blob: 654656e58dc658b5b1395e6be25955602f6365c3 [file] [log] [blame]
/*
* PASN common processing
*
* Copyright (C) 2024, Qualcomm Innovation Center, Inc.
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#include "utils/includes.h"
#include "utils/common.h"
#include "common/wpa_common.h"
#include "common/sae.h"
#include "crypto/sha384.h"
#include "crypto/crypto.h"
#include "common/ieee802_11_defs.h"
#include "common/ieee802_11_common.h"
#include "crypto/aes_wrap.h"
#include "pasn_common.h"
struct pasn_data * pasn_data_init(void)
{
struct pasn_data *pasn = os_zalloc(sizeof(struct pasn_data));
return pasn;
}
void pasn_data_deinit(struct pasn_data *pasn)
{
if (!pasn)
return;
os_free(pasn->rsnxe_ie);
wpabuf_free(pasn->frame);
bin_clear_free(pasn, sizeof(struct pasn_data));
}
void pasn_register_callbacks(struct pasn_data *pasn, void *cb_ctx,
int (*send_mgmt)(void *ctx, const u8 *data,
size_t data_len, int noack,
unsigned int freq,
unsigned int wait),
int (*validate_custom_pmkid)(void *ctx,
const u8 *addr,
const u8 *pmkid))
{
if (!pasn)
return;
pasn->cb_ctx = cb_ctx;
pasn->send_mgmt = send_mgmt;
pasn->validate_custom_pmkid = validate_custom_pmkid;
}
void pasn_enable_kdk_derivation(struct pasn_data *pasn)
{
if (!pasn)
return;
pasn->derive_kdk = true;
pasn->kdk_len = WPA_KDK_MAX_LEN;
}
void pasn_disable_kdk_derivation(struct pasn_data *pasn)
{
if (!pasn)
return;
pasn->derive_kdk = false;
pasn->kdk_len = 0;
}
void pasn_set_akmp(struct pasn_data *pasn, int akmp)
{
if (!pasn)
return;
pasn->akmp = akmp;
}
void pasn_set_cipher(struct pasn_data *pasn, int cipher)
{
if (!pasn)
return;
pasn->cipher = cipher;
}
void pasn_set_own_addr(struct pasn_data *pasn, const u8 *addr)
{
if (!pasn || !addr)
return;
os_memcpy(pasn->own_addr, addr, ETH_ALEN);
}
void pasn_set_peer_addr(struct pasn_data *pasn, const u8 *addr)
{
if (!pasn || !addr)
return;
os_memcpy(pasn->peer_addr, addr, ETH_ALEN);
}
void pasn_set_bssid(struct pasn_data *pasn, const u8 *addr)
{
if (!pasn || !addr)
return;
os_memcpy(pasn->bssid, addr, ETH_ALEN);
}
int pasn_set_pt(struct pasn_data *pasn, struct sae_pt *pt)
{
if (!pasn)
return -1;
#ifdef CONFIG_SAE
pasn->pt = pt;
return 0;
#else /* CONFIG_SAE */
return -1;
#endif /* CONFIG_SAE */
}
void pasn_set_password(struct pasn_data *pasn, const char *password)
{
if (!pasn)
return;
pasn->password = password;
}
void pasn_set_wpa_key_mgmt(struct pasn_data *pasn, int key_mgmt)
{
if (!pasn)
return;
pasn->wpa_key_mgmt = key_mgmt;
}
void pasn_set_rsn_pairwise(struct pasn_data *pasn, int rsn_pairwise)
{
if (!pasn)
return;
pasn->rsn_pairwise = rsn_pairwise;
}
void pasn_set_rsnxe_caps(struct pasn_data *pasn, u16 rsnxe_capab)
{
if (!pasn)
return;
pasn->rsnxe_capab = rsnxe_capab;
}
void pasn_set_rsnxe_ie(struct pasn_data *pasn, const u8 *rsnxe_ie)
{
if (!pasn || !rsnxe_ie)
return;
pasn->rsnxe_ie = os_memdup(rsnxe_ie, 2 + rsnxe_ie[1]);
}
void pasn_set_custom_pmkid(struct pasn_data *pasn, const u8 *pmkid)
{
if (!pasn || !pmkid)
return;
os_memcpy(pasn->custom_pmkid, pmkid, PMKID_LEN);
pasn->custom_pmkid_valid = true;
}
int pasn_set_extra_ies(struct pasn_data *pasn, const u8 *extra_ies,
size_t extra_ies_len)
{
if (!pasn || !extra_ies_len || !extra_ies)
return -1;
if (pasn->extra_ies) {
os_free((u8 *) pasn->extra_ies);
pasn->extra_ies_len = extra_ies_len;
}
pasn->extra_ies = os_memdup(extra_ies, extra_ies_len);
if (!pasn->extra_ies) {
wpa_printf(MSG_ERROR,
"PASN: Extra IEs memory allocation failed");
return -1;
}
pasn->extra_ies_len = extra_ies_len;
return 0;
}
void pasn_set_noauth(struct pasn_data *pasn, bool noauth)
{
if (!pasn)
return;
pasn->noauth = noauth;
}
int pasn_get_akmp(struct pasn_data *pasn)
{
if (!pasn)
return 0;
return pasn->akmp;
}
int pasn_get_cipher(struct pasn_data *pasn)
{
if (!pasn)
return 0;
return pasn->cipher;
}
size_t pasn_get_pmk_len(struct pasn_data *pasn)
{
if (!pasn)
return 0;
return pasn->pmk_len;
}
u8 * pasn_get_pmk(struct pasn_data *pasn)
{
if (!pasn)
return NULL;
return pasn->pmk;
}
struct wpa_ptk * pasn_get_ptk(struct pasn_data *pasn)
{
if (!pasn)
return NULL;
return &pasn->ptk;
}
int pasn_add_encrypted_data(struct pasn_data *pasn, struct wpabuf *buf,
const u8 *data, size_t data_len)
{
int ret;
u8 *encrypted_data, *padded_data = NULL;
u8 *len;
size_t pad_len = 0;
if (!pasn->ptk.kek_len) {
wpa_printf(MSG_DEBUG, "PASN: KEK not available");
return -2;
}
pad_len = data_len % 8;
if (pad_len) {
pad_len = 8 - pad_len;
padded_data = os_zalloc(data_len + pad_len);
if (!padded_data)
return -1;
os_memcpy(padded_data, data, data_len);
data = padded_data;
padded_data[data_len] = 0xdd;
}
data_len += pad_len + 8;
encrypted_data = os_malloc(data_len);
if (!encrypted_data) {
os_free(padded_data);
return -1;
}
ret = aes_wrap(pasn->ptk.kek, pasn->ptk.kek_len,
(data_len - 8) / 8, data, encrypted_data);
if (ret) {
wpa_printf(MSG_DEBUG, "PASN: AES wrap failed, ret=%d", ret);
goto out;
}
if (wpabuf_tailroom(buf) < 1 + 1 + 1 + data_len) {
wpa_printf(MSG_DEBUG,
"PASN: Not enough room in the buffer for PASN Encrypred Data element");
ret = -1;
goto out;
}
wpabuf_put_u8(buf, WLAN_EID_EXTENSION);
len = wpabuf_put(buf, 1);
wpabuf_put_u8(buf, WLAN_EID_EXT_PASN_ENCRYPTED_DATA);
wpabuf_put_data(buf, encrypted_data, data_len);
*len = (u8 *) wpabuf_put(buf, 0) - len - 1;
out:
os_free(padded_data);
os_free(encrypted_data);
return ret;
}
int pasn_parse_encrypted_data(struct pasn_data *pasn, const u8 *data,
size_t len)
{
int ret = -1;
u8 *buf;
u16 buf_len;
struct ieee802_11_elems elems;
const struct ieee80211_mgmt *mgmt =
(const struct ieee80211_mgmt *) data;
if (len < 24 + 6 ||
ieee802_11_parse_elems(mgmt->u.auth.variable,
len - offsetof(struct ieee80211_mgmt,
u.auth.variable),
&elems, 0) == ParseFailed) {
wpa_printf(MSG_DEBUG,
"PASN: Failed parsing Authentication frame");
return -1;
}
if (!elems.pasn_encrypted_data || elems.pasn_encrypted_data_len < 8 ||
elems.pasn_encrypted_data_len % 8) {
wpa_printf(MSG_DEBUG, "PASN: No encrypted elements");
return 0;
}
buf_len = elems.pasn_encrypted_data_len - 8;
buf = os_malloc(buf_len);
if (!buf)
return -1;
ret = aes_unwrap(pasn->ptk.kek, pasn->ptk.kek_len, buf_len / 8,
elems.pasn_encrypted_data, buf);
if (ret)
wpa_printf(MSG_DEBUG, "PASN: AES unwrap failed, ret=%d", ret);
else if (pasn->parse_data_element && pasn->cb_ctx)
ret = pasn->parse_data_element(pasn->cb_ctx, buf, buf_len);
os_free(buf);
return ret;
}