/* * wlantest frame injection * Copyright (c) 2010-2015, Jouni Malinen * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #include "utils/includes.h" #include "utils/common.h" #include "common/defs.h" #include "common/ieee802_11_defs.h" #include "crypto/aes_wrap.h" #include "wlantest.h" static int inject_frame(int s, const void *data, size_t len) { #define IEEE80211_RADIOTAP_F_FRAG 0x08 unsigned char rtap_hdr[] = { 0x00, 0x00, /* radiotap version */ 0x0e, 0x00, /* radiotap length */ 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */ IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */ 0x00, /* padding */ 0x00, 0x00, /* RX and TX flags to indicate that */ 0x00, 0x00, /* this is the injected frame directly */ }; struct iovec iov[2] = { { .iov_base = &rtap_hdr, .iov_len = sizeof(rtap_hdr), }, { .iov_base = (void *) data, .iov_len = len, } }; struct msghdr msg = { .msg_name = NULL, .msg_namelen = 0, .msg_iov = iov, .msg_iovlen = 2, .msg_control = NULL, .msg_controllen = 0, .msg_flags = 0, }; int ret; ret = sendmsg(s, &msg, 0); if (ret < 0) wpa_printf(MSG_ERROR, "sendmsg: %s", strerror(errno)); return ret; } static int is_robust_mgmt(u8 *frame, size_t len) { struct ieee80211_mgmt *mgmt; u16 fc, stype; if (len < 24) return 0; mgmt = (struct ieee80211_mgmt *) frame; fc = le_to_host16(mgmt->frame_control); if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) return 0; stype = WLAN_FC_GET_STYPE(fc); if (stype == WLAN_FC_STYPE_DEAUTH || stype == WLAN_FC_STYPE_DISASSOC) return 1; if (stype == WLAN_FC_STYPE_ACTION || stype == WLAN_FC_STYPE_ACTION_NO_ACK) { if (len < 25) return 0; if (mgmt->u.action.category != WLAN_ACTION_PUBLIC) return 1; } return 0; } static int wlantest_inject_bip(struct wlantest *wt, struct wlantest_bss *bss, u8 *frame, size_t len, int incorrect_key) { u8 *prot; u8 stub[32]; int ret; size_t plen; if (!bss->igtk_len[bss->igtk_idx]) return -1; os_memset(stub, 0x11, sizeof(stub)); inc_byte_array(bss->ipn[bss->igtk_idx], 6); prot = bip_protect(incorrect_key ? stub : bss->igtk[bss->igtk_idx], bss->igtk_len[bss->igtk_idx], frame, len, bss->ipn[bss->igtk_idx], bss->igtk_idx, &plen); if (prot == NULL) return -1; ret = inject_frame(wt->monitor_sock, prot, plen); os_free(prot); return (ret < 0) ? -1 : 0; } static int wlantest_inject_prot_bc(struct wlantest *wt, struct wlantest_bss *bss, u8 *frame, size_t len, int incorrect_key) { u8 *crypt; size_t crypt_len; int ret; u8 stub[64]; u8 *pn; struct ieee80211_hdr *hdr; u16 fc; int hdrlen; hdr = (struct ieee80211_hdr *) frame; hdrlen = 24; fc = le_to_host16(hdr->frame_control); if (!bss->gtk_len[bss->gtk_idx]) return -1; if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == (WLAN_FC_TODS | WLAN_FC_FROMDS)) hdrlen += ETH_ALEN; pn = bss->rsc[bss->gtk_idx]; inc_byte_array(pn, 6); os_memset(stub, 0x11, sizeof(stub)); if (bss->group_cipher == WPA_CIPHER_TKIP) crypt = tkip_encrypt(incorrect_key ? stub : bss->gtk[bss->gtk_idx], frame, len, hdrlen, NULL, pn, bss->gtk_idx, &crypt_len); else crypt = ccmp_encrypt(incorrect_key ? stub : bss->gtk[bss->gtk_idx], frame, len, hdrlen, NULL, NULL, NULL, pn, bss->gtk_idx, &crypt_len); if (crypt == NULL) return -1; ret = inject_frame(wt->monitor_sock, crypt, crypt_len); os_free(crypt); return (ret < 0) ? -1 : 0; } static int wlantest_inject_prot(struct wlantest *wt, struct wlantest_bss *bss, struct wlantest_sta *sta, u8 *frame, size_t len, int incorrect_key) { u8 *crypt; size_t crypt_len; int ret; u8 stub[64]; u8 *pn; struct ieee80211_hdr *hdr; u16 fc; int tid = 0; u8 *qos = NULL; int hdrlen; struct wlantest_tdls *tdls = NULL; const u8 *tk = NULL; hdr = (struct ieee80211_hdr *) frame; hdrlen = 24; fc = le_to_host16(hdr->frame_control); if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == 0) { struct wlantest_sta *sta2; bss = bss_get(wt, hdr->addr3); if (bss == NULL) { wpa_printf(MSG_DEBUG, "No BSS found for TDLS " "injection"); return -1; } sta = sta_find(bss, hdr->addr2); sta2 = sta_find(bss, hdr->addr1); if (sta == NULL || sta2 == NULL) { wpa_printf(MSG_DEBUG, "No stations found for TDLS " "injection"); return -1; } dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) { if ((tdls->init == sta && tdls->resp == sta2) || (tdls->init == sta2 && tdls->resp == sta)) { if (!tdls->link_up) wpa_printf(MSG_DEBUG, "TDLS: Link not " "up, but injecting Data " "frame on direct link"); tk = tdls->tpk.tk; break; } } } if (tk == NULL && sta == NULL) { if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT) return wlantest_inject_bip(wt, bss, frame, len, incorrect_key); return wlantest_inject_prot_bc(wt, bss, frame, len, incorrect_key); } if (tk == NULL && !sta->ptk_set) { wpa_printf(MSG_DEBUG, "No key known for injection"); return -1; } if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT) tid = 16; else if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA) { if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == (WLAN_FC_TODS | WLAN_FC_FROMDS)) hdrlen += ETH_ALEN; if (WLAN_FC_GET_STYPE(fc) & 0x08) { qos = frame + hdrlen; hdrlen += 2; tid = qos[0] & 0x0f; } } if (tk) { if (os_memcmp(hdr->addr2, tdls->init->addr, ETH_ALEN) == 0) pn = tdls->rsc_init[tid]; else pn = tdls->rsc_resp[tid]; } else if (os_memcmp(hdr->addr2, bss->bssid, ETH_ALEN) == 0) pn = sta->rsc_fromds[tid]; else pn = sta->rsc_tods[tid]; inc_byte_array(pn, 6); os_memset(stub, 0x11, sizeof(stub)); if (tk) crypt = ccmp_encrypt(incorrect_key ? stub : tk, frame, len, hdrlen, qos, NULL, NULL, pn, 0, &crypt_len); else if (sta->pairwise_cipher == WPA_CIPHER_TKIP) crypt = tkip_encrypt(incorrect_key ? stub : sta->ptk.tk, frame, len, hdrlen, qos, pn, 0, &crypt_len); else crypt = ccmp_encrypt(incorrect_key ? stub : sta->ptk.tk, frame, len, hdrlen, qos, NULL, NULL, pn, 0, &crypt_len); if (crypt == NULL) { wpa_printf(MSG_DEBUG, "Frame encryption failed"); return -1; } wpa_hexdump(MSG_DEBUG, "Inject frame (encrypted)", crypt, crypt_len); ret = inject_frame(wt->monitor_sock, crypt, crypt_len); os_free(crypt); wpa_printf(MSG_DEBUG, "inject_frame for protected frame: %d", ret); return (ret < 0) ? -1 : 0; } int wlantest_inject(struct wlantest *wt, struct wlantest_bss *bss, struct wlantest_sta *sta, u8 *frame, size_t len, enum wlantest_inject_protection prot) { int ret; struct ieee80211_hdr *hdr; u16 fc; int protectable, protect = 0; wpa_hexdump(MSG_DEBUG, "Inject frame", frame, len); if (wt->monitor_sock < 0) { wpa_printf(MSG_INFO, "Cannot inject frames when monitor " "interface is not in use"); return -1; } if (prot != WLANTEST_INJECT_UNPROTECTED && bss == NULL) { wpa_printf(MSG_INFO, "No BSS information to inject " "protected frames"); return -1; } hdr = (struct ieee80211_hdr *) frame; fc = le_to_host16(hdr->frame_control); protectable = WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA || is_robust_mgmt(frame, len); if ((prot == WLANTEST_INJECT_PROTECTED || prot == WLANTEST_INJECT_INCORRECT_KEY) && bss) { if (!sta && ((WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT && !bss->igtk_len[bss->igtk_idx]) || (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && !bss->gtk_len[bss->gtk_idx]))) { wpa_printf(MSG_INFO, "No GTK/IGTK known for " MACSTR " to protect the injected " "frame", MAC2STR(bss->bssid)); return -1; } if (sta && !sta->ptk_set) { wpa_printf(MSG_INFO, "No PTK known for the STA " MACSTR " to encrypt the injected frame", MAC2STR(sta->addr)); return -1; } protect = 1; } else if (protectable && prot != WLANTEST_INJECT_UNPROTECTED && bss) { if (sta && sta->ptk_set) protect = 1; else if (!sta) { if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && bss->gtk_len[bss->gtk_idx]) protect = 1; if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT && bss->igtk_len[bss->igtk_idx]) protect = 1; } } if (protect && bss) return wlantest_inject_prot( wt, bss, sta, frame, len, prot == WLANTEST_INJECT_INCORRECT_KEY); ret = inject_frame(wt->monitor_sock, frame, len); wpa_printf(MSG_DEBUG, "inject_frame for unprotected frame: %d", ret); return (ret < 0) ? -1 : 0; }