 7a27e5e03e
			
		
	
	
		7a27e5e03e
		
	
	
	
	
		
			
			Commit b488a12948 ('Clear PMK length and
check for this when deriving PTK') started rejecting PTK derivation
based on PMK length. This reduced coverage from the eapol-fuzzer, so set
the default length when initializing the state machine in the fuzzer to
reach the previously used code paths.
Signed-off-by: Jouni Malinen <j@w1.fi>
		
	
			
		
			
				
	
	
		
			215 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			215 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * wpa_supplicant - EAPOL fuzzer
 | |
|  * Copyright (c) 2015, Jouni Malinen <j@w1.fi>
 | |
|  *
 | |
|  * This software may be distributed under the terms of the BSD license.
 | |
|  * See README for more details.
 | |
|  */
 | |
| 
 | |
| #include "utils/includes.h"
 | |
| 
 | |
| #include "utils/common.h"
 | |
| #include "utils/eloop.h"
 | |
| #include "eapol_supp/eapol_supp_sm.h"
 | |
| #include "rsn_supp/wpa.h"
 | |
| #include "rsn_supp/wpa_i.h"
 | |
| 
 | |
| 
 | |
| struct arg_ctx {
 | |
| 	const char *fname;
 | |
| 	struct wpa_sm *wpa;
 | |
| 	struct eapol_sm *eapol;
 | |
| };
 | |
| 
 | |
| 
 | |
| static void test_send_eapol(void *eloop_data, void *user_ctx)
 | |
| {
 | |
| 	struct arg_ctx *ctx = eloop_data;
 | |
| 	char *data;
 | |
| 	size_t len;
 | |
| 	u8 src[ETH_ALEN] = { 0x02, 0x00, 0x00, 0x00, 0x00, 0x01 };
 | |
| 	u8 wpa_ie[200];
 | |
| 	size_t wpa_ie_len;
 | |
| 
 | |
| 	wpa_printf(MSG_INFO, "eapol-fuzzer: Send '%s'", ctx->fname);
 | |
| 
 | |
| 	data = os_readfile(ctx->fname, &len);
 | |
| 	if (!data) {
 | |
| 		wpa_printf(MSG_ERROR, "Could not read '%s'", ctx->fname);
 | |
| 		goto out;
 | |
| 	}
 | |
| 
 | |
| 	wpa_hexdump(MSG_MSGDUMP, "fuzzer - EAPOL", data, len);
 | |
| 
 | |
| 	eapol_sm_notify_portEnabled(ctx->eapol, TRUE);
 | |
| 
 | |
| 	wpa_sm_set_param(ctx->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
 | |
| 	wpa_sm_set_param(ctx->wpa, WPA_PARAM_RSN_ENABLED, 1);
 | |
| 	wpa_sm_set_param(ctx->wpa, WPA_PARAM_KEY_MGMT, WPA_KEY_MGMT_PSK);
 | |
| 	wpa_sm_set_param(ctx->wpa, WPA_PARAM_PAIRWISE, WPA_CIPHER_CCMP);
 | |
| 	wpa_sm_set_param(ctx->wpa, WPA_PARAM_GROUP, WPA_CIPHER_CCMP);
 | |
| 
 | |
| 	wpa_ie_len = sizeof(wpa_ie);
 | |
| 	wpa_sm_set_assoc_wpa_ie_default(ctx->wpa, wpa_ie, &wpa_ie_len);
 | |
| 
 | |
| 	if (eapol_sm_rx_eapol(ctx->eapol, src, (u8 *) data, len) <= 0)
 | |
| 		wpa_sm_rx_eapol(ctx->wpa, src, (u8 *) data, len);
 | |
| 
 | |
| out:
 | |
| 	os_free(data);
 | |
| 	eloop_terminate();
 | |
| }
 | |
| 
 | |
| 
 | |
| static void * get_network_ctx(void *arg)
 | |
| {
 | |
| 	return (void *) 1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static void set_state(void *arg, enum wpa_states state)
 | |
| {
 | |
| }
 | |
| 
 | |
| 
 | |
| static void deauthenticate(void *arg, int reason_code)
 | |
| {
 | |
| }
 | |
| 
 | |
| 
 | |
| static u8 * alloc_eapol(void *arg, u8 type,
 | |
| 			const void *data, u16 data_len,
 | |
| 			size_t *msg_len, void **data_pos)
 | |
| {
 | |
| 	struct ieee802_1x_hdr *hdr;
 | |
| 
 | |
| 	*msg_len = sizeof(*hdr) + data_len;
 | |
| 	hdr = os_malloc(*msg_len);
 | |
| 	if (hdr == NULL)
 | |
| 		return NULL;
 | |
| 
 | |
| 	hdr->version = 2;
 | |
| 	hdr->type = type;
 | |
| 	hdr->length = host_to_be16(data_len);
 | |
| 
 | |
| 	if (data)
 | |
| 		os_memcpy(hdr + 1, data, data_len);
 | |
| 	else
 | |
| 		os_memset(hdr + 1, 0, data_len);
 | |
| 
 | |
| 	if (data_pos)
 | |
| 		*data_pos = hdr + 1;
 | |
| 
 | |
| 	return (u8 *) hdr;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int ether_send(void *arg, const u8 *dest, u16 proto,
 | |
| 		      const u8 *buf, size_t len)
 | |
| {
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int get_bssid(void *ctx, u8 *bssid)
 | |
| {
 | |
| 	return -1;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int eapol_send(void *ctx, int type, const u8 *buf, size_t len)
 | |
| {
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int init_wpa(struct arg_ctx *arg)
 | |
| {
 | |
| 	struct wpa_sm_ctx *ctx;
 | |
| 
 | |
| 	ctx = os_zalloc(sizeof(*ctx));
 | |
| 	if (ctx == NULL) {
 | |
| 		wpa_printf(MSG_ERROR, "Failed to allocate WPA context.");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ctx->ctx = arg;
 | |
| 	ctx->msg_ctx = arg;
 | |
| 	ctx->get_network_ctx = get_network_ctx;
 | |
| 	ctx->set_state = set_state;
 | |
| 	ctx->deauthenticate = deauthenticate;
 | |
| 	ctx->alloc_eapol = alloc_eapol;
 | |
| 	ctx->ether_send = ether_send;
 | |
| 	ctx->get_bssid = get_bssid;
 | |
| 
 | |
| 	arg->wpa = wpa_sm_init(ctx);
 | |
| 	if (!arg->wpa)
 | |
| 		return -1;
 | |
| 	arg->wpa->pmk_len = PMK_LEN;
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| 
 | |
| static int init_eapol(struct arg_ctx *arg)
 | |
| {
 | |
| 	struct eapol_ctx *ctx;
 | |
| 
 | |
| 	ctx = os_zalloc(sizeof(*ctx));
 | |
| 	if (ctx == NULL) {
 | |
| 		wpa_printf(MSG_ERROR, "Failed to allocate EAPOL context.");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	ctx->ctx = arg;
 | |
| 	ctx->msg_ctx = arg;
 | |
| 	ctx->eapol_send = eapol_send;
 | |
| 
 | |
| 	arg->eapol = eapol_sm_init(ctx);
 | |
| 	return arg->eapol ? 0 : -1;
 | |
| }
 | |
| 
 | |
| 
 | |
| int main(int argc, char *argv[])
 | |
| {
 | |
| 	struct arg_ctx ctx;
 | |
| 	int ret = -1;
 | |
| 
 | |
| 	if (argc < 2) {
 | |
| 		printf("usage: %s <file>\n", argv[0]);
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	if (os_program_init())
 | |
| 		return -1;
 | |
| 
 | |
| 	wpa_debug_level = 0;
 | |
| 	wpa_debug_show_keys = 1;
 | |
| 
 | |
| 	if (eloop_init()) {
 | |
| 		wpa_printf(MSG_ERROR, "Failed to initialize event loop");
 | |
| 		return -1;
 | |
| 	}
 | |
| 
 | |
| 	os_memset(&ctx, 0, sizeof(ctx));
 | |
| 	ctx.fname = argv[1];
 | |
| 	if (init_wpa(&ctx) || init_eapol(&ctx))
 | |
| 		goto fail;
 | |
| 
 | |
| 	eloop_register_timeout(0, 0, test_send_eapol, &ctx, NULL);
 | |
| 
 | |
| 	wpa_printf(MSG_DEBUG, "Starting eloop");
 | |
| 	eloop_run();
 | |
| 	wpa_printf(MSG_DEBUG, "eloop done");
 | |
| 
 | |
| 	ret = 0;
 | |
| fail:
 | |
| 	if (ctx.wpa)
 | |
| 		wpa_sm_deinit(ctx.wpa);
 | |
| 	if (ctx.eapol)
 | |
| 		eapol_sm_deinit(ctx.eapol);
 | |
| 
 | |
| 	eloop_destroy();
 | |
| 	os_program_deinit();
 | |
| 
 | |
| 	return ret;
 | |
| }
 |