EAPOL, mbuf, mlen,
|
||||
msg->key_mic);
|
||||
peerkey->addr, ETH_P_EAPOL, mbuf, mlen, mic);
|
||||
}
|
||||
|
||||
|
||||
|
@ -911,10 +910,10 @@ static void wpa_supplicant_process_stk_4_of_4(struct wpa_sm *sm,
|
|||
*/
|
||||
int peerkey_verify_eapol_key_mic(struct wpa_sm *sm,
|
||||
struct wpa_peerkey *peerkey,
|
||||
struct wpa_eapol_key_192 *key, u16 ver,
|
||||
struct wpa_eapol_key *key, u16 ver,
|
||||
const u8 *buf, size_t len)
|
||||
{
|
||||
u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN];
|
||||
u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos;
|
||||
size_t mic_len = 16;
|
||||
int ok = 0;
|
||||
|
||||
|
@ -926,12 +925,13 @@ int peerkey_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
peerkey->stk_set = 1;
|
||||
}
|
||||
|
||||
os_memcpy(mic, key->key_mic, mic_len);
|
||||
mic_pos = (u8 *) (key + 1);
|
||||
os_memcpy(mic, mic_pos, mic_len);
|
||||
if (peerkey->tstk_set) {
|
||||
os_memset(key->key_mic, 0, mic_len);
|
||||
os_memset(mic_pos, 0, mic_len);
|
||||
wpa_eapol_key_mic(peerkey->tstk.kck, peerkey->tstk.kck_len,
|
||||
sm->key_mgmt, ver, buf, len, key->key_mic);
|
||||
if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) {
|
||||
sm->key_mgmt, ver, buf, len, mic_pos);
|
||||
if (os_memcmp_const(mic, mic_pos, mic_len) != 0) {
|
||||
wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
|
||||
"when using TSTK - ignoring TSTK");
|
||||
} else {
|
||||
|
@ -945,10 +945,10 @@ int peerkey_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
}
|
||||
|
||||
if (!ok && peerkey->stk_set) {
|
||||
os_memset(key->key_mic, 0, mic_len);
|
||||
os_memset(mic_pos, 0, mic_len);
|
||||
wpa_eapol_key_mic(peerkey->stk.kck, peerkey->stk.kck_len,
|
||||
sm->key_mgmt, ver, buf, len, key->key_mic);
|
||||
if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) {
|
||||
sm->key_mgmt, ver, buf, len, mic_pos);
|
||||
if (os_memcmp_const(mic, mic_pos, mic_len) != 0) {
|
||||
wpa_printf(MSG_WARNING, "RSN: Invalid EAPOL-Key MIC "
|
||||
"- dropping packet");
|
||||
return -1;
|
||||
|
@ -980,10 +980,10 @@ int peerkey_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
*/
|
||||
int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
||||
{
|
||||
size_t rlen, kde_len;
|
||||
size_t rlen, kde_len, mic_len;
|
||||
struct wpa_eapol_key *req;
|
||||
int key_info, ver;
|
||||
u8 bssid[ETH_ALEN], *rbuf, *pos, *count_pos;
|
||||
u8 bssid[ETH_ALEN], *rbuf, *pos, *count_pos, *mic;
|
||||
u16 count;
|
||||
struct rsn_ie_hdr *hdr;
|
||||
struct wpa_peerkey *peerkey;
|
||||
|
@ -999,6 +999,7 @@ int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|||
return -1;
|
||||
}
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
if (sm->pairwise_cipher != WPA_CIPHER_TKIP)
|
||||
ver = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
|
||||
else
|
||||
|
@ -1047,7 +1048,7 @@ int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|||
kde_len = peerkey->rsnie_i_len + 2 + RSN_SELECTOR_LEN + ETH_ALEN;
|
||||
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
sizeof(*req) + kde_len, &rlen,
|
||||
sizeof(*req) + mic_len + 2 + kde_len, &rlen,
|
||||
(void *) &req);
|
||||
if (rbuf == NULL) {
|
||||
wpa_supplicant_peerkey_free(sm, peerkey);
|
||||
|
@ -1074,8 +1075,10 @@ int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|||
wpa_hexdump(MSG_DEBUG, "WPA: INonce for SMK handshake",
|
||||
req->key_nonce, WPA_NONCE_LEN);
|
||||
|
||||
WPA_PUT_BE16(req->key_data_length, (u16) kde_len);
|
||||
pos = (u8 *) (req + 1);
|
||||
mic = pos = (u8 *) (req + 1);
|
||||
pos += mic_len;
|
||||
WPA_PUT_BE16(pos, (u16) kde_len);
|
||||
pos += 2;
|
||||
|
||||
/* Initiator RSN IE */
|
||||
pos = wpa_add_ie(pos, peerkey->rsnie_i, peerkey->rsnie_i_len);
|
||||
|
@ -1085,7 +1088,7 @@ int wpa_sm_stkstart(struct wpa_sm *sm, const u8 *peer)
|
|||
wpa_printf(MSG_INFO, "RSN: Sending EAPOL-Key SMK M1 Request (peer "
|
||||
MACSTR ")", MAC2STR(peer));
|
||||
wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver, bssid,
|
||||
ETH_P_EAPOL, rbuf, rlen, req->key_mic);
|
||||
ETH_P_EAPOL, rbuf, rlen, mic);
|
||||
|
||||
peerkey->next = sm->peerkey;
|
||||
sm->peerkey = peerkey;
|
||||
|
|
|
@ -38,7 +38,7 @@ struct wpa_peerkey {
|
|||
|
||||
int peerkey_verify_eapol_key_mic(struct wpa_sm *sm,
|
||||
struct wpa_peerkey *peerkey,
|
||||
struct wpa_eapol_key_192 *key, u16 ver,
|
||||
struct wpa_eapol_key *key, u16 ver,
|
||||
const u8 *buf, size_t len);
|
||||
void peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey,
|
||||
struct wpa_eapol_key *key, u16 key_info, u16 ver,
|
||||
|
|
|
@ -97,9 +97,8 @@ void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise)
|
|||
{
|
||||
size_t mic_len, hdrlen, rlen;
|
||||
struct wpa_eapol_key *reply;
|
||||
struct wpa_eapol_key_192 *reply192;
|
||||
int key_info, ver;
|
||||
u8 bssid[ETH_ALEN], *rbuf, *key_mic;
|
||||
u8 bssid[ETH_ALEN], *rbuf, *key_mic, *mic;
|
||||
|
||||
if (sm->key_mgmt == WPA_KEY_MGMT_OSEN ||
|
||||
wpa_key_mgmt_suite_b(sm->key_mgmt))
|
||||
|
@ -119,12 +118,11 @@ void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise)
|
|||
}
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply);
|
||||
hdrlen = sizeof(*reply) + mic_len + 2;
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
hdrlen, &rlen, (void *) &reply);
|
||||
if (rbuf == NULL)
|
||||
return;
|
||||
reply192 = (struct wpa_eapol_key_192 *) reply;
|
||||
|
||||
reply->type = (sm->proto == WPA_PROTO_RSN ||
|
||||
sm->proto == WPA_PROTO_OSEN) ?
|
||||
|
@ -142,14 +140,12 @@ void wpa_sm_key_request(struct wpa_sm *sm, int error, int pairwise)
|
|||
WPA_REPLAY_COUNTER_LEN);
|
||||
inc_byte_array(sm->request_counter, WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
if (mic_len == 24)
|
||||
WPA_PUT_BE16(reply192->key_data_length, 0);
|
||||
else
|
||||
WPA_PUT_BE16(reply->key_data_length, 0);
|
||||
mic = (u8 *) (reply + 1);
|
||||
WPA_PUT_BE16(mic + mic_len, 0);
|
||||
if (!(key_info & WPA_KEY_INFO_MIC))
|
||||
key_mic = NULL;
|
||||
else
|
||||
key_mic = reply192->key_mic; /* same offset in reply */
|
||||
key_mic = mic;
|
||||
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_INFO,
|
||||
"WPA: Sending EAPOL-Key Request (error=%d "
|
||||
|
@ -341,7 +337,6 @@ int wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
{
|
||||
size_t mic_len, hdrlen, rlen;
|
||||
struct wpa_eapol_key *reply;
|
||||
struct wpa_eapol_key_192 *reply192;
|
||||
u8 *rbuf, *key_mic;
|
||||
u8 *rsn_ie_buf = NULL;
|
||||
|
||||
|
@ -384,7 +379,7 @@ int wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
wpa_hexdump(MSG_DEBUG, "WPA: WPA IE for msg 2/4", wpa_ie, wpa_ie_len);
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply);
|
||||
hdrlen = sizeof(*reply) + mic_len + 2;
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY,
|
||||
NULL, hdrlen + wpa_ie_len,
|
||||
&rlen, (void *) &reply);
|
||||
|
@ -392,7 +387,6 @@ int wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
os_free(rsn_ie_buf);
|
||||
return -1;
|
||||
}
|
||||
reply192 = (struct wpa_eapol_key_192 *) reply;
|
||||
|
||||
reply->type = (sm->proto == WPA_PROTO_RSN ||
|
||||
sm->proto == WPA_PROTO_OSEN) ?
|
||||
|
@ -408,14 +402,9 @@ int wpa_supplicant_send_2_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter", reply->replay_counter,
|
||||
WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
key_mic = reply192->key_mic; /* same offset for reply and reply192 */
|
||||
if (mic_len == 24) {
|
||||
WPA_PUT_BE16(reply192->key_data_length, wpa_ie_len);
|
||||
os_memcpy(reply192 + 1, wpa_ie, wpa_ie_len);
|
||||
} else {
|
||||
WPA_PUT_BE16(reply->key_data_length, wpa_ie_len);
|
||||
os_memcpy(reply + 1, wpa_ie, wpa_ie_len);
|
||||
}
|
||||
key_mic = (u8 *) (reply + 1);
|
||||
WPA_PUT_BE16(key_mic + mic_len, wpa_ie_len); /* Key Data Length */
|
||||
os_memcpy(key_mic + mic_len + 2, wpa_ie, wpa_ie_len); /* Key Data */
|
||||
os_free(rsn_ie_buf);
|
||||
|
||||
os_memcpy(reply->key_nonce, nonce, WPA_NONCE_LEN);
|
||||
|
@ -1147,16 +1136,14 @@ int wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
{
|
||||
size_t mic_len, hdrlen, rlen;
|
||||
struct wpa_eapol_key *reply;
|
||||
struct wpa_eapol_key_192 *reply192;
|
||||
u8 *rbuf, *key_mic;
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply);
|
||||
hdrlen = sizeof(*reply) + mic_len + 2;
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
hdrlen, &rlen, (void *) &reply);
|
||||
if (rbuf == NULL)
|
||||
return -1;
|
||||
reply192 = (struct wpa_eapol_key_192 *) reply;
|
||||
|
||||
reply->type = (sm->proto == WPA_PROTO_RSN ||
|
||||
sm->proto == WPA_PROTO_OSEN) ?
|
||||
|
@ -1171,11 +1158,8 @@ int wpa_supplicant_send_4_of_4(struct wpa_sm *sm, const unsigned char *dst,
|
|||
os_memcpy(reply->replay_counter, key->replay_counter,
|
||||
WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
key_mic = reply192->key_mic; /* same offset for reply and reply192 */
|
||||
if (mic_len == 24)
|
||||
WPA_PUT_BE16(reply192->key_data_length, 0);
|
||||
else
|
||||
WPA_PUT_BE16(reply->key_data_length, 0);
|
||||
key_mic = (u8 *) (reply + 1);
|
||||
WPA_PUT_BE16(key_mic + mic_len, 0);
|
||||
|
||||
wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 4/4");
|
||||
return wpa_eapol_key_send(sm, ptk->kck, ptk->kck_len, ver, dst,
|
||||
|
@ -1456,16 +1440,14 @@ static int wpa_supplicant_send_2_of_2(struct wpa_sm *sm,
|
|||
{
|
||||
size_t mic_len, hdrlen, rlen;
|
||||
struct wpa_eapol_key *reply;
|
||||
struct wpa_eapol_key_192 *reply192;
|
||||
u8 *rbuf, *key_mic;
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
hdrlen = mic_len == 24 ? sizeof(*reply192) : sizeof(*reply);
|
||||
hdrlen = sizeof(*reply) + mic_len + 2;
|
||||
rbuf = wpa_sm_alloc_eapol(sm, IEEE802_1X_TYPE_EAPOL_KEY, NULL,
|
||||
hdrlen, &rlen, (void *) &reply);
|
||||
if (rbuf == NULL)
|
||||
return -1;
|
||||
reply192 = (struct wpa_eapol_key_192 *) reply;
|
||||
|
||||
reply->type = (sm->proto == WPA_PROTO_RSN ||
|
||||
sm->proto == WPA_PROTO_OSEN) ?
|
||||
|
@ -1480,11 +1462,8 @@ static int wpa_supplicant_send_2_of_2(struct wpa_sm *sm,
|
|||
os_memcpy(reply->replay_counter, key->replay_counter,
|
||||
WPA_REPLAY_COUNTER_LEN);
|
||||
|
||||
key_mic = reply192->key_mic; /* same offset for reply and reply192 */
|
||||
if (mic_len == 24)
|
||||
WPA_PUT_BE16(reply192->key_data_length, 0);
|
||||
else
|
||||
WPA_PUT_BE16(reply->key_data_length, 0);
|
||||
key_mic = (u8 *) (reply + 1);
|
||||
WPA_PUT_BE16(key_mic + mic_len, 0);
|
||||
|
||||
wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG, "WPA: Sending EAPOL-Key 2/2");
|
||||
return wpa_eapol_key_send(sm, sm->ptk.kck, sm->ptk.kck_len, ver,
|
||||
|
@ -1564,7 +1543,7 @@ failed:
|
|||
|
||||
|
||||
static int wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm,
|
||||
struct wpa_eapol_key_192 *key,
|
||||
struct wpa_eapol_key *key,
|
||||
u16 ver,
|
||||
const u8 *buf, size_t len)
|
||||
{
|
||||
|
@ -1572,12 +1551,12 @@ static int wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
int ok = 0;
|
||||
size_t mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
|
||||
os_memcpy(mic, key->key_mic, mic_len);
|
||||
os_memcpy(mic, key + 1, mic_len);
|
||||
if (sm->tptk_set) {
|
||||
os_memset(key->key_mic, 0, mic_len);
|
||||
os_memset(key + 1, 0, mic_len);
|
||||
wpa_eapol_key_mic(sm->tptk.kck, sm->tptk.kck_len, sm->key_mgmt,
|
||||
ver, buf, len, key->key_mic);
|
||||
if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) {
|
||||
ver, buf, len, (u8 *) (key + 1));
|
||||
if (os_memcmp_const(mic, key + 1, mic_len) != 0) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid EAPOL-Key MIC "
|
||||
"when using TPTK - ignoring TPTK");
|
||||
|
@ -1591,10 +1570,10 @@ static int wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
}
|
||||
|
||||
if (!ok && sm->ptk_set) {
|
||||
os_memset(key->key_mic, 0, mic_len);
|
||||
os_memset(key + 1, 0, mic_len);
|
||||
wpa_eapol_key_mic(sm->ptk.kck, sm->ptk.kck_len, sm->key_mgmt,
|
||||
ver, buf, len, key->key_mic);
|
||||
if (os_memcmp_const(mic, key->key_mic, mic_len) != 0) {
|
||||
ver, buf, len, (u8 *) (key + 1));
|
||||
if (os_memcmp_const(mic, key + 1, mic_len) != 0) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Invalid EAPOL-Key MIC - "
|
||||
"dropping packet");
|
||||
|
@ -1619,7 +1598,8 @@ static int wpa_supplicant_verify_eapol_key_mic(struct wpa_sm *sm,
|
|||
|
||||
/* Decrypt RSN EAPOL-Key key data (RC4 or AES-WRAP) */
|
||||
static int wpa_supplicant_decrypt_key_data(struct wpa_sm *sm,
|
||||
struct wpa_eapol_key *key, u16 ver,
|
||||
struct wpa_eapol_key *key,
|
||||
size_t mic_len, u16 ver,
|
||||
u8 *key_data, size_t *key_data_len)
|
||||
{
|
||||
wpa_hexdump(MSG_DEBUG, "RSN: encrypted key data",
|
||||
|
@ -1678,7 +1658,7 @@ static int wpa_supplicant_decrypt_key_data(struct wpa_sm *sm,
|
|||
}
|
||||
os_memcpy(key_data, buf, *key_data_len);
|
||||
bin_clear_free(buf, *key_data_len);
|
||||
WPA_PUT_BE16(key->key_data_length, *key_data_len);
|
||||
WPA_PUT_BE16(((u8 *) (key + 1)) + mic_len, *key_data_len);
|
||||
} else {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_WARNING,
|
||||
"WPA: Unsupported key_info type %d", ver);
|
||||
|
@ -1763,12 +1743,11 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|||
size_t plen, data_len, key_data_len;
|
||||
const struct ieee802_1x_hdr *hdr;
|
||||
struct wpa_eapol_key *key;
|
||||
struct wpa_eapol_key_192 *key192;
|
||||
u16 key_info, ver;
|
||||
u8 *tmp = NULL;
|
||||
int ret = -1;
|
||||
struct wpa_peerkey *peerkey = NULL;
|
||||
u8 *key_data;
|
||||
u8 *mic, *key_data;
|
||||
size_t mic_len, keyhdrlen;
|
||||
|
||||
#ifdef CONFIG_IEEE80211R
|
||||
|
@ -1776,7 +1755,7 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|||
#endif /* CONFIG_IEEE80211R */
|
||||
|
||||
mic_len = wpa_mic_len(sm->key_mgmt);
|
||||
keyhdrlen = mic_len == 24 ? sizeof(*key192) : sizeof(*key);
|
||||
keyhdrlen = sizeof(*key) + mic_len + 2;
|
||||
|
||||
if (len < sizeof(*hdr) + keyhdrlen) {
|
||||
wpa_dbg(sm->ctx->msg_ctx, MSG_DEBUG,
|
||||
|
@ -1828,12 +1807,8 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|||
goto out;
|
||||
os_memcpy(tmp, buf, data_len);
|
||||
key = (struct wpa_eapol_key *) (tmp + sizeof(struct ieee802_1x_hdr));
|
||||
key192 = (struct wpa_eapol_key_192 *)
|
||||
(tmp + sizeof(struct ieee802_1x_hdr));
|
||||
if (mic_len == 24)
|
||||
key_data = (u8 *) (key192 + 1);
|
||||
else
|
||||
key_data = (u8 *) (key + 1);
|
||||
mic = (u8 *) (key + 1);
|
||||
key_data = mic + mic_len + 2;
|
||||
|
||||
if (key->type != EAPOL_KEY_TYPE_WPA && key->type != EAPOL_KEY_TYPE_RSN)
|
||||
{
|
||||
|
@ -1844,11 +1819,8 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|||
goto out;
|
||||
}
|
||||
|
||||
if (mic_len == 24)
|
||||
key_data_len = WPA_GET_BE16(key192->key_data_length);
|
||||
else
|
||||
key_data_len = WPA_GET_BE16(key->key_data_length);
|
||||
wpa_eapol_key_dump(sm, key, key_data_len, key192->key_mic, mic_len);
|
||||
key_data_len = WPA_GET_BE16(mic + mic_len);
|
||||
wpa_eapol_key_dump(sm, key, key_data_len, mic, mic_len);
|
||||
|
||||
if (key_data_len > plen - keyhdrlen) {
|
||||
wpa_msg(sm->ctx->msg_ctx, MSG_INFO, "WPA: Invalid EAPOL-Key "
|
||||
|
@ -2004,19 +1976,20 @@ int wpa_sm_rx_eapol(struct wpa_sm *sm, const u8 *src_addr,
|
|||
}
|
||||
|
||||
if ((key_info & WPA_KEY_INFO_MIC) && !peerkey &&
|
||||
wpa_supplicant_verify_eapol_key_mic(sm, key192, ver, tmp, data_len))
|
||||
wpa_supplicant_verify_eapol_key_mic(sm, key, ver, tmp, data_len))
|
||||
goto out;
|
||||
|
||||
#ifdef CONFIG_PEERKEY
|
||||
if ((key_info & WPA_KEY_INFO_MIC) && peerkey &&
|
||||
peerkey_verify_eapol_key_mic(sm, peerkey, key192, ver, tmp,
|
||||
peerkey_verify_eapol_key_mic(sm, peerkey, key, ver, tmp,
|
||||
data_len))
|
||||
goto out;
|
||||
#endif /* CONFIG_PEERKEY */
|
||||
|
||||
if ((sm->proto == WPA_PROTO_RSN || sm->proto == WPA_PROTO_OSEN) &&
|
||||
(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
|
||||
if (wpa_supplicant_decrypt_key_data(sm, key, ver, key_data,
|
||||
if (wpa_supplicant_decrypt_key_data(sm, key, mic_len,
|
||||
ver, key_data,
|
||||
&key_data_len))
|
||||
goto out;
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue