2009-01-15 00:21:55 +01:00
|
|
|
/*
|
|
|
|
* wpa_supplicant - IBSS RSN
|
2013-08-25 22:09:22 +02:00
|
|
|
* Copyright (c) 2009-2013, Jouni Malinen <j@w1.fi>
|
2009-01-15 00:21:55 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2009-01-15 00:21:55 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
|
|
|
|
|
|
|
#include "common.h"
|
2013-08-25 22:09:22 +02:00
|
|
|
#include "common/wpa_ctrl.h"
|
2013-08-27 15:26:33 +02:00
|
|
|
#include "utils/eloop.h"
|
2009-01-15 23:56:31 +01:00
|
|
|
#include "l2_packet/l2_packet.h"
|
2009-11-29 17:28:08 +01:00
|
|
|
#include "rsn_supp/wpa.h"
|
|
|
|
#include "rsn_supp/wpa_ie.h"
|
2009-12-26 09:35:08 +01:00
|
|
|
#include "ap/wpa_auth.h"
|
2009-12-25 00:12:50 +01:00
|
|
|
#include "wpa_supplicant_i.h"
|
2009-11-29 17:31:16 +01:00
|
|
|
#include "driver_i.h"
|
2013-07-21 14:56:53 +02:00
|
|
|
#include "common/ieee802_11_defs.h"
|
2009-01-15 00:21:55 +01:00
|
|
|
#include "ibss_rsn.h"
|
|
|
|
|
|
|
|
|
2013-08-27 15:26:33 +02:00
|
|
|
static void ibss_rsn_auth_timeout(void *eloop_ctx, void *timeout_ctx);
|
|
|
|
|
|
|
|
|
2012-01-29 11:23:27 +01:00
|
|
|
static struct ibss_rsn_peer * ibss_rsn_get_peer(struct ibss_rsn *ibss_rsn,
|
|
|
|
const u8 *addr)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
|
|
|
|
for (peer = ibss_rsn->peers; peer; peer = peer->next)
|
|
|
|
if (os_memcmp(addr, peer->addr, ETH_ALEN) == 0)
|
|
|
|
break;
|
|
|
|
return peer;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
static void ibss_rsn_free(struct ibss_rsn_peer *peer)
|
|
|
|
{
|
2013-08-27 15:26:33 +02:00
|
|
|
eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL);
|
2009-01-15 00:21:55 +01:00
|
|
|
wpa_auth_sta_deinit(peer->auth);
|
|
|
|
wpa_sm_deinit(peer->supp);
|
|
|
|
os_free(peer);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-26 09:35:08 +01:00
|
|
|
static void supp_set_state(void *ctx, enum wpa_states state)
|
2009-01-17 16:31:21 +01:00
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
peer->supp_state = state;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-16 15:27:08 +01:00
|
|
|
static enum wpa_states supp_get_state(void *ctx)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
return peer->supp_state;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
static int supp_ether_send(void *ctx, const u8 *dest, u16 proto, const u8 *buf,
|
|
|
|
size_t len)
|
|
|
|
{
|
2009-01-15 23:56:31 +01:00
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
struct wpa_supplicant *wpa_s = peer->ibss_rsn->wpa_s;
|
2020-01-03 16:17:42 +01:00
|
|
|
int encrypt = peer->authentication_status & IBSS_RSN_REPORTED_PTK;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2020-01-03 16:17:42 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s(dest=" MACSTR
|
|
|
|
" proto=0x%04x len=%lu no_encrypt=%d)",
|
|
|
|
__func__, MAC2STR(dest), proto, (unsigned long) len,
|
|
|
|
!encrypt);
|
2009-01-15 00:21:55 +01:00
|
|
|
|
wpa_supplicant: Send EAPOL frames over nl80211 where available
Linux kernel v4.17 added the ability to request sending control port
frames via nl80211 instead of a normal network socket. Doing this
provides the device driver with ordering information between the
control port frames and the installation of keys. This empowers it to
avoid race conditions between, for example, PTK replacement and the
sending of frame 4 of the 4-way rekeying handshake in an RSNA. The
key difference between a TX_CONTROL_PORT and normal socket send is
that the device driver will certainly get any EAPOL frames comprising
a 4-way handshake before it gets the key installation call
for the derived key. By flushing its TX buffers it can then ensure
that no pending EAPOL frames are inadvertently encrypted with a key
that the peer will not yet have installed.
Update the RSN supplicant system to use this new operation for sending
EAPOL-Key frames when the driver reports that this capability is
available; otherwise, fall back to a normal Ethernet TX.
I have tested this on DMG (11ad/ay) devices with an out-of-tree Linux
driver that does not use mac80211. Without this patch I consistently see
PTK rekeying fail if message 4/4 shares a stream with other in-flight
traffic. With this patch, and the driver updated to flush the relevant TX
queue before overwriting a PTK (knowing, now, that if there was a message
4/4 related to the key installation, it has already entered the driver
queue), rekeying is reliable.
There is still data loss surrounding key installation - this problem is
alluded to in IEEE Std 802.11-2016, 12.6.21, where extended Key ID
support is described as the eventual solution. This patch aims to at
least prevent rekeying from totally breaking the association, in a way
that works on kernels as far back as 4.17 (as per Alexander Wetzel
extended Key ID support should be possible on 5.2).
See http://lists.infradead.org/pipermail/hostap/2019-May/040089.html for
a little more context.
Signed-off-by: Brendan Jackman <brendan.jackman@bluwireless.co.uk>
2020-01-03 16:17:41 +01:00
|
|
|
if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_CONTROL_PORT)
|
2020-01-03 16:17:42 +01:00
|
|
|
return wpa_drv_tx_control_port(wpa_s, dest, proto, buf, len,
|
|
|
|
!encrypt);
|
wpa_supplicant: Send EAPOL frames over nl80211 where available
Linux kernel v4.17 added the ability to request sending control port
frames via nl80211 instead of a normal network socket. Doing this
provides the device driver with ordering information between the
control port frames and the installation of keys. This empowers it to
avoid race conditions between, for example, PTK replacement and the
sending of frame 4 of the 4-way rekeying handshake in an RSNA. The
key difference between a TX_CONTROL_PORT and normal socket send is
that the device driver will certainly get any EAPOL frames comprising
a 4-way handshake before it gets the key installation call
for the derived key. By flushing its TX buffers it can then ensure
that no pending EAPOL frames are inadvertently encrypted with a key
that the peer will not yet have installed.
Update the RSN supplicant system to use this new operation for sending
EAPOL-Key frames when the driver reports that this capability is
available; otherwise, fall back to a normal Ethernet TX.
I have tested this on DMG (11ad/ay) devices with an out-of-tree Linux
driver that does not use mac80211. Without this patch I consistently see
PTK rekeying fail if message 4/4 shares a stream with other in-flight
traffic. With this patch, and the driver updated to flush the relevant TX
queue before overwriting a PTK (knowing, now, that if there was a message
4/4 related to the key installation, it has already entered the driver
queue), rekeying is reliable.
There is still data loss surrounding key installation - this problem is
alluded to in IEEE Std 802.11-2016, 12.6.21, where extended Key ID
support is described as the eventual solution. This patch aims to at
least prevent rekeying from totally breaking the association, in a way
that works on kernels as far back as 4.17 (as per Alexander Wetzel
extended Key ID support should be possible on 5.2).
See http://lists.infradead.org/pipermail/hostap/2019-May/040089.html for
a little more context.
Signed-off-by: Brendan Jackman <brendan.jackman@bluwireless.co.uk>
2020-01-03 16:17:41 +01:00
|
|
|
|
2009-01-15 23:56:31 +01:00
|
|
|
if (wpa_s->l2)
|
|
|
|
return l2_packet_send(wpa_s->l2, dest, proto, buf, len);
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2014-12-11 14:40:07 +01:00
|
|
|
return -1;
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u8 * supp_alloc_eapol(void *ctx, u8 type, const void *data,
|
|
|
|
u16 data_len, size_t *msg_len, void **data_pos)
|
|
|
|
{
|
|
|
|
struct ieee802_1x_hdr *hdr;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s(type=%d data_len=%d)",
|
|
|
|
__func__, type, data_len);
|
|
|
|
|
|
|
|
*msg_len = sizeof(*hdr) + data_len;
|
|
|
|
hdr = os_malloc(*msg_len);
|
|
|
|
if (hdr == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
hdr->version = 2;
|
|
|
|
hdr->type = type;
|
|
|
|
hdr->length = host_to_be16(data_len);
|
|
|
|
|
|
|
|
if (data)
|
|
|
|
os_memcpy(hdr + 1, data, data_len);
|
|
|
|
else
|
|
|
|
os_memset(hdr + 1, 0, data_len);
|
|
|
|
|
|
|
|
if (data_pos)
|
|
|
|
*data_pos = hdr + 1;
|
|
|
|
|
|
|
|
return (u8 *) hdr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int supp_get_beacon_ie(void *ctx)
|
|
|
|
{
|
2009-01-17 16:39:57 +01:00
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
|
2009-01-17 16:39:57 +01:00
|
|
|
/* TODO: get correct RSN IE */
|
2019-09-06 13:51:31 +02:00
|
|
|
wpa_sm_set_ap_rsnxe(peer->supp, NULL, 0);
|
2009-01-17 16:39:57 +01:00
|
|
|
return wpa_sm_set_ap_rsn_ie(peer->supp,
|
|
|
|
(u8 *) "\x30\x14\x01\x00"
|
|
|
|
"\x00\x0f\xac\x04"
|
|
|
|
"\x01\x00\x00\x0f\xac\x04"
|
|
|
|
"\x01\x00\x00\x0f\xac\x02"
|
|
|
|
"\x00\x00", 22);
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-08-25 22:09:22 +02:00
|
|
|
static void ibss_check_rsn_completed(struct ibss_rsn_peer *peer)
|
|
|
|
{
|
|
|
|
struct wpa_supplicant *wpa_s = peer->ibss_rsn->wpa_s;
|
|
|
|
|
|
|
|
if ((peer->authentication_status &
|
|
|
|
(IBSS_RSN_SET_PTK_SUPP | IBSS_RSN_SET_PTK_AUTH)) !=
|
|
|
|
(IBSS_RSN_SET_PTK_SUPP | IBSS_RSN_SET_PTK_AUTH))
|
|
|
|
return;
|
|
|
|
if (peer->authentication_status & IBSS_RSN_REPORTED_PTK)
|
|
|
|
return;
|
|
|
|
peer->authentication_status |= IBSS_RSN_REPORTED_PTK;
|
|
|
|
wpa_msg(wpa_s, MSG_INFO, IBSS_RSN_COMPLETED MACSTR,
|
|
|
|
MAC2STR(peer->addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-26 09:35:08 +01:00
|
|
|
static int supp_set_key(void *ctx, enum wpa_alg alg,
|
2009-01-15 00:21:55 +01:00
|
|
|
const u8 *addr, int key_idx, int set_tx,
|
|
|
|
const u8 *seq, size_t seq_len,
|
2020-01-04 23:10:04 +01:00
|
|
|
const u8 *key, size_t key_len, enum key_flag key_flag)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
2009-01-17 17:14:41 +01:00
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
|
2009-12-04 21:55:28 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s(alg=%d addr=" MACSTR " key_idx=%d "
|
|
|
|
"set_tx=%d)",
|
|
|
|
__func__, alg, MAC2STR(addr), key_idx, set_tx);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "SUPP: set_key - seq", seq, seq_len);
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "SUPP: set_key - key", key, key_len);
|
|
|
|
|
2009-01-17 17:14:41 +01:00
|
|
|
if (key_idx == 0) {
|
2013-08-25 22:09:22 +02:00
|
|
|
peer->authentication_status |= IBSS_RSN_SET_PTK_SUPP;
|
|
|
|
ibss_check_rsn_completed(peer);
|
2009-01-17 17:14:41 +01:00
|
|
|
/*
|
|
|
|
* In IBSS RSN, the pairwise key from the 4-way handshake
|
|
|
|
* initiated by the peer with highest MAC address is used.
|
|
|
|
*/
|
|
|
|
if (os_memcmp(peer->ibss_rsn->wpa_s->own_addr, peer->addr,
|
2009-12-04 21:55:28 +01:00
|
|
|
ETH_ALEN) > 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: Do not use this PTK");
|
2009-01-17 17:14:41 +01:00
|
|
|
return 0;
|
2009-12-04 21:55:28 +01:00
|
|
|
}
|
2009-01-17 17:14:41 +01:00
|
|
|
}
|
|
|
|
|
2011-04-14 19:18:12 +02:00
|
|
|
if (is_broadcast_ether_addr(addr))
|
2010-12-05 05:31:22 +01:00
|
|
|
addr = peer->addr;
|
2009-01-17 17:14:41 +01:00
|
|
|
return wpa_drv_set_key(peer->ibss_rsn->wpa_s, alg, addr, key_idx,
|
2020-01-04 23:10:04 +01:00
|
|
|
set_tx, seq, seq_len, key, key_len, key_flag);
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-17 16:31:21 +01:00
|
|
|
static void * supp_get_network_ctx(void *ctx)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer = ctx;
|
|
|
|
return wpa_supplicant_get_ssid(peer->ibss_rsn->wpa_s);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
static int supp_mlme_setprotection(void *ctx, const u8 *addr,
|
|
|
|
int protection_type, int key_type)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s(addr=" MACSTR " protection_type=%d "
|
|
|
|
"key_type=%d)",
|
|
|
|
__func__, MAC2STR(addr), protection_type, key_type);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void supp_cancel_auth_timeout(void *ctx)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s", __func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2019-04-22 19:17:38 +02:00
|
|
|
static void supp_deauthenticate(void * ctx, u16 reason_code)
|
2010-12-05 05:31:22 +01:00
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: %s (TODO)", __func__);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-11-18 20:53:36 +01:00
|
|
|
static int ibss_rsn_supp_init(struct ibss_rsn_peer *peer, const u8 *own_addr,
|
|
|
|
const u8 *psk)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
|
|
|
struct wpa_sm_ctx *ctx = os_zalloc(sizeof(*ctx));
|
|
|
|
if (ctx == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
ctx->ctx = peer;
|
2009-01-17 16:54:40 +01:00
|
|
|
ctx->msg_ctx = peer->ibss_rsn->wpa_s;
|
2009-01-17 16:31:21 +01:00
|
|
|
ctx->set_state = supp_set_state;
|
2011-03-16 15:27:08 +01:00
|
|
|
ctx->get_state = supp_get_state;
|
2009-01-15 00:21:55 +01:00
|
|
|
ctx->ether_send = supp_ether_send;
|
|
|
|
ctx->get_beacon_ie = supp_get_beacon_ie;
|
|
|
|
ctx->alloc_eapol = supp_alloc_eapol;
|
|
|
|
ctx->set_key = supp_set_key;
|
2009-01-17 16:31:21 +01:00
|
|
|
ctx->get_network_ctx = supp_get_network_ctx;
|
2009-01-15 00:21:55 +01:00
|
|
|
ctx->mlme_setprotection = supp_mlme_setprotection;
|
|
|
|
ctx->cancel_auth_timeout = supp_cancel_auth_timeout;
|
2010-12-05 05:31:22 +01:00
|
|
|
ctx->deauthenticate = supp_deauthenticate;
|
2009-01-15 00:21:55 +01:00
|
|
|
peer->supp = wpa_sm_init(ctx);
|
|
|
|
if (peer->supp == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_init() failed");
|
2016-08-13 20:29:53 +02:00
|
|
|
os_free(ctx);
|
2009-01-15 00:21:55 +01:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_sm_set_own_addr(peer->supp, own_addr);
|
|
|
|
wpa_sm_set_param(peer->supp, WPA_PARAM_RSN_ENABLED, 1);
|
|
|
|
wpa_sm_set_param(peer->supp, WPA_PARAM_PROTO, WPA_PROTO_RSN);
|
|
|
|
wpa_sm_set_param(peer->supp, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP);
|
|
|
|
wpa_sm_set_param(peer->supp, WPA_PARAM_GROUP, WPA_CIPHER_CCMP);
|
|
|
|
wpa_sm_set_param(peer->supp, WPA_PARAM_KEY_MGMT, WPA_KEY_MGMT_PSK);
|
2016-02-15 03:23:37 +01:00
|
|
|
wpa_sm_set_pmk(peer->supp, psk, PMK_LEN, NULL, NULL);
|
2009-01-15 00:21:55 +01:00
|
|
|
|
|
|
|
peer->supp_ie_len = sizeof(peer->supp_ie);
|
|
|
|
if (wpa_sm_set_assoc_wpa_ie_default(peer->supp, peer->supp_ie,
|
|
|
|
&peer->supp_ie_len) < 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "SUPP: wpa_sm_set_assoc_wpa_ie_default()"
|
|
|
|
" failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_sm_notify_assoc(peer->supp, peer->addr);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void auth_logger(void *ctx, const u8 *addr, logger_level level,
|
|
|
|
const char *txt)
|
|
|
|
{
|
|
|
|
if (addr)
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " - %s",
|
|
|
|
MAC2STR(addr), txt);
|
|
|
|
else
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: %s", txt);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-09-01 10:30:26 +02:00
|
|
|
static const u8 * auth_get_psk(void *ctx, const u8 *addr,
|
2017-10-08 15:37:32 +02:00
|
|
|
const u8 *p2p_dev_addr, const u8 *prev_psk,
|
2019-02-14 12:34:33 +01:00
|
|
|
size_t *psk_len, int *vlan_id)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
2017-10-08 15:37:32 +02:00
|
|
|
|
|
|
|
if (psk_len)
|
|
|
|
*psk_len = PMK_LEN;
|
2019-02-14 12:34:33 +01:00
|
|
|
if (vlan_id)
|
|
|
|
*vlan_id = 0;
|
2009-01-15 00:21:55 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: %s (addr=" MACSTR " prev_psk=%p)",
|
|
|
|
__func__, MAC2STR(addr), prev_psk);
|
|
|
|
if (prev_psk)
|
|
|
|
return NULL;
|
|
|
|
return ibss_rsn->psk;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int auth_send_eapol(void *ctx, const u8 *addr, const u8 *data,
|
|
|
|
size_t data_len, int encrypt)
|
|
|
|
{
|
2009-01-16 00:18:11 +01:00
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
|
|
|
struct wpa_supplicant *wpa_s = ibss_rsn->wpa_s;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: %s(addr=" MACSTR " data_len=%lu "
|
|
|
|
"encrypt=%d)",
|
|
|
|
__func__, MAC2STR(addr), (unsigned long) data_len, encrypt);
|
|
|
|
|
2020-01-06 16:21:07 +01:00
|
|
|
if (wpa_s->drv_flags & WPA_DRIVER_FLAGS_CONTROL_PORT)
|
|
|
|
return wpa_drv_tx_control_port(wpa_s, addr, ETH_P_EAPOL,
|
|
|
|
data, data_len, !encrypt);
|
|
|
|
|
2009-01-15 23:56:31 +01:00
|
|
|
if (wpa_s->l2)
|
|
|
|
return l2_packet_send(wpa_s->l2, addr, ETH_P_EAPOL, data,
|
|
|
|
data_len);
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2014-12-11 14:40:07 +01:00
|
|
|
return -1;
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-26 09:35:08 +01:00
|
|
|
static int auth_set_key(void *ctx, int vlan_id, enum wpa_alg alg,
|
2020-01-04 23:10:04 +01:00
|
|
|
const u8 *addr, int idx, u8 *key, size_t key_len,
|
|
|
|
enum key_flag key_flag)
|
2009-01-17 17:14:41 +01:00
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
|
|
|
u8 seq[6];
|
|
|
|
|
|
|
|
os_memset(seq, 0, sizeof(seq));
|
2009-12-04 21:55:28 +01:00
|
|
|
|
|
|
|
if (addr) {
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d addr=" MACSTR
|
|
|
|
" key_idx=%d)",
|
|
|
|
__func__, alg, MAC2STR(addr), idx);
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: %s(alg=%d key_idx=%d)",
|
|
|
|
__func__, alg, idx);
|
|
|
|
}
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "AUTH: set_key - key", key, key_len);
|
|
|
|
|
2009-01-17 17:14:41 +01:00
|
|
|
if (idx == 0) {
|
2013-08-25 22:09:22 +02:00
|
|
|
if (addr) {
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
peer = ibss_rsn_get_peer(ibss_rsn, addr);
|
|
|
|
if (peer) {
|
|
|
|
peer->authentication_status |=
|
|
|
|
IBSS_RSN_SET_PTK_AUTH;
|
|
|
|
ibss_check_rsn_completed(peer);
|
|
|
|
}
|
|
|
|
}
|
2009-01-17 17:14:41 +01:00
|
|
|
/*
|
|
|
|
* In IBSS RSN, the pairwise key from the 4-way handshake
|
|
|
|
* initiated by the peer with highest MAC address is used.
|
|
|
|
*/
|
2010-01-10 20:53:17 +01:00
|
|
|
if (addr == NULL ||
|
|
|
|
os_memcmp(ibss_rsn->wpa_s->own_addr, addr, ETH_ALEN) < 0) {
|
2009-12-04 21:55:28 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: Do not use this PTK");
|
2009-01-17 17:14:41 +01:00
|
|
|
return 0;
|
2009-12-04 21:55:28 +01:00
|
|
|
}
|
2009-01-17 17:14:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return wpa_drv_set_key(ibss_rsn->wpa_s, alg, addr, idx,
|
2020-01-04 23:10:04 +01:00
|
|
|
1, seq, 6, key, key_len, key_flag);
|
2009-01-17 17:14:41 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-06-07 12:07:17 +02:00
|
|
|
static void ibss_rsn_disconnect(void *ctx, const u8 *addr, u16 reason)
|
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
|
|
|
wpa_drv_sta_deauth(ibss_rsn->wpa_s, addr, reason);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-16 15:28:32 +01:00
|
|
|
static int auth_for_each_sta(void *ctx, int (*cb)(struct wpa_state_machine *sm,
|
|
|
|
void *ctx),
|
|
|
|
void *cb_ctx)
|
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: for_each_sta");
|
|
|
|
|
|
|
|
for (peer = ibss_rsn->peers; peer; peer = peer->next) {
|
|
|
|
if (peer->auth && cb(peer->auth, cb_ctx))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-02-12 17:08:34 +01:00
|
|
|
static void ibss_set_sta_authorized(struct ibss_rsn *ibss_rsn,
|
|
|
|
struct ibss_rsn_peer *peer, int authorized)
|
|
|
|
{
|
|
|
|
int res;
|
|
|
|
|
|
|
|
if (authorized) {
|
|
|
|
res = wpa_drv_sta_set_flags(ibss_rsn->wpa_s, peer->addr,
|
|
|
|
WPA_STA_AUTHORIZED,
|
|
|
|
WPA_STA_AUTHORIZED, ~0);
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " authorizing port",
|
|
|
|
MAC2STR(peer->addr));
|
|
|
|
} else {
|
|
|
|
res = wpa_drv_sta_set_flags(ibss_rsn->wpa_s, peer->addr,
|
|
|
|
0, 0, ~WPA_STA_AUTHORIZED);
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: " MACSTR " unauthorizing port",
|
|
|
|
MAC2STR(peer->addr));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (res && errno != ENOENT) {
|
|
|
|
wpa_printf(MSG_DEBUG, "Could not set station " MACSTR " flags "
|
|
|
|
"for kernel driver (errno=%d)",
|
|
|
|
MAC2STR(peer->addr), errno);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void auth_set_eapol(void *ctx, const u8 *addr,
|
|
|
|
wpa_eapol_variable var, int value)
|
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn = ctx;
|
|
|
|
struct ibss_rsn_peer *peer = ibss_rsn_get_peer(ibss_rsn, addr);
|
|
|
|
|
|
|
|
if (peer == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
switch (var) {
|
|
|
|
case WPA_EAPOL_authorized:
|
|
|
|
ibss_set_sta_authorized(ibss_rsn, peer, value);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
/* do not handle any other event */
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: eapol event not handled %d", var);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
static int ibss_rsn_auth_init_group(struct ibss_rsn *ibss_rsn,
|
2016-08-13 15:22:53 +02:00
|
|
|
const u8 *own_addr, struct wpa_ssid *ssid)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
|
|
|
struct wpa_auth_config conf;
|
2017-01-26 16:24:06 +01:00
|
|
|
static const struct wpa_auth_callbacks cb = {
|
|
|
|
.logger = auth_logger,
|
|
|
|
.set_eapol = auth_set_eapol,
|
|
|
|
.send_eapol = auth_send_eapol,
|
|
|
|
.get_psk = auth_get_psk,
|
|
|
|
.set_key = auth_set_key,
|
|
|
|
.for_each_sta = auth_for_each_sta,
|
|
|
|
.disconnect = ibss_rsn_disconnect,
|
|
|
|
};
|
2009-01-15 00:21:55 +01:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: Initializing group state machine");
|
|
|
|
|
|
|
|
os_memset(&conf, 0, sizeof(conf));
|
|
|
|
conf.wpa = 2;
|
|
|
|
conf.wpa_key_mgmt = WPA_KEY_MGMT_PSK;
|
|
|
|
conf.wpa_pairwise = WPA_CIPHER_CCMP;
|
|
|
|
conf.rsn_pairwise = WPA_CIPHER_CCMP;
|
|
|
|
conf.wpa_group = WPA_CIPHER_CCMP;
|
|
|
|
conf.eapol_version = 2;
|
2016-08-13 15:22:53 +02:00
|
|
|
conf.wpa_group_rekey = ssid->group_rekey ? ssid->group_rekey : 600;
|
2017-01-05 17:00:33 +01:00
|
|
|
conf.wpa_group_update_count = 4;
|
|
|
|
conf.wpa_pairwise_update_count = 4;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2017-01-26 16:24:06 +01:00
|
|
|
ibss_rsn->auth_group = wpa_init(own_addr, &conf, &cb, ibss_rsn);
|
2009-01-15 00:21:55 +01:00
|
|
|
if (ibss_rsn->auth_group == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: wpa_init() failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2011-12-11 18:57:50 +01:00
|
|
|
wpa_init_keys(ibss_rsn->auth_group);
|
|
|
|
|
2009-01-15 00:21:55 +01:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int ibss_rsn_auth_init(struct ibss_rsn *ibss_rsn,
|
|
|
|
struct ibss_rsn_peer *peer)
|
|
|
|
{
|
2013-09-01 10:05:19 +02:00
|
|
|
peer->auth = wpa_auth_sta_init(ibss_rsn->auth_group, peer->addr, NULL);
|
2009-01-15 00:21:55 +01:00
|
|
|
if (peer->auth == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: wpa_auth_sta_init() failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2009-01-16 00:11:50 +01:00
|
|
|
/* TODO: get peer RSN IE with Probe Request */
|
2019-02-06 11:33:35 +01:00
|
|
|
if (wpa_validate_wpa_ie(ibss_rsn->auth_group, peer->auth, 0,
|
2009-01-17 16:39:57 +01:00
|
|
|
(u8 *) "\x30\x14\x01\x00"
|
2009-01-16 00:11:50 +01:00
|
|
|
"\x00\x0f\xac\x04"
|
|
|
|
"\x01\x00\x00\x0f\xac\x04"
|
2009-01-17 16:39:57 +01:00
|
|
|
"\x01\x00\x00\x0f\xac\x02"
|
2019-10-17 23:11:24 +02:00
|
|
|
"\x00\x00", 22, NULL, 0, NULL, 0, NULL, 0) !=
|
2009-01-16 00:11:50 +01:00
|
|
|
WPA_IE_OK) {
|
2009-01-15 00:21:55 +01:00
|
|
|
wpa_printf(MSG_DEBUG, "AUTH: wpa_validate_wpa_ie() failed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2010-01-10 20:45:44 +01:00
|
|
|
if (wpa_auth_sm_event(peer->auth, WPA_ASSOC))
|
|
|
|
return -1;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2010-01-10 20:45:44 +01:00
|
|
|
if (wpa_auth_sta_associated(ibss_rsn->auth_group, peer->auth))
|
|
|
|
return -1;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
static int ibss_rsn_send_auth(struct ibss_rsn *ibss_rsn, const u8 *da, int seq)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
2013-07-21 14:56:53 +02:00
|
|
|
struct ieee80211_mgmt auth;
|
|
|
|
const size_t auth_length = IEEE80211_HDRLEN + sizeof(auth.u.auth);
|
|
|
|
struct wpa_supplicant *wpa_s = ibss_rsn->wpa_s;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
os_memset(&auth, 0, sizeof(auth));
|
|
|
|
|
|
|
|
auth.frame_control = IEEE80211_FC(WLAN_FC_TYPE_MGMT,
|
|
|
|
WLAN_FC_STYPE_AUTH);
|
|
|
|
os_memcpy(auth.da, da, ETH_ALEN);
|
|
|
|
os_memcpy(auth.sa, wpa_s->own_addr, ETH_ALEN);
|
|
|
|
os_memcpy(auth.bssid, wpa_s->bssid, ETH_ALEN);
|
|
|
|
|
|
|
|
auth.u.auth.auth_alg = host_to_le16(WLAN_AUTH_OPEN);
|
|
|
|
auth.u.auth.auth_transaction = host_to_le16(seq);
|
|
|
|
auth.u.auth.status_code = host_to_le16(WLAN_STATUS_SUCCESS);
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS TX Auth frame (SEQ %d) to " MACSTR,
|
|
|
|
seq, MAC2STR(da));
|
|
|
|
|
2020-01-03 11:21:36 +01:00
|
|
|
return wpa_drv_send_mlme(wpa_s, (u8 *) &auth, auth_length, 0, 0);
|
2013-07-21 14:56:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int ibss_rsn_is_auth_started(struct ibss_rsn_peer * peer)
|
|
|
|
{
|
|
|
|
return peer->authentication_status &
|
|
|
|
(IBSS_RSN_AUTH_BY_US | IBSS_RSN_AUTH_EAPOL_BY_US);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct ibss_rsn_peer *
|
|
|
|
ibss_rsn_peer_init(struct ibss_rsn *ibss_rsn, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
peer = ibss_rsn_get_peer(ibss_rsn, addr);
|
|
|
|
if (peer) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Supplicant for peer "MACSTR
|
|
|
|
" already running", MAC2STR(addr));
|
|
|
|
return peer;
|
2011-01-15 15:55:15 +01:00
|
|
|
}
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Starting IBSS Supplicant for peer "MACSTR,
|
|
|
|
MAC2STR(addr));
|
2009-01-15 00:21:55 +01:00
|
|
|
|
|
|
|
peer = os_zalloc(sizeof(*peer));
|
2013-07-21 14:56:53 +02:00
|
|
|
if (peer == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Could not allocate memory.");
|
|
|
|
return NULL;
|
|
|
|
}
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2009-01-15 23:56:31 +01:00
|
|
|
peer->ibss_rsn = ibss_rsn;
|
2009-01-15 00:21:55 +01:00
|
|
|
os_memcpy(peer->addr, addr, ETH_ALEN);
|
2013-07-21 14:56:53 +02:00
|
|
|
peer->authentication_status = IBSS_RSN_AUTH_NOT_AUTHENTICATED;
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
if (ibss_rsn_supp_init(peer, ibss_rsn->wpa_s->own_addr,
|
|
|
|
ibss_rsn->psk) < 0) {
|
2009-01-15 00:21:55 +01:00
|
|
|
ibss_rsn_free(peer);
|
2013-07-21 14:56:53 +02:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
peer->next = ibss_rsn->peers;
|
|
|
|
ibss_rsn->peers = peer;
|
|
|
|
|
|
|
|
return peer;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-08-27 15:26:33 +02:00
|
|
|
static void ibss_rsn_auth_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer = eloop_ctx;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Assume peer does not support Authentication exchange or the frame was
|
|
|
|
* lost somewhere - start EAPOL Authenticator.
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"RSN: Timeout on waiting Authentication frame response from "
|
|
|
|
MACSTR " - start authenticator", MAC2STR(peer->addr));
|
|
|
|
|
|
|
|
peer->authentication_status |= IBSS_RSN_AUTH_BY_US;
|
|
|
|
ibss_rsn_auth_init(peer->ibss_rsn, peer);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
int ibss_rsn_start(struct ibss_rsn *ibss_rsn, const u8 *addr)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
int res;
|
|
|
|
|
2015-05-01 16:14:16 +02:00
|
|
|
if (!ibss_rsn)
|
|
|
|
return -1;
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
/* if the peer already exists, exit immediately */
|
|
|
|
peer = ibss_rsn_get_peer(ibss_rsn, addr);
|
|
|
|
if (peer)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
peer = ibss_rsn_peer_init(ibss_rsn, addr);
|
|
|
|
if (peer == NULL)
|
2009-01-15 00:21:55 +01:00
|
|
|
return -1;
|
2013-07-21 14:56:53 +02:00
|
|
|
|
|
|
|
/* Open Authentication: send first Authentication frame */
|
|
|
|
res = ibss_rsn_send_auth(ibss_rsn, addr, 1);
|
|
|
|
if (res) {
|
|
|
|
/*
|
|
|
|
* The driver may not support Authentication frame exchange in
|
|
|
|
* IBSS. Ignore authentication and go through EAPOL exchange.
|
|
|
|
*/
|
|
|
|
peer->authentication_status |= IBSS_RSN_AUTH_BY_US;
|
|
|
|
return ibss_rsn_auth_init(ibss_rsn, peer);
|
2013-08-27 01:54:35 +02:00
|
|
|
} else {
|
2013-12-16 21:08:39 +01:00
|
|
|
os_get_reltime(&peer->own_auth_tx);
|
2013-08-27 15:26:33 +02:00
|
|
|
eloop_register_timeout(1, 0, ibss_rsn_auth_timeout, peer, NULL);
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int ibss_rsn_peer_authenticated(struct ibss_rsn *ibss_rsn,
|
|
|
|
struct ibss_rsn_peer *peer, int reason)
|
|
|
|
{
|
|
|
|
int already_started;
|
|
|
|
|
|
|
|
if (ibss_rsn == NULL || peer == NULL)
|
2009-01-15 00:21:55 +01:00
|
|
|
return -1;
|
2013-07-21 14:56:53 +02:00
|
|
|
|
|
|
|
already_started = ibss_rsn_is_auth_started(peer);
|
|
|
|
peer->authentication_status |= reason;
|
|
|
|
|
|
|
|
if (already_started) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Authenticator already "
|
|
|
|
"started for peer " MACSTR, MAC2STR(peer->addr));
|
|
|
|
return 0;
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Starting IBSS Authenticator "
|
|
|
|
"for now-authenticated peer " MACSTR, MAC2STR(peer->addr));
|
2009-01-15 00:21:55 +01:00
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
return ibss_rsn_auth_init(ibss_rsn, peer);
|
2009-01-15 00:21:55 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-18 16:04:46 +01:00
|
|
|
void ibss_rsn_stop(struct ibss_rsn *ibss_rsn, const u8 *peermac)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer, *prev;
|
|
|
|
|
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (peermac == NULL) {
|
|
|
|
/* remove all peers */
|
|
|
|
wpa_printf(MSG_DEBUG, "%s: Remove all peers", __func__);
|
|
|
|
peer = ibss_rsn->peers;
|
|
|
|
while (peer) {
|
|
|
|
prev = peer;
|
|
|
|
peer = peer->next;
|
|
|
|
ibss_rsn_free(prev);
|
|
|
|
ibss_rsn->peers = peer;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* remove specific peer */
|
|
|
|
wpa_printf(MSG_DEBUG, "%s: Remove specific peer " MACSTR,
|
|
|
|
__func__, MAC2STR(peermac));
|
|
|
|
|
|
|
|
for (prev = NULL, peer = ibss_rsn->peers; peer != NULL;
|
|
|
|
prev = peer, peer = peer->next) {
|
|
|
|
if (os_memcmp(peermac, peer->addr, ETH_ALEN) == 0) {
|
|
|
|
if (prev == NULL)
|
|
|
|
ibss_rsn->peers = peer->next;
|
|
|
|
else
|
|
|
|
prev->next = peer->next;
|
|
|
|
ibss_rsn_free(peer);
|
|
|
|
wpa_printf(MSG_DEBUG, "%s: Successfully "
|
|
|
|
"removed a specific peer",
|
|
|
|
__func__);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-13 15:22:53 +02:00
|
|
|
struct ibss_rsn * ibss_rsn_init(struct wpa_supplicant *wpa_s,
|
|
|
|
struct wpa_ssid *ssid)
|
2009-01-15 00:21:55 +01:00
|
|
|
{
|
|
|
|
struct ibss_rsn *ibss_rsn;
|
|
|
|
|
|
|
|
ibss_rsn = os_zalloc(sizeof(*ibss_rsn));
|
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return NULL;
|
|
|
|
ibss_rsn->wpa_s = wpa_s;
|
|
|
|
|
2016-08-13 15:22:53 +02:00
|
|
|
if (ibss_rsn_auth_init_group(ibss_rsn, wpa_s->own_addr, ssid) < 0) {
|
2009-01-15 00:21:55 +01:00
|
|
|
ibss_rsn_deinit(ibss_rsn);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ibss_rsn;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ibss_rsn_deinit(struct ibss_rsn *ibss_rsn)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer, *prev;
|
|
|
|
|
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
peer = ibss_rsn->peers;
|
|
|
|
while (peer) {
|
|
|
|
prev = peer;
|
|
|
|
peer = peer->next;
|
|
|
|
ibss_rsn_free(prev);
|
|
|
|
}
|
|
|
|
|
2015-09-05 20:35:16 +02:00
|
|
|
if (ibss_rsn->auth_group)
|
|
|
|
wpa_deinit(ibss_rsn->auth_group);
|
2009-01-15 00:21:55 +01:00
|
|
|
os_free(ibss_rsn);
|
|
|
|
|
|
|
|
}
|
2009-01-17 16:25:11 +01:00
|
|
|
|
|
|
|
|
|
|
|
static int ibss_rsn_eapol_dst_supp(const u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee802_1x_hdr *hdr;
|
|
|
|
const struct wpa_eapol_key *key;
|
|
|
|
u16 key_info;
|
|
|
|
size_t plen;
|
|
|
|
|
|
|
|
/* TODO: Support other EAPOL packets than just EAPOL-Key */
|
|
|
|
|
|
|
|
if (len < sizeof(*hdr) + sizeof(*key))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
hdr = (const struct ieee802_1x_hdr *) buf;
|
|
|
|
key = (const struct wpa_eapol_key *) (hdr + 1);
|
|
|
|
plen = be_to_host16(hdr->length);
|
|
|
|
|
|
|
|
if (hdr->version < EAPOL_VERSION) {
|
|
|
|
/* TODO: backwards compatibility */
|
|
|
|
}
|
|
|
|
if (hdr->type != IEEE802_1X_TYPE_EAPOL_KEY) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: EAPOL frame (type %u) discarded, "
|
|
|
|
"not a Key frame", hdr->type);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
if (plen > len - sizeof(*hdr) || plen < sizeof(*key)) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: EAPOL frame payload size %lu "
|
|
|
|
"invalid (frame size %lu)",
|
|
|
|
(unsigned long) plen, (unsigned long) len);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (key->type != EAPOL_KEY_TYPE_RSN) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: EAPOL-Key type (%d) unknown, "
|
|
|
|
"discarded", key->type);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
key_info = WPA_GET_BE16(key->key_info);
|
|
|
|
|
|
|
|
return !!(key_info & WPA_KEY_INFO_ACK);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int ibss_rsn_process_rx_eapol(struct ibss_rsn *ibss_rsn,
|
|
|
|
struct ibss_rsn_peer *peer,
|
|
|
|
const u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
int supp;
|
|
|
|
u8 *tmp;
|
|
|
|
|
|
|
|
supp = ibss_rsn_eapol_dst_supp(buf, len);
|
|
|
|
if (supp < 0)
|
|
|
|
return -1;
|
|
|
|
|
2017-03-07 10:17:23 +01:00
|
|
|
tmp = os_memdup(buf, len);
|
2009-01-17 16:25:11 +01:00
|
|
|
if (tmp == NULL)
|
|
|
|
return -1;
|
|
|
|
if (supp) {
|
2013-07-21 14:56:53 +02:00
|
|
|
peer->authentication_status |= IBSS_RSN_AUTH_EAPOL_BY_PEER;
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Supplicant from "
|
|
|
|
MACSTR, MAC2STR(peer->addr));
|
2009-01-17 16:25:11 +01:00
|
|
|
wpa_sm_rx_eapol(peer->supp, peer->addr, tmp, len);
|
|
|
|
} else {
|
2013-07-21 14:56:53 +02:00
|
|
|
if (ibss_rsn_is_auth_started(peer) == 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS EAPOL for "
|
|
|
|
"Authenticator dropped as " MACSTR " is not "
|
|
|
|
"authenticated", MAC2STR(peer->addr));
|
|
|
|
os_free(tmp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS RX EAPOL for Authenticator "
|
|
|
|
"from "MACSTR, MAC2STR(peer->addr));
|
2009-01-17 16:25:11 +01:00
|
|
|
wpa_receive(ibss_rsn->auth_group, peer->auth, tmp, len);
|
|
|
|
}
|
|
|
|
os_free(tmp);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int ibss_rsn_rx_eapol(struct ibss_rsn *ibss_rsn, const u8 *src_addr,
|
|
|
|
const u8 *buf, size_t len)
|
|
|
|
{
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
|
2011-03-23 20:15:46 +01:00
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return -1;
|
|
|
|
|
2012-01-29 11:23:27 +01:00
|
|
|
peer = ibss_rsn_get_peer(ibss_rsn, src_addr);
|
|
|
|
if (peer)
|
|
|
|
return ibss_rsn_process_rx_eapol(ibss_rsn, peer, buf, len);
|
2009-01-17 16:25:11 +01:00
|
|
|
|
|
|
|
if (ibss_rsn_eapol_dst_supp(buf, len) > 0) {
|
|
|
|
/*
|
|
|
|
* Create new IBSS peer based on an EAPOL message from the peer
|
|
|
|
* Authenticator.
|
|
|
|
*/
|
2013-07-21 14:56:53 +02:00
|
|
|
peer = ibss_rsn_peer_init(ibss_rsn, src_addr);
|
|
|
|
if (peer == NULL)
|
2009-01-17 16:25:11 +01:00
|
|
|
return -1;
|
2013-07-21 14:56:53 +02:00
|
|
|
|
|
|
|
/* assume the peer is authenticated already */
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Not using IBSS Auth for peer "
|
|
|
|
MACSTR, MAC2STR(src_addr));
|
|
|
|
ibss_rsn_peer_authenticated(ibss_rsn, peer,
|
|
|
|
IBSS_RSN_AUTH_EAPOL_BY_US);
|
|
|
|
|
2009-01-17 16:25:11 +01:00
|
|
|
return ibss_rsn_process_rx_eapol(ibss_rsn, ibss_rsn->peers,
|
|
|
|
buf, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2009-01-17 16:47:25 +01:00
|
|
|
|
|
|
|
void ibss_rsn_set_psk(struct ibss_rsn *ibss_rsn, const u8 *psk)
|
|
|
|
{
|
2011-03-23 20:15:46 +01:00
|
|
|
if (ibss_rsn == NULL)
|
|
|
|
return;
|
2009-01-17 16:47:25 +01:00
|
|
|
os_memcpy(ibss_rsn->psk, psk, PMK_LEN);
|
|
|
|
}
|
2013-07-21 14:56:53 +02:00
|
|
|
|
|
|
|
|
|
|
|
static void ibss_rsn_handle_auth_1_of_2(struct ibss_rsn *ibss_rsn,
|
|
|
|
struct ibss_rsn_peer *peer,
|
|
|
|
const u8* addr)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 1) from " MACSTR,
|
|
|
|
MAC2STR(addr));
|
|
|
|
|
2017-01-14 12:56:18 +01:00
|
|
|
if (peer &&
|
|
|
|
peer->authentication_status & (IBSS_RSN_SET_PTK_SUPP |
|
|
|
|
IBSS_RSN_SET_PTK_AUTH)) {
|
|
|
|
/* Clear the TK for this pair to allow recovery from the case
|
|
|
|
* where the peer STA has restarted and lost its key while we
|
|
|
|
* still have a pairwise key configured. */
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Clear pairwise key for peer "
|
|
|
|
MACSTR, MAC2STR(addr));
|
|
|
|
wpa_drv_set_key(ibss_rsn->wpa_s, WPA_ALG_NONE, addr, 0, 0,
|
2020-01-04 23:10:04 +01:00
|
|
|
NULL, 0, NULL, 0, KEY_FLAG_PAIRWISE);
|
2017-01-14 12:56:18 +01:00
|
|
|
}
|
|
|
|
|
2013-07-21 14:56:53 +02:00
|
|
|
if (peer &&
|
|
|
|
peer->authentication_status & IBSS_RSN_AUTH_EAPOL_BY_PEER) {
|
2013-08-27 01:54:35 +02:00
|
|
|
if (peer->own_auth_tx.sec) {
|
2013-12-16 21:08:39 +01:00
|
|
|
struct os_reltime now, diff;
|
|
|
|
os_get_reltime(&now);
|
|
|
|
os_reltime_sub(&now, &peer->own_auth_tx, &diff);
|
2013-08-27 01:54:35 +02:00
|
|
|
if (diff.sec == 0 && diff.usec < 500000) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Skip IBSS reinit since only %u usec from own Auth frame TX",
|
|
|
|
(int) diff.usec);
|
|
|
|
goto skip_reinit;
|
|
|
|
}
|
|
|
|
}
|
2013-07-21 14:56:53 +02:00
|
|
|
/*
|
|
|
|
* A peer sent us an Authentication frame even though it already
|
|
|
|
* started an EAPOL session. We should reinit state machines
|
|
|
|
* here, but it's much more complicated than just deleting and
|
|
|
|
* recreating the state machine
|
|
|
|
*/
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Reinitializing station "
|
|
|
|
MACSTR, MAC2STR(addr));
|
|
|
|
|
|
|
|
ibss_rsn_stop(ibss_rsn, addr);
|
|
|
|
peer = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!peer) {
|
|
|
|
peer = ibss_rsn_peer_init(ibss_rsn, addr);
|
|
|
|
if (!peer)
|
|
|
|
return;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Auth started by peer " MACSTR,
|
|
|
|
MAC2STR(addr));
|
|
|
|
}
|
|
|
|
|
2013-08-27 01:54:35 +02:00
|
|
|
skip_reinit:
|
2013-07-21 14:56:53 +02:00
|
|
|
/* reply with an Authentication frame now, before sending an EAPOL */
|
|
|
|
ibss_rsn_send_auth(ibss_rsn, addr, 2);
|
|
|
|
/* no need to start another AUTH challenge in the other way.. */
|
|
|
|
ibss_rsn_peer_authenticated(ibss_rsn, peer, IBSS_RSN_AUTH_EAPOL_BY_US);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void ibss_rsn_handle_auth(struct ibss_rsn *ibss_rsn, const u8 *auth_frame,
|
|
|
|
size_t len)
|
|
|
|
{
|
|
|
|
const struct ieee80211_mgmt *header;
|
|
|
|
struct ibss_rsn_peer *peer;
|
|
|
|
size_t auth_length;
|
|
|
|
|
|
|
|
header = (const struct ieee80211_mgmt *) auth_frame;
|
|
|
|
auth_length = IEEE80211_HDRLEN + sizeof(header->u.auth);
|
|
|
|
|
|
|
|
if (ibss_rsn == NULL || len < auth_length)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (le_to_host16(header->u.auth.auth_alg) != WLAN_AUTH_OPEN ||
|
|
|
|
le_to_host16(header->u.auth.status_code) != WLAN_STATUS_SUCCESS)
|
|
|
|
return;
|
|
|
|
|
|
|
|
peer = ibss_rsn_get_peer(ibss_rsn, header->sa);
|
|
|
|
|
|
|
|
switch (le_to_host16(header->u.auth.auth_transaction)) {
|
|
|
|
case 1:
|
|
|
|
ibss_rsn_handle_auth_1_of_2(ibss_rsn, peer, header->sa);
|
|
|
|
break;
|
|
|
|
case 2:
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS RX Auth frame (SEQ 2) from "
|
|
|
|
MACSTR, MAC2STR(header->sa));
|
|
|
|
if (!peer) {
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: Received Auth seq 2 from "
|
|
|
|
"unknown STA " MACSTR, MAC2STR(header->sa));
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* authentication has been completed */
|
2013-08-27 15:26:33 +02:00
|
|
|
eloop_cancel_timeout(ibss_rsn_auth_timeout, peer, NULL);
|
|
|
|
wpa_printf(MSG_DEBUG, "RSN: IBSS Auth completed with " MACSTR,
|
2013-07-21 14:56:53 +02:00
|
|
|
MAC2STR(header->sa));
|
|
|
|
ibss_rsn_peer_authenticated(ibss_rsn, peer,
|
|
|
|
IBSS_RSN_AUTH_BY_US);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|