blob: bbf41d3060129d6526359f9f1d39e8610dcc0b5b [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08002 * IEEE 802.11 RSN / WPA Authenticator
Sunil Ravia04bd252022-05-02 22:54:18 -07003 * Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 */
8
9#include "utils/includes.h"
10
11#include "utils/common.h"
12#include "utils/eloop.h"
13#include "utils/state_machine.h"
Dmitry Shmidtcf32e602014-01-28 10:57:39 -080014#include "utils/bitfield.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070015#include "common/ieee802_11_defs.h"
Hai Shalom74f70d42019-02-11 14:42:39 -080016#include "common/ocv.h"
Hai Shalom4fbc08f2020-05-18 12:37:00 -070017#include "common/dpp.h"
Hai Shalom899fcc72020-10-19 14:38:18 -070018#include "common/wpa_ctrl.h"
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080019#include "crypto/aes.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070020#include "crypto/aes_wrap.h"
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080021#include "crypto/aes_siv.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070022#include "crypto/crypto.h"
23#include "crypto/sha1.h"
24#include "crypto/sha256.h"
Roshan Pius3a1667e2018-07-03 15:17:14 -070025#include "crypto/sha384.h"
Sunil Ravi38ad1ed2023-01-17 23:58:31 +000026#include "crypto/sha512.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070027#include "crypto/random.h"
28#include "eapol_auth/eapol_auth_sm.h"
Hai Shalom74f70d42019-02-11 14:42:39 -080029#include "drivers/driver.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070030#include "ap_config.h"
31#include "ieee802_11.h"
Sunil Ravi2a14cf12023-11-21 00:54:38 +000032#include "sta_info.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070033#include "wpa_auth.h"
34#include "pmksa_cache_auth.h"
35#include "wpa_auth_i.h"
36#include "wpa_auth_ie.h"
37
38#define STATE_MACHINE_DATA struct wpa_state_machine
39#define STATE_MACHINE_DEBUG_PREFIX "WPA"
Sunil Raviaf8751c2023-03-29 11:35:17 -070040#define STATE_MACHINE_ADDR wpa_auth_get_spa(sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070041
42
43static void wpa_send_eapol_timeout(void *eloop_ctx, void *timeout_ctx);
44static int wpa_sm_step(struct wpa_state_machine *sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070045static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
46 u8 *data, size_t data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080047#ifdef CONFIG_FILS
48static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
49 u8 *buf, size_t buf_len, u16 *_key_data_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070050static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
51 const struct wpabuf *hlp);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080052#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070053static void wpa_sm_call_step(void *eloop_ctx, void *timeout_ctx);
54static void wpa_group_sm_step(struct wpa_authenticator *wpa_auth,
55 struct wpa_group *group);
56static void wpa_request_new_ptk(struct wpa_state_machine *sm);
57static int wpa_gtk_update(struct wpa_authenticator *wpa_auth,
58 struct wpa_group *group);
59static int wpa_group_config_group_keys(struct wpa_authenticator *wpa_auth,
60 struct wpa_group *group);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -080061static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -080062 const u8 *pmk, unsigned int pmk_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -070063 struct wpa_ptk *ptk, int force_sha256,
64 u8 *pmk_r0, u8 *pmk_r1, u8 *pmk_r0_name,
Sunil Ravi7f769292024-07-23 22:21:32 +000065 size_t *key_len, bool no_kdk);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -070066static void wpa_group_free(struct wpa_authenticator *wpa_auth,
67 struct wpa_group *group);
68static void wpa_group_get(struct wpa_authenticator *wpa_auth,
69 struct wpa_group *group);
70static void wpa_group_put(struct wpa_authenticator *wpa_auth,
71 struct wpa_group *group);
Hai Shalomfdcde762020-04-02 11:19:20 -070072static int ieee80211w_kde_len(struct wpa_state_machine *sm);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080073static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
Sunil Ravi7f769292024-07-23 22:21:32 +000074static void wpa_group_update_gtk(struct wpa_authenticator *wpa_auth,
75 struct wpa_group *group);
76
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070077
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070078static const u32 eapol_key_timeout_first = 100; /* ms */
79static const u32 eapol_key_timeout_subseq = 1000; /* ms */
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080080static const u32 eapol_key_timeout_first_group = 500; /* ms */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070081static const u32 eapol_key_timeout_no_retrans = 4000; /* ms */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070082
83/* TODO: make these configurable */
84static const int dot11RSNAConfigPMKLifetime = 43200;
85static const int dot11RSNAConfigPMKReauthThreshold = 70;
86static const int dot11RSNAConfigSATimeout = 60;
87
88
Sunil Raviaf8751c2023-03-29 11:35:17 -070089static const u8 * wpa_auth_get_aa(const struct wpa_state_machine *sm)
90{
Sunil Ravi2a14cf12023-11-21 00:54:38 +000091#ifdef CONFIG_IEEE80211BE
92 if (sm->mld_assoc_link_id >= 0)
Sunil Ravi7f769292024-07-23 22:21:32 +000093 return sm->wpa_auth->mld_addr;
Sunil Ravi2a14cf12023-11-21 00:54:38 +000094#endif /* CONFIG_IEEE80211BE */
Sunil Raviaf8751c2023-03-29 11:35:17 -070095 return sm->wpa_auth->addr;
96}
97
98
99static const u8 * wpa_auth_get_spa(const struct wpa_state_machine *sm)
100{
Sunil Ravi2a14cf12023-11-21 00:54:38 +0000101#ifdef CONFIG_IEEE80211BE
102 if (sm->mld_assoc_link_id >= 0)
103 return sm->peer_mld_addr;
104#endif /* CONFIG_IEEE80211BE */
Sunil Raviaf8751c2023-03-29 11:35:17 -0700105 return sm->addr;
106}
107
108
Sunil Ravi7f769292024-07-23 22:21:32 +0000109static void wpa_gkeydone_sta(struct wpa_state_machine *sm)
110{
111#ifdef CONFIG_IEEE80211BE
112 int link_id;
113#endif /* CONFIG_IEEE80211BE */
114
115 if (!sm->wpa_auth)
116 return;
117
118 sm->wpa_auth->group->GKeyDoneStations--;
119 sm->GUpdateStationKeys = false;
120
121#ifdef CONFIG_IEEE80211BE
122 for_each_sm_auth(sm, link_id)
123 sm->mld_links[link_id].wpa_auth->group->GKeyDoneStations--;
124#endif /* CONFIG_IEEE80211BE */
125}
126
127
128#ifdef CONFIG_IEEE80211BE
129
130void wpa_release_link_auth_ref(struct wpa_state_machine *sm,
131 int release_link_id)
132{
133 int link_id;
134
135 if (!sm || release_link_id >= MAX_NUM_MLD_LINKS)
136 return;
137
138 for_each_sm_auth(sm, link_id) {
139 if (link_id == release_link_id) {
140 wpa_group_put(sm->mld_links[link_id].wpa_auth,
141 sm->mld_links[link_id].wpa_auth->group);
142 sm->mld_links[link_id].wpa_auth = NULL;
143 }
144 }
145}
146
147
148struct wpa_get_link_auth_ctx {
149 const u8 *addr;
150 const u8 *mld_addr;
151 int link_id;
152 struct wpa_authenticator *wpa_auth;
153};
154
155static int wpa_get_link_sta_auth(struct wpa_authenticator *wpa_auth, void *data)
156{
157 struct wpa_get_link_auth_ctx *ctx = data;
158
159 if (!wpa_auth->is_ml)
160 return 0;
161
162 if (ctx->mld_addr &&
163 !ether_addr_equal(wpa_auth->mld_addr, ctx->mld_addr))
164 return 0;
165
166 if ((ctx->addr && ether_addr_equal(wpa_auth->addr, ctx->addr)) ||
167 (ctx->link_id > -1 && wpa_auth->is_ml &&
168 wpa_auth->link_id == ctx->link_id)) {
169 ctx->wpa_auth = wpa_auth;
170 return 1;
171
172 }
173 return 0;
174}
175
176
177static struct wpa_authenticator *
178wpa_get_link_auth(struct wpa_authenticator *wpa_auth, int link_id)
179{
180 struct wpa_get_link_auth_ctx ctx;
181
182 ctx.addr = NULL;
183 ctx.mld_addr = wpa_auth->mld_addr;
184 ctx.link_id = link_id;
185 ctx.wpa_auth = NULL;
186 wpa_auth_for_each_auth(wpa_auth, wpa_get_link_sta_auth, &ctx);
187 return ctx.wpa_auth;
188}
189
190
191static int wpa_get_primary_auth_cb(struct wpa_authenticator *wpa_auth,
192 void *data)
193{
194 struct wpa_get_link_auth_ctx *ctx = data;
195
196 if (!wpa_auth->is_ml ||
197 !ether_addr_equal(wpa_auth->mld_addr, ctx->addr) ||
198 !wpa_auth->primary_auth)
199 return 0;
200
201 ctx->wpa_auth = wpa_auth;
202 return 1;
203}
204
205#endif /* CONFIG_IEEE80211BE */
206
207
208static struct wpa_authenticator *
209wpa_get_primary_auth(struct wpa_authenticator *wpa_auth)
210{
211#ifdef CONFIG_IEEE80211BE
212 struct wpa_get_link_auth_ctx ctx;
213
214 if (!wpa_auth || !wpa_auth->is_ml || wpa_auth->primary_auth)
215 return wpa_auth;
216
217 ctx.addr = wpa_auth->mld_addr;
218 ctx.wpa_auth = NULL;
219 wpa_auth_for_each_auth(wpa_auth, wpa_get_primary_auth_cb, &ctx);
220
221 return ctx.wpa_auth;
222#else /* CONFIG_IEEE80211BE */
223 return wpa_auth;
224#endif /* CONFIG_IEEE80211BE */
225}
226
227
Dmitry Shmidtd5e49232012-12-03 15:08:10 -0800228static inline int wpa_auth_mic_failure_report(
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700229 struct wpa_authenticator *wpa_auth, const u8 *addr)
230{
Paul Stewart092955c2017-02-06 09:13:09 -0800231 if (wpa_auth->cb->mic_failure_report)
232 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr);
Dmitry Shmidtd5e49232012-12-03 15:08:10 -0800233 return 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700234}
235
236
Dmitry Shmidtdda10c22015-03-24 16:05:01 -0700237static inline void wpa_auth_psk_failure_report(
238 struct wpa_authenticator *wpa_auth, const u8 *addr)
239{
Paul Stewart092955c2017-02-06 09:13:09 -0800240 if (wpa_auth->cb->psk_failure_report)
241 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr);
Dmitry Shmidtdda10c22015-03-24 16:05:01 -0700242}
243
244
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700245static inline void wpa_auth_set_eapol(struct wpa_authenticator *wpa_auth,
246 const u8 *addr, wpa_eapol_variable var,
247 int value)
248{
Paul Stewart092955c2017-02-06 09:13:09 -0800249 if (wpa_auth->cb->set_eapol)
250 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700251}
252
253
254static inline int wpa_auth_get_eapol(struct wpa_authenticator *wpa_auth,
255 const u8 *addr, wpa_eapol_variable var)
256{
Hai Shalomfdcde762020-04-02 11:19:20 -0700257 if (!wpa_auth->cb->get_eapol)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700258 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800259 return wpa_auth->cb->get_eapol(wpa_auth->cb_ctx, addr, var);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700260}
261
262
263static inline const u8 * wpa_auth_get_psk(struct wpa_authenticator *wpa_auth,
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700264 const u8 *addr,
265 const u8 *p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -0700266 const u8 *prev_psk, size_t *psk_len,
267 int *vlan_id)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700268{
Hai Shalomfdcde762020-04-02 11:19:20 -0700269 if (!wpa_auth->cb->get_psk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700270 return NULL;
Paul Stewart092955c2017-02-06 09:13:09 -0800271 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -0700272 prev_psk, psk_len, vlan_id);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700273}
274
275
276static inline int wpa_auth_get_msk(struct wpa_authenticator *wpa_auth,
277 const u8 *addr, u8 *msk, size_t *len)
278{
Hai Shalomfdcde762020-04-02 11:19:20 -0700279 if (!wpa_auth->cb->get_msk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700280 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800281 return wpa_auth->cb->get_msk(wpa_auth->cb_ctx, addr, msk, len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700282}
283
284
285static inline int wpa_auth_set_key(struct wpa_authenticator *wpa_auth,
286 int vlan_id,
287 enum wpa_alg alg, const u8 *addr, int idx,
Hai Shalomfdcde762020-04-02 11:19:20 -0700288 u8 *key, size_t key_len,
289 enum key_flag key_flag)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700290{
Hai Shalomfdcde762020-04-02 11:19:20 -0700291 if (!wpa_auth->cb->set_key)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700292 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800293 return wpa_auth->cb->set_key(wpa_auth->cb_ctx, vlan_id, alg, addr, idx,
Hai Shalomfdcde762020-04-02 11:19:20 -0700294 key, key_len, key_flag);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700295}
296
297
Sunil Ravi89eba102022-09-13 21:04:37 -0700298#ifdef CONFIG_PASN
299static inline int wpa_auth_set_ltf_keyseed(struct wpa_authenticator *wpa_auth,
300 const u8 *peer_addr,
301 const u8 *ltf_keyseed,
302 size_t ltf_keyseed_len)
303{
304 if (!wpa_auth->cb->set_ltf_keyseed)
305 return -1;
306 return wpa_auth->cb->set_ltf_keyseed(wpa_auth->cb_ctx, peer_addr,
307 ltf_keyseed, ltf_keyseed_len);
308}
309#endif /* CONFIG_PASN */
310
311
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700312static inline int wpa_auth_get_seqnum(struct wpa_authenticator *wpa_auth,
313 const u8 *addr, int idx, u8 *seq)
314{
Hai Shalomfdcde762020-04-02 11:19:20 -0700315 int res;
316
317 if (!wpa_auth->cb->get_seqnum)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700318 return -1;
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000319#ifdef CONFIG_TESTING_OPTIONS
320 os_memset(seq, 0, WPA_KEY_RSC_LEN);
321#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalomfdcde762020-04-02 11:19:20 -0700322 res = wpa_auth->cb->get_seqnum(wpa_auth->cb_ctx, addr, idx, seq);
323#ifdef CONFIG_TESTING_OPTIONS
324 if (!addr && idx < 4 && wpa_auth->conf.gtk_rsc_override_set) {
325 wpa_printf(MSG_DEBUG,
326 "TESTING: Override GTK RSC %016llx --> %016llx",
327 (long long unsigned) WPA_GET_LE64(seq),
328 (long long unsigned)
329 WPA_GET_LE64(wpa_auth->conf.gtk_rsc_override));
330 os_memcpy(seq, wpa_auth->conf.gtk_rsc_override,
331 WPA_KEY_RSC_LEN);
332 }
333 if (!addr && idx >= 4 && idx <= 5 &&
334 wpa_auth->conf.igtk_rsc_override_set) {
335 wpa_printf(MSG_DEBUG,
336 "TESTING: Override IGTK RSC %016llx --> %016llx",
337 (long long unsigned) WPA_GET_LE64(seq),
338 (long long unsigned)
339 WPA_GET_LE64(wpa_auth->conf.igtk_rsc_override));
340 os_memcpy(seq, wpa_auth->conf.igtk_rsc_override,
341 WPA_KEY_RSC_LEN);
342 }
343#endif /* CONFIG_TESTING_OPTIONS */
344 return res;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700345}
346
347
348static inline int
349wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr,
350 const u8 *data, size_t data_len, int encrypt)
351{
Hai Shalomfdcde762020-04-02 11:19:20 -0700352 if (!wpa_auth->cb->send_eapol)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700353 return -1;
Kai Shie75b0652020-11-24 20:31:29 -0800354#ifdef CONFIG_TESTING_OPTIONS
355 if (wpa_auth->conf.skip_send_eapol)
356 return 0;
357#endif
Paul Stewart092955c2017-02-06 09:13:09 -0800358 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len,
359 encrypt);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700360}
361
362
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800363#ifdef CONFIG_MESH
364static inline int wpa_auth_start_ampe(struct wpa_authenticator *wpa_auth,
365 const u8 *addr)
366{
Hai Shalomfdcde762020-04-02 11:19:20 -0700367 if (!wpa_auth->cb->start_ampe)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800368 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800369 return wpa_auth->cb->start_ampe(wpa_auth->cb_ctx, addr);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800370}
371#endif /* CONFIG_MESH */
372
373
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700374int wpa_auth_for_each_sta(struct wpa_authenticator *wpa_auth,
375 int (*cb)(struct wpa_state_machine *sm, void *ctx),
376 void *cb_ctx)
377{
Hai Shalomfdcde762020-04-02 11:19:20 -0700378 if (!wpa_auth->cb->for_each_sta)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700379 return 0;
Paul Stewart092955c2017-02-06 09:13:09 -0800380 return wpa_auth->cb->for_each_sta(wpa_auth->cb_ctx, cb, cb_ctx);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700381}
382
383
384int wpa_auth_for_each_auth(struct wpa_authenticator *wpa_auth,
385 int (*cb)(struct wpa_authenticator *a, void *ctx),
386 void *cb_ctx)
387{
Hai Shalomfdcde762020-04-02 11:19:20 -0700388 if (!wpa_auth->cb->for_each_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700389 return 0;
Paul Stewart092955c2017-02-06 09:13:09 -0800390 return wpa_auth->cb->for_each_auth(wpa_auth->cb_ctx, cb, cb_ctx);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700391}
392
393
Hai Shalom60840252021-02-19 19:02:11 -0800394void wpa_auth_store_ptksa(struct wpa_authenticator *wpa_auth,
395 const u8 *addr, int cipher,
396 u32 life_time, const struct wpa_ptk *ptk)
397{
398 if (wpa_auth->cb->store_ptksa)
399 wpa_auth->cb->store_ptksa(wpa_auth->cb_ctx, addr, cipher,
400 life_time, ptk);
401}
402
403
Sunil Raviaf8751c2023-03-29 11:35:17 -0700404static void wpa_auth_remove_ptksa(struct wpa_authenticator *wpa_auth,
405 const u8 *addr, int cipher)
Hai Shalom60840252021-02-19 19:02:11 -0800406{
407 if (wpa_auth->cb->clear_ptksa)
408 wpa_auth->cb->clear_ptksa(wpa_auth->cb_ctx, addr, cipher);
409}
410
Sunil Raviaf8751c2023-03-29 11:35:17 -0700411
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700412void wpa_auth_logger(struct wpa_authenticator *wpa_auth, const u8 *addr,
413 logger_level level, const char *txt)
414{
Hai Shalomfdcde762020-04-02 11:19:20 -0700415 if (!wpa_auth->cb->logger)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700416 return;
Paul Stewart092955c2017-02-06 09:13:09 -0800417 wpa_auth->cb->logger(wpa_auth->cb_ctx, addr, level, txt);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700418}
419
420
421void wpa_auth_vlogger(struct wpa_authenticator *wpa_auth, const u8 *addr,
422 logger_level level, const char *fmt, ...)
423{
424 char *format;
425 int maxlen;
426 va_list ap;
427
Hai Shalomfdcde762020-04-02 11:19:20 -0700428 if (!wpa_auth->cb->logger)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700429 return;
430
431 maxlen = os_strlen(fmt) + 100;
432 format = os_malloc(maxlen);
433 if (!format)
434 return;
435
436 va_start(ap, fmt);
437 vsnprintf(format, maxlen, fmt, ap);
438 va_end(ap);
439
440 wpa_auth_logger(wpa_auth, addr, level, format);
441
442 os_free(format);
443}
444
445
446static void wpa_sta_disconnect(struct wpa_authenticator *wpa_auth,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700447 const u8 *addr, u16 reason)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700448{
Hai Shalomfdcde762020-04-02 11:19:20 -0700449 if (!wpa_auth->cb->disconnect)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700450 return;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700451 wpa_printf(MSG_DEBUG, "wpa_sta_disconnect STA " MACSTR " (reason %u)",
452 MAC2STR(addr), reason);
453 wpa_auth->cb->disconnect(wpa_auth->cb_ctx, addr, reason);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700454}
455
456
Hai Shalom74f70d42019-02-11 14:42:39 -0800457#ifdef CONFIG_OCV
458static int wpa_channel_info(struct wpa_authenticator *wpa_auth,
459 struct wpa_channel_info *ci)
460{
461 if (!wpa_auth->cb->channel_info)
462 return -1;
463 return wpa_auth->cb->channel_info(wpa_auth->cb_ctx, ci);
464}
465#endif /* CONFIG_OCV */
466
467
Hai Shalom021b0b52019-04-10 11:17:58 -0700468static int wpa_auth_update_vlan(struct wpa_authenticator *wpa_auth,
469 const u8 *addr, int vlan_id)
470{
471 if (!wpa_auth->cb->update_vlan)
472 return -1;
473 return wpa_auth->cb->update_vlan(wpa_auth->cb_ctx, addr, vlan_id);
474}
475
476
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700477static void wpa_rekey_gmk(void *eloop_ctx, void *timeout_ctx)
478{
479 struct wpa_authenticator *wpa_auth = eloop_ctx;
480
481 if (random_get_bytes(wpa_auth->group->GMK, WPA_GMK_LEN)) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700482 wpa_printf(MSG_ERROR,
483 "Failed to get random data for WPA initialization.");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700484 } else {
485 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "GMK rekeyd");
486 wpa_hexdump_key(MSG_DEBUG, "GMK",
487 wpa_auth->group->GMK, WPA_GMK_LEN);
488 }
489
490 if (wpa_auth->conf.wpa_gmk_rekey) {
491 eloop_register_timeout(wpa_auth->conf.wpa_gmk_rekey, 0,
492 wpa_rekey_gmk, wpa_auth, NULL);
493 }
494}
495
496
Sunil Ravi7f769292024-07-23 22:21:32 +0000497static void wpa_rekey_all_groups(struct wpa_authenticator *wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700498{
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700499 struct wpa_group *group, *next;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700500
501 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "rekeying GTK");
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700502 group = wpa_auth->group;
503 while (group) {
Sunil Ravi7f769292024-07-23 22:21:32 +0000504 wpa_printf(MSG_DEBUG, "GTK rekey start for authenticator ("
505 MACSTR "), group vlan %d",
506 MAC2STR(wpa_auth->addr), group->vlan_id);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700507 wpa_group_get(wpa_auth, group);
508
Hai Shalome21d4e82020-04-29 16:34:06 -0700509 group->GTKReKey = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700510 do {
Hai Shalome21d4e82020-04-29 16:34:06 -0700511 group->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700512 wpa_group_sm_step(wpa_auth, group);
513 } while (group->changed);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700514
515 next = group->next;
516 wpa_group_put(wpa_auth, group);
517 group = next;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700518 }
Sunil Ravi7f769292024-07-23 22:21:32 +0000519}
520
521
522#ifdef CONFIG_IEEE80211BE
523
524static void wpa_update_all_gtks(struct wpa_authenticator *wpa_auth)
525{
526 struct wpa_group *group, *next;
527
528 group = wpa_auth->group;
529 while (group) {
530 wpa_group_get(wpa_auth, group);
531
532 wpa_group_update_gtk(wpa_auth, group);
533 next = group->next;
534 wpa_group_put(wpa_auth, group);
535 group = next;
536 }
537}
538
539
540static int wpa_update_all_gtks_cb(struct wpa_authenticator *wpa_auth, void *ctx)
541{
542 const u8 *mld_addr = ctx;
543
544 if (!ether_addr_equal(wpa_auth->mld_addr, mld_addr))
545 return 0;
546
547 wpa_update_all_gtks(wpa_auth);
548 return 0;
549}
550
551
552static int wpa_rekey_all_groups_cb(struct wpa_authenticator *wpa_auth,
553 void *ctx)
554{
555 const u8 *mld_addr = ctx;
556
557 if (!ether_addr_equal(wpa_auth->mld_addr, mld_addr))
558 return 0;
559
560 wpa_rekey_all_groups(wpa_auth);
561 return 0;
562}
563
564#endif /* CONFIG_IEEE80211BE */
565
566
567static void wpa_rekey_gtk(void *eloop_ctx, void *timeout_ctx)
568{
569 struct wpa_authenticator *wpa_auth = eloop_ctx;
570
571#ifdef CONFIG_IEEE80211BE
572 if (wpa_auth->is_ml) {
573 /* Non-primary ML authenticator eloop timer for group rekey is
574 * never started and shouldn't fire. Check and warn just in
575 * case. */
576 if (!wpa_auth->primary_auth) {
577 wpa_printf(MSG_DEBUG,
578 "RSN: Cannot start GTK rekey on non-primary ML authenticator");
579 return;
580 }
581
582 /* Generate all the new group keys */
583 wpa_auth_for_each_auth(wpa_auth, wpa_update_all_gtks_cb,
584 wpa_auth->mld_addr);
585
586 /* Send all the generated group keys to the respective stations
587 * with group key handshake. */
588 wpa_auth_for_each_auth(wpa_auth, wpa_rekey_all_groups_cb,
589 wpa_auth->mld_addr);
590 } else {
591 wpa_rekey_all_groups(wpa_auth);
592 }
593#else /* CONFIG_IEEE80211BE */
594 wpa_rekey_all_groups(wpa_auth);
595#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700596
597 if (wpa_auth->conf.wpa_group_rekey) {
598 eloop_register_timeout(wpa_auth->conf.wpa_group_rekey,
599 0, wpa_rekey_gtk, wpa_auth, NULL);
600 }
601}
602
603
604static void wpa_rekey_ptk(void *eloop_ctx, void *timeout_ctx)
605{
606 struct wpa_authenticator *wpa_auth = eloop_ctx;
607 struct wpa_state_machine *sm = timeout_ctx;
608
Sunil Raviaf8751c2023-03-29 11:35:17 -0700609 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
610 "rekeying PTK");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700611 wpa_request_new_ptk(sm);
612 wpa_sm_step(sm);
613}
614
615
Hai Shalom81f62d82019-07-22 12:10:00 -0700616void wpa_auth_set_ptk_rekey_timer(struct wpa_state_machine *sm)
617{
618 if (sm && sm->wpa_auth->conf.wpa_ptk_rekey) {
619 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for "
Sunil Raviaf8751c2023-03-29 11:35:17 -0700620 MACSTR " (%d seconds)",
621 MAC2STR(wpa_auth_get_spa(sm)),
Hai Shalom81f62d82019-07-22 12:10:00 -0700622 sm->wpa_auth->conf.wpa_ptk_rekey);
623 eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
624 eloop_register_timeout(sm->wpa_auth->conf.wpa_ptk_rekey, 0,
625 wpa_rekey_ptk, sm->wpa_auth, sm);
626 }
627}
628
629
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700630static int wpa_auth_pmksa_clear_cb(struct wpa_state_machine *sm, void *ctx)
631{
632 if (sm->pmksa == ctx)
633 sm->pmksa = NULL;
634 return 0;
635}
636
637
638static void wpa_auth_pmksa_free_cb(struct rsn_pmksa_cache_entry *entry,
639 void *ctx)
640{
641 struct wpa_authenticator *wpa_auth = ctx;
642 wpa_auth_for_each_sta(wpa_auth, wpa_auth_pmksa_clear_cb, entry);
643}
644
645
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700646static int wpa_group_init_gmk_and_counter(struct wpa_authenticator *wpa_auth,
647 struct wpa_group *group)
648{
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800649 u8 buf[ETH_ALEN + 8 + sizeof(unsigned long)];
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700650 u8 rkey[32];
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800651 unsigned long ptr;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700652
653 if (random_get_bytes(group->GMK, WPA_GMK_LEN) < 0)
654 return -1;
655 wpa_hexdump_key(MSG_DEBUG, "GMK", group->GMK, WPA_GMK_LEN);
656
657 /*
658 * Counter = PRF-256(Random number, "Init Counter",
659 * Local MAC Address || Time)
660 */
661 os_memcpy(buf, wpa_auth->addr, ETH_ALEN);
662 wpa_get_ntp_timestamp(buf + ETH_ALEN);
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800663 ptr = (unsigned long) group;
664 os_memcpy(buf + ETH_ALEN + 8, &ptr, sizeof(ptr));
Hai Shalom74f70d42019-02-11 14:42:39 -0800665#ifdef TEST_FUZZ
666 os_memset(buf + ETH_ALEN, 0xab, 8);
667 os_memset(buf + ETH_ALEN + 8, 0xcd, sizeof(ptr));
668#endif /* TEST_FUZZ */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700669 if (random_get_bytes(rkey, sizeof(rkey)) < 0)
670 return -1;
671
672 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
673 group->Counter, WPA_NONCE_LEN) < 0)
674 return -1;
675 wpa_hexdump_key(MSG_DEBUG, "Key Counter",
676 group->Counter, WPA_NONCE_LEN);
677
678 return 0;
679}
680
681
682static struct wpa_group * wpa_group_init(struct wpa_authenticator *wpa_auth,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800683 int vlan_id, int delay_init)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700684{
685 struct wpa_group *group;
686
687 group = os_zalloc(sizeof(struct wpa_group));
Hai Shalomfdcde762020-04-02 11:19:20 -0700688 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700689 return NULL;
690
Hai Shalome21d4e82020-04-29 16:34:06 -0700691 group->GTKAuthenticator = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700692 group->vlan_id = vlan_id;
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -0700693 group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700694
695 if (random_pool_ready() != 1) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700696 wpa_printf(MSG_INFO,
697 "WPA: Not enough entropy in random pool for secure operations - update keys later when the first station connects");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700698 }
699
700 /*
701 * Set initial GMK/Counter value here. The actual values that will be
702 * used in negotiations will be set once the first station tries to
703 * connect. This allows more time for collecting additional randomness
704 * on embedded devices.
705 */
706 if (wpa_group_init_gmk_and_counter(wpa_auth, group) < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700707 wpa_printf(MSG_ERROR,
708 "Failed to get random data for WPA initialization.");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700709 os_free(group);
710 return NULL;
711 }
712
Hai Shalome21d4e82020-04-29 16:34:06 -0700713 group->GInit = true;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800714 if (delay_init) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700715 wpa_printf(MSG_DEBUG,
716 "WPA: Delay group state machine start until Beacon frames have been configured");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800717 /* Initialization is completed in wpa_init_keys(). */
718 } else {
719 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700720 group->GInit = false;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800721 wpa_group_sm_step(wpa_auth, group);
722 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700723
724 return group;
725}
726
727
728/**
729 * wpa_init - Initialize WPA authenticator
730 * @addr: Authenticator address
731 * @conf: Configuration for WPA authenticator
732 * @cb: Callback functions for WPA authenticator
733 * Returns: Pointer to WPA authenticator data or %NULL on failure
734 */
735struct wpa_authenticator * wpa_init(const u8 *addr,
736 struct wpa_auth_config *conf,
Paul Stewart092955c2017-02-06 09:13:09 -0800737 const struct wpa_auth_callbacks *cb,
738 void *cb_ctx)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700739{
740 struct wpa_authenticator *wpa_auth;
741
742 wpa_auth = os_zalloc(sizeof(struct wpa_authenticator));
Hai Shalomfdcde762020-04-02 11:19:20 -0700743 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700744 return NULL;
Sunil Ravi7f769292024-07-23 22:21:32 +0000745
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700746 os_memcpy(wpa_auth->addr, addr, ETH_ALEN);
747 os_memcpy(&wpa_auth->conf, conf, sizeof(*conf));
Sunil Ravi7f769292024-07-23 22:21:32 +0000748
749#ifdef CONFIG_IEEE80211BE
750 if (conf->mld_addr) {
751 wpa_auth->is_ml = true;
752 wpa_auth->link_id = conf->link_id;
753 wpa_auth->primary_auth = !conf->first_link_auth;
754 os_memcpy(wpa_auth->mld_addr, conf->mld_addr, ETH_ALEN);
755 }
756#endif /* CONFIG_IEEE80211BE */
757
Paul Stewart092955c2017-02-06 09:13:09 -0800758 wpa_auth->cb = cb;
759 wpa_auth->cb_ctx = cb_ctx;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700760
761 if (wpa_auth_gen_wpa_ie(wpa_auth)) {
762 wpa_printf(MSG_ERROR, "Could not generate WPA IE.");
763 os_free(wpa_auth);
764 return NULL;
765 }
766
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800767 wpa_auth->group = wpa_group_init(wpa_auth, 0, 1);
Hai Shalomfdcde762020-04-02 11:19:20 -0700768 if (!wpa_auth->group) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700769 os_free(wpa_auth->wpa_ie);
770 os_free(wpa_auth);
771 return NULL;
772 }
773
774 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb,
775 wpa_auth);
Hai Shalomfdcde762020-04-02 11:19:20 -0700776 if (!wpa_auth->pmksa) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700777 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed.");
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800778 os_free(wpa_auth->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700779 os_free(wpa_auth->wpa_ie);
780 os_free(wpa_auth);
781 return NULL;
782 }
783
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800784#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700785 wpa_auth->ft_pmk_cache = wpa_ft_pmk_cache_init();
Hai Shalomfdcde762020-04-02 11:19:20 -0700786 if (!wpa_auth->ft_pmk_cache) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700787 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800788 os_free(wpa_auth->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700789 os_free(wpa_auth->wpa_ie);
790 pmksa_cache_auth_deinit(wpa_auth->pmksa);
791 os_free(wpa_auth);
792 return NULL;
793 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800794#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700795
796 if (wpa_auth->conf.wpa_gmk_rekey) {
797 eloop_register_timeout(wpa_auth->conf.wpa_gmk_rekey, 0,
798 wpa_rekey_gmk, wpa_auth, NULL);
799 }
800
Sunil Ravi7f769292024-07-23 22:21:32 +0000801#ifdef CONFIG_IEEE80211BE
802 /* For AP MLD, run group rekey timer only on one link (first) and
803 * whenever it fires do rekey on all associated ML links in one shot.
804 */
805 if ((!wpa_auth->is_ml || !conf->first_link_auth) &&
806 wpa_auth->conf.wpa_group_rekey) {
807#else /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700808 if (wpa_auth->conf.wpa_group_rekey) {
Sunil Ravi7f769292024-07-23 22:21:32 +0000809#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700810 eloop_register_timeout(wpa_auth->conf.wpa_group_rekey, 0,
811 wpa_rekey_gtk, wpa_auth, NULL);
812 }
813
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800814#ifdef CONFIG_P2P
815 if (WPA_GET_BE32(conf->ip_addr_start)) {
816 int count = WPA_GET_BE32(conf->ip_addr_end) -
817 WPA_GET_BE32(conf->ip_addr_start) + 1;
818 if (count > 1000)
819 count = 1000;
820 if (count > 0)
821 wpa_auth->ip_pool = bitfield_alloc(count);
822 }
823#endif /* CONFIG_P2P */
824
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000825 if (conf->tx_bss_auth && conf->beacon_prot) {
826 conf->tx_bss_auth->non_tx_beacon_prot = true;
827 if (!conf->tx_bss_auth->conf.beacon_prot)
828 conf->tx_bss_auth->conf.beacon_prot = true;
829 if (!conf->tx_bss_auth->conf.group_mgmt_cipher)
830 conf->tx_bss_auth->conf.group_mgmt_cipher =
831 conf->group_mgmt_cipher;
832 }
833
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700834 return wpa_auth;
835}
836
837
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800838int wpa_init_keys(struct wpa_authenticator *wpa_auth)
839{
840 struct wpa_group *group = wpa_auth->group;
841
Hai Shalomfdcde762020-04-02 11:19:20 -0700842 wpa_printf(MSG_DEBUG,
843 "WPA: Start group state machine to set initial keys");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800844 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700845 group->GInit = false;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800846 wpa_group_sm_step(wpa_auth, group);
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -0800847 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
848 return -1;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800849 return 0;
850}
851
852
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000853static void wpa_auth_free_conf(struct wpa_auth_config *conf)
854{
855#ifdef CONFIG_TESTING_OPTIONS
856 wpabuf_free(conf->eapol_m1_elements);
857 conf->eapol_m1_elements = NULL;
858 wpabuf_free(conf->eapol_m3_elements);
859 conf->eapol_m3_elements = NULL;
860#endif /* CONFIG_TESTING_OPTIONS */
861}
862
863
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700864/**
865 * wpa_deinit - Deinitialize WPA authenticator
866 * @wpa_auth: Pointer to WPA authenticator data from wpa_init()
867 */
868void wpa_deinit(struct wpa_authenticator *wpa_auth)
869{
870 struct wpa_group *group, *prev;
871
872 eloop_cancel_timeout(wpa_rekey_gmk, wpa_auth, NULL);
Sunil Ravi7f769292024-07-23 22:21:32 +0000873
874 /* TODO: Assign ML primary authenticator to next link authenticator and
875 * start rekey timer. */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700876 eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
877
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700878 pmksa_cache_auth_deinit(wpa_auth->pmksa);
879
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800880#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700881 wpa_ft_pmk_cache_deinit(wpa_auth->ft_pmk_cache);
882 wpa_auth->ft_pmk_cache = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700883 wpa_ft_deinit(wpa_auth);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800884#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700885
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800886#ifdef CONFIG_P2P
887 bitfield_free(wpa_auth->ip_pool);
888#endif /* CONFIG_P2P */
889
890
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700891 os_free(wpa_auth->wpa_ie);
Sunil Ravi7f769292024-07-23 22:21:32 +0000892 os_free(wpa_auth->rsne_override);
893 os_free(wpa_auth->rsne_override_2);
894 os_free(wpa_auth->rsnxe_override);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700895
896 group = wpa_auth->group;
897 while (group) {
898 prev = group;
899 group = group->next;
Sunil Ravia04bd252022-05-02 22:54:18 -0700900 bin_clear_free(prev, sizeof(*prev));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700901 }
902
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000903 wpa_auth_free_conf(&wpa_auth->conf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700904 os_free(wpa_auth);
905}
906
907
908/**
909 * wpa_reconfig - Update WPA authenticator configuration
910 * @wpa_auth: Pointer to WPA authenticator data from wpa_init()
911 * @conf: Configuration for WPA authenticator
912 */
913int wpa_reconfig(struct wpa_authenticator *wpa_auth,
914 struct wpa_auth_config *conf)
915{
916 struct wpa_group *group;
Hai Shalomfdcde762020-04-02 11:19:20 -0700917
918 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700919 return 0;
920
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000921 wpa_auth_free_conf(&wpa_auth->conf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700922 os_memcpy(&wpa_auth->conf, conf, sizeof(*conf));
923 if (wpa_auth_gen_wpa_ie(wpa_auth)) {
924 wpa_printf(MSG_ERROR, "Could not generate WPA IE.");
925 return -1;
926 }
927
928 /*
929 * Reinitialize GTK to make sure it is suitable for the new
930 * configuration.
931 */
932 group = wpa_auth->group;
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -0700933 group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700934 group->GInit = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700935 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700936 group->GInit = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700937 wpa_group_sm_step(wpa_auth, group);
938
939 return 0;
940}
941
942
943struct wpa_state_machine *
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700944wpa_auth_sta_init(struct wpa_authenticator *wpa_auth, const u8 *addr,
945 const u8 *p2p_dev_addr)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700946{
947 struct wpa_state_machine *sm;
948
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -0800949 if (wpa_auth->group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
950 return NULL;
951
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700952 sm = os_zalloc(sizeof(struct wpa_state_machine));
Hai Shalomfdcde762020-04-02 11:19:20 -0700953 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700954 return NULL;
955 os_memcpy(sm->addr, addr, ETH_ALEN);
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700956 if (p2p_dev_addr)
957 os_memcpy(sm->p2p_dev_addr, p2p_dev_addr, ETH_ALEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700958
959 sm->wpa_auth = wpa_auth;
960 sm->group = wpa_auth->group;
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700961 wpa_group_get(sm->wpa_auth, sm->group);
Sunil Ravi2a14cf12023-11-21 00:54:38 +0000962#ifdef CONFIG_IEEE80211BE
963 sm->mld_assoc_link_id = -1;
964#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700965
966 return sm;
967}
968
969
970int wpa_auth_sta_associated(struct wpa_authenticator *wpa_auth,
971 struct wpa_state_machine *sm)
972{
Hai Shalomfdcde762020-04-02 11:19:20 -0700973 if (!wpa_auth || !wpa_auth->conf.wpa || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700974 return -1;
975
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800976#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700977 if (sm->ft_completed) {
Sunil Raviaf8751c2023-03-29 11:35:17 -0700978 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -0700979 "FT authentication already completed - do not start 4-way handshake");
Dmitry Shmidt71757432014-06-02 13:50:35 -0700980 /* Go to PTKINITDONE state to allow GTK rekeying */
981 sm->wpa_ptk_state = WPA_PTK_PTKINITDONE;
Hai Shalome21d4e82020-04-29 16:34:06 -0700982 sm->Pair = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700983 return 0;
984 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800985#endif /* CONFIG_IEEE80211R_AP */
986
987#ifdef CONFIG_FILS
988 if (sm->fils_completed) {
Sunil Raviaf8751c2023-03-29 11:35:17 -0700989 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800990 "FILS authentication already completed - do not start 4-way handshake");
991 /* Go to PTKINITDONE state to allow GTK rekeying */
992 sm->wpa_ptk_state = WPA_PTK_PTKINITDONE;
Hai Shalome21d4e82020-04-29 16:34:06 -0700993 sm->Pair = true;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800994 return 0;
995 }
996#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700997
998 if (sm->started) {
999 os_memset(&sm->key_replay, 0, sizeof(sm->key_replay));
Hai Shalome21d4e82020-04-29 16:34:06 -07001000 sm->ReAuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001001 return wpa_sm_step(sm);
1002 }
1003
Sunil Raviaf8751c2023-03-29 11:35:17 -07001004 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001005 "start authentication");
1006 sm->started = 1;
1007
Hai Shalome21d4e82020-04-29 16:34:06 -07001008 sm->Init = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001009 if (wpa_sm_step(sm) == 1)
1010 return 1; /* should not really happen */
Hai Shalome21d4e82020-04-29 16:34:06 -07001011 sm->Init = false;
1012 sm->AuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001013 return wpa_sm_step(sm);
1014}
1015
1016
1017void wpa_auth_sta_no_wpa(struct wpa_state_machine *sm)
1018{
1019 /* WPA/RSN was not used - clear WPA state. This is needed if the STA
1020 * reassociates back to the same AP while the previous entry for the
1021 * STA has not yet been removed. */
Hai Shalomfdcde762020-04-02 11:19:20 -07001022 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001023 return;
1024
1025 sm->wpa_key_mgmt = 0;
1026}
1027
1028
1029static void wpa_free_sta_sm(struct wpa_state_machine *sm)
1030{
Sunil Ravi7f769292024-07-23 22:21:32 +00001031#ifdef CONFIG_IEEE80211BE
1032 int link_id;
1033#endif /* CONFIG_IEEE80211BE */
1034
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08001035#ifdef CONFIG_P2P
1036 if (WPA_GET_BE32(sm->ip_addr)) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001037 wpa_printf(MSG_DEBUG,
1038 "P2P: Free assigned IP address %u.%u.%u.%u from "
Sunil8cd6f4d2022-06-28 18:40:46 +00001039 MACSTR " (bit %u)",
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08001040 sm->ip_addr[0], sm->ip_addr[1],
1041 sm->ip_addr[2], sm->ip_addr[3],
Sunil Raviaf8751c2023-03-29 11:35:17 -07001042 MAC2STR(wpa_auth_get_spa(sm)),
1043 sm->ip_addr_bit);
Sunil8cd6f4d2022-06-28 18:40:46 +00001044 bitfield_clear(sm->wpa_auth->ip_pool, sm->ip_addr_bit);
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08001045 }
1046#endif /* CONFIG_P2P */
Sunil Ravi7f769292024-07-23 22:21:32 +00001047 if (sm->GUpdateStationKeys)
1048 wpa_gkeydone_sta(sm);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001049#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001050 os_free(sm->assoc_resp_ftie);
Dmitry Shmidtd11f0192014-03-24 12:09:47 -07001051 wpabuf_free(sm->ft_pending_req_ies);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001052#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001053 os_free(sm->last_rx_eapol_key);
1054 os_free(sm->wpa_ie);
Hai Shalomc3565922019-10-28 11:58:20 -07001055 os_free(sm->rsnxe);
Sunil Ravi7f769292024-07-23 22:21:32 +00001056#ifdef CONFIG_IEEE80211BE
1057 for_each_sm_auth(sm, link_id) {
1058 wpa_group_put(sm->mld_links[link_id].wpa_auth,
1059 sm->mld_links[link_id].wpa_auth->group);
1060 sm->mld_links[link_id].wpa_auth = NULL;
1061 }
1062#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07001063 wpa_group_put(sm->wpa_auth, sm->group);
Hai Shalom021b0b52019-04-10 11:17:58 -07001064#ifdef CONFIG_DPP2
1065 wpabuf_clear_free(sm->dpp_z);
1066#endif /* CONFIG_DPP2 */
Hai Shalom1dc4d202019-04-29 16:22:27 -07001067 bin_clear_free(sm, sizeof(*sm));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001068}
1069
1070
1071void wpa_auth_sta_deinit(struct wpa_state_machine *sm)
1072{
Hai Shalomfdcde762020-04-02 11:19:20 -07001073 struct wpa_authenticator *wpa_auth;
1074
1075 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001076 return;
1077
Hai Shalomfdcde762020-04-02 11:19:20 -07001078 wpa_auth = sm->wpa_auth;
1079 if (wpa_auth->conf.wpa_strict_rekey && sm->has_GTK) {
Sunil Ravi7f769292024-07-23 22:21:32 +00001080 struct wpa_authenticator *primary_auth = wpa_auth;
1081
Sunil Raviaf8751c2023-03-29 11:35:17 -07001082 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07001083 "strict rekeying - force GTK rekey since STA is leaving");
Sunil Ravi7f769292024-07-23 22:21:32 +00001084
1085#ifdef CONFIG_IEEE80211BE
1086 if (wpa_auth->is_ml && !wpa_auth->primary_auth)
1087 primary_auth = wpa_get_primary_auth(wpa_auth);
1088#endif /* CONFIG_IEEE80211BE */
1089
Roshan Pius3a1667e2018-07-03 15:17:14 -07001090 if (eloop_deplete_timeout(0, 500000, wpa_rekey_gtk,
Sunil Ravi7f769292024-07-23 22:21:32 +00001091 primary_auth, NULL) == -1)
Hai Shalomfdcde762020-04-02 11:19:20 -07001092 eloop_register_timeout(0, 500000, wpa_rekey_gtk,
Sunil Ravi7f769292024-07-23 22:21:32 +00001093 primary_auth, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001094 }
1095
Hai Shalomfdcde762020-04-02 11:19:20 -07001096 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001097 sm->pending_1_of_4_timeout = 0;
1098 eloop_cancel_timeout(wpa_sm_call_step, sm, NULL);
Hai Shalomfdcde762020-04-02 11:19:20 -07001099 eloop_cancel_timeout(wpa_rekey_ptk, wpa_auth, sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001100#ifdef CONFIG_IEEE80211R_AP
1101 wpa_ft_sta_deinit(sm);
1102#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001103 if (sm->in_step_loop) {
1104 /* Must not free state machine while wpa_sm_step() is running.
1105 * Freeing will be completed in the end of wpa_sm_step(). */
Hai Shalomfdcde762020-04-02 11:19:20 -07001106 wpa_printf(MSG_DEBUG,
1107 "WPA: Registering pending STA state machine deinit for "
Sunil Raviaf8751c2023-03-29 11:35:17 -07001108 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001109 sm->pending_deinit = 1;
1110 } else
1111 wpa_free_sta_sm(sm);
1112}
1113
1114
1115static void wpa_request_new_ptk(struct wpa_state_machine *sm)
1116{
Hai Shalomfdcde762020-04-02 11:19:20 -07001117 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001118 return;
1119
Hai Shalomfdcde762020-04-02 11:19:20 -07001120 if (!sm->use_ext_key_id && sm->wpa_auth->conf.wpa_deny_ptk0_rekey) {
1121 wpa_printf(MSG_INFO,
1122 "WPA: PTK0 rekey not allowed, disconnect " MACSTR,
Sunil Raviaf8751c2023-03-29 11:35:17 -07001123 MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -07001124 sm->Disconnect = true;
Hai Shalomfdcde762020-04-02 11:19:20 -07001125 /* Try to encourage the STA to reconnect */
1126 sm->disconnect_reason =
1127 WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA;
1128 } else {
1129 if (sm->use_ext_key_id)
1130 sm->keyidx_active ^= 1; /* flip Key ID */
Hai Shalome21d4e82020-04-29 16:34:06 -07001131 sm->PTKRequest = true;
Hai Shalomfdcde762020-04-02 11:19:20 -07001132 sm->PTK_valid = 0;
1133 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001134}
1135
1136
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001137static int wpa_replay_counter_valid(struct wpa_key_replay_counter *ctr,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001138 const u8 *replay_counter)
1139{
1140 int i;
1141 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001142 if (!ctr[i].valid)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001143 break;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001144 if (os_memcmp(replay_counter, ctr[i].counter,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001145 WPA_REPLAY_COUNTER_LEN) == 0)
1146 return 1;
1147 }
1148 return 0;
1149}
1150
1151
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001152static void wpa_replay_counter_mark_invalid(struct wpa_key_replay_counter *ctr,
1153 const u8 *replay_counter)
1154{
1155 int i;
1156 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
1157 if (ctr[i].valid &&
Hai Shalomfdcde762020-04-02 11:19:20 -07001158 (!replay_counter ||
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001159 os_memcmp(replay_counter, ctr[i].counter,
1160 WPA_REPLAY_COUNTER_LEN) == 0))
Hai Shalome21d4e82020-04-29 16:34:06 -07001161 ctr[i].valid = false;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001162 }
1163}
1164
1165
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001166#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001167static int ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth,
1168 struct wpa_state_machine *sm,
1169 struct wpa_eapol_ie_parse *kde)
1170{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001171 struct wpa_ie_data ie, assoc_ie;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001172 struct rsn_mdie *mdie;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001173 unsigned int i, j;
1174 bool found = false;
1175
1176 /* Verify that PMKR1Name from EAPOL-Key message 2/4 matches the value
1177 * we derived. */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001178
1179 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001180 ie.num_pmkid < 1 || !ie.pmkid) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001181 wpa_printf(MSG_DEBUG,
1182 "FT: No PMKR1Name in FT 4-way handshake message 2/4");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001183 return -1;
1184 }
1185
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001186 if (wpa_parse_wpa_ie_rsn(sm->wpa_ie, sm->wpa_ie_len, &assoc_ie) < 0) {
1187 wpa_printf(MSG_DEBUG,
1188 "FT: Could not parse (Re)Association Request frame RSNE");
1189 os_memset(&assoc_ie, 0, sizeof(assoc_ie));
1190 /* Continue to allow PMKR1Name matching to be done to cover the
1191 * case where it is the only listed PMKID. */
1192 }
1193
1194 for (i = 0; i < ie.num_pmkid; i++) {
1195 const u8 *pmkid = ie.pmkid + i * PMKID_LEN;
1196
1197 if (os_memcmp_const(pmkid, sm->pmk_r1_name,
1198 WPA_PMK_NAME_LEN) == 0) {
1199 wpa_printf(MSG_DEBUG,
1200 "FT: RSNE[PMKID[%u]] from supplicant matches PMKR1Name",
1201 i);
1202 found = true;
1203 } else {
1204 for (j = 0; j < assoc_ie.num_pmkid; j++) {
1205 if (os_memcmp(pmkid,
1206 assoc_ie.pmkid + j * PMKID_LEN,
1207 PMKID_LEN) == 0)
1208 break;
1209 }
1210
1211 if (j == assoc_ie.num_pmkid) {
1212 wpa_printf(MSG_DEBUG,
1213 "FT: RSNE[PMKID[%u]] from supplicant is neither PMKR1Name nor included in AssocReq",
1214 i);
1215 found = false;
1216 break;
1217 }
1218 wpa_printf(MSG_DEBUG,
1219 "FT: RSNE[PMKID[%u]] from supplicant is not PMKR1Name, but matches a PMKID in AssocReq",
1220 i);
1221 }
1222 }
1223
1224 if (!found) {
1225 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
1226 LOGGER_DEBUG,
1227 "PMKR1Name mismatch in FT 4-way handshake");
1228 wpa_hexdump(MSG_DEBUG,
1229 "FT: PMKIDs/PMKR1Name from Supplicant",
1230 ie.pmkid, ie.num_pmkid * PMKID_LEN);
1231 wpa_hexdump(MSG_DEBUG, "FT: Derived PMKR1Name",
1232 sm->pmk_r1_name, WPA_PMK_NAME_LEN);
1233 return -1;
1234 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001235
1236 if (!kde->mdie || !kde->ftie) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001237 wpa_printf(MSG_DEBUG,
1238 "FT: No %s in FT 4-way handshake message 2/4",
1239 kde->mdie ? "FTIE" : "MDIE");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001240 return -1;
1241 }
1242
1243 mdie = (struct rsn_mdie *) (kde->mdie + 2);
1244 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
1245 os_memcmp(wpa_auth->conf.mobility_domain, mdie->mobility_domain,
1246 MOBILITY_DOMAIN_ID_LEN) != 0) {
1247 wpa_printf(MSG_DEBUG, "FT: MDIE mismatch");
1248 return -1;
1249 }
1250
1251 if (sm->assoc_resp_ftie &&
1252 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
1253 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
1254 2 + sm->assoc_resp_ftie[1]) != 0)) {
1255 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
1256 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
1257 kde->ftie, kde->ftie_len);
1258 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
1259 sm->assoc_resp_ftie, 2 + sm->assoc_resp_ftie[1]);
1260 return -1;
1261 }
1262
1263 return 0;
1264}
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001265#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001266
1267
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001268static int wpa_receive_error_report(struct wpa_authenticator *wpa_auth,
1269 struct wpa_state_machine *sm, int group)
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001270{
1271 /* Supplicant reported a Michael MIC error */
Sunil Raviaf8751c2023-03-29 11:35:17 -07001272 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001273 "received EAPOL-Key Error Request (STA detected Michael MIC failure (group=%d))",
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001274 group);
1275
1276 if (group && wpa_auth->conf.wpa_group != WPA_CIPHER_TKIP) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001277 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001278 "ignore Michael MIC failure report since group cipher is not TKIP");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001279 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001280 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001281 "ignore Michael MIC failure report since pairwise cipher is not TKIP");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001282 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001283 if (wpa_auth_mic_failure_report(wpa_auth,
1284 wpa_auth_get_spa(sm)) > 0)
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001285 return 1; /* STA entry was removed */
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001286 sm->dot11RSNAStatsTKIPRemoteMICFailures++;
1287 wpa_auth->dot11RSNAStatsTKIPRemoteMICFailures++;
1288 }
1289
1290 /*
1291 * Error report is not a request for a new key handshake, but since
1292 * Authenticator may do it, let's change the keys now anyway.
1293 */
1294 wpa_request_new_ptk(sm);
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001295 return 0;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001296}
1297
1298
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001299static int wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data,
1300 size_t data_len)
1301{
1302 struct wpa_ptk PTK;
1303 int ok = 0;
1304 const u8 *pmk = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001305 size_t pmk_len;
Hai Shalom021b0b52019-04-10 11:17:58 -07001306 int vlan_id = 0;
Sunil Raviaf8751c2023-03-29 11:35:17 -07001307 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
1308 u8 pmk_r1[PMK_LEN_MAX];
1309 size_t key_len;
1310 int ret = -1;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001311
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001312 os_memset(&PTK, 0, sizeof(PTK));
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001313 for (;;) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001314 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
1315 !wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001316 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07001317 sm->p2p_dev_addr, pmk, &pmk_len,
1318 &vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07001319 if (!pmk)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001320 break;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001321#ifdef CONFIG_IEEE80211R_AP
1322 if (wpa_key_mgmt_ft_psk(sm->wpa_key_mgmt)) {
1323 os_memcpy(sm->xxkey, pmk, pmk_len);
1324 sm->xxkey_len = pmk_len;
1325 }
1326#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08001327 } else {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001328 pmk = sm->PMK;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08001329 pmk_len = sm->pmk_len;
1330 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001331
Sunil Raviaf8751c2023-03-29 11:35:17 -07001332 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0,
Sunil Ravi7f769292024-07-23 22:21:32 +00001333 pmk_r0, pmk_r1, pmk_r0_name, &key_len,
1334 false) < 0)
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08001335 break;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001336
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001337 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK,
1338 data, data_len) == 0) {
Hai Shalom021b0b52019-04-10 11:17:58 -07001339 if (sm->PMK != pmk) {
1340 os_memcpy(sm->PMK, pmk, pmk_len);
1341 sm->pmk_len = pmk_len;
1342 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001343 ok = 1;
1344 break;
1345 }
1346
Roshan Pius3a1667e2018-07-03 15:17:14 -07001347 if (!wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
1348 wpa_key_mgmt_sae(sm->wpa_key_mgmt))
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001349 break;
1350 }
1351
1352 if (!ok) {
1353 wpa_printf(MSG_DEBUG,
1354 "WPA: Earlier SNonce did not result in matching MIC");
Sunil Raviaf8751c2023-03-29 11:35:17 -07001355 goto fail;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001356 }
1357
1358 wpa_printf(MSG_DEBUG,
1359 "WPA: Earlier SNonce resulted in matching MIC");
1360 sm->alt_snonce_valid = 0;
Hai Shalom021b0b52019-04-10 11:17:58 -07001361
1362 if (vlan_id && wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
1363 wpa_auth_update_vlan(sm->wpa_auth, sm->addr, vlan_id) < 0)
Sunil Raviaf8751c2023-03-29 11:35:17 -07001364 goto fail;
1365
1366#ifdef CONFIG_IEEE80211R_AP
1367 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) && !sm->ft_completed) {
1368 wpa_printf(MSG_DEBUG, "FT: Store PMK-R0/PMK-R1");
1369 wpa_auth_ft_store_keys(sm, pmk_r0, pmk_r1, pmk_r0_name,
1370 key_len);
1371 }
1372#endif /* CONFIG_IEEE80211R_AP */
Hai Shalom021b0b52019-04-10 11:17:58 -07001373
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001374 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN);
1375 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
Hai Shalom81f62d82019-07-22 12:10:00 -07001376 forced_memzero(&PTK, sizeof(PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07001377 sm->PTK_valid = true;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001378
Sunil Raviaf8751c2023-03-29 11:35:17 -07001379 ret = 0;
1380fail:
1381 forced_memzero(pmk_r0, sizeof(pmk_r0));
1382 forced_memzero(pmk_r1, sizeof(pmk_r1));
1383 return ret;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001384}
1385
1386
Hai Shaloma20dcd72022-02-04 13:43:00 -08001387static bool wpa_auth_gtk_rekey_in_process(struct wpa_authenticator *wpa_auth)
1388{
1389 struct wpa_group *group;
1390
1391 for (group = wpa_auth->group; group; group = group->next) {
1392 if (group->GKeyDoneStations)
1393 return true;
1394 }
1395 return false;
1396}
1397
1398
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001399enum eapol_key_msg { PAIRWISE_2, PAIRWISE_4, GROUP_2, REQUEST };
1400
1401static bool wpa_auth_valid_key_desc_ver(struct wpa_authenticator *wpa_auth,
1402 struct wpa_state_machine *sm, u16 ver)
1403{
1404 if (ver > WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1405 wpa_printf(MSG_INFO, "RSN: " MACSTR
1406 " used undefined Key Descriptor Version %d",
1407 MAC2STR(wpa_auth_get_spa(sm)), ver);
1408 return false;
1409 }
1410
1411 if (!wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1412 wpa_use_cmac(sm->wpa_key_mgmt) &&
1413 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1414 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1415 LOGGER_WARNING,
1416 "advertised support for AES-128-CMAC, but did not use it");
1417 return false;
1418 }
1419
1420 if (sm->pairwise != WPA_CIPHER_TKIP &&
1421 !wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1422 !wpa_use_cmac(sm->wpa_key_mgmt) &&
1423 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1424 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1425 LOGGER_WARNING,
1426 "did not use HMAC-SHA1-AES with CCMP/GCMP");
1427 return false;
1428 }
1429
1430 if (wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1431 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
1432 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1433 LOGGER_WARNING,
1434 "did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases");
1435 return false;
1436 }
1437
1438 return true;
1439}
1440
1441
1442static bool wpa_auth_valid_request_counter(struct wpa_authenticator *wpa_auth,
1443 struct wpa_state_machine *sm,
1444 const u8 *replay_counter)
1445{
1446
1447 if (sm->req_replay_counter_used &&
1448 os_memcmp(replay_counter, sm->req_replay_counter,
1449 WPA_REPLAY_COUNTER_LEN) <= 0) {
1450 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1451 LOGGER_WARNING,
1452 "received EAPOL-Key request with replayed counter");
1453 return false;
1454 }
1455
1456 return true;
1457}
1458
1459
1460static bool wpa_auth_valid_counter(struct wpa_authenticator *wpa_auth,
1461 struct wpa_state_machine *sm,
1462 const struct wpa_eapol_key *key,
1463 enum eapol_key_msg msg,
1464 const char *msgtxt)
1465{
1466 int i;
1467
1468 if (msg == REQUEST)
1469 return wpa_auth_valid_request_counter(wpa_auth, sm,
1470 key->replay_counter);
1471
1472 if (wpa_replay_counter_valid(sm->key_replay, key->replay_counter))
1473 return true;
1474
1475 if (msg == PAIRWISE_2 &&
1476 wpa_replay_counter_valid(sm->prev_key_replay,
1477 key->replay_counter) &&
1478 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING &&
1479 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) {
1480 /*
1481 * Some supplicant implementations (e.g., Windows XP
1482 * WZC) update SNonce for each EAPOL-Key 2/4. This
1483 * breaks the workaround on accepting any of the
1484 * pending requests, so allow the SNonce to be updated
1485 * even if we have already sent out EAPOL-Key 3/4.
1486 */
1487 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1488 LOGGER_DEBUG,
1489 "Process SNonce update from STA based on retransmitted EAPOL-Key 1/4");
1490 sm->update_snonce = 1;
1491 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN);
1492 sm->alt_snonce_valid = true;
1493 os_memcpy(sm->alt_replay_counter,
1494 sm->key_replay[0].counter,
1495 WPA_REPLAY_COUNTER_LEN);
1496 return true;
1497 }
1498
1499 if (msg == PAIRWISE_4 && sm->alt_snonce_valid &&
1500 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING &&
1501 os_memcmp(key->replay_counter, sm->alt_replay_counter,
1502 WPA_REPLAY_COUNTER_LEN) == 0) {
1503 /*
1504 * Supplicant may still be using the old SNonce since
1505 * there was two EAPOL-Key 2/4 messages and they had
1506 * different SNonce values.
1507 */
1508 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1509 LOGGER_DEBUG,
1510 "Try to process received EAPOL-Key 4/4 based on old Replay Counter and SNonce from an earlier EAPOL-Key 1/4");
1511 return true;
1512 }
1513
1514 if (msg == PAIRWISE_2 &&
1515 wpa_replay_counter_valid(sm->prev_key_replay,
1516 key->replay_counter) &&
1517 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING) {
1518 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1519 LOGGER_DEBUG,
1520 "ignore retransmitted EAPOL-Key %s - SNonce did not change",
1521 msgtxt);
1522 } else {
1523 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1524 LOGGER_DEBUG,
1525 "received EAPOL-Key %s with unexpected replay counter",
1526 msgtxt);
1527 }
1528 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
1529 if (!sm->key_replay[i].valid)
1530 break;
1531 wpa_hexdump(MSG_DEBUG, "pending replay counter",
1532 sm->key_replay[i].counter,
1533 WPA_REPLAY_COUNTER_LEN);
1534 }
1535 wpa_hexdump(MSG_DEBUG, "received replay counter",
1536 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
1537 return false;
1538}
1539
1540
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001541void wpa_receive(struct wpa_authenticator *wpa_auth,
1542 struct wpa_state_machine *sm,
1543 u8 *data, size_t data_len)
1544{
1545 struct ieee802_1x_hdr *hdr;
1546 struct wpa_eapol_key *key;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001547 u16 key_info, ver, key_data_length;
1548 enum eapol_key_msg msg;
1549 const char *msgtxt;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001550 const u8 *key_data;
1551 size_t keyhdrlen, mic_len;
1552 u8 *mic;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001553 u8 *key_data_buf = NULL;
1554 size_t key_data_buf_len = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001555
Hai Shalomfdcde762020-04-02 11:19:20 -07001556 if (!wpa_auth || !wpa_auth->conf.wpa || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001557 return;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00001558
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001559 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001560
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001561 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001562 keyhdrlen = sizeof(*key) + mic_len + 2;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001563
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001564 if (data_len < sizeof(*hdr) + keyhdrlen) {
1565 wpa_printf(MSG_DEBUG, "WPA: Ignore too short EAPOL-Key frame");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001566 return;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001567 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001568
1569 hdr = (struct ieee802_1x_hdr *) data;
1570 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001571 mic = (u8 *) (key + 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001572 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001573 key_data = mic + mic_len + 2;
1574 key_data_length = WPA_GET_BE16(mic + mic_len);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001575 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
Hai Shalomfdcde762020-04-02 11:19:20 -07001576 " key_info=0x%x type=%u mic_len=%zu key_data_length=%u",
Sunil Raviaf8751c2023-03-29 11:35:17 -07001577 MAC2STR(wpa_auth_get_spa(sm)), key_info, key->type,
Hai Shalomfdcde762020-04-02 11:19:20 -07001578 mic_len, key_data_length);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001579 wpa_hexdump(MSG_MSGDUMP,
1580 "WPA: EAPOL-Key header (ending before Key MIC)",
1581 key, sizeof(*key));
1582 wpa_hexdump(MSG_MSGDUMP, "WPA: EAPOL-Key Key MIC",
1583 mic, mic_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001584 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001585 wpa_printf(MSG_INFO,
1586 "WPA: Invalid EAPOL-Key frame - key_data overflow (%d > %zu)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001587 key_data_length,
Hai Shalomfdcde762020-04-02 11:19:20 -07001588 data_len - sizeof(*hdr) - keyhdrlen);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001589 return;
1590 }
1591
1592 if (sm->wpa == WPA_VERSION_WPA2) {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001593 if (key->type == EAPOL_KEY_TYPE_WPA) {
1594 /*
1595 * Some deployed station implementations seem to send
1596 * msg 4/4 with incorrect type value in WPA2 mode.
1597 */
Hai Shalomfdcde762020-04-02 11:19:20 -07001598 wpa_printf(MSG_DEBUG,
1599 "Workaround: Allow EAPOL-Key with unexpected WPA type in RSN mode");
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001600 } else if (key->type != EAPOL_KEY_TYPE_RSN) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001601 wpa_printf(MSG_DEBUG,
1602 "Ignore EAPOL-Key with unexpected type %d in RSN mode",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001603 key->type);
1604 return;
1605 }
1606 } else {
1607 if (key->type != EAPOL_KEY_TYPE_WPA) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001608 wpa_printf(MSG_DEBUG,
1609 "Ignore EAPOL-Key with unexpected type %d in WPA mode",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001610 key->type);
1611 return;
1612 }
1613 }
1614
1615 wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
1616 WPA_NONCE_LEN);
1617 wpa_hexdump(MSG_DEBUG, "WPA: Received Replay Counter",
1618 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
1619
1620 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1621 * are set */
1622
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001623 if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
1624 wpa_printf(MSG_DEBUG, "WPA: Ignore SMK message");
1625 return;
1626 }
1627
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001628 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
1629 if (!wpa_auth_valid_key_desc_ver(wpa_auth, sm, ver))
1630 goto out;
1631 if (mic_len > 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) &&
1632 sm->PTK_valid &&
1633 (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
1634 ver == WPA_KEY_INFO_TYPE_AES_128_CMAC ||
1635 wpa_use_aes_key_wrap(sm->wpa_key_mgmt)) &&
1636 key_data_length >= 8 && key_data_length % 8 == 0) {
1637 key_data_length -= 8; /* AES-WRAP adds 8 bytes */
1638 key_data_buf = os_malloc(key_data_length);
1639 if (!key_data_buf)
1640 goto out;
1641 key_data_buf_len = key_data_length;
1642 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len,
1643 key_data_length / 8, key_data, key_data_buf)) {
1644 wpa_printf(MSG_INFO,
1645 "RSN: AES unwrap failed - could not decrypt EAPOL-Key key data");
1646 goto out;
1647 }
1648 key_data = key_data_buf;
1649 wpa_hexdump_key(MSG_DEBUG, "RSN: Decrypted EAPOL-Key Key Data",
1650 key_data, key_data_length);
1651 }
1652
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001653 if (key_info & WPA_KEY_INFO_REQUEST) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001654 msg = REQUEST;
1655 msgtxt = "Request";
1656 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE)) {
1657 msg = GROUP_2;
1658 msgtxt = "2/2 Group";
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001659 } else if (key_data_length == 0 ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001660 (sm->wpa == WPA_VERSION_WPA2 &&
1661 (!(key_info & WPA_KEY_INFO_ENCR_KEY_DATA) ||
1662 key_data_buf) &&
1663 (key_info & WPA_KEY_INFO_SECURE) &&
1664 !get_ie(key_data, key_data_length, WLAN_EID_RSN)) ||
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001665 (mic_len == 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) &&
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001666 key_data_length == AES_BLOCK_SIZE)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001667 msg = PAIRWISE_4;
1668 msgtxt = "4/4 Pairwise";
1669 } else {
1670 msg = PAIRWISE_2;
1671 msgtxt = "2/4 Pairwise";
1672 }
1673
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001674 if (!wpa_auth_valid_counter(wpa_auth, sm, key, msg, msgtxt))
1675 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001676
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001677#ifdef CONFIG_FILS
1678 if (sm->wpa == WPA_VERSION_WPA2 && mic_len == 0 &&
1679 !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001680 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001681 "WPA: Encr Key Data bit not set even though AEAD cipher is supposed to be used - drop frame");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001682 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001683 }
1684#endif /* CONFIG_FILS */
1685
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001686 switch (msg) {
1687 case PAIRWISE_2:
1688 if (sm->wpa_ptk_state != WPA_PTK_PTKSTART &&
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001689 sm->wpa_ptk_state != WPA_PTK_PTKCALCNEGOTIATING &&
1690 (!sm->update_snonce ||
1691 sm->wpa_ptk_state != WPA_PTK_PTKINITNEGOTIATING)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001692 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1693 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001694 "received EAPOL-Key msg 2/4 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001695 sm->wpa_ptk_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001696 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001697 }
1698 random_add_randomness(key->key_nonce, WPA_NONCE_LEN);
1699 if (sm->group->reject_4way_hs_for_entropy) {
1700 /*
1701 * The system did not have enough entropy to generate
1702 * strong random numbers. Reject the first 4-way
1703 * handshake(s) and collect some entropy based on the
1704 * information from it. Once enough entropy is
1705 * available, the next atempt will trigger GMK/Key
1706 * Counter update and the station will be allowed to
1707 * continue.
1708 */
Hai Shalomfdcde762020-04-02 11:19:20 -07001709 wpa_printf(MSG_DEBUG,
1710 "WPA: Reject 4-way handshake to collect more entropy for random number generation");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001711 random_mark_pool_ready();
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001712 wpa_sta_disconnect(wpa_auth, sm->addr,
1713 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001714 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001715 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001716 break;
1717 case PAIRWISE_4:
1718 if (sm->wpa_ptk_state != WPA_PTK_PTKINITNEGOTIATING ||
1719 !sm->PTK_valid) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001720 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1721 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001722 "received EAPOL-Key msg 4/4 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001723 sm->wpa_ptk_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001724 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001725 }
1726 break;
1727 case GROUP_2:
1728 if (sm->wpa_ptk_group_state != WPA_PTK_GROUP_REKEYNEGOTIATING
1729 || !sm->PTK_valid) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001730 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1731 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001732 "received EAPOL-Key msg 2/2 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001733 sm->wpa_ptk_group_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001734 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001735 }
1736 break;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001737 case REQUEST:
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001738 if (sm->wpa_ptk_state == WPA_PTK_PTKSTART ||
1739 sm->wpa_ptk_state == WPA_PTK_PTKCALCNEGOTIATING ||
1740 sm->wpa_ptk_state == WPA_PTK_PTKCALCNEGOTIATING2 ||
1741 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING) {
1742 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1743 LOGGER_INFO,
1744 "received EAPOL-Key Request in invalid state (%d) - dropped",
1745 sm->wpa_ptk_state);
1746 goto out;
1747 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001748 break;
1749 }
1750
Sunil Raviaf8751c2023-03-29 11:35:17 -07001751 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001752 "received EAPOL-Key frame (%s)", msgtxt);
1753
1754 if (key_info & WPA_KEY_INFO_ACK) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001755 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001756 "received invalid EAPOL-Key: Key Ack set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001757 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001758 }
1759
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001760 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
1761 !(key_info & WPA_KEY_INFO_MIC)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001762 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001763 "received invalid EAPOL-Key: Key MIC not set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001764 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001765 }
1766
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001767#ifdef CONFIG_FILS
1768 if (wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
1769 (key_info & WPA_KEY_INFO_MIC)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001770 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001771 "received invalid EAPOL-Key: Key MIC set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001772 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001773 }
1774#endif /* CONFIG_FILS */
1775
Hai Shalome21d4e82020-04-29 16:34:06 -07001776 sm->MICVerified = false;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001777 if (sm->PTK_valid && !sm->update_snonce) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001778 if (mic_len &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001779 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK,
1780 data, data_len) &&
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001781 (msg != PAIRWISE_4 || !sm->alt_snonce_valid ||
1782 wpa_try_alt_snonce(sm, data, data_len))) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001783 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1784 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001785 "received EAPOL-Key with invalid MIC");
Hai Shalom74f70d42019-02-11 14:42:39 -08001786#ifdef TEST_FUZZ
1787 wpa_printf(MSG_INFO,
1788 "TEST: Ignore Key MIC failure for fuzz testing");
1789 goto continue_fuzz;
1790#endif /* TEST_FUZZ */
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001791 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001792 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001793#ifdef CONFIG_FILS
1794 if (!mic_len &&
1795 wpa_aead_decrypt(sm, &sm->PTK, data, data_len,
1796 &key_data_length) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001797 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1798 LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001799 "received EAPOL-Key with invalid MIC");
Hai Shalom74f70d42019-02-11 14:42:39 -08001800#ifdef TEST_FUZZ
1801 wpa_printf(MSG_INFO,
1802 "TEST: Ignore Key MIC failure for fuzz testing");
1803 goto continue_fuzz;
1804#endif /* TEST_FUZZ */
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001805 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001806 }
1807#endif /* CONFIG_FILS */
Hai Shalom74f70d42019-02-11 14:42:39 -08001808#ifdef TEST_FUZZ
1809 continue_fuzz:
1810#endif /* TEST_FUZZ */
Hai Shalome21d4e82020-04-29 16:34:06 -07001811 sm->MICVerified = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001812 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
1813 sm->pending_1_of_4_timeout = 0;
1814 }
1815
1816 if (key_info & WPA_KEY_INFO_REQUEST) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001817 if (!(key_info & WPA_KEY_INFO_SECURE)) {
1818 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1819 LOGGER_INFO,
1820 "received EAPOL-Key request without Secure=1");
1821 goto out;
1822 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001823 if (sm->MICVerified) {
1824 sm->req_replay_counter_used = 1;
1825 os_memcpy(sm->req_replay_counter, key->replay_counter,
1826 WPA_REPLAY_COUNTER_LEN);
1827 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001828 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1829 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001830 "received EAPOL-Key request with invalid MIC");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001831 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001832 }
1833
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001834 if (key_info & WPA_KEY_INFO_ERROR) {
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001835 if (wpa_receive_error_report(
1836 wpa_auth, sm,
1837 !(key_info & WPA_KEY_INFO_KEY_TYPE)) > 0)
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001838 goto out; /* STA entry was removed */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001839 } else if (key_info & WPA_KEY_INFO_KEY_TYPE) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001840 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1841 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001842 "received EAPOL-Key Request for new 4-Way Handshake");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001843 wpa_request_new_ptk(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001844 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001845 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1846 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001847 "received EAPOL-Key Request for GTK rekeying");
Sunil Ravi7f769292024-07-23 22:21:32 +00001848
1849 eloop_cancel_timeout(wpa_rekey_gtk,
1850 wpa_get_primary_auth(wpa_auth),
1851 NULL);
Hai Shaloma20dcd72022-02-04 13:43:00 -08001852 if (wpa_auth_gtk_rekey_in_process(wpa_auth))
1853 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG,
1854 "skip new GTK rekey - already in process");
1855 else
Sunil Ravi7f769292024-07-23 22:21:32 +00001856 wpa_rekey_gtk(wpa_get_primary_auth(wpa_auth),
1857 NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001858 }
1859 } else {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001860 /* Do not allow the same key replay counter to be reused. */
1861 wpa_replay_counter_mark_invalid(sm->key_replay,
1862 key->replay_counter);
1863
1864 if (msg == PAIRWISE_2) {
1865 /*
1866 * Maintain a copy of the pending EAPOL-Key frames in
1867 * case the EAPOL-Key frame was retransmitted. This is
1868 * needed to allow EAPOL-Key msg 2/4 reply to another
1869 * pending msg 1/4 to update the SNonce to work around
1870 * unexpected supplicant behavior.
1871 */
1872 os_memcpy(sm->prev_key_replay, sm->key_replay,
1873 sizeof(sm->key_replay));
1874 } else {
1875 os_memset(sm->prev_key_replay, 0,
1876 sizeof(sm->prev_key_replay));
1877 }
1878
1879 /*
1880 * Make sure old valid counters are not accepted anymore and
1881 * do not get copied again.
1882 */
1883 wpa_replay_counter_mark_invalid(sm->key_replay, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001884 }
1885
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001886 os_free(sm->last_rx_eapol_key);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001887 sm->last_rx_eapol_key = os_memdup(data, data_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07001888 if (!sm->last_rx_eapol_key)
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001889 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001890 sm->last_rx_eapol_key_len = data_len;
1891
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001892 sm->rx_eapol_key_secure = !!(key_info & WPA_KEY_INFO_SECURE);
Hai Shalome21d4e82020-04-29 16:34:06 -07001893 sm->EAPOLKeyReceived = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001894 sm->EAPOLKeyPairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1895 sm->EAPOLKeyRequest = !!(key_info & WPA_KEY_INFO_REQUEST);
1896 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN);
1897 wpa_sm_step(sm);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001898
1899out:
1900 bin_clear_free(key_data_buf, key_data_buf_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001901}
1902
1903
1904static int wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr,
1905 const u8 *gnonce, u8 *gtk, size_t gtk_len)
1906{
Roshan Pius3a1667e2018-07-03 15:17:14 -07001907 u8 data[ETH_ALEN + WPA_NONCE_LEN + 8 + WPA_GTK_MAX_LEN];
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001908 u8 *pos;
1909 int ret = 0;
1910
1911 /* GTK = PRF-X(GMK, "Group key expansion",
1912 * AA || GNonce || Time || random data)
1913 * The example described in the IEEE 802.11 standard uses only AA and
1914 * GNonce as inputs here. Add some more entropy since this derivation
1915 * is done only at the Authenticator and as such, does not need to be
1916 * exactly same.
1917 */
Roshan Pius3a1667e2018-07-03 15:17:14 -07001918 os_memset(data, 0, sizeof(data));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001919 os_memcpy(data, addr, ETH_ALEN);
1920 os_memcpy(data + ETH_ALEN, gnonce, WPA_NONCE_LEN);
1921 pos = data + ETH_ALEN + WPA_NONCE_LEN;
1922 wpa_get_ntp_timestamp(pos);
Hai Shalom74f70d42019-02-11 14:42:39 -08001923#ifdef TEST_FUZZ
1924 os_memset(pos, 0xef, 8);
1925#endif /* TEST_FUZZ */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001926 pos += 8;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001927 if (random_get_bytes(pos, gtk_len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001928 ret = -1;
1929
Roshan Pius3a1667e2018-07-03 15:17:14 -07001930#ifdef CONFIG_SHA384
1931 if (sha384_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1932 gtk, gtk_len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001933 ret = -1;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001934#else /* CONFIG_SHA384 */
1935#ifdef CONFIG_SHA256
1936 if (sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1937 gtk, gtk_len) < 0)
1938 ret = -1;
1939#else /* CONFIG_SHA256 */
1940 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1941 gtk, gtk_len) < 0)
1942 ret = -1;
1943#endif /* CONFIG_SHA256 */
1944#endif /* CONFIG_SHA384 */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001945
Hai Shalom81f62d82019-07-22 12:10:00 -07001946 forced_memzero(data, sizeof(data));
1947
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001948 return ret;
1949}
1950
1951
1952static void wpa_send_eapol_timeout(void *eloop_ctx, void *timeout_ctx)
1953{
1954 struct wpa_authenticator *wpa_auth = eloop_ctx;
1955 struct wpa_state_machine *sm = timeout_ctx;
1956
Sunil Ravia04bd252022-05-02 22:54:18 -07001957 if (sm->waiting_radius_psk) {
1958 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG,
1959 "Ignore EAPOL-Key timeout while waiting for RADIUS PSK");
1960 return;
1961 }
1962
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001963 sm->pending_1_of_4_timeout = 0;
Sunil Raviaf8751c2023-03-29 11:35:17 -07001964 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
1965 "EAPOL-Key timeout");
Hai Shalome21d4e82020-04-29 16:34:06 -07001966 sm->TimeoutEvt = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001967 wpa_sm_step(sm);
1968}
1969
1970
1971void __wpa_send_eapol(struct wpa_authenticator *wpa_auth,
1972 struct wpa_state_machine *sm, int key_info,
1973 const u8 *key_rsc, const u8 *nonce,
1974 const u8 *kde, size_t kde_len,
1975 int keyidx, int encr, int force_version)
1976{
Hai Shalomfdcde762020-04-02 11:19:20 -07001977 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001978 struct ieee802_1x_hdr *hdr;
1979 struct wpa_eapol_key *key;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001980 size_t len, mic_len, keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001981 int alg;
1982 int key_data_len, pad_len = 0;
1983 u8 *buf, *pos;
1984 int version, pairwise;
1985 int i;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001986 u8 *key_mic, *key_data;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001987
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001988 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001989 keyhdrlen = sizeof(*key) + mic_len + 2;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001990
1991 len = sizeof(struct ieee802_1x_hdr) + keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001992
1993 if (force_version)
1994 version = force_version;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001995 else if (wpa_use_akm_defined(sm->wpa_key_mgmt))
Dmitry Shmidtf21452a2014-02-26 10:55:25 -08001996 version = WPA_KEY_INFO_TYPE_AKM_DEFINED;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001997 else if (wpa_use_cmac(sm->wpa_key_mgmt))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001998 version = WPA_KEY_INFO_TYPE_AES_128_CMAC;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07001999 else if (sm->pairwise != WPA_CIPHER_TKIP)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002000 version = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
2001 else
2002 version = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
2003
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07002004 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002005
Hai Shalomfdcde762020-04-02 11:19:20 -07002006 wpa_printf(MSG_DEBUG,
2007 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002008 version,
2009 (key_info & WPA_KEY_INFO_SECURE) ? 1 : 0,
2010 (key_info & WPA_KEY_INFO_MIC) ? 1 : 0,
2011 (key_info & WPA_KEY_INFO_ACK) ? 1 : 0,
2012 (key_info & WPA_KEY_INFO_INSTALL) ? 1 : 0,
Hai Shalomfdcde762020-04-02 11:19:20 -07002013 pairwise, kde_len, keyidx, encr);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002014
2015 key_data_len = kde_len;
2016
2017 if ((version == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07002018 wpa_use_aes_key_wrap(sm->wpa_key_mgmt) ||
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002019 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) {
2020 pad_len = key_data_len % 8;
2021 if (pad_len)
2022 pad_len = 8 - pad_len;
2023 key_data_len += pad_len + 8;
2024 }
2025
2026 len += key_data_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002027 if (!mic_len && encr)
2028 len += AES_BLOCK_SIZE;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002029
2030 hdr = os_zalloc(len);
Hai Shalomfdcde762020-04-02 11:19:20 -07002031 if (!hdr)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002032 return;
Hai Shalomfdcde762020-04-02 11:19:20 -07002033 hdr->version = conf->eapol_version;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002034 hdr->type = IEEE802_1X_TYPE_EAPOL_KEY;
2035 hdr->length = host_to_be16(len - sizeof(*hdr));
2036 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002037 key_mic = (u8 *) (key + 1);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002038 key_data = ((u8 *) (hdr + 1)) + keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002039
2040 key->type = sm->wpa == WPA_VERSION_WPA2 ?
2041 EAPOL_KEY_TYPE_RSN : EAPOL_KEY_TYPE_WPA;
2042 key_info |= version;
2043 if (encr && sm->wpa == WPA_VERSION_WPA2)
2044 key_info |= WPA_KEY_INFO_ENCR_KEY_DATA;
2045 if (sm->wpa != WPA_VERSION_WPA2)
2046 key_info |= keyidx << WPA_KEY_INFO_KEY_INDEX_SHIFT;
2047 WPA_PUT_BE16(key->key_info, key_info);
2048
Hai Shalomfdcde762020-04-02 11:19:20 -07002049 alg = pairwise ? sm->pairwise : conf->wpa_group;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002050 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002051 WPA_PUT_BE16(key->key_length, 0);
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002052 else
2053 WPA_PUT_BE16(key->key_length, wpa_cipher_key_len(alg));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002054
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002055 for (i = RSNA_MAX_EAPOL_RETRIES - 1; i > 0; i--) {
2056 sm->key_replay[i].valid = sm->key_replay[i - 1].valid;
2057 os_memcpy(sm->key_replay[i].counter,
2058 sm->key_replay[i - 1].counter,
2059 WPA_REPLAY_COUNTER_LEN);
2060 }
2061 inc_byte_array(sm->key_replay[0].counter, WPA_REPLAY_COUNTER_LEN);
2062 os_memcpy(key->replay_counter, sm->key_replay[0].counter,
2063 WPA_REPLAY_COUNTER_LEN);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002064 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter",
2065 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
Hai Shalome21d4e82020-04-29 16:34:06 -07002066 sm->key_replay[0].valid = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002067
2068 if (nonce)
2069 os_memcpy(key->key_nonce, nonce, WPA_NONCE_LEN);
2070
2071 if (key_rsc)
2072 os_memcpy(key->key_rsc, key_rsc, WPA_KEY_RSC_LEN);
2073
2074 if (kde && !encr) {
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002075 os_memcpy(key_data, kde, kde_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002076 WPA_PUT_BE16(key_mic + mic_len, kde_len);
2077#ifdef CONFIG_FILS
Roshan Pius3a1667e2018-07-03 15:17:14 -07002078 } else if (!mic_len && kde) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002079 const u8 *aad[1];
2080 size_t aad_len[1];
2081
2082 WPA_PUT_BE16(key_mic, AES_BLOCK_SIZE + kde_len);
2083 wpa_hexdump_key(MSG_DEBUG, "Plaintext EAPOL-Key Key Data",
2084 kde, kde_len);
2085
2086 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK",
2087 sm->PTK.kek, sm->PTK.kek_len);
2088 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
2089 * to Key Data (exclusive). */
2090 aad[0] = (u8 *) hdr;
2091 aad_len[0] = key_mic + 2 - (u8 *) hdr;
2092 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len,
2093 1, aad, aad_len, key_mic + 2) < 0) {
2094 wpa_printf(MSG_DEBUG, "WPA: AES-SIV encryption failed");
2095 return;
2096 }
2097
2098 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
2099 key_mic + 2, AES_BLOCK_SIZE + kde_len);
2100#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002101 } else if (encr && kde) {
2102 buf = os_zalloc(key_data_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07002103 if (!buf) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002104 os_free(hdr);
2105 return;
2106 }
2107 pos = buf;
2108 os_memcpy(pos, kde, kde_len);
2109 pos += kde_len;
2110
2111 if (pad_len)
2112 *pos++ = 0xdd;
2113
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002114 wpa_hexdump_key(MSG_DEBUG,
2115 "Plaintext EAPOL-Key Key Data (+ padding)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002116 buf, key_data_len);
2117 if (version == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07002118 wpa_use_aes_key_wrap(sm->wpa_key_mgmt) ||
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002119 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002120 wpa_hexdump_key(MSG_DEBUG, "RSN: AES-WRAP using KEK",
2121 sm->PTK.kek, sm->PTK.kek_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002122 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
2123 (key_data_len - 8) / 8, buf, key_data)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002124 os_free(hdr);
Sunil Ravia04bd252022-05-02 22:54:18 -07002125 bin_clear_free(buf, key_data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002126 return;
2127 }
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002128 wpa_hexdump(MSG_DEBUG,
2129 "RSN: Encrypted Key Data from AES-WRAP",
2130 key_data, key_data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002131 WPA_PUT_BE16(key_mic + mic_len, key_data_len);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002132#if !defined(CONFIG_NO_RC4) && !defined(CONFIG_FIPS)
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002133 } else if (sm->PTK.kek_len == 16) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002134 u8 ek[32];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002135
2136 wpa_printf(MSG_DEBUG,
2137 "WPA: Encrypt Key Data using RC4");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002138 os_memcpy(key->key_iv,
2139 sm->group->Counter + WPA_NONCE_LEN - 16, 16);
2140 inc_byte_array(sm->group->Counter, WPA_NONCE_LEN);
2141 os_memcpy(ek, key->key_iv, 16);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002142 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
2143 os_memcpy(key_data, buf, key_data_len);
2144 rc4_skip(ek, 32, 256, key_data, key_data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002145 WPA_PUT_BE16(key_mic + mic_len, key_data_len);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002146#endif /* !(CONFIG_NO_RC4 || CONFIG_FIPS) */
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002147 } else {
2148 os_free(hdr);
Sunil Ravia04bd252022-05-02 22:54:18 -07002149 bin_clear_free(buf, key_data_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002150 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002151 }
Sunil Ravia04bd252022-05-02 22:54:18 -07002152 bin_clear_free(buf, key_data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002153 }
2154
2155 if (key_info & WPA_KEY_INFO_MIC) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002156 if (!sm->PTK_valid || !mic_len) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002157 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
2158 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07002159 "PTK not valid when sending EAPOL-Key frame");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002160 os_free(hdr);
2161 return;
2162 }
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002163
Roshan Pius3a1667e2018-07-03 15:17:14 -07002164 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
2165 sm->wpa_key_mgmt, version,
2166 (u8 *) hdr, len, key_mic) < 0) {
2167 os_free(hdr);
2168 return;
2169 }
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07002170#ifdef CONFIG_TESTING_OPTIONS
2171 if (!pairwise &&
Hai Shalomfdcde762020-04-02 11:19:20 -07002172 conf->corrupt_gtk_rekey_mic_probability > 0.0 &&
2173 drand48() < conf->corrupt_gtk_rekey_mic_probability) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002174 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
2175 LOGGER_INFO,
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07002176 "Corrupting group EAPOL-Key Key MIC");
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002177 key_mic[0]++;
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07002178 }
2179#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002180 }
2181
Hai Shalomfdcde762020-04-02 11:19:20 -07002182 wpa_auth_set_eapol(wpa_auth, sm->addr, WPA_EAPOL_inc_EapolFramesTx, 1);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002183 wpa_hexdump(MSG_DEBUG, "Send EAPOL-Key msg", hdr, len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002184 wpa_auth_send_eapol(wpa_auth, sm->addr, (u8 *) hdr, len,
Kai Shie75b0652020-11-24 20:31:29 -08002185 sm->pairwise_set);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002186 os_free(hdr);
2187}
2188
2189
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002190static int wpa_auth_get_sta_count(struct wpa_authenticator *wpa_auth)
2191{
2192 if (!wpa_auth->cb->get_sta_count)
2193 return -1;
2194
2195 return wpa_auth->cb->get_sta_count(wpa_auth->cb_ctx);
2196}
2197
2198
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002199static void wpa_send_eapol(struct wpa_authenticator *wpa_auth,
2200 struct wpa_state_machine *sm, int key_info,
2201 const u8 *key_rsc, const u8 *nonce,
2202 const u8 *kde, size_t kde_len,
2203 int keyidx, int encr)
2204{
2205 int timeout_ms;
2206 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002207 u32 ctr;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002208
Hai Shalomfdcde762020-04-02 11:19:20 -07002209 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002210 return;
2211
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002212 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
2213
2214#ifdef CONFIG_TESTING_OPTIONS
2215 /* When delay_eapol_tx is true, delay the EAPOL-Key transmission by
2216 * sending it only on the last attempt after all timeouts for the prior
2217 * skipped attemps. */
2218 if (wpa_auth->conf.delay_eapol_tx &&
2219 ctr != wpa_auth->conf.wpa_pairwise_update_count) {
2220 wpa_msg(sm->wpa_auth->conf.msg_ctx, MSG_INFO,
2221 "DELAY-EAPOL-TX-%d", ctr);
2222 goto skip_tx;
2223 }
2224#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002225 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len,
2226 keyidx, encr, 0);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002227#ifdef CONFIG_TESTING_OPTIONS
2228skip_tx:
2229#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002230
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002231 if (ctr == 1 && wpa_auth->conf.tx_status) {
2232 if (pairwise)
2233 timeout_ms = eapol_key_timeout_first;
2234 else if (wpa_auth_get_sta_count(wpa_auth) > 100)
2235 timeout_ms = eapol_key_timeout_first_group * 2;
2236 else
2237 timeout_ms = eapol_key_timeout_first_group;
2238 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002239 timeout_ms = eapol_key_timeout_subseq;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002240 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002241 if (wpa_auth->conf.wpa_disable_eapol_key_retries &&
2242 (!pairwise || (key_info & WPA_KEY_INFO_MIC)))
2243 timeout_ms = eapol_key_timeout_no_retrans;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002244 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
2245 sm->pending_1_of_4_timeout = 1;
Hai Shalom74f70d42019-02-11 14:42:39 -08002246#ifdef TEST_FUZZ
2247 timeout_ms = 1;
2248#endif /* TEST_FUZZ */
Kai Shie75b0652020-11-24 20:31:29 -08002249#ifdef CONFIG_TESTING_OPTIONS
2250 if(wpa_auth->conf.enable_eapol_large_timeout) {
2251 timeout_ms = 50 * 1000;
2252 }
2253#endif
Hai Shalomfdcde762020-04-02 11:19:20 -07002254 wpa_printf(MSG_DEBUG,
2255 "WPA: Use EAPOL-Key timeout of %u ms (retry counter %u)",
2256 timeout_ms, ctr);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002257 eloop_register_timeout(timeout_ms / 1000, (timeout_ms % 1000) * 1000,
2258 wpa_send_eapol_timeout, wpa_auth, sm);
2259}
2260
2261
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002262static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2263 u8 *data, size_t data_len)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002264{
2265 struct ieee802_1x_hdr *hdr;
2266 struct wpa_eapol_key *key;
2267 u16 key_info;
2268 int ret = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002269 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002270 size_t mic_len = wpa_mic_len(akmp, pmk_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002271
2272 if (data_len < sizeof(*hdr) + sizeof(*key))
2273 return -1;
2274
2275 hdr = (struct ieee802_1x_hdr *) data;
2276 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002277 mic_pos = (u8 *) (key + 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002278 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002279 os_memcpy(mic, mic_pos, mic_len);
2280 os_memset(mic_pos, 0, mic_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002281 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2282 key_info & WPA_KEY_INFO_TYPE_MASK,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002283 data, data_len, mic_pos) ||
2284 os_memcmp_const(mic, mic_pos, mic_len) != 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002285 ret = -1;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002286 os_memcpy(mic_pos, mic, mic_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002287 return ret;
2288}
2289
2290
2291void wpa_remove_ptk(struct wpa_state_machine *sm)
2292{
Hai Shalome21d4e82020-04-29 16:34:06 -07002293 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002294 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
Hai Shalom60840252021-02-19 19:02:11 -08002295
2296 wpa_auth_remove_ptksa(sm->wpa_auth, sm->addr, sm->pairwise);
2297
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002298 if (wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL,
Hai Shalomfdcde762020-04-02 11:19:20 -07002299 0, KEY_FLAG_PAIRWISE))
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002300 wpa_printf(MSG_DEBUG,
2301 "RSN: PTK removal from the driver failed");
Hai Shalomfdcde762020-04-02 11:19:20 -07002302 if (sm->use_ext_key_id &&
2303 wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 1, NULL,
2304 0, KEY_FLAG_PAIRWISE))
2305 wpa_printf(MSG_DEBUG,
2306 "RSN: PTK Key ID 1 removal from the driver failed");
Hai Shalome21d4e82020-04-29 16:34:06 -07002307 sm->pairwise_set = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002308 eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
2309}
2310
2311
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002312int wpa_auth_sm_event(struct wpa_state_machine *sm, enum wpa_event event)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002313{
2314 int remove_ptk = 1;
2315
Hai Shalomfdcde762020-04-02 11:19:20 -07002316 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002317 return -1;
2318
Sunil Raviaf8751c2023-03-29 11:35:17 -07002319 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002320 "event %d notification", event);
2321
2322 switch (event) {
2323 case WPA_AUTH:
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002324#ifdef CONFIG_MESH
2325 /* PTKs are derived through AMPE */
2326 if (wpa_auth_start_ampe(sm->wpa_auth, sm->addr)) {
2327 /* not mesh */
2328 break;
2329 }
2330 return 0;
2331#endif /* CONFIG_MESH */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002332 case WPA_ASSOC:
2333 break;
2334 case WPA_DEAUTH:
2335 case WPA_DISASSOC:
Hai Shalome21d4e82020-04-29 16:34:06 -07002336 sm->DeauthenticationRequest = true;
Hai Shalom1dc4d202019-04-29 16:22:27 -07002337 os_memset(sm->PMK, 0, sizeof(sm->PMK));
2338 sm->pmk_len = 0;
Sunil Ravia04bd252022-05-02 22:54:18 -07002339#ifdef CONFIG_IEEE80211R_AP
Hai Shalom1dc4d202019-04-29 16:22:27 -07002340 os_memset(sm->xxkey, 0, sizeof(sm->xxkey));
2341 sm->xxkey_len = 0;
Hai Shalom81f62d82019-07-22 12:10:00 -07002342 os_memset(sm->pmk_r1, 0, sizeof(sm->pmk_r1));
2343 sm->pmk_r1_len = 0;
Hai Shalom1dc4d202019-04-29 16:22:27 -07002344#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002345 break;
2346 case WPA_REAUTH:
2347 case WPA_REAUTH_EAPOL:
2348 if (!sm->started) {
2349 /*
2350 * When using WPS, we may end up here if the STA
2351 * manages to re-associate without the previous STA
2352 * entry getting removed. Consequently, we need to make
2353 * sure that the WPA state machines gets initialized
2354 * properly at this point.
2355 */
Hai Shalomfdcde762020-04-02 11:19:20 -07002356 wpa_printf(MSG_DEBUG,
2357 "WPA state machine had not been started - initialize now");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002358 sm->started = 1;
Hai Shalome21d4e82020-04-29 16:34:06 -07002359 sm->Init = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002360 if (wpa_sm_step(sm) == 1)
2361 return 1; /* should not really happen */
Hai Shalome21d4e82020-04-29 16:34:06 -07002362 sm->Init = false;
2363 sm->AuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002364 break;
2365 }
Hai Shalomfdcde762020-04-02 11:19:20 -07002366
Sunil Ravia04bd252022-05-02 22:54:18 -07002367 if (sm->ptkstart_without_success > 3) {
2368 wpa_printf(MSG_INFO,
2369 "WPA: Multiple EAP reauth attempts without 4-way handshake completion, disconnect "
2370 MACSTR, MAC2STR(sm->addr));
2371 sm->Disconnect = true;
2372 break;
2373 }
2374
Hai Shalomfdcde762020-04-02 11:19:20 -07002375 if (!sm->use_ext_key_id &&
2376 sm->wpa_auth->conf.wpa_deny_ptk0_rekey) {
2377 wpa_printf(MSG_INFO,
2378 "WPA: PTK0 rekey not allowed, disconnect "
Sunil Raviaf8751c2023-03-29 11:35:17 -07002379 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -07002380 sm->Disconnect = true;
Hai Shalomfdcde762020-04-02 11:19:20 -07002381 /* Try to encourage the STA to reconnect */
2382 sm->disconnect_reason =
2383 WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA;
2384 break;
2385 }
2386
2387 if (sm->use_ext_key_id)
2388 sm->keyidx_active ^= 1; /* flip Key ID */
2389
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002390 if (sm->GUpdateStationKeys) {
2391 /*
2392 * Reauthentication cancels the pending group key
2393 * update for this STA.
2394 */
Sunil Ravi7f769292024-07-23 22:21:32 +00002395 wpa_gkeydone_sta(sm);
Hai Shalome21d4e82020-04-29 16:34:06 -07002396 sm->PtkGroupInit = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002397 }
Hai Shalome21d4e82020-04-29 16:34:06 -07002398 sm->ReAuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002399 break;
2400 case WPA_ASSOC_FT:
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002401#ifdef CONFIG_IEEE80211R_AP
Hai Shalomfdcde762020-04-02 11:19:20 -07002402 wpa_printf(MSG_DEBUG,
2403 "FT: Retry PTK configuration after association");
Hai Shalomb755a2a2020-04-23 21:49:02 -07002404 wpa_ft_install_ptk(sm, 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002405
2406 /* Using FT protocol, not WPA auth state machine */
2407 sm->ft_completed = 1;
Hai Shalom81f62d82019-07-22 12:10:00 -07002408 wpa_auth_set_ptk_rekey_timer(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002409 return 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002410#else /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002411 break;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002412#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002413 case WPA_ASSOC_FILS:
2414#ifdef CONFIG_FILS
2415 wpa_printf(MSG_DEBUG,
2416 "FILS: TK configuration after association");
2417 fils_set_tk(sm);
2418 sm->fils_completed = 1;
2419 return 0;
2420#else /* CONFIG_FILS */
2421 break;
2422#endif /* CONFIG_FILS */
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02002423 case WPA_DRV_STA_REMOVED:
Hai Shalome21d4e82020-04-29 16:34:06 -07002424 sm->tk_already_set = false;
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02002425 return 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002426 }
2427
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002428#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002429 sm->ft_completed = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002430#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002431
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002432 if (sm->mgmt_frame_prot && event == WPA_AUTH)
2433 remove_ptk = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002434#ifdef CONFIG_FILS
2435 if (wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
2436 (event == WPA_AUTH || event == WPA_ASSOC))
2437 remove_ptk = 0;
2438#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002439
2440 if (remove_ptk) {
Hai Shalome21d4e82020-04-29 16:34:06 -07002441 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002442 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
2443
2444 if (event != WPA_REAUTH_EAPOL)
2445 wpa_remove_ptk(sm);
2446 }
2447
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002448 if (sm->in_step_loop) {
2449 /*
2450 * wpa_sm_step() is already running - avoid recursive call to
2451 * it by making the existing loop process the new update.
2452 */
Hai Shalome21d4e82020-04-29 16:34:06 -07002453 sm->changed = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002454 return 0;
2455 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002456 return wpa_sm_step(sm);
2457}
2458
2459
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002460SM_STATE(WPA_PTK, INITIALIZE)
2461{
2462 SM_ENTRY_MA(WPA_PTK, INITIALIZE, wpa_ptk);
2463 if (sm->Init) {
2464 /* Init flag is not cleared here, so avoid busy
2465 * loop by claiming nothing changed. */
Hai Shalome21d4e82020-04-29 16:34:06 -07002466 sm->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002467 }
2468
2469 sm->keycount = 0;
2470 if (sm->GUpdateStationKeys)
Sunil Ravi7f769292024-07-23 22:21:32 +00002471 wpa_gkeydone_sta(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002472 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07002473 sm->PInitAKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002474 if (1 /* Unicast cipher supported AND (ESS OR ((IBSS or WDS) and
2475 * Local AA > Remote AA)) */) {
Hai Shalome21d4e82020-04-29 16:34:06 -07002476 sm->Pair = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002477 }
2478 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portEnabled, 0);
2479 wpa_remove_ptk(sm);
2480 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portValid, 0);
2481 sm->TimeoutCtr = 0;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002482 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
2483 sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP ||
2484 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002485 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
2486 WPA_EAPOL_authorized, 0);
2487 }
2488}
2489
2490
2491SM_STATE(WPA_PTK, DISCONNECT)
2492{
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002493 u16 reason = sm->disconnect_reason;
2494
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002495 SM_ENTRY_MA(WPA_PTK, DISCONNECT, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002496 sm->Disconnect = false;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002497 sm->disconnect_reason = 0;
2498 if (!reason)
2499 reason = WLAN_REASON_PREV_AUTH_NOT_VALID;
2500 wpa_sta_disconnect(sm->wpa_auth, sm->addr, reason);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002501}
2502
2503
2504SM_STATE(WPA_PTK, DISCONNECTED)
2505{
2506 SM_ENTRY_MA(WPA_PTK, DISCONNECTED, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002507 sm->DeauthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002508}
2509
2510
2511SM_STATE(WPA_PTK, AUTHENTICATION)
2512{
2513 SM_ENTRY_MA(WPA_PTK, AUTHENTICATION, wpa_ptk);
2514 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07002515 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002516 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portControl_Auto,
2517 1);
2518 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portEnabled, 1);
Hai Shalome21d4e82020-04-29 16:34:06 -07002519 sm->AuthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002520}
2521
2522
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002523static void wpa_group_ensure_init(struct wpa_authenticator *wpa_auth,
2524 struct wpa_group *group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002525{
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002526 if (group->first_sta_seen)
2527 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002528 /*
2529 * System has run bit further than at the time hostapd was started
2530 * potentially very early during boot up. This provides better chances
2531 * of collecting more randomness on embedded systems. Re-initialize the
2532 * GMK and Counter here to improve their strength if there was not
2533 * enough entropy available immediately after system startup.
2534 */
Hai Shalomfdcde762020-04-02 11:19:20 -07002535 wpa_printf(MSG_DEBUG,
2536 "WPA: Re-initialize GMK/Counter on first station");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002537 if (random_pool_ready() != 1) {
Hai Shalomfdcde762020-04-02 11:19:20 -07002538 wpa_printf(MSG_INFO,
2539 "WPA: Not enough entropy in random pool to proceed - reject first 4-way handshake");
Hai Shalome21d4e82020-04-29 16:34:06 -07002540 group->reject_4way_hs_for_entropy = true;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002541 } else {
Hai Shalome21d4e82020-04-29 16:34:06 -07002542 group->first_sta_seen = true;
2543 group->reject_4way_hs_for_entropy = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002544 }
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002545
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002546 if (wpa_group_init_gmk_and_counter(wpa_auth, group) < 0 ||
2547 wpa_gtk_update(wpa_auth, group) < 0 ||
2548 wpa_group_config_group_keys(wpa_auth, group) < 0) {
2549 wpa_printf(MSG_INFO, "WPA: GMK/GTK setup failed");
Hai Shalome21d4e82020-04-29 16:34:06 -07002550 group->first_sta_seen = false;
2551 group->reject_4way_hs_for_entropy = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002552 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002553}
2554
2555
2556SM_STATE(WPA_PTK, AUTHENTICATION2)
2557{
2558 SM_ENTRY_MA(WPA_PTK, AUTHENTICATION2, wpa_ptk);
2559
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002560 wpa_group_ensure_init(sm->wpa_auth, sm->group);
Hai Shalome21d4e82020-04-29 16:34:06 -07002561 sm->ReAuthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002562
Dmitry Shmidt04949592012-07-19 12:16:46 -07002563 /*
2564 * Definition of ANonce selection in IEEE Std 802.11i-2004 is somewhat
2565 * ambiguous. The Authenticator state machine uses a counter that is
2566 * incremented by one for each 4-way handshake. However, the security
2567 * analysis of 4-way handshake points out that unpredictable nonces
2568 * help in preventing precomputation attacks. Instead of the state
2569 * machine definition, use an unpredictable nonce value here to provide
2570 * stronger protection against potential precomputation attacks.
2571 */
2572 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) {
Hai Shalomfdcde762020-04-02 11:19:20 -07002573 wpa_printf(MSG_ERROR,
2574 "WPA: Failed to get random data for ANonce.");
Hai Shalome21d4e82020-04-29 16:34:06 -07002575 sm->Disconnect = true;
Dmitry Shmidt04949592012-07-19 12:16:46 -07002576 return;
2577 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002578 wpa_hexdump(MSG_DEBUG, "WPA: Assign ANonce", sm->ANonce,
2579 WPA_NONCE_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002580 /* IEEE 802.11i does not clear TimeoutCtr here, but this is more
2581 * logical place than INITIALIZE since AUTHENTICATION2 can be
2582 * re-entered on ReAuthenticationRequest without going through
2583 * INITIALIZE. */
2584 sm->TimeoutCtr = 0;
2585}
2586
2587
Jouni Malinen1420a892017-10-01 12:32:57 +03002588static int wpa_auth_sm_ptk_update(struct wpa_state_machine *sm)
2589{
2590 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) {
2591 wpa_printf(MSG_ERROR,
2592 "WPA: Failed to get random data for ANonce");
Hai Shalome21d4e82020-04-29 16:34:06 -07002593 sm->Disconnect = true;
Jouni Malinen1420a892017-10-01 12:32:57 +03002594 return -1;
2595 }
2596 wpa_hexdump(MSG_DEBUG, "WPA: Assign new ANonce", sm->ANonce,
2597 WPA_NONCE_LEN);
2598 sm->TimeoutCtr = 0;
2599 return 0;
2600}
2601
2602
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002603SM_STATE(WPA_PTK, INITPMK)
2604{
2605 u8 msk[2 * PMK_LEN];
2606 size_t len = 2 * PMK_LEN;
2607
2608 SM_ENTRY_MA(WPA_PTK, INITPMK, wpa_ptk);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002609#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002610 sm->xxkey_len = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002611#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002612 if (sm->pmksa) {
2613 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002614 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len);
2615 sm->pmk_len = sm->pmksa->pmk_len;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002616#ifdef CONFIG_DPP
2617 } else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP) {
2618 wpa_printf(MSG_DEBUG,
2619 "DPP: No PMKSA cache entry for STA - reject connection");
Hai Shalome21d4e82020-04-29 16:34:06 -07002620 sm->Disconnect = true;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002621 sm->disconnect_reason = WLAN_REASON_INVALID_PMKID;
2622 return;
2623#endif /* CONFIG_DPP */
Sunil Raviaf8751c2023-03-29 11:35:17 -07002624 } else if (wpa_auth_get_msk(sm->wpa_auth, wpa_auth_get_spa(sm),
2625 msk, &len) == 0) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002626 unsigned int pmk_len;
2627
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002628 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt))
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002629 pmk_len = PMK_LEN_SUITE_B_192;
2630 else
2631 pmk_len = PMK_LEN;
Hai Shalomfdcde762020-04-02 11:19:20 -07002632 wpa_printf(MSG_DEBUG,
2633 "WPA: PMK from EAPOL state machine (MSK len=%zu PMK len=%u)",
2634 len, pmk_len);
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002635 if (len < pmk_len) {
2636 wpa_printf(MSG_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07002637 "WPA: MSK not long enough (%zu) to create PMK (%u)",
2638 len, pmk_len);
Hai Shalome21d4e82020-04-29 16:34:06 -07002639 sm->Disconnect = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002640 return;
2641 }
2642 os_memcpy(sm->PMK, msk, pmk_len);
2643 sm->pmk_len = pmk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002644#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002645 if (len >= 2 * PMK_LEN) {
Roshan Pius3a1667e2018-07-03 15:17:14 -07002646 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
2647 os_memcpy(sm->xxkey, msk, SHA384_MAC_LEN);
2648 sm->xxkey_len = SHA384_MAC_LEN;
2649 } else {
2650 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN);
2651 sm->xxkey_len = PMK_LEN;
2652 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002653 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002654#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002655 } else {
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002656 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK, get_msk: %p",
Paul Stewart092955c2017-02-06 09:13:09 -08002657 sm->wpa_auth->cb->get_msk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002658 sm->Disconnect = true;
Dmitry Shmidt216983b2015-02-06 10:50:36 -08002659 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002660 }
Hai Shalom81f62d82019-07-22 12:10:00 -07002661 forced_memzero(msk, sizeof(msk));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002662
2663 sm->req_replay_counter_used = 0;
Hai Shalome21d4e82020-04-29 16:34:06 -07002664 /* IEEE 802.11i does not set keyRun to false, but not doing this
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002665 * will break reauthentication since EAPOL state machines may not be
2666 * get into AUTHENTICATING state that clears keyRun before WPA state
2667 * machine enters AUTHENTICATION2 state and goes immediately to INITPMK
2668 * state and takes PMK from the previously used AAA Key. This will
2669 * eventually fail in 4-Way Handshake because Supplicant uses PMK
Hai Shalome21d4e82020-04-29 16:34:06 -07002670 * derived from the new AAA Key. Setting keyRun = false here seems to
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002671 * be good workaround for this issue. */
Hai Shalome21d4e82020-04-29 16:34:06 -07002672 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyRun, false);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002673}
2674
2675
2676SM_STATE(WPA_PTK, INITPSK)
2677{
2678 const u8 *psk;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002679 size_t psk_len;
2680
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002681 SM_ENTRY_MA(WPA_PTK, INITPSK, wpa_ptk);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002682 psk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, sm->p2p_dev_addr, NULL,
Hai Shalom021b0b52019-04-10 11:17:58 -07002683 &psk_len, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002684 if (psk) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002685 os_memcpy(sm->PMK, psk, psk_len);
2686 sm->pmk_len = psk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002687#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002688 sm->xxkey_len = PMK_LEN;
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002689#ifdef CONFIG_SAE
2690 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE_EXT_KEY &&
2691 (psk_len == SHA512_MAC_LEN || psk_len == SHA384_MAC_LEN ||
2692 psk_len == SHA256_MAC_LEN))
2693 sm->xxkey_len = psk_len;
2694#endif /* CONFIG_SAE */
2695 os_memcpy(sm->xxkey, psk, sm->xxkey_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002696#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002697 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002698#ifdef CONFIG_SAE
2699 if (wpa_auth_uses_sae(sm) && sm->pmksa) {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002700 wpa_printf(MSG_DEBUG, "SAE: PMK from PMKSA cache (len=%zu)",
2701 sm->pmksa->pmk_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002702 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len);
2703 sm->pmk_len = sm->pmksa->pmk_len;
Hai Shalom021b0b52019-04-10 11:17:58 -07002704#ifdef CONFIG_IEEE80211R_AP
2705 os_memcpy(sm->xxkey, sm->pmksa->pmk, sm->pmksa->pmk_len);
2706 sm->xxkey_len = sm->pmksa->pmk_len;
2707#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002708 }
2709#endif /* CONFIG_SAE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002710 sm->req_replay_counter_used = 0;
2711}
2712
2713
2714SM_STATE(WPA_PTK, PTKSTART)
2715{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002716 u8 *buf;
2717 size_t buf_len = 2 + RSN_SELECTOR_LEN + PMKID_LEN;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002718 u8 *pmkid = NULL;
2719 size_t kde_len = 0;
Sunil8cd6f4d2022-06-28 18:40:46 +00002720 u16 key_info;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002721#ifdef CONFIG_TESTING_OPTIONS
2722 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
2723#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002724
2725 SM_ENTRY_MA(WPA_PTK, PTKSTART, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002726 sm->PTKRequest = false;
2727 sm->TimeoutEvt = false;
2728 sm->alt_snonce_valid = false;
Sunil Ravia04bd252022-05-02 22:54:18 -07002729 sm->ptkstart_without_success++;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002730
2731 sm->TimeoutCtr++;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002732 if (sm->TimeoutCtr > sm->wpa_auth->conf.wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002733 /* No point in sending the EAPOL-Key - we will disconnect
2734 * immediately following this. */
2735 return;
2736 }
2737
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002738#ifdef CONFIG_IEEE80211BE
2739 if (sm->mld_assoc_link_id >= 0)
2740 buf_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN;
2741#endif /* CONFIG_IEEE80211BE */
2742#ifdef CONFIG_TESTING_OPTIONS
2743 if (conf->eapol_m1_elements)
2744 buf_len += wpabuf_len(conf->eapol_m1_elements);
2745#endif /* CONFIG_TESTING_OPTIONS */
2746
2747 buf = os_zalloc(buf_len);
2748 if (!buf)
2749 return;
2750
Sunil Raviaf8751c2023-03-29 11:35:17 -07002751 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002752 "sending 1/4 msg of 4-Way Handshake");
2753 /*
Hai Shalomce48b4a2018-09-05 11:41:35 -07002754 * For infrastructure BSS cases, it is better for the AP not to include
2755 * the PMKID KDE in EAPOL-Key msg 1/4 since it could be used to initiate
2756 * offline search for the passphrase/PSK without having to be able to
2757 * capture a 4-way handshake from a STA that has access to the network.
2758 *
2759 * For IBSS cases, addition of PMKID KDE could be considered even with
2760 * WPA2-PSK cases that use multiple PSKs, but only if there is a single
2761 * possible PSK for this STA. However, this should not be done unless
2762 * there is support for using that information on the supplicant side.
2763 * The concern about exposing PMKID unnecessarily in infrastructure BSS
2764 * cases would also apply here, but at least in the IBSS case, this
2765 * would cover a potential real use case.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002766 */
2767 if (sm->wpa == WPA_VERSION_WPA2 &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002768 (wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) ||
2769 (sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE && sm->pmksa) ||
2770 wpa_key_mgmt_sae(sm->wpa_key_mgmt)) &&
Dmitry Shmidtf21452a2014-02-26 10:55:25 -08002771 sm->wpa_key_mgmt != WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002772 pmkid = buf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002773 kde_len = 2 + RSN_SELECTOR_LEN + PMKID_LEN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002774 pmkid[0] = WLAN_EID_VENDOR_SPECIFIC;
2775 pmkid[1] = RSN_SELECTOR_LEN + PMKID_LEN;
2776 RSN_SELECTOR_PUT(&pmkid[2], RSN_KEY_DATA_PMKID);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002777 if (sm->pmksa) {
Roshan Pius3a1667e2018-07-03 15:17:14 -07002778 wpa_hexdump(MSG_DEBUG,
2779 "RSN: Message 1/4 PMKID from PMKSA entry",
2780 sm->pmksa->pmkid, PMKID_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002781 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2782 sm->pmksa->pmkid, PMKID_LEN);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002783 } else if (wpa_key_mgmt_suite_b(sm->wpa_key_mgmt)) {
2784 /* No KCK available to derive PMKID */
Roshan Pius3a1667e2018-07-03 15:17:14 -07002785 wpa_printf(MSG_DEBUG,
2786 "RSN: No KCK available to derive PMKID for message 1/4");
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002787 pmkid = NULL;
Hai Shalom81f62d82019-07-22 12:10:00 -07002788#ifdef CONFIG_FILS
2789 } else if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
2790 if (sm->pmkid_set) {
2791 wpa_hexdump(MSG_DEBUG,
2792 "RSN: Message 1/4 PMKID from FILS/ERP",
2793 sm->pmkid, PMKID_LEN);
2794 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2795 sm->pmkid, PMKID_LEN);
2796 } else {
2797 /* No PMKID available */
2798 wpa_printf(MSG_DEBUG,
2799 "RSN: No FILS/ERP PMKID available for message 1/4");
2800 pmkid = NULL;
2801 }
2802#endif /* CONFIG_FILS */
2803#ifdef CONFIG_IEEE80211R_AP
2804 } else if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) &&
2805 sm->ft_completed) {
2806 wpa_printf(MSG_DEBUG,
2807 "FT: No PMKID in message 1/4 when using FT protocol");
2808 pmkid = NULL;
Hai Shalom81f62d82019-07-22 12:10:00 -07002809#endif /* CONFIG_IEEE80211R_AP */
Roshan Pius3a1667e2018-07-03 15:17:14 -07002810#ifdef CONFIG_SAE
2811 } else if (wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
2812 if (sm->pmkid_set) {
2813 wpa_hexdump(MSG_DEBUG,
2814 "RSN: Message 1/4 PMKID from SAE",
2815 sm->pmkid, PMKID_LEN);
2816 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2817 sm->pmkid, PMKID_LEN);
2818 } else {
2819 /* No PMKID available */
2820 wpa_printf(MSG_DEBUG,
2821 "RSN: No SAE PMKID available for message 1/4");
2822 pmkid = NULL;
2823 }
2824#endif /* CONFIG_SAE */
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002825 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002826 /*
2827 * Calculate PMKID since no PMKSA cache entry was
2828 * available with pre-calculated PMKID.
2829 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07002830 rsn_pmkid(sm->PMK, sm->pmk_len,
2831 wpa_auth_get_aa(sm),
2832 wpa_auth_get_spa(sm),
2833 &pmkid[2 + RSN_SELECTOR_LEN],
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002834 sm->wpa_key_mgmt);
Roshan Pius3a1667e2018-07-03 15:17:14 -07002835 wpa_hexdump(MSG_DEBUG,
2836 "RSN: Message 1/4 PMKID derived from PMK",
2837 &pmkid[2 + RSN_SELECTOR_LEN], PMKID_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002838 }
2839 }
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08002840 if (!pmkid)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002841 kde_len = 0;
2842
2843#ifdef CONFIG_IEEE80211BE
2844 if (sm->mld_assoc_link_id >= 0) {
2845 wpa_printf(MSG_DEBUG,
2846 "RSN: MLD: Add MAC Address KDE: kde_len=%zu",
2847 kde_len);
2848 wpa_add_kde(buf + kde_len, RSN_KEY_DATA_MAC_ADDR,
Sunil Ravi7f769292024-07-23 22:21:32 +00002849 sm->wpa_auth->mld_addr, ETH_ALEN, NULL, 0);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002850 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN;
2851 }
2852#endif /* CONFIG_IEEE80211BE */
2853
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002854#ifdef CONFIG_TESTING_OPTIONS
2855 if (conf->eapol_m1_elements) {
2856 os_memcpy(buf + kde_len, wpabuf_head(conf->eapol_m1_elements),
2857 wpabuf_len(conf->eapol_m1_elements));
2858 kde_len += wpabuf_len(conf->eapol_m1_elements);
2859 }
2860#endif /* CONFIG_TESTING_OPTIONS */
2861
Sunil8cd6f4d2022-06-28 18:40:46 +00002862 key_info = WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE;
2863 if (sm->pairwise_set && sm->wpa != WPA_VERSION_WPA)
2864 key_info |= WPA_KEY_INFO_SECURE;
2865 wpa_send_eapol(sm->wpa_auth, sm, key_info, NULL,
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002866 sm->ANonce, kde_len ? buf : NULL, kde_len, 0, 0);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002867 os_free(buf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002868}
2869
2870
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002871static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002872 const u8 *pmk, unsigned int pmk_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002873 struct wpa_ptk *ptk, int force_sha256,
2874 u8 *pmk_r0, u8 *pmk_r1, u8 *pmk_r0_name,
Sunil Ravi7f769292024-07-23 22:21:32 +00002875 size_t *key_len, bool no_kdk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002876{
Hai Shalom021b0b52019-04-10 11:17:58 -07002877 const u8 *z = NULL;
Hai Shalom60840252021-02-19 19:02:11 -08002878 size_t z_len = 0, kdk_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07002879 int akmp;
Sunil Ravi89eba102022-09-13 21:04:37 -07002880 int ret;
Hai Shalom021b0b52019-04-10 11:17:58 -07002881
Hai Shalom60840252021-02-19 19:02:11 -08002882 if (sm->wpa_auth->conf.force_kdk_derivation ||
Sunil Ravi7f769292024-07-23 22:21:32 +00002883 (!no_kdk && sm->wpa_auth->conf.secure_ltf &&
Hai Shaloma20dcd72022-02-04 13:43:00 -08002884 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)))
Hai Shalom60840252021-02-19 19:02:11 -08002885 kdk_len = WPA_KDK_MAX_LEN;
2886 else
2887 kdk_len = 0;
2888
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002889#ifdef CONFIG_IEEE80211R_AP
Hai Shalom81f62d82019-07-22 12:10:00 -07002890 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
2891 if (sm->ft_completed) {
2892 u8 ptk_name[WPA_PMK_NAME_LEN];
2893
Sunil Ravi89eba102022-09-13 21:04:37 -07002894 ret = wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->pmk_r1_len,
2895 sm->SNonce, sm->ANonce,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002896 wpa_auth_get_spa(sm),
2897 wpa_auth_get_aa(sm),
Sunil Ravi89eba102022-09-13 21:04:37 -07002898 sm->pmk_r1_name, ptk,
2899 ptk_name, sm->wpa_key_mgmt,
2900 sm->pairwise, kdk_len);
2901 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002902 ret = wpa_auth_derive_ptk_ft(sm, ptk, pmk_r0, pmk_r1,
2903 pmk_r0_name, key_len,
2904 kdk_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07002905 }
Sunil Ravi89eba102022-09-13 21:04:37 -07002906 if (ret) {
2907 wpa_printf(MSG_ERROR, "FT: PTK derivation failed");
2908 return ret;
2909 }
2910
2911#ifdef CONFIG_PASN
Sunil Ravi7f769292024-07-23 22:21:32 +00002912 if (!no_kdk && sm->wpa_auth->conf.secure_ltf &&
Sunil Ravi89eba102022-09-13 21:04:37 -07002913 ieee802_11_rsnx_capab(sm->rsnxe,
2914 WLAN_RSNX_CAPAB_SECURE_LTF)) {
2915 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt,
2916 sm->pairwise);
2917 if (ret) {
2918 wpa_printf(MSG_ERROR,
2919 "FT: LTF keyseed derivation failed");
2920 }
2921 }
2922#endif /* CONFIG_PASN */
2923 return ret;
Hai Shalom81f62d82019-07-22 12:10:00 -07002924 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002925#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002926
Hai Shalom021b0b52019-04-10 11:17:58 -07002927#ifdef CONFIG_DPP2
2928 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP && sm->dpp_z) {
2929 z = wpabuf_head(sm->dpp_z);
2930 z_len = wpabuf_len(sm->dpp_z);
2931 }
2932#endif /* CONFIG_DPP2 */
2933
Hai Shalomfdcde762020-04-02 11:19:20 -07002934 akmp = sm->wpa_key_mgmt;
2935 if (force_sha256)
2936 akmp |= WPA_KEY_MGMT_PSK_SHA256;
Sunil Ravi89eba102022-09-13 21:04:37 -07002937 ret = wpa_pmk_to_ptk(pmk, pmk_len, "Pairwise key expansion",
Sunil Raviaf8751c2023-03-29 11:35:17 -07002938 wpa_auth_get_aa(sm), wpa_auth_get_spa(sm),
2939 sm->ANonce, snonce, ptk, akmp,
2940 sm->pairwise, z, z_len, kdk_len);
Sunil Ravi89eba102022-09-13 21:04:37 -07002941 if (ret) {
2942 wpa_printf(MSG_DEBUG,
2943 "WPA: PTK derivation failed");
2944 return ret;
2945 }
2946
2947#ifdef CONFIG_PASN
Sunil Ravi7f769292024-07-23 22:21:32 +00002948 if (!no_kdk && sm->wpa_auth->conf.secure_ltf &&
Sunil Ravi89eba102022-09-13 21:04:37 -07002949 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)) {
2950 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt, sm->pairwise);
2951 if (ret) {
2952 wpa_printf(MSG_DEBUG,
2953 "WPA: LTF keyseed derivation failed");
2954 }
2955 }
2956#endif /* CONFIG_PASN */
2957 return ret;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002958}
2959
2960
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002961#ifdef CONFIG_FILS
2962
2963int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002964 size_t pmk_len, const u8 *snonce, const u8 *anonce,
2965 const u8 *dhss, size_t dhss_len,
2966 struct wpabuf *g_sta, struct wpabuf *g_ap)
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002967{
2968 u8 ick[FILS_ICK_MAX_LEN];
2969 size_t ick_len;
2970 int res;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002971 u8 fils_ft[FILS_FT_MAX_LEN];
Hai Shalom60840252021-02-19 19:02:11 -08002972 size_t fils_ft_len = 0, kdk_len;
2973
2974 if (sm->wpa_auth->conf.force_kdk_derivation ||
2975 (sm->wpa_auth->conf.secure_ltf &&
Hai Shaloma20dcd72022-02-04 13:43:00 -08002976 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)))
Hai Shalom60840252021-02-19 19:02:11 -08002977 kdk_len = WPA_KDK_MAX_LEN;
2978 else
2979 kdk_len = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002980
Sunil Raviaf8751c2023-03-29 11:35:17 -07002981 res = fils_pmk_to_ptk(pmk, pmk_len, wpa_auth_get_spa(sm),
2982 wpa_auth_get_aa(sm),
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002983 snonce, anonce, dhss, dhss_len,
2984 &sm->PTK, ick, &ick_len,
2985 sm->wpa_key_mgmt, sm->pairwise,
Hai Shalom60840252021-02-19 19:02:11 -08002986 fils_ft, &fils_ft_len, kdk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002987 if (res < 0)
2988 return res;
Sunil Ravi89eba102022-09-13 21:04:37 -07002989
2990#ifdef CONFIG_PASN
2991 if (sm->wpa_auth->conf.secure_ltf &&
2992 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)) {
2993 res = wpa_ltf_keyseed(&sm->PTK, sm->wpa_key_mgmt, sm->pairwise);
2994 if (res) {
2995 wpa_printf(MSG_ERROR,
2996 "FILS: LTF keyseed derivation failed");
2997 return res;
2998 }
2999 }
3000#endif /* CONFIG_PASN */
3001
Hai Shalome21d4e82020-04-29 16:34:06 -07003002 sm->PTK_valid = true;
3003 sm->tk_already_set = false;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003004
3005#ifdef CONFIG_IEEE80211R_AP
3006 if (fils_ft_len) {
3007 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
3008 struct wpa_auth_config *conf = &wpa_auth->conf;
Roshan Pius3a1667e2018-07-03 15:17:14 -07003009 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003010
3011 if (wpa_derive_pmk_r0(fils_ft, fils_ft_len,
3012 conf->ssid, conf->ssid_len,
3013 conf->mobility_domain,
3014 conf->r0_key_holder,
3015 conf->r0_key_holder_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07003016 wpa_auth_get_spa(sm), pmk_r0, pmk_r0_name,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00003017 sm->wpa_key_mgmt) < 0)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003018 return -1;
3019
Roshan Pius3a1667e2018-07-03 15:17:14 -07003020 wpa_ft_store_pmk_fils(sm, pmk_r0, pmk_r0_name);
Hai Shalom81f62d82019-07-22 12:10:00 -07003021 forced_memzero(fils_ft, sizeof(fils_ft));
Hai Shalom021b0b52019-04-10 11:17:58 -07003022
3023 res = wpa_derive_pmk_r1_name(pmk_r0_name, conf->r1_key_holder,
Sunil Raviaf8751c2023-03-29 11:35:17 -07003024 wpa_auth_get_spa(sm),
3025 sm->pmk_r1_name,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00003026 fils_ft_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07003027 forced_memzero(pmk_r0, PMK_LEN_MAX);
Hai Shalom021b0b52019-04-10 11:17:58 -07003028 if (res < 0)
3029 return -1;
3030 wpa_hexdump(MSG_DEBUG, "FILS+FT: PMKR1Name", sm->pmk_r1_name,
3031 WPA_PMK_NAME_LEN);
3032 sm->pmk_r1_name_valid = 1;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003033 }
3034#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003035
3036 res = fils_key_auth_sk(ick, ick_len, snonce, anonce,
Sunil Raviaf8751c2023-03-29 11:35:17 -07003037 wpa_auth_get_spa(sm),
3038 wpa_auth_get_aa(sm),
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003039 g_sta ? wpabuf_head(g_sta) : NULL,
3040 g_sta ? wpabuf_len(g_sta) : 0,
3041 g_ap ? wpabuf_head(g_ap) : NULL,
3042 g_ap ? wpabuf_len(g_ap) : 0,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003043 sm->wpa_key_mgmt, sm->fils_key_auth_sta,
3044 sm->fils_key_auth_ap,
3045 &sm->fils_key_auth_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07003046 forced_memzero(ick, sizeof(ick));
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003047
3048 /* Store nonces for (Re)Association Request/Response frame processing */
3049 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN);
3050 os_memcpy(sm->ANonce, anonce, FILS_NONCE_LEN);
3051
3052 return res;
3053}
3054
3055
3056static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
3057 u8 *buf, size_t buf_len, u16 *_key_data_len)
3058{
3059 struct ieee802_1x_hdr *hdr;
3060 struct wpa_eapol_key *key;
3061 u8 *pos;
3062 u16 key_data_len;
3063 u8 *tmp;
3064 const u8 *aad[1];
3065 size_t aad_len[1];
3066
3067 hdr = (struct ieee802_1x_hdr *) buf;
3068 key = (struct wpa_eapol_key *) (hdr + 1);
3069 pos = (u8 *) (key + 1);
3070 key_data_len = WPA_GET_BE16(pos);
3071 if (key_data_len < AES_BLOCK_SIZE ||
3072 key_data_len > buf_len - sizeof(*hdr) - sizeof(*key) - 2) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003073 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003074 "No room for AES-SIV data in the frame");
3075 return -1;
3076 }
3077 pos += 2; /* Pointing at the Encrypted Key Data field */
3078
3079 tmp = os_malloc(key_data_len);
3080 if (!tmp)
3081 return -1;
3082
3083 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
3084 * to Key Data (exclusive). */
3085 aad[0] = buf;
3086 aad_len[0] = pos - buf;
3087 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len,
3088 1, aad, aad_len, tmp) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003089 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003090 "Invalid AES-SIV data in the frame");
3091 bin_clear_free(tmp, key_data_len);
3092 return -1;
3093 }
3094
3095 /* AEAD decryption and validation completed successfully */
3096 key_data_len -= AES_BLOCK_SIZE;
3097 wpa_hexdump_key(MSG_DEBUG, "WPA: Decrypted Key Data",
3098 tmp, key_data_len);
3099
3100 /* Replace Key Data field with the decrypted version */
3101 os_memcpy(pos, tmp, key_data_len);
3102 pos -= 2; /* Key Data Length field */
3103 WPA_PUT_BE16(pos, key_data_len);
3104 bin_clear_free(tmp, key_data_len);
3105 if (_key_data_len)
3106 *_key_data_len = key_data_len;
3107 return 0;
3108}
3109
3110
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003111const u8 * wpa_fils_validate_fils_session(struct wpa_state_machine *sm,
3112 const u8 *ies, size_t ies_len,
3113 const u8 *fils_session)
3114{
3115 const u8 *ie, *end;
3116 const u8 *session = NULL;
3117
3118 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
3119 wpa_printf(MSG_DEBUG,
3120 "FILS: Not a FILS AKM - reject association");
3121 return NULL;
3122 }
3123
3124 /* Verify Session element */
3125 ie = ies;
3126 end = ((const u8 *) ie) + ies_len;
3127 while (ie + 1 < end) {
3128 if (ie + 2 + ie[1] > end)
3129 break;
3130 if (ie[0] == WLAN_EID_EXTENSION &&
3131 ie[1] >= 1 + FILS_SESSION_LEN &&
3132 ie[2] == WLAN_EID_EXT_FILS_SESSION) {
3133 session = ie;
3134 break;
3135 }
3136 ie += 2 + ie[1];
3137 }
3138
3139 if (!session) {
3140 wpa_printf(MSG_DEBUG,
3141 "FILS: %s: Could not find FILS Session element in Assoc Req - reject",
3142 __func__);
3143 return NULL;
3144 }
3145
3146 if (!fils_session) {
3147 wpa_printf(MSG_DEBUG,
3148 "FILS: %s: Could not find FILS Session element in STA entry - reject",
3149 __func__);
3150 return NULL;
3151 }
3152
3153 if (os_memcmp(fils_session, session + 3, FILS_SESSION_LEN) != 0) {
3154 wpa_printf(MSG_DEBUG, "FILS: Session mismatch");
3155 wpa_hexdump(MSG_DEBUG, "FILS: Expected FILS Session",
3156 fils_session, FILS_SESSION_LEN);
3157 wpa_hexdump(MSG_DEBUG, "FILS: Received FILS Session",
3158 session + 3, FILS_SESSION_LEN);
3159 return NULL;
3160 }
3161 return session;
3162}
3163
3164
3165int wpa_fils_validate_key_confirm(struct wpa_state_machine *sm, const u8 *ies,
3166 size_t ies_len)
3167{
3168 struct ieee802_11_elems elems;
3169
3170 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
3171 wpa_printf(MSG_DEBUG,
3172 "FILS: Failed to parse decrypted elements");
3173 return -1;
3174 }
3175
3176 if (!elems.fils_session) {
3177 wpa_printf(MSG_DEBUG, "FILS: No FILS Session element");
3178 return -1;
3179 }
3180
3181 if (!elems.fils_key_confirm) {
3182 wpa_printf(MSG_DEBUG, "FILS: No FILS Key Confirm element");
3183 return -1;
3184 }
3185
3186 if (elems.fils_key_confirm_len != sm->fils_key_auth_len) {
3187 wpa_printf(MSG_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07003188 "FILS: Unexpected Key-Auth length %d (expected %zu)",
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003189 elems.fils_key_confirm_len,
Hai Shalomfdcde762020-04-02 11:19:20 -07003190 sm->fils_key_auth_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003191 return -1;
3192 }
3193
3194 if (os_memcmp(elems.fils_key_confirm, sm->fils_key_auth_sta,
3195 sm->fils_key_auth_len) != 0) {
3196 wpa_printf(MSG_DEBUG, "FILS: Key-Auth mismatch");
3197 wpa_hexdump(MSG_DEBUG, "FILS: Received Key-Auth",
3198 elems.fils_key_confirm, elems.fils_key_confirm_len);
3199 wpa_hexdump(MSG_DEBUG, "FILS: Expected Key-Auth",
3200 sm->fils_key_auth_sta, sm->fils_key_auth_len);
3201 return -1;
3202 }
3203
3204 return 0;
3205}
3206
3207
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003208int fils_decrypt_assoc(struct wpa_state_machine *sm, const u8 *fils_session,
3209 const struct ieee80211_mgmt *mgmt, size_t frame_len,
3210 u8 *pos, size_t left)
3211{
3212 u16 fc, stype;
3213 const u8 *end, *ie_start, *ie, *session, *crypt;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003214 const u8 *aad[5];
3215 size_t aad_len[5];
3216
3217 if (!sm || !sm->PTK_valid) {
3218 wpa_printf(MSG_DEBUG,
3219 "FILS: No KEK to decrypt Assocication Request frame");
3220 return -1;
3221 }
3222
3223 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
3224 wpa_printf(MSG_DEBUG,
3225 "FILS: Not a FILS AKM - reject association");
3226 return -1;
3227 }
3228
3229 end = ((const u8 *) mgmt) + frame_len;
3230 fc = le_to_host16(mgmt->frame_control);
3231 stype = WLAN_FC_GET_STYPE(fc);
3232 if (stype == WLAN_FC_STYPE_REASSOC_REQ)
3233 ie_start = mgmt->u.reassoc_req.variable;
3234 else
3235 ie_start = mgmt->u.assoc_req.variable;
3236 ie = ie_start;
3237
3238 /*
3239 * Find FILS Session element which is the last unencrypted element in
3240 * the frame.
3241 */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003242 session = wpa_fils_validate_fils_session(sm, ie, end - ie,
3243 fils_session);
3244 if (!session) {
3245 wpa_printf(MSG_DEBUG, "FILS: Session validation failed");
3246 return -1;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003247 }
3248
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003249 crypt = session + 2 + session[1];
3250
3251 if (end - crypt < AES_BLOCK_SIZE) {
3252 wpa_printf(MSG_DEBUG,
3253 "FILS: Too short frame to include AES-SIV data");
3254 return -1;
3255 }
3256
3257 /* AES-SIV AAD vectors */
3258
3259 /* The STA's MAC address */
3260 aad[0] = mgmt->sa;
3261 aad_len[0] = ETH_ALEN;
3262 /* The AP's BSSID */
3263 aad[1] = mgmt->da;
3264 aad_len[1] = ETH_ALEN;
3265 /* The STA's nonce */
3266 aad[2] = sm->SNonce;
3267 aad_len[2] = FILS_NONCE_LEN;
3268 /* The AP's nonce */
3269 aad[3] = sm->ANonce;
3270 aad_len[3] = FILS_NONCE_LEN;
3271 /*
3272 * The (Re)Association Request frame from the Capability Information
3273 * field to the FILS Session element (both inclusive).
3274 */
3275 aad[4] = (const u8 *) &mgmt->u.assoc_req.capab_info;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003276 aad_len[4] = crypt - aad[4];
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003277
3278 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003279 5, aad, aad_len, pos + (crypt - ie_start)) < 0) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003280 wpa_printf(MSG_DEBUG,
3281 "FILS: Invalid AES-SIV data in the frame");
3282 return -1;
3283 }
3284 wpa_hexdump(MSG_DEBUG, "FILS: Decrypted Association Request elements",
3285 pos, left - AES_BLOCK_SIZE);
3286
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003287 if (wpa_fils_validate_key_confirm(sm, pos, left - AES_BLOCK_SIZE) < 0) {
3288 wpa_printf(MSG_DEBUG, "FILS: Key Confirm validation failed");
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003289 return -1;
3290 }
3291
3292 return left - AES_BLOCK_SIZE;
3293}
3294
3295
3296int fils_encrypt_assoc(struct wpa_state_machine *sm, u8 *buf,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003297 size_t current_len, size_t max_len,
3298 const struct wpabuf *hlp)
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003299{
3300 u8 *end = buf + max_len;
3301 u8 *pos = buf + current_len;
3302 struct ieee80211_mgmt *mgmt;
3303 struct wpabuf *plain;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003304 const u8 *aad[5];
3305 size_t aad_len[5];
3306
3307 if (!sm || !sm->PTK_valid)
3308 return -1;
3309
3310 wpa_hexdump(MSG_DEBUG,
3311 "FILS: Association Response frame before FILS processing",
3312 buf, current_len);
3313
3314 mgmt = (struct ieee80211_mgmt *) buf;
3315
3316 /* AES-SIV AAD vectors */
3317
3318 /* The AP's BSSID */
3319 aad[0] = mgmt->sa;
3320 aad_len[0] = ETH_ALEN;
3321 /* The STA's MAC address */
3322 aad[1] = mgmt->da;
3323 aad_len[1] = ETH_ALEN;
3324 /* The AP's nonce */
3325 aad[2] = sm->ANonce;
3326 aad_len[2] = FILS_NONCE_LEN;
3327 /* The STA's nonce */
3328 aad[3] = sm->SNonce;
3329 aad_len[3] = FILS_NONCE_LEN;
3330 /*
3331 * The (Re)Association Response frame from the Capability Information
3332 * field (the same offset in both Association and Reassociation
3333 * Response frames) to the FILS Session element (both inclusive).
3334 */
3335 aad[4] = (const u8 *) &mgmt->u.assoc_resp.capab_info;
3336 aad_len[4] = pos - aad[4];
3337
3338 /* The following elements will be encrypted with AES-SIV */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003339 plain = fils_prepare_plainbuf(sm, hlp);
3340 if (!plain) {
3341 wpa_printf(MSG_DEBUG, "FILS: Plain buffer prep failed");
3342 return -1;
3343 }
3344
3345 if (pos + wpabuf_len(plain) + AES_BLOCK_SIZE > end) {
3346 wpa_printf(MSG_DEBUG,
3347 "FILS: Not enough room for FILS elements");
Hai Shalom81f62d82019-07-22 12:10:00 -07003348 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003349 return -1;
3350 }
3351
3352 wpa_hexdump_buf_key(MSG_DEBUG, "FILS: Association Response plaintext",
3353 plain);
3354
3355 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len,
3356 wpabuf_head(plain), wpabuf_len(plain),
3357 5, aad, aad_len, pos) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003358 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003359 return -1;
3360 }
3361
3362 wpa_hexdump(MSG_DEBUG,
3363 "FILS: Encrypted Association Response elements",
3364 pos, AES_BLOCK_SIZE + wpabuf_len(plain));
3365 current_len += wpabuf_len(plain) + AES_BLOCK_SIZE;
Hai Shalom81f62d82019-07-22 12:10:00 -07003366 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003367
3368 sm->fils_completed = 1;
3369
3370 return current_len;
3371}
3372
3373
3374static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
3375 const struct wpabuf *hlp)
3376{
3377 struct wpabuf *plain;
3378 u8 *len, *tmp, *tmp2;
3379 u8 hdr[2];
Hai Shaloma20dcd72022-02-04 13:43:00 -08003380 u8 *gtk, stub_gtk[32];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003381 size_t gtk_len;
3382 struct wpa_group *gsm;
Hai Shalomfdcde762020-04-02 11:19:20 -07003383 size_t plain_len;
3384 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003385
Hai Shalomfdcde762020-04-02 11:19:20 -07003386 plain_len = 1000 + ieee80211w_kde_len(sm);
3387 if (conf->transition_disable)
3388 plain_len += 2 + RSN_SELECTOR_LEN + 1;
3389 plain = wpabuf_alloc(plain_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003390 if (!plain)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003391 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003392
3393 /* TODO: FILS Public Key */
3394
3395 /* FILS Key Confirmation */
3396 wpabuf_put_u8(plain, WLAN_EID_EXTENSION); /* Element ID */
3397 wpabuf_put_u8(plain, 1 + sm->fils_key_auth_len); /* Length */
3398 /* Element ID Extension */
3399 wpabuf_put_u8(plain, WLAN_EID_EXT_FILS_KEY_CONFIRM);
3400 wpabuf_put_data(plain, sm->fils_key_auth_ap, sm->fils_key_auth_len);
3401
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003402 /* FILS HLP Container */
3403 if (hlp)
3404 wpabuf_put_buf(plain, hlp);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003405
3406 /* TODO: FILS IP Address Assignment */
3407
3408 /* Key Delivery */
3409 gsm = sm->group;
3410 wpabuf_put_u8(plain, WLAN_EID_EXTENSION); /* Element ID */
3411 len = wpabuf_put(plain, 1);
3412 wpabuf_put_u8(plain, WLAN_EID_EXT_KEY_DELIVERY);
3413 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN,
3414 wpabuf_put(plain, WPA_KEY_RSC_LEN));
3415 /* GTK KDE */
3416 gtk = gsm->GTK[gsm->GN - 1];
3417 gtk_len = gsm->GTK_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07003418 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003419 /*
3420 * Provide unique random GTK to each STA to prevent use
3421 * of GTK in the BSS.
3422 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08003423 if (random_get_bytes(stub_gtk, gtk_len) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003424 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003425 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003426 }
Hai Shaloma20dcd72022-02-04 13:43:00 -08003427 gtk = stub_gtk;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003428 }
3429 hdr[0] = gsm->GN & 0x03;
3430 hdr[1] = 0;
3431 tmp = wpabuf_put(plain, 0);
3432 tmp2 = wpa_add_kde(tmp, RSN_KEY_DATA_GROUPKEY, hdr, 2,
3433 gtk, gtk_len);
3434 wpabuf_put(plain, tmp2 - tmp);
3435
Hai Shalomfdcde762020-04-02 11:19:20 -07003436 /* IGTK KDE and BIGTK KDE */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003437 tmp = wpabuf_put(plain, 0);
3438 tmp2 = ieee80211w_kde_add(sm, tmp);
3439 wpabuf_put(plain, tmp2 - tmp);
3440
Hai Shalomfdcde762020-04-02 11:19:20 -07003441 if (conf->transition_disable) {
3442 tmp = wpabuf_put(plain, 0);
3443 tmp2 = wpa_add_kde(tmp, WFA_KEY_DATA_TRANSITION_DISABLE,
3444 &conf->transition_disable, 1, NULL, 0);
3445 wpabuf_put(plain, tmp2 - tmp);
3446 }
3447
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003448 *len = (u8 *) wpabuf_put(plain, 0) - len - 1;
Hai Shalom74f70d42019-02-11 14:42:39 -08003449
3450#ifdef CONFIG_OCV
3451 if (wpa_auth_uses_ocv(sm)) {
3452 struct wpa_channel_info ci;
3453 u8 *pos;
3454
3455 if (wpa_channel_info(sm->wpa_auth, &ci) != 0) {
3456 wpa_printf(MSG_WARNING,
3457 "FILS: Failed to get channel info for OCI element");
Hai Shalom81f62d82019-07-22 12:10:00 -07003458 wpabuf_clear_free(plain);
Hai Shalom74f70d42019-02-11 14:42:39 -08003459 return NULL;
3460 }
Hai Shalom899fcc72020-10-19 14:38:18 -07003461#ifdef CONFIG_TESTING_OPTIONS
3462 if (conf->oci_freq_override_fils_assoc) {
3463 wpa_printf(MSG_INFO,
3464 "TEST: Override OCI frequency %d -> %u MHz",
3465 ci.frequency,
3466 conf->oci_freq_override_fils_assoc);
3467 ci.frequency = conf->oci_freq_override_fils_assoc;
3468 }
3469#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalom74f70d42019-02-11 14:42:39 -08003470
3471 pos = wpabuf_put(plain, OCV_OCI_EXTENDED_LEN);
3472 if (ocv_insert_extended_oci(&ci, pos) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003473 wpabuf_clear_free(plain);
Hai Shalom74f70d42019-02-11 14:42:39 -08003474 return NULL;
3475 }
3476 }
3477#endif /* CONFIG_OCV */
3478
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003479 return plain;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003480}
3481
3482
3483int fils_set_tk(struct wpa_state_machine *sm)
3484{
3485 enum wpa_alg alg;
3486 int klen;
3487
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003488 if (!sm || !sm->PTK_valid) {
3489 wpa_printf(MSG_DEBUG, "FILS: No valid PTK available to set TK");
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003490 return -1;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003491 }
3492 if (sm->tk_already_set) {
3493 wpa_printf(MSG_DEBUG, "FILS: TK already set to the driver");
3494 return -1;
3495 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003496
3497 alg = wpa_cipher_to_alg(sm->pairwise);
3498 klen = wpa_cipher_key_len(sm->pairwise);
3499
3500 wpa_printf(MSG_DEBUG, "FILS: Configure TK to the driver");
3501 if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0,
Hai Shalomfdcde762020-04-02 11:19:20 -07003502 sm->PTK.tk, klen, KEY_FLAG_PAIRWISE_RX_TX)) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003503 wpa_printf(MSG_DEBUG, "FILS: Failed to set TK to the driver");
3504 return -1;
3505 }
Sunil Ravi89eba102022-09-13 21:04:37 -07003506
3507#ifdef CONFIG_PASN
3508 if (sm->wpa_auth->conf.secure_ltf &&
3509 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF) &&
3510 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
3511 sm->PTK.ltf_keyseed,
3512 sm->PTK.ltf_keyseed_len)) {
3513 wpa_printf(MSG_ERROR,
3514 "FILS: Failed to set LTF keyseed to driver");
3515 return -1;
3516 }
3517#endif /* CONFIG_PASN */
3518
Sunil8cd6f4d2022-06-28 18:40:46 +00003519 sm->pairwise_set = true;
Hai Shalome21d4e82020-04-29 16:34:06 -07003520 sm->tk_already_set = true;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003521
Hai Shalom60840252021-02-19 19:02:11 -08003522 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
3523 dot11RSNAConfigPMKLifetime, &sm->PTK);
3524
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003525 return 0;
3526}
3527
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003528
3529u8 * hostapd_eid_assoc_fils_session(struct wpa_state_machine *sm, u8 *buf,
3530 const u8 *fils_session, struct wpabuf *hlp)
3531{
3532 struct wpabuf *plain;
3533 u8 *pos = buf;
3534
3535 /* FILS Session */
3536 *pos++ = WLAN_EID_EXTENSION; /* Element ID */
3537 *pos++ = 1 + FILS_SESSION_LEN; /* Length */
3538 *pos++ = WLAN_EID_EXT_FILS_SESSION; /* Element ID Extension */
3539 os_memcpy(pos, fils_session, FILS_SESSION_LEN);
3540 pos += FILS_SESSION_LEN;
3541
3542 plain = fils_prepare_plainbuf(sm, hlp);
3543 if (!plain) {
3544 wpa_printf(MSG_DEBUG, "FILS: Plain buffer prep failed");
3545 return NULL;
3546 }
3547
3548 os_memcpy(pos, wpabuf_head(plain), wpabuf_len(plain));
3549 pos += wpabuf_len(plain);
3550
Hai Shalomfdcde762020-04-02 11:19:20 -07003551 wpa_printf(MSG_DEBUG, "%s: plain buf_len: %zu", __func__,
3552 wpabuf_len(plain));
Hai Shalom81f62d82019-07-22 12:10:00 -07003553 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003554 sm->fils_completed = 1;
3555 return pos;
3556}
3557
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003558#endif /* CONFIG_FILS */
3559
3560
Hai Shalom74f70d42019-02-11 14:42:39 -08003561#ifdef CONFIG_OCV
3562int get_sta_tx_parameters(struct wpa_state_machine *sm, int ap_max_chanwidth,
3563 int ap_seg1_idx, int *bandwidth, int *seg1_idx)
3564{
3565 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
3566
3567 if (!wpa_auth->cb->get_sta_tx_params)
3568 return -1;
3569 return wpa_auth->cb->get_sta_tx_params(wpa_auth->cb_ctx, sm->addr,
3570 ap_max_chanwidth, ap_seg1_idx,
3571 bandwidth, seg1_idx);
3572}
3573#endif /* CONFIG_OCV */
3574
3575
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003576static int wpa_auth_validate_ml_kdes_m2(struct wpa_state_machine *sm,
3577 struct wpa_eapol_ie_parse *kde)
3578{
3579#ifdef CONFIG_IEEE80211BE
3580 int i;
3581 unsigned int n_links = 0;
3582
3583 if (sm->mld_assoc_link_id < 0)
3584 return 0;
3585
3586 /* MLD MAC address must be the same */
3587 if (!kde->mac_addr ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003588 !ether_addr_equal(kde->mac_addr, sm->peer_mld_addr)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003589 wpa_printf(MSG_DEBUG, "RSN: MLD: Invalid MLD address");
3590 return -1;
3591 }
3592
3593 /* Find matching link ID and the MAC address for each link */
Sunil Ravi99c035e2024-07-12 01:42:03 +00003594 for_each_link(kde->valid_mlo_links, i) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003595 /*
3596 * Each entry should contain the link information and the MAC
3597 * address.
3598 */
3599 if (kde->mlo_link_len[i] != 1 + ETH_ALEN) {
3600 wpa_printf(MSG_DEBUG,
3601 "RSN: MLD: Invalid MLO Link (ID %u) KDE len=%zu",
3602 i, kde->mlo_link_len[i]);
3603 return -1;
3604 }
3605
3606 if (!sm->mld_links[i].valid || i == sm->mld_assoc_link_id) {
3607 wpa_printf(MSG_DEBUG,
3608 "RSN: MLD: Invalid link ID=%u", i);
3609 return -1;
3610 }
3611
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003612 if (!ether_addr_equal(sm->mld_links[i].peer_addr,
3613 kde->mlo_link[i] + 1)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003614 wpa_printf(MSG_DEBUG,
3615 "RSN: MLD: invalid MAC address=" MACSTR
3616 " expected " MACSTR " (link ID %u)",
3617 MAC2STR(kde->mlo_link[i] + 1),
3618 MAC2STR(sm->mld_links[i].peer_addr), i);
3619 return -1;
3620 }
3621
3622 n_links++;
3623 }
3624
3625 /* Must have the same number of MLO links (excluding the local one) */
3626 if (n_links != sm->n_mld_affiliated_links) {
3627 wpa_printf(MSG_DEBUG,
3628 "RSN: MLD: Expecting %u MLD links in msg 2, but got %u",
3629 sm->n_mld_affiliated_links, n_links);
3630 return -1;
3631 }
3632#endif /* CONFIG_IEEE80211BE */
3633
3634 return 0;
3635}
3636
3637
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003638SM_STATE(WPA_PTK, PTKCALCNEGOTIATING)
3639{
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003640 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003641 struct wpa_ptk PTK;
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003642 int ok = 0, psk_found = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003643 const u8 *pmk = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003644 size_t pmk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003645 int ft;
3646 const u8 *eapol_key_ie, *key_data, *mic;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003647 u16 key_info, ver, key_data_length;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003648 size_t mic_len, eapol_key_ie_len;
3649 struct ieee802_1x_hdr *hdr;
3650 struct wpa_eapol_key *key;
3651 struct wpa_eapol_ie_parse kde;
Hai Shalom021b0b52019-04-10 11:17:58 -07003652 int vlan_id = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07003653 int owe_ptk_workaround = !!wpa_auth->conf.owe_ptk_workaround;
Sunil Raviaf8751c2023-03-29 11:35:17 -07003654 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
3655 u8 pmk_r1[PMK_LEN_MAX];
3656 size_t key_len;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003657 u8 *key_data_buf = NULL;
3658 size_t key_data_buf_len = 0;
Sunil Ravi7f769292024-07-23 22:21:32 +00003659 bool derive_kdk, no_kdk = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003660
3661 SM_ENTRY_MA(WPA_PTK, PTKCALCNEGOTIATING, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07003662 sm->EAPOLKeyReceived = false;
3663 sm->update_snonce = false;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003664 os_memset(&PTK, 0, sizeof(PTK));
3665
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003666 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003667
Sunil Ravi7f769292024-07-23 22:21:32 +00003668 derive_kdk = sm->wpa_auth->conf.secure_ltf &&
3669 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF);
3670
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003671 /* WPA with IEEE 802.1X: use the derived PMK from EAP
3672 * WPA-PSK: iterate through possible PSKs and select the one matching
3673 * the packet */
3674 for (;;) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003675 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
3676 !wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
Dmitry Shmidt391c59f2013-09-03 12:16:28 -07003677 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07003678 sm->p2p_dev_addr, pmk, &pmk_len,
3679 &vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07003680 if (!pmk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003681 break;
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003682 psk_found = 1;
Roshan Pius3a1667e2018-07-03 15:17:14 -07003683#ifdef CONFIG_IEEE80211R_AP
3684 if (wpa_key_mgmt_ft_psk(sm->wpa_key_mgmt)) {
3685 os_memcpy(sm->xxkey, pmk, pmk_len);
3686 sm->xxkey_len = pmk_len;
3687 }
3688#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003689 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003690 pmk = sm->PMK;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003691 pmk_len = sm->pmk_len;
3692 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003693
Hai Shalom81f62d82019-07-22 12:10:00 -07003694 if ((!pmk || !pmk_len) && sm->pmksa) {
3695 wpa_printf(MSG_DEBUG, "WPA: Use PMK from PMKSA cache");
3696 pmk = sm->pmksa->pmk;
3697 pmk_len = sm->pmksa->pmk_len;
3698 }
3699
Sunil Ravi7f769292024-07-23 22:21:32 +00003700 no_kdk = false;
3701 try_without_kdk:
Hai Shalomfdcde762020-04-02 11:19:20 -07003702 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK,
Sunil Raviaf8751c2023-03-29 11:35:17 -07003703 owe_ptk_workaround == 2, pmk_r0, pmk_r1,
Sunil Ravi7f769292024-07-23 22:21:32 +00003704 pmk_r0_name, &key_len, no_kdk) < 0)
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003705 break;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003706
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003707 if (mic_len &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003708 wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK,
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08003709 sm->last_rx_eapol_key,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003710 sm->last_rx_eapol_key_len) == 0) {
Hai Shalom021b0b52019-04-10 11:17:58 -07003711 if (sm->PMK != pmk) {
3712 os_memcpy(sm->PMK, pmk, pmk_len);
3713 sm->pmk_len = pmk_len;
3714 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003715 ok = 1;
3716 break;
3717 }
3718
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003719#ifdef CONFIG_FILS
3720 if (!mic_len &&
3721 wpa_aead_decrypt(sm, &PTK, sm->last_rx_eapol_key,
3722 sm->last_rx_eapol_key_len, NULL) == 0) {
3723 ok = 1;
3724 break;
3725 }
3726#endif /* CONFIG_FILS */
3727
Hai Shalomfdcde762020-04-02 11:19:20 -07003728#ifdef CONFIG_OWE
3729 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE && pmk_len > 32 &&
3730 owe_ptk_workaround == 1) {
3731 wpa_printf(MSG_DEBUG,
3732 "OWE: Try PTK derivation workaround with SHA256");
3733 owe_ptk_workaround = 2;
3734 continue;
3735 }
3736#endif /* CONFIG_OWE */
3737
Sunil Ravi7f769292024-07-23 22:21:32 +00003738 /* Some deployed STAs that advertise SecureLTF support in the
3739 * RSNXE in (Re)Association Request frames, do not derive KDK
3740 * during PTK generation. Try to work around this by checking if
3741 * a PTK derived without KDK would result in a matching MIC. */
3742 if (!sm->wpa_auth->conf.force_kdk_derivation &&
3743 derive_kdk && !no_kdk) {
3744 wpa_printf(MSG_DEBUG,
3745 "Try new PTK derivation without KDK as a workaround");
3746 no_kdk = true;
3747 goto try_without_kdk;
3748 }
3749
Roshan Pius3a1667e2018-07-03 15:17:14 -07003750 if (!wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
3751 wpa_key_mgmt_sae(sm->wpa_key_mgmt))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003752 break;
3753 }
3754
Sunil Ravi7f769292024-07-23 22:21:32 +00003755 if (no_kdk && ok) {
3756 /* The workaround worked, so allow the 4-way handshake to be
3757 * completed with the PTK that was derived without the KDK. */
3758 wpa_printf(MSG_DEBUG,
3759 "PTK without KDK worked - misbehaving STA "
3760 MACSTR, MAC2STR(sm->addr));
3761 }
3762
Sunil Ravia04bd252022-05-02 22:54:18 -07003763 if (!ok && wpa_key_mgmt_wpa_psk_no_sae(sm->wpa_key_mgmt) &&
3764 wpa_auth->conf.radius_psk && wpa_auth->cb->request_radius_psk &&
3765 !sm->waiting_radius_psk) {
3766 wpa_printf(MSG_DEBUG, "No PSK available - ask RADIUS server");
3767 wpa_auth->cb->request_radius_psk(wpa_auth->cb_ctx, sm->addr,
3768 sm->wpa_key_mgmt,
3769 sm->ANonce,
3770 sm->last_rx_eapol_key,
3771 sm->last_rx_eapol_key_len);
3772 sm->waiting_radius_psk = 1;
Sunil Raviaf8751c2023-03-29 11:35:17 -07003773 goto out;
Sunil Ravia04bd252022-05-02 22:54:18 -07003774 }
3775
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003776 if (!ok) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003777 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
3778 LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003779 "invalid MIC in msg 2/4 of 4-Way Handshake");
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003780 if (psk_found)
3781 wpa_auth_psk_failure_report(sm->wpa_auth, sm->addr);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003782 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003783 }
3784
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003785 /*
3786 * Note: last_rx_eapol_key length fields have already been validated in
3787 * wpa_receive().
3788 */
3789 hdr = (struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
3790 key = (struct wpa_eapol_key *) (hdr + 1);
3791 mic = (u8 *) (key + 1);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003792 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003793 key_data = mic + mic_len + 2;
3794 key_data_length = WPA_GET_BE16(mic + mic_len);
3795 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
3796 sizeof(*key) - mic_len - 2)
Sunil Raviaf8751c2023-03-29 11:35:17 -07003797 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003798
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003799 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
3800 if (mic_len && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
3801 if (ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
3802 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC &&
3803 !wpa_use_aes_key_wrap(sm->wpa_key_mgmt)) {
3804 wpa_printf(MSG_INFO,
3805 "Unsupported EAPOL-Key Key Data field encryption");
3806 goto out;
3807 }
3808
3809 if (key_data_length < 8 || key_data_length % 8) {
3810 wpa_printf(MSG_INFO,
3811 "RSN: Unsupported AES-WRAP len %u",
3812 key_data_length);
3813 goto out;
3814 }
3815 key_data_length -= 8; /* AES-WRAP adds 8 bytes */
3816 key_data_buf = os_malloc(key_data_length);
3817 if (!key_data_buf)
3818 goto out;
3819 key_data_buf_len = key_data_length;
3820 if (aes_unwrap(PTK.kek, PTK.kek_len, key_data_length / 8,
3821 key_data, key_data_buf)) {
3822 bin_clear_free(key_data_buf, key_data_buf_len);
3823 wpa_printf(MSG_INFO,
3824 "RSN: AES unwrap failed - could not decrypt EAPOL-Key key data");
3825 goto out;
3826 }
3827 key_data = key_data_buf;
3828 wpa_hexdump_key(MSG_DEBUG, "RSN: Decrypted EAPOL-Key Key Data",
3829 key_data, key_data_length);
3830 }
3831
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003832 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003833 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003834 "received EAPOL-Key msg 2/4 with invalid Key Data contents");
Sunil Raviaf8751c2023-03-29 11:35:17 -07003835 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003836 }
3837 if (kde.rsn_ie) {
3838 eapol_key_ie = kde.rsn_ie;
3839 eapol_key_ie_len = kde.rsn_ie_len;
3840 } else if (kde.osen) {
3841 eapol_key_ie = kde.osen;
3842 eapol_key_ie_len = kde.osen_len;
3843 } else {
3844 eapol_key_ie = kde.wpa_ie;
3845 eapol_key_ie_len = kde.wpa_ie_len;
3846 }
3847 ft = sm->wpa == WPA_VERSION_WPA2 && wpa_key_mgmt_ft(sm->wpa_key_mgmt);
Hai Shalomfdcde762020-04-02 11:19:20 -07003848 if (!sm->wpa_ie ||
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003849 wpa_compare_rsn_ie(ft, sm->wpa_ie, sm->wpa_ie_len,
3850 eapol_key_ie, eapol_key_ie_len)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003851 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003852 "WPA IE from (Re)AssocReq did not match with msg 2/4");
3853 if (sm->wpa_ie) {
3854 wpa_hexdump(MSG_DEBUG, "WPA IE in AssocReq",
3855 sm->wpa_ie, sm->wpa_ie_len);
3856 }
3857 wpa_hexdump(MSG_DEBUG, "WPA IE in msg 2/4",
3858 eapol_key_ie, eapol_key_ie_len);
3859 /* MLME-DEAUTHENTICATE.request */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003860 wpa_sta_disconnect(wpa_auth, sm->addr,
3861 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003862 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003863 }
Hai Shalomc3565922019-10-28 11:58:20 -07003864 if ((!sm->rsnxe && kde.rsnxe) ||
3865 (sm->rsnxe && !kde.rsnxe) ||
3866 (sm->rsnxe && kde.rsnxe &&
3867 (sm->rsnxe_len != kde.rsnxe_len ||
3868 os_memcmp(sm->rsnxe, kde.rsnxe, sm->rsnxe_len) != 0))) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003869 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomc3565922019-10-28 11:58:20 -07003870 "RSNXE from (Re)AssocReq did not match the one in EAPOL-Key msg 2/4");
3871 wpa_hexdump(MSG_DEBUG, "RSNXE in AssocReq",
3872 sm->rsnxe, sm->rsnxe_len);
3873 wpa_hexdump(MSG_DEBUG, "RSNXE in EAPOL-Key msg 2/4",
3874 kde.rsnxe, kde.rsnxe_len);
3875 /* MLME-DEAUTHENTICATE.request */
3876 wpa_sta_disconnect(wpa_auth, sm->addr,
3877 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003878 goto out;
Hai Shalomc3565922019-10-28 11:58:20 -07003879 }
Hai Shalom74f70d42019-02-11 14:42:39 -08003880#ifdef CONFIG_OCV
3881 if (wpa_auth_uses_ocv(sm)) {
3882 struct wpa_channel_info ci;
3883 int tx_chanwidth;
3884 int tx_seg1_idx;
Hai Shalom899fcc72020-10-19 14:38:18 -07003885 enum oci_verify_result res;
Hai Shalom74f70d42019-02-11 14:42:39 -08003886
3887 if (wpa_channel_info(wpa_auth, &ci) != 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003888 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
3889 LOGGER_INFO,
Hai Shalom74f70d42019-02-11 14:42:39 -08003890 "Failed to get channel info to validate received OCI in EAPOL-Key 2/4");
Sunil Raviaf8751c2023-03-29 11:35:17 -07003891 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003892 }
3893
3894 if (get_sta_tx_parameters(sm,
3895 channel_width_to_int(ci.chanwidth),
3896 ci.seg1_idx, &tx_chanwidth,
3897 &tx_seg1_idx) < 0)
Sunil Raviaf8751c2023-03-29 11:35:17 -07003898 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003899
Hai Shalom899fcc72020-10-19 14:38:18 -07003900 res = ocv_verify_tx_params(kde.oci, kde.oci_len, &ci,
3901 tx_chanwidth, tx_seg1_idx);
3902 if (wpa_auth_uses_ocv(sm) == 2 && res == OCI_NOT_FOUND) {
3903 /* Work around misbehaving STAs */
Sunil Raviaf8751c2023-03-29 11:35:17 -07003904 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
3905 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07003906 "Disable OCV with a STA that does not send OCI");
3907 wpa_auth_set_ocv(sm, 0);
3908 } else if (res != OCI_SUCCESS) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003909 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
3910 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07003911 "OCV failed: %s", ocv_errorstr);
3912 if (wpa_auth->conf.msg_ctx)
3913 wpa_msg(wpa_auth->conf.msg_ctx, MSG_INFO,
3914 OCV_FAILURE "addr=" MACSTR
3915 " frame=eapol-key-m2 error=%s",
Sunil Raviaf8751c2023-03-29 11:35:17 -07003916 MAC2STR(wpa_auth_get_spa(sm)),
3917 ocv_errorstr);
3918 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003919 }
3920 }
3921#endif /* CONFIG_OCV */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003922#ifdef CONFIG_IEEE80211R_AP
3923 if (ft && ft_check_msg_2_of_4(wpa_auth, sm, &kde) < 0) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003924 wpa_sta_disconnect(wpa_auth, sm->addr,
3925 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003926 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003927 }
3928#endif /* CONFIG_IEEE80211R_AP */
3929#ifdef CONFIG_P2P
3930 if (kde.ip_addr_req && kde.ip_addr_req[0] &&
3931 wpa_auth->ip_pool && WPA_GET_BE32(sm->ip_addr) == 0) {
3932 int idx;
3933 wpa_printf(MSG_DEBUG,
3934 "P2P: IP address requested in EAPOL-Key exchange");
3935 idx = bitfield_get_first_zero(wpa_auth->ip_pool);
3936 if (idx >= 0) {
3937 u32 start = WPA_GET_BE32(wpa_auth->conf.ip_addr_start);
3938 bitfield_set(wpa_auth->ip_pool, idx);
Sunil8cd6f4d2022-06-28 18:40:46 +00003939 sm->ip_addr_bit = idx;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003940 WPA_PUT_BE32(sm->ip_addr, start + idx);
3941 wpa_printf(MSG_DEBUG,
3942 "P2P: Assigned IP address %u.%u.%u.%u to "
Sunil8cd6f4d2022-06-28 18:40:46 +00003943 MACSTR " (bit %u)",
3944 sm->ip_addr[0], sm->ip_addr[1],
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003945 sm->ip_addr[2], sm->ip_addr[3],
Sunil Raviaf8751c2023-03-29 11:35:17 -07003946 MAC2STR(wpa_auth_get_spa(sm)),
3947 sm->ip_addr_bit);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003948 }
3949 }
3950#endif /* CONFIG_P2P */
3951
Hai Shalom4fbc08f2020-05-18 12:37:00 -07003952#ifdef CONFIG_DPP2
3953 if (DPP_VERSION > 1 && kde.dpp_kde) {
3954 wpa_printf(MSG_DEBUG,
3955 "DPP: peer Protocol Version %u Flags 0x%x",
3956 kde.dpp_kde[0], kde.dpp_kde[1]);
3957 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP &&
3958 wpa_auth->conf.dpp_pfs != 2 &&
3959 (kde.dpp_kde[1] & DPP_KDE_PFS_ALLOWED) &&
3960 !sm->dpp_z) {
3961 wpa_printf(MSG_INFO,
3962 "DPP: Peer indicated it supports PFS and local configuration allows this, but PFS was not negotiated for the association");
3963 wpa_sta_disconnect(wpa_auth, sm->addr,
3964 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003965 goto out;
Hai Shalom4fbc08f2020-05-18 12:37:00 -07003966 }
3967 }
3968#endif /* CONFIG_DPP2 */
3969
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003970 if (wpa_auth_validate_ml_kdes_m2(sm, &kde) < 0) {
3971 wpa_sta_disconnect(wpa_auth, sm->addr,
3972 WLAN_REASON_PREV_AUTH_NOT_VALID);
3973 return;
3974 }
3975
Hai Shalom021b0b52019-04-10 11:17:58 -07003976 if (vlan_id && wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
3977 wpa_auth_update_vlan(wpa_auth, sm->addr, vlan_id) < 0) {
3978 wpa_sta_disconnect(wpa_auth, sm->addr,
3979 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003980 goto out;
Hai Shalom021b0b52019-04-10 11:17:58 -07003981 }
3982
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003983 sm->pending_1_of_4_timeout = 0;
3984 eloop_cancel_timeout(wpa_send_eapol_timeout, sm->wpa_auth, sm);
3985
Hai Shalom60840252021-02-19 19:02:11 -08003986 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) && sm->PMK != pmk) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003987 /* PSK may have changed from the previous choice, so update
3988 * state machine data based on whatever PSK was selected here.
3989 */
3990 os_memcpy(sm->PMK, pmk, PMK_LEN);
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003991 sm->pmk_len = PMK_LEN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003992 }
3993
Hai Shalome21d4e82020-04-29 16:34:06 -07003994 sm->MICVerified = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003995
Sunil Raviaf8751c2023-03-29 11:35:17 -07003996#ifdef CONFIG_IEEE80211R_AP
3997 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) && !sm->ft_completed) {
3998 wpa_printf(MSG_DEBUG, "FT: Store PMK-R0/PMK-R1");
3999 wpa_auth_ft_store_keys(sm, pmk_r0, pmk_r1, pmk_r0_name,
4000 key_len);
4001 }
4002#endif /* CONFIG_IEEE80211R_AP */
4003
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004004 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
Hai Shalom81f62d82019-07-22 12:10:00 -07004005 forced_memzero(&PTK, sizeof(PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07004006 sm->PTK_valid = true;
Sunil Raviaf8751c2023-03-29 11:35:17 -07004007out:
4008 forced_memzero(pmk_r0, sizeof(pmk_r0));
4009 forced_memzero(pmk_r1, sizeof(pmk_r1));
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004010 bin_clear_free(key_data_buf, key_data_buf_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004011}
4012
4013
4014SM_STATE(WPA_PTK, PTKCALCNEGOTIATING2)
4015{
4016 SM_ENTRY_MA(WPA_PTK, PTKCALCNEGOTIATING2, wpa_ptk);
4017 sm->TimeoutCtr = 0;
4018}
4019
4020
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004021static int ieee80211w_kde_len(struct wpa_state_machine *sm)
4022{
Hai Shalomfdcde762020-04-02 11:19:20 -07004023 size_t len = 0;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004024 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07004025
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004026 if (sm->mgmt_frame_prot) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004027 len += 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004028 len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Hai Shalomfdcde762020-04-02 11:19:20 -07004029 }
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004030
4031 if (wpa_auth->conf.tx_bss_auth)
4032 wpa_auth = wpa_auth->conf.tx_bss_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07004033 if (sm->mgmt_frame_prot && sm->wpa_auth->conf.beacon_prot) {
4034 len += 2 + RSN_SELECTOR_LEN + WPA_BIGTK_KDE_PREFIX_LEN;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004035 len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004036 }
4037
Hai Shalomfdcde762020-04-02 11:19:20 -07004038 return len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004039}
4040
4041
4042static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos)
4043{
4044 struct wpa_igtk_kde igtk;
Hai Shalomfdcde762020-04-02 11:19:20 -07004045 struct wpa_bigtk_kde bigtk;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004046 struct wpa_group *gsm = sm->group;
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07004047 u8 rsc[WPA_KEY_RSC_LEN];
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004048 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
4049 struct wpa_auth_config *conf = &wpa_auth->conf;
Hai Shalomfdcde762020-04-02 11:19:20 -07004050 size_t len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004051
4052 if (!sm->mgmt_frame_prot)
4053 return pos;
4054
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004055#ifdef CONFIG_IEEE80211BE
4056 if (sm->mld_assoc_link_id >= 0)
4057 return pos; /* Use per-link MLO KDEs instead */
4058#endif /* CONFIG_IEEE80211BE */
4059
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004060 igtk.keyid[0] = gsm->GN_igtk;
4061 igtk.keyid[1] = 0;
4062 if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE ||
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07004063 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004064 os_memset(igtk.pn, 0, sizeof(igtk.pn));
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07004065 else
4066 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn));
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07004067 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len);
Hai Shalomfdcde762020-04-02 11:19:20 -07004068 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004069 /*
4070 * Provide unique random IGTK to each STA to prevent use of
4071 * IGTK in the BSS.
4072 */
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07004073 if (random_get_bytes(igtk.igtk, len) < 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004074 return pos;
4075 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004076 pos = wpa_add_kde(pos, RSN_KEY_DATA_IGTK,
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07004077 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len,
4078 NULL, 0);
Sunil Ravia04bd252022-05-02 22:54:18 -07004079 forced_memzero(&igtk, sizeof(igtk));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004080
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004081 if (wpa_auth->conf.tx_bss_auth) {
4082 wpa_auth = wpa_auth->conf.tx_bss_auth;
4083 conf = &wpa_auth->conf;
4084 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
4085 gsm = wpa_auth->group;
4086 }
4087
4088 if (!sm->wpa_auth->conf.beacon_prot)
Hai Shalomfdcde762020-04-02 11:19:20 -07004089 return pos;
4090
4091 bigtk.keyid[0] = gsm->GN_bigtk;
4092 bigtk.keyid[1] = 0;
4093 if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE ||
4094 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0)
4095 os_memset(bigtk.pn, 0, sizeof(bigtk.pn));
4096 else
4097 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn));
4098 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07004099 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
4100 /*
4101 * Provide unique random BIGTK to each OSEN STA to prevent use
4102 * of BIGTK in the BSS.
4103 */
4104 if (random_get_bytes(bigtk.bigtk, len) < 0)
4105 return pos;
4106 }
Hai Shalomfdcde762020-04-02 11:19:20 -07004107 pos = wpa_add_kde(pos, RSN_KEY_DATA_BIGTK,
4108 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len,
4109 NULL, 0);
Sunil Ravia04bd252022-05-02 22:54:18 -07004110 forced_memzero(&bigtk, sizeof(bigtk));
Hai Shalomfdcde762020-04-02 11:19:20 -07004111
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004112 return pos;
4113}
4114
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004115
Hai Shalom74f70d42019-02-11 14:42:39 -08004116static int ocv_oci_len(struct wpa_state_machine *sm)
4117{
4118#ifdef CONFIG_OCV
4119 if (wpa_auth_uses_ocv(sm))
4120 return OCV_OCI_KDE_LEN;
4121#endif /* CONFIG_OCV */
4122 return 0;
4123}
4124
Hai Shalom899fcc72020-10-19 14:38:18 -07004125
4126static int ocv_oci_add(struct wpa_state_machine *sm, u8 **argpos,
4127 unsigned int freq)
Hai Shalom74f70d42019-02-11 14:42:39 -08004128{
4129#ifdef CONFIG_OCV
4130 struct wpa_channel_info ci;
4131
4132 if (!wpa_auth_uses_ocv(sm))
4133 return 0;
4134
4135 if (wpa_channel_info(sm->wpa_auth, &ci) != 0) {
4136 wpa_printf(MSG_WARNING,
4137 "Failed to get channel info for OCI element");
4138 return -1;
4139 }
Hai Shalom899fcc72020-10-19 14:38:18 -07004140#ifdef CONFIG_TESTING_OPTIONS
4141 if (freq) {
4142 wpa_printf(MSG_INFO,
4143 "TEST: Override OCI KDE frequency %d -> %u MHz",
4144 ci.frequency, freq);
4145 ci.frequency = freq;
4146 }
4147#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalom74f70d42019-02-11 14:42:39 -08004148
4149 return ocv_insert_oci_kde(&ci, argpos);
4150#else /* CONFIG_OCV */
4151 return 0;
4152#endif /* CONFIG_OCV */
4153}
4154
4155
Hai Shalomfdcde762020-04-02 11:19:20 -07004156#ifdef CONFIG_TESTING_OPTIONS
4157static u8 * replace_ie(const char *name, const u8 *old_buf, size_t *len, u8 eid,
4158 const u8 *ie, size_t ie_len)
4159{
4160 const u8 *elem;
4161 u8 *buf;
4162
4163 wpa_printf(MSG_DEBUG, "TESTING: %s EAPOL override", name);
4164 wpa_hexdump(MSG_DEBUG, "TESTING: wpa_ie before override",
4165 old_buf, *len);
4166 buf = os_malloc(*len + ie_len);
4167 if (!buf)
4168 return NULL;
4169 os_memcpy(buf, old_buf, *len);
4170 elem = get_ie(buf, *len, eid);
4171 if (elem) {
4172 u8 elem_len = 2 + elem[1];
4173
4174 os_memmove((void *) elem, elem + elem_len,
4175 *len - (elem - buf) - elem_len);
4176 *len -= elem_len;
4177 }
4178 os_memcpy(buf + *len, ie, ie_len);
4179 *len += ie_len;
4180 wpa_hexdump(MSG_DEBUG, "TESTING: wpa_ie after EAPOL override",
4181 buf, *len);
4182
4183 return buf;
4184}
4185#endif /* CONFIG_TESTING_OPTIONS */
4186
4187
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004188#ifdef CONFIG_IEEE80211BE
4189
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004190void wpa_auth_ml_get_key_info(struct wpa_authenticator *a,
4191 struct wpa_auth_ml_link_key_info *info,
4192 bool mgmt_frame_prot, bool beacon_prot)
4193{
4194 struct wpa_group *gsm = a->group;
4195 u8 rsc[WPA_KEY_RSC_LEN];
4196
4197 wpa_printf(MSG_DEBUG,
4198 "MLD: Get group key info: link_id=%u, IGTK=%u, BIGTK=%u",
4199 info->link_id, mgmt_frame_prot, beacon_prot);
4200
4201 info->gtkidx = gsm->GN & 0x03;
4202 info->gtk = gsm->GTK[gsm->GN - 1];
4203 info->gtk_len = gsm->GTK_len;
4204
4205 if (wpa_auth_get_seqnum(a, NULL, gsm->GN, rsc) < 0)
4206 os_memset(info->pn, 0, sizeof(info->pn));
4207 else
4208 os_memcpy(info->pn, rsc, sizeof(info->pn));
4209
4210 if (!mgmt_frame_prot)
4211 return;
4212
4213 info->igtkidx = gsm->GN_igtk;
4214 info->igtk = gsm->IGTK[gsm->GN_igtk - 4];
4215 info->igtk_len = wpa_cipher_key_len(a->conf.group_mgmt_cipher);
4216
4217 if (wpa_auth_get_seqnum(a, NULL, gsm->GN_igtk, rsc) < 0)
4218 os_memset(info->ipn, 0, sizeof(info->ipn));
4219 else
4220 os_memcpy(info->ipn, rsc, sizeof(info->ipn));
4221
4222 if (!beacon_prot)
4223 return;
4224
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004225 if (a->conf.tx_bss_auth) {
4226 a = a->conf.tx_bss_auth;
4227 gsm = a->group;
4228 }
4229
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004230 info->bigtkidx = gsm->GN_bigtk;
4231 info->bigtk = gsm->BIGTK[gsm->GN_bigtk - 6];
4232
4233 if (wpa_auth_get_seqnum(a, NULL, gsm->GN_bigtk, rsc) < 0)
4234 os_memset(info->bipn, 0, sizeof(info->bipn));
4235 else
4236 os_memcpy(info->bipn, rsc, sizeof(info->bipn));
4237}
4238
4239
4240static void wpa_auth_get_ml_key_info(struct wpa_authenticator *wpa_auth,
4241 struct wpa_auth_ml_key_info *info)
4242{
4243 if (!wpa_auth->cb->get_ml_key_info)
4244 return;
4245
4246 wpa_auth->cb->get_ml_key_info(wpa_auth->cb_ctx, info);
4247}
4248
4249
4250static size_t wpa_auth_ml_group_kdes_len(struct wpa_state_machine *sm)
4251{
Sunil Ravi7f769292024-07-23 22:21:32 +00004252 struct wpa_authenticator *wpa_auth;
4253 size_t kde_len = 0;
4254 int link_id;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004255
4256 if (sm->mld_assoc_link_id < 0)
4257 return 0;
4258
Sunil Ravi7f769292024-07-23 22:21:32 +00004259 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
4260 if (!sm->mld_links[link_id].valid)
4261 continue;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004262
Sunil Ravi7f769292024-07-23 22:21:32 +00004263 wpa_auth = sm->mld_links[link_id].wpa_auth;
4264 if (!wpa_auth || !wpa_auth->group)
4265 continue;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004266
Sunil Ravi7f769292024-07-23 22:21:32 +00004267 /* MLO GTK KDE
4268 * Header + Key ID + Tx + LinkID + PN + GTK */
4269 kde_len += KDE_HDR_LEN + 1 + RSN_PN_LEN;
4270 kde_len += wpa_auth->group->GTK_len;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004271
Sunil Ravi7f769292024-07-23 22:21:32 +00004272 if (!sm->mgmt_frame_prot)
4273 continue;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004274
Sunil Ravi7f769292024-07-23 22:21:32 +00004275 if (wpa_auth->conf.tx_bss_auth)
4276 wpa_auth = wpa_auth->conf.tx_bss_auth;
4277
4278 /* MLO IGTK KDE
4279 * Header + Key ID + IPN + LinkID + IGTK */
4280 kde_len += KDE_HDR_LEN + WPA_IGTK_KDE_PREFIX_LEN + 1;
4281 kde_len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
4282
4283 if (!wpa_auth->conf.beacon_prot)
4284 continue;
4285
4286 /* MLO BIGTK KDE
4287 * Header + Key ID + BIPN + LinkID + BIGTK */
4288 kde_len += KDE_HDR_LEN + WPA_BIGTK_KDE_PREFIX_LEN + 1;
4289 kde_len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004290 }
4291
Sunil Ravi7f769292024-07-23 22:21:32 +00004292 wpa_printf(MSG_DEBUG, "MLO Group KDEs len = %zu", kde_len);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004293
4294 return kde_len;
4295}
4296
4297
4298static u8 * wpa_auth_ml_group_kdes(struct wpa_state_machine *sm, u8 *pos)
4299{
4300 struct wpa_auth_ml_key_info ml_key_info;
4301 unsigned int i, link_id;
Sunil Ravi7f769292024-07-23 22:21:32 +00004302 u8 *start = pos;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004303
4304 /* First fetch the key information from all the authenticators */
4305 os_memset(&ml_key_info, 0, sizeof(ml_key_info));
4306 ml_key_info.n_mld_links = sm->n_mld_affiliated_links + 1;
4307
4308 /*
4309 * Assume that management frame protection and beacon protection are the
4310 * same on all links.
4311 */
4312 ml_key_info.mgmt_frame_prot = sm->mgmt_frame_prot;
4313 ml_key_info.beacon_prot = sm->wpa_auth->conf.beacon_prot;
4314
4315 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
4316 if (!sm->mld_links[link_id].valid)
4317 continue;
4318
4319 ml_key_info.links[i++].link_id = link_id;
4320 }
4321
4322 wpa_auth_get_ml_key_info(sm->wpa_auth, &ml_key_info);
4323
4324 /* Add MLO GTK KDEs */
4325 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004326 if (!sm->mld_links[link_id].valid ||
4327 !ml_key_info.links[i].gtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004328 continue;
4329
4330 wpa_printf(MSG_DEBUG, "RSN: MLO GTK: link=%u", link_id);
4331 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO GTK",
4332 ml_key_info.links[i].gtk,
4333 ml_key_info.links[i].gtk_len);
4334
4335 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4336 *pos++ = RSN_SELECTOR_LEN + 1 + 6 +
4337 ml_key_info.links[i].gtk_len;
4338
4339 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_GTK);
4340 pos += RSN_SELECTOR_LEN;
4341
4342 *pos++ = (ml_key_info.links[i].gtkidx & 0x3) | (link_id << 4);
4343
4344 os_memcpy(pos, ml_key_info.links[i].pn, 6);
4345 pos += 6;
4346
4347 os_memcpy(pos, ml_key_info.links[i].gtk,
4348 ml_key_info.links[i].gtk_len);
4349 pos += ml_key_info.links[i].gtk_len;
4350
4351 i++;
4352 }
4353
Sunil Ravi7f769292024-07-23 22:21:32 +00004354 if (!sm->mgmt_frame_prot) {
4355 wpa_printf(MSG_DEBUG, "RSN: MLO Group KDE len = %ld",
4356 pos - start);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004357 return pos;
Sunil Ravi7f769292024-07-23 22:21:32 +00004358 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004359
4360 /* Add MLO IGTK KDEs */
4361 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004362 if (!sm->mld_links[link_id].valid ||
4363 !ml_key_info.links[i].igtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004364 continue;
4365
4366 wpa_printf(MSG_DEBUG, "RSN: MLO IGTK: link=%u", link_id);
4367 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO IGTK",
4368 ml_key_info.links[i].igtk,
4369 ml_key_info.links[i].igtk_len);
4370
4371 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4372 *pos++ = RSN_SELECTOR_LEN + 2 + 1 +
4373 sizeof(ml_key_info.links[i].ipn) +
4374 ml_key_info.links[i].igtk_len;
4375
4376 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_IGTK);
4377 pos += RSN_SELECTOR_LEN;
4378
4379 /* Add the Key ID */
4380 *pos++ = ml_key_info.links[i].igtkidx;
4381 *pos++ = 0;
4382
4383 /* Add the IPN */
4384 os_memcpy(pos, ml_key_info.links[i].ipn,
4385 sizeof(ml_key_info.links[i].ipn));
4386 pos += sizeof(ml_key_info.links[i].ipn);
4387
4388 *pos++ = ml_key_info.links[i].link_id << 4;
4389
4390 os_memcpy(pos, ml_key_info.links[i].igtk,
4391 ml_key_info.links[i].igtk_len);
4392 pos += ml_key_info.links[i].igtk_len;
4393
4394 i++;
4395 }
4396
Sunil Ravi7f769292024-07-23 22:21:32 +00004397 if (!sm->wpa_auth->conf.beacon_prot) {
4398 wpa_printf(MSG_DEBUG, "RSN: MLO Group KDE len = %ld",
4399 pos - start);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004400 return pos;
Sunil Ravi7f769292024-07-23 22:21:32 +00004401 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004402
4403 /* Add MLO BIGTK KDEs */
4404 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004405 if (!sm->mld_links[link_id].valid ||
4406 !ml_key_info.links[i].bigtk ||
4407 !ml_key_info.links[i].igtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004408 continue;
4409
4410 wpa_printf(MSG_DEBUG, "RSN: MLO BIGTK: link=%u", link_id);
4411 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO BIGTK",
4412 ml_key_info.links[i].bigtk,
4413 ml_key_info.links[i].igtk_len);
4414
4415 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4416 *pos++ = RSN_SELECTOR_LEN + 2 + 1 +
4417 sizeof(ml_key_info.links[i].bipn) +
4418 ml_key_info.links[i].igtk_len;
4419
4420 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_BIGTK);
4421 pos += RSN_SELECTOR_LEN;
4422
4423 /* Add the Key ID */
4424 *pos++ = ml_key_info.links[i].bigtkidx;
4425 *pos++ = 0;
4426
4427 /* Add the BIPN */
4428 os_memcpy(pos, ml_key_info.links[i].bipn,
4429 sizeof(ml_key_info.links[i].bipn));
4430 pos += sizeof(ml_key_info.links[i].bipn);
4431
4432 *pos++ = ml_key_info.links[i].link_id << 4;
4433
4434 os_memcpy(pos, ml_key_info.links[i].bigtk,
4435 ml_key_info.links[i].igtk_len);
4436 pos += ml_key_info.links[i].igtk_len;
4437
4438 i++;
4439 }
4440
Sunil Ravi7f769292024-07-23 22:21:32 +00004441 wpa_printf(MSG_DEBUG, "RSN: MLO Group KDE len = %ld", pos - start);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004442 return pos;
4443}
4444
4445#endif /* CONFIG_IEEE80211BE */
4446
4447
4448static size_t wpa_auth_ml_kdes_len(struct wpa_state_machine *sm)
4449{
4450 size_t kde_len = 0;
4451
4452#ifdef CONFIG_IEEE80211BE
4453 unsigned int link_id;
4454
4455 if (sm->mld_assoc_link_id < 0)
4456 return 0;
4457
4458 /* For the MAC Address KDE */
4459 kde_len = 2 + RSN_SELECTOR_LEN + ETH_ALEN;
4460
4461 /* MLO Link KDE for each link */
4462 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravi7f769292024-07-23 22:21:32 +00004463 struct wpa_authenticator *wpa_auth;
4464 const u8 *ie, *ieo;
4465
4466 wpa_auth = wpa_get_link_auth(sm->wpa_auth, link_id);
4467 if (!wpa_auth)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004468 continue;
4469
Sunil Ravi7f769292024-07-23 22:21:32 +00004470 kde_len += 2 + RSN_SELECTOR_LEN + 1 + ETH_ALEN;
4471 ie = get_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4472 WLAN_EID_RSN);
4473 ieo = get_vendor_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4474 sm->rsn_override_2 ?
4475 RSNE_OVERRIDE_2_IE_VENDOR_TYPE :
4476 RSNE_OVERRIDE_IE_VENDOR_TYPE);
4477 if ((sm->rsn_override || sm->rsn_override_2) && ieo)
4478 kde_len += 2 + ieo[1 - 4];
4479 else
4480 kde_len += 2 + ie[1];
4481
4482 ie = get_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4483 WLAN_EID_RSNX);
4484 ieo = get_vendor_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4485 RSNXE_OVERRIDE_IE_VENDOR_TYPE);
4486 if ((sm->rsn_override || sm->rsn_override_2) && ieo)
4487 kde_len += 2 + ieo[1] - 4;
4488 else if (ie)
4489 kde_len += 2 + ie[1];
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004490 }
4491
4492 kde_len += wpa_auth_ml_group_kdes_len(sm);
4493#endif /* CONFIG_IEEE80211BE */
4494
4495 return kde_len;
4496}
4497
4498
4499static u8 * wpa_auth_ml_kdes(struct wpa_state_machine *sm, u8 *pos)
4500{
4501#ifdef CONFIG_IEEE80211BE
4502 u8 link_id;
Sunil Ravi7f769292024-07-23 22:21:32 +00004503 u8 *start = pos;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004504
4505 if (sm->mld_assoc_link_id < 0)
4506 return pos;
4507
4508 wpa_printf(MSG_DEBUG, "RSN: MLD: Adding MAC Address KDE");
4509 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR,
Sunil Ravi7f769292024-07-23 22:21:32 +00004510 sm->wpa_auth->mld_addr, ETH_ALEN, NULL, 0);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004511
4512 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravi7f769292024-07-23 22:21:32 +00004513 struct wpa_authenticator *wpa_auth;
4514 const u8 *rsne, *rsnxe, *rsneo, *rsnxeo;
4515 size_t rsne_len, rsnxe_len;
4516
4517 wpa_auth = wpa_get_link_auth(sm->wpa_auth, link_id);
4518 if (!wpa_auth)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004519 continue;
4520
Sunil Ravi7f769292024-07-23 22:21:32 +00004521 rsne = get_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4522 WLAN_EID_RSN);
4523 rsne_len = rsne ? 2 + rsne[1] : 0;
4524 rsneo = get_vendor_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4525 sm->rsn_override_2 ?
4526 RSNE_OVERRIDE_2_IE_VENDOR_TYPE :
4527 RSNE_OVERRIDE_IE_VENDOR_TYPE);
4528 if ((sm->rsn_override || sm->rsn_override_2) && rsneo)
4529 rsne_len = 2 + rsneo[1] - 4;
4530 else
4531 rsneo = NULL;
4532
4533 rsnxe = get_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4534 WLAN_EID_RSNX);
4535 rsnxe_len = rsnxe ? 2 + rsnxe[1] : 0;
4536 rsnxeo = get_vendor_ie(wpa_auth->wpa_ie, wpa_auth->wpa_ie_len,
4537 RSNXE_OVERRIDE_IE_VENDOR_TYPE);
4538 if ((sm->rsn_override || sm->rsn_override_2) && rsnxeo)
4539 rsnxe_len = 2 + rsnxeo[1] - 4;
4540 else
4541 rsnxeo = NULL;
4542
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004543 wpa_printf(MSG_DEBUG,
4544 "RSN: MLO Link: link=%u, len=%zu", link_id,
4545 RSN_SELECTOR_LEN + 1 + ETH_ALEN +
Sunil Ravi7f769292024-07-23 22:21:32 +00004546 rsne_len + rsnxe_len);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004547
4548 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4549 *pos++ = RSN_SELECTOR_LEN + 1 + ETH_ALEN +
Sunil Ravi7f769292024-07-23 22:21:32 +00004550 rsne_len + rsnxe_len;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004551
4552 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_LINK);
4553 pos += RSN_SELECTOR_LEN;
4554
4555 /* Add the Link Information */
4556 *pos = link_id;
Sunil Ravi7f769292024-07-23 22:21:32 +00004557 if (rsne_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004558 *pos |= RSN_MLO_LINK_KDE_LI_RSNE_INFO;
Sunil Ravi7f769292024-07-23 22:21:32 +00004559 if (rsnxe_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004560 *pos |= RSN_MLO_LINK_KDE_LI_RSNXE_INFO;
4561
4562 pos++;
Sunil Ravi7f769292024-07-23 22:21:32 +00004563 os_memcpy(pos, wpa_auth->addr, ETH_ALEN);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004564 pos += ETH_ALEN;
4565
Sunil Ravi7f769292024-07-23 22:21:32 +00004566 if (rsne_len) {
4567 if (rsneo) {
4568 *pos++ = WLAN_EID_RSN;
4569 *pos++ = rsneo[1] - 4;
4570 os_memcpy(pos, &rsneo[2 + 4], rsneo[1] - 4);
4571 pos += rsneo[1] - 4;
4572 } else {
4573 os_memcpy(pos, rsne, rsne_len);
4574 pos += rsne_len;
4575 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004576 }
4577
Sunil Ravi7f769292024-07-23 22:21:32 +00004578 if (rsnxe_len) {
4579 if (rsnxeo) {
4580 *pos++ = WLAN_EID_RSNX;
4581 *pos++ = rsnxeo[1] - 4;
4582 os_memcpy(pos, &rsnxeo[2 + 4], rsnxeo[1] - 4);
4583 pos += rsnxeo[1] - 4;
4584 } else {
4585 os_memcpy(pos, rsnxe, rsnxe_len);
4586 pos += rsnxe_len;
4587 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004588 }
4589 }
4590
Sunil Ravi7f769292024-07-23 22:21:32 +00004591 wpa_printf(MSG_DEBUG, "RSN: MLO Link KDE len = %ld", pos - start);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004592 pos = wpa_auth_ml_group_kdes(sm, pos);
4593#endif /* CONFIG_IEEE80211BE */
4594
4595 return pos;
4596}
4597
4598
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004599SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
4600{
Hai Shaloma20dcd72022-02-04 13:43:00 -08004601 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32];
Sunil Ravia04bd252022-05-02 22:54:18 -07004602 size_t gtk_len, kde_len = 0, wpa_ie_len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004603 struct wpa_group *gsm = sm->group;
4604 u8 *wpa_ie;
Hai Shalomfdcde762020-04-02 11:19:20 -07004605 int secure, gtkidx, encr = 0;
Sunil Ravi7f769292024-07-23 22:21:32 +00004606 u8 *wpa_ie_buf = NULL, *wpa_ie_buf2 = NULL, *wpa_ie_buf3 = NULL;
Hai Shalomfdcde762020-04-02 11:19:20 -07004607 u8 hdr[2];
4608 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004609#ifdef CONFIG_IEEE80211BE
4610 bool is_mld = sm->mld_assoc_link_id >= 0;
4611#else /* CONFIG_IEEE80211BE */
4612 bool is_mld = false;
4613#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004614
4615 SM_ENTRY_MA(WPA_PTK, PTKINITNEGOTIATING, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07004616 sm->TimeoutEvt = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004617
4618 sm->TimeoutCtr++;
Hai Shalomfdcde762020-04-02 11:19:20 -07004619 if (conf->wpa_disable_eapol_key_retries && sm->TimeoutCtr > 1) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004620 /* Do not allow retransmission of EAPOL-Key msg 3/4 */
4621 return;
4622 }
Hai Shalomfdcde762020-04-02 11:19:20 -07004623 if (sm->TimeoutCtr > conf->wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004624 /* No point in sending the EAPOL-Key - we will disconnect
4625 * immediately following this. */
4626 return;
4627 }
4628
4629 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
Hai Shalomfdcde762020-04-02 11:19:20 -07004630 GTK[GN], IGTK, [BIGTK], [FTIE], [TIE * 2])
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004631 */
4632 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
4633 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc);
4634 /* If FT is used, wpa_auth->wpa_ie includes both RSNIE and MDIE */
4635 wpa_ie = sm->wpa_auth->wpa_ie;
4636 wpa_ie_len = sm->wpa_auth->wpa_ie_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07004637 if (sm->wpa == WPA_VERSION_WPA && (conf->wpa & WPA_PROTO_RSN) &&
4638 wpa_ie_len > wpa_ie[1] + 2U && wpa_ie[0] == WLAN_EID_RSN) {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004639 /* WPA-only STA, remove RSN IE and possible MDIE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004640 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Hai Shalom60840252021-02-19 19:02:11 -08004641 if (wpa_ie[0] == WLAN_EID_RSNX)
4642 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004643 if (wpa_ie[0] == WLAN_EID_MOBILITY_DOMAIN)
4644 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004645 wpa_ie_len = wpa_ie[1] + 2;
4646 }
Sunil Ravi7f769292024-07-23 22:21:32 +00004647 if ((sm->rsn_override &&
4648 get_vendor_ie(wpa_ie, wpa_ie_len, RSNE_OVERRIDE_IE_VENDOR_TYPE)) ||
4649 (sm->rsn_override_2 &&
4650 get_vendor_ie(wpa_ie, wpa_ie_len,
4651 RSNE_OVERRIDE_2_IE_VENDOR_TYPE))) {
4652 const u8 *mde, *fte, *tie, *tie2 = NULL;
4653 const u8 *override_rsne = NULL, *override_rsnxe = NULL;
4654 const struct element *elem;
4655
4656 wpa_printf(MSG_DEBUG,
4657 "RSN: Use RSNE/RSNXE override element contents");
4658 mde = get_ie(wpa_ie, wpa_ie_len, WLAN_EID_MOBILITY_DOMAIN);
4659 fte = get_ie(wpa_ie, wpa_ie_len, WLAN_EID_FAST_BSS_TRANSITION);
4660 tie = get_ie(wpa_ie, wpa_ie_len, WLAN_EID_TIMEOUT_INTERVAL);
4661 if (tie) {
4662 const u8 *next = tie + 2 + tie[1];
4663
4664 tie2 = get_ie(next, wpa_ie + wpa_ie_len - next,
4665 WLAN_EID_TIMEOUT_INTERVAL);
4666 }
4667 for_each_element_id(elem, WLAN_EID_VENDOR_SPECIFIC,
4668 wpa_ie, wpa_ie_len) {
4669 if (elem->datalen >= 4) {
4670 if (WPA_GET_BE32(elem->data) ==
4671 (sm->rsn_override_2 ?
4672 RSNE_OVERRIDE_2_IE_VENDOR_TYPE :
4673 RSNE_OVERRIDE_IE_VENDOR_TYPE))
4674 override_rsne = &elem->id;
4675 if (WPA_GET_BE32(elem->data) ==
4676 RSNXE_OVERRIDE_IE_VENDOR_TYPE)
4677 override_rsnxe = &elem->id;
4678 }
4679 }
4680 wpa_hexdump(MSG_DEBUG, "EAPOL-Key msg 3/4 IEs before edits",
4681 wpa_ie, wpa_ie_len);
4682 wpa_ie_buf3 = os_malloc(wpa_ie_len);
4683 if (!wpa_ie_buf3)
4684 goto done;
4685 pos = wpa_ie_buf3;
4686 if (override_rsne) {
4687 *pos++ = WLAN_EID_RSN;
4688 *pos++ = override_rsne[1] - 4;
4689 os_memcpy(pos, &override_rsne[2 + 4],
4690 override_rsne[1] - 4);
4691 pos += override_rsne[1] - 4;
4692 }
4693 if (mde) {
4694 os_memcpy(pos, mde, 2 + mde[1]);
4695 pos += 2 + mde[1];
4696 }
4697 if (fte) {
4698 os_memcpy(pos, fte, 2 + fte[1]);
4699 pos += 2 + fte[1];
4700 }
4701 if (tie) {
4702 os_memcpy(pos, tie, 2 + tie[1]);
4703 pos += 2 + tie[1];
4704 }
4705 if (tie2) {
4706 os_memcpy(pos, tie2, 2 + tie2[1]);
4707 pos += 2 + tie2[1];
4708 }
4709 if (override_rsnxe) {
4710 *pos++ = WLAN_EID_RSNX;
4711 *pos++ = override_rsnxe[1] - 4;
4712 os_memcpy(pos, &override_rsnxe[2 + 4],
4713 override_rsnxe[1] - 4);
4714 pos += override_rsnxe[1] - 4;
4715 }
4716 wpa_ie = wpa_ie_buf3;
4717 wpa_ie_len = pos - wpa_ie_buf3;
4718 wpa_hexdump(MSG_DEBUG, "EAPOL-Key msg 3/4 IEs after edits",
4719 wpa_ie, wpa_ie_len);
4720 }
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004721#ifdef CONFIG_TESTING_OPTIONS
Hai Shalomfdcde762020-04-02 11:19:20 -07004722 if (conf->rsne_override_eapol_set) {
4723 wpa_ie_buf2 = replace_ie(
4724 "RSNE", wpa_ie, &wpa_ie_len, WLAN_EID_RSN,
4725 conf->rsne_override_eapol,
4726 conf->rsne_override_eapol_len);
4727 if (!wpa_ie_buf2)
4728 goto done;
4729 wpa_ie = wpa_ie_buf2;
4730 }
4731 if (conf->rsnxe_override_eapol_set) {
4732 wpa_ie_buf = replace_ie(
4733 "RSNXE", wpa_ie, &wpa_ie_len, WLAN_EID_RSNX,
4734 conf->rsnxe_override_eapol,
4735 conf->rsnxe_override_eapol_len);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004736 if (!wpa_ie_buf)
Hai Shalomfdcde762020-04-02 11:19:20 -07004737 goto done;
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004738 wpa_ie = wpa_ie_buf;
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004739 }
4740#endif /* CONFIG_TESTING_OPTIONS */
Sunil Raviaf8751c2023-03-29 11:35:17 -07004741 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004742 "sending 3/4 msg of 4-Way Handshake");
4743 if (sm->wpa == WPA_VERSION_WPA2) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004744 if (sm->use_ext_key_id && sm->TimeoutCtr == 1 &&
4745 wpa_auth_set_key(sm->wpa_auth, 0,
4746 wpa_cipher_to_alg(sm->pairwise),
4747 sm->addr,
4748 sm->keyidx_active, sm->PTK.tk,
4749 wpa_cipher_key_len(sm->pairwise),
4750 KEY_FLAG_PAIRWISE_RX)) {
4751 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4752 WLAN_REASON_PREV_AUTH_NOT_VALID);
4753 return;
4754 }
4755
Sunil Ravi89eba102022-09-13 21:04:37 -07004756#ifdef CONFIG_PASN
4757 if (sm->wpa_auth->conf.secure_ltf &&
4758 ieee802_11_rsnx_capab(sm->rsnxe,
4759 WLAN_RSNX_CAPAB_SECURE_LTF) &&
4760 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
4761 sm->PTK.ltf_keyseed,
4762 sm->PTK.ltf_keyseed_len)) {
4763 wpa_printf(MSG_ERROR,
4764 "WPA: Failed to set LTF keyseed to driver");
4765 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4766 WLAN_REASON_PREV_AUTH_NOT_VALID);
4767 return;
4768 }
4769#endif /* CONFIG_PASN */
4770
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004771 /* WPA2 send GTK in the 4-way handshake */
4772 secure = 1;
4773 gtk = gsm->GTK[gsm->GN - 1];
4774 gtk_len = gsm->GTK_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07004775 if (conf->disable_gtk ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07004776 sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004777 /*
4778 * Provide unique random GTK to each STA to prevent use
4779 * of GTK in the BSS.
4780 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08004781 if (random_get_bytes(stub_gtk, gtk_len) < 0)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004782 goto done;
Hai Shaloma20dcd72022-02-04 13:43:00 -08004783 gtk = stub_gtk;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004784 }
Hai Shalomc3565922019-10-28 11:58:20 -07004785 gtkidx = gsm->GN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004786 _rsc = rsc;
4787 encr = 1;
4788 } else {
4789 /* WPA does not include GTK in msg 3/4 */
4790 secure = 0;
4791 gtk = NULL;
4792 gtk_len = 0;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004793 gtkidx = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004794 _rsc = NULL;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08004795 if (sm->rx_eapol_key_secure) {
4796 /*
4797 * It looks like Windows 7 supplicant tries to use
4798 * Secure bit in msg 2/4 after having reported Michael
4799 * MIC failure and it then rejects the 4-way handshake
4800 * if msg 3/4 does not set Secure bit. Work around this
4801 * by setting the Secure bit here even in the case of
4802 * WPA if the supplicant used it first.
4803 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07004804 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
4805 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07004806 "STA used Secure bit in WPA msg 2/4 - set Secure for 3/4 as workaround");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08004807 secure = 1;
4808 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004809 }
4810
Hai Shalom74f70d42019-02-11 14:42:39 -08004811 kde_len = wpa_ie_len + ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Hai Shalomfdcde762020-04-02 11:19:20 -07004812
4813 if (sm->use_ext_key_id)
4814 kde_len += 2 + RSN_SELECTOR_LEN + 2;
4815
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004816 if (gtk)
4817 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004818#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004819 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
4820 kde_len += 2 + PMKID_LEN; /* PMKR1Name into RSN IE */
4821 kde_len += 300; /* FTIE + 2 * TIE */
4822 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004823#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004824#ifdef CONFIG_P2P
4825 if (WPA_GET_BE32(sm->ip_addr) > 0)
4826 kde_len += 2 + RSN_SELECTOR_LEN + 3 * 4;
4827#endif /* CONFIG_P2P */
Hai Shalomfdcde762020-04-02 11:19:20 -07004828
4829 if (conf->transition_disable)
4830 kde_len += 2 + RSN_SELECTOR_LEN + 1;
4831
Hai Shalom4fbc08f2020-05-18 12:37:00 -07004832#ifdef CONFIG_DPP2
4833 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP)
4834 kde_len += 2 + RSN_SELECTOR_LEN + 2;
4835#endif /* CONFIG_DPP2 */
4836
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004837 kde_len += wpa_auth_ml_kdes_len(sm);
4838
Sunil Ravi7f769292024-07-23 22:21:32 +00004839 if (sm->ssid_protection)
4840 kde_len += 2 + conf->ssid_len;
4841
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004842#ifdef CONFIG_TESTING_OPTIONS
4843 if (conf->eapol_m3_elements)
4844 kde_len += wpabuf_len(conf->eapol_m3_elements);
4845#endif /* CONFIG_TESTING_OPTIONS */
4846
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004847 kde = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07004848 if (!kde)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004849 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004850
4851 pos = kde;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004852 if (!is_mld) {
4853 os_memcpy(pos, wpa_ie, wpa_ie_len);
4854 pos += wpa_ie_len;
4855 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004856#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004857 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004858 int res;
4859 size_t elen;
4860
4861 elen = pos - kde;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004862 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004863 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004864 wpa_printf(MSG_ERROR,
4865 "FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004866 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004867 }
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004868 pos -= wpa_ie_len;
4869 pos += elen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004870 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004871#endif /* CONFIG_IEEE80211R_AP */
Hai Shalomfdcde762020-04-02 11:19:20 -07004872 hdr[1] = 0;
4873
4874 if (sm->use_ext_key_id) {
4875 hdr[0] = sm->keyidx_active & 0x01;
4876 pos = wpa_add_kde(pos, RSN_KEY_DATA_KEYID, hdr, 2, NULL, 0);
4877 }
4878
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004879 if (gtk && !is_mld) {
Hai Shalomc3565922019-10-28 11:58:20 -07004880 hdr[0] = gtkidx & 0x03;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004881 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
4882 gtk, gtk_len);
4883 }
4884 pos = ieee80211w_kde_add(sm, pos);
Hai Shalom899fcc72020-10-19 14:38:18 -07004885 if (ocv_oci_add(sm, &pos, conf->oci_freq_override_eapol_m3) < 0)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004886 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004887
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004888#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004889 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
4890 int res;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004891
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004892 if (sm->assoc_resp_ftie &&
4893 kde + kde_len - pos >= 2 + sm->assoc_resp_ftie[1]) {
4894 os_memcpy(pos, sm->assoc_resp_ftie,
4895 2 + sm->assoc_resp_ftie[1]);
4896 res = 2 + sm->assoc_resp_ftie[1];
4897 } else {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00004898 res = wpa_write_ftie(conf, sm->wpa_key_mgmt,
4899 sm->xxkey_len,
Roshan Pius3a1667e2018-07-03 15:17:14 -07004900 conf->r0_key_holder,
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004901 conf->r0_key_holder_len,
4902 NULL, NULL, pos,
4903 kde + kde_len - pos,
Hai Shalomfdcde762020-04-02 11:19:20 -07004904 NULL, 0, 0);
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004905 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004906 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004907 wpa_printf(MSG_ERROR,
4908 "FT: Failed to insert FTIE into EAPOL-Key Key Data");
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004909 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004910 }
4911 pos += res;
4912
4913 /* TIE[ReassociationDeadline] (TU) */
4914 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
4915 *pos++ = 5;
4916 *pos++ = WLAN_TIMEOUT_REASSOC_DEADLINE;
4917 WPA_PUT_LE32(pos, conf->reassociation_deadline);
4918 pos += 4;
4919
4920 /* TIE[KeyLifetime] (seconds) */
4921 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
4922 *pos++ = 5;
4923 *pos++ = WLAN_TIMEOUT_KEY_LIFETIME;
Roshan Pius3a1667e2018-07-03 15:17:14 -07004924 WPA_PUT_LE32(pos, conf->r0_key_lifetime);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004925 pos += 4;
4926 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004927#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004928#ifdef CONFIG_P2P
4929 if (WPA_GET_BE32(sm->ip_addr) > 0) {
4930 u8 addr[3 * 4];
4931 os_memcpy(addr, sm->ip_addr, 4);
Hai Shalomfdcde762020-04-02 11:19:20 -07004932 os_memcpy(addr + 4, conf->ip_addr_mask, 4);
4933 os_memcpy(addr + 8, conf->ip_addr_go, 4);
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004934 pos = wpa_add_kde(pos, WFA_KEY_DATA_IP_ADDR_ALLOC,
4935 addr, sizeof(addr), NULL, 0);
4936 }
4937#endif /* CONFIG_P2P */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004938
Hai Shalomfdcde762020-04-02 11:19:20 -07004939 if (conf->transition_disable)
4940 pos = wpa_add_kde(pos, WFA_KEY_DATA_TRANSITION_DISABLE,
4941 &conf->transition_disable, 1, NULL, 0);
4942
Hai Shalom4fbc08f2020-05-18 12:37:00 -07004943#ifdef CONFIG_DPP2
4944 if (DPP_VERSION > 1 && sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP) {
4945 u8 payload[2];
4946
4947 payload[0] = DPP_VERSION; /* Protocol Version */
4948 payload[1] = 0; /* Flags */
4949 if (conf->dpp_pfs == 0)
4950 payload[1] |= DPP_KDE_PFS_ALLOWED;
4951 else if (conf->dpp_pfs == 1)
4952 payload[1] |= DPP_KDE_PFS_ALLOWED |
4953 DPP_KDE_PFS_REQUIRED;
4954 pos = wpa_add_kde(pos, WFA_KEY_DATA_DPP,
4955 payload, sizeof(payload), NULL, 0);
4956 }
4957#endif /* CONFIG_DPP2 */
4958
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004959 pos = wpa_auth_ml_kdes(sm, pos);
4960
Sunil Ravi7f769292024-07-23 22:21:32 +00004961 if (sm->ssid_protection) {
4962 *pos++ = WLAN_EID_SSID;
4963 *pos++ = conf->ssid_len;
4964 os_memcpy(pos, conf->ssid, conf->ssid_len);
4965 pos += conf->ssid_len;
4966 }
4967
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004968#ifdef CONFIG_TESTING_OPTIONS
4969 if (conf->eapol_m3_elements) {
4970 os_memcpy(pos, wpabuf_head(conf->eapol_m3_elements),
4971 wpabuf_len(conf->eapol_m3_elements));
4972 pos += wpabuf_len(conf->eapol_m3_elements);
4973 }
4974
4975 if (conf->eapol_m3_no_encrypt)
4976 encr = 0;
4977#endif /* CONFIG_TESTING_OPTIONS */
4978
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004979 wpa_send_eapol(sm->wpa_auth, sm,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004980 (secure ? WPA_KEY_INFO_SECURE : 0) |
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004981 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
4982 WPA_KEY_INFO_MIC : 0) |
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004983 WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
4984 WPA_KEY_INFO_KEY_TYPE,
Hai Shalomc3565922019-10-28 11:58:20 -07004985 _rsc, sm->ANonce, kde, pos - kde, 0, encr);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004986done:
Sunil Ravia04bd252022-05-02 22:54:18 -07004987 bin_clear_free(kde, kde_len);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004988 os_free(wpa_ie_buf);
Hai Shalomfdcde762020-04-02 11:19:20 -07004989 os_free(wpa_ie_buf2);
Sunil Ravi7f769292024-07-23 22:21:32 +00004990 os_free(wpa_ie_buf3);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004991}
4992
4993
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004994static int wpa_auth_validate_ml_kdes_m4(struct wpa_state_machine *sm)
4995{
4996#ifdef CONFIG_IEEE80211BE
4997 const struct ieee802_1x_hdr *hdr;
4998 const struct wpa_eapol_key *key;
4999 struct wpa_eapol_ie_parse kde;
5000 const u8 *key_data, *mic;
5001 u16 key_data_length;
5002 size_t mic_len;
5003
5004 if (sm->mld_assoc_link_id < 0)
5005 return 0;
5006
5007 /*
5008 * Note: last_rx_eapol_key length fields have already been validated in
5009 * wpa_receive().
5010 */
5011 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
5012
5013 hdr = (const struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
5014 key = (const struct wpa_eapol_key *) (hdr + 1);
5015 mic = (const u8 *) (key + 1);
5016 key_data = mic + mic_len + 2;
5017 key_data_length = WPA_GET_BE16(mic + mic_len);
5018 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
5019 sizeof(*key) - mic_len - 2)
5020 return -1;
5021
5022 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
5023 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm),
5024 LOGGER_INFO,
5025 "received EAPOL-Key msg 4/4 with invalid Key Data contents");
5026 return -1;
5027 }
5028
5029 /* MLD MAC address must be the same */
5030 if (!kde.mac_addr ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005031 !ether_addr_equal(kde.mac_addr, sm->peer_mld_addr)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005032 wpa_printf(MSG_DEBUG,
5033 "MLD: Mismatching or missing MLD address in EAPOL-Key msg 4/4");
5034 return -1;
5035 }
5036
5037 wpa_printf(MSG_DEBUG, "MLD: MLD address in EAPOL-Key msg 4/4: " MACSTR,
5038 MAC2STR(kde.mac_addr));
5039#endif /* CONFIG_IEEE80211BE */
5040
5041 return 0;
5042}
5043
5044
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005045SM_STATE(WPA_PTK, PTKINITDONE)
5046{
5047 SM_ENTRY_MA(WPA_PTK, PTKINITDONE, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07005048 sm->EAPOLKeyReceived = false;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005049
5050 if (wpa_auth_validate_ml_kdes_m4(sm) < 0) {
5051 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
5052 WLAN_REASON_PREV_AUTH_NOT_VALID);
5053 return;
5054 }
5055
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005056 if (sm->Pair) {
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -07005057 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
5058 int klen = wpa_cipher_key_len(sm->pairwise);
Hai Shalomfdcde762020-04-02 11:19:20 -07005059 int res;
5060
5061 if (sm->use_ext_key_id)
5062 res = wpa_auth_set_key(sm->wpa_auth, 0, 0, sm->addr,
5063 sm->keyidx_active, NULL, 0,
5064 KEY_FLAG_PAIRWISE_RX_TX_MODIFY);
5065 else
5066 res = wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr,
5067 0, sm->PTK.tk, klen,
5068 KEY_FLAG_PAIRWISE_RX_TX);
5069 if (res) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005070 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
5071 WLAN_REASON_PREV_AUTH_NOT_VALID);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005072 return;
5073 }
Sunil Ravi89eba102022-09-13 21:04:37 -07005074
5075#ifdef CONFIG_PASN
5076 if (sm->wpa_auth->conf.secure_ltf &&
5077 ieee802_11_rsnx_capab(sm->rsnxe,
5078 WLAN_RSNX_CAPAB_SECURE_LTF) &&
5079 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
5080 sm->PTK.ltf_keyseed,
5081 sm->PTK.ltf_keyseed_len)) {
5082 wpa_printf(MSG_ERROR,
5083 "WPA: Failed to set LTF keyseed to driver");
5084 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
5085 WLAN_REASON_PREV_AUTH_NOT_VALID);
5086 return;
5087 }
5088#endif /* CONFIG_PASN */
5089
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005090 /* FIX: MLME-SetProtection.Request(TA, Tx_Rx) */
Hai Shalome21d4e82020-04-29 16:34:06 -07005091 sm->pairwise_set = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005092
Hai Shalom81f62d82019-07-22 12:10:00 -07005093 wpa_auth_set_ptk_rekey_timer(sm);
Hai Shalom60840252021-02-19 19:02:11 -08005094 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
5095 dot11RSNAConfigPMKLifetime, &sm->PTK);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005096
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005097 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
5098 sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP ||
5099 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005100 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
5101 WPA_EAPOL_authorized, 1);
5102 }
5103 }
5104
5105 if (0 /* IBSS == TRUE */) {
5106 sm->keycount++;
5107 if (sm->keycount == 2) {
5108 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
5109 WPA_EAPOL_portValid, 1);
5110 }
5111 } else {
5112 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portValid,
5113 1);
5114 }
Hai Shalome21d4e82020-04-29 16:34:06 -07005115 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyAvailable,
5116 false);
5117 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyDone, true);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005118 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07005119 sm->PInitAKeys = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005120 else
Hai Shalome21d4e82020-04-29 16:34:06 -07005121 sm->has_GTK = true;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005122 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005123 "pairwise key handshake completed (%s)",
5124 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN");
Hai Shaloma20dcd72022-02-04 13:43:00 -08005125 wpa_msg(sm->wpa_auth->conf.msg_ctx, MSG_INFO, "EAPOL-4WAY-HS-COMPLETED "
5126 MACSTR, MAC2STR(sm->addr));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005127
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08005128#ifdef CONFIG_IEEE80211R_AP
Sunil Raviaf8751c2023-03-29 11:35:17 -07005129 wpa_ft_push_pmk_r1(sm->wpa_auth, wpa_auth_get_spa(sm));
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08005130#endif /* CONFIG_IEEE80211R_AP */
Sunil Ravia04bd252022-05-02 22:54:18 -07005131
5132 sm->ptkstart_without_success = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005133}
5134
5135
5136SM_STEP(WPA_PTK)
5137{
5138 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07005139 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005140
5141 if (sm->Init)
5142 SM_ENTER(WPA_PTK, INITIALIZE);
5143 else if (sm->Disconnect
5144 /* || FIX: dot11RSNAConfigSALifetime timeout */) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005145 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005146 "WPA_PTK: sm->Disconnect");
5147 SM_ENTER(WPA_PTK, DISCONNECT);
5148 }
5149 else if (sm->DeauthenticationRequest)
5150 SM_ENTER(WPA_PTK, DISCONNECTED);
5151 else if (sm->AuthenticationRequest)
5152 SM_ENTER(WPA_PTK, AUTHENTICATION);
5153 else if (sm->ReAuthenticationRequest)
5154 SM_ENTER(WPA_PTK, AUTHENTICATION2);
Jouni Malinen1420a892017-10-01 12:32:57 +03005155 else if (sm->PTKRequest) {
5156 if (wpa_auth_sm_ptk_update(sm) < 0)
5157 SM_ENTER(WPA_PTK, DISCONNECTED);
5158 else
5159 SM_ENTER(WPA_PTK, PTKSTART);
5160 } else switch (sm->wpa_ptk_state) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005161 case WPA_PTK_INITIALIZE:
5162 break;
5163 case WPA_PTK_DISCONNECT:
5164 SM_ENTER(WPA_PTK, DISCONNECTED);
5165 break;
5166 case WPA_PTK_DISCONNECTED:
5167 SM_ENTER(WPA_PTK, INITIALIZE);
5168 break;
5169 case WPA_PTK_AUTHENTICATION:
5170 SM_ENTER(WPA_PTK, AUTHENTICATION2);
5171 break;
5172 case WPA_PTK_AUTHENTICATION2:
5173 if (wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) &&
Hai Shalomfdcde762020-04-02 11:19:20 -07005174 wpa_auth_get_eapol(wpa_auth, sm->addr,
Hai Shalome21d4e82020-04-29 16:34:06 -07005175 WPA_EAPOL_keyRun))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005176 SM_ENTER(WPA_PTK, INITPMK);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005177 else if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
5178 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005179 /* FIX: && 802.1X::keyRun */)
5180 SM_ENTER(WPA_PTK, INITPSK);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005181 else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP)
5182 SM_ENTER(WPA_PTK, INITPMK);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005183 break;
5184 case WPA_PTK_INITPMK:
Hai Shalomfdcde762020-04-02 11:19:20 -07005185 if (wpa_auth_get_eapol(wpa_auth, sm->addr,
Hai Shalome21d4e82020-04-29 16:34:06 -07005186 WPA_EAPOL_keyAvailable)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005187 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005188#ifdef CONFIG_DPP
5189 } else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP && sm->pmksa) {
5190 SM_ENTER(WPA_PTK, PTKSTART);
5191#endif /* CONFIG_DPP */
5192 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005193 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005194 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
5195 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005196 "INITPMK - keyAvailable = false");
5197 SM_ENTER(WPA_PTK, DISCONNECT);
5198 }
5199 break;
5200 case WPA_PTK_INITPSK:
Hai Shalomfdcde762020-04-02 11:19:20 -07005201 if (wpa_auth_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07005202 NULL, NULL, NULL)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005203 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005204#ifdef CONFIG_SAE
5205 } else if (wpa_auth_uses_sae(sm) && sm->pmksa) {
5206 SM_ENTER(WPA_PTK, PTKSTART);
5207#endif /* CONFIG_SAE */
Sunil Ravia04bd252022-05-02 22:54:18 -07005208 } else if (wpa_key_mgmt_wpa_psk_no_sae(sm->wpa_key_mgmt) &&
5209 wpa_auth->conf.radius_psk) {
5210 wpa_printf(MSG_DEBUG,
5211 "INITPSK: No PSK yet available for STA - use RADIUS later");
5212 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005213 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005214 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
5215 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005216 "no PSK configured for the STA");
5217 wpa_auth->dot11RSNA4WayHandshakeFailures++;
5218 SM_ENTER(WPA_PTK, DISCONNECT);
5219 }
5220 break;
5221 case WPA_PTK_PTKSTART:
5222 if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
5223 sm->EAPOLKeyPairwise)
5224 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
Hai Shalomfdcde762020-04-02 11:19:20 -07005225 else if (sm->TimeoutCtr > conf->wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005226 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005227 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
5228 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07005229 "PTKSTART: Retry limit %u reached",
5230 conf->wpa_pairwise_update_count);
Hai Shalome21d4e82020-04-29 16:34:06 -07005231 sm->disconnect_reason =
5232 WLAN_REASON_4WAY_HANDSHAKE_TIMEOUT;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005233 SM_ENTER(WPA_PTK, DISCONNECT);
5234 } else if (sm->TimeoutEvt)
5235 SM_ENTER(WPA_PTK, PTKSTART);
5236 break;
5237 case WPA_PTK_PTKCALCNEGOTIATING:
5238 if (sm->MICVerified)
5239 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING2);
5240 else if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
5241 sm->EAPOLKeyPairwise)
5242 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
5243 else if (sm->TimeoutEvt)
5244 SM_ENTER(WPA_PTK, PTKSTART);
5245 break;
5246 case WPA_PTK_PTKCALCNEGOTIATING2:
5247 SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);
5248 break;
5249 case WPA_PTK_PTKINITNEGOTIATING:
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005250 if (sm->update_snonce)
5251 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
5252 else if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
5253 sm->EAPOLKeyPairwise && sm->MICVerified)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005254 SM_ENTER(WPA_PTK, PTKINITDONE);
5255 else if (sm->TimeoutCtr >
Hai Shalomfdcde762020-04-02 11:19:20 -07005256 conf->wpa_pairwise_update_count ||
5257 (conf->wpa_disable_eapol_key_retries &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005258 sm->TimeoutCtr > 1)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005259 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005260 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
5261 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07005262 "PTKINITNEGOTIATING: Retry limit %u reached",
5263 conf->wpa_pairwise_update_count);
Hai Shalome21d4e82020-04-29 16:34:06 -07005264 sm->disconnect_reason =
5265 WLAN_REASON_4WAY_HANDSHAKE_TIMEOUT;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005266 SM_ENTER(WPA_PTK, DISCONNECT);
5267 } else if (sm->TimeoutEvt)
5268 SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);
5269 break;
5270 case WPA_PTK_PTKINITDONE:
5271 break;
5272 }
5273}
5274
5275
5276SM_STATE(WPA_PTK_GROUP, IDLE)
5277{
5278 SM_ENTRY_MA(WPA_PTK_GROUP, IDLE, wpa_ptk_group);
5279 if (sm->Init) {
5280 /* Init flag is not cleared here, so avoid busy
5281 * loop by claiming nothing changed. */
Hai Shalome21d4e82020-04-29 16:34:06 -07005282 sm->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005283 }
5284 sm->GTimeoutCtr = 0;
5285}
5286
5287
5288SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING)
5289{
5290 u8 rsc[WPA_KEY_RSC_LEN];
5291 struct wpa_group *gsm = sm->group;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005292 const u8 *kde = NULL;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005293 u8 *kde_buf = NULL, *pos, hdr[2];
Sunil Ravia04bd252022-05-02 22:54:18 -07005294 size_t kde_len = 0;
Hai Shaloma20dcd72022-02-04 13:43:00 -08005295 u8 *gtk, stub_gtk[32];
Hai Shalomfdcde762020-04-02 11:19:20 -07005296 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005297 bool is_mld = false;
5298
5299#ifdef CONFIG_IEEE80211BE
5300 is_mld = sm->mld_assoc_link_id >= 0;
5301#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005302
5303 SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
5304
5305 sm->GTimeoutCtr++;
Hai Shalomfdcde762020-04-02 11:19:20 -07005306 if (conf->wpa_disable_eapol_key_retries && sm->GTimeoutCtr > 1) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005307 /* Do not allow retransmission of EAPOL-Key group msg 1/2 */
5308 return;
5309 }
Hai Shalomfdcde762020-04-02 11:19:20 -07005310 if (sm->GTimeoutCtr > conf->wpa_group_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005311 /* No point in sending the EAPOL-Key - we will disconnect
5312 * immediately following this. */
5313 return;
5314 }
5315
5316 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07005317 sm->PInitAKeys = false;
5318 sm->TimeoutEvt = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005319 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
5320 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
5321 if (gsm->wpa_group_state == WPA_GROUP_SETKEYSDONE)
5322 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc);
Sunil Raviaf8751c2023-03-29 11:35:17 -07005323 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005324 "sending 1/2 msg of Group Key Handshake");
5325
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005326 gtk = gsm->GTK[gsm->GN - 1];
Hai Shalomfdcde762020-04-02 11:19:20 -07005327 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005328 /*
5329 * Provide unique random GTK to each STA to prevent use
5330 * of GTK in the BSS.
5331 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08005332 if (random_get_bytes(stub_gtk, gsm->GTK_len) < 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005333 return;
Hai Shaloma20dcd72022-02-04 13:43:00 -08005334 gtk = stub_gtk;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005335 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005336
5337 if (sm->wpa == WPA_VERSION_WPA2 && !is_mld) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005338 kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
Hai Shalom74f70d42019-02-11 14:42:39 -08005339 ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005340 kde_buf = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07005341 if (!kde_buf)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005342 return;
5343
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005344 kde = pos = kde_buf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005345 hdr[0] = gsm->GN & 0x03;
5346 hdr[1] = 0;
5347 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005348 gtk, gsm->GTK_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005349 pos = ieee80211w_kde_add(sm, pos);
Hai Shalom899fcc72020-10-19 14:38:18 -07005350 if (ocv_oci_add(sm, &pos,
5351 conf->oci_freq_override_eapol_g1) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08005352 os_free(kde_buf);
5353 return;
5354 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005355 kde_len = pos - kde;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005356#ifdef CONFIG_IEEE80211BE
5357 } else if (sm->wpa == WPA_VERSION_WPA2 && is_mld) {
5358 kde_len = wpa_auth_ml_group_kdes_len(sm);
5359 if (kde_len) {
5360 kde_buf = os_malloc(kde_len);
5361 if (!kde_buf)
5362 return;
5363
5364 kde = pos = kde_buf;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005365 pos = wpa_auth_ml_group_kdes(sm, pos);
5366 kde_len = pos - kde_buf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00005367 }
5368#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005369 } else {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005370 kde = gtk;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005371 kde_len = gsm->GTK_len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005372 }
5373
5374 wpa_send_eapol(sm->wpa_auth, sm,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08005375 WPA_KEY_INFO_SECURE |
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005376 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
5377 WPA_KEY_INFO_MIC : 0) |
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005378 WPA_KEY_INFO_ACK |
5379 (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08005380 rsc, NULL, kde, kde_len, gsm->GN, 1);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005381
Sunil Ravia04bd252022-05-02 22:54:18 -07005382 bin_clear_free(kde_buf, kde_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005383}
5384
5385
5386SM_STATE(WPA_PTK_GROUP, REKEYESTABLISHED)
5387{
Hai Shalom74f70d42019-02-11 14:42:39 -08005388 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07005389#ifdef CONFIG_OCV
Hai Shalom74f70d42019-02-11 14:42:39 -08005390 const u8 *key_data, *mic;
5391 struct ieee802_1x_hdr *hdr;
5392 struct wpa_eapol_key *key;
5393 struct wpa_eapol_ie_parse kde;
5394 size_t mic_len;
5395 u16 key_data_length;
5396#endif /* CONFIG_OCV */
5397
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005398 SM_ENTRY_MA(WPA_PTK_GROUP, REKEYESTABLISHED, wpa_ptk_group);
Hai Shalome21d4e82020-04-29 16:34:06 -07005399 sm->EAPOLKeyReceived = false;
Hai Shalom74f70d42019-02-11 14:42:39 -08005400
5401#ifdef CONFIG_OCV
5402 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
5403
5404 /*
5405 * Note: last_rx_eapol_key length fields have already been validated in
5406 * wpa_receive().
5407 */
5408 hdr = (struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
5409 key = (struct wpa_eapol_key *) (hdr + 1);
5410 mic = (u8 *) (key + 1);
5411 key_data = mic + mic_len + 2;
5412 key_data_length = WPA_GET_BE16(mic + mic_len);
5413 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
5414 sizeof(*key) - mic_len - 2)
5415 return;
5416
5417 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005418 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalom74f70d42019-02-11 14:42:39 -08005419 "received EAPOL-Key group msg 2/2 with invalid Key Data contents");
5420 return;
5421 }
5422
5423 if (wpa_auth_uses_ocv(sm)) {
5424 struct wpa_channel_info ci;
5425 int tx_chanwidth;
5426 int tx_seg1_idx;
5427
5428 if (wpa_channel_info(wpa_auth, &ci) != 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005429 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
5430 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07005431 "Failed to get channel info to validate received OCI in EAPOL-Key group 2/2");
Hai Shalom74f70d42019-02-11 14:42:39 -08005432 return;
5433 }
5434
5435 if (get_sta_tx_parameters(sm,
5436 channel_width_to_int(ci.chanwidth),
5437 ci.seg1_idx, &tx_chanwidth,
5438 &tx_seg1_idx) < 0)
5439 return;
5440
5441 if (ocv_verify_tx_params(kde.oci, kde.oci_len, &ci,
Hai Shalom899fcc72020-10-19 14:38:18 -07005442 tx_chanwidth, tx_seg1_idx) !=
5443 OCI_SUCCESS) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005444 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
5445 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07005446 "OCV failed: %s", ocv_errorstr);
5447 if (wpa_auth->conf.msg_ctx)
5448 wpa_msg(wpa_auth->conf.msg_ctx, MSG_INFO,
5449 OCV_FAILURE "addr=" MACSTR
5450 " frame=eapol-key-g2 error=%s",
Sunil Raviaf8751c2023-03-29 11:35:17 -07005451 MAC2STR(wpa_auth_get_spa(sm)),
5452 ocv_errorstr);
Hai Shalom74f70d42019-02-11 14:42:39 -08005453 return;
5454 }
5455 }
5456#endif /* CONFIG_OCV */
5457
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005458 if (sm->GUpdateStationKeys)
Sunil Ravi7f769292024-07-23 22:21:32 +00005459 wpa_gkeydone_sta(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005460 sm->GTimeoutCtr = 0;
5461 /* FIX: MLME.SetProtection.Request(TA, Tx_Rx) */
Sunil Raviaf8751c2023-03-29 11:35:17 -07005462 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005463 "group key handshake completed (%s)",
5464 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN");
Hai Shalome21d4e82020-04-29 16:34:06 -07005465 sm->has_GTK = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005466}
5467
5468
5469SM_STATE(WPA_PTK_GROUP, KEYERROR)
5470{
5471 SM_ENTRY_MA(WPA_PTK_GROUP, KEYERROR, wpa_ptk_group);
5472 if (sm->GUpdateStationKeys)
Sunil Ravi7f769292024-07-23 22:21:32 +00005473 wpa_gkeydone_sta(sm);
5474 if (sm->wpa_auth->conf.no_disconnect_on_group_keyerror &&
5475 sm->wpa == WPA_VERSION_WPA2) {
5476 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm),
5477 LOGGER_DEBUG,
5478 "group key handshake failed after %u tries - allow STA to remain connected",
5479 sm->wpa_auth->conf.wpa_group_update_count);
5480 return;
5481 }
Hai Shalome21d4e82020-04-29 16:34:06 -07005482 sm->Disconnect = true;
5483 sm->disconnect_reason = WLAN_REASON_GROUP_KEY_UPDATE_TIMEOUT;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005484 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08005485 "group key handshake failed (%s) after %u tries",
5486 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN",
5487 sm->wpa_auth->conf.wpa_group_update_count);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005488}
5489
5490
5491SM_STEP(WPA_PTK_GROUP)
5492{
5493 if (sm->Init || sm->PtkGroupInit) {
5494 SM_ENTER(WPA_PTK_GROUP, IDLE);
Hai Shalome21d4e82020-04-29 16:34:06 -07005495 sm->PtkGroupInit = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005496 } else switch (sm->wpa_ptk_group_state) {
5497 case WPA_PTK_GROUP_IDLE:
5498 if (sm->GUpdateStationKeys ||
5499 (sm->wpa == WPA_VERSION_WPA && sm->PInitAKeys))
5500 SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
5501 break;
5502 case WPA_PTK_GROUP_REKEYNEGOTIATING:
5503 if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
5504 !sm->EAPOLKeyPairwise && sm->MICVerified)
5505 SM_ENTER(WPA_PTK_GROUP, REKEYESTABLISHED);
5506 else if (sm->GTimeoutCtr >
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005507 sm->wpa_auth->conf.wpa_group_update_count ||
5508 (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
5509 sm->GTimeoutCtr > 1))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005510 SM_ENTER(WPA_PTK_GROUP, KEYERROR);
5511 else if (sm->TimeoutEvt)
5512 SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
5513 break;
5514 case WPA_PTK_GROUP_KEYERROR:
5515 SM_ENTER(WPA_PTK_GROUP, IDLE);
5516 break;
5517 case WPA_PTK_GROUP_REKEYESTABLISHED:
5518 SM_ENTER(WPA_PTK_GROUP, IDLE);
5519 break;
5520 }
5521}
5522
5523
5524static int wpa_gtk_update(struct wpa_authenticator *wpa_auth,
5525 struct wpa_group *group)
5526{
Hai Shalomfdcde762020-04-02 11:19:20 -07005527 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005528 int ret = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07005529 size_t len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005530
5531 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5532 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5533 if (wpa_gmk_to_gtk(group->GMK, "Group key expansion",
5534 wpa_auth->addr, group->GNonce,
5535 group->GTK[group->GN - 1], group->GTK_len) < 0)
5536 ret = -1;
5537 wpa_hexdump_key(MSG_DEBUG, "GTK",
5538 group->GTK[group->GN - 1], group->GTK_len);
5539
Hai Shalomfdcde762020-04-02 11:19:20 -07005540 if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
5541 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005542 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5543 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5544 if (wpa_gmk_to_gtk(group->GMK, "IGTK key expansion",
5545 wpa_auth->addr, group->GNonce,
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005546 group->IGTK[group->GN_igtk - 4], len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005547 ret = -1;
5548 wpa_hexdump_key(MSG_DEBUG, "IGTK",
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005549 group->IGTK[group->GN_igtk - 4], len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005550 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005551
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005552 if (!wpa_auth->non_tx_beacon_prot &&
5553 conf->ieee80211w == NO_MGMT_FRAME_PROTECTION)
5554 return ret;
5555 if (!conf->beacon_prot)
5556 return ret;
5557
5558 if (wpa_auth->conf.tx_bss_auth) {
5559 group = wpa_auth->conf.tx_bss_auth->group;
5560 if (group->bigtk_set)
5561 return ret;
5562 wpa_printf(MSG_DEBUG, "Set up BIGTK for TX BSS");
Hai Shalomfdcde762020-04-02 11:19:20 -07005563 }
5564
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005565 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
5566 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5567 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5568 if (wpa_gmk_to_gtk(group->GMK, "BIGTK key expansion",
5569 wpa_auth->addr, group->GNonce,
5570 group->BIGTK[group->GN_bigtk - 6], len) < 0)
5571 return -1;
5572 group->bigtk_set = true;
5573 wpa_hexdump_key(MSG_DEBUG, "BIGTK",
5574 group->BIGTK[group->GN_bigtk - 6], len);
5575
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005576 return ret;
5577}
5578
5579
5580static void wpa_group_gtk_init(struct wpa_authenticator *wpa_auth,
5581 struct wpa_group *group)
5582{
Hai Shalomfdcde762020-04-02 11:19:20 -07005583 wpa_printf(MSG_DEBUG,
5584 "WPA: group state machine entering state GTK_INIT (VLAN-ID %d)",
5585 group->vlan_id);
Hai Shalome21d4e82020-04-29 16:34:06 -07005586 group->changed = false; /* GInit is not cleared here; avoid loop */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005587 group->wpa_group_state = WPA_GROUP_GTK_INIT;
5588
5589 /* GTK[0..N] = 0 */
5590 os_memset(group->GTK, 0, sizeof(group->GTK));
5591 group->GN = 1;
5592 group->GM = 2;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005593 group->GN_igtk = 4;
5594 group->GM_igtk = 5;
Hai Shalomfdcde762020-04-02 11:19:20 -07005595 group->GN_bigtk = 6;
5596 group->GM_bigtk = 7;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005597 /* GTK[GN] = CalcGTK() */
5598 wpa_gtk_update(wpa_auth, group);
5599}
5600
5601
5602static int wpa_group_update_sta(struct wpa_state_machine *sm, void *ctx)
5603{
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005604 if (ctx != NULL && ctx != sm->group)
5605 return 0;
5606
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005607 if (sm->wpa_ptk_state != WPA_PTK_PTKINITDONE) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005608 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
5609 LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005610 "Not in PTKINITDONE; skip Group Key update");
Hai Shalome21d4e82020-04-29 16:34:06 -07005611 sm->GUpdateStationKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005612 return 0;
5613 }
5614 if (sm->GUpdateStationKeys) {
5615 /*
5616 * This should not really happen, so add a debug log entry.
5617 * Since we clear the GKeyDoneStations before the loop, the
5618 * station needs to be counted here anyway.
5619 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07005620 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
5621 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07005622 "GUpdateStationKeys was already set when marking station for GTK rekeying");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005623 }
5624
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005625 /* Do not rekey GTK/IGTK when STA is in WNM-Sleep Mode */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005626 if (sm->is_wnmsleep)
5627 return 0;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005628
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005629 sm->group->GKeyDoneStations++;
Hai Shalome21d4e82020-04-29 16:34:06 -07005630 sm->GUpdateStationKeys = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005631
5632 wpa_sm_step(sm);
5633 return 0;
5634}
5635
5636
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005637#ifdef CONFIG_WNM_AP
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005638/* update GTK when exiting WNM-Sleep Mode */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005639void wpa_wnmsleep_rekey_gtk(struct wpa_state_machine *sm)
5640{
Hai Shalomfdcde762020-04-02 11:19:20 -07005641 if (!sm || sm->is_wnmsleep)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005642 return;
5643
5644 wpa_group_update_sta(sm, NULL);
5645}
5646
5647
5648void wpa_set_wnmsleep(struct wpa_state_machine *sm, int flag)
5649{
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005650 if (sm)
5651 sm->is_wnmsleep = !!flag;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005652}
5653
5654
5655int wpa_wnmsleep_gtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5656{
Hai Shalom899fcc72020-10-19 14:38:18 -07005657 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005658 struct wpa_group *gsm = sm->group;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005659 u8 *start = pos;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005660
5661 /*
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005662 * GTK subelement:
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005663 * Sub-elem ID[1] | Length[1] | Key Info[2] | Key Length[1] | RSC[8] |
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005664 * Key[5..32]
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005665 */
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005666 *pos++ = WNM_SLEEP_SUBELEM_GTK;
5667 *pos++ = 11 + gsm->GTK_len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005668 /* Key ID in B0-B1 of Key Info */
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005669 WPA_PUT_LE16(pos, gsm->GN & 0x03);
5670 pos += 2;
5671 *pos++ = gsm->GTK_len;
5672 if (wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, pos) != 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005673 return 0;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005674 pos += 8;
5675 os_memcpy(pos, gsm->GTK[gsm->GN - 1], gsm->GTK_len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005676 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5677 /*
5678 * Provide unique random GTK to each STA to prevent use
5679 * of GTK in the BSS.
5680 */
5681 if (random_get_bytes(pos, gsm->GTK_len) < 0)
5682 return 0;
5683 }
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005684 pos += gsm->GTK_len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005685
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005686 wpa_printf(MSG_DEBUG, "WNM: GTK Key ID %u in WNM-Sleep Mode exit",
5687 gsm->GN);
5688 wpa_hexdump_key(MSG_DEBUG, "WNM: GTK in WNM-Sleep Mode exit",
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005689 gsm->GTK[gsm->GN - 1], gsm->GTK_len);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005690
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005691 return pos - start;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005692}
5693
5694
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005695int wpa_wnmsleep_igtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5696{
Hai Shalom899fcc72020-10-19 14:38:18 -07005697 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005698 struct wpa_group *gsm = sm->group;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005699 u8 *start = pos;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005700 size_t len = wpa_cipher_key_len(sm->wpa_auth->conf.group_mgmt_cipher);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005701
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005702 /*
5703 * IGTK subelement:
5704 * Sub-elem ID[1] | Length[1] | KeyID[2] | PN[6] | Key[16]
5705 */
5706 *pos++ = WNM_SLEEP_SUBELEM_IGTK;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005707 *pos++ = 2 + 6 + len;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005708 WPA_PUT_LE16(pos, gsm->GN_igtk);
5709 pos += 2;
5710 if (wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, pos) != 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005711 return 0;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005712 pos += 6;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005713
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005714 os_memcpy(pos, gsm->IGTK[gsm->GN_igtk - 4], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005715 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5716 /*
5717 * Provide unique random IGTK to each STA to prevent use
5718 * of IGTK in the BSS.
5719 */
5720 if (random_get_bytes(pos, len) < 0)
5721 return 0;
5722 }
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005723 pos += len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005724
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005725 wpa_printf(MSG_DEBUG, "WNM: IGTK Key ID %u in WNM-Sleep Mode exit",
5726 gsm->GN_igtk);
5727 wpa_hexdump_key(MSG_DEBUG, "WNM: IGTK in WNM-Sleep Mode exit",
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005728 gsm->IGTK[gsm->GN_igtk - 4], len);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005729
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005730 return pos - start;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005731}
Hai Shalomc3565922019-10-28 11:58:20 -07005732
Hai Shalomfdcde762020-04-02 11:19:20 -07005733
5734int wpa_wnmsleep_bigtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5735{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005736 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
5737 struct wpa_group *gsm = wpa_auth->group;
Hai Shalomfdcde762020-04-02 11:19:20 -07005738 u8 *start = pos;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005739 size_t len = wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Hai Shalomfdcde762020-04-02 11:19:20 -07005740
5741 /*
5742 * BIGTK subelement:
5743 * Sub-elem ID[1] | Length[1] | KeyID[2] | PN[6] | Key[16]
5744 */
5745 *pos++ = WNM_SLEEP_SUBELEM_BIGTK;
5746 *pos++ = 2 + 6 + len;
5747 WPA_PUT_LE16(pos, gsm->GN_bigtk);
5748 pos += 2;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005749 if (wpa_auth_get_seqnum(wpa_auth, NULL, gsm->GN_bigtk, pos) != 0)
Hai Shalomfdcde762020-04-02 11:19:20 -07005750 return 0;
5751 pos += 6;
5752
5753 os_memcpy(pos, gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005754 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5755 /*
5756 * Provide unique random BIGTK to each STA to prevent use
5757 * of BIGTK in the BSS.
5758 */
5759 if (random_get_bytes(pos, len) < 0)
5760 return 0;
5761 }
Hai Shalomfdcde762020-04-02 11:19:20 -07005762 pos += len;
5763
5764 wpa_printf(MSG_DEBUG, "WNM: BIGTK Key ID %u in WNM-Sleep Mode exit",
5765 gsm->GN_bigtk);
5766 wpa_hexdump_key(MSG_DEBUG, "WNM: BIGTK in WNM-Sleep Mode exit",
Hai Shaloma20dcd72022-02-04 13:43:00 -08005767 gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalomfdcde762020-04-02 11:19:20 -07005768
5769 return pos - start;
5770}
5771
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005772#endif /* CONFIG_WNM_AP */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005773
5774
Sunil Ravi7f769292024-07-23 22:21:32 +00005775static void wpa_group_update_gtk(struct wpa_authenticator *wpa_auth,
5776 struct wpa_group *group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005777{
5778 int tmp;
5779
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005780 tmp = group->GM;
5781 group->GM = group->GN;
5782 group->GN = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005783 tmp = group->GM_igtk;
5784 group->GM_igtk = group->GN_igtk;
5785 group->GN_igtk = tmp;
Hai Shalomfdcde762020-04-02 11:19:20 -07005786 tmp = group->GM_bigtk;
5787 group->GM_bigtk = group->GN_bigtk;
5788 group->GN_bigtk = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005789 /* "GKeyDoneStations = GNoStations" is done in more robust way by
5790 * counting the STAs that are marked with GUpdateStationKeys instead of
5791 * including all STAs that could be in not-yet-completed state. */
5792 wpa_gtk_update(wpa_auth, group);
Sunil Ravi7f769292024-07-23 22:21:32 +00005793}
5794
5795
5796static void wpa_group_setkeys(struct wpa_authenticator *wpa_auth,
5797 struct wpa_group *group)
5798{
5799 wpa_printf(MSG_DEBUG,
5800 "WPA: group state machine entering state SETKEYS (VLAN-ID %d)",
5801 group->vlan_id);
5802 group->changed = true;
5803 group->wpa_group_state = WPA_GROUP_SETKEYS;
5804 group->GTKReKey = false;
5805
5806#ifdef CONFIG_IEEE80211BE
5807 if (wpa_auth->is_ml)
5808 goto skip_update;
5809#endif /* CONFIG_IEEE80211BE */
5810
5811 wpa_group_update_gtk(wpa_auth, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005812
5813 if (group->GKeyDoneStations) {
Hai Shalomfdcde762020-04-02 11:19:20 -07005814 wpa_printf(MSG_DEBUG,
5815 "wpa_group_setkeys: Unexpected GKeyDoneStations=%d when starting new GTK rekey",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005816 group->GKeyDoneStations);
5817 group->GKeyDoneStations = 0;
5818 }
Sunil Ravi7f769292024-07-23 22:21:32 +00005819
5820#ifdef CONFIG_IEEE80211BE
5821skip_update:
5822#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005823 wpa_auth_for_each_sta(wpa_auth, wpa_group_update_sta, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005824 wpa_printf(MSG_DEBUG, "wpa_group_setkeys: GKeyDoneStations=%d",
5825 group->GKeyDoneStations);
5826}
5827
5828
5829static int wpa_group_config_group_keys(struct wpa_authenticator *wpa_auth,
5830 struct wpa_group *group)
5831{
Hai Shalomfdcde762020-04-02 11:19:20 -07005832 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005833 int ret = 0;
5834
5835 if (wpa_auth_set_key(wpa_auth, group->vlan_id,
Hai Shalomfdcde762020-04-02 11:19:20 -07005836 wpa_cipher_to_alg(conf->wpa_group),
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005837 broadcast_ether_addr, group->GN,
Hai Shalomfdcde762020-04-02 11:19:20 -07005838 group->GTK[group->GN - 1], group->GTK_len,
5839 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005840 ret = -1;
5841
Hai Shalomfdcde762020-04-02 11:19:20 -07005842 if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005843 enum wpa_alg alg;
5844 size_t len;
5845
Hai Shalomfdcde762020-04-02 11:19:20 -07005846 alg = wpa_cipher_to_alg(conf->group_mgmt_cipher);
5847 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005848
5849 if (ret == 0 &&
5850 wpa_auth_set_key(wpa_auth, group->vlan_id, alg,
5851 broadcast_ether_addr, group->GN_igtk,
Hai Shalomfdcde762020-04-02 11:19:20 -07005852 group->IGTK[group->GN_igtk - 4], len,
5853 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
5854 ret = -1;
5855
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005856 if (ret || !conf->beacon_prot)
5857 return ret;
5858 if (wpa_auth->conf.tx_bss_auth) {
5859 wpa_auth = wpa_auth->conf.tx_bss_auth;
5860 group = wpa_auth->group;
5861 if (!group->bigtk_set || group->bigtk_configured)
5862 return ret;
5863 }
5864 if (wpa_auth_set_key(wpa_auth, group->vlan_id, alg,
Hai Shalomfdcde762020-04-02 11:19:20 -07005865 broadcast_ether_addr, group->GN_bigtk,
5866 group->BIGTK[group->GN_bigtk - 6], len,
5867 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005868 ret = -1;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005869 else
5870 group->bigtk_configured = true;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005871 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005872
5873 return ret;
5874}
5875
5876
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005877static int wpa_group_disconnect_cb(struct wpa_state_machine *sm, void *ctx)
5878{
5879 if (sm->group == ctx) {
5880 wpa_printf(MSG_DEBUG, "WPA: Mark STA " MACSTR
Hai Shalomfdcde762020-04-02 11:19:20 -07005881 " for disconnection due to fatal failure",
Sunil Raviaf8751c2023-03-29 11:35:17 -07005882 MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -07005883 sm->Disconnect = true;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005884 }
5885
5886 return 0;
5887}
5888
5889
5890static void wpa_group_fatal_failure(struct wpa_authenticator *wpa_auth,
5891 struct wpa_group *group)
5892{
Hai Shalomfdcde762020-04-02 11:19:20 -07005893 wpa_printf(MSG_DEBUG,
5894 "WPA: group state machine entering state FATAL_FAILURE");
Hai Shalome21d4e82020-04-29 16:34:06 -07005895 group->changed = true;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005896 group->wpa_group_state = WPA_GROUP_FATAL_FAILURE;
5897 wpa_auth_for_each_sta(wpa_auth, wpa_group_disconnect_cb, group);
5898}
5899
5900
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005901static int wpa_group_setkeysdone(struct wpa_authenticator *wpa_auth,
5902 struct wpa_group *group)
5903{
Hai Shalomfdcde762020-04-02 11:19:20 -07005904 wpa_printf(MSG_DEBUG,
5905 "WPA: group state machine entering state SETKEYSDONE (VLAN-ID %d)",
5906 group->vlan_id);
Hai Shalome21d4e82020-04-29 16:34:06 -07005907 group->changed = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005908 group->wpa_group_state = WPA_GROUP_SETKEYSDONE;
5909
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005910 if (wpa_group_config_group_keys(wpa_auth, group) < 0) {
5911 wpa_group_fatal_failure(wpa_auth, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005912 return -1;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005913 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005914
5915 return 0;
5916}
5917
5918
5919static void wpa_group_sm_step(struct wpa_authenticator *wpa_auth,
5920 struct wpa_group *group)
5921{
5922 if (group->GInit) {
5923 wpa_group_gtk_init(wpa_auth, group);
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005924 } else if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE) {
5925 /* Do not allow group operations */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005926 } else if (group->wpa_group_state == WPA_GROUP_GTK_INIT &&
5927 group->GTKAuthenticator) {
5928 wpa_group_setkeysdone(wpa_auth, group);
5929 } else if (group->wpa_group_state == WPA_GROUP_SETKEYSDONE &&
5930 group->GTKReKey) {
5931 wpa_group_setkeys(wpa_auth, group);
5932 } else if (group->wpa_group_state == WPA_GROUP_SETKEYS) {
5933 if (group->GKeyDoneStations == 0)
5934 wpa_group_setkeysdone(wpa_auth, group);
5935 else if (group->GTKReKey)
5936 wpa_group_setkeys(wpa_auth, group);
5937 }
5938}
5939
5940
Sunil Ravi7f769292024-07-23 22:21:32 +00005941static void wpa_clear_changed(struct wpa_state_machine *sm)
5942{
5943#ifdef CONFIG_IEEE80211BE
5944 int link_id;
5945#endif /* CONFIG_IEEE80211BE */
5946
5947 sm->changed = false;
5948 sm->wpa_auth->group->changed = false;
5949
5950#ifdef CONFIG_IEEE80211BE
5951 for_each_sm_auth(sm, link_id)
5952 sm->mld_links[link_id].wpa_auth->group->changed = false;
5953#endif /* CONFIG_IEEE80211BE */
5954}
5955
5956
5957static void wpa_group_sm_step_links(struct wpa_state_machine *sm)
5958{
5959#ifdef CONFIG_IEEE80211BE
5960 int link_id;
5961#endif /* CONFIG_IEEE80211BE */
5962
5963 if (!sm || !sm->wpa_auth)
5964 return;
5965 wpa_group_sm_step(sm->wpa_auth, sm->wpa_auth->group);
5966
5967#ifdef CONFIG_IEEE80211BE
5968 for_each_sm_auth(sm, link_id) {
5969 wpa_group_sm_step(sm->mld_links[link_id].wpa_auth,
5970 sm->mld_links[link_id].wpa_auth->group);
5971 }
5972#endif /* CONFIG_IEEE80211BE */
5973}
5974
5975
5976static bool wpa_group_sm_changed(struct wpa_state_machine *sm)
5977{
5978#ifdef CONFIG_IEEE80211BE
5979 int link_id;
5980#endif /* CONFIG_IEEE80211BE */
5981 bool changed;
5982
5983 if (!sm || !sm->wpa_auth)
5984 return false;
5985 changed = sm->wpa_auth->group->changed;
5986
5987#ifdef CONFIG_IEEE80211BE
5988 for_each_sm_auth(sm, link_id)
5989 changed |= sm->mld_links[link_id].wpa_auth->group->changed;
5990#endif /* CONFIG_IEEE80211BE */
5991
5992 return changed;
5993}
5994
5995
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005996static int wpa_sm_step(struct wpa_state_machine *sm)
5997{
Hai Shalomfdcde762020-04-02 11:19:20 -07005998 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005999 return 0;
6000
6001 if (sm->in_step_loop) {
6002 /* This should not happen, but if it does, make sure we do not
6003 * end up freeing the state machine too early by exiting the
6004 * recursive call. */
6005 wpa_printf(MSG_ERROR, "WPA: wpa_sm_step() called recursively");
6006 return 0;
6007 }
6008
6009 sm->in_step_loop = 1;
6010 do {
6011 if (sm->pending_deinit)
6012 break;
6013
Sunil Ravi7f769292024-07-23 22:21:32 +00006014 wpa_clear_changed(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006015
6016 SM_STEP_RUN(WPA_PTK);
6017 if (sm->pending_deinit)
6018 break;
6019 SM_STEP_RUN(WPA_PTK_GROUP);
6020 if (sm->pending_deinit)
6021 break;
Sunil Ravi7f769292024-07-23 22:21:32 +00006022 wpa_group_sm_step_links(sm);
6023 } while (sm->changed || wpa_group_sm_changed(sm));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006024 sm->in_step_loop = 0;
6025
6026 if (sm->pending_deinit) {
Hai Shalomfdcde762020-04-02 11:19:20 -07006027 wpa_printf(MSG_DEBUG,
6028 "WPA: Completing pending STA state machine deinit for "
Sunil Raviaf8751c2023-03-29 11:35:17 -07006029 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006030 wpa_free_sta_sm(sm);
6031 return 1;
6032 }
6033 return 0;
6034}
6035
6036
6037static void wpa_sm_call_step(void *eloop_ctx, void *timeout_ctx)
6038{
6039 struct wpa_state_machine *sm = eloop_ctx;
6040 wpa_sm_step(sm);
6041}
6042
6043
6044void wpa_auth_sm_notify(struct wpa_state_machine *sm)
6045{
Hai Shalomfdcde762020-04-02 11:19:20 -07006046 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006047 return;
6048 eloop_register_timeout(0, 0, wpa_sm_call_step, sm, NULL);
6049}
6050
6051
6052void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth)
6053{
6054 int tmp, i;
6055 struct wpa_group *group;
6056
Hai Shalomfdcde762020-04-02 11:19:20 -07006057 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006058 return;
6059
6060 group = wpa_auth->group;
6061
6062 for (i = 0; i < 2; i++) {
6063 tmp = group->GM;
6064 group->GM = group->GN;
6065 group->GN = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006066 tmp = group->GM_igtk;
6067 group->GM_igtk = group->GN_igtk;
6068 group->GN_igtk = tmp;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006069 if (!wpa_auth->conf.tx_bss_auth) {
6070 tmp = group->GM_bigtk;
6071 group->GM_bigtk = group->GN_bigtk;
6072 group->GN_bigtk = tmp;
6073 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006074 wpa_gtk_update(wpa_auth, group);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08006075 wpa_group_config_group_keys(wpa_auth, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006076 }
6077}
6078
6079
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006080static const char * wpa_bool_txt(int val)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006081{
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006082 return val ? "TRUE" : "FALSE";
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006083}
6084
6085
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006086#define RSN_SUITE "%02x-%02x-%02x-%d"
6087#define RSN_SUITE_ARG(s) \
6088((s) >> 24) & 0xff, ((s) >> 16) & 0xff, ((s) >> 8) & 0xff, (s) & 0xff
6089
6090int wpa_get_mib(struct wpa_authenticator *wpa_auth, char *buf, size_t buflen)
6091{
Hai Shalomfdcde762020-04-02 11:19:20 -07006092 struct wpa_auth_config *conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006093 int len = 0, ret;
6094 char pmkid_txt[PMKID_LEN * 2 + 1];
6095#ifdef CONFIG_RSN_PREAUTH
6096 const int preauth = 1;
6097#else /* CONFIG_RSN_PREAUTH */
6098 const int preauth = 0;
6099#endif /* CONFIG_RSN_PREAUTH */
6100
Hai Shalomfdcde762020-04-02 11:19:20 -07006101 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006102 return len;
Hai Shalomfdcde762020-04-02 11:19:20 -07006103 conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006104
6105 ret = os_snprintf(buf + len, buflen - len,
6106 "dot11RSNAOptionImplemented=TRUE\n"
6107 "dot11RSNAPreauthenticationImplemented=%s\n"
6108 "dot11RSNAEnabled=%s\n"
6109 "dot11RSNAPreauthenticationEnabled=%s\n",
6110 wpa_bool_txt(preauth),
Hai Shalomfdcde762020-04-02 11:19:20 -07006111 wpa_bool_txt(conf->wpa & WPA_PROTO_RSN),
6112 wpa_bool_txt(conf->rsn_preauth));
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006113 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006114 return len;
6115 len += ret;
6116
6117 wpa_snprintf_hex(pmkid_txt, sizeof(pmkid_txt),
6118 wpa_auth->dot11RSNAPMKIDUsed, PMKID_LEN);
6119
6120 ret = os_snprintf(
6121 buf + len, buflen - len,
6122 "dot11RSNAConfigVersion=%u\n"
6123 "dot11RSNAConfigPairwiseKeysSupported=9999\n"
6124 /* FIX: dot11RSNAConfigGroupCipher */
6125 /* FIX: dot11RSNAConfigGroupRekeyMethod */
6126 /* FIX: dot11RSNAConfigGroupRekeyTime */
6127 /* FIX: dot11RSNAConfigGroupRekeyPackets */
6128 "dot11RSNAConfigGroupRekeyStrict=%u\n"
6129 "dot11RSNAConfigGroupUpdateCount=%u\n"
6130 "dot11RSNAConfigPairwiseUpdateCount=%u\n"
6131 "dot11RSNAConfigGroupCipherSize=%u\n"
6132 "dot11RSNAConfigPMKLifetime=%u\n"
6133 "dot11RSNAConfigPMKReauthThreshold=%u\n"
6134 "dot11RSNAConfigNumberOfPTKSAReplayCounters=0\n"
6135 "dot11RSNAConfigSATimeout=%u\n"
6136 "dot11RSNAAuthenticationSuiteSelected=" RSN_SUITE "\n"
6137 "dot11RSNAPairwiseCipherSelected=" RSN_SUITE "\n"
6138 "dot11RSNAGroupCipherSelected=" RSN_SUITE "\n"
6139 "dot11RSNAPMKIDUsed=%s\n"
6140 "dot11RSNAAuthenticationSuiteRequested=" RSN_SUITE "\n"
6141 "dot11RSNAPairwiseCipherRequested=" RSN_SUITE "\n"
6142 "dot11RSNAGroupCipherRequested=" RSN_SUITE "\n"
6143 "dot11RSNATKIPCounterMeasuresInvoked=%u\n"
6144 "dot11RSNA4WayHandshakeFailures=%u\n"
6145 "dot11RSNAConfigNumberOfGTKSAReplayCounters=0\n",
6146 RSN_VERSION,
Hai Shalomfdcde762020-04-02 11:19:20 -07006147 !!conf->wpa_strict_rekey,
6148 conf->wpa_group_update_count,
6149 conf->wpa_pairwise_update_count,
6150 wpa_cipher_key_len(conf->wpa_group) * 8,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006151 dot11RSNAConfigPMKLifetime,
6152 dot11RSNAConfigPMKReauthThreshold,
6153 dot11RSNAConfigSATimeout,
6154 RSN_SUITE_ARG(wpa_auth->dot11RSNAAuthenticationSuiteSelected),
6155 RSN_SUITE_ARG(wpa_auth->dot11RSNAPairwiseCipherSelected),
6156 RSN_SUITE_ARG(wpa_auth->dot11RSNAGroupCipherSelected),
6157 pmkid_txt,
6158 RSN_SUITE_ARG(wpa_auth->dot11RSNAAuthenticationSuiteRequested),
6159 RSN_SUITE_ARG(wpa_auth->dot11RSNAPairwiseCipherRequested),
6160 RSN_SUITE_ARG(wpa_auth->dot11RSNAGroupCipherRequested),
6161 wpa_auth->dot11RSNATKIPCounterMeasuresInvoked,
6162 wpa_auth->dot11RSNA4WayHandshakeFailures);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006163 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006164 return len;
6165 len += ret;
6166
6167 /* TODO: dot11RSNAConfigPairwiseCiphersTable */
6168 /* TODO: dot11RSNAConfigAuthenticationSuitesTable */
6169
6170 /* Private MIB */
6171 ret = os_snprintf(buf + len, buflen - len, "hostapdWPAGroupState=%d\n",
6172 wpa_auth->group->wpa_group_state);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006173 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006174 return len;
6175 len += ret;
6176
6177 return len;
6178}
6179
6180
6181int wpa_get_mib_sta(struct wpa_state_machine *sm, char *buf, size_t buflen)
6182{
6183 int len = 0, ret;
6184 u32 pairwise = 0;
6185
Hai Shalomfdcde762020-04-02 11:19:20 -07006186 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006187 return 0;
6188
6189 /* TODO: FF-FF-FF-FF-FF-FF entry for broadcast/multicast stats */
6190
6191 /* dot11RSNAStatsEntry */
6192
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -07006193 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
6194 WPA_PROTO_RSN : WPA_PROTO_WPA,
6195 sm->pairwise);
6196 if (pairwise == 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006197 return 0;
6198
6199 ret = os_snprintf(
6200 buf + len, buflen - len,
6201 /* TODO: dot11RSNAStatsIndex */
6202 "dot11RSNAStatsSTAAddress=" MACSTR "\n"
6203 "dot11RSNAStatsVersion=1\n"
6204 "dot11RSNAStatsSelectedPairwiseCipher=" RSN_SUITE "\n"
6205 /* TODO: dot11RSNAStatsTKIPICVErrors */
6206 "dot11RSNAStatsTKIPLocalMICFailures=%u\n"
6207 "dot11RSNAStatsTKIPRemoteMICFailures=%u\n"
6208 /* TODO: dot11RSNAStatsCCMPReplays */
6209 /* TODO: dot11RSNAStatsCCMPDecryptErrors */
6210 /* TODO: dot11RSNAStatsTKIPReplays */,
6211 MAC2STR(sm->addr),
6212 RSN_SUITE_ARG(pairwise),
6213 sm->dot11RSNAStatsTKIPLocalMICFailures,
6214 sm->dot11RSNAStatsTKIPRemoteMICFailures);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006215 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006216 return len;
6217 len += ret;
6218
6219 /* Private MIB */
6220 ret = os_snprintf(buf + len, buflen - len,
Hai Shalomc3565922019-10-28 11:58:20 -07006221 "wpa=%d\n"
6222 "AKMSuiteSelector=" RSN_SUITE "\n"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006223 "hostapdWPAPTKState=%d\n"
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006224 "hostapdWPAPTKGroupState=%d\n"
6225 "hostapdMFPR=%d\n",
Hai Shalomc3565922019-10-28 11:58:20 -07006226 sm->wpa,
6227 RSN_SUITE_ARG(wpa_akm_to_suite(sm->wpa_key_mgmt)),
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006228 sm->wpa_ptk_state,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006229 sm->wpa_ptk_group_state,
6230 sm->mfpr);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006231 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006232 return len;
6233 len += ret;
6234
6235 return len;
6236}
6237
6238
6239void wpa_auth_countermeasures_start(struct wpa_authenticator *wpa_auth)
6240{
6241 if (wpa_auth)
6242 wpa_auth->dot11RSNATKIPCounterMeasuresInvoked++;
6243}
6244
6245
6246int wpa_auth_pairwise_set(struct wpa_state_machine *sm)
6247{
6248 return sm && sm->pairwise_set;
6249}
6250
6251
6252int wpa_auth_get_pairwise(struct wpa_state_machine *sm)
6253{
6254 return sm->pairwise;
6255}
6256
6257
Hai Shalom74f70d42019-02-11 14:42:39 -08006258const u8 * wpa_auth_get_pmk(struct wpa_state_machine *sm, int *len)
6259{
6260 if (!sm)
6261 return NULL;
6262 *len = sm->pmk_len;
6263 return sm->PMK;
6264}
6265
6266
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006267const u8 * wpa_auth_get_dpp_pkhash(struct wpa_state_machine *sm)
6268{
6269 if (!sm || !sm->pmksa)
6270 return NULL;
6271 return sm->pmksa->dpp_pkhash;
6272}
6273
6274
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006275int wpa_auth_sta_key_mgmt(struct wpa_state_machine *sm)
6276{
Hai Shalomfdcde762020-04-02 11:19:20 -07006277 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006278 return -1;
6279 return sm->wpa_key_mgmt;
6280}
6281
6282
6283int wpa_auth_sta_wpa_version(struct wpa_state_machine *sm)
6284{
Hai Shalomfdcde762020-04-02 11:19:20 -07006285 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006286 return 0;
6287 return sm->wpa;
6288}
6289
6290
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02006291int wpa_auth_sta_ft_tk_already_set(struct wpa_state_machine *sm)
6292{
6293 if (!sm || !wpa_key_mgmt_ft(sm->wpa_key_mgmt))
6294 return 0;
6295 return sm->tk_already_set;
6296}
6297
6298
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006299int wpa_auth_sta_fils_tk_already_set(struct wpa_state_machine *sm)
6300{
6301 if (!sm || !wpa_key_mgmt_fils(sm->wpa_key_mgmt))
6302 return 0;
6303 return sm->tk_already_set;
6304}
6305
6306
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006307int wpa_auth_sta_clear_pmksa(struct wpa_state_machine *sm,
6308 struct rsn_pmksa_cache_entry *entry)
6309{
Hai Shalomfdcde762020-04-02 11:19:20 -07006310 if (!sm || sm->pmksa != entry)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006311 return -1;
6312 sm->pmksa = NULL;
6313 return 0;
6314}
6315
6316
6317struct rsn_pmksa_cache_entry *
6318wpa_auth_sta_get_pmksa(struct wpa_state_machine *sm)
6319{
6320 return sm ? sm->pmksa : NULL;
6321}
6322
6323
6324void wpa_auth_sta_local_mic_failure_report(struct wpa_state_machine *sm)
6325{
6326 if (sm)
6327 sm->dot11RSNAStatsTKIPLocalMICFailures++;
6328}
6329
6330
6331const u8 * wpa_auth_get_wpa_ie(struct wpa_authenticator *wpa_auth, size_t *len)
6332{
Hai Shalomfdcde762020-04-02 11:19:20 -07006333 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006334 return NULL;
6335 *len = wpa_auth->wpa_ie_len;
6336 return wpa_auth->wpa_ie;
6337}
6338
6339
6340int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006341 unsigned int pmk_len,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006342 int session_timeout, struct eapol_state_machine *eapol)
6343{
Hai Shalomfdcde762020-04-02 11:19:20 -07006344 if (!sm || sm->wpa != WPA_VERSION_WPA2 ||
Dmitry Shmidtc55524a2011-07-07 11:18:38 -07006345 sm->wpa_auth->conf.disable_pmksa_caching)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006346 return -1;
6347
Hai Shalom81f62d82019-07-22 12:10:00 -07006348#ifdef CONFIG_IEEE80211R_AP
6349 if (pmk_len >= 2 * PMK_LEN && wpa_key_mgmt_ft(sm->wpa_key_mgmt) &&
6350 wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) &&
6351 !wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
6352 /* Cache MPMK/XXKey instead of initial part from MSK */
6353 pmk = pmk + PMK_LEN;
6354 pmk_len = PMK_LEN;
6355 } else
6356#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08006357 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006358 if (pmk_len > PMK_LEN_SUITE_B_192)
6359 pmk_len = PMK_LEN_SUITE_B_192;
6360 } else if (pmk_len > PMK_LEN) {
6361 pmk_len = PMK_LEN;
6362 }
6363
Hai Shalom81f62d82019-07-22 12:10:00 -07006364 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK", pmk, pmk_len);
Dmitry Shmidt57c2d392016-02-23 13:40:19 -08006365 if (pmksa_cache_auth_add(sm->wpa_auth->pmksa, pmk, pmk_len, NULL,
Dmitry Shmidt807291d2015-01-27 13:40:23 -08006366 sm->PTK.kck, sm->PTK.kck_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07006367 wpa_auth_get_aa(sm),
6368 wpa_auth_get_spa(sm), session_timeout,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006369 eapol, sm->wpa_key_mgmt))
6370 return 0;
6371
6372 return -1;
6373}
6374
6375
6376int wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth,
6377 const u8 *pmk, size_t len, const u8 *sta_addr,
6378 int session_timeout,
6379 struct eapol_state_machine *eapol)
6380{
Hai Shalomfdcde762020-04-02 11:19:20 -07006381 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006382 return -1;
6383
Hai Shalom81f62d82019-07-22 12:10:00 -07006384 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from preauth", pmk, len);
Dmitry Shmidt57c2d392016-02-23 13:40:19 -08006385 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, len, NULL,
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006386 NULL, 0,
6387 wpa_auth->addr,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006388 sta_addr, session_timeout, eapol,
6389 WPA_KEY_MGMT_IEEE8021X))
6390 return 0;
6391
6392 return -1;
6393}
6394
6395
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006396int wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr,
Sunil Ravi89eba102022-09-13 21:04:37 -07006397 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
6398 int akmp)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006399{
6400 if (wpa_auth->conf.disable_pmksa_caching)
6401 return -1;
6402
Sunil Ravi89eba102022-09-13 21:04:37 -07006403 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from SAE", pmk, pmk_len);
6404 if (!akmp)
6405 akmp = WPA_KEY_MGMT_SAE;
6406 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, pmk_len, pmkid,
6407 NULL, 0, wpa_auth->addr, addr, 0, NULL, akmp))
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08006408 return 0;
6409
6410 return -1;
6411}
6412
6413
Roshan Pius3a1667e2018-07-03 15:17:14 -07006414void wpa_auth_add_sae_pmkid(struct wpa_state_machine *sm, const u8 *pmkid)
6415{
6416 os_memcpy(sm->pmkid, pmkid, PMKID_LEN);
6417 sm->pmkid_set = 1;
6418}
6419
6420
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006421int wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr,
6422 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006423 int session_timeout, int akmp, const u8 *dpp_pkhash)
6424{
6425 struct rsn_pmksa_cache_entry *entry;
6426
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006427 if (!wpa_auth || wpa_auth->conf.disable_pmksa_caching)
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006428 return -1;
6429
6430 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK (3)", pmk, PMK_LEN);
6431 entry = pmksa_cache_auth_add(wpa_auth->pmksa, pmk, pmk_len, pmkid,
6432 NULL, 0, wpa_auth->addr, addr, session_timeout,
6433 NULL, akmp);
6434 if (!entry)
6435 return -1;
6436
6437 if (dpp_pkhash)
6438 entry->dpp_pkhash = os_memdup(dpp_pkhash, SHA256_MAC_LEN);
6439
6440 return 0;
6441}
6442
6443
Dmitry Shmidtf7e0a992013-05-23 11:03:10 -07006444void wpa_auth_pmksa_remove(struct wpa_authenticator *wpa_auth,
6445 const u8 *sta_addr)
6446{
6447 struct rsn_pmksa_cache_entry *pmksa;
6448
Hai Shalomfdcde762020-04-02 11:19:20 -07006449 if (!wpa_auth || !wpa_auth->pmksa)
Dmitry Shmidtf7e0a992013-05-23 11:03:10 -07006450 return;
6451 pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sta_addr, NULL);
6452 if (pmksa) {
6453 wpa_printf(MSG_DEBUG, "WPA: Remove PMKSA cache entry for "
6454 MACSTR " based on request", MAC2STR(sta_addr));
6455 pmksa_cache_free_entry(wpa_auth->pmksa, pmksa);
6456 }
6457}
6458
6459
Dmitry Shmidte4663042016-04-04 10:07:49 -07006460int wpa_auth_pmksa_list(struct wpa_authenticator *wpa_auth, char *buf,
6461 size_t len)
6462{
6463 if (!wpa_auth || !wpa_auth->pmksa)
6464 return 0;
6465 return pmksa_cache_auth_list(wpa_auth->pmksa, buf, len);
6466}
6467
6468
6469void wpa_auth_pmksa_flush(struct wpa_authenticator *wpa_auth)
6470{
6471 if (wpa_auth && wpa_auth->pmksa)
6472 pmksa_cache_auth_flush(wpa_auth->pmksa);
6473}
6474
6475
Paul Stewart092955c2017-02-06 09:13:09 -08006476#ifdef CONFIG_PMKSA_CACHE_EXTERNAL
6477#ifdef CONFIG_MESH
6478
6479int wpa_auth_pmksa_list_mesh(struct wpa_authenticator *wpa_auth, const u8 *addr,
6480 char *buf, size_t len)
6481{
6482 if (!wpa_auth || !wpa_auth->pmksa)
6483 return 0;
6484
6485 return pmksa_cache_auth_list_mesh(wpa_auth->pmksa, addr, buf, len);
6486}
6487
6488
6489struct rsn_pmksa_cache_entry *
6490wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
Sunil Ravi89eba102022-09-13 21:04:37 -07006491 size_t pmk_len, int akmp,
Paul Stewart092955c2017-02-06 09:13:09 -08006492 const u8 *pmkid, int expiration)
6493{
6494 struct rsn_pmksa_cache_entry *entry;
6495 struct os_reltime now;
6496
Sunil Ravi89eba102022-09-13 21:04:37 -07006497 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, NULL, 0, aa,
6498 spa, 0, NULL, akmp);
Paul Stewart092955c2017-02-06 09:13:09 -08006499 if (!entry)
6500 return NULL;
6501
6502 os_get_reltime(&now);
6503 entry->expiration = now.sec + expiration;
6504 return entry;
6505}
6506
6507
6508int wpa_auth_pmksa_add_entry(struct wpa_authenticator *wpa_auth,
6509 struct rsn_pmksa_cache_entry *entry)
6510{
6511 int ret;
6512
6513 if (!wpa_auth || !wpa_auth->pmksa)
6514 return -1;
6515
6516 ret = pmksa_cache_auth_add_entry(wpa_auth->pmksa, entry);
6517 if (ret < 0)
6518 wpa_printf(MSG_DEBUG,
6519 "RSN: Failed to store external PMKSA cache for "
6520 MACSTR, MAC2STR(entry->spa));
6521
6522 return ret;
6523}
6524
6525#endif /* CONFIG_MESH */
6526#endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
6527
6528
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006529struct rsn_pmksa_cache *
6530wpa_auth_get_pmksa_cache(struct wpa_authenticator *wpa_auth)
6531{
6532 if (!wpa_auth || !wpa_auth->pmksa)
6533 return NULL;
6534 return wpa_auth->pmksa;
6535}
6536
6537
Dmitry Shmidte4663042016-04-04 10:07:49 -07006538struct rsn_pmksa_cache_entry *
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08006539wpa_auth_pmksa_get(struct wpa_authenticator *wpa_auth, const u8 *sta_addr,
6540 const u8 *pmkid)
Dmitry Shmidte4663042016-04-04 10:07:49 -07006541{
6542 if (!wpa_auth || !wpa_auth->pmksa)
6543 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08006544 return pmksa_cache_auth_get(wpa_auth->pmksa, sta_addr, pmkid);
Dmitry Shmidte4663042016-04-04 10:07:49 -07006545}
6546
6547
6548void wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa,
6549 struct wpa_state_machine *sm,
6550 struct wpa_authenticator *wpa_auth,
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006551 u8 *pmkid, u8 *pmk, size_t *pmk_len)
Dmitry Shmidte4663042016-04-04 10:07:49 -07006552{
6553 if (!sm)
6554 return;
6555
6556 sm->pmksa = pmksa;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006557 os_memcpy(pmk, pmksa->pmk, pmksa->pmk_len);
6558 *pmk_len = pmksa->pmk_len;
Dmitry Shmidte4663042016-04-04 10:07:49 -07006559 os_memcpy(pmkid, pmksa->pmkid, PMKID_LEN);
6560 os_memcpy(wpa_auth->dot11RSNAPMKIDUsed, pmksa->pmkid, PMKID_LEN);
6561}
6562
6563
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006564/*
6565 * Remove and free the group from wpa_authenticator. This is triggered by a
6566 * callback to make sure nobody is currently iterating the group list while it
6567 * gets modified.
6568 */
6569static void wpa_group_free(struct wpa_authenticator *wpa_auth,
6570 struct wpa_group *group)
6571{
6572 struct wpa_group *prev = wpa_auth->group;
6573
6574 wpa_printf(MSG_DEBUG, "WPA: Remove group state machine for VLAN-ID %d",
6575 group->vlan_id);
6576
6577 while (prev) {
6578 if (prev->next == group) {
6579 /* This never frees the special first group as needed */
6580 prev->next = group->next;
6581 os_free(group);
6582 break;
6583 }
6584 prev = prev->next;
6585 }
6586
6587}
6588
6589
6590/* Increase the reference counter for group */
6591static void wpa_group_get(struct wpa_authenticator *wpa_auth,
6592 struct wpa_group *group)
6593{
6594 /* Skip the special first group */
6595 if (wpa_auth->group == group)
6596 return;
6597
6598 group->references++;
6599}
6600
6601
6602/* Decrease the reference counter and maybe free the group */
6603static void wpa_group_put(struct wpa_authenticator *wpa_auth,
6604 struct wpa_group *group)
6605{
6606 /* Skip the special first group */
6607 if (wpa_auth->group == group)
6608 return;
6609
6610 group->references--;
6611 if (group->references)
6612 return;
6613 wpa_group_free(wpa_auth, group);
6614}
6615
6616
6617/*
6618 * Add a group that has its references counter set to zero. Caller needs to
6619 * call wpa_group_get() on the return value to mark the entry in use.
6620 */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006621static struct wpa_group *
6622wpa_auth_add_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6623{
6624 struct wpa_group *group;
6625
Hai Shalomfdcde762020-04-02 11:19:20 -07006626 if (!wpa_auth || !wpa_auth->group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006627 return NULL;
6628
6629 wpa_printf(MSG_DEBUG, "WPA: Add group state machine for VLAN-ID %d",
6630 vlan_id);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08006631 group = wpa_group_init(wpa_auth, vlan_id, 0);
Hai Shalomfdcde762020-04-02 11:19:20 -07006632 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006633 return NULL;
6634
6635 group->next = wpa_auth->group->next;
6636 wpa_auth->group->next = group;
6637
6638 return group;
6639}
6640
6641
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006642/*
6643 * Enforce that the group state machine for the VLAN is running, increase
6644 * reference counter as interface is up. References might have been increased
6645 * even if a negative value is returned.
6646 * Returns: -1 on error (group missing, group already failed); otherwise, 0
6647 */
6648int wpa_auth_ensure_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6649{
6650 struct wpa_group *group;
6651
Hai Shalomfdcde762020-04-02 11:19:20 -07006652 if (!wpa_auth)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006653 return 0;
6654
6655 group = wpa_auth->group;
6656 while (group) {
6657 if (group->vlan_id == vlan_id)
6658 break;
6659 group = group->next;
6660 }
6661
Hai Shalomfdcde762020-04-02 11:19:20 -07006662 if (!group) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006663 group = wpa_auth_add_group(wpa_auth, vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07006664 if (!group)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006665 return -1;
6666 }
6667
6668 wpa_printf(MSG_DEBUG,
6669 "WPA: Ensure group state machine running for VLAN ID %d",
6670 vlan_id);
6671
6672 wpa_group_get(wpa_auth, group);
6673 group->num_setup_iface++;
6674
6675 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6676 return -1;
6677
6678 return 0;
6679}
6680
6681
6682/*
6683 * Decrease reference counter, expected to be zero afterwards.
6684 * returns: -1 on error (group not found, group in fail state)
6685 * -2 if wpa_group is still referenced
6686 * 0 else
6687 */
6688int wpa_auth_release_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6689{
6690 struct wpa_group *group;
6691 int ret = 0;
6692
Hai Shalomfdcde762020-04-02 11:19:20 -07006693 if (!wpa_auth)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006694 return 0;
6695
6696 group = wpa_auth->group;
6697 while (group) {
6698 if (group->vlan_id == vlan_id)
6699 break;
6700 group = group->next;
6701 }
6702
Hai Shalomfdcde762020-04-02 11:19:20 -07006703 if (!group)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006704 return -1;
6705
6706 wpa_printf(MSG_DEBUG,
6707 "WPA: Try stopping group state machine for VLAN ID %d",
6708 vlan_id);
6709
6710 if (group->num_setup_iface <= 0) {
6711 wpa_printf(MSG_ERROR,
6712 "WPA: wpa_auth_release_group called more often than wpa_auth_ensure_group for VLAN ID %d, skipping.",
6713 vlan_id);
6714 return -1;
6715 }
6716 group->num_setup_iface--;
6717
6718 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6719 ret = -1;
6720
6721 if (group->references > 1) {
6722 wpa_printf(MSG_DEBUG,
6723 "WPA: Cannot stop group state machine for VLAN ID %d as references are still hold",
6724 vlan_id);
6725 ret = -2;
6726 }
6727
6728 wpa_group_put(wpa_auth, group);
6729
6730 return ret;
6731}
6732
6733
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006734int wpa_auth_sta_set_vlan(struct wpa_state_machine *sm, int vlan_id)
6735{
6736 struct wpa_group *group;
6737
Hai Shalomfdcde762020-04-02 11:19:20 -07006738 if (!sm || !sm->wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006739 return 0;
6740
6741 group = sm->wpa_auth->group;
6742 while (group) {
6743 if (group->vlan_id == vlan_id)
6744 break;
6745 group = group->next;
6746 }
6747
Hai Shalomfdcde762020-04-02 11:19:20 -07006748 if (!group) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006749 group = wpa_auth_add_group(sm->wpa_auth, vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07006750 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006751 return -1;
6752 }
6753
6754 if (sm->group == group)
6755 return 0;
6756
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006757 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6758 return -1;
6759
Hai Shalomfdcde762020-04-02 11:19:20 -07006760 wpa_printf(MSG_DEBUG, "WPA: Moving STA " MACSTR
6761 " to use group state machine for VLAN ID %d",
Sunil Raviaf8751c2023-03-29 11:35:17 -07006762 MAC2STR(wpa_auth_get_spa(sm)), vlan_id);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006763
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006764 wpa_group_get(sm->wpa_auth, group);
6765 wpa_group_put(sm->wpa_auth, sm->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006766 sm->group = group;
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006767
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006768 return 0;
6769}
6770
6771
6772void wpa_auth_eapol_key_tx_status(struct wpa_authenticator *wpa_auth,
6773 struct wpa_state_machine *sm, int ack)
6774{
Hai Shalomfdcde762020-04-02 11:19:20 -07006775 if (!wpa_auth || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006776 return;
6777 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key TX status for STA " MACSTR
Sunil Raviaf8751c2023-03-29 11:35:17 -07006778 " ack=%d", MAC2STR(wpa_auth_get_spa(sm)), ack);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006779 if (sm->pending_1_of_4_timeout && ack) {
6780 /*
6781 * Some deployed supplicant implementations update their SNonce
6782 * for each EAPOL-Key 2/4 message even within the same 4-way
6783 * handshake and then fail to use the first SNonce when
6784 * deriving the PTK. This results in unsuccessful 4-way
6785 * handshake whenever the relatively short initial timeout is
6786 * reached and EAPOL-Key 1/4 is retransmitted. Try to work
6787 * around this by increasing the timeout now that we know that
6788 * the station has received the frame.
6789 */
6790 int timeout_ms = eapol_key_timeout_subseq;
Hai Shalomfdcde762020-04-02 11:19:20 -07006791 wpa_printf(MSG_DEBUG,
6792 "WPA: Increase initial EAPOL-Key 1/4 timeout by %u ms because of acknowledged frame",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006793 timeout_ms);
6794 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
6795 eloop_register_timeout(timeout_ms / 1000,
6796 (timeout_ms % 1000) * 1000,
6797 wpa_send_eapol_timeout, wpa_auth, sm);
6798 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006799
6800#ifdef CONFIG_TESTING_OPTIONS
6801 if (sm->eapol_status_cb) {
6802 sm->eapol_status_cb(sm->eapol_status_cb_ctx1,
6803 sm->eapol_status_cb_ctx2);
6804 sm->eapol_status_cb = NULL;
6805 }
6806#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006807}
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08006808
6809
6810int wpa_auth_uses_sae(struct wpa_state_machine *sm)
6811{
Hai Shalomfdcde762020-04-02 11:19:20 -07006812 if (!sm)
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08006813 return 0;
6814 return wpa_key_mgmt_sae(sm->wpa_key_mgmt);
6815}
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006816
6817
6818int wpa_auth_uses_ft_sae(struct wpa_state_machine *sm)
6819{
Hai Shalomfdcde762020-04-02 11:19:20 -07006820 if (!sm)
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006821 return 0;
Sunil Ravi89eba102022-09-13 21:04:37 -07006822 return sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE ||
6823 sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE_EXT_KEY;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006824}
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08006825
6826
6827#ifdef CONFIG_P2P
6828int wpa_auth_get_ip_addr(struct wpa_state_machine *sm, u8 *addr)
6829{
Hai Shalomfdcde762020-04-02 11:19:20 -07006830 if (!sm || WPA_GET_BE32(sm->ip_addr) == 0)
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08006831 return -1;
6832 os_memcpy(addr, sm->ip_addr, 4);
6833 return 0;
6834}
6835#endif /* CONFIG_P2P */
Dmitry Shmidt2f74e362015-01-21 13:19:05 -08006836
6837
6838int wpa_auth_radius_das_disconnect_pmksa(struct wpa_authenticator *wpa_auth,
6839 struct radius_das_attrs *attr)
6840{
6841 return pmksa_cache_auth_radius_das_disconnect(wpa_auth->pmksa, attr);
6842}
Dmitry Shmidt7f656022015-02-25 14:36:37 -08006843
6844
6845void wpa_auth_reconfig_group_keys(struct wpa_authenticator *wpa_auth)
6846{
6847 struct wpa_group *group;
6848
6849 if (!wpa_auth)
6850 return;
6851 for (group = wpa_auth->group; group; group = group->next)
6852 wpa_group_config_group_keys(wpa_auth, group);
6853}
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006854
6855
6856#ifdef CONFIG_FILS
6857
6858struct wpa_auth_fils_iter_data {
6859 struct wpa_authenticator *auth;
6860 const u8 *cache_id;
6861 struct rsn_pmksa_cache_entry *pmksa;
6862 const u8 *spa;
6863 const u8 *pmkid;
6864};
6865
6866
6867static int wpa_auth_fils_iter(struct wpa_authenticator *a, void *ctx)
6868{
6869 struct wpa_auth_fils_iter_data *data = ctx;
6870
6871 if (a == data->auth || !a->conf.fils_cache_id_set ||
6872 os_memcmp(a->conf.fils_cache_id, data->cache_id,
6873 FILS_CACHE_ID_LEN) != 0)
6874 return 0;
6875 data->pmksa = pmksa_cache_auth_get(a->pmksa, data->spa, data->pmkid);
6876 return data->pmksa != NULL;
6877}
6878
6879
6880struct rsn_pmksa_cache_entry *
6881wpa_auth_pmksa_get_fils_cache_id(struct wpa_authenticator *wpa_auth,
6882 const u8 *sta_addr, const u8 *pmkid)
6883{
6884 struct wpa_auth_fils_iter_data idata;
6885
6886 if (!wpa_auth->conf.fils_cache_id_set)
6887 return NULL;
6888 idata.auth = wpa_auth;
6889 idata.cache_id = wpa_auth->conf.fils_cache_id;
6890 idata.pmksa = NULL;
6891 idata.spa = sta_addr;
6892 idata.pmkid = pmkid;
6893 wpa_auth_for_each_auth(wpa_auth, wpa_auth_fils_iter, &idata);
6894 return idata.pmksa;
6895}
6896
6897
6898#ifdef CONFIG_IEEE80211R_AP
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006899int wpa_auth_write_fte(struct wpa_authenticator *wpa_auth,
6900 struct wpa_state_machine *sm,
Roshan Pius3a1667e2018-07-03 15:17:14 -07006901 u8 *buf, size_t len)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006902{
6903 struct wpa_auth_config *conf = &wpa_auth->conf;
6904
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006905 return wpa_write_ftie(conf, sm->wpa_key_mgmt, sm->xxkey_len,
6906 conf->r0_key_holder, conf->r0_key_holder_len,
Hai Shalomfdcde762020-04-02 11:19:20 -07006907 NULL, NULL, buf, len, NULL, 0, 0);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006908}
6909#endif /* CONFIG_IEEE80211R_AP */
6910
6911
6912void wpa_auth_get_fils_aead_params(struct wpa_state_machine *sm,
6913 u8 *fils_anonce, u8 *fils_snonce,
6914 u8 *fils_kek, size_t *fils_kek_len)
6915{
6916 os_memcpy(fils_anonce, sm->ANonce, WPA_NONCE_LEN);
6917 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN);
6918 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN);
6919 *fils_kek_len = sm->PTK.kek_len;
6920}
6921
Hai Shalom81f62d82019-07-22 12:10:00 -07006922
6923void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
6924 size_t pmk_len, const u8 *pmkid)
6925{
6926 os_memcpy(sm->PMK, pmk, pmk_len);
6927 sm->pmk_len = pmk_len;
6928 os_memcpy(sm->pmkid, pmkid, PMKID_LEN);
6929 sm->pmkid_set = 1;
6930}
6931
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006932#endif /* CONFIG_FILS */
6933
6934
Hai Shalom021b0b52019-04-10 11:17:58 -07006935void wpa_auth_set_auth_alg(struct wpa_state_machine *sm, u16 auth_alg)
6936{
6937 if (sm)
6938 sm->auth_alg = auth_alg;
6939}
6940
6941
Sunil Ravi7f769292024-07-23 22:21:32 +00006942void wpa_auth_set_rsn_override(struct wpa_state_machine *sm, bool val)
6943{
6944 if (sm)
6945 sm->rsn_override = val;
6946}
6947
6948
6949void wpa_auth_set_rsn_override_2(struct wpa_state_machine *sm, bool val)
6950{
6951 if (sm)
6952 sm->rsn_override_2 = val;
6953}
6954
6955
Hai Shalom021b0b52019-04-10 11:17:58 -07006956#ifdef CONFIG_DPP2
6957void wpa_auth_set_dpp_z(struct wpa_state_machine *sm, const struct wpabuf *z)
6958{
6959 if (sm) {
6960 wpabuf_clear_free(sm->dpp_z);
6961 sm->dpp_z = z ? wpabuf_dup(z) : NULL;
6962 }
6963}
6964#endif /* CONFIG_DPP2 */
6965
6966
Sunil Ravi7f769292024-07-23 22:21:32 +00006967void wpa_auth_set_ssid_protection(struct wpa_state_machine *sm, bool val)
6968{
6969 if (sm)
6970 sm->ssid_protection = val;
6971}
6972
6973
Hai Shalom899fcc72020-10-19 14:38:18 -07006974void wpa_auth_set_transition_disable(struct wpa_authenticator *wpa_auth,
6975 u8 val)
6976{
6977 if (wpa_auth)
6978 wpa_auth->conf.transition_disable = val;
6979}
6980
6981
Roshan Pius3a1667e2018-07-03 15:17:14 -07006982#ifdef CONFIG_TESTING_OPTIONS
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006983
6984int wpa_auth_resend_m1(struct wpa_state_machine *sm, int change_anonce,
6985 void (*cb)(void *ctx1, void *ctx2),
6986 void *ctx1, void *ctx2)
6987{
6988 const u8 *anonce = sm->ANonce;
6989 u8 anonce_buf[WPA_NONCE_LEN];
6990
6991 if (change_anonce) {
6992 if (random_get_bytes(anonce_buf, WPA_NONCE_LEN))
6993 return -1;
6994 anonce = anonce_buf;
6995 }
6996
Sunil Raviaf8751c2023-03-29 11:35:17 -07006997 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006998 "sending 1/4 msg of 4-Way Handshake (TESTING)");
6999 wpa_send_eapol(sm->wpa_auth, sm,
7000 WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE, NULL,
7001 anonce, NULL, 0, 0, 0);
7002 return 0;
7003}
7004
7005
7006int wpa_auth_resend_m3(struct wpa_state_machine *sm,
7007 void (*cb)(void *ctx1, void *ctx2),
7008 void *ctx1, void *ctx2)
7009{
Roshan Pius3a1667e2018-07-03 15:17:14 -07007010 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos;
Roshan Pius3a1667e2018-07-03 15:17:14 -07007011 u8 *opos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007012 size_t gtk_len, kde_len;
Hai Shalom899fcc72020-10-19 14:38:18 -07007013 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007014 struct wpa_group *gsm = sm->group;
7015 u8 *wpa_ie;
Hai Shalomc3565922019-10-28 11:58:20 -07007016 int wpa_ie_len, secure, gtkidx, encr = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07007017 u8 hdr[2];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007018
7019 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
Hai Shalomfdcde762020-04-02 11:19:20 -07007020 GTK[GN], IGTK, [BIGTK], [FTIE], [TIE * 2])
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007021 */
7022
7023 /* Use 0 RSC */
7024 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
7025 /* If FT is used, wpa_auth->wpa_ie includes both RSNIE and MDIE */
7026 wpa_ie = sm->wpa_auth->wpa_ie;
7027 wpa_ie_len = sm->wpa_auth->wpa_ie_len;
7028 if (sm->wpa == WPA_VERSION_WPA &&
7029 (sm->wpa_auth->conf.wpa & WPA_PROTO_RSN) &&
7030 wpa_ie_len > wpa_ie[1] + 2 && wpa_ie[0] == WLAN_EID_RSN) {
7031 /* WPA-only STA, remove RSN IE and possible MDIE */
7032 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Hai Shalom60840252021-02-19 19:02:11 -08007033 if (wpa_ie[0] == WLAN_EID_RSNX)
7034 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007035 if (wpa_ie[0] == WLAN_EID_MOBILITY_DOMAIN)
7036 wpa_ie = wpa_ie + wpa_ie[1] + 2;
7037 wpa_ie_len = wpa_ie[1] + 2;
7038 }
Sunil Raviaf8751c2023-03-29 11:35:17 -07007039 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007040 "sending 3/4 msg of 4-Way Handshake (TESTING)");
7041 if (sm->wpa == WPA_VERSION_WPA2) {
7042 /* WPA2 send GTK in the 4-way handshake */
7043 secure = 1;
7044 gtk = gsm->GTK[gsm->GN - 1];
7045 gtk_len = gsm->GTK_len;
Hai Shalomc3565922019-10-28 11:58:20 -07007046 gtkidx = gsm->GN;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007047 _rsc = rsc;
7048 encr = 1;
7049 } else {
7050 /* WPA does not include GTK in msg 3/4 */
7051 secure = 0;
7052 gtk = NULL;
7053 gtk_len = 0;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007054 _rsc = NULL;
7055 if (sm->rx_eapol_key_secure) {
7056 /*
7057 * It looks like Windows 7 supplicant tries to use
7058 * Secure bit in msg 2/4 after having reported Michael
7059 * MIC failure and it then rejects the 4-way handshake
7060 * if msg 3/4 does not set Secure bit. Work around this
7061 * by setting the Secure bit here even in the case of
7062 * WPA if the supplicant used it first.
7063 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07007064 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
7065 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07007066 "STA used Secure bit in WPA msg 2/4 - set Secure for 3/4 as workaround");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007067 secure = 1;
7068 }
7069 }
7070
Hai Shalom74f70d42019-02-11 14:42:39 -08007071 kde_len = wpa_ie_len + ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Hai Shalomfdcde762020-04-02 11:19:20 -07007072
7073 if (sm->use_ext_key_id)
7074 kde_len += 2 + RSN_SELECTOR_LEN + 2;
7075
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007076 if (gtk)
7077 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len;
7078#ifdef CONFIG_IEEE80211R_AP
7079 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
7080 kde_len += 2 + PMKID_LEN; /* PMKR1Name into RSN IE */
7081 kde_len += 300; /* FTIE + 2 * TIE */
7082 }
7083#endif /* CONFIG_IEEE80211R_AP */
7084 kde = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07007085 if (!kde)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007086 return -1;
7087
7088 pos = kde;
7089 os_memcpy(pos, wpa_ie, wpa_ie_len);
7090 pos += wpa_ie_len;
7091#ifdef CONFIG_IEEE80211R_AP
7092 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
7093 int res;
7094 size_t elen;
7095
7096 elen = pos - kde;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00007097 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007098 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07007099 wpa_printf(MSG_ERROR,
7100 "FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007101 os_free(kde);
7102 return -1;
7103 }
7104 pos -= wpa_ie_len;
7105 pos += elen;
7106 }
7107#endif /* CONFIG_IEEE80211R_AP */
Hai Shalomfdcde762020-04-02 11:19:20 -07007108 hdr[1] = 0;
7109
7110 if (sm->use_ext_key_id) {
7111 hdr[0] = sm->keyidx_active & 0x01;
7112 pos = wpa_add_kde(pos, RSN_KEY_DATA_KEYID, hdr, 2, NULL, 0);
7113 }
7114
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007115 if (gtk) {
Hai Shalomc3565922019-10-28 11:58:20 -07007116 hdr[0] = gtkidx & 0x03;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007117 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
7118 gtk, gtk_len);
7119 }
7120 opos = pos;
7121 pos = ieee80211w_kde_add(sm, pos);
Roshan Pius3a1667e2018-07-03 15:17:14 -07007122 if (pos - opos >= 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN) {
7123 /* skip KDE header and keyid */
7124 opos += 2 + RSN_SELECTOR_LEN + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007125 os_memset(opos, 0, 6); /* clear PN */
7126 }
Hai Shalom899fcc72020-10-19 14:38:18 -07007127 if (ocv_oci_add(sm, &pos, conf->oci_freq_override_eapol_m3) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08007128 os_free(kde);
7129 return -1;
7130 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007131
7132#ifdef CONFIG_IEEE80211R_AP
7133 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
7134 int res;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007135
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007136 if (sm->assoc_resp_ftie &&
7137 kde + kde_len - pos >= 2 + sm->assoc_resp_ftie[1]) {
7138 os_memcpy(pos, sm->assoc_resp_ftie,
7139 2 + sm->assoc_resp_ftie[1]);
7140 res = 2 + sm->assoc_resp_ftie[1];
7141 } else {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00007142 res = wpa_write_ftie(conf, sm->wpa_key_mgmt,
7143 sm->xxkey_len,
Roshan Pius3a1667e2018-07-03 15:17:14 -07007144 conf->r0_key_holder,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007145 conf->r0_key_holder_len,
7146 NULL, NULL, pos,
7147 kde + kde_len - pos,
Hai Shalomfdcde762020-04-02 11:19:20 -07007148 NULL, 0, 0);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007149 }
7150 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07007151 wpa_printf(MSG_ERROR,
7152 "FT: Failed to insert FTIE into EAPOL-Key Key Data");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007153 os_free(kde);
7154 return -1;
7155 }
7156 pos += res;
7157
7158 /* TIE[ReassociationDeadline] (TU) */
7159 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
7160 *pos++ = 5;
7161 *pos++ = WLAN_TIMEOUT_REASSOC_DEADLINE;
7162 WPA_PUT_LE32(pos, conf->reassociation_deadline);
7163 pos += 4;
7164
7165 /* TIE[KeyLifetime] (seconds) */
7166 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
7167 *pos++ = 5;
7168 *pos++ = WLAN_TIMEOUT_KEY_LIFETIME;
Roshan Pius3a1667e2018-07-03 15:17:14 -07007169 WPA_PUT_LE32(pos, conf->r0_key_lifetime);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007170 pos += 4;
7171 }
7172#endif /* CONFIG_IEEE80211R_AP */
7173
7174 wpa_send_eapol(sm->wpa_auth, sm,
7175 (secure ? WPA_KEY_INFO_SECURE : 0) |
7176 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
7177 WPA_KEY_INFO_MIC : 0) |
7178 WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
7179 WPA_KEY_INFO_KEY_TYPE,
Hai Shalomc3565922019-10-28 11:58:20 -07007180 _rsc, sm->ANonce, kde, pos - kde, 0, encr);
Sunil Ravia04bd252022-05-02 22:54:18 -07007181 bin_clear_free(kde, kde_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007182 return 0;
7183}
7184
7185
7186int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
7187 void (*cb)(void *ctx1, void *ctx2),
7188 void *ctx1, void *ctx2)
7189{
7190 u8 rsc[WPA_KEY_RSC_LEN];
Hai Shalom899fcc72020-10-19 14:38:18 -07007191 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007192 struct wpa_group *gsm = sm->group;
7193 const u8 *kde;
Roshan Pius3a1667e2018-07-03 15:17:14 -07007194 u8 *kde_buf = NULL, *pos, hdr[2];
Roshan Pius3a1667e2018-07-03 15:17:14 -07007195 u8 *opos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007196 size_t kde_len;
7197 u8 *gtk;
7198
7199 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
7200 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
7201 /* Use 0 RSC */
Sunil Raviaf8751c2023-03-29 11:35:17 -07007202 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007203 "sending 1/2 msg of Group Key Handshake (TESTING)");
7204
7205 gtk = gsm->GTK[gsm->GN - 1];
7206 if (sm->wpa == WPA_VERSION_WPA2) {
7207 kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
Hai Shalom74f70d42019-02-11 14:42:39 -08007208 ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007209 kde_buf = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07007210 if (!kde_buf)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007211 return -1;
7212
7213 kde = pos = kde_buf;
7214 hdr[0] = gsm->GN & 0x03;
7215 hdr[1] = 0;
7216 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
7217 gtk, gsm->GTK_len);
7218 opos = pos;
7219 pos = ieee80211w_kde_add(sm, pos);
Roshan Pius3a1667e2018-07-03 15:17:14 -07007220 if (pos - opos >=
7221 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN) {
7222 /* skip KDE header and keyid */
7223 opos += 2 + RSN_SELECTOR_LEN + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007224 os_memset(opos, 0, 6); /* clear PN */
7225 }
Hai Shalom899fcc72020-10-19 14:38:18 -07007226 if (ocv_oci_add(sm, &pos,
7227 conf->oci_freq_override_eapol_g1) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08007228 os_free(kde_buf);
7229 return -1;
7230 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007231 kde_len = pos - kde;
7232 } else {
7233 kde = gtk;
7234 kde_len = gsm->GTK_len;
7235 }
7236
7237 sm->eapol_status_cb = cb;
7238 sm->eapol_status_cb_ctx1 = ctx1;
7239 sm->eapol_status_cb_ctx2 = ctx2;
7240
7241 wpa_send_eapol(sm->wpa_auth, sm,
7242 WPA_KEY_INFO_SECURE |
7243 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
7244 WPA_KEY_INFO_MIC : 0) |
7245 WPA_KEY_INFO_ACK |
7246 (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
7247 rsc, NULL, kde, kde_len, gsm->GN, 1);
7248
Sunil Ravia04bd252022-05-02 22:54:18 -07007249 bin_clear_free(kde_buf, kde_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007250 return 0;
7251}
7252
Roshan Pius3a1667e2018-07-03 15:17:14 -07007253
7254int wpa_auth_rekey_gtk(struct wpa_authenticator *wpa_auth)
7255{
7256 if (!wpa_auth)
7257 return -1;
Sunil Ravi7f769292024-07-23 22:21:32 +00007258 eloop_cancel_timeout(wpa_rekey_gtk,
7259 wpa_get_primary_auth(wpa_auth), NULL);
7260 return eloop_register_timeout(0, 0, wpa_rekey_gtk,
7261 wpa_get_primary_auth(wpa_auth), NULL);
Roshan Pius3a1667e2018-07-03 15:17:14 -07007262}
7263
Hai Shalomb755a2a2020-04-23 21:49:02 -07007264
Hai Shaloma20dcd72022-02-04 13:43:00 -08007265int wpa_auth_rekey_ptk(struct wpa_authenticator *wpa_auth,
7266 struct wpa_state_machine *sm)
7267{
7268 if (!wpa_auth || !sm)
7269 return -1;
7270 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
7271 wpa_request_new_ptk(sm);
7272 wpa_sm_step(sm);
7273 return 0;
7274}
7275
7276
Hai Shalomb755a2a2020-04-23 21:49:02 -07007277void wpa_auth_set_ft_rsnxe_used(struct wpa_authenticator *wpa_auth, int val)
7278{
7279 if (wpa_auth)
7280 wpa_auth->conf.ft_rsnxe_used = val;
7281}
7282
Hai Shalom899fcc72020-10-19 14:38:18 -07007283
7284void wpa_auth_set_ocv_override_freq(struct wpa_authenticator *wpa_auth,
7285 enum wpa_auth_ocv_override_frame frame,
7286 unsigned int freq)
7287{
7288 if (!wpa_auth)
7289 return;
7290 switch (frame) {
7291 case WPA_AUTH_OCV_OVERRIDE_EAPOL_M3:
7292 wpa_auth->conf.oci_freq_override_eapol_m3 = freq;
7293 break;
7294 case WPA_AUTH_OCV_OVERRIDE_EAPOL_G1:
7295 wpa_auth->conf.oci_freq_override_eapol_g1 = freq;
7296 break;
7297 case WPA_AUTH_OCV_OVERRIDE_FT_ASSOC:
7298 wpa_auth->conf.oci_freq_override_ft_assoc = freq;
7299 break;
7300 case WPA_AUTH_OCV_OVERRIDE_FILS_ASSOC:
7301 wpa_auth->conf.oci_freq_override_fils_assoc = freq;
7302 break;
7303 }
7304}
7305
Kai Shie75b0652020-11-24 20:31:29 -08007306void wpa_auth_set_skip_send_eapol(struct wpa_authenticator *wpa_auth,
7307 u8 val)
7308{
7309 if (wpa_auth)
7310 wpa_auth->conf.skip_send_eapol = val;
7311}
7312
7313void wpa_auth_set_enable_eapol_large_timeout(struct wpa_authenticator *wpa_auth,
7314 u8 val)
7315{
7316 if (wpa_auth)
7317 wpa_auth->conf.enable_eapol_large_timeout = val;
7318}
7319
7320
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07007321#endif /* CONFIG_TESTING_OPTIONS */
Sunil Ravia04bd252022-05-02 22:54:18 -07007322
7323
7324void wpa_auth_sta_radius_psk_resp(struct wpa_state_machine *sm, bool success)
7325{
7326 if (!sm->waiting_radius_psk) {
7327 wpa_printf(MSG_DEBUG,
7328 "Ignore RADIUS PSK response for " MACSTR
7329 " that did not wait one",
7330 MAC2STR(sm->addr));
7331 return;
7332 }
7333
7334 wpa_printf(MSG_DEBUG, "RADIUS PSK response for " MACSTR " (%s)",
7335 MAC2STR(sm->addr), success ? "success" : "fail");
7336 sm->waiting_radius_psk = 0;
7337
7338 if (success) {
7339 /* Try to process the EAPOL-Key msg 2/4 again */
7340 sm->EAPOLKeyReceived = true;
7341 } else {
7342 sm->Disconnect = true;
7343 }
7344
7345 eloop_register_timeout(0, 0, wpa_sm_call_step, sm, NULL);
7346}
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007347
7348
Sunil Ravi7f769292024-07-23 22:21:32 +00007349void wpa_auth_set_ml_info(struct wpa_state_machine *sm,
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007350 u8 mld_assoc_link_id, struct mld_info *info)
7351{
7352#ifdef CONFIG_IEEE80211BE
Sunil Ravi7f769292024-07-23 22:21:32 +00007353 unsigned int link_id;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007354
7355 if (!info)
7356 return;
7357
7358 os_memset(sm->mld_links, 0, sizeof(sm->mld_links));
Sunil Ravi7f769292024-07-23 22:21:32 +00007359 sm->n_mld_affiliated_links = 0;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007360
7361 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
7362 "MLD: Initialization");
7363
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007364 os_memcpy(sm->peer_mld_addr, info->common_info.mld_addr, ETH_ALEN);
7365
7366 sm->mld_assoc_link_id = mld_assoc_link_id;
7367
Sunil Ravi7f769292024-07-23 22:21:32 +00007368 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007369 struct mld_link_info *link = &info->links[link_id];
7370 struct mld_link *sm_link = &sm->mld_links[link_id];
Sunil Ravi7f769292024-07-23 22:21:32 +00007371 struct wpa_get_link_auth_ctx ctx;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007372
7373 sm_link->valid = link->valid;
7374 if (!link->valid)
7375 continue;
7376
7377 os_memcpy(sm_link->peer_addr, link->peer_addr, ETH_ALEN);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007378
7379 wpa_printf(MSG_DEBUG,
Sunil Ravi7f769292024-07-23 22:21:32 +00007380 "WPA_AUTH: MLD: id=%u, peer=" MACSTR,
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007381 link_id,
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007382 MAC2STR(sm_link->peer_addr));
7383
Sunil Ravi7f769292024-07-23 22:21:32 +00007384 if (link_id != mld_assoc_link_id) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007385 sm->n_mld_affiliated_links++;
Sunil Ravi7f769292024-07-23 22:21:32 +00007386 ctx.addr = link->local_addr;
7387 ctx.mld_addr = NULL;
7388 ctx.link_id = -1;
7389 ctx.wpa_auth = NULL;
7390 wpa_auth_for_each_auth(sm->wpa_auth,
7391 wpa_get_link_sta_auth, &ctx);
7392 if (ctx.wpa_auth) {
7393 sm_link->wpa_auth = ctx.wpa_auth;
7394 wpa_group_get(sm_link->wpa_auth,
7395 sm_link->wpa_auth->group);
7396 }
7397 } else {
7398 sm_link->wpa_auth = sm->wpa_auth;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007399 }
7400
Sunil Ravi7f769292024-07-23 22:21:32 +00007401 if (!sm_link->wpa_auth)
7402 wpa_printf(MSG_ERROR,
7403 "Unable to find authenticator object for ML STA "
7404 MACSTR " on link id %d",
7405 MAC2STR(sm->wpa_auth->mld_addr),
7406 link_id);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00007407 }
7408#endif /* CONFIG_IEEE80211BE */
7409}