/* * wpa_supplicant - PASN processing * * Copyright (C) 2019 Intel Corporation * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #include "includes.h" #include "common/ieee802_11_defs.h" #include "common/ieee802_11_common.h" #include "common/dragonfly.h" #include "common/ptksa_cache.h" #include "utils/eloop.h" #include "drivers/driver.h" #include "crypto/crypto.h" #include "crypto/random.h" #include "eap_common/eap_defs.h" #include "rsn_supp/wpa.h" #include "rsn_supp/pmksa_cache.h" #include "wpa_supplicant_i.h" #include "driver_i.h" #include "bss.h" #include "scan.h" #include "config.h" static const int dot11RSNAConfigPMKLifetime = 43200; struct wpa_pasn_auth_work { u8 own_addr[ETH_ALEN]; u8 bssid[ETH_ALEN]; int akmp; int cipher; u16 group; int network_id; struct wpabuf *comeback; }; static void wpas_pasn_free_auth_work(struct wpa_pasn_auth_work *awork) { wpabuf_free(awork->comeback); awork->comeback = NULL; os_free(awork); } static void wpas_pasn_auth_work_timeout(void *eloop_ctx, void *timeout_ctx) { struct wpa_supplicant *wpa_s = eloop_ctx; wpa_printf(MSG_DEBUG, "PASN: Auth work timeout - stopping auth"); wpas_pasn_auth_stop(wpa_s); wpas_pasn_auth_work_done(wpa_s, PASN_STATUS_FAILURE); } static void wpas_pasn_cancel_auth_work(struct wpa_supplicant *wpa_s) { wpa_printf(MSG_DEBUG, "PASN: Cancel pasn-start-auth work"); /* Remove pending/started work */ radio_remove_works(wpa_s, "pasn-start-auth", 0); } static void wpas_pasn_auth_status(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher, u8 status, struct wpabuf *comeback, u16 comeback_after) { if (comeback) { size_t comeback_len = wpabuf_len(comeback); size_t buflen = comeback_len * 2 + 1; char *comeback_txt = os_malloc(buflen); if (comeback_txt) { wpa_snprintf_hex(comeback_txt, buflen, wpabuf_head(comeback), comeback_len); wpa_msg(wpa_s, MSG_INFO, PASN_AUTH_STATUS MACSTR " akmp=%s, status=%u comeback_after=%u comeback=%s", MAC2STR(bssid), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), status, comeback_after, comeback_txt); os_free(comeback_txt); return; } } wpa_msg(wpa_s, MSG_INFO, PASN_AUTH_STATUS MACSTR " akmp=%s, status=%u", MAC2STR(bssid), wpa_key_mgmt_txt(akmp, WPA_PROTO_RSN), status); } #ifdef CONFIG_SAE static struct wpabuf * wpas_pasn_wd_sae_commit(struct wpas_pasn *pasn) { struct wpabuf *buf = NULL; int ret; ret = sae_set_group(&pasn->sae, pasn->group); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to set SAE group"); return NULL; } ret = sae_prepare_commit_pt(&pasn->sae, pasn->ssid->pt, pasn->own_addr, pasn->bssid, NULL, NULL); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to prepare SAE commit"); return NULL; } /* Need to add the entire Authentication frame body */ buf = wpabuf_alloc(6 + SAE_COMMIT_MAX_LEN); if (!buf) { wpa_printf(MSG_DEBUG, "PASN: Failed to allocate SAE buffer"); return NULL; } wpabuf_put_le16(buf, WLAN_AUTH_SAE); wpabuf_put_le16(buf, 1); wpabuf_put_le16(buf, WLAN_STATUS_SAE_HASH_TO_ELEMENT); sae_write_commit(&pasn->sae, buf, NULL, 0); pasn->sae.state = SAE_COMMITTED; return buf; } static int wpas_pasn_wd_sae_rx(struct wpas_pasn *pasn, struct wpabuf *wd) { const u8 *data; size_t buf_len; u16 len, res, alg, seq, status; int groups[] = { pasn->group, 0 }; int ret; if (!wd) return -1; data = wpabuf_head_u8(wd); buf_len = wpabuf_len(wd); /* first handle the commit message */ if (buf_len < 2) { wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (commit)"); return -1; } len = WPA_GET_LE16(data); if (len < 6 || buf_len - 2 < len) { wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short for commit"); return -1; } buf_len -= 2; data += 2; alg = WPA_GET_LE16(data); seq = WPA_GET_LE16(data + 2); status = WPA_GET_LE16(data + 4); wpa_printf(MSG_DEBUG, "PASN: SAE: commit: alg=%u, seq=%u, status=%u", alg, seq, status); if (alg != WLAN_AUTH_SAE || seq != 1 || status != WLAN_STATUS_SAE_HASH_TO_ELEMENT) { wpa_printf(MSG_DEBUG, "PASN: SAE: dropping peer commit"); return -1; } res = sae_parse_commit(&pasn->sae, data + 6, len - 6, NULL, 0, groups, 1); if (res != WLAN_STATUS_SUCCESS) { wpa_printf(MSG_DEBUG, "PASN: SAE failed parsing commit"); return -1; } /* Process the commit message and derive the PMK */ ret = sae_process_commit(&pasn->sae); if (ret) { wpa_printf(MSG_DEBUG, "SAE: Failed to process peer commit"); return -1; } buf_len -= len; data += len; /* Handle the confirm message */ if (buf_len < 2) { wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short (confirm)"); return -1; } len = WPA_GET_LE16(data); if (len < 6 || buf_len - 2 < len) { wpa_printf(MSG_DEBUG, "PASN: SAE buffer too short for confirm"); return -1; } buf_len -= 2; data += 2; alg = WPA_GET_LE16(data); seq = WPA_GET_LE16(data + 2); status = WPA_GET_LE16(data + 4); wpa_printf(MSG_DEBUG, "PASN: SAE confirm: alg=%u, seq=%u, status=%u", alg, seq, status); if (alg != WLAN_AUTH_SAE || seq != 2 || status != WLAN_STATUS_SUCCESS) { wpa_printf(MSG_DEBUG, "PASN: Dropping peer SAE confirm"); return -1; } res = sae_check_confirm(&pasn->sae, data + 6, len - 6); if (res != WLAN_STATUS_SUCCESS) { wpa_printf(MSG_DEBUG, "PASN: SAE failed checking confirm"); return -1; } wpa_printf(MSG_DEBUG, "PASN: SAE completed successfully"); pasn->sae.state = SAE_ACCEPTED; return 0; } static struct wpabuf * wpas_pasn_wd_sae_confirm(struct wpas_pasn *pasn) { struct wpabuf *buf = NULL; /* Need to add the entire authentication frame body */ buf = wpabuf_alloc(6 + SAE_CONFIRM_MAX_LEN); if (!buf) { wpa_printf(MSG_DEBUG, "PASN: Failed to allocate SAE buffer"); return NULL; } wpabuf_put_le16(buf, WLAN_AUTH_SAE); wpabuf_put_le16(buf, 2); wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS); sae_write_confirm(&pasn->sae, buf); pasn->sae.state = SAE_CONFIRMED; return buf; } static int wpas_pasn_sae_setup_pt(struct wpa_ssid *ssid, int group) { const char *password = ssid->sae_password; int groups[2] = { group, 0 }; if (!password) password = ssid->passphrase; if (!password) { wpa_printf(MSG_DEBUG, "PASN: SAE without a password"); return -1; } if (ssid->pt) return 0; /* PT already derived */ ssid->pt = sae_derive_pt(groups, ssid->ssid, ssid->ssid_len, (const u8 *) password, os_strlen(password), ssid->sae_password_id); return ssid->pt ? 0 : -1; } #endif /* CONFIG_SAE */ static int wpas_pasn_get_params_from_bss(struct wpa_supplicant *wpa_s, struct pasn_peer *peer) { int ret; const u8 *rsne, *rsnxe; struct wpa_bss *bss; struct wpa_ie_data rsne_data; int sel, key_mgmt, pairwise_cipher; int network_id = 0, group = 19; struct wpa_ssid *ssid = NULL; size_t ssid_str_len = 0; const u8 *ssid_str = NULL; const u8 *bssid = peer->peer_addr; bss = wpa_bss_get_bssid(wpa_s, bssid); if (!bss) { wpa_supplicant_update_scan_results(wpa_s); bss = wpa_bss_get_bssid(wpa_s, bssid); if (!bss) { wpa_printf(MSG_DEBUG, "PASN: BSS not found"); return -1; } } rsne = wpa_bss_get_ie(bss, WLAN_EID_RSN); if (!rsne) { wpa_printf(MSG_DEBUG, "PASN: BSS without RSNE"); return -1; } ret = wpa_parse_wpa_ie(rsne, *(rsne + 1) + 2, &rsne_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed parsing RSNE data"); return -1; } rsnxe = wpa_bss_get_ie(bss, WLAN_EID_RSNX); ssid_str_len = bss->ssid_len; ssid_str = bss->ssid; /* Get the network configuration based on the obtained SSID */ for (ssid = wpa_s->conf->ssid; ssid; ssid = ssid->next) { if (!wpas_network_disabled(wpa_s, ssid) && ssid_str_len == ssid->ssid_len && os_memcmp(ssid_str, ssid->ssid, ssid_str_len) == 0) break; } if (ssid) network_id = ssid->id; sel = rsne_data.pairwise_cipher; if (ssid && ssid->pairwise_cipher) sel &= ssid->pairwise_cipher; wpa_printf(MSG_DEBUG, "PASN: peer pairwise 0x%x, select 0x%x", rsne_data.pairwise_cipher, sel); pairwise_cipher = wpa_pick_pairwise_cipher(sel, 1); if (pairwise_cipher < 0) { wpa_msg(wpa_s, MSG_WARNING, "PASN: Failed to select pairwise cipher"); return -1; } sel = rsne_data.key_mgmt; if (ssid && ssid->key_mgmt) sel &= ssid->key_mgmt; wpa_printf(MSG_DEBUG, "PASN: peer AKMP 0x%x, select 0x%x", rsne_data.key_mgmt, sel); #ifdef CONFIG_SAE if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_SAE) || !ssid) sel &= ~(WPA_KEY_MGMT_SAE | WPA_KEY_MGMT_SAE_EXT_KEY | WPA_KEY_MGMT_FT_SAE | WPA_KEY_MGMT_FT_SAE_EXT_KEY); #endif /* CONFIG_SAE */ #ifdef CONFIG_IEEE80211R if (!(wpa_s->drv_flags & (WPA_DRIVER_FLAGS_SME | WPA_DRIVER_FLAGS_UPDATE_FT_IES))) sel &= ~WPA_KEY_MGMT_FT; #endif /* CONFIG_IEEE80211R */ if (0) { #ifdef CONFIG_IEEE80211R #ifdef CONFIG_SHA384 } else if ((sel & WPA_KEY_MGMT_FT_IEEE8021X_SHA384) && os_strcmp(wpa_supplicant_get_eap_mode(wpa_s), "LEAP") != 0) { key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X_SHA384; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FT/802.1X-SHA384"); if (ssid && !ssid->ft_eap_pmksa_caching && pmksa_cache_get_current(wpa_s->wpa)) { /* PMKSA caching with FT may have interoperability * issues, so disable that case by default for now. */ wpa_printf(MSG_DEBUG, "PASN: Disable PMKSA caching for FT/802.1X connection"); pmksa_cache_clear_current(wpa_s->wpa); } #endif /* CONFIG_SHA384 */ #endif /* CONFIG_IEEE80211R */ #ifdef CONFIG_SAE } else if ((sel & WPA_KEY_MGMT_SAE_EXT_KEY) && (ieee802_11_rsnx_capab(rsnxe, WLAN_RSNX_CAPAB_SAE_H2E)) && (wpas_pasn_sae_setup_pt(ssid, group) == 0)) { key_mgmt = WPA_KEY_MGMT_SAE_EXT_KEY; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT SAE (ext key)"); } else if ((sel & WPA_KEY_MGMT_SAE) && (ieee802_11_rsnx_capab(rsnxe, WLAN_RSNX_CAPAB_SAE_H2E)) && (wpas_pasn_sae_setup_pt(ssid, group) == 0)) { key_mgmt = WPA_KEY_MGMT_SAE; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT SAE"); #endif /* CONFIG_SAE */ #ifdef CONFIG_FILS } else if (sel & WPA_KEY_MGMT_FILS_SHA384) { key_mgmt = WPA_KEY_MGMT_FILS_SHA384; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FILS-SHA384"); } else if (sel & WPA_KEY_MGMT_FILS_SHA256) { key_mgmt = WPA_KEY_MGMT_FILS_SHA256; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FILS-SHA256"); #endif /* CONFIG_FILS */ #ifdef CONFIG_IEEE80211R } else if ((sel & WPA_KEY_MGMT_FT_IEEE8021X) && os_strcmp(wpa_supplicant_get_eap_mode(wpa_s), "LEAP") != 0) { key_mgmt = WPA_KEY_MGMT_FT_IEEE8021X; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FT/802.1X"); if (ssid && !ssid->ft_eap_pmksa_caching && pmksa_cache_get_current(wpa_s->wpa)) { /* PMKSA caching with FT may have interoperability * issues, so disable that case by default for now. */ wpa_printf(MSG_DEBUG, "PASN: Disable PMKSA caching for FT/802.1X connection"); pmksa_cache_clear_current(wpa_s->wpa); } } else if (sel & WPA_KEY_MGMT_FT_PSK) { key_mgmt = WPA_KEY_MGMT_FT_PSK; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT FT/PSK"); #endif /* CONFIG_IEEE80211R */ } else if (sel & WPA_KEY_MGMT_PASN) { key_mgmt = WPA_KEY_MGMT_PASN; wpa_printf(MSG_DEBUG, "PASN: using KEY_MGMT PASN"); } else { wpa_printf(MSG_DEBUG, "PASN: invalid AKMP"); return -1; } peer->akmp = key_mgmt; peer->cipher = pairwise_cipher; peer->network_id = network_id; peer->group = group; return 0; } static int wpas_pasn_set_keys_from_cache(struct wpa_supplicant *wpa_s, const u8 *own_addr, const u8 *bssid, int cipher, int akmp) { struct ptksa_cache_entry *entry; entry = ptksa_cache_get(wpa_s->ptksa, bssid, cipher); if (!entry) { wpa_printf(MSG_DEBUG, "PASN: peer " MACSTR " not present in PTKSA cache", MAC2STR(bssid)); return -1; } if (os_memcmp(entry->own_addr, own_addr, ETH_ALEN) != 0) { wpa_printf(MSG_DEBUG, "PASN: own addr " MACSTR " and PTKSA entry own addr " MACSTR " differ", MAC2STR(own_addr), MAC2STR(entry->own_addr)); return -1; } wpa_printf(MSG_DEBUG, "PASN: " MACSTR " present in PTKSA cache", MAC2STR(bssid)); wpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, bssid, cipher, entry->ptk.tk_len, entry->ptk.tk, entry->ptk.ltf_keyseed_len, entry->ptk.ltf_keyseed, 0); return 0; } static void wpas_pasn_configure_next_peer(struct wpa_supplicant *wpa_s, struct pasn_auth *pasn_params) { struct pasn_peer *peer; u8 comeback_len = 0; const u8 *comeback = NULL; if (!pasn_params) return; while (wpa_s->pasn_count < pasn_params->num_peers) { peer = &pasn_params->peer[wpa_s->pasn_count]; if (os_memcmp(wpa_s->bssid, peer->peer_addr, ETH_ALEN) == 0) { wpa_printf(MSG_DEBUG, "PASN: Associated peer is not expected"); peer->status = PASN_STATUS_FAILURE; wpa_s->pasn_count++; continue; } if (wpas_pasn_set_keys_from_cache(wpa_s, peer->own_addr, peer->peer_addr, peer->cipher, peer->akmp) == 0) { peer->status = PASN_STATUS_SUCCESS; wpa_s->pasn_count++; continue; } if (wpas_pasn_get_params_from_bss(wpa_s, peer)) { peer->status = PASN_STATUS_FAILURE; wpa_s->pasn_count++; continue; } if (wpas_pasn_auth_start(wpa_s, peer->own_addr, peer->peer_addr, peer->akmp, peer->cipher, peer->group, peer->network_id, comeback, comeback_len)) { peer->status = PASN_STATUS_FAILURE; wpa_s->pasn_count++; continue; } wpa_printf(MSG_DEBUG, "PASN: Sent PASN auth start for " MACSTR, MAC2STR(peer->peer_addr)); return; } if (wpa_s->pasn_count == pasn_params->num_peers) { wpa_drv_send_pasn_resp(wpa_s, pasn_params); wpa_printf(MSG_DEBUG, "PASN: Response sent"); os_free(wpa_s->pasn_params); wpa_s->pasn_params = NULL; } } void wpas_pasn_auth_work_done(struct wpa_supplicant *wpa_s, int status) { if (!wpa_s->pasn_params) return; wpa_s->pasn_params->peer[wpa_s->pasn_count].status = status; wpa_s->pasn_count++; wpas_pasn_configure_next_peer(wpa_s, wpa_s->pasn_params); } static void wpas_pasn_delete_peers(struct wpa_supplicant *wpa_s, struct pasn_auth *pasn_params) { struct pasn_peer *peer; unsigned int i; if (!pasn_params) return; for (i = 0; i < pasn_params->num_peers; i++) { peer = &pasn_params->peer[i]; wpas_pasn_deauthenticate(wpa_s, peer->own_addr, peer->peer_addr); } } #ifdef CONFIG_FILS static struct wpabuf * wpas_pasn_fils_build_auth(struct wpas_pasn *pasn) { struct wpabuf *buf = NULL; struct wpabuf *erp_msg; int ret; erp_msg = eapol_sm_build_erp_reauth_start(pasn->eapol); if (!erp_msg) { wpa_printf(MSG_DEBUG, "PASN: FILS: ERP EAP-Initiate/Re-auth unavailable"); return NULL; } if (random_get_bytes(pasn->fils.nonce, FILS_NONCE_LEN) < 0 || random_get_bytes(pasn->fils.session, FILS_SESSION_LEN) < 0) goto fail; wpa_hexdump(MSG_DEBUG, "PASN: FILS: Nonce", pasn->fils.nonce, FILS_NONCE_LEN); wpa_hexdump(MSG_DEBUG, "PASN: FILS: Session", pasn->fils.session, FILS_SESSION_LEN); buf = wpabuf_alloc(1500); if (!buf) goto fail; /* Add the authentication algorithm */ wpabuf_put_le16(buf, WLAN_AUTH_FILS_SK); /* Authentication Transaction seq# */ wpabuf_put_le16(buf, 1); /* Status Code */ wpabuf_put_le16(buf, WLAN_STATUS_SUCCESS); /* Own RSNE */ wpa_pasn_add_rsne(buf, NULL, pasn->akmp, pasn->cipher); /* FILS Nonce */ wpabuf_put_u8(buf, WLAN_EID_EXTENSION); wpabuf_put_u8(buf, 1 + FILS_NONCE_LEN); wpabuf_put_u8(buf, WLAN_EID_EXT_FILS_NONCE); wpabuf_put_data(buf, pasn->fils.nonce, FILS_NONCE_LEN); /* FILS Session */ wpabuf_put_u8(buf, WLAN_EID_EXTENSION); wpabuf_put_u8(buf, 1 + FILS_SESSION_LEN); wpabuf_put_u8(buf, WLAN_EID_EXT_FILS_SESSION); wpabuf_put_data(buf, pasn->fils.session, FILS_SESSION_LEN); /* Wrapped Data (ERP) */ wpabuf_put_u8(buf, WLAN_EID_EXTENSION); wpabuf_put_u8(buf, 1 + wpabuf_len(erp_msg)); wpabuf_put_u8(buf, WLAN_EID_EXT_WRAPPED_DATA); wpabuf_put_buf(buf, erp_msg); /* * Calculate pending PMKID here so that we do not need to maintain a * copy of the EAP-Initiate/Reauth message. */ ret = fils_pmkid_erp(pasn->akmp, wpabuf_head(erp_msg), wpabuf_len(erp_msg), pasn->fils.erp_pmkid); if (ret) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed to get ERP PMKID"); goto fail; } wpabuf_free(erp_msg); erp_msg = NULL; wpa_hexdump_buf(MSG_DEBUG, "PASN: FILS: Authentication frame", buf); return buf; fail: wpabuf_free(erp_msg); wpabuf_free(buf); return NULL; } static void wpas_pasn_initiate_eapol(struct wpas_pasn *pasn) { struct eapol_config eapol_conf; struct wpa_ssid *ssid = pasn->ssid; wpa_printf(MSG_DEBUG, "PASN: FILS: Initiating EAPOL"); eapol_sm_notify_eap_success(pasn->eapol, false); eapol_sm_notify_eap_fail(pasn->eapol, false); eapol_sm_notify_portControl(pasn->eapol, Auto); os_memset(&eapol_conf, 0, sizeof(eapol_conf)); eapol_conf.fast_reauth = pasn->fast_reauth; eapol_conf.workaround = ssid->eap_workaround; eapol_sm_notify_config(pasn->eapol, &ssid->eap, &eapol_conf); } static struct wpabuf * wpas_pasn_wd_fils_auth(struct wpas_pasn *pasn) { wpa_printf(MSG_DEBUG, "PASN: FILS: wrapped data - completed=%u", pasn->fils.completed); /* Nothing to add as we are done */ if (pasn->fils.completed) return NULL; if (!pasn->ssid) { wpa_printf(MSG_DEBUG, "PASN: FILS: No network block"); return NULL; } if (!pasn->fils_eapol) { wpa_printf(MSG_DEBUG, "PASN: FILS: Missing Indication IE or PFS"); return NULL; } wpas_pasn_initiate_eapol(pasn); return wpas_pasn_fils_build_auth(pasn); } static int wpas_pasn_wd_fils_rx(struct wpas_pasn *pasn, struct wpabuf *wd) { struct ieee802_11_elems elems; struct wpa_ie_data rsne_data; u8 rmsk[ERP_MAX_KEY_LEN]; size_t rmsk_len; u8 anonce[FILS_NONCE_LEN]; const u8 *data; size_t buf_len; struct wpabuf *fils_wd = NULL; u16 alg, seq, status; int ret; if (!wd) return -1; data = wpabuf_head(wd); buf_len = wpabuf_len(wd); wpa_hexdump(MSG_DEBUG, "PASN: FILS: Authentication frame len=%zu", data, buf_len); /* first handle the header */ if (buf_len < 6) { wpa_printf(MSG_DEBUG, "PASN: FILS: Buffer too short"); return -1; } alg = WPA_GET_LE16(data); seq = WPA_GET_LE16(data + 2); status = WPA_GET_LE16(data + 4); wpa_printf(MSG_DEBUG, "PASN: FILS: commit: alg=%u, seq=%u, status=%u", alg, seq, status); if (alg != WLAN_AUTH_FILS_SK || seq != 2 || status != WLAN_STATUS_SUCCESS) { wpa_printf(MSG_DEBUG, "PASN: FILS: Dropping peer authentication"); return -1; } data += 6; buf_len -= 6; if (ieee802_11_parse_elems(data, buf_len, &elems, 1) == ParseFailed) { wpa_printf(MSG_DEBUG, "PASN: FILS: Could not parse elements"); return -1; } if (!elems.rsn_ie || !elems.fils_nonce || !elems.fils_nonce || !elems.wrapped_data) { wpa_printf(MSG_DEBUG, "PASN: FILS: Missing IEs"); return -1; } ret = wpa_parse_wpa_ie(elems.rsn_ie - 2, elems.rsn_ie_len + 2, &rsne_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed parsing RNSE"); return -1; } ret = wpa_pasn_validate_rsne(&rsne_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed validating RSNE"); return -1; } if (rsne_data.num_pmkid) { wpa_printf(MSG_DEBUG, "PASN: FILS: Not expecting PMKID in RSNE"); return -1; } wpa_hexdump(MSG_DEBUG, "PASN: FILS: ANonce", elems.fils_nonce, FILS_NONCE_LEN); os_memcpy(anonce, elems.fils_nonce, FILS_NONCE_LEN); wpa_hexdump(MSG_DEBUG, "PASN: FILS: FILS Session", elems.fils_session, FILS_SESSION_LEN); if (os_memcmp(pasn->fils.session, elems.fils_session, FILS_SESSION_LEN)) { wpa_printf(MSG_DEBUG, "PASN: FILS: Session mismatch"); return -1; } fils_wd = ieee802_11_defrag(&elems, WLAN_EID_EXTENSION, WLAN_EID_EXT_WRAPPED_DATA); if (!fils_wd) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed getting wrapped data"); return -1; } eapol_sm_process_erp_finish(pasn->eapol, wpabuf_head(fils_wd), wpabuf_len(fils_wd)); wpabuf_free(fils_wd); fils_wd = NULL; if (eapol_sm_failed(pasn->eapol)) { wpa_printf(MSG_DEBUG, "PASN: FILS: ERP finish failed"); return -1; } rmsk_len = ERP_MAX_KEY_LEN; ret = eapol_sm_get_key(pasn->eapol, rmsk, rmsk_len); if (ret == PMK_LEN) { rmsk_len = PMK_LEN; ret = eapol_sm_get_key(pasn->eapol, rmsk, rmsk_len); } if (ret) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed getting RMSK"); return -1; } ret = fils_rmsk_to_pmk(pasn->akmp, rmsk, rmsk_len, pasn->fils.nonce, anonce, NULL, 0, pasn->pmk, &pasn->pmk_len); forced_memzero(rmsk, sizeof(rmsk)); if (ret) { wpa_printf(MSG_DEBUG, "PASN: FILS: Failed to derive PMK"); return -1; } wpa_hexdump(MSG_DEBUG, "PASN: FILS: PMKID", pasn->fils.erp_pmkid, PMKID_LEN); wpa_printf(MSG_DEBUG, "PASN: FILS: ERP processing succeeded"); pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk, pasn->pmk_len, pasn->fils.erp_pmkid, NULL, 0, pasn->bssid, pasn->own_addr, NULL, pasn->akmp, 0); pasn->fils.completed = true; return 0; } #endif /* CONFIG_FILS */ static struct wpabuf * wpas_pasn_get_wrapped_data(struct wpa_supplicant *wpa_s) { struct wpas_pasn *pasn = &wpa_s->pasn; if (pasn->using_pmksa) return NULL; switch (pasn->akmp) { case WPA_KEY_MGMT_PASN: /* no wrapped data */ return NULL; case WPA_KEY_MGMT_SAE: #ifdef CONFIG_SAE if (pasn->trans_seq == 0) return wpas_pasn_wd_sae_commit(pasn); if (pasn->trans_seq == 2) return wpas_pasn_wd_sae_confirm(pasn); #endif /* CONFIG_SAE */ wpa_printf(MSG_ERROR, "PASN: SAE: Cannot derive wrapped data"); return NULL; case WPA_KEY_MGMT_FILS_SHA256: case WPA_KEY_MGMT_FILS_SHA384: #ifdef CONFIG_FILS return wpas_pasn_wd_fils_auth(pasn); #endif /* CONFIG_FILS */ case WPA_KEY_MGMT_FT_PSK: case WPA_KEY_MGMT_FT_IEEE8021X: case WPA_KEY_MGMT_FT_IEEE8021X_SHA384: /* * Wrapped data with these AKMs is optional and is only needed * for further validation of FT security parameters. For now do * not use them. */ return NULL; default: wpa_printf(MSG_ERROR, "PASN: TODO: Wrapped data for akmp=0x%x", pasn->akmp); return NULL; } } static u8 wpas_pasn_get_wrapped_data_format(struct wpas_pasn *pasn) { if (pasn->using_pmksa) return WPA_PASN_WRAPPED_DATA_NO; /* Note: Valid AKMP is expected to already be validated */ switch (pasn->akmp) { case WPA_KEY_MGMT_SAE: return WPA_PASN_WRAPPED_DATA_SAE; case WPA_KEY_MGMT_FILS_SHA256: case WPA_KEY_MGMT_FILS_SHA384: return WPA_PASN_WRAPPED_DATA_FILS_SK; case WPA_KEY_MGMT_FT_PSK: case WPA_KEY_MGMT_FT_IEEE8021X: case WPA_KEY_MGMT_FT_IEEE8021X_SHA384: /* * Wrapped data with these AKMs is optional and is only needed * for further validation of FT security parameters. For now do * not use them. */ return WPA_PASN_WRAPPED_DATA_NO; case WPA_KEY_MGMT_PASN: default: return WPA_PASN_WRAPPED_DATA_NO; } } static struct wpabuf * wpas_pasn_build_auth_1(struct wpa_supplicant *wpa_s, const struct wpabuf *comeback) { struct wpas_pasn *pasn = &wpa_s->pasn; struct wpabuf *buf, *pubkey = NULL, *wrapped_data_buf = NULL; const u8 *pmkid; u8 wrapped_data; int ret; u16 capab; wpa_printf(MSG_DEBUG, "PASN: Building frame 1"); if (pasn->trans_seq) return NULL; buf = wpabuf_alloc(1500); if (!buf) goto fail; /* Get public key */ pubkey = crypto_ecdh_get_pubkey(pasn->ecdh, 0); pubkey = wpabuf_zeropad(pubkey, crypto_ecdh_prime_len(pasn->ecdh)); if (!pubkey) { wpa_printf(MSG_DEBUG, "PASN: Failed to get pubkey"); goto fail; } wrapped_data = wpas_pasn_get_wrapped_data_format(pasn); wpa_pasn_build_auth_header(buf, pasn->bssid, pasn->own_addr, pasn->bssid, pasn->trans_seq + 1, WLAN_STATUS_SUCCESS); pmkid = NULL; if (wpa_key_mgmt_ft(pasn->akmp)) { #ifdef CONFIG_IEEE80211R ret = wpa_pasn_ft_derive_pmk_r1(wpa_s->wpa, pasn->akmp, pasn->bssid, pasn->pmk_r1, &pasn->pmk_r1_len, pasn->pmk_r1_name); if (ret) { wpa_printf(MSG_DEBUG, "PASN: FT: Failed to derive keys"); goto fail; } pmkid = pasn->pmk_r1_name; #else /* CONFIG_IEEE80211R */ goto fail; #endif /* CONFIG_IEEE80211R */ } else if (wrapped_data != WPA_PASN_WRAPPED_DATA_NO) { struct rsn_pmksa_cache_entry *pmksa; pmksa = wpa_sm_pmksa_cache_get(wpa_s->wpa, pasn->bssid, NULL, NULL, pasn->akmp); if (pmksa) pmkid = pmksa->pmkid; /* * Note: Even when PMKSA is available, also add wrapped data as * it is possible that the PMKID is no longer valid at the AP. */ wrapped_data_buf = wpas_pasn_get_wrapped_data(wpa_s); } if (wpa_pasn_add_rsne(buf, pmkid, pasn->akmp, pasn->cipher) < 0) goto fail; if (!wrapped_data_buf) wrapped_data = WPA_PASN_WRAPPED_DATA_NO; wpa_pasn_add_parameter_ie(buf, pasn->group, wrapped_data, pubkey, true, comeback, -1); if (wpa_pasn_add_wrapped_data(buf, wrapped_data_buf) < 0) goto fail; /* Add own RNSXE */ capab = 0; capab |= BIT(WLAN_RSNX_CAPAB_SAE_H2E); if (wpa_s->drv_flags2 & WPA_DRIVER_FLAGS2_SEC_LTF_STA) capab |= BIT(WLAN_RSNX_CAPAB_SECURE_LTF); if (wpa_s->drv_flags2 & WPA_DRIVER_FLAGS2_SEC_RTT_STA) capab |= BIT(WLAN_RSNX_CAPAB_SECURE_RTT); if (wpa_s->drv_flags2 & WPA_DRIVER_FLAGS2_PROT_RANGE_NEG_STA) capab |= BIT(WLAN_RSNX_CAPAB_PROT_RANGE_NEG); wpa_pasn_add_rsnxe(buf, capab); ret = pasn_auth_frame_hash(pasn->akmp, pasn->cipher, wpabuf_head_u8(buf) + IEEE80211_HDRLEN, wpabuf_len(buf) - IEEE80211_HDRLEN, pasn->hash); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to compute hash"); goto fail; } pasn->trans_seq++; wpabuf_free(wrapped_data_buf); wpabuf_free(pubkey); wpa_printf(MSG_DEBUG, "PASN: Frame 1: Success"); return buf; fail: pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; wpabuf_free(wrapped_data_buf); wpabuf_free(pubkey); wpabuf_free(buf); return NULL; } static struct wpabuf * wpas_pasn_build_auth_3(struct wpa_supplicant *wpa_s) { struct wpas_pasn *pasn = &wpa_s->pasn; struct wpabuf *buf, *wrapped_data_buf = NULL; u8 mic[WPA_PASN_MAX_MIC_LEN]; u8 mic_len, data_len; const u8 *data; u8 *ptr; u8 wrapped_data; int ret; wpa_printf(MSG_DEBUG, "PASN: Building frame 3"); if (pasn->trans_seq != 2) return NULL; buf = wpabuf_alloc(1500); if (!buf) goto fail; wrapped_data = wpas_pasn_get_wrapped_data_format(pasn); wpa_pasn_build_auth_header(buf, pasn->bssid, pasn->own_addr, pasn->bssid, pasn->trans_seq + 1, WLAN_STATUS_SUCCESS); wrapped_data_buf = wpas_pasn_get_wrapped_data(wpa_s); if (!wrapped_data_buf) wrapped_data = WPA_PASN_WRAPPED_DATA_NO; wpa_pasn_add_parameter_ie(buf, pasn->group, wrapped_data, NULL, false, NULL, -1); if (wpa_pasn_add_wrapped_data(buf, wrapped_data_buf) < 0) goto fail; wpabuf_free(wrapped_data_buf); wrapped_data_buf = NULL; /* Add the MIC */ mic_len = pasn_mic_len(pasn->akmp, pasn->cipher); wpabuf_put_u8(buf, WLAN_EID_MIC); wpabuf_put_u8(buf, mic_len); ptr = wpabuf_put(buf, mic_len); os_memset(ptr, 0, mic_len); data = wpabuf_head_u8(buf) + IEEE80211_HDRLEN; data_len = wpabuf_len(buf) - IEEE80211_HDRLEN; ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, pasn->own_addr, pasn->bssid, pasn->hash, mic_len * 2, data, data_len, mic); if (ret) { wpa_printf(MSG_DEBUG, "PASN: frame 3: Failed MIC calculation"); goto fail; } #ifdef CONFIG_TESTING_OPTIONS if (pasn->corrupt_mic) { wpa_printf(MSG_DEBUG, "PASN: frame 3: Corrupt MIC"); mic[0] = ~mic[0]; } #endif /* CONFIG_TESTING_OPTIONS */ os_memcpy(ptr, mic, mic_len); pasn->trans_seq++; wpa_printf(MSG_DEBUG, "PASN: frame 3: Success"); return buf; fail: pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; wpabuf_free(wrapped_data_buf); wpabuf_free(buf); return NULL; } static void wpa_pasn_reset(struct wpas_pasn *pasn) { wpa_printf(MSG_DEBUG, "PASN: Reset"); crypto_ecdh_deinit(pasn->ecdh); pasn->ecdh = NULL; pasn->akmp = 0; pasn->cipher = 0; pasn->group = 0; pasn->trans_seq = 0; pasn->pmk_len = 0; pasn->using_pmksa = false; forced_memzero(pasn->pmk, sizeof(pasn->pmk)); forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); forced_memzero(&pasn->hash, sizeof(pasn->hash)); wpabuf_free(pasn->beacon_rsne_rsnxe); pasn->beacon_rsne_rsnxe = NULL; wpabuf_free(pasn->comeback); pasn->comeback = NULL; pasn->comeback_after = 0; #ifdef CONFIG_SAE sae_clear_data(&pasn->sae); #endif /* CONFIG_SAE */ #ifdef CONFIG_FILS pasn->fils_eapol = false; os_memset(&pasn->fils, 0, sizeof(pasn->fils)); #endif /* CONFIG_FILS*/ #ifdef CONFIG_IEEE80211R forced_memzero(pasn->pmk_r1, sizeof(pasn->pmk_r1)); pasn->pmk_r1_len = 0; os_memset(pasn->pmk_r1_name, 0, sizeof(pasn->pmk_r1_name)); #endif /* CONFIG_IEEE80211R */ pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; pasn->pmksa_entry = NULL; #ifdef CONFIG_TESTING_OPTIONS pasn->corrupt_mic = 0; #endif /* CONFIG_TESTING_OPTIONS */ } static void wpas_pasn_reset(struct wpa_supplicant *wpa_s) { struct wpas_pasn *pasn = &wpa_s->pasn; wpas_pasn_cancel_auth_work(wpa_s); wpa_s->pasn_auth_work = NULL; eloop_cancel_timeout(wpas_pasn_auth_work_timeout, wpa_s, NULL); wpa_pasn_reset(pasn); } static int wpas_pasn_set_pmk(struct wpa_supplicant *wpa_s, struct wpa_ie_data *rsn_data, struct wpa_pasn_params_data *pasn_data, struct wpabuf *wrapped_data) { static const u8 pasn_default_pmk[] = {'P', 'M', 'K', 'z'}; struct wpas_pasn *pasn = &wpa_s->pasn; os_memset(pasn->pmk, 0, sizeof(pasn->pmk)); pasn->pmk_len = 0; if (pasn->akmp == WPA_KEY_MGMT_PASN) { wpa_printf(MSG_DEBUG, "PASN: Using default PMK"); pasn->pmk_len = WPA_PASN_PMK_LEN; os_memcpy(pasn->pmk, pasn_default_pmk, sizeof(pasn_default_pmk)); return 0; } if (wpa_key_mgmt_ft(pasn->akmp)) { #ifdef CONFIG_IEEE80211R wpa_printf(MSG_DEBUG, "PASN: FT: Using PMK-R1"); pasn->pmk_len = pasn->pmk_r1_len; os_memcpy(pasn->pmk, pasn->pmk_r1, pasn->pmk_r1_len); pasn->using_pmksa = true; return 0; #else /* CONFIG_IEEE80211R */ wpa_printf(MSG_DEBUG, "PASN: FT: Not supported"); return -1; #endif /* CONFIG_IEEE80211R */ } if (rsn_data->num_pmkid) { struct rsn_pmksa_cache_entry *pmksa; pmksa = wpa_sm_pmksa_cache_get(wpa_s->wpa, pasn->bssid, rsn_data->pmkid, NULL, pasn->akmp); if (pmksa) { wpa_printf(MSG_DEBUG, "PASN: Using PMKSA"); pasn->pmk_len = pmksa->pmk_len; os_memcpy(pasn->pmk, pmksa->pmk, pmksa->pmk_len); pasn->using_pmksa = true; return 0; } } #ifdef CONFIG_SAE if (pasn->akmp == WPA_KEY_MGMT_SAE) { int ret; ret = wpas_pasn_wd_sae_rx(pasn, wrapped_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed processing SAE wrapped data"); pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; return -1; } wpa_printf(MSG_DEBUG, "PASN: Success deriving PMK with SAE"); pasn->pmk_len = PMK_LEN; os_memcpy(pasn->pmk, pasn->sae.pmk, PMK_LEN); pasn->pmksa_entry = pmksa_cache_add(pasn->pmksa, pasn->pmk, pasn->pmk_len, pasn->sae.pmkid, NULL, 0, pasn->bssid, pasn->own_addr, NULL, pasn->akmp, 0); return 0; } #endif /* CONFIG_SAE */ #ifdef CONFIG_FILS if (pasn->akmp == WPA_KEY_MGMT_FILS_SHA256 || pasn->akmp == WPA_KEY_MGMT_FILS_SHA384) { int ret; ret = wpas_pasn_wd_fils_rx(pasn, wrapped_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed processing FILS wrapped data"); pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; return -1; } return 0; } #endif /* CONFIG_FILS */ /* TODO: Derive PMK based on wrapped data */ wpa_printf(MSG_DEBUG, "PASN: Missing implementation to derive PMK"); pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; return -1; } static int wpas_pasn_start(struct wpa_supplicant *wpa_s, const u8 *own_addr, const u8 *bssid, int akmp, int cipher, u16 group, int freq, const u8 *beacon_rsne, u8 beacon_rsne_len, const u8 *beacon_rsnxe, u8 beacon_rsnxe_len, int network_id, struct wpabuf *comeback) { struct wpas_pasn *pasn = &wpa_s->pasn; struct wpa_ssid *ssid = NULL; struct wpabuf *frame; int ret; bool derive_kdk; /* TODO: Currently support only ECC groups */ if (!dragonfly_suitable_group(group, 1)) { wpa_printf(MSG_DEBUG, "PASN: Reject unsuitable group %u", group); return -1; } ssid = wpa_config_get_network(wpa_s->conf, network_id); switch (akmp) { case WPA_KEY_MGMT_PASN: break; #ifdef CONFIG_SAE case WPA_KEY_MGMT_SAE: if (!ssid) { wpa_printf(MSG_DEBUG, "PASN: No network profile found for SAE"); return -1; } if (!ieee802_11_rsnx_capab(beacon_rsnxe, WLAN_RSNX_CAPAB_SAE_H2E)) { wpa_printf(MSG_DEBUG, "PASN: AP does not support SAE H2E"); return -1; } if (wpas_pasn_sae_setup_pt(ssid, group) < 0) { wpa_printf(MSG_DEBUG, "PASN: Failed to derive PT"); return -1; } pasn->sae.state = SAE_NOTHING; pasn->sae.send_confirm = 0; pasn->ssid = ssid; break; #endif /* CONFIG_SAE */ #ifdef CONFIG_FILS case WPA_KEY_MGMT_FILS_SHA256: case WPA_KEY_MGMT_FILS_SHA384: pasn->ssid = ssid; break; #endif /* CONFIG_FILS */ #ifdef CONFIG_IEEE80211R case WPA_KEY_MGMT_FT_PSK: case WPA_KEY_MGMT_FT_IEEE8021X: case WPA_KEY_MGMT_FT_IEEE8021X_SHA384: break; #endif /* CONFIG_IEEE80211R */ default: wpa_printf(MSG_ERROR, "PASN: Unsupported AKMP=0x%x", akmp); return -1; } pasn->ecdh = crypto_ecdh_init(group); if (!pasn->ecdh) { wpa_printf(MSG_DEBUG, "PASN: Failed to init ECDH"); goto fail; } pasn->beacon_rsne_rsnxe = wpabuf_alloc(beacon_rsne_len + beacon_rsnxe_len); if (!pasn->beacon_rsne_rsnxe) { wpa_printf(MSG_DEBUG, "PASN: Failed storing beacon RSNE/RSNXE"); goto fail; } wpabuf_put_data(pasn->beacon_rsne_rsnxe, beacon_rsne, beacon_rsne_len); if (beacon_rsnxe && beacon_rsnxe_len) wpabuf_put_data(pasn->beacon_rsne_rsnxe, beacon_rsnxe, beacon_rsnxe_len); pasn->akmp = akmp; pasn->cipher = cipher; pasn->group = group; pasn->freq = freq; derive_kdk = (wpa_s->drv_flags2 & WPA_DRIVER_FLAGS2_SEC_LTF_STA) && ieee802_11_rsnx_capab(beacon_rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF); #ifdef CONFIG_TESTING_OPTIONS if (!derive_kdk) derive_kdk = wpa_s->conf->force_kdk_derivation; #endif /* CONFIG_TESTING_OPTIONS */ if (derive_kdk) pasn->kdk_len = WPA_KDK_MAX_LEN; else pasn->kdk_len = 0; wpa_printf(MSG_DEBUG, "PASN: kdk_len=%zu", pasn->kdk_len); if ((wpa_s->drv_flags2 & WPA_DRIVER_FLAGS2_SEC_LTF_STA) && ieee802_11_rsnx_capab(beacon_rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)) pasn->secure_ltf = true; else pasn->secure_ltf = false; os_memcpy(pasn->own_addr, own_addr, ETH_ALEN); os_memcpy(pasn->bssid, bssid, ETH_ALEN); wpa_printf(MSG_DEBUG, "PASN: Init: " MACSTR " akmp=0x%x, cipher=0x%x, group=%u", MAC2STR(pasn->bssid), pasn->akmp, pasn->cipher, pasn->group); frame = wpas_pasn_build_auth_1(wpa_s, comeback); if (!frame) { wpa_printf(MSG_DEBUG, "PASN: Failed building 1st auth frame"); goto fail; } ret = wpa_drv_send_mlme(wpa_s, wpabuf_head(frame), wpabuf_len(frame), 0, pasn->freq, 1000); wpabuf_free(frame); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed sending 1st auth frame"); goto fail; } eloop_register_timeout(2, 0, wpas_pasn_auth_work_timeout, wpa_s, NULL); return 0; fail: return -1; } static struct wpa_bss * wpas_pasn_allowed(struct wpa_supplicant *wpa_s, const u8 *bssid, int akmp, int cipher) { struct wpa_bss *bss; const u8 *rsne; struct wpa_ie_data rsne_data; int ret; if (os_memcmp(wpa_s->bssid, bssid, ETH_ALEN) == 0) { wpa_printf(MSG_DEBUG, "PASN: Not doing authentication with current BSS"); return NULL; } bss = wpa_bss_get_bssid(wpa_s, bssid); if (!bss) { wpa_printf(MSG_DEBUG, "PASN: BSS not found"); return NULL; } rsne = wpa_bss_get_ie(bss, WLAN_EID_RSN); if (!rsne) { wpa_printf(MSG_DEBUG, "PASN: BSS without RSNE"); return NULL; } ret = wpa_parse_wpa_ie(rsne, *(rsne + 1) + 2, &rsne_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed parsing RSNE data"); return NULL; } if (!(rsne_data.key_mgmt & akmp) || !(rsne_data.pairwise_cipher & cipher)) { wpa_printf(MSG_DEBUG, "PASN: AP does not support requested AKMP or cipher"); return NULL; } return bss; } static void wpas_pasn_auth_start_cb(struct wpa_radio_work *work, int deinit) { struct wpa_supplicant *wpa_s = work->wpa_s; struct wpa_pasn_auth_work *awork = work->ctx; struct wpas_pasn *pasn = &wpa_s->pasn; struct wpa_bss *bss; const u8 *rsne, *rsnxe; const u8 *indic; u16 fils_info; int ret; wpa_printf(MSG_DEBUG, "PASN: auth_start_cb: deinit=%d", deinit); if (deinit) { if (work->started) { eloop_cancel_timeout(wpas_pasn_auth_work_timeout, wpa_s, NULL); wpa_s->pasn_auth_work = NULL; } wpas_pasn_free_auth_work(awork); return; } /* * It is possible that by the time the callback is called, the PASN * authentication is not allowed, e.g., a connection with the AP was * established. */ bss = wpas_pasn_allowed(wpa_s, awork->bssid, awork->akmp, awork->cipher); if (!bss) { wpa_printf(MSG_DEBUG, "PASN: auth_start_cb: Not allowed"); goto fail; } rsne = wpa_bss_get_ie(bss, WLAN_EID_RSN); if (!rsne) { wpa_printf(MSG_DEBUG, "PASN: BSS without RSNE"); goto fail; } rsnxe = wpa_bss_get_ie(bss, WLAN_EID_RSNX); #ifdef CONFIG_TESTING_OPTIONS pasn->corrupt_mic = wpa_s->conf->pasn_corrupt_mic; #endif /* CONFIG_TESTING_OPTIONS */ #ifdef CONFIG_FILS /* Prepare needed information for wpas_pasn_wd_fils_auth(). */ if (awork->akmp == WPA_KEY_MGMT_FILS_SHA256 || awork->akmp == WPA_KEY_MGMT_FILS_SHA384) { indic = wpa_bss_get_ie(bss, WLAN_EID_FILS_INDICATION); if (!indic || indic[1] < 2) { wpa_printf(MSG_DEBUG, "PASN: Missing FILS Indication IE"); } else { fils_info = WPA_GET_LE16(indic + 2); if ((fils_info & BIT(9))) { pasn->eapol = wpa_s->eapol; pasn->fils_eapol = true; } else { wpa_printf(MSG_DEBUG, "PASN: FILS auth without PFS not supported"); } } pasn->fast_reauth = wpa_s->conf->fast_reauth; } #endif /* CONFIG_FILS */ pasn->pmksa = wpa_sm_get_pmksa_cache(wpa_s->wpa); ret = wpas_pasn_start(wpa_s, awork->own_addr, awork->bssid, awork->akmp, awork->cipher, awork->group, bss->freq, rsne, *(rsne + 1) + 2, rsnxe, rsnxe ? *(rsnxe + 1) + 2 : 0, awork->network_id, awork->comeback); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to start PASN authentication"); goto fail; } /* comeback token is no longer needed at this stage */ wpabuf_free(awork->comeback); awork->comeback = NULL; wpa_s->pasn_auth_work = work; return; fail: wpas_pasn_free_auth_work(awork); work->ctx = NULL; radio_work_done(work); } int wpas_pasn_auth_start(struct wpa_supplicant *wpa_s, const u8 *own_addr, const u8 *bssid, int akmp, int cipher, u16 group, int network_id, const u8 *comeback, size_t comeback_len) { struct wpa_pasn_auth_work *awork; struct wpa_bss *bss; wpa_printf(MSG_DEBUG, "PASN: Start: " MACSTR " akmp=0x%x, cipher=0x%x", MAC2STR(bssid), akmp, cipher); /* * TODO: Consider modifying the offchannel logic to handle additional * Management frames other then Action frames. For now allow PASN only * with drivers that support off-channel TX. */ if (!(wpa_s->drv_flags & WPA_DRIVER_FLAGS_OFFCHANNEL_TX)) { wpa_printf(MSG_DEBUG, "PASN: Driver does not support offchannel TX"); return -1; } if (radio_work_pending(wpa_s, "pasn-start-auth")) { wpa_printf(MSG_DEBUG, "PASN: send_auth: Work is already pending"); return -1; } if (wpa_s->pasn_auth_work) { wpa_printf(MSG_DEBUG, "PASN: send_auth: Already in progress"); return -1; } bss = wpas_pasn_allowed(wpa_s, bssid, akmp, cipher); if (!bss) return -1; wpas_pasn_reset(wpa_s); awork = os_zalloc(sizeof(*awork)); if (!awork) return -1; os_memcpy(awork->own_addr, own_addr, ETH_ALEN); os_memcpy(awork->bssid, bssid, ETH_ALEN); awork->akmp = akmp; awork->cipher = cipher; awork->group = group; awork->network_id = network_id; if (comeback && comeback_len) { awork->comeback = wpabuf_alloc_copy(comeback, comeback_len); if (!awork->comeback) { wpas_pasn_free_auth_work(awork); return -1; } } if (radio_add_work(wpa_s, bss->freq, "pasn-start-auth", 1, wpas_pasn_auth_start_cb, awork) < 0) { wpas_pasn_free_auth_work(awork); return -1; } wpa_printf(MSG_DEBUG, "PASN: Auth work successfully added"); return 0; } void wpas_pasn_auth_stop(struct wpa_supplicant *wpa_s) { struct wpas_pasn *pasn = &wpa_s->pasn; if (!wpa_s->pasn.ecdh) return; wpa_printf(MSG_DEBUG, "PASN: Stopping authentication"); wpas_pasn_auth_status(wpa_s, pasn->bssid, pasn->akmp, pasn->cipher, pasn->status, pasn->comeback, pasn->comeback_after); wpas_pasn_reset(wpa_s); } static int wpas_pasn_immediate_retry(struct wpa_supplicant *wpa_s, struct wpas_pasn *pasn, struct wpa_pasn_params_data *params) { int akmp = pasn->akmp; int cipher = pasn->cipher; u16 group = pasn->group; u8 own_addr[ETH_ALEN]; u8 bssid[ETH_ALEN]; int network_id = pasn->ssid ? pasn->ssid->id : 0; wpa_printf(MSG_DEBUG, "PASN: Immediate retry"); os_memcpy(own_addr, pasn->own_addr, ETH_ALEN); os_memcpy(bssid, pasn->bssid, ETH_ALEN); wpas_pasn_reset(wpa_s); return wpas_pasn_auth_start(wpa_s, own_addr, bssid, akmp, cipher, group, network_id, params->comeback, params->comeback_len); } static void wpas_pasn_deauth_cb(struct ptksa_cache_entry *entry) { struct wpa_supplicant *wpa_s = entry->ctx; wpas_pasn_deauthenticate(wpa_s, entry->own_addr, entry->addr); } int wpas_pasn_auth_rx(struct wpa_supplicant *wpa_s, const struct ieee80211_mgmt *mgmt, size_t len) { struct wpas_pasn *pasn = &wpa_s->pasn; struct ieee802_11_elems elems; struct wpa_ie_data rsn_data; struct wpa_pasn_params_data pasn_params; struct wpabuf *wrapped_data = NULL, *secret = NULL, *frame = NULL; u8 mic[WPA_PASN_MAX_MIC_LEN], out_mic[WPA_PASN_MAX_MIC_LEN]; u8 mic_len; u16 status; int ret, inc_y; u16 fc = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4)); if (!wpa_s->pasn_auth_work || !mgmt || len < offsetof(struct ieee80211_mgmt, u.auth.variable)) return -2; /* Not an Authentication frame; do nothing */ if ((mgmt->frame_control & fc) != fc) return -2; /* Not our frame; do nothing */ if (os_memcmp(mgmt->da, pasn->own_addr, ETH_ALEN) != 0 || os_memcmp(mgmt->sa, pasn->bssid, ETH_ALEN) != 0 || os_memcmp(mgmt->bssid, pasn->bssid, ETH_ALEN) != 0) return -2; /* Not PASN; do nothing */ if (mgmt->u.auth.auth_alg != host_to_le16(WLAN_AUTH_PASN)) return -2; if (mgmt->u.auth.auth_transaction != host_to_le16(pasn->trans_seq + 1)) { wpa_printf(MSG_DEBUG, "PASN: RX: Invalid transaction sequence: (%u != %u)", le_to_host16(mgmt->u.auth.auth_transaction), pasn->trans_seq + 1); return -1; } status = le_to_host16(mgmt->u.auth.status_code); if (status != WLAN_STATUS_SUCCESS && status != WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) { wpa_printf(MSG_DEBUG, "PASN: Authentication rejected - status=%u", status); goto fail; } if (ieee802_11_parse_elems(mgmt->u.auth.variable, len - offsetof(struct ieee80211_mgmt, u.auth.variable), &elems, 0) == ParseFailed) { wpa_printf(MSG_DEBUG, "PASN: Failed parsing Authentication frame"); goto fail; } /* Check that the MIC IE exists. Save it and zero out the memory */ mic_len = pasn_mic_len(pasn->akmp, pasn->cipher); if (status == WLAN_STATUS_SUCCESS) { if (!elems.mic || elems.mic_len != mic_len) { wpa_printf(MSG_DEBUG, "PASN: Invalid MIC. Expecting len=%u", mic_len); goto fail; } else { os_memcpy(mic, elems.mic, mic_len); /* TODO: Clean this up.. Should not be modifying the * received message buffer. */ os_memset((u8 *) elems.mic, 0, mic_len); } } if (!elems.pasn_params || !elems.pasn_params_len) { wpa_printf(MSG_DEBUG, "PASN: Missing PASN Parameters IE"); goto fail; } ret = wpa_pasn_parse_parameter_ie(elems.pasn_params - 3, elems.pasn_params_len + 3, true, &pasn_params); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed validation PASN of Parameters IE"); goto fail; } if (status == WLAN_STATUS_ASSOC_REJECTED_TEMPORARILY) { wpa_printf(MSG_DEBUG, "PASN: Authentication temporarily rejected"); if (pasn_params.comeback && pasn_params.comeback_len) { wpa_printf(MSG_DEBUG, "PASN: Comeback token available. After=%u", pasn_params.after); if (!pasn_params.after) return wpas_pasn_immediate_retry(wpa_s, pasn, &pasn_params); pasn->comeback = wpabuf_alloc_copy( pasn_params.comeback, pasn_params.comeback_len); if (pasn->comeback) pasn->comeback_after = pasn_params.after; } pasn->status = status; goto fail; } ret = wpa_parse_wpa_ie(elems.rsn_ie - 2, elems.rsn_ie_len + 2, &rsn_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed parsing RNSE"); goto fail; } ret = wpa_pasn_validate_rsne(&rsn_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed validating RSNE"); goto fail; } if (pasn->akmp != rsn_data.key_mgmt || pasn->cipher != rsn_data.pairwise_cipher) { wpa_printf(MSG_DEBUG, "PASN: Mismatch in AKMP/cipher"); goto fail; } if (pasn->group != pasn_params.group) { wpa_printf(MSG_DEBUG, "PASN: Mismatch in group"); goto fail; } if (!pasn_params.pubkey || !pasn_params.pubkey_len) { wpa_printf(MSG_DEBUG, "PASN: Invalid public key"); goto fail; } if (pasn_params.pubkey[0] == WPA_PASN_PUBKEY_UNCOMPRESSED) { inc_y = 1; } else if (pasn_params.pubkey[0] == WPA_PASN_PUBKEY_COMPRESSED_0 || pasn_params.pubkey[0] == WPA_PASN_PUBKEY_COMPRESSED_1) { inc_y = 0; } else { wpa_printf(MSG_DEBUG, "PASN: Invalid first octet in pubkey=0x%x", pasn_params.pubkey[0]); goto fail; } secret = crypto_ecdh_set_peerkey(pasn->ecdh, inc_y, pasn_params.pubkey + 1, pasn_params.pubkey_len - 1); if (!secret) { wpa_printf(MSG_DEBUG, "PASN: Failed to derive shared secret"); goto fail; } if (pasn_params.wrapped_data_format != WPA_PASN_WRAPPED_DATA_NO) { wrapped_data = ieee802_11_defrag(&elems, WLAN_EID_EXTENSION, WLAN_EID_EXT_WRAPPED_DATA); if (!wrapped_data) { wpa_printf(MSG_DEBUG, "PASN: Missing wrapped data"); goto fail; } } ret = wpas_pasn_set_pmk(wpa_s, &rsn_data, &pasn_params, wrapped_data); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to set PMK"); goto fail; } ret = pasn_pmk_to_ptk(pasn->pmk, pasn->pmk_len, pasn->own_addr, pasn->bssid, wpabuf_head(secret), wpabuf_len(secret), &pasn->ptk, pasn->akmp, pasn->cipher, pasn->kdk_len); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to derive PTK"); goto fail; } if (pasn->secure_ltf) { ret = wpa_ltf_keyseed(&pasn->ptk, pasn->akmp, pasn->cipher); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed to derive LTF keyseed"); goto fail; } } wpabuf_free(wrapped_data); wrapped_data = NULL; wpabuf_free(secret); secret = NULL; /* Verify the MIC */ ret = pasn_mic(pasn->ptk.kck, pasn->akmp, pasn->cipher, pasn->bssid, pasn->own_addr, wpabuf_head(pasn->beacon_rsne_rsnxe), wpabuf_len(pasn->beacon_rsne_rsnxe), (u8 *) &mgmt->u.auth, len - offsetof(struct ieee80211_mgmt, u.auth), out_mic); wpa_hexdump_key(MSG_DEBUG, "PASN: Frame MIC", mic, mic_len); if (ret || os_memcmp(mic, out_mic, mic_len) != 0) { wpa_printf(MSG_DEBUG, "PASN: Failed MIC verification"); goto fail; } pasn->trans_seq++; wpa_printf(MSG_DEBUG, "PASN: Success verifying Authentication frame"); frame = wpas_pasn_build_auth_3(wpa_s); if (!frame) { wpa_printf(MSG_DEBUG, "PASN: Failed building 3rd auth frame"); goto fail; } ret = wpa_drv_send_mlme(wpa_s, wpabuf_head(frame), wpabuf_len(frame), 0, pasn->freq, 100); wpabuf_free(frame); if (ret) { wpa_printf(MSG_DEBUG, "PASN: Failed sending 3st auth frame"); goto fail; } wpa_printf(MSG_DEBUG, "PASN: Success sending last frame. Store PTK"); ptksa_cache_add(wpa_s->ptksa, pasn->own_addr, pasn->bssid, pasn->cipher, dot11RSNAConfigPMKLifetime, &pasn->ptk, wpa_s->pasn_params ? wpas_pasn_deauth_cb : NULL, wpa_s->pasn_params ? wpa_s : NULL); forced_memzero(&pasn->ptk, sizeof(pasn->ptk)); pasn->status = WLAN_STATUS_SUCCESS; if (pasn->pmksa_entry) wpa_sm_set_cur_pmksa(wpa_s->wpa, pasn->pmksa_entry); return 0; fail: wpa_printf(MSG_DEBUG, "PASN: Failed RX processing - terminating"); wpabuf_free(wrapped_data); wpabuf_free(secret); /* * TODO: In case of an error the standard allows to silently drop * the frame and terminate the authentication exchange. However, better * reply to the AP with an error status. */ if (status == WLAN_STATUS_SUCCESS) pasn->status = WLAN_STATUS_UNSPECIFIED_FAILURE; else pasn->status = status; wpas_pasn_auth_stop(wpa_s); wpas_pasn_auth_work_done(wpa_s, PASN_STATUS_FAILURE); return -1; } void wpas_pasn_auth_trigger(struct wpa_supplicant *wpa_s, struct pasn_auth *pasn_auth) { struct pasn_peer *src, *dst; unsigned int i, num_peers = pasn_auth->num_peers; if (wpa_s->pasn_params) { wpa_printf(MSG_DEBUG, "PASN: auth_trigger: Already in progress"); return; } if (!num_peers || num_peers > WPAS_MAX_PASN_PEERS) { wpa_printf(MSG_DEBUG, "PASN: auth trigger: Invalid number of peers"); return; } wpa_s->pasn_params = os_zalloc(sizeof(struct pasn_auth)); if (!wpa_s->pasn_params) { wpa_printf(MSG_DEBUG, "PASN: auth trigger: Failed to allocate a buffer"); return; } wpa_s->pasn_count = 0; wpa_s->pasn_params->num_peers = num_peers; for (i = 0; i < num_peers; i++) { dst = &wpa_s->pasn_params->peer[i]; src = &pasn_auth->peer[i]; os_memcpy(dst->own_addr, wpa_s->own_addr, ETH_ALEN); os_memcpy(dst->peer_addr, src->peer_addr, ETH_ALEN); dst->ltf_keyseed_required = src->ltf_keyseed_required; dst->status = PASN_STATUS_SUCCESS; if (!is_zero_ether_addr(src->own_addr)) { os_memcpy(dst->own_addr, src->own_addr, ETH_ALEN); wpa_printf(MSG_DEBUG, "PASN: Own (source) MAC addr: " MACSTR, MAC2STR(dst->own_addr)); } } if (pasn_auth->action == PASN_ACTION_DELETE_SECURE_RANGING_CONTEXT) { wpas_pasn_delete_peers(wpa_s, wpa_s->pasn_params); os_free(wpa_s->pasn_params); wpa_s->pasn_params = NULL; } else if (pasn_auth->action == PASN_ACTION_AUTH) { wpas_pasn_configure_next_peer(wpa_s, wpa_s->pasn_params); } } static int wpa_pasn_auth_tx_status(struct wpas_pasn *pasn, const u8 *data, size_t data_len, u8 acked) { const struct ieee80211_mgmt *mgmt = (struct ieee80211_mgmt *) data; u16 fc = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_AUTH << 4)); wpa_printf(MSG_DEBUG, "PASN: auth_tx_status: acked=%u", acked); if (!mgmt || data_len < offsetof(struct ieee80211_mgmt, u.auth.variable)) return -1; /* Not an authentication frame; do nothing */ if ((mgmt->frame_control & fc) != fc) return -1; /* Not our frame; do nothing */ if (os_memcmp(mgmt->da, pasn->bssid, ETH_ALEN) || os_memcmp(mgmt->sa, pasn->own_addr, ETH_ALEN) || os_memcmp(mgmt->bssid, pasn->bssid, ETH_ALEN)) return -1; /* Not PASN; do nothing */ if (mgmt->u.auth.auth_alg != host_to_le16(WLAN_AUTH_PASN)) return -1; if (mgmt->u.auth.auth_transaction != host_to_le16(pasn->trans_seq)) { wpa_printf(MSG_ERROR, "PASN: Invalid transaction sequence: (%u != %u)", pasn->trans_seq, le_to_host16(mgmt->u.auth.auth_transaction)); return 0; } wpa_printf(MSG_ERROR, "PASN: auth with trans_seq=%u, acked=%u", pasn->trans_seq, acked); /* * Even if the frame was not acked, do not treat this is an error, and * try to complete the flow, relying on the PASN timeout callback to * clean up. */ if (pasn->trans_seq == 3) { wpa_printf(MSG_DEBUG, "PASN: auth complete with: " MACSTR, MAC2STR(pasn->bssid)); /* * Either frame was not ACKed or it was ACKed but the trans_seq * != 1, i.e., not expecting an RX frame, so we are done. */ return 1; } return 0; } int wpas_pasn_auth_tx_status(struct wpa_supplicant *wpa_s, const u8 *data, size_t data_len, u8 acked) { struct wpas_pasn *pasn = &wpa_s->pasn; int ret; if (!wpa_s->pasn_auth_work) { wpa_printf(MSG_DEBUG, "PASN: auth_tx_status: no work in progress"); return -1; } ret = wpa_pasn_auth_tx_status(pasn, data, data_len, acked); if (ret != 1) return ret; if (!wpa_s->pasn_params) { wpas_pasn_auth_stop(wpa_s); return 0; } wpas_pasn_set_keys_from_cache(wpa_s, pasn->own_addr, pasn->bssid, pasn->cipher, pasn->akmp); wpas_pasn_auth_stop(wpa_s); wpas_pasn_auth_work_done(wpa_s, PASN_STATUS_SUCCESS); return 0; } int wpas_pasn_deauthenticate(struct wpa_supplicant *wpa_s, const u8 *own_addr, const u8 *bssid) { struct wpa_bss *bss; struct wpabuf *buf; struct ieee80211_mgmt *deauth; int ret; if (os_memcmp(wpa_s->bssid, bssid, ETH_ALEN) == 0) { wpa_printf(MSG_DEBUG, "PASN: Cannot deauthenticate from current BSS"); return -1; } wpa_drv_set_secure_ranging_ctx(wpa_s, own_addr, bssid, 0, 0, NULL, 0, NULL, 1); wpa_printf(MSG_DEBUG, "PASN: deauth: Flushing all PTKSA entries for " MACSTR, MAC2STR(bssid)); ptksa_cache_flush(wpa_s->ptksa, bssid, WPA_CIPHER_NONE); bss = wpa_bss_get_bssid(wpa_s, bssid); if (!bss) { wpa_printf(MSG_DEBUG, "PASN: deauth: BSS not found"); return -1; } buf = wpabuf_alloc(64); if (!buf) { wpa_printf(MSG_DEBUG, "PASN: deauth: Failed wpabuf allocate"); return -1; } deauth = wpabuf_put(buf, offsetof(struct ieee80211_mgmt, u.deauth.variable)); deauth->frame_control = host_to_le16((WLAN_FC_TYPE_MGMT << 2) | (WLAN_FC_STYPE_DEAUTH << 4)); os_memcpy(deauth->da, bssid, ETH_ALEN); os_memcpy(deauth->sa, own_addr, ETH_ALEN); os_memcpy(deauth->bssid, bssid, ETH_ALEN); deauth->u.deauth.reason_code = host_to_le16(WLAN_REASON_PREV_AUTH_NOT_VALID); /* * Since we do not expect any response from the AP, implement the * Deauthentication frame transmission using direct call to the driver * without a radio work. */ ret = wpa_drv_send_mlme(wpa_s, wpabuf_head(buf), wpabuf_len(buf), 1, bss->freq, 0); wpabuf_free(buf); wpa_printf(MSG_DEBUG, "PASN: deauth: send_mlme ret=%d", ret); return ret; }