98cd3d1c3b
This modifies struct wpa_ptk to allow the length of KCK and KEK to be stored. This is needed to allow longer keys to be used, e.g., with Suite B 192-bit level. Signed-off-by: Jouni Malinen <j@w1.fi>
340 lines
8.5 KiB
C
340 lines
8.5 KiB
C
/*
|
|
* wlantest frame injection
|
|
* Copyright (c) 2010-2015, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#include "utils/includes.h"
|
|
|
|
#include "utils/common.h"
|
|
#include "common/defs.h"
|
|
#include "common/ieee802_11_defs.h"
|
|
#include "crypto/aes_wrap.h"
|
|
#include "wlantest.h"
|
|
|
|
|
|
static int inject_frame(int s, const void *data, size_t len)
|
|
{
|
|
#define IEEE80211_RADIOTAP_F_FRAG 0x08
|
|
unsigned char rtap_hdr[] = {
|
|
0x00, 0x00, /* radiotap version */
|
|
0x0e, 0x00, /* radiotap length */
|
|
0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */
|
|
IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */
|
|
0x00, /* padding */
|
|
0x00, 0x00, /* RX and TX flags to indicate that */
|
|
0x00, 0x00, /* this is the injected frame directly */
|
|
};
|
|
struct iovec iov[2] = {
|
|
{
|
|
.iov_base = &rtap_hdr,
|
|
.iov_len = sizeof(rtap_hdr),
|
|
},
|
|
{
|
|
.iov_base = (void *) data,
|
|
.iov_len = len,
|
|
}
|
|
};
|
|
struct msghdr msg = {
|
|
.msg_name = NULL,
|
|
.msg_namelen = 0,
|
|
.msg_iov = iov,
|
|
.msg_iovlen = 2,
|
|
.msg_control = NULL,
|
|
.msg_controllen = 0,
|
|
.msg_flags = 0,
|
|
};
|
|
int ret;
|
|
|
|
ret = sendmsg(s, &msg, 0);
|
|
if (ret < 0)
|
|
wpa_printf(MSG_ERROR, "sendmsg: %s", strerror(errno));
|
|
return ret;
|
|
}
|
|
|
|
|
|
static int is_robust_mgmt(u8 *frame, size_t len)
|
|
{
|
|
struct ieee80211_mgmt *mgmt;
|
|
u16 fc, stype;
|
|
if (len < 24)
|
|
return 0;
|
|
mgmt = (struct ieee80211_mgmt *) frame;
|
|
fc = le_to_host16(mgmt->frame_control);
|
|
if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT)
|
|
return 0;
|
|
stype = WLAN_FC_GET_STYPE(fc);
|
|
if (stype == WLAN_FC_STYPE_DEAUTH || stype == WLAN_FC_STYPE_DISASSOC)
|
|
return 1;
|
|
if (stype == WLAN_FC_STYPE_ACTION) {
|
|
if (len < 25)
|
|
return 0;
|
|
if (mgmt->u.action.category != WLAN_ACTION_PUBLIC)
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
|
|
static int wlantest_inject_bip(struct wlantest *wt, struct wlantest_bss *bss,
|
|
u8 *frame, size_t len, int incorrect_key)
|
|
{
|
|
u8 *prot;
|
|
u8 dummy[32];
|
|
int ret;
|
|
size_t plen;
|
|
|
|
if (!bss->igtk_len[bss->igtk_idx])
|
|
return -1;
|
|
|
|
os_memset(dummy, 0x11, sizeof(dummy));
|
|
inc_byte_array(bss->ipn[bss->igtk_idx], 6);
|
|
|
|
prot = bip_protect(incorrect_key ? dummy : bss->igtk[bss->igtk_idx],
|
|
bss->igtk_len[bss->igtk_idx],
|
|
frame, len, bss->ipn[bss->igtk_idx],
|
|
bss->igtk_idx, &plen);
|
|
if (prot == NULL)
|
|
return -1;
|
|
|
|
|
|
ret = inject_frame(wt->monitor_sock, prot, plen);
|
|
os_free(prot);
|
|
|
|
return (ret < 0) ? -1 : 0;
|
|
}
|
|
|
|
|
|
static int wlantest_inject_prot_bc(struct wlantest *wt,
|
|
struct wlantest_bss *bss,
|
|
u8 *frame, size_t len, int incorrect_key)
|
|
{
|
|
u8 *crypt;
|
|
size_t crypt_len;
|
|
int ret;
|
|
u8 dummy[64];
|
|
u8 *pn;
|
|
struct ieee80211_hdr *hdr;
|
|
u16 fc;
|
|
int hdrlen;
|
|
|
|
hdr = (struct ieee80211_hdr *) frame;
|
|
hdrlen = 24;
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
if (!bss->gtk_len[bss->gtk_idx])
|
|
return -1;
|
|
|
|
if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
|
|
(WLAN_FC_TODS | WLAN_FC_FROMDS))
|
|
hdrlen += ETH_ALEN;
|
|
pn = bss->rsc[bss->gtk_idx];
|
|
inc_byte_array(pn, 6);
|
|
|
|
os_memset(dummy, 0x11, sizeof(dummy));
|
|
if (bss->group_cipher == WPA_CIPHER_TKIP)
|
|
crypt = tkip_encrypt(incorrect_key ? dummy :
|
|
bss->gtk[bss->gtk_idx],
|
|
frame, len, hdrlen, NULL, pn,
|
|
bss->gtk_idx, &crypt_len);
|
|
else
|
|
crypt = ccmp_encrypt(incorrect_key ? dummy :
|
|
bss->gtk[bss->gtk_idx],
|
|
frame, len, hdrlen, NULL, pn,
|
|
bss->gtk_idx, &crypt_len);
|
|
|
|
if (crypt == NULL)
|
|
return -1;
|
|
|
|
ret = inject_frame(wt->monitor_sock, crypt, crypt_len);
|
|
os_free(crypt);
|
|
|
|
return (ret < 0) ? -1 : 0;
|
|
}
|
|
|
|
|
|
static int wlantest_inject_prot(struct wlantest *wt, struct wlantest_bss *bss,
|
|
struct wlantest_sta *sta, u8 *frame,
|
|
size_t len, int incorrect_key)
|
|
{
|
|
u8 *crypt;
|
|
size_t crypt_len;
|
|
int ret;
|
|
u8 dummy[64];
|
|
u8 *pn;
|
|
struct ieee80211_hdr *hdr;
|
|
u16 fc;
|
|
int tid = 0;
|
|
u8 *qos = NULL;
|
|
int hdrlen;
|
|
struct wlantest_tdls *tdls = NULL;
|
|
const u8 *tk = NULL;
|
|
|
|
hdr = (struct ieee80211_hdr *) frame;
|
|
hdrlen = 24;
|
|
fc = le_to_host16(hdr->frame_control);
|
|
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA &&
|
|
(fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == 0) {
|
|
struct wlantest_sta *sta2;
|
|
bss = bss_get(wt, hdr->addr3);
|
|
if (bss == NULL) {
|
|
wpa_printf(MSG_DEBUG, "No BSS found for TDLS "
|
|
"injection");
|
|
return -1;
|
|
}
|
|
sta = sta_find(bss, hdr->addr2);
|
|
sta2 = sta_find(bss, hdr->addr1);
|
|
if (sta == NULL || sta2 == NULL) {
|
|
wpa_printf(MSG_DEBUG, "No stations found for TDLS "
|
|
"injection");
|
|
return -1;
|
|
}
|
|
dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list)
|
|
{
|
|
if ((tdls->init == sta && tdls->resp == sta2) ||
|
|
(tdls->init == sta2 && tdls->resp == sta)) {
|
|
if (!tdls->link_up)
|
|
wpa_printf(MSG_DEBUG, "TDLS: Link not "
|
|
"up, but injecting Data "
|
|
"frame on direct link");
|
|
tk = tdls->tpk.tk;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (tk == NULL && sta == NULL) {
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT)
|
|
return wlantest_inject_bip(wt, bss, frame, len,
|
|
incorrect_key);
|
|
return wlantest_inject_prot_bc(wt, bss, frame, len,
|
|
incorrect_key);
|
|
}
|
|
|
|
if (tk == NULL && !sta->ptk_set) {
|
|
wpa_printf(MSG_DEBUG, "No key known for injection");
|
|
return -1;
|
|
}
|
|
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT)
|
|
tid = 16;
|
|
else if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA) {
|
|
if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) ==
|
|
(WLAN_FC_TODS | WLAN_FC_FROMDS))
|
|
hdrlen += ETH_ALEN;
|
|
if (WLAN_FC_GET_STYPE(fc) & 0x08) {
|
|
qos = frame + hdrlen;
|
|
hdrlen += 2;
|
|
tid = qos[0] & 0x0f;
|
|
}
|
|
}
|
|
if (tk) {
|
|
if (os_memcmp(hdr->addr2, tdls->init->addr, ETH_ALEN) == 0)
|
|
pn = tdls->rsc_init[tid];
|
|
else
|
|
pn = tdls->rsc_resp[tid];
|
|
} else if (os_memcmp(hdr->addr2, bss->bssid, ETH_ALEN) == 0)
|
|
pn = sta->rsc_fromds[tid];
|
|
else
|
|
pn = sta->rsc_tods[tid];
|
|
inc_byte_array(pn, 6);
|
|
|
|
os_memset(dummy, 0x11, sizeof(dummy));
|
|
if (tk)
|
|
crypt = ccmp_encrypt(incorrect_key ? dummy : tk,
|
|
frame, len, hdrlen, qos, pn, 0,
|
|
&crypt_len);
|
|
else if (sta->pairwise_cipher == WPA_CIPHER_TKIP)
|
|
crypt = tkip_encrypt(incorrect_key ? dummy : sta->ptk.tk,
|
|
frame, len, hdrlen, qos, pn, 0,
|
|
&crypt_len);
|
|
else
|
|
crypt = ccmp_encrypt(incorrect_key ? dummy : sta->ptk.tk,
|
|
frame, len, hdrlen, qos, pn, 0,
|
|
&crypt_len);
|
|
|
|
if (crypt == NULL) {
|
|
wpa_printf(MSG_DEBUG, "Frame encryption failed");
|
|
return -1;
|
|
}
|
|
|
|
wpa_hexdump(MSG_DEBUG, "Inject frame (encrypted)", crypt, crypt_len);
|
|
ret = inject_frame(wt->monitor_sock, crypt, crypt_len);
|
|
os_free(crypt);
|
|
wpa_printf(MSG_DEBUG, "inject_frame for protected frame: %d", ret);
|
|
|
|
return (ret < 0) ? -1 : 0;
|
|
}
|
|
|
|
|
|
int wlantest_inject(struct wlantest *wt, struct wlantest_bss *bss,
|
|
struct wlantest_sta *sta, u8 *frame, size_t len,
|
|
enum wlantest_inject_protection prot)
|
|
{
|
|
int ret;
|
|
struct ieee80211_hdr *hdr;
|
|
u16 fc;
|
|
int protectable, protect = 0;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "Inject frame", frame, len);
|
|
if (wt->monitor_sock < 0) {
|
|
wpa_printf(MSG_INFO, "Cannot inject frames when monitor "
|
|
"interface is not in use");
|
|
return -1;
|
|
}
|
|
|
|
if (prot != WLANTEST_INJECT_UNPROTECTED && bss == NULL) {
|
|
wpa_printf(MSG_INFO, "No BSS information to inject "
|
|
"protected frames");
|
|
return -1;
|
|
}
|
|
|
|
hdr = (struct ieee80211_hdr *) frame;
|
|
fc = le_to_host16(hdr->frame_control);
|
|
protectable = WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA ||
|
|
is_robust_mgmt(frame, len);
|
|
|
|
if ((prot == WLANTEST_INJECT_PROTECTED ||
|
|
prot == WLANTEST_INJECT_INCORRECT_KEY) && bss) {
|
|
if (!sta &&
|
|
((WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
|
|
!bss->igtk_len[bss->igtk_idx]) ||
|
|
(WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA &&
|
|
!bss->gtk_len[bss->gtk_idx]))) {
|
|
wpa_printf(MSG_INFO, "No GTK/IGTK known for "
|
|
MACSTR " to protect the injected "
|
|
"frame", MAC2STR(bss->bssid));
|
|
return -1;
|
|
}
|
|
if (sta && !sta->ptk_set) {
|
|
wpa_printf(MSG_INFO, "No PTK known for the STA " MACSTR
|
|
" to encrypt the injected frame",
|
|
MAC2STR(sta->addr));
|
|
return -1;
|
|
}
|
|
protect = 1;
|
|
} else if (protectable && prot != WLANTEST_INJECT_UNPROTECTED && bss) {
|
|
if (sta && sta->ptk_set)
|
|
protect = 1;
|
|
else if (!sta) {
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA &&
|
|
bss->gtk_len[bss->gtk_idx])
|
|
protect = 1;
|
|
if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT &&
|
|
bss->igtk_len[bss->igtk_idx])
|
|
protect = 1;
|
|
}
|
|
}
|
|
|
|
if (protect && bss)
|
|
return wlantest_inject_prot(
|
|
wt, bss, sta, frame, len,
|
|
prot == WLANTEST_INJECT_INCORRECT_KEY);
|
|
|
|
ret = inject_frame(wt->monitor_sock, frame, len);
|
|
wpa_printf(MSG_DEBUG, "inject_frame for unprotected frame: %d", ret);
|
|
return (ret < 0) ? -1 : 0;
|
|
}
|