blob: 3002d91d695847284eb49b117e7736c105365c6c [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08002 * IEEE 802.11 RSN / WPA Authenticator
Sunil Ravia04bd252022-05-02 22:54:18 -07003 * Copyright (c) 2004-2022, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 */
8
9#include "utils/includes.h"
10
11#include "utils/common.h"
12#include "utils/eloop.h"
13#include "utils/state_machine.h"
Dmitry Shmidtcf32e602014-01-28 10:57:39 -080014#include "utils/bitfield.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070015#include "common/ieee802_11_defs.h"
Hai Shalom74f70d42019-02-11 14:42:39 -080016#include "common/ocv.h"
Hai Shalom4fbc08f2020-05-18 12:37:00 -070017#include "common/dpp.h"
Hai Shalom899fcc72020-10-19 14:38:18 -070018#include "common/wpa_ctrl.h"
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080019#include "crypto/aes.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070020#include "crypto/aes_wrap.h"
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080021#include "crypto/aes_siv.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070022#include "crypto/crypto.h"
23#include "crypto/sha1.h"
24#include "crypto/sha256.h"
Roshan Pius3a1667e2018-07-03 15:17:14 -070025#include "crypto/sha384.h"
Sunil Ravi38ad1ed2023-01-17 23:58:31 +000026#include "crypto/sha512.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070027#include "crypto/random.h"
28#include "eapol_auth/eapol_auth_sm.h"
Hai Shalom74f70d42019-02-11 14:42:39 -080029#include "drivers/driver.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070030#include "ap_config.h"
31#include "ieee802_11.h"
Sunil Ravi2a14cf12023-11-21 00:54:38 +000032#include "sta_info.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070033#include "wpa_auth.h"
34#include "pmksa_cache_auth.h"
35#include "wpa_auth_i.h"
36#include "wpa_auth_ie.h"
37
38#define STATE_MACHINE_DATA struct wpa_state_machine
39#define STATE_MACHINE_DEBUG_PREFIX "WPA"
Sunil Raviaf8751c2023-03-29 11:35:17 -070040#define STATE_MACHINE_ADDR wpa_auth_get_spa(sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070041
42
43static void wpa_send_eapol_timeout(void *eloop_ctx, void *timeout_ctx);
44static int wpa_sm_step(struct wpa_state_machine *sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070045static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
46 u8 *data, size_t data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080047#ifdef CONFIG_FILS
48static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
49 u8 *buf, size_t buf_len, u16 *_key_data_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070050static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
51 const struct wpabuf *hlp);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080052#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070053static void wpa_sm_call_step(void *eloop_ctx, void *timeout_ctx);
54static void wpa_group_sm_step(struct wpa_authenticator *wpa_auth,
55 struct wpa_group *group);
56static void wpa_request_new_ptk(struct wpa_state_machine *sm);
57static int wpa_gtk_update(struct wpa_authenticator *wpa_auth,
58 struct wpa_group *group);
59static int wpa_group_config_group_keys(struct wpa_authenticator *wpa_auth,
60 struct wpa_group *group);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -080061static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -080062 const u8 *pmk, unsigned int pmk_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -070063 struct wpa_ptk *ptk, int force_sha256,
64 u8 *pmk_r0, u8 *pmk_r1, u8 *pmk_r0_name,
65 size_t *key_len);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -070066static void wpa_group_free(struct wpa_authenticator *wpa_auth,
67 struct wpa_group *group);
68static void wpa_group_get(struct wpa_authenticator *wpa_auth,
69 struct wpa_group *group);
70static void wpa_group_put(struct wpa_authenticator *wpa_auth,
71 struct wpa_group *group);
Hai Shalomfdcde762020-04-02 11:19:20 -070072static int ieee80211w_kde_len(struct wpa_state_machine *sm);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -080073static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070074
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070075static const u32 eapol_key_timeout_first = 100; /* ms */
76static const u32 eapol_key_timeout_subseq = 1000; /* ms */
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -080077static const u32 eapol_key_timeout_first_group = 500; /* ms */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -070078static const u32 eapol_key_timeout_no_retrans = 4000; /* ms */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070079
80/* TODO: make these configurable */
81static const int dot11RSNAConfigPMKLifetime = 43200;
82static const int dot11RSNAConfigPMKReauthThreshold = 70;
83static const int dot11RSNAConfigSATimeout = 60;
84
85
Sunil Raviaf8751c2023-03-29 11:35:17 -070086static const u8 * wpa_auth_get_aa(const struct wpa_state_machine *sm)
87{
Sunil Ravi2a14cf12023-11-21 00:54:38 +000088#ifdef CONFIG_IEEE80211BE
89 if (sm->mld_assoc_link_id >= 0)
90 return sm->own_mld_addr;
91#endif /* CONFIG_IEEE80211BE */
Sunil Raviaf8751c2023-03-29 11:35:17 -070092 return sm->wpa_auth->addr;
93}
94
95
96static const u8 * wpa_auth_get_spa(const struct wpa_state_machine *sm)
97{
Sunil Ravi2a14cf12023-11-21 00:54:38 +000098#ifdef CONFIG_IEEE80211BE
99 if (sm->mld_assoc_link_id >= 0)
100 return sm->peer_mld_addr;
101#endif /* CONFIG_IEEE80211BE */
Sunil Raviaf8751c2023-03-29 11:35:17 -0700102 return sm->addr;
103}
104
105
Dmitry Shmidtd5e49232012-12-03 15:08:10 -0800106static inline int wpa_auth_mic_failure_report(
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700107 struct wpa_authenticator *wpa_auth, const u8 *addr)
108{
Paul Stewart092955c2017-02-06 09:13:09 -0800109 if (wpa_auth->cb->mic_failure_report)
110 return wpa_auth->cb->mic_failure_report(wpa_auth->cb_ctx, addr);
Dmitry Shmidtd5e49232012-12-03 15:08:10 -0800111 return 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700112}
113
114
Dmitry Shmidtdda10c22015-03-24 16:05:01 -0700115static inline void wpa_auth_psk_failure_report(
116 struct wpa_authenticator *wpa_auth, const u8 *addr)
117{
Paul Stewart092955c2017-02-06 09:13:09 -0800118 if (wpa_auth->cb->psk_failure_report)
119 wpa_auth->cb->psk_failure_report(wpa_auth->cb_ctx, addr);
Dmitry Shmidtdda10c22015-03-24 16:05:01 -0700120}
121
122
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700123static inline void wpa_auth_set_eapol(struct wpa_authenticator *wpa_auth,
124 const u8 *addr, wpa_eapol_variable var,
125 int value)
126{
Paul Stewart092955c2017-02-06 09:13:09 -0800127 if (wpa_auth->cb->set_eapol)
128 wpa_auth->cb->set_eapol(wpa_auth->cb_ctx, addr, var, value);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700129}
130
131
132static inline int wpa_auth_get_eapol(struct wpa_authenticator *wpa_auth,
133 const u8 *addr, wpa_eapol_variable var)
134{
Hai Shalomfdcde762020-04-02 11:19:20 -0700135 if (!wpa_auth->cb->get_eapol)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700136 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800137 return wpa_auth->cb->get_eapol(wpa_auth->cb_ctx, addr, var);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700138}
139
140
141static inline const u8 * wpa_auth_get_psk(struct wpa_authenticator *wpa_auth,
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700142 const u8 *addr,
143 const u8 *p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -0700144 const u8 *prev_psk, size_t *psk_len,
145 int *vlan_id)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700146{
Hai Shalomfdcde762020-04-02 11:19:20 -0700147 if (!wpa_auth->cb->get_psk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700148 return NULL;
Paul Stewart092955c2017-02-06 09:13:09 -0800149 return wpa_auth->cb->get_psk(wpa_auth->cb_ctx, addr, p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -0700150 prev_psk, psk_len, vlan_id);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700151}
152
153
154static inline int wpa_auth_get_msk(struct wpa_authenticator *wpa_auth,
155 const u8 *addr, u8 *msk, size_t *len)
156{
Hai Shalomfdcde762020-04-02 11:19:20 -0700157 if (!wpa_auth->cb->get_msk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700158 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800159 return wpa_auth->cb->get_msk(wpa_auth->cb_ctx, addr, msk, len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700160}
161
162
163static inline int wpa_auth_set_key(struct wpa_authenticator *wpa_auth,
164 int vlan_id,
165 enum wpa_alg alg, const u8 *addr, int idx,
Hai Shalomfdcde762020-04-02 11:19:20 -0700166 u8 *key, size_t key_len,
167 enum key_flag key_flag)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700168{
Hai Shalomfdcde762020-04-02 11:19:20 -0700169 if (!wpa_auth->cb->set_key)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700170 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800171 return wpa_auth->cb->set_key(wpa_auth->cb_ctx, vlan_id, alg, addr, idx,
Hai Shalomfdcde762020-04-02 11:19:20 -0700172 key, key_len, key_flag);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700173}
174
175
Sunil Ravi89eba102022-09-13 21:04:37 -0700176#ifdef CONFIG_PASN
177static inline int wpa_auth_set_ltf_keyseed(struct wpa_authenticator *wpa_auth,
178 const u8 *peer_addr,
179 const u8 *ltf_keyseed,
180 size_t ltf_keyseed_len)
181{
182 if (!wpa_auth->cb->set_ltf_keyseed)
183 return -1;
184 return wpa_auth->cb->set_ltf_keyseed(wpa_auth->cb_ctx, peer_addr,
185 ltf_keyseed, ltf_keyseed_len);
186}
187#endif /* CONFIG_PASN */
188
189
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700190static inline int wpa_auth_get_seqnum(struct wpa_authenticator *wpa_auth,
191 const u8 *addr, int idx, u8 *seq)
192{
Hai Shalomfdcde762020-04-02 11:19:20 -0700193 int res;
194
195 if (!wpa_auth->cb->get_seqnum)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700196 return -1;
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000197#ifdef CONFIG_TESTING_OPTIONS
198 os_memset(seq, 0, WPA_KEY_RSC_LEN);
199#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalomfdcde762020-04-02 11:19:20 -0700200 res = wpa_auth->cb->get_seqnum(wpa_auth->cb_ctx, addr, idx, seq);
201#ifdef CONFIG_TESTING_OPTIONS
202 if (!addr && idx < 4 && wpa_auth->conf.gtk_rsc_override_set) {
203 wpa_printf(MSG_DEBUG,
204 "TESTING: Override GTK RSC %016llx --> %016llx",
205 (long long unsigned) WPA_GET_LE64(seq),
206 (long long unsigned)
207 WPA_GET_LE64(wpa_auth->conf.gtk_rsc_override));
208 os_memcpy(seq, wpa_auth->conf.gtk_rsc_override,
209 WPA_KEY_RSC_LEN);
210 }
211 if (!addr && idx >= 4 && idx <= 5 &&
212 wpa_auth->conf.igtk_rsc_override_set) {
213 wpa_printf(MSG_DEBUG,
214 "TESTING: Override IGTK RSC %016llx --> %016llx",
215 (long long unsigned) WPA_GET_LE64(seq),
216 (long long unsigned)
217 WPA_GET_LE64(wpa_auth->conf.igtk_rsc_override));
218 os_memcpy(seq, wpa_auth->conf.igtk_rsc_override,
219 WPA_KEY_RSC_LEN);
220 }
221#endif /* CONFIG_TESTING_OPTIONS */
222 return res;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700223}
224
225
226static inline int
227wpa_auth_send_eapol(struct wpa_authenticator *wpa_auth, const u8 *addr,
228 const u8 *data, size_t data_len, int encrypt)
229{
Hai Shalomfdcde762020-04-02 11:19:20 -0700230 if (!wpa_auth->cb->send_eapol)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700231 return -1;
Kai Shie75b0652020-11-24 20:31:29 -0800232#ifdef CONFIG_TESTING_OPTIONS
233 if (wpa_auth->conf.skip_send_eapol)
234 return 0;
235#endif
Paul Stewart092955c2017-02-06 09:13:09 -0800236 return wpa_auth->cb->send_eapol(wpa_auth->cb_ctx, addr, data, data_len,
237 encrypt);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700238}
239
240
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800241#ifdef CONFIG_MESH
242static inline int wpa_auth_start_ampe(struct wpa_authenticator *wpa_auth,
243 const u8 *addr)
244{
Hai Shalomfdcde762020-04-02 11:19:20 -0700245 if (!wpa_auth->cb->start_ampe)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800246 return -1;
Paul Stewart092955c2017-02-06 09:13:09 -0800247 return wpa_auth->cb->start_ampe(wpa_auth->cb_ctx, addr);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800248}
249#endif /* CONFIG_MESH */
250
251
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700252int wpa_auth_for_each_sta(struct wpa_authenticator *wpa_auth,
253 int (*cb)(struct wpa_state_machine *sm, void *ctx),
254 void *cb_ctx)
255{
Hai Shalomfdcde762020-04-02 11:19:20 -0700256 if (!wpa_auth->cb->for_each_sta)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700257 return 0;
Paul Stewart092955c2017-02-06 09:13:09 -0800258 return wpa_auth->cb->for_each_sta(wpa_auth->cb_ctx, cb, cb_ctx);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700259}
260
261
262int wpa_auth_for_each_auth(struct wpa_authenticator *wpa_auth,
263 int (*cb)(struct wpa_authenticator *a, void *ctx),
264 void *cb_ctx)
265{
Hai Shalomfdcde762020-04-02 11:19:20 -0700266 if (!wpa_auth->cb->for_each_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700267 return 0;
Paul Stewart092955c2017-02-06 09:13:09 -0800268 return wpa_auth->cb->for_each_auth(wpa_auth->cb_ctx, cb, cb_ctx);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700269}
270
271
Hai Shalom60840252021-02-19 19:02:11 -0800272void wpa_auth_store_ptksa(struct wpa_authenticator *wpa_auth,
273 const u8 *addr, int cipher,
274 u32 life_time, const struct wpa_ptk *ptk)
275{
276 if (wpa_auth->cb->store_ptksa)
277 wpa_auth->cb->store_ptksa(wpa_auth->cb_ctx, addr, cipher,
278 life_time, ptk);
279}
280
281
Sunil Raviaf8751c2023-03-29 11:35:17 -0700282static void wpa_auth_remove_ptksa(struct wpa_authenticator *wpa_auth,
283 const u8 *addr, int cipher)
Hai Shalom60840252021-02-19 19:02:11 -0800284{
285 if (wpa_auth->cb->clear_ptksa)
286 wpa_auth->cb->clear_ptksa(wpa_auth->cb_ctx, addr, cipher);
287}
288
Sunil Raviaf8751c2023-03-29 11:35:17 -0700289
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700290void wpa_auth_logger(struct wpa_authenticator *wpa_auth, const u8 *addr,
291 logger_level level, const char *txt)
292{
Hai Shalomfdcde762020-04-02 11:19:20 -0700293 if (!wpa_auth->cb->logger)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700294 return;
Paul Stewart092955c2017-02-06 09:13:09 -0800295 wpa_auth->cb->logger(wpa_auth->cb_ctx, addr, level, txt);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700296}
297
298
299void wpa_auth_vlogger(struct wpa_authenticator *wpa_auth, const u8 *addr,
300 logger_level level, const char *fmt, ...)
301{
302 char *format;
303 int maxlen;
304 va_list ap;
305
Hai Shalomfdcde762020-04-02 11:19:20 -0700306 if (!wpa_auth->cb->logger)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700307 return;
308
309 maxlen = os_strlen(fmt) + 100;
310 format = os_malloc(maxlen);
311 if (!format)
312 return;
313
314 va_start(ap, fmt);
315 vsnprintf(format, maxlen, fmt, ap);
316 va_end(ap);
317
318 wpa_auth_logger(wpa_auth, addr, level, format);
319
320 os_free(format);
321}
322
323
324static void wpa_sta_disconnect(struct wpa_authenticator *wpa_auth,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700325 const u8 *addr, u16 reason)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700326{
Hai Shalomfdcde762020-04-02 11:19:20 -0700327 if (!wpa_auth->cb->disconnect)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700328 return;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700329 wpa_printf(MSG_DEBUG, "wpa_sta_disconnect STA " MACSTR " (reason %u)",
330 MAC2STR(addr), reason);
331 wpa_auth->cb->disconnect(wpa_auth->cb_ctx, addr, reason);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700332}
333
334
Hai Shalom74f70d42019-02-11 14:42:39 -0800335#ifdef CONFIG_OCV
336static int wpa_channel_info(struct wpa_authenticator *wpa_auth,
337 struct wpa_channel_info *ci)
338{
339 if (!wpa_auth->cb->channel_info)
340 return -1;
341 return wpa_auth->cb->channel_info(wpa_auth->cb_ctx, ci);
342}
343#endif /* CONFIG_OCV */
344
345
Hai Shalom021b0b52019-04-10 11:17:58 -0700346static int wpa_auth_update_vlan(struct wpa_authenticator *wpa_auth,
347 const u8 *addr, int vlan_id)
348{
349 if (!wpa_auth->cb->update_vlan)
350 return -1;
351 return wpa_auth->cb->update_vlan(wpa_auth->cb_ctx, addr, vlan_id);
352}
353
354
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700355static void wpa_rekey_gmk(void *eloop_ctx, void *timeout_ctx)
356{
357 struct wpa_authenticator *wpa_auth = eloop_ctx;
358
359 if (random_get_bytes(wpa_auth->group->GMK, WPA_GMK_LEN)) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700360 wpa_printf(MSG_ERROR,
361 "Failed to get random data for WPA initialization.");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700362 } else {
363 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "GMK rekeyd");
364 wpa_hexdump_key(MSG_DEBUG, "GMK",
365 wpa_auth->group->GMK, WPA_GMK_LEN);
366 }
367
368 if (wpa_auth->conf.wpa_gmk_rekey) {
369 eloop_register_timeout(wpa_auth->conf.wpa_gmk_rekey, 0,
370 wpa_rekey_gmk, wpa_auth, NULL);
371 }
372}
373
374
375static void wpa_rekey_gtk(void *eloop_ctx, void *timeout_ctx)
376{
377 struct wpa_authenticator *wpa_auth = eloop_ctx;
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700378 struct wpa_group *group, *next;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700379
380 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG, "rekeying GTK");
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700381 group = wpa_auth->group;
382 while (group) {
383 wpa_group_get(wpa_auth, group);
384
Hai Shalome21d4e82020-04-29 16:34:06 -0700385 group->GTKReKey = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700386 do {
Hai Shalome21d4e82020-04-29 16:34:06 -0700387 group->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700388 wpa_group_sm_step(wpa_auth, group);
389 } while (group->changed);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700390
391 next = group->next;
392 wpa_group_put(wpa_auth, group);
393 group = next;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700394 }
395
396 if (wpa_auth->conf.wpa_group_rekey) {
397 eloop_register_timeout(wpa_auth->conf.wpa_group_rekey,
398 0, wpa_rekey_gtk, wpa_auth, NULL);
399 }
400}
401
402
403static void wpa_rekey_ptk(void *eloop_ctx, void *timeout_ctx)
404{
405 struct wpa_authenticator *wpa_auth = eloop_ctx;
406 struct wpa_state_machine *sm = timeout_ctx;
407
Sunil Raviaf8751c2023-03-29 11:35:17 -0700408 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
409 "rekeying PTK");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700410 wpa_request_new_ptk(sm);
411 wpa_sm_step(sm);
412}
413
414
Hai Shalom81f62d82019-07-22 12:10:00 -0700415void wpa_auth_set_ptk_rekey_timer(struct wpa_state_machine *sm)
416{
417 if (sm && sm->wpa_auth->conf.wpa_ptk_rekey) {
418 wpa_printf(MSG_DEBUG, "WPA: Start PTK rekeying timer for "
Sunil Raviaf8751c2023-03-29 11:35:17 -0700419 MACSTR " (%d seconds)",
420 MAC2STR(wpa_auth_get_spa(sm)),
Hai Shalom81f62d82019-07-22 12:10:00 -0700421 sm->wpa_auth->conf.wpa_ptk_rekey);
422 eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
423 eloop_register_timeout(sm->wpa_auth->conf.wpa_ptk_rekey, 0,
424 wpa_rekey_ptk, sm->wpa_auth, sm);
425 }
426}
427
428
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700429static int wpa_auth_pmksa_clear_cb(struct wpa_state_machine *sm, void *ctx)
430{
431 if (sm->pmksa == ctx)
432 sm->pmksa = NULL;
433 return 0;
434}
435
436
437static void wpa_auth_pmksa_free_cb(struct rsn_pmksa_cache_entry *entry,
438 void *ctx)
439{
440 struct wpa_authenticator *wpa_auth = ctx;
441 wpa_auth_for_each_sta(wpa_auth, wpa_auth_pmksa_clear_cb, entry);
442}
443
444
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700445static int wpa_group_init_gmk_and_counter(struct wpa_authenticator *wpa_auth,
446 struct wpa_group *group)
447{
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800448 u8 buf[ETH_ALEN + 8 + sizeof(unsigned long)];
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700449 u8 rkey[32];
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800450 unsigned long ptr;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700451
452 if (random_get_bytes(group->GMK, WPA_GMK_LEN) < 0)
453 return -1;
454 wpa_hexdump_key(MSG_DEBUG, "GMK", group->GMK, WPA_GMK_LEN);
455
456 /*
457 * Counter = PRF-256(Random number, "Init Counter",
458 * Local MAC Address || Time)
459 */
460 os_memcpy(buf, wpa_auth->addr, ETH_ALEN);
461 wpa_get_ntp_timestamp(buf + ETH_ALEN);
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -0800462 ptr = (unsigned long) group;
463 os_memcpy(buf + ETH_ALEN + 8, &ptr, sizeof(ptr));
Hai Shalom74f70d42019-02-11 14:42:39 -0800464#ifdef TEST_FUZZ
465 os_memset(buf + ETH_ALEN, 0xab, 8);
466 os_memset(buf + ETH_ALEN + 8, 0xcd, sizeof(ptr));
467#endif /* TEST_FUZZ */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700468 if (random_get_bytes(rkey, sizeof(rkey)) < 0)
469 return -1;
470
471 if (sha1_prf(rkey, sizeof(rkey), "Init Counter", buf, sizeof(buf),
472 group->Counter, WPA_NONCE_LEN) < 0)
473 return -1;
474 wpa_hexdump_key(MSG_DEBUG, "Key Counter",
475 group->Counter, WPA_NONCE_LEN);
476
477 return 0;
478}
479
480
481static struct wpa_group * wpa_group_init(struct wpa_authenticator *wpa_auth,
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800482 int vlan_id, int delay_init)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700483{
484 struct wpa_group *group;
485
486 group = os_zalloc(sizeof(struct wpa_group));
Hai Shalomfdcde762020-04-02 11:19:20 -0700487 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700488 return NULL;
489
Hai Shalome21d4e82020-04-29 16:34:06 -0700490 group->GTKAuthenticator = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700491 group->vlan_id = vlan_id;
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -0700492 group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700493
494 if (random_pool_ready() != 1) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700495 wpa_printf(MSG_INFO,
496 "WPA: Not enough entropy in random pool for secure operations - update keys later when the first station connects");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700497 }
498
499 /*
500 * Set initial GMK/Counter value here. The actual values that will be
501 * used in negotiations will be set once the first station tries to
502 * connect. This allows more time for collecting additional randomness
503 * on embedded devices.
504 */
505 if (wpa_group_init_gmk_and_counter(wpa_auth, group) < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700506 wpa_printf(MSG_ERROR,
507 "Failed to get random data for WPA initialization.");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700508 os_free(group);
509 return NULL;
510 }
511
Hai Shalome21d4e82020-04-29 16:34:06 -0700512 group->GInit = true;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800513 if (delay_init) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700514 wpa_printf(MSG_DEBUG,
515 "WPA: Delay group state machine start until Beacon frames have been configured");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800516 /* Initialization is completed in wpa_init_keys(). */
517 } else {
518 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700519 group->GInit = false;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800520 wpa_group_sm_step(wpa_auth, group);
521 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700522
523 return group;
524}
525
526
527/**
528 * wpa_init - Initialize WPA authenticator
529 * @addr: Authenticator address
530 * @conf: Configuration for WPA authenticator
531 * @cb: Callback functions for WPA authenticator
532 * Returns: Pointer to WPA authenticator data or %NULL on failure
533 */
534struct wpa_authenticator * wpa_init(const u8 *addr,
535 struct wpa_auth_config *conf,
Paul Stewart092955c2017-02-06 09:13:09 -0800536 const struct wpa_auth_callbacks *cb,
537 void *cb_ctx)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700538{
539 struct wpa_authenticator *wpa_auth;
540
541 wpa_auth = os_zalloc(sizeof(struct wpa_authenticator));
Hai Shalomfdcde762020-04-02 11:19:20 -0700542 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700543 return NULL;
544 os_memcpy(wpa_auth->addr, addr, ETH_ALEN);
545 os_memcpy(&wpa_auth->conf, conf, sizeof(*conf));
Paul Stewart092955c2017-02-06 09:13:09 -0800546 wpa_auth->cb = cb;
547 wpa_auth->cb_ctx = cb_ctx;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700548
549 if (wpa_auth_gen_wpa_ie(wpa_auth)) {
550 wpa_printf(MSG_ERROR, "Could not generate WPA IE.");
551 os_free(wpa_auth);
552 return NULL;
553 }
554
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800555 wpa_auth->group = wpa_group_init(wpa_auth, 0, 1);
Hai Shalomfdcde762020-04-02 11:19:20 -0700556 if (!wpa_auth->group) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700557 os_free(wpa_auth->wpa_ie);
558 os_free(wpa_auth);
559 return NULL;
560 }
561
562 wpa_auth->pmksa = pmksa_cache_auth_init(wpa_auth_pmksa_free_cb,
563 wpa_auth);
Hai Shalomfdcde762020-04-02 11:19:20 -0700564 if (!wpa_auth->pmksa) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700565 wpa_printf(MSG_ERROR, "PMKSA cache initialization failed.");
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800566 os_free(wpa_auth->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700567 os_free(wpa_auth->wpa_ie);
568 os_free(wpa_auth);
569 return NULL;
570 }
571
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800572#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700573 wpa_auth->ft_pmk_cache = wpa_ft_pmk_cache_init();
Hai Shalomfdcde762020-04-02 11:19:20 -0700574 if (!wpa_auth->ft_pmk_cache) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700575 wpa_printf(MSG_ERROR, "FT PMK cache initialization failed.");
Dmitry Shmidtff787d52015-01-12 13:01:47 -0800576 os_free(wpa_auth->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700577 os_free(wpa_auth->wpa_ie);
578 pmksa_cache_auth_deinit(wpa_auth->pmksa);
579 os_free(wpa_auth);
580 return NULL;
581 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800582#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700583
584 if (wpa_auth->conf.wpa_gmk_rekey) {
585 eloop_register_timeout(wpa_auth->conf.wpa_gmk_rekey, 0,
586 wpa_rekey_gmk, wpa_auth, NULL);
587 }
588
589 if (wpa_auth->conf.wpa_group_rekey) {
590 eloop_register_timeout(wpa_auth->conf.wpa_group_rekey, 0,
591 wpa_rekey_gtk, wpa_auth, NULL);
592 }
593
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800594#ifdef CONFIG_P2P
595 if (WPA_GET_BE32(conf->ip_addr_start)) {
596 int count = WPA_GET_BE32(conf->ip_addr_end) -
597 WPA_GET_BE32(conf->ip_addr_start) + 1;
598 if (count > 1000)
599 count = 1000;
600 if (count > 0)
601 wpa_auth->ip_pool = bitfield_alloc(count);
602 }
603#endif /* CONFIG_P2P */
604
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000605 if (conf->tx_bss_auth && conf->beacon_prot) {
606 conf->tx_bss_auth->non_tx_beacon_prot = true;
607 if (!conf->tx_bss_auth->conf.beacon_prot)
608 conf->tx_bss_auth->conf.beacon_prot = true;
609 if (!conf->tx_bss_auth->conf.group_mgmt_cipher)
610 conf->tx_bss_auth->conf.group_mgmt_cipher =
611 conf->group_mgmt_cipher;
612 }
613
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700614 return wpa_auth;
615}
616
617
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800618int wpa_init_keys(struct wpa_authenticator *wpa_auth)
619{
620 struct wpa_group *group = wpa_auth->group;
621
Hai Shalomfdcde762020-04-02 11:19:20 -0700622 wpa_printf(MSG_DEBUG,
623 "WPA: Start group state machine to set initial keys");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800624 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700625 group->GInit = false;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800626 wpa_group_sm_step(wpa_auth, group);
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -0800627 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
628 return -1;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -0800629 return 0;
630}
631
632
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000633static void wpa_auth_free_conf(struct wpa_auth_config *conf)
634{
635#ifdef CONFIG_TESTING_OPTIONS
636 wpabuf_free(conf->eapol_m1_elements);
637 conf->eapol_m1_elements = NULL;
638 wpabuf_free(conf->eapol_m3_elements);
639 conf->eapol_m3_elements = NULL;
640#endif /* CONFIG_TESTING_OPTIONS */
641}
642
643
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700644/**
645 * wpa_deinit - Deinitialize WPA authenticator
646 * @wpa_auth: Pointer to WPA authenticator data from wpa_init()
647 */
648void wpa_deinit(struct wpa_authenticator *wpa_auth)
649{
650 struct wpa_group *group, *prev;
651
652 eloop_cancel_timeout(wpa_rekey_gmk, wpa_auth, NULL);
653 eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
654
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700655 pmksa_cache_auth_deinit(wpa_auth->pmksa);
656
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800657#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700658 wpa_ft_pmk_cache_deinit(wpa_auth->ft_pmk_cache);
659 wpa_auth->ft_pmk_cache = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700660 wpa_ft_deinit(wpa_auth);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800661#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700662
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800663#ifdef CONFIG_P2P
664 bitfield_free(wpa_auth->ip_pool);
665#endif /* CONFIG_P2P */
666
667
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700668 os_free(wpa_auth->wpa_ie);
669
670 group = wpa_auth->group;
671 while (group) {
672 prev = group;
673 group = group->next;
Sunil Ravia04bd252022-05-02 22:54:18 -0700674 bin_clear_free(prev, sizeof(*prev));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700675 }
676
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000677 wpa_auth_free_conf(&wpa_auth->conf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700678 os_free(wpa_auth);
679}
680
681
682/**
683 * wpa_reconfig - Update WPA authenticator configuration
684 * @wpa_auth: Pointer to WPA authenticator data from wpa_init()
685 * @conf: Configuration for WPA authenticator
686 */
687int wpa_reconfig(struct wpa_authenticator *wpa_auth,
688 struct wpa_auth_config *conf)
689{
690 struct wpa_group *group;
Hai Shalomfdcde762020-04-02 11:19:20 -0700691
692 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700693 return 0;
694
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000695 wpa_auth_free_conf(&wpa_auth->conf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700696 os_memcpy(&wpa_auth->conf, conf, sizeof(*conf));
697 if (wpa_auth_gen_wpa_ie(wpa_auth)) {
698 wpa_printf(MSG_ERROR, "Could not generate WPA IE.");
699 return -1;
700 }
701
702 /*
703 * Reinitialize GTK to make sure it is suitable for the new
704 * configuration.
705 */
706 group = wpa_auth->group;
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -0700707 group->GTK_len = wpa_cipher_key_len(wpa_auth->conf.wpa_group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700708 group->GInit = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700709 wpa_group_sm_step(wpa_auth, group);
Hai Shalome21d4e82020-04-29 16:34:06 -0700710 group->GInit = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700711 wpa_group_sm_step(wpa_auth, group);
712
713 return 0;
714}
715
716
717struct wpa_state_machine *
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700718wpa_auth_sta_init(struct wpa_authenticator *wpa_auth, const u8 *addr,
719 const u8 *p2p_dev_addr)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700720{
721 struct wpa_state_machine *sm;
722
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -0800723 if (wpa_auth->group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
724 return NULL;
725
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700726 sm = os_zalloc(sizeof(struct wpa_state_machine));
Hai Shalomfdcde762020-04-02 11:19:20 -0700727 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700728 return NULL;
729 os_memcpy(sm->addr, addr, ETH_ALEN);
Dmitry Shmidt391c59f2013-09-03 12:16:28 -0700730 if (p2p_dev_addr)
731 os_memcpy(sm->p2p_dev_addr, p2p_dev_addr, ETH_ALEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700732
733 sm->wpa_auth = wpa_auth;
734 sm->group = wpa_auth->group;
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700735 wpa_group_get(sm->wpa_auth, sm->group);
Sunil Ravi2a14cf12023-11-21 00:54:38 +0000736#ifdef CONFIG_IEEE80211BE
737 sm->mld_assoc_link_id = -1;
738#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700739
740 return sm;
741}
742
743
744int wpa_auth_sta_associated(struct wpa_authenticator *wpa_auth,
745 struct wpa_state_machine *sm)
746{
Hai Shalomfdcde762020-04-02 11:19:20 -0700747 if (!wpa_auth || !wpa_auth->conf.wpa || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700748 return -1;
749
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800750#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700751 if (sm->ft_completed) {
Sunil Raviaf8751c2023-03-29 11:35:17 -0700752 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -0700753 "FT authentication already completed - do not start 4-way handshake");
Dmitry Shmidt71757432014-06-02 13:50:35 -0700754 /* Go to PTKINITDONE state to allow GTK rekeying */
755 sm->wpa_ptk_state = WPA_PTK_PTKINITDONE;
Hai Shalome21d4e82020-04-29 16:34:06 -0700756 sm->Pair = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700757 return 0;
758 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800759#endif /* CONFIG_IEEE80211R_AP */
760
761#ifdef CONFIG_FILS
762 if (sm->fils_completed) {
Sunil Raviaf8751c2023-03-29 11:35:17 -0700763 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800764 "FILS authentication already completed - do not start 4-way handshake");
765 /* Go to PTKINITDONE state to allow GTK rekeying */
766 sm->wpa_ptk_state = WPA_PTK_PTKINITDONE;
Hai Shalome21d4e82020-04-29 16:34:06 -0700767 sm->Pair = true;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800768 return 0;
769 }
770#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700771
772 if (sm->started) {
773 os_memset(&sm->key_replay, 0, sizeof(sm->key_replay));
Hai Shalome21d4e82020-04-29 16:34:06 -0700774 sm->ReAuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700775 return wpa_sm_step(sm);
776 }
777
Sunil Raviaf8751c2023-03-29 11:35:17 -0700778 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700779 "start authentication");
780 sm->started = 1;
781
Hai Shalome21d4e82020-04-29 16:34:06 -0700782 sm->Init = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700783 if (wpa_sm_step(sm) == 1)
784 return 1; /* should not really happen */
Hai Shalome21d4e82020-04-29 16:34:06 -0700785 sm->Init = false;
786 sm->AuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700787 return wpa_sm_step(sm);
788}
789
790
791void wpa_auth_sta_no_wpa(struct wpa_state_machine *sm)
792{
793 /* WPA/RSN was not used - clear WPA state. This is needed if the STA
794 * reassociates back to the same AP while the previous entry for the
795 * STA has not yet been removed. */
Hai Shalomfdcde762020-04-02 11:19:20 -0700796 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700797 return;
798
799 sm->wpa_key_mgmt = 0;
800}
801
802
803static void wpa_free_sta_sm(struct wpa_state_machine *sm)
804{
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800805#ifdef CONFIG_P2P
806 if (WPA_GET_BE32(sm->ip_addr)) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700807 wpa_printf(MSG_DEBUG,
808 "P2P: Free assigned IP address %u.%u.%u.%u from "
Sunil8cd6f4d2022-06-28 18:40:46 +0000809 MACSTR " (bit %u)",
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800810 sm->ip_addr[0], sm->ip_addr[1],
811 sm->ip_addr[2], sm->ip_addr[3],
Sunil Raviaf8751c2023-03-29 11:35:17 -0700812 MAC2STR(wpa_auth_get_spa(sm)),
813 sm->ip_addr_bit);
Sunil8cd6f4d2022-06-28 18:40:46 +0000814 bitfield_clear(sm->wpa_auth->ip_pool, sm->ip_addr_bit);
Dmitry Shmidtcf32e602014-01-28 10:57:39 -0800815 }
816#endif /* CONFIG_P2P */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700817 if (sm->GUpdateStationKeys) {
818 sm->group->GKeyDoneStations--;
Hai Shalome21d4e82020-04-29 16:34:06 -0700819 sm->GUpdateStationKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700820 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800821#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700822 os_free(sm->assoc_resp_ftie);
Dmitry Shmidtd11f0192014-03-24 12:09:47 -0700823 wpabuf_free(sm->ft_pending_req_ies);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800824#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700825 os_free(sm->last_rx_eapol_key);
826 os_free(sm->wpa_ie);
Hai Shalomc3565922019-10-28 11:58:20 -0700827 os_free(sm->rsnxe);
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700828 wpa_group_put(sm->wpa_auth, sm->group);
Hai Shalom021b0b52019-04-10 11:17:58 -0700829#ifdef CONFIG_DPP2
830 wpabuf_clear_free(sm->dpp_z);
831#endif /* CONFIG_DPP2 */
Hai Shalom1dc4d202019-04-29 16:22:27 -0700832 bin_clear_free(sm, sizeof(*sm));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700833}
834
835
836void wpa_auth_sta_deinit(struct wpa_state_machine *sm)
837{
Hai Shalomfdcde762020-04-02 11:19:20 -0700838 struct wpa_authenticator *wpa_auth;
839
840 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700841 return;
842
Hai Shalomfdcde762020-04-02 11:19:20 -0700843 wpa_auth = sm->wpa_auth;
844 if (wpa_auth->conf.wpa_strict_rekey && sm->has_GTK) {
Sunil Raviaf8751c2023-03-29 11:35:17 -0700845 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -0700846 "strict rekeying - force GTK rekey since STA is leaving");
Roshan Pius3a1667e2018-07-03 15:17:14 -0700847 if (eloop_deplete_timeout(0, 500000, wpa_rekey_gtk,
Hai Shalomfdcde762020-04-02 11:19:20 -0700848 wpa_auth, NULL) == -1)
849 eloop_register_timeout(0, 500000, wpa_rekey_gtk,
850 wpa_auth, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700851 }
852
Hai Shalomfdcde762020-04-02 11:19:20 -0700853 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700854 sm->pending_1_of_4_timeout = 0;
855 eloop_cancel_timeout(wpa_sm_call_step, sm, NULL);
Hai Shalomfdcde762020-04-02 11:19:20 -0700856 eloop_cancel_timeout(wpa_rekey_ptk, wpa_auth, sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700857#ifdef CONFIG_IEEE80211R_AP
858 wpa_ft_sta_deinit(sm);
859#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700860 if (sm->in_step_loop) {
861 /* Must not free state machine while wpa_sm_step() is running.
862 * Freeing will be completed in the end of wpa_sm_step(). */
Hai Shalomfdcde762020-04-02 11:19:20 -0700863 wpa_printf(MSG_DEBUG,
864 "WPA: Registering pending STA state machine deinit for "
Sunil Raviaf8751c2023-03-29 11:35:17 -0700865 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700866 sm->pending_deinit = 1;
867 } else
868 wpa_free_sta_sm(sm);
869}
870
871
872static void wpa_request_new_ptk(struct wpa_state_machine *sm)
873{
Hai Shalomfdcde762020-04-02 11:19:20 -0700874 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700875 return;
876
Hai Shalomfdcde762020-04-02 11:19:20 -0700877 if (!sm->use_ext_key_id && sm->wpa_auth->conf.wpa_deny_ptk0_rekey) {
878 wpa_printf(MSG_INFO,
879 "WPA: PTK0 rekey not allowed, disconnect " MACSTR,
Sunil Raviaf8751c2023-03-29 11:35:17 -0700880 MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -0700881 sm->Disconnect = true;
Hai Shalomfdcde762020-04-02 11:19:20 -0700882 /* Try to encourage the STA to reconnect */
883 sm->disconnect_reason =
884 WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA;
885 } else {
886 if (sm->use_ext_key_id)
887 sm->keyidx_active ^= 1; /* flip Key ID */
Hai Shalome21d4e82020-04-29 16:34:06 -0700888 sm->PTKRequest = true;
Hai Shalomfdcde762020-04-02 11:19:20 -0700889 sm->PTK_valid = 0;
890 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700891}
892
893
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800894static int wpa_replay_counter_valid(struct wpa_key_replay_counter *ctr,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700895 const u8 *replay_counter)
896{
897 int i;
898 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800899 if (!ctr[i].valid)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700900 break;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800901 if (os_memcmp(replay_counter, ctr[i].counter,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700902 WPA_REPLAY_COUNTER_LEN) == 0)
903 return 1;
904 }
905 return 0;
906}
907
908
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800909static void wpa_replay_counter_mark_invalid(struct wpa_key_replay_counter *ctr,
910 const u8 *replay_counter)
911{
912 int i;
913 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
914 if (ctr[i].valid &&
Hai Shalomfdcde762020-04-02 11:19:20 -0700915 (!replay_counter ||
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800916 os_memcmp(replay_counter, ctr[i].counter,
917 WPA_REPLAY_COUNTER_LEN) == 0))
Hai Shalome21d4e82020-04-29 16:34:06 -0700918 ctr[i].valid = false;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -0800919 }
920}
921
922
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800923#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700924static int ft_check_msg_2_of_4(struct wpa_authenticator *wpa_auth,
925 struct wpa_state_machine *sm,
926 struct wpa_eapol_ie_parse *kde)
927{
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000928 struct wpa_ie_data ie, assoc_ie;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700929 struct rsn_mdie *mdie;
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000930 unsigned int i, j;
931 bool found = false;
932
933 /* Verify that PMKR1Name from EAPOL-Key message 2/4 matches the value
934 * we derived. */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700935
936 if (wpa_parse_wpa_ie_rsn(kde->rsn_ie, kde->rsn_ie_len, &ie) < 0 ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000937 ie.num_pmkid < 1 || !ie.pmkid) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700938 wpa_printf(MSG_DEBUG,
939 "FT: No PMKR1Name in FT 4-way handshake message 2/4");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700940 return -1;
941 }
942
Sunil Ravib0ac25f2024-07-12 01:42:03 +0000943 if (wpa_parse_wpa_ie_rsn(sm->wpa_ie, sm->wpa_ie_len, &assoc_ie) < 0) {
944 wpa_printf(MSG_DEBUG,
945 "FT: Could not parse (Re)Association Request frame RSNE");
946 os_memset(&assoc_ie, 0, sizeof(assoc_ie));
947 /* Continue to allow PMKR1Name matching to be done to cover the
948 * case where it is the only listed PMKID. */
949 }
950
951 for (i = 0; i < ie.num_pmkid; i++) {
952 const u8 *pmkid = ie.pmkid + i * PMKID_LEN;
953
954 if (os_memcmp_const(pmkid, sm->pmk_r1_name,
955 WPA_PMK_NAME_LEN) == 0) {
956 wpa_printf(MSG_DEBUG,
957 "FT: RSNE[PMKID[%u]] from supplicant matches PMKR1Name",
958 i);
959 found = true;
960 } else {
961 for (j = 0; j < assoc_ie.num_pmkid; j++) {
962 if (os_memcmp(pmkid,
963 assoc_ie.pmkid + j * PMKID_LEN,
964 PMKID_LEN) == 0)
965 break;
966 }
967
968 if (j == assoc_ie.num_pmkid) {
969 wpa_printf(MSG_DEBUG,
970 "FT: RSNE[PMKID[%u]] from supplicant is neither PMKR1Name nor included in AssocReq",
971 i);
972 found = false;
973 break;
974 }
975 wpa_printf(MSG_DEBUG,
976 "FT: RSNE[PMKID[%u]] from supplicant is not PMKR1Name, but matches a PMKID in AssocReq",
977 i);
978 }
979 }
980
981 if (!found) {
982 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
983 LOGGER_DEBUG,
984 "PMKR1Name mismatch in FT 4-way handshake");
985 wpa_hexdump(MSG_DEBUG,
986 "FT: PMKIDs/PMKR1Name from Supplicant",
987 ie.pmkid, ie.num_pmkid * PMKID_LEN);
988 wpa_hexdump(MSG_DEBUG, "FT: Derived PMKR1Name",
989 sm->pmk_r1_name, WPA_PMK_NAME_LEN);
990 return -1;
991 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700992
993 if (!kde->mdie || !kde->ftie) {
Hai Shalomfdcde762020-04-02 11:19:20 -0700994 wpa_printf(MSG_DEBUG,
995 "FT: No %s in FT 4-way handshake message 2/4",
996 kde->mdie ? "FTIE" : "MDIE");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700997 return -1;
998 }
999
1000 mdie = (struct rsn_mdie *) (kde->mdie + 2);
1001 if (kde->mdie[1] < sizeof(struct rsn_mdie) ||
1002 os_memcmp(wpa_auth->conf.mobility_domain, mdie->mobility_domain,
1003 MOBILITY_DOMAIN_ID_LEN) != 0) {
1004 wpa_printf(MSG_DEBUG, "FT: MDIE mismatch");
1005 return -1;
1006 }
1007
1008 if (sm->assoc_resp_ftie &&
1009 (kde->ftie[1] != sm->assoc_resp_ftie[1] ||
1010 os_memcmp(kde->ftie, sm->assoc_resp_ftie,
1011 2 + sm->assoc_resp_ftie[1]) != 0)) {
1012 wpa_printf(MSG_DEBUG, "FT: FTIE mismatch");
1013 wpa_hexdump(MSG_DEBUG, "FT: FTIE in EAPOL-Key msg 2/4",
1014 kde->ftie, kde->ftie_len);
1015 wpa_hexdump(MSG_DEBUG, "FT: FTIE in (Re)AssocResp",
1016 sm->assoc_resp_ftie, 2 + sm->assoc_resp_ftie[1]);
1017 return -1;
1018 }
1019
1020 return 0;
1021}
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001022#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001023
1024
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001025static int wpa_receive_error_report(struct wpa_authenticator *wpa_auth,
1026 struct wpa_state_machine *sm, int group)
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001027{
1028 /* Supplicant reported a Michael MIC error */
Sunil Raviaf8751c2023-03-29 11:35:17 -07001029 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001030 "received EAPOL-Key Error Request (STA detected Michael MIC failure (group=%d))",
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001031 group);
1032
1033 if (group && wpa_auth->conf.wpa_group != WPA_CIPHER_TKIP) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001034 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001035 "ignore Michael MIC failure report since group cipher is not TKIP");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001036 } else if (!group && sm->pairwise != WPA_CIPHER_TKIP) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001037 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001038 "ignore Michael MIC failure report since pairwise cipher is not TKIP");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001039 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001040 if (wpa_auth_mic_failure_report(wpa_auth,
1041 wpa_auth_get_spa(sm)) > 0)
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001042 return 1; /* STA entry was removed */
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001043 sm->dot11RSNAStatsTKIPRemoteMICFailures++;
1044 wpa_auth->dot11RSNAStatsTKIPRemoteMICFailures++;
1045 }
1046
1047 /*
1048 * Error report is not a request for a new key handshake, but since
1049 * Authenticator may do it, let's change the keys now anyway.
1050 */
1051 wpa_request_new_ptk(sm);
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001052 return 0;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001053}
1054
1055
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001056static int wpa_try_alt_snonce(struct wpa_state_machine *sm, u8 *data,
1057 size_t data_len)
1058{
1059 struct wpa_ptk PTK;
1060 int ok = 0;
1061 const u8 *pmk = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001062 size_t pmk_len;
Hai Shalom021b0b52019-04-10 11:17:58 -07001063 int vlan_id = 0;
Sunil Raviaf8751c2023-03-29 11:35:17 -07001064 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
1065 u8 pmk_r1[PMK_LEN_MAX];
1066 size_t key_len;
1067 int ret = -1;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001068
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001069 os_memset(&PTK, 0, sizeof(PTK));
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001070 for (;;) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001071 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
1072 !wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001073 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07001074 sm->p2p_dev_addr, pmk, &pmk_len,
1075 &vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07001076 if (!pmk)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001077 break;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001078#ifdef CONFIG_IEEE80211R_AP
1079 if (wpa_key_mgmt_ft_psk(sm->wpa_key_mgmt)) {
1080 os_memcpy(sm->xxkey, pmk, pmk_len);
1081 sm->xxkey_len = pmk_len;
1082 }
1083#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08001084 } else {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001085 pmk = sm->PMK;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08001086 pmk_len = sm->pmk_len;
1087 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001088
Sunil Raviaf8751c2023-03-29 11:35:17 -07001089 if (wpa_derive_ptk(sm, sm->alt_SNonce, pmk, pmk_len, &PTK, 0,
1090 pmk_r0, pmk_r1, pmk_r0_name, &key_len) < 0)
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08001091 break;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001092
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001093 if (wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK,
1094 data, data_len) == 0) {
Hai Shalom021b0b52019-04-10 11:17:58 -07001095 if (sm->PMK != pmk) {
1096 os_memcpy(sm->PMK, pmk, pmk_len);
1097 sm->pmk_len = pmk_len;
1098 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001099 ok = 1;
1100 break;
1101 }
1102
Roshan Pius3a1667e2018-07-03 15:17:14 -07001103 if (!wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
1104 wpa_key_mgmt_sae(sm->wpa_key_mgmt))
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001105 break;
1106 }
1107
1108 if (!ok) {
1109 wpa_printf(MSG_DEBUG,
1110 "WPA: Earlier SNonce did not result in matching MIC");
Sunil Raviaf8751c2023-03-29 11:35:17 -07001111 goto fail;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001112 }
1113
1114 wpa_printf(MSG_DEBUG,
1115 "WPA: Earlier SNonce resulted in matching MIC");
1116 sm->alt_snonce_valid = 0;
Hai Shalom021b0b52019-04-10 11:17:58 -07001117
1118 if (vlan_id && wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
1119 wpa_auth_update_vlan(sm->wpa_auth, sm->addr, vlan_id) < 0)
Sunil Raviaf8751c2023-03-29 11:35:17 -07001120 goto fail;
1121
1122#ifdef CONFIG_IEEE80211R_AP
1123 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) && !sm->ft_completed) {
1124 wpa_printf(MSG_DEBUG, "FT: Store PMK-R0/PMK-R1");
1125 wpa_auth_ft_store_keys(sm, pmk_r0, pmk_r1, pmk_r0_name,
1126 key_len);
1127 }
1128#endif /* CONFIG_IEEE80211R_AP */
Hai Shalom021b0b52019-04-10 11:17:58 -07001129
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001130 os_memcpy(sm->SNonce, sm->alt_SNonce, WPA_NONCE_LEN);
1131 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
Hai Shalom81f62d82019-07-22 12:10:00 -07001132 forced_memzero(&PTK, sizeof(PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07001133 sm->PTK_valid = true;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001134
Sunil Raviaf8751c2023-03-29 11:35:17 -07001135 ret = 0;
1136fail:
1137 forced_memzero(pmk_r0, sizeof(pmk_r0));
1138 forced_memzero(pmk_r1, sizeof(pmk_r1));
1139 return ret;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001140}
1141
1142
Hai Shaloma20dcd72022-02-04 13:43:00 -08001143static bool wpa_auth_gtk_rekey_in_process(struct wpa_authenticator *wpa_auth)
1144{
1145 struct wpa_group *group;
1146
1147 for (group = wpa_auth->group; group; group = group->next) {
1148 if (group->GKeyDoneStations)
1149 return true;
1150 }
1151 return false;
1152}
1153
1154
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001155enum eapol_key_msg { PAIRWISE_2, PAIRWISE_4, GROUP_2, REQUEST };
1156
1157static bool wpa_auth_valid_key_desc_ver(struct wpa_authenticator *wpa_auth,
1158 struct wpa_state_machine *sm, u16 ver)
1159{
1160 if (ver > WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1161 wpa_printf(MSG_INFO, "RSN: " MACSTR
1162 " used undefined Key Descriptor Version %d",
1163 MAC2STR(wpa_auth_get_spa(sm)), ver);
1164 return false;
1165 }
1166
1167 if (!wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1168 wpa_use_cmac(sm->wpa_key_mgmt) &&
1169 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC) {
1170 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1171 LOGGER_WARNING,
1172 "advertised support for AES-128-CMAC, but did not use it");
1173 return false;
1174 }
1175
1176 if (sm->pairwise != WPA_CIPHER_TKIP &&
1177 !wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1178 !wpa_use_cmac(sm->wpa_key_mgmt) &&
1179 ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES) {
1180 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1181 LOGGER_WARNING,
1182 "did not use HMAC-SHA1-AES with CCMP/GCMP");
1183 return false;
1184 }
1185
1186 if (wpa_use_akm_defined(sm->wpa_key_mgmt) &&
1187 ver != WPA_KEY_INFO_TYPE_AKM_DEFINED) {
1188 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1189 LOGGER_WARNING,
1190 "did not use EAPOL-Key descriptor version 0 as required for AKM-defined cases");
1191 return false;
1192 }
1193
1194 return true;
1195}
1196
1197
1198static bool wpa_auth_valid_request_counter(struct wpa_authenticator *wpa_auth,
1199 struct wpa_state_machine *sm,
1200 const u8 *replay_counter)
1201{
1202
1203 if (sm->req_replay_counter_used &&
1204 os_memcmp(replay_counter, sm->req_replay_counter,
1205 WPA_REPLAY_COUNTER_LEN) <= 0) {
1206 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1207 LOGGER_WARNING,
1208 "received EAPOL-Key request with replayed counter");
1209 return false;
1210 }
1211
1212 return true;
1213}
1214
1215
1216static bool wpa_auth_valid_counter(struct wpa_authenticator *wpa_auth,
1217 struct wpa_state_machine *sm,
1218 const struct wpa_eapol_key *key,
1219 enum eapol_key_msg msg,
1220 const char *msgtxt)
1221{
1222 int i;
1223
1224 if (msg == REQUEST)
1225 return wpa_auth_valid_request_counter(wpa_auth, sm,
1226 key->replay_counter);
1227
1228 if (wpa_replay_counter_valid(sm->key_replay, key->replay_counter))
1229 return true;
1230
1231 if (msg == PAIRWISE_2 &&
1232 wpa_replay_counter_valid(sm->prev_key_replay,
1233 key->replay_counter) &&
1234 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING &&
1235 os_memcmp(sm->SNonce, key->key_nonce, WPA_NONCE_LEN) != 0) {
1236 /*
1237 * Some supplicant implementations (e.g., Windows XP
1238 * WZC) update SNonce for each EAPOL-Key 2/4. This
1239 * breaks the workaround on accepting any of the
1240 * pending requests, so allow the SNonce to be updated
1241 * even if we have already sent out EAPOL-Key 3/4.
1242 */
1243 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1244 LOGGER_DEBUG,
1245 "Process SNonce update from STA based on retransmitted EAPOL-Key 1/4");
1246 sm->update_snonce = 1;
1247 os_memcpy(sm->alt_SNonce, sm->SNonce, WPA_NONCE_LEN);
1248 sm->alt_snonce_valid = true;
1249 os_memcpy(sm->alt_replay_counter,
1250 sm->key_replay[0].counter,
1251 WPA_REPLAY_COUNTER_LEN);
1252 return true;
1253 }
1254
1255 if (msg == PAIRWISE_4 && sm->alt_snonce_valid &&
1256 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING &&
1257 os_memcmp(key->replay_counter, sm->alt_replay_counter,
1258 WPA_REPLAY_COUNTER_LEN) == 0) {
1259 /*
1260 * Supplicant may still be using the old SNonce since
1261 * there was two EAPOL-Key 2/4 messages and they had
1262 * different SNonce values.
1263 */
1264 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1265 LOGGER_DEBUG,
1266 "Try to process received EAPOL-Key 4/4 based on old Replay Counter and SNonce from an earlier EAPOL-Key 1/4");
1267 return true;
1268 }
1269
1270 if (msg == PAIRWISE_2 &&
1271 wpa_replay_counter_valid(sm->prev_key_replay,
1272 key->replay_counter) &&
1273 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING) {
1274 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1275 LOGGER_DEBUG,
1276 "ignore retransmitted EAPOL-Key %s - SNonce did not change",
1277 msgtxt);
1278 } else {
1279 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1280 LOGGER_DEBUG,
1281 "received EAPOL-Key %s with unexpected replay counter",
1282 msgtxt);
1283 }
1284 for (i = 0; i < RSNA_MAX_EAPOL_RETRIES; i++) {
1285 if (!sm->key_replay[i].valid)
1286 break;
1287 wpa_hexdump(MSG_DEBUG, "pending replay counter",
1288 sm->key_replay[i].counter,
1289 WPA_REPLAY_COUNTER_LEN);
1290 }
1291 wpa_hexdump(MSG_DEBUG, "received replay counter",
1292 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
1293 return false;
1294}
1295
1296
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001297void wpa_receive(struct wpa_authenticator *wpa_auth,
1298 struct wpa_state_machine *sm,
1299 u8 *data, size_t data_len)
1300{
1301 struct ieee802_1x_hdr *hdr;
1302 struct wpa_eapol_key *key;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001303 u16 key_info, ver, key_data_length;
1304 enum eapol_key_msg msg;
1305 const char *msgtxt;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001306 const u8 *key_data;
1307 size_t keyhdrlen, mic_len;
1308 u8 *mic;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001309 u8 *key_data_buf = NULL;
1310 size_t key_data_buf_len = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001311
Hai Shalomfdcde762020-04-02 11:19:20 -07001312 if (!wpa_auth || !wpa_auth->conf.wpa || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001313 return;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00001314
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001315 wpa_hexdump(MSG_MSGDUMP, "WPA: RX EAPOL data", data, data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001316
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001317 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001318 keyhdrlen = sizeof(*key) + mic_len + 2;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001319
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001320 if (data_len < sizeof(*hdr) + keyhdrlen) {
1321 wpa_printf(MSG_DEBUG, "WPA: Ignore too short EAPOL-Key frame");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001322 return;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001323 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001324
1325 hdr = (struct ieee802_1x_hdr *) data;
1326 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001327 mic = (u8 *) (key + 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001328 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001329 key_data = mic + mic_len + 2;
1330 key_data_length = WPA_GET_BE16(mic + mic_len);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001331 wpa_printf(MSG_DEBUG, "WPA: Received EAPOL-Key from " MACSTR
Hai Shalomfdcde762020-04-02 11:19:20 -07001332 " key_info=0x%x type=%u mic_len=%zu key_data_length=%u",
Sunil Raviaf8751c2023-03-29 11:35:17 -07001333 MAC2STR(wpa_auth_get_spa(sm)), key_info, key->type,
Hai Shalomfdcde762020-04-02 11:19:20 -07001334 mic_len, key_data_length);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001335 wpa_hexdump(MSG_MSGDUMP,
1336 "WPA: EAPOL-Key header (ending before Key MIC)",
1337 key, sizeof(*key));
1338 wpa_hexdump(MSG_MSGDUMP, "WPA: EAPOL-Key Key MIC",
1339 mic, mic_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001340 if (key_data_length > data_len - sizeof(*hdr) - keyhdrlen) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001341 wpa_printf(MSG_INFO,
1342 "WPA: Invalid EAPOL-Key frame - key_data overflow (%d > %zu)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001343 key_data_length,
Hai Shalomfdcde762020-04-02 11:19:20 -07001344 data_len - sizeof(*hdr) - keyhdrlen);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001345 return;
1346 }
1347
1348 if (sm->wpa == WPA_VERSION_WPA2) {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001349 if (key->type == EAPOL_KEY_TYPE_WPA) {
1350 /*
1351 * Some deployed station implementations seem to send
1352 * msg 4/4 with incorrect type value in WPA2 mode.
1353 */
Hai Shalomfdcde762020-04-02 11:19:20 -07001354 wpa_printf(MSG_DEBUG,
1355 "Workaround: Allow EAPOL-Key with unexpected WPA type in RSN mode");
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001356 } else if (key->type != EAPOL_KEY_TYPE_RSN) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001357 wpa_printf(MSG_DEBUG,
1358 "Ignore EAPOL-Key with unexpected type %d in RSN mode",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001359 key->type);
1360 return;
1361 }
1362 } else {
1363 if (key->type != EAPOL_KEY_TYPE_WPA) {
Hai Shalomfdcde762020-04-02 11:19:20 -07001364 wpa_printf(MSG_DEBUG,
1365 "Ignore EAPOL-Key with unexpected type %d in WPA mode",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001366 key->type);
1367 return;
1368 }
1369 }
1370
1371 wpa_hexdump(MSG_DEBUG, "WPA: Received Key Nonce", key->key_nonce,
1372 WPA_NONCE_LEN);
1373 wpa_hexdump(MSG_DEBUG, "WPA: Received Replay Counter",
1374 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
1375
1376 /* FIX: verify that the EAPOL-Key frame was encrypted if pairwise keys
1377 * are set */
1378
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001379 if (key_info & WPA_KEY_INFO_SMK_MESSAGE) {
1380 wpa_printf(MSG_DEBUG, "WPA: Ignore SMK message");
1381 return;
1382 }
1383
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001384 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
1385 if (!wpa_auth_valid_key_desc_ver(wpa_auth, sm, ver))
1386 goto out;
1387 if (mic_len > 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) &&
1388 sm->PTK_valid &&
1389 (ver == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
1390 ver == WPA_KEY_INFO_TYPE_AES_128_CMAC ||
1391 wpa_use_aes_key_wrap(sm->wpa_key_mgmt)) &&
1392 key_data_length >= 8 && key_data_length % 8 == 0) {
1393 key_data_length -= 8; /* AES-WRAP adds 8 bytes */
1394 key_data_buf = os_malloc(key_data_length);
1395 if (!key_data_buf)
1396 goto out;
1397 key_data_buf_len = key_data_length;
1398 if (aes_unwrap(sm->PTK.kek, sm->PTK.kek_len,
1399 key_data_length / 8, key_data, key_data_buf)) {
1400 wpa_printf(MSG_INFO,
1401 "RSN: AES unwrap failed - could not decrypt EAPOL-Key key data");
1402 goto out;
1403 }
1404 key_data = key_data_buf;
1405 wpa_hexdump_key(MSG_DEBUG, "RSN: Decrypted EAPOL-Key Key Data",
1406 key_data, key_data_length);
1407 }
1408
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001409 if (key_info & WPA_KEY_INFO_REQUEST) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001410 msg = REQUEST;
1411 msgtxt = "Request";
1412 } else if (!(key_info & WPA_KEY_INFO_KEY_TYPE)) {
1413 msg = GROUP_2;
1414 msgtxt = "2/2 Group";
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001415 } else if (key_data_length == 0 ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001416 (sm->wpa == WPA_VERSION_WPA2 &&
1417 (!(key_info & WPA_KEY_INFO_ENCR_KEY_DATA) ||
1418 key_data_buf) &&
1419 (key_info & WPA_KEY_INFO_SECURE) &&
1420 !get_ie(key_data, key_data_length, WLAN_EID_RSN)) ||
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001421 (mic_len == 0 && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA) &&
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001422 key_data_length == AES_BLOCK_SIZE)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001423 msg = PAIRWISE_4;
1424 msgtxt = "4/4 Pairwise";
1425 } else {
1426 msg = PAIRWISE_2;
1427 msgtxt = "2/4 Pairwise";
1428 }
1429
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001430 if (!wpa_auth_valid_counter(wpa_auth, sm, key, msg, msgtxt))
1431 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001432
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001433#ifdef CONFIG_FILS
1434 if (sm->wpa == WPA_VERSION_WPA2 && mic_len == 0 &&
1435 !(key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001436 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001437 "WPA: Encr Key Data bit not set even though AEAD cipher is supposed to be used - drop frame");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001438 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001439 }
1440#endif /* CONFIG_FILS */
1441
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001442 switch (msg) {
1443 case PAIRWISE_2:
1444 if (sm->wpa_ptk_state != WPA_PTK_PTKSTART &&
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001445 sm->wpa_ptk_state != WPA_PTK_PTKCALCNEGOTIATING &&
1446 (!sm->update_snonce ||
1447 sm->wpa_ptk_state != WPA_PTK_PTKINITNEGOTIATING)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001448 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1449 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001450 "received EAPOL-Key msg 2/4 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001451 sm->wpa_ptk_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001452 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001453 }
1454 random_add_randomness(key->key_nonce, WPA_NONCE_LEN);
1455 if (sm->group->reject_4way_hs_for_entropy) {
1456 /*
1457 * The system did not have enough entropy to generate
1458 * strong random numbers. Reject the first 4-way
1459 * handshake(s) and collect some entropy based on the
1460 * information from it. Once enough entropy is
1461 * available, the next atempt will trigger GMK/Key
1462 * Counter update and the station will be allowed to
1463 * continue.
1464 */
Hai Shalomfdcde762020-04-02 11:19:20 -07001465 wpa_printf(MSG_DEBUG,
1466 "WPA: Reject 4-way handshake to collect more entropy for random number generation");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001467 random_mark_pool_ready();
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001468 wpa_sta_disconnect(wpa_auth, sm->addr,
1469 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001470 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001471 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001472 break;
1473 case PAIRWISE_4:
1474 if (sm->wpa_ptk_state != WPA_PTK_PTKINITNEGOTIATING ||
1475 !sm->PTK_valid) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001476 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1477 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001478 "received EAPOL-Key msg 4/4 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001479 sm->wpa_ptk_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001480 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001481 }
1482 break;
1483 case GROUP_2:
1484 if (sm->wpa_ptk_group_state != WPA_PTK_GROUP_REKEYNEGOTIATING
1485 || !sm->PTK_valid) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001486 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1487 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001488 "received EAPOL-Key msg 2/2 in invalid state (%d) - dropped",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001489 sm->wpa_ptk_group_state);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001490 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001491 }
1492 break;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001493 case REQUEST:
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001494 if (sm->wpa_ptk_state == WPA_PTK_PTKSTART ||
1495 sm->wpa_ptk_state == WPA_PTK_PTKCALCNEGOTIATING ||
1496 sm->wpa_ptk_state == WPA_PTK_PTKCALCNEGOTIATING2 ||
1497 sm->wpa_ptk_state == WPA_PTK_PTKINITNEGOTIATING) {
1498 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
1499 LOGGER_INFO,
1500 "received EAPOL-Key Request in invalid state (%d) - dropped",
1501 sm->wpa_ptk_state);
1502 goto out;
1503 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001504 break;
1505 }
1506
Sunil Raviaf8751c2023-03-29 11:35:17 -07001507 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001508 "received EAPOL-Key frame (%s)", msgtxt);
1509
1510 if (key_info & WPA_KEY_INFO_ACK) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001511 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001512 "received invalid EAPOL-Key: Key Ack set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001513 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001514 }
1515
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001516 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
1517 !(key_info & WPA_KEY_INFO_MIC)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001518 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001519 "received invalid EAPOL-Key: Key MIC not set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001520 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001521 }
1522
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001523#ifdef CONFIG_FILS
1524 if (wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
1525 (key_info & WPA_KEY_INFO_MIC)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001526 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001527 "received invalid EAPOL-Key: Key MIC set");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001528 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001529 }
1530#endif /* CONFIG_FILS */
1531
Hai Shalome21d4e82020-04-29 16:34:06 -07001532 sm->MICVerified = false;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001533 if (sm->PTK_valid && !sm->update_snonce) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001534 if (mic_len &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001535 wpa_verify_key_mic(sm->wpa_key_mgmt, sm->pmk_len, &sm->PTK,
1536 data, data_len) &&
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001537 (msg != PAIRWISE_4 || !sm->alt_snonce_valid ||
1538 wpa_try_alt_snonce(sm, data, data_len))) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001539 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1540 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001541 "received EAPOL-Key with invalid MIC");
Hai Shalom74f70d42019-02-11 14:42:39 -08001542#ifdef TEST_FUZZ
1543 wpa_printf(MSG_INFO,
1544 "TEST: Ignore Key MIC failure for fuzz testing");
1545 goto continue_fuzz;
1546#endif /* TEST_FUZZ */
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001547 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001548 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001549#ifdef CONFIG_FILS
1550 if (!mic_len &&
1551 wpa_aead_decrypt(sm, &sm->PTK, data, data_len,
1552 &key_data_length) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001553 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1554 LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001555 "received EAPOL-Key with invalid MIC");
Hai Shalom74f70d42019-02-11 14:42:39 -08001556#ifdef TEST_FUZZ
1557 wpa_printf(MSG_INFO,
1558 "TEST: Ignore Key MIC failure for fuzz testing");
1559 goto continue_fuzz;
1560#endif /* TEST_FUZZ */
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001561 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001562 }
1563#endif /* CONFIG_FILS */
Hai Shalom74f70d42019-02-11 14:42:39 -08001564#ifdef TEST_FUZZ
1565 continue_fuzz:
1566#endif /* TEST_FUZZ */
Hai Shalome21d4e82020-04-29 16:34:06 -07001567 sm->MICVerified = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001568 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
1569 sm->pending_1_of_4_timeout = 0;
1570 }
1571
1572 if (key_info & WPA_KEY_INFO_REQUEST) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001573 if (!(key_info & WPA_KEY_INFO_SECURE)) {
1574 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1575 LOGGER_INFO,
1576 "received EAPOL-Key request without Secure=1");
1577 goto out;
1578 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001579 if (sm->MICVerified) {
1580 sm->req_replay_counter_used = 1;
1581 os_memcpy(sm->req_replay_counter, key->replay_counter,
1582 WPA_REPLAY_COUNTER_LEN);
1583 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001584 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1585 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001586 "received EAPOL-Key request with invalid MIC");
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001587 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001588 }
1589
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001590 if (key_info & WPA_KEY_INFO_ERROR) {
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08001591 if (wpa_receive_error_report(
1592 wpa_auth, sm,
1593 !(key_info & WPA_KEY_INFO_KEY_TYPE)) > 0)
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001594 goto out; /* STA entry was removed */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001595 } else if (key_info & WPA_KEY_INFO_KEY_TYPE) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001596 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1597 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001598 "received EAPOL-Key Request for new 4-Way Handshake");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001599 wpa_request_new_ptk(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001600 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001601 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1602 LOGGER_INFO,
Hai Shalomfdcde762020-04-02 11:19:20 -07001603 "received EAPOL-Key Request for GTK rekeying");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001604 eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
Hai Shaloma20dcd72022-02-04 13:43:00 -08001605 if (wpa_auth_gtk_rekey_in_process(wpa_auth))
1606 wpa_auth_logger(wpa_auth, NULL, LOGGER_DEBUG,
1607 "skip new GTK rekey - already in process");
1608 else
1609 wpa_rekey_gtk(wpa_auth, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001610 }
1611 } else {
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08001612 /* Do not allow the same key replay counter to be reused. */
1613 wpa_replay_counter_mark_invalid(sm->key_replay,
1614 key->replay_counter);
1615
1616 if (msg == PAIRWISE_2) {
1617 /*
1618 * Maintain a copy of the pending EAPOL-Key frames in
1619 * case the EAPOL-Key frame was retransmitted. This is
1620 * needed to allow EAPOL-Key msg 2/4 reply to another
1621 * pending msg 1/4 to update the SNonce to work around
1622 * unexpected supplicant behavior.
1623 */
1624 os_memcpy(sm->prev_key_replay, sm->key_replay,
1625 sizeof(sm->key_replay));
1626 } else {
1627 os_memset(sm->prev_key_replay, 0,
1628 sizeof(sm->prev_key_replay));
1629 }
1630
1631 /*
1632 * Make sure old valid counters are not accepted anymore and
1633 * do not get copied again.
1634 */
1635 wpa_replay_counter_mark_invalid(sm->key_replay, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001636 }
1637
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001638 os_free(sm->last_rx_eapol_key);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001639 sm->last_rx_eapol_key = os_memdup(data, data_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07001640 if (!sm->last_rx_eapol_key)
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001641 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001642 sm->last_rx_eapol_key_len = data_len;
1643
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08001644 sm->rx_eapol_key_secure = !!(key_info & WPA_KEY_INFO_SECURE);
Hai Shalome21d4e82020-04-29 16:34:06 -07001645 sm->EAPOLKeyReceived = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001646 sm->EAPOLKeyPairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
1647 sm->EAPOLKeyRequest = !!(key_info & WPA_KEY_INFO_REQUEST);
1648 os_memcpy(sm->SNonce, key->key_nonce, WPA_NONCE_LEN);
1649 wpa_sm_step(sm);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00001650
1651out:
1652 bin_clear_free(key_data_buf, key_data_buf_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001653}
1654
1655
1656static int wpa_gmk_to_gtk(const u8 *gmk, const char *label, const u8 *addr,
1657 const u8 *gnonce, u8 *gtk, size_t gtk_len)
1658{
Roshan Pius3a1667e2018-07-03 15:17:14 -07001659 u8 data[ETH_ALEN + WPA_NONCE_LEN + 8 + WPA_GTK_MAX_LEN];
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001660 u8 *pos;
1661 int ret = 0;
1662
1663 /* GTK = PRF-X(GMK, "Group key expansion",
1664 * AA || GNonce || Time || random data)
1665 * The example described in the IEEE 802.11 standard uses only AA and
1666 * GNonce as inputs here. Add some more entropy since this derivation
1667 * is done only at the Authenticator and as such, does not need to be
1668 * exactly same.
1669 */
Roshan Pius3a1667e2018-07-03 15:17:14 -07001670 os_memset(data, 0, sizeof(data));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001671 os_memcpy(data, addr, ETH_ALEN);
1672 os_memcpy(data + ETH_ALEN, gnonce, WPA_NONCE_LEN);
1673 pos = data + ETH_ALEN + WPA_NONCE_LEN;
1674 wpa_get_ntp_timestamp(pos);
Hai Shalom74f70d42019-02-11 14:42:39 -08001675#ifdef TEST_FUZZ
1676 os_memset(pos, 0xef, 8);
1677#endif /* TEST_FUZZ */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001678 pos += 8;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001679 if (random_get_bytes(pos, gtk_len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001680 ret = -1;
1681
Roshan Pius3a1667e2018-07-03 15:17:14 -07001682#ifdef CONFIG_SHA384
1683 if (sha384_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1684 gtk, gtk_len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001685 ret = -1;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001686#else /* CONFIG_SHA384 */
1687#ifdef CONFIG_SHA256
1688 if (sha256_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1689 gtk, gtk_len) < 0)
1690 ret = -1;
1691#else /* CONFIG_SHA256 */
1692 if (sha1_prf(gmk, WPA_GMK_LEN, label, data, sizeof(data),
1693 gtk, gtk_len) < 0)
1694 ret = -1;
1695#endif /* CONFIG_SHA256 */
1696#endif /* CONFIG_SHA384 */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001697
Hai Shalom81f62d82019-07-22 12:10:00 -07001698 forced_memzero(data, sizeof(data));
1699
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001700 return ret;
1701}
1702
1703
1704static void wpa_send_eapol_timeout(void *eloop_ctx, void *timeout_ctx)
1705{
1706 struct wpa_authenticator *wpa_auth = eloop_ctx;
1707 struct wpa_state_machine *sm = timeout_ctx;
1708
Sunil Ravia04bd252022-05-02 22:54:18 -07001709 if (sm->waiting_radius_psk) {
1710 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG,
1711 "Ignore EAPOL-Key timeout while waiting for RADIUS PSK");
1712 return;
1713 }
1714
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001715 sm->pending_1_of_4_timeout = 0;
Sunil Raviaf8751c2023-03-29 11:35:17 -07001716 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
1717 "EAPOL-Key timeout");
Hai Shalome21d4e82020-04-29 16:34:06 -07001718 sm->TimeoutEvt = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001719 wpa_sm_step(sm);
1720}
1721
1722
1723void __wpa_send_eapol(struct wpa_authenticator *wpa_auth,
1724 struct wpa_state_machine *sm, int key_info,
1725 const u8 *key_rsc, const u8 *nonce,
1726 const u8 *kde, size_t kde_len,
1727 int keyidx, int encr, int force_version)
1728{
Hai Shalomfdcde762020-04-02 11:19:20 -07001729 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001730 struct ieee802_1x_hdr *hdr;
1731 struct wpa_eapol_key *key;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001732 size_t len, mic_len, keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001733 int alg;
1734 int key_data_len, pad_len = 0;
1735 u8 *buf, *pos;
1736 int version, pairwise;
1737 int i;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001738 u8 *key_mic, *key_data;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001739
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001740 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001741 keyhdrlen = sizeof(*key) + mic_len + 2;
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001742
1743 len = sizeof(struct ieee802_1x_hdr) + keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001744
1745 if (force_version)
1746 version = force_version;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001747 else if (wpa_use_akm_defined(sm->wpa_key_mgmt))
Dmitry Shmidtf21452a2014-02-26 10:55:25 -08001748 version = WPA_KEY_INFO_TYPE_AKM_DEFINED;
Roshan Pius3a1667e2018-07-03 15:17:14 -07001749 else if (wpa_use_cmac(sm->wpa_key_mgmt))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001750 version = WPA_KEY_INFO_TYPE_AES_128_CMAC;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07001751 else if (sm->pairwise != WPA_CIPHER_TKIP)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001752 version = WPA_KEY_INFO_TYPE_HMAC_SHA1_AES;
1753 else
1754 version = WPA_KEY_INFO_TYPE_HMAC_MD5_RC4;
1755
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07001756 pairwise = !!(key_info & WPA_KEY_INFO_KEY_TYPE);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001757
Hai Shalomfdcde762020-04-02 11:19:20 -07001758 wpa_printf(MSG_DEBUG,
1759 "WPA: Send EAPOL(version=%d secure=%d mic=%d ack=%d install=%d pairwise=%d kde_len=%zu keyidx=%d encr=%d)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001760 version,
1761 (key_info & WPA_KEY_INFO_SECURE) ? 1 : 0,
1762 (key_info & WPA_KEY_INFO_MIC) ? 1 : 0,
1763 (key_info & WPA_KEY_INFO_ACK) ? 1 : 0,
1764 (key_info & WPA_KEY_INFO_INSTALL) ? 1 : 0,
Hai Shalomfdcde762020-04-02 11:19:20 -07001765 pairwise, kde_len, keyidx, encr);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001766
1767 key_data_len = kde_len;
1768
1769 if ((version == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07001770 wpa_use_aes_key_wrap(sm->wpa_key_mgmt) ||
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001771 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) && encr) {
1772 pad_len = key_data_len % 8;
1773 if (pad_len)
1774 pad_len = 8 - pad_len;
1775 key_data_len += pad_len + 8;
1776 }
1777
1778 len += key_data_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001779 if (!mic_len && encr)
1780 len += AES_BLOCK_SIZE;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001781
1782 hdr = os_zalloc(len);
Hai Shalomfdcde762020-04-02 11:19:20 -07001783 if (!hdr)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001784 return;
Hai Shalomfdcde762020-04-02 11:19:20 -07001785 hdr->version = conf->eapol_version;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001786 hdr->type = IEEE802_1X_TYPE_EAPOL_KEY;
1787 hdr->length = host_to_be16(len - sizeof(*hdr));
1788 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001789 key_mic = (u8 *) (key + 1);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001790 key_data = ((u8 *) (hdr + 1)) + keyhdrlen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001791
1792 key->type = sm->wpa == WPA_VERSION_WPA2 ?
1793 EAPOL_KEY_TYPE_RSN : EAPOL_KEY_TYPE_WPA;
1794 key_info |= version;
1795 if (encr && sm->wpa == WPA_VERSION_WPA2)
1796 key_info |= WPA_KEY_INFO_ENCR_KEY_DATA;
1797 if (sm->wpa != WPA_VERSION_WPA2)
1798 key_info |= keyidx << WPA_KEY_INFO_KEY_INDEX_SHIFT;
1799 WPA_PUT_BE16(key->key_info, key_info);
1800
Hai Shalomfdcde762020-04-02 11:19:20 -07001801 alg = pairwise ? sm->pairwise : conf->wpa_group;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001802 if (sm->wpa == WPA_VERSION_WPA2 && !pairwise)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001803 WPA_PUT_BE16(key->key_length, 0);
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08001804 else
1805 WPA_PUT_BE16(key->key_length, wpa_cipher_key_len(alg));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001806
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001807 for (i = RSNA_MAX_EAPOL_RETRIES - 1; i > 0; i--) {
1808 sm->key_replay[i].valid = sm->key_replay[i - 1].valid;
1809 os_memcpy(sm->key_replay[i].counter,
1810 sm->key_replay[i - 1].counter,
1811 WPA_REPLAY_COUNTER_LEN);
1812 }
1813 inc_byte_array(sm->key_replay[0].counter, WPA_REPLAY_COUNTER_LEN);
1814 os_memcpy(key->replay_counter, sm->key_replay[0].counter,
1815 WPA_REPLAY_COUNTER_LEN);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08001816 wpa_hexdump(MSG_DEBUG, "WPA: Replay Counter",
1817 key->replay_counter, WPA_REPLAY_COUNTER_LEN);
Hai Shalome21d4e82020-04-29 16:34:06 -07001818 sm->key_replay[0].valid = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001819
1820 if (nonce)
1821 os_memcpy(key->key_nonce, nonce, WPA_NONCE_LEN);
1822
1823 if (key_rsc)
1824 os_memcpy(key->key_rsc, key_rsc, WPA_KEY_RSC_LEN);
1825
1826 if (kde && !encr) {
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001827 os_memcpy(key_data, kde, kde_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001828 WPA_PUT_BE16(key_mic + mic_len, kde_len);
1829#ifdef CONFIG_FILS
Roshan Pius3a1667e2018-07-03 15:17:14 -07001830 } else if (!mic_len && kde) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001831 const u8 *aad[1];
1832 size_t aad_len[1];
1833
1834 WPA_PUT_BE16(key_mic, AES_BLOCK_SIZE + kde_len);
1835 wpa_hexdump_key(MSG_DEBUG, "Plaintext EAPOL-Key Key Data",
1836 kde, kde_len);
1837
1838 wpa_hexdump_key(MSG_DEBUG, "WPA: KEK",
1839 sm->PTK.kek, sm->PTK.kek_len);
1840 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
1841 * to Key Data (exclusive). */
1842 aad[0] = (u8 *) hdr;
1843 aad_len[0] = key_mic + 2 - (u8 *) hdr;
1844 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len, kde, kde_len,
1845 1, aad, aad_len, key_mic + 2) < 0) {
1846 wpa_printf(MSG_DEBUG, "WPA: AES-SIV encryption failed");
1847 return;
1848 }
1849
1850 wpa_hexdump(MSG_DEBUG, "WPA: Encrypted Key Data from SIV",
1851 key_mic + 2, AES_BLOCK_SIZE + kde_len);
1852#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001853 } else if (encr && kde) {
1854 buf = os_zalloc(key_data_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07001855 if (!buf) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001856 os_free(hdr);
1857 return;
1858 }
1859 pos = buf;
1860 os_memcpy(pos, kde, kde_len);
1861 pos += kde_len;
1862
1863 if (pad_len)
1864 *pos++ = 0xdd;
1865
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001866 wpa_hexdump_key(MSG_DEBUG,
1867 "Plaintext EAPOL-Key Key Data (+ padding)",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001868 buf, key_data_len);
1869 if (version == WPA_KEY_INFO_TYPE_HMAC_SHA1_AES ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07001870 wpa_use_aes_key_wrap(sm->wpa_key_mgmt) ||
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001871 version == WPA_KEY_INFO_TYPE_AES_128_CMAC) {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001872 wpa_hexdump_key(MSG_DEBUG, "RSN: AES-WRAP using KEK",
1873 sm->PTK.kek, sm->PTK.kek_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001874 if (aes_wrap(sm->PTK.kek, sm->PTK.kek_len,
1875 (key_data_len - 8) / 8, buf, key_data)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001876 os_free(hdr);
Sunil Ravia04bd252022-05-02 22:54:18 -07001877 bin_clear_free(buf, key_data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001878 return;
1879 }
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001880 wpa_hexdump(MSG_DEBUG,
1881 "RSN: Encrypted Key Data from AES-WRAP",
1882 key_data, key_data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001883 WPA_PUT_BE16(key_mic + mic_len, key_data_len);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001884#if !defined(CONFIG_NO_RC4) && !defined(CONFIG_FIPS)
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001885 } else if (sm->PTK.kek_len == 16) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001886 u8 ek[32];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001887
1888 wpa_printf(MSG_DEBUG,
1889 "WPA: Encrypt Key Data using RC4");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001890 os_memcpy(key->key_iv,
1891 sm->group->Counter + WPA_NONCE_LEN - 16, 16);
1892 inc_byte_array(sm->group->Counter, WPA_NONCE_LEN);
1893 os_memcpy(ek, key->key_iv, 16);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001894 os_memcpy(ek + 16, sm->PTK.kek, sm->PTK.kek_len);
1895 os_memcpy(key_data, buf, key_data_len);
1896 rc4_skip(ek, 32, 256, key_data, key_data_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001897 WPA_PUT_BE16(key_mic + mic_len, key_data_len);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001898#endif /* !(CONFIG_NO_RC4 || CONFIG_FIPS) */
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001899 } else {
1900 os_free(hdr);
Sunil Ravia04bd252022-05-02 22:54:18 -07001901 bin_clear_free(buf, key_data_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001902 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001903 }
Sunil Ravia04bd252022-05-02 22:54:18 -07001904 bin_clear_free(buf, key_data_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001905 }
1906
1907 if (key_info & WPA_KEY_INFO_MIC) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08001908 if (!sm->PTK_valid || !mic_len) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001909 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1910 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07001911 "PTK not valid when sending EAPOL-Key frame");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001912 os_free(hdr);
1913 return;
1914 }
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001915
Roshan Pius3a1667e2018-07-03 15:17:14 -07001916 if (wpa_eapol_key_mic(sm->PTK.kck, sm->PTK.kck_len,
1917 sm->wpa_key_mgmt, version,
1918 (u8 *) hdr, len, key_mic) < 0) {
1919 os_free(hdr);
1920 return;
1921 }
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07001922#ifdef CONFIG_TESTING_OPTIONS
1923 if (!pairwise &&
Hai Shalomfdcde762020-04-02 11:19:20 -07001924 conf->corrupt_gtk_rekey_mic_probability > 0.0 &&
1925 drand48() < conf->corrupt_gtk_rekey_mic_probability) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07001926 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
1927 LOGGER_INFO,
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07001928 "Corrupting group EAPOL-Key Key MIC");
Dmitry Shmidt807291d2015-01-27 13:40:23 -08001929 key_mic[0]++;
Dmitry Shmidt51b6ea82013-05-08 10:42:09 -07001930 }
1931#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001932 }
1933
Hai Shalomfdcde762020-04-02 11:19:20 -07001934 wpa_auth_set_eapol(wpa_auth, sm->addr, WPA_EAPOL_inc_EapolFramesTx, 1);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001935 wpa_hexdump(MSG_DEBUG, "Send EAPOL-Key msg", hdr, len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001936 wpa_auth_send_eapol(wpa_auth, sm->addr, (u8 *) hdr, len,
Kai Shie75b0652020-11-24 20:31:29 -08001937 sm->pairwise_set);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001938 os_free(hdr);
1939}
1940
1941
Sunil Ravi2a14cf12023-11-21 00:54:38 +00001942static int wpa_auth_get_sta_count(struct wpa_authenticator *wpa_auth)
1943{
1944 if (!wpa_auth->cb->get_sta_count)
1945 return -1;
1946
1947 return wpa_auth->cb->get_sta_count(wpa_auth->cb_ctx);
1948}
1949
1950
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001951static void wpa_send_eapol(struct wpa_authenticator *wpa_auth,
1952 struct wpa_state_machine *sm, int key_info,
1953 const u8 *key_rsc, const u8 *nonce,
1954 const u8 *kde, size_t kde_len,
1955 int keyidx, int encr)
1956{
1957 int timeout_ms;
1958 int pairwise = key_info & WPA_KEY_INFO_KEY_TYPE;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08001959 u32 ctr;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001960
Hai Shalomfdcde762020-04-02 11:19:20 -07001961 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001962 return;
1963
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001964 ctr = pairwise ? sm->TimeoutCtr : sm->GTimeoutCtr;
1965
1966#ifdef CONFIG_TESTING_OPTIONS
1967 /* When delay_eapol_tx is true, delay the EAPOL-Key transmission by
1968 * sending it only on the last attempt after all timeouts for the prior
1969 * skipped attemps. */
1970 if (wpa_auth->conf.delay_eapol_tx &&
1971 ctr != wpa_auth->conf.wpa_pairwise_update_count) {
1972 wpa_msg(sm->wpa_auth->conf.msg_ctx, MSG_INFO,
1973 "DELAY-EAPOL-TX-%d", ctr);
1974 goto skip_tx;
1975 }
1976#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001977 __wpa_send_eapol(wpa_auth, sm, key_info, key_rsc, nonce, kde, kde_len,
1978 keyidx, encr, 0);
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00001979#ifdef CONFIG_TESTING_OPTIONS
1980skip_tx:
1981#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001982
Sunil Ravi2a14cf12023-11-21 00:54:38 +00001983 if (ctr == 1 && wpa_auth->conf.tx_status) {
1984 if (pairwise)
1985 timeout_ms = eapol_key_timeout_first;
1986 else if (wpa_auth_get_sta_count(wpa_auth) > 100)
1987 timeout_ms = eapol_key_timeout_first_group * 2;
1988 else
1989 timeout_ms = eapol_key_timeout_first_group;
1990 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001991 timeout_ms = eapol_key_timeout_subseq;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00001992 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07001993 if (wpa_auth->conf.wpa_disable_eapol_key_retries &&
1994 (!pairwise || (key_info & WPA_KEY_INFO_MIC)))
1995 timeout_ms = eapol_key_timeout_no_retrans;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001996 if (pairwise && ctr == 1 && !(key_info & WPA_KEY_INFO_MIC))
1997 sm->pending_1_of_4_timeout = 1;
Hai Shalom74f70d42019-02-11 14:42:39 -08001998#ifdef TEST_FUZZ
1999 timeout_ms = 1;
2000#endif /* TEST_FUZZ */
Kai Shie75b0652020-11-24 20:31:29 -08002001#ifdef CONFIG_TESTING_OPTIONS
2002 if(wpa_auth->conf.enable_eapol_large_timeout) {
2003 timeout_ms = 50 * 1000;
2004 }
2005#endif
Hai Shalomfdcde762020-04-02 11:19:20 -07002006 wpa_printf(MSG_DEBUG,
2007 "WPA: Use EAPOL-Key timeout of %u ms (retry counter %u)",
2008 timeout_ms, ctr);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002009 eloop_register_timeout(timeout_ms / 1000, (timeout_ms % 1000) * 1000,
2010 wpa_send_eapol_timeout, wpa_auth, sm);
2011}
2012
2013
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002014static int wpa_verify_key_mic(int akmp, size_t pmk_len, struct wpa_ptk *PTK,
2015 u8 *data, size_t data_len)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002016{
2017 struct ieee802_1x_hdr *hdr;
2018 struct wpa_eapol_key *key;
2019 u16 key_info;
2020 int ret = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002021 u8 mic[WPA_EAPOL_KEY_MIC_MAX_LEN], *mic_pos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002022 size_t mic_len = wpa_mic_len(akmp, pmk_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002023
2024 if (data_len < sizeof(*hdr) + sizeof(*key))
2025 return -1;
2026
2027 hdr = (struct ieee802_1x_hdr *) data;
2028 key = (struct wpa_eapol_key *) (hdr + 1);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002029 mic_pos = (u8 *) (key + 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002030 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002031 os_memcpy(mic, mic_pos, mic_len);
2032 os_memset(mic_pos, 0, mic_len);
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002033 if (wpa_eapol_key_mic(PTK->kck, PTK->kck_len, akmp,
2034 key_info & WPA_KEY_INFO_TYPE_MASK,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002035 data, data_len, mic_pos) ||
2036 os_memcmp_const(mic, mic_pos, mic_len) != 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002037 ret = -1;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002038 os_memcpy(mic_pos, mic, mic_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002039 return ret;
2040}
2041
2042
2043void wpa_remove_ptk(struct wpa_state_machine *sm)
2044{
Hai Shalome21d4e82020-04-29 16:34:06 -07002045 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002046 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
Hai Shalom60840252021-02-19 19:02:11 -08002047
2048 wpa_auth_remove_ptksa(sm->wpa_auth, sm->addr, sm->pairwise);
2049
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002050 if (wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 0, NULL,
Hai Shalomfdcde762020-04-02 11:19:20 -07002051 0, KEY_FLAG_PAIRWISE))
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002052 wpa_printf(MSG_DEBUG,
2053 "RSN: PTK removal from the driver failed");
Hai Shalomfdcde762020-04-02 11:19:20 -07002054 if (sm->use_ext_key_id &&
2055 wpa_auth_set_key(sm->wpa_auth, 0, WPA_ALG_NONE, sm->addr, 1, NULL,
2056 0, KEY_FLAG_PAIRWISE))
2057 wpa_printf(MSG_DEBUG,
2058 "RSN: PTK Key ID 1 removal from the driver failed");
Hai Shalome21d4e82020-04-29 16:34:06 -07002059 sm->pairwise_set = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002060 eloop_cancel_timeout(wpa_rekey_ptk, sm->wpa_auth, sm);
2061}
2062
2063
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002064int wpa_auth_sm_event(struct wpa_state_machine *sm, enum wpa_event event)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002065{
2066 int remove_ptk = 1;
2067
Hai Shalomfdcde762020-04-02 11:19:20 -07002068 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002069 return -1;
2070
Sunil Raviaf8751c2023-03-29 11:35:17 -07002071 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002072 "event %d notification", event);
2073
2074 switch (event) {
2075 case WPA_AUTH:
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002076#ifdef CONFIG_MESH
2077 /* PTKs are derived through AMPE */
2078 if (wpa_auth_start_ampe(sm->wpa_auth, sm->addr)) {
2079 /* not mesh */
2080 break;
2081 }
2082 return 0;
2083#endif /* CONFIG_MESH */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002084 case WPA_ASSOC:
2085 break;
2086 case WPA_DEAUTH:
2087 case WPA_DISASSOC:
Hai Shalome21d4e82020-04-29 16:34:06 -07002088 sm->DeauthenticationRequest = true;
Hai Shalom1dc4d202019-04-29 16:22:27 -07002089 os_memset(sm->PMK, 0, sizeof(sm->PMK));
2090 sm->pmk_len = 0;
Sunil Ravia04bd252022-05-02 22:54:18 -07002091#ifdef CONFIG_IEEE80211R_AP
Hai Shalom1dc4d202019-04-29 16:22:27 -07002092 os_memset(sm->xxkey, 0, sizeof(sm->xxkey));
2093 sm->xxkey_len = 0;
Hai Shalom81f62d82019-07-22 12:10:00 -07002094 os_memset(sm->pmk_r1, 0, sizeof(sm->pmk_r1));
2095 sm->pmk_r1_len = 0;
Hai Shalom1dc4d202019-04-29 16:22:27 -07002096#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002097 break;
2098 case WPA_REAUTH:
2099 case WPA_REAUTH_EAPOL:
2100 if (!sm->started) {
2101 /*
2102 * When using WPS, we may end up here if the STA
2103 * manages to re-associate without the previous STA
2104 * entry getting removed. Consequently, we need to make
2105 * sure that the WPA state machines gets initialized
2106 * properly at this point.
2107 */
Hai Shalomfdcde762020-04-02 11:19:20 -07002108 wpa_printf(MSG_DEBUG,
2109 "WPA state machine had not been started - initialize now");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002110 sm->started = 1;
Hai Shalome21d4e82020-04-29 16:34:06 -07002111 sm->Init = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002112 if (wpa_sm_step(sm) == 1)
2113 return 1; /* should not really happen */
Hai Shalome21d4e82020-04-29 16:34:06 -07002114 sm->Init = false;
2115 sm->AuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002116 break;
2117 }
Hai Shalomfdcde762020-04-02 11:19:20 -07002118
Sunil Ravia04bd252022-05-02 22:54:18 -07002119 if (sm->ptkstart_without_success > 3) {
2120 wpa_printf(MSG_INFO,
2121 "WPA: Multiple EAP reauth attempts without 4-way handshake completion, disconnect "
2122 MACSTR, MAC2STR(sm->addr));
2123 sm->Disconnect = true;
2124 break;
2125 }
2126
Hai Shalomfdcde762020-04-02 11:19:20 -07002127 if (!sm->use_ext_key_id &&
2128 sm->wpa_auth->conf.wpa_deny_ptk0_rekey) {
2129 wpa_printf(MSG_INFO,
2130 "WPA: PTK0 rekey not allowed, disconnect "
Sunil Raviaf8751c2023-03-29 11:35:17 -07002131 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -07002132 sm->Disconnect = true;
Hai Shalomfdcde762020-04-02 11:19:20 -07002133 /* Try to encourage the STA to reconnect */
2134 sm->disconnect_reason =
2135 WLAN_REASON_CLASS3_FRAME_FROM_NONASSOC_STA;
2136 break;
2137 }
2138
2139 if (sm->use_ext_key_id)
2140 sm->keyidx_active ^= 1; /* flip Key ID */
2141
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002142 if (sm->GUpdateStationKeys) {
2143 /*
2144 * Reauthentication cancels the pending group key
2145 * update for this STA.
2146 */
2147 sm->group->GKeyDoneStations--;
Hai Shalome21d4e82020-04-29 16:34:06 -07002148 sm->GUpdateStationKeys = false;
2149 sm->PtkGroupInit = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002150 }
Hai Shalome21d4e82020-04-29 16:34:06 -07002151 sm->ReAuthenticationRequest = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002152 break;
2153 case WPA_ASSOC_FT:
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002154#ifdef CONFIG_IEEE80211R_AP
Hai Shalomfdcde762020-04-02 11:19:20 -07002155 wpa_printf(MSG_DEBUG,
2156 "FT: Retry PTK configuration after association");
Hai Shalomb755a2a2020-04-23 21:49:02 -07002157 wpa_ft_install_ptk(sm, 1);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002158
2159 /* Using FT protocol, not WPA auth state machine */
2160 sm->ft_completed = 1;
Hai Shalom81f62d82019-07-22 12:10:00 -07002161 wpa_auth_set_ptk_rekey_timer(sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002162 return 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002163#else /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002164 break;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002165#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002166 case WPA_ASSOC_FILS:
2167#ifdef CONFIG_FILS
2168 wpa_printf(MSG_DEBUG,
2169 "FILS: TK configuration after association");
2170 fils_set_tk(sm);
2171 sm->fils_completed = 1;
2172 return 0;
2173#else /* CONFIG_FILS */
2174 break;
2175#endif /* CONFIG_FILS */
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02002176 case WPA_DRV_STA_REMOVED:
Hai Shalome21d4e82020-04-29 16:34:06 -07002177 sm->tk_already_set = false;
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02002178 return 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002179 }
2180
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002181#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002182 sm->ft_completed = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002183#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002184
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002185 if (sm->mgmt_frame_prot && event == WPA_AUTH)
2186 remove_ptk = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002187#ifdef CONFIG_FILS
2188 if (wpa_key_mgmt_fils(sm->wpa_key_mgmt) &&
2189 (event == WPA_AUTH || event == WPA_ASSOC))
2190 remove_ptk = 0;
2191#endif /* CONFIG_FILS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002192
2193 if (remove_ptk) {
Hai Shalome21d4e82020-04-29 16:34:06 -07002194 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002195 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
2196
2197 if (event != WPA_REAUTH_EAPOL)
2198 wpa_remove_ptk(sm);
2199 }
2200
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002201 if (sm->in_step_loop) {
2202 /*
2203 * wpa_sm_step() is already running - avoid recursive call to
2204 * it by making the existing loop process the new update.
2205 */
Hai Shalome21d4e82020-04-29 16:34:06 -07002206 sm->changed = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002207 return 0;
2208 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002209 return wpa_sm_step(sm);
2210}
2211
2212
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002213SM_STATE(WPA_PTK, INITIALIZE)
2214{
2215 SM_ENTRY_MA(WPA_PTK, INITIALIZE, wpa_ptk);
2216 if (sm->Init) {
2217 /* Init flag is not cleared here, so avoid busy
2218 * loop by claiming nothing changed. */
Hai Shalome21d4e82020-04-29 16:34:06 -07002219 sm->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002220 }
2221
2222 sm->keycount = 0;
2223 if (sm->GUpdateStationKeys)
2224 sm->group->GKeyDoneStations--;
Hai Shalome21d4e82020-04-29 16:34:06 -07002225 sm->GUpdateStationKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002226 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07002227 sm->PInitAKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002228 if (1 /* Unicast cipher supported AND (ESS OR ((IBSS or WDS) and
2229 * Local AA > Remote AA)) */) {
Hai Shalome21d4e82020-04-29 16:34:06 -07002230 sm->Pair = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002231 }
2232 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portEnabled, 0);
2233 wpa_remove_ptk(sm);
2234 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portValid, 0);
2235 sm->TimeoutCtr = 0;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002236 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
2237 sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP ||
2238 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002239 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
2240 WPA_EAPOL_authorized, 0);
2241 }
2242}
2243
2244
2245SM_STATE(WPA_PTK, DISCONNECT)
2246{
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002247 u16 reason = sm->disconnect_reason;
2248
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002249 SM_ENTRY_MA(WPA_PTK, DISCONNECT, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002250 sm->Disconnect = false;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002251 sm->disconnect_reason = 0;
2252 if (!reason)
2253 reason = WLAN_REASON_PREV_AUTH_NOT_VALID;
2254 wpa_sta_disconnect(sm->wpa_auth, sm->addr, reason);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002255}
2256
2257
2258SM_STATE(WPA_PTK, DISCONNECTED)
2259{
2260 SM_ENTRY_MA(WPA_PTK, DISCONNECTED, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002261 sm->DeauthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002262}
2263
2264
2265SM_STATE(WPA_PTK, AUTHENTICATION)
2266{
2267 SM_ENTRY_MA(WPA_PTK, AUTHENTICATION, wpa_ptk);
2268 os_memset(&sm->PTK, 0, sizeof(sm->PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07002269 sm->PTK_valid = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002270 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portControl_Auto,
2271 1);
2272 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portEnabled, 1);
Hai Shalome21d4e82020-04-29 16:34:06 -07002273 sm->AuthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002274}
2275
2276
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002277static void wpa_group_ensure_init(struct wpa_authenticator *wpa_auth,
2278 struct wpa_group *group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002279{
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002280 if (group->first_sta_seen)
2281 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002282 /*
2283 * System has run bit further than at the time hostapd was started
2284 * potentially very early during boot up. This provides better chances
2285 * of collecting more randomness on embedded systems. Re-initialize the
2286 * GMK and Counter here to improve their strength if there was not
2287 * enough entropy available immediately after system startup.
2288 */
Hai Shalomfdcde762020-04-02 11:19:20 -07002289 wpa_printf(MSG_DEBUG,
2290 "WPA: Re-initialize GMK/Counter on first station");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002291 if (random_pool_ready() != 1) {
Hai Shalomfdcde762020-04-02 11:19:20 -07002292 wpa_printf(MSG_INFO,
2293 "WPA: Not enough entropy in random pool to proceed - reject first 4-way handshake");
Hai Shalome21d4e82020-04-29 16:34:06 -07002294 group->reject_4way_hs_for_entropy = true;
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002295 } else {
Hai Shalome21d4e82020-04-29 16:34:06 -07002296 group->first_sta_seen = true;
2297 group->reject_4way_hs_for_entropy = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002298 }
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002299
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002300 if (wpa_group_init_gmk_and_counter(wpa_auth, group) < 0 ||
2301 wpa_gtk_update(wpa_auth, group) < 0 ||
2302 wpa_group_config_group_keys(wpa_auth, group) < 0) {
2303 wpa_printf(MSG_INFO, "WPA: GMK/GTK setup failed");
Hai Shalome21d4e82020-04-29 16:34:06 -07002304 group->first_sta_seen = false;
2305 group->reject_4way_hs_for_entropy = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002306 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002307}
2308
2309
2310SM_STATE(WPA_PTK, AUTHENTICATION2)
2311{
2312 SM_ENTRY_MA(WPA_PTK, AUTHENTICATION2, wpa_ptk);
2313
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08002314 wpa_group_ensure_init(sm->wpa_auth, sm->group);
Hai Shalome21d4e82020-04-29 16:34:06 -07002315 sm->ReAuthenticationRequest = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002316
Dmitry Shmidt04949592012-07-19 12:16:46 -07002317 /*
2318 * Definition of ANonce selection in IEEE Std 802.11i-2004 is somewhat
2319 * ambiguous. The Authenticator state machine uses a counter that is
2320 * incremented by one for each 4-way handshake. However, the security
2321 * analysis of 4-way handshake points out that unpredictable nonces
2322 * help in preventing precomputation attacks. Instead of the state
2323 * machine definition, use an unpredictable nonce value here to provide
2324 * stronger protection against potential precomputation attacks.
2325 */
2326 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) {
Hai Shalomfdcde762020-04-02 11:19:20 -07002327 wpa_printf(MSG_ERROR,
2328 "WPA: Failed to get random data for ANonce.");
Hai Shalome21d4e82020-04-29 16:34:06 -07002329 sm->Disconnect = true;
Dmitry Shmidt04949592012-07-19 12:16:46 -07002330 return;
2331 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002332 wpa_hexdump(MSG_DEBUG, "WPA: Assign ANonce", sm->ANonce,
2333 WPA_NONCE_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002334 /* IEEE 802.11i does not clear TimeoutCtr here, but this is more
2335 * logical place than INITIALIZE since AUTHENTICATION2 can be
2336 * re-entered on ReAuthenticationRequest without going through
2337 * INITIALIZE. */
2338 sm->TimeoutCtr = 0;
2339}
2340
2341
Jouni Malinen1420a892017-10-01 12:32:57 +03002342static int wpa_auth_sm_ptk_update(struct wpa_state_machine *sm)
2343{
2344 if (random_get_bytes(sm->ANonce, WPA_NONCE_LEN)) {
2345 wpa_printf(MSG_ERROR,
2346 "WPA: Failed to get random data for ANonce");
Hai Shalome21d4e82020-04-29 16:34:06 -07002347 sm->Disconnect = true;
Jouni Malinen1420a892017-10-01 12:32:57 +03002348 return -1;
2349 }
2350 wpa_hexdump(MSG_DEBUG, "WPA: Assign new ANonce", sm->ANonce,
2351 WPA_NONCE_LEN);
2352 sm->TimeoutCtr = 0;
2353 return 0;
2354}
2355
2356
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002357SM_STATE(WPA_PTK, INITPMK)
2358{
2359 u8 msk[2 * PMK_LEN];
2360 size_t len = 2 * PMK_LEN;
2361
2362 SM_ENTRY_MA(WPA_PTK, INITPMK, wpa_ptk);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002363#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002364 sm->xxkey_len = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002365#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002366 if (sm->pmksa) {
2367 wpa_printf(MSG_DEBUG, "WPA: PMK from PMKSA cache");
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002368 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len);
2369 sm->pmk_len = sm->pmksa->pmk_len;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002370#ifdef CONFIG_DPP
2371 } else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP) {
2372 wpa_printf(MSG_DEBUG,
2373 "DPP: No PMKSA cache entry for STA - reject connection");
Hai Shalome21d4e82020-04-29 16:34:06 -07002374 sm->Disconnect = true;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002375 sm->disconnect_reason = WLAN_REASON_INVALID_PMKID;
2376 return;
2377#endif /* CONFIG_DPP */
Sunil Raviaf8751c2023-03-29 11:35:17 -07002378 } else if (wpa_auth_get_msk(sm->wpa_auth, wpa_auth_get_spa(sm),
2379 msk, &len) == 0) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002380 unsigned int pmk_len;
2381
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002382 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt))
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002383 pmk_len = PMK_LEN_SUITE_B_192;
2384 else
2385 pmk_len = PMK_LEN;
Hai Shalomfdcde762020-04-02 11:19:20 -07002386 wpa_printf(MSG_DEBUG,
2387 "WPA: PMK from EAPOL state machine (MSK len=%zu PMK len=%u)",
2388 len, pmk_len);
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002389 if (len < pmk_len) {
2390 wpa_printf(MSG_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07002391 "WPA: MSK not long enough (%zu) to create PMK (%u)",
2392 len, pmk_len);
Hai Shalome21d4e82020-04-29 16:34:06 -07002393 sm->Disconnect = true;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002394 return;
2395 }
2396 os_memcpy(sm->PMK, msk, pmk_len);
2397 sm->pmk_len = pmk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002398#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002399 if (len >= 2 * PMK_LEN) {
Roshan Pius3a1667e2018-07-03 15:17:14 -07002400 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
2401 os_memcpy(sm->xxkey, msk, SHA384_MAC_LEN);
2402 sm->xxkey_len = SHA384_MAC_LEN;
2403 } else {
2404 os_memcpy(sm->xxkey, msk + PMK_LEN, PMK_LEN);
2405 sm->xxkey_len = PMK_LEN;
2406 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002407 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002408#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002409 } else {
Dmitry Shmidt807291d2015-01-27 13:40:23 -08002410 wpa_printf(MSG_DEBUG, "WPA: Could not get PMK, get_msk: %p",
Paul Stewart092955c2017-02-06 09:13:09 -08002411 sm->wpa_auth->cb->get_msk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002412 sm->Disconnect = true;
Dmitry Shmidt216983b2015-02-06 10:50:36 -08002413 return;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002414 }
Hai Shalom81f62d82019-07-22 12:10:00 -07002415 forced_memzero(msk, sizeof(msk));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002416
2417 sm->req_replay_counter_used = 0;
Hai Shalome21d4e82020-04-29 16:34:06 -07002418 /* IEEE 802.11i does not set keyRun to false, but not doing this
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002419 * will break reauthentication since EAPOL state machines may not be
2420 * get into AUTHENTICATING state that clears keyRun before WPA state
2421 * machine enters AUTHENTICATION2 state and goes immediately to INITPMK
2422 * state and takes PMK from the previously used AAA Key. This will
2423 * eventually fail in 4-Way Handshake because Supplicant uses PMK
Hai Shalome21d4e82020-04-29 16:34:06 -07002424 * derived from the new AAA Key. Setting keyRun = false here seems to
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002425 * be good workaround for this issue. */
Hai Shalome21d4e82020-04-29 16:34:06 -07002426 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyRun, false);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002427}
2428
2429
2430SM_STATE(WPA_PTK, INITPSK)
2431{
2432 const u8 *psk;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002433 size_t psk_len;
2434
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002435 SM_ENTRY_MA(WPA_PTK, INITPSK, wpa_ptk);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002436 psk = wpa_auth_get_psk(sm->wpa_auth, sm->addr, sm->p2p_dev_addr, NULL,
Hai Shalom021b0b52019-04-10 11:17:58 -07002437 &psk_len, NULL);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002438 if (psk) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002439 os_memcpy(sm->PMK, psk, psk_len);
2440 sm->pmk_len = psk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002441#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002442 sm->xxkey_len = PMK_LEN;
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002443#ifdef CONFIG_SAE
2444 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE_EXT_KEY &&
2445 (psk_len == SHA512_MAC_LEN || psk_len == SHA384_MAC_LEN ||
2446 psk_len == SHA256_MAC_LEN))
2447 sm->xxkey_len = psk_len;
2448#endif /* CONFIG_SAE */
2449 os_memcpy(sm->xxkey, psk, sm->xxkey_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002450#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002451 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002452#ifdef CONFIG_SAE
2453 if (wpa_auth_uses_sae(sm) && sm->pmksa) {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002454 wpa_printf(MSG_DEBUG, "SAE: PMK from PMKSA cache (len=%zu)",
2455 sm->pmksa->pmk_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002456 os_memcpy(sm->PMK, sm->pmksa->pmk, sm->pmksa->pmk_len);
2457 sm->pmk_len = sm->pmksa->pmk_len;
Hai Shalom021b0b52019-04-10 11:17:58 -07002458#ifdef CONFIG_IEEE80211R_AP
2459 os_memcpy(sm->xxkey, sm->pmksa->pmk, sm->pmksa->pmk_len);
2460 sm->xxkey_len = sm->pmksa->pmk_len;
2461#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002462 }
2463#endif /* CONFIG_SAE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002464 sm->req_replay_counter_used = 0;
2465}
2466
2467
2468SM_STATE(WPA_PTK, PTKSTART)
2469{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002470 u8 *buf;
2471 size_t buf_len = 2 + RSN_SELECTOR_LEN + PMKID_LEN;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002472 u8 *pmkid = NULL;
2473 size_t kde_len = 0;
Sunil8cd6f4d2022-06-28 18:40:46 +00002474 u16 key_info;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002475#ifdef CONFIG_TESTING_OPTIONS
2476 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
2477#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002478
2479 SM_ENTRY_MA(WPA_PTK, PTKSTART, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07002480 sm->PTKRequest = false;
2481 sm->TimeoutEvt = false;
2482 sm->alt_snonce_valid = false;
Sunil Ravia04bd252022-05-02 22:54:18 -07002483 sm->ptkstart_without_success++;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002484
2485 sm->TimeoutCtr++;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08002486 if (sm->TimeoutCtr > sm->wpa_auth->conf.wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002487 /* No point in sending the EAPOL-Key - we will disconnect
2488 * immediately following this. */
2489 return;
2490 }
2491
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002492#ifdef CONFIG_IEEE80211BE
2493 if (sm->mld_assoc_link_id >= 0)
2494 buf_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN;
2495#endif /* CONFIG_IEEE80211BE */
2496#ifdef CONFIG_TESTING_OPTIONS
2497 if (conf->eapol_m1_elements)
2498 buf_len += wpabuf_len(conf->eapol_m1_elements);
2499#endif /* CONFIG_TESTING_OPTIONS */
2500
2501 buf = os_zalloc(buf_len);
2502 if (!buf)
2503 return;
2504
Sunil Raviaf8751c2023-03-29 11:35:17 -07002505 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002506 "sending 1/4 msg of 4-Way Handshake");
2507 /*
Hai Shalomce48b4a2018-09-05 11:41:35 -07002508 * For infrastructure BSS cases, it is better for the AP not to include
2509 * the PMKID KDE in EAPOL-Key msg 1/4 since it could be used to initiate
2510 * offline search for the passphrase/PSK without having to be able to
2511 * capture a 4-way handshake from a STA that has access to the network.
2512 *
2513 * For IBSS cases, addition of PMKID KDE could be considered even with
2514 * WPA2-PSK cases that use multiple PSKs, but only if there is a single
2515 * possible PSK for this STA. However, this should not be done unless
2516 * there is support for using that information on the supplicant side.
2517 * The concern about exposing PMKID unnecessarily in infrastructure BSS
2518 * cases would also apply here, but at least in the IBSS case, this
2519 * would cover a potential real use case.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002520 */
2521 if (sm->wpa == WPA_VERSION_WPA2 &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002522 (wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) ||
2523 (sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE && sm->pmksa) ||
2524 wpa_key_mgmt_sae(sm->wpa_key_mgmt)) &&
Dmitry Shmidtf21452a2014-02-26 10:55:25 -08002525 sm->wpa_key_mgmt != WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002526 pmkid = buf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002527 kde_len = 2 + RSN_SELECTOR_LEN + PMKID_LEN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002528 pmkid[0] = WLAN_EID_VENDOR_SPECIFIC;
2529 pmkid[1] = RSN_SELECTOR_LEN + PMKID_LEN;
2530 RSN_SELECTOR_PUT(&pmkid[2], RSN_KEY_DATA_PMKID);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002531 if (sm->pmksa) {
Roshan Pius3a1667e2018-07-03 15:17:14 -07002532 wpa_hexdump(MSG_DEBUG,
2533 "RSN: Message 1/4 PMKID from PMKSA entry",
2534 sm->pmksa->pmkid, PMKID_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002535 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2536 sm->pmksa->pmkid, PMKID_LEN);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002537 } else if (wpa_key_mgmt_suite_b(sm->wpa_key_mgmt)) {
2538 /* No KCK available to derive PMKID */
Roshan Pius3a1667e2018-07-03 15:17:14 -07002539 wpa_printf(MSG_DEBUG,
2540 "RSN: No KCK available to derive PMKID for message 1/4");
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002541 pmkid = NULL;
Hai Shalom81f62d82019-07-22 12:10:00 -07002542#ifdef CONFIG_FILS
2543 } else if (wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
2544 if (sm->pmkid_set) {
2545 wpa_hexdump(MSG_DEBUG,
2546 "RSN: Message 1/4 PMKID from FILS/ERP",
2547 sm->pmkid, PMKID_LEN);
2548 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2549 sm->pmkid, PMKID_LEN);
2550 } else {
2551 /* No PMKID available */
2552 wpa_printf(MSG_DEBUG,
2553 "RSN: No FILS/ERP PMKID available for message 1/4");
2554 pmkid = NULL;
2555 }
2556#endif /* CONFIG_FILS */
2557#ifdef CONFIG_IEEE80211R_AP
2558 } else if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) &&
2559 sm->ft_completed) {
2560 wpa_printf(MSG_DEBUG,
2561 "FT: No PMKID in message 1/4 when using FT protocol");
2562 pmkid = NULL;
Hai Shalom81f62d82019-07-22 12:10:00 -07002563#endif /* CONFIG_IEEE80211R_AP */
Roshan Pius3a1667e2018-07-03 15:17:14 -07002564#ifdef CONFIG_SAE
2565 } else if (wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
2566 if (sm->pmkid_set) {
2567 wpa_hexdump(MSG_DEBUG,
2568 "RSN: Message 1/4 PMKID from SAE",
2569 sm->pmkid, PMKID_LEN);
2570 os_memcpy(&pmkid[2 + RSN_SELECTOR_LEN],
2571 sm->pmkid, PMKID_LEN);
2572 } else {
2573 /* No PMKID available */
2574 wpa_printf(MSG_DEBUG,
2575 "RSN: No SAE PMKID available for message 1/4");
2576 pmkid = NULL;
2577 }
2578#endif /* CONFIG_SAE */
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002579 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002580 /*
2581 * Calculate PMKID since no PMKSA cache entry was
2582 * available with pre-calculated PMKID.
2583 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07002584 rsn_pmkid(sm->PMK, sm->pmk_len,
2585 wpa_auth_get_aa(sm),
2586 wpa_auth_get_spa(sm),
2587 &pmkid[2 + RSN_SELECTOR_LEN],
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002588 sm->wpa_key_mgmt);
Roshan Pius3a1667e2018-07-03 15:17:14 -07002589 wpa_hexdump(MSG_DEBUG,
2590 "RSN: Message 1/4 PMKID derived from PMK",
2591 &pmkid[2 + RSN_SELECTOR_LEN], PMKID_LEN);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002592 }
2593 }
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08002594 if (!pmkid)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002595 kde_len = 0;
2596
2597#ifdef CONFIG_IEEE80211BE
2598 if (sm->mld_assoc_link_id >= 0) {
2599 wpa_printf(MSG_DEBUG,
2600 "RSN: MLD: Add MAC Address KDE: kde_len=%zu",
2601 kde_len);
2602 wpa_add_kde(buf + kde_len, RSN_KEY_DATA_MAC_ADDR,
2603 sm->own_mld_addr, ETH_ALEN, NULL, 0);
2604 kde_len += 2 + RSN_SELECTOR_LEN + ETH_ALEN;
2605 }
2606#endif /* CONFIG_IEEE80211BE */
2607
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002608#ifdef CONFIG_TESTING_OPTIONS
2609 if (conf->eapol_m1_elements) {
2610 os_memcpy(buf + kde_len, wpabuf_head(conf->eapol_m1_elements),
2611 wpabuf_len(conf->eapol_m1_elements));
2612 kde_len += wpabuf_len(conf->eapol_m1_elements);
2613 }
2614#endif /* CONFIG_TESTING_OPTIONS */
2615
Sunil8cd6f4d2022-06-28 18:40:46 +00002616 key_info = WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE;
2617 if (sm->pairwise_set && sm->wpa != WPA_VERSION_WPA)
2618 key_info |= WPA_KEY_INFO_SECURE;
2619 wpa_send_eapol(sm->wpa_auth, sm, key_info, NULL,
Sunil Ravi2a14cf12023-11-21 00:54:38 +00002620 sm->ANonce, kde_len ? buf : NULL, kde_len, 0, 0);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00002621 os_free(buf);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002622}
2623
2624
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08002625static int wpa_derive_ptk(struct wpa_state_machine *sm, const u8 *snonce,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08002626 const u8 *pmk, unsigned int pmk_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002627 struct wpa_ptk *ptk, int force_sha256,
2628 u8 *pmk_r0, u8 *pmk_r1, u8 *pmk_r0_name,
2629 size_t *key_len)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002630{
Hai Shalom021b0b52019-04-10 11:17:58 -07002631 const u8 *z = NULL;
Hai Shalom60840252021-02-19 19:02:11 -08002632 size_t z_len = 0, kdk_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07002633 int akmp;
Sunil Ravi89eba102022-09-13 21:04:37 -07002634 int ret;
Hai Shalom021b0b52019-04-10 11:17:58 -07002635
Hai Shalom60840252021-02-19 19:02:11 -08002636 if (sm->wpa_auth->conf.force_kdk_derivation ||
2637 (sm->wpa_auth->conf.secure_ltf &&
Hai Shaloma20dcd72022-02-04 13:43:00 -08002638 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)))
Hai Shalom60840252021-02-19 19:02:11 -08002639 kdk_len = WPA_KDK_MAX_LEN;
2640 else
2641 kdk_len = 0;
2642
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002643#ifdef CONFIG_IEEE80211R_AP
Hai Shalom81f62d82019-07-22 12:10:00 -07002644 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
2645 if (sm->ft_completed) {
2646 u8 ptk_name[WPA_PMK_NAME_LEN];
2647
Sunil Ravi89eba102022-09-13 21:04:37 -07002648 ret = wpa_pmk_r1_to_ptk(sm->pmk_r1, sm->pmk_r1_len,
2649 sm->SNonce, sm->ANonce,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002650 wpa_auth_get_spa(sm),
2651 wpa_auth_get_aa(sm),
Sunil Ravi89eba102022-09-13 21:04:37 -07002652 sm->pmk_r1_name, ptk,
2653 ptk_name, sm->wpa_key_mgmt,
2654 sm->pairwise, kdk_len);
2655 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002656 ret = wpa_auth_derive_ptk_ft(sm, ptk, pmk_r0, pmk_r1,
2657 pmk_r0_name, key_len,
2658 kdk_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07002659 }
Sunil Ravi89eba102022-09-13 21:04:37 -07002660 if (ret) {
2661 wpa_printf(MSG_ERROR, "FT: PTK derivation failed");
2662 return ret;
2663 }
2664
2665#ifdef CONFIG_PASN
2666 if (sm->wpa_auth->conf.secure_ltf &&
2667 ieee802_11_rsnx_capab(sm->rsnxe,
2668 WLAN_RSNX_CAPAB_SECURE_LTF)) {
2669 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt,
2670 sm->pairwise);
2671 if (ret) {
2672 wpa_printf(MSG_ERROR,
2673 "FT: LTF keyseed derivation failed");
2674 }
2675 }
2676#endif /* CONFIG_PASN */
2677 return ret;
Hai Shalom81f62d82019-07-22 12:10:00 -07002678 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002679#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002680
Hai Shalom021b0b52019-04-10 11:17:58 -07002681#ifdef CONFIG_DPP2
2682 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP && sm->dpp_z) {
2683 z = wpabuf_head(sm->dpp_z);
2684 z_len = wpabuf_len(sm->dpp_z);
2685 }
2686#endif /* CONFIG_DPP2 */
2687
Hai Shalomfdcde762020-04-02 11:19:20 -07002688 akmp = sm->wpa_key_mgmt;
2689 if (force_sha256)
2690 akmp |= WPA_KEY_MGMT_PSK_SHA256;
Sunil Ravi89eba102022-09-13 21:04:37 -07002691 ret = wpa_pmk_to_ptk(pmk, pmk_len, "Pairwise key expansion",
Sunil Raviaf8751c2023-03-29 11:35:17 -07002692 wpa_auth_get_aa(sm), wpa_auth_get_spa(sm),
2693 sm->ANonce, snonce, ptk, akmp,
2694 sm->pairwise, z, z_len, kdk_len);
Sunil Ravi89eba102022-09-13 21:04:37 -07002695 if (ret) {
2696 wpa_printf(MSG_DEBUG,
2697 "WPA: PTK derivation failed");
2698 return ret;
2699 }
2700
2701#ifdef CONFIG_PASN
2702 if (sm->wpa_auth->conf.secure_ltf &&
2703 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)) {
2704 ret = wpa_ltf_keyseed(ptk, sm->wpa_key_mgmt, sm->pairwise);
2705 if (ret) {
2706 wpa_printf(MSG_DEBUG,
2707 "WPA: LTF keyseed derivation failed");
2708 }
2709 }
2710#endif /* CONFIG_PASN */
2711 return ret;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07002712}
2713
2714
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002715#ifdef CONFIG_FILS
2716
2717int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002718 size_t pmk_len, const u8 *snonce, const u8 *anonce,
2719 const u8 *dhss, size_t dhss_len,
2720 struct wpabuf *g_sta, struct wpabuf *g_ap)
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002721{
2722 u8 ick[FILS_ICK_MAX_LEN];
2723 size_t ick_len;
2724 int res;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002725 u8 fils_ft[FILS_FT_MAX_LEN];
Hai Shalom60840252021-02-19 19:02:11 -08002726 size_t fils_ft_len = 0, kdk_len;
2727
2728 if (sm->wpa_auth->conf.force_kdk_derivation ||
2729 (sm->wpa_auth->conf.secure_ltf &&
Hai Shaloma20dcd72022-02-04 13:43:00 -08002730 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)))
Hai Shalom60840252021-02-19 19:02:11 -08002731 kdk_len = WPA_KDK_MAX_LEN;
2732 else
2733 kdk_len = 0;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002734
Sunil Raviaf8751c2023-03-29 11:35:17 -07002735 res = fils_pmk_to_ptk(pmk, pmk_len, wpa_auth_get_spa(sm),
2736 wpa_auth_get_aa(sm),
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002737 snonce, anonce, dhss, dhss_len,
2738 &sm->PTK, ick, &ick_len,
2739 sm->wpa_key_mgmt, sm->pairwise,
Hai Shalom60840252021-02-19 19:02:11 -08002740 fils_ft, &fils_ft_len, kdk_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002741 if (res < 0)
2742 return res;
Sunil Ravi89eba102022-09-13 21:04:37 -07002743
2744#ifdef CONFIG_PASN
2745 if (sm->wpa_auth->conf.secure_ltf &&
2746 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF)) {
2747 res = wpa_ltf_keyseed(&sm->PTK, sm->wpa_key_mgmt, sm->pairwise);
2748 if (res) {
2749 wpa_printf(MSG_ERROR,
2750 "FILS: LTF keyseed derivation failed");
2751 return res;
2752 }
2753 }
2754#endif /* CONFIG_PASN */
2755
Hai Shalome21d4e82020-04-29 16:34:06 -07002756 sm->PTK_valid = true;
2757 sm->tk_already_set = false;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002758
2759#ifdef CONFIG_IEEE80211R_AP
2760 if (fils_ft_len) {
2761 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
2762 struct wpa_auth_config *conf = &wpa_auth->conf;
Roshan Pius3a1667e2018-07-03 15:17:14 -07002763 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002764
2765 if (wpa_derive_pmk_r0(fils_ft, fils_ft_len,
2766 conf->ssid, conf->ssid_len,
2767 conf->mobility_domain,
2768 conf->r0_key_holder,
2769 conf->r0_key_holder_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002770 wpa_auth_get_spa(sm), pmk_r0, pmk_r0_name,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002771 sm->wpa_key_mgmt) < 0)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002772 return -1;
2773
Roshan Pius3a1667e2018-07-03 15:17:14 -07002774 wpa_ft_store_pmk_fils(sm, pmk_r0, pmk_r0_name);
Hai Shalom81f62d82019-07-22 12:10:00 -07002775 forced_memzero(fils_ft, sizeof(fils_ft));
Hai Shalom021b0b52019-04-10 11:17:58 -07002776
2777 res = wpa_derive_pmk_r1_name(pmk_r0_name, conf->r1_key_holder,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002778 wpa_auth_get_spa(sm),
2779 sm->pmk_r1_name,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00002780 fils_ft_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07002781 forced_memzero(pmk_r0, PMK_LEN_MAX);
Hai Shalom021b0b52019-04-10 11:17:58 -07002782 if (res < 0)
2783 return -1;
2784 wpa_hexdump(MSG_DEBUG, "FILS+FT: PMKR1Name", sm->pmk_r1_name,
2785 WPA_PMK_NAME_LEN);
2786 sm->pmk_r1_name_valid = 1;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002787 }
2788#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002789
2790 res = fils_key_auth_sk(ick, ick_len, snonce, anonce,
Sunil Raviaf8751c2023-03-29 11:35:17 -07002791 wpa_auth_get_spa(sm),
2792 wpa_auth_get_aa(sm),
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002793 g_sta ? wpabuf_head(g_sta) : NULL,
2794 g_sta ? wpabuf_len(g_sta) : 0,
2795 g_ap ? wpabuf_head(g_ap) : NULL,
2796 g_ap ? wpabuf_len(g_ap) : 0,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002797 sm->wpa_key_mgmt, sm->fils_key_auth_sta,
2798 sm->fils_key_auth_ap,
2799 &sm->fils_key_auth_len);
Hai Shalom81f62d82019-07-22 12:10:00 -07002800 forced_memzero(ick, sizeof(ick));
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002801
2802 /* Store nonces for (Re)Association Request/Response frame processing */
2803 os_memcpy(sm->SNonce, snonce, FILS_NONCE_LEN);
2804 os_memcpy(sm->ANonce, anonce, FILS_NONCE_LEN);
2805
2806 return res;
2807}
2808
2809
2810static int wpa_aead_decrypt(struct wpa_state_machine *sm, struct wpa_ptk *ptk,
2811 u8 *buf, size_t buf_len, u16 *_key_data_len)
2812{
2813 struct ieee802_1x_hdr *hdr;
2814 struct wpa_eapol_key *key;
2815 u8 *pos;
2816 u16 key_data_len;
2817 u8 *tmp;
2818 const u8 *aad[1];
2819 size_t aad_len[1];
2820
2821 hdr = (struct ieee802_1x_hdr *) buf;
2822 key = (struct wpa_eapol_key *) (hdr + 1);
2823 pos = (u8 *) (key + 1);
2824 key_data_len = WPA_GET_BE16(pos);
2825 if (key_data_len < AES_BLOCK_SIZE ||
2826 key_data_len > buf_len - sizeof(*hdr) - sizeof(*key) - 2) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002827 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002828 "No room for AES-SIV data in the frame");
2829 return -1;
2830 }
2831 pos += 2; /* Pointing at the Encrypted Key Data field */
2832
2833 tmp = os_malloc(key_data_len);
2834 if (!tmp)
2835 return -1;
2836
2837 /* AES-SIV AAD from EAPOL protocol version field (inclusive) to
2838 * to Key Data (exclusive). */
2839 aad[0] = buf;
2840 aad_len[0] = pos - buf;
2841 if (aes_siv_decrypt(ptk->kek, ptk->kek_len, pos, key_data_len,
2842 1, aad, aad_len, tmp) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07002843 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002844 "Invalid AES-SIV data in the frame");
2845 bin_clear_free(tmp, key_data_len);
2846 return -1;
2847 }
2848
2849 /* AEAD decryption and validation completed successfully */
2850 key_data_len -= AES_BLOCK_SIZE;
2851 wpa_hexdump_key(MSG_DEBUG, "WPA: Decrypted Key Data",
2852 tmp, key_data_len);
2853
2854 /* Replace Key Data field with the decrypted version */
2855 os_memcpy(pos, tmp, key_data_len);
2856 pos -= 2; /* Key Data Length field */
2857 WPA_PUT_BE16(pos, key_data_len);
2858 bin_clear_free(tmp, key_data_len);
2859 if (_key_data_len)
2860 *_key_data_len = key_data_len;
2861 return 0;
2862}
2863
2864
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002865const u8 * wpa_fils_validate_fils_session(struct wpa_state_machine *sm,
2866 const u8 *ies, size_t ies_len,
2867 const u8 *fils_session)
2868{
2869 const u8 *ie, *end;
2870 const u8 *session = NULL;
2871
2872 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
2873 wpa_printf(MSG_DEBUG,
2874 "FILS: Not a FILS AKM - reject association");
2875 return NULL;
2876 }
2877
2878 /* Verify Session element */
2879 ie = ies;
2880 end = ((const u8 *) ie) + ies_len;
2881 while (ie + 1 < end) {
2882 if (ie + 2 + ie[1] > end)
2883 break;
2884 if (ie[0] == WLAN_EID_EXTENSION &&
2885 ie[1] >= 1 + FILS_SESSION_LEN &&
2886 ie[2] == WLAN_EID_EXT_FILS_SESSION) {
2887 session = ie;
2888 break;
2889 }
2890 ie += 2 + ie[1];
2891 }
2892
2893 if (!session) {
2894 wpa_printf(MSG_DEBUG,
2895 "FILS: %s: Could not find FILS Session element in Assoc Req - reject",
2896 __func__);
2897 return NULL;
2898 }
2899
2900 if (!fils_session) {
2901 wpa_printf(MSG_DEBUG,
2902 "FILS: %s: Could not find FILS Session element in STA entry - reject",
2903 __func__);
2904 return NULL;
2905 }
2906
2907 if (os_memcmp(fils_session, session + 3, FILS_SESSION_LEN) != 0) {
2908 wpa_printf(MSG_DEBUG, "FILS: Session mismatch");
2909 wpa_hexdump(MSG_DEBUG, "FILS: Expected FILS Session",
2910 fils_session, FILS_SESSION_LEN);
2911 wpa_hexdump(MSG_DEBUG, "FILS: Received FILS Session",
2912 session + 3, FILS_SESSION_LEN);
2913 return NULL;
2914 }
2915 return session;
2916}
2917
2918
2919int wpa_fils_validate_key_confirm(struct wpa_state_machine *sm, const u8 *ies,
2920 size_t ies_len)
2921{
2922 struct ieee802_11_elems elems;
2923
2924 if (ieee802_11_parse_elems(ies, ies_len, &elems, 1) == ParseFailed) {
2925 wpa_printf(MSG_DEBUG,
2926 "FILS: Failed to parse decrypted elements");
2927 return -1;
2928 }
2929
2930 if (!elems.fils_session) {
2931 wpa_printf(MSG_DEBUG, "FILS: No FILS Session element");
2932 return -1;
2933 }
2934
2935 if (!elems.fils_key_confirm) {
2936 wpa_printf(MSG_DEBUG, "FILS: No FILS Key Confirm element");
2937 return -1;
2938 }
2939
2940 if (elems.fils_key_confirm_len != sm->fils_key_auth_len) {
2941 wpa_printf(MSG_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07002942 "FILS: Unexpected Key-Auth length %d (expected %zu)",
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002943 elems.fils_key_confirm_len,
Hai Shalomfdcde762020-04-02 11:19:20 -07002944 sm->fils_key_auth_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002945 return -1;
2946 }
2947
2948 if (os_memcmp(elems.fils_key_confirm, sm->fils_key_auth_sta,
2949 sm->fils_key_auth_len) != 0) {
2950 wpa_printf(MSG_DEBUG, "FILS: Key-Auth mismatch");
2951 wpa_hexdump(MSG_DEBUG, "FILS: Received Key-Auth",
2952 elems.fils_key_confirm, elems.fils_key_confirm_len);
2953 wpa_hexdump(MSG_DEBUG, "FILS: Expected Key-Auth",
2954 sm->fils_key_auth_sta, sm->fils_key_auth_len);
2955 return -1;
2956 }
2957
2958 return 0;
2959}
2960
2961
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002962int fils_decrypt_assoc(struct wpa_state_machine *sm, const u8 *fils_session,
2963 const struct ieee80211_mgmt *mgmt, size_t frame_len,
2964 u8 *pos, size_t left)
2965{
2966 u16 fc, stype;
2967 const u8 *end, *ie_start, *ie, *session, *crypt;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08002968 const u8 *aad[5];
2969 size_t aad_len[5];
2970
2971 if (!sm || !sm->PTK_valid) {
2972 wpa_printf(MSG_DEBUG,
2973 "FILS: No KEK to decrypt Assocication Request frame");
2974 return -1;
2975 }
2976
2977 if (!wpa_key_mgmt_fils(sm->wpa_key_mgmt)) {
2978 wpa_printf(MSG_DEBUG,
2979 "FILS: Not a FILS AKM - reject association");
2980 return -1;
2981 }
2982
2983 end = ((const u8 *) mgmt) + frame_len;
2984 fc = le_to_host16(mgmt->frame_control);
2985 stype = WLAN_FC_GET_STYPE(fc);
2986 if (stype == WLAN_FC_STYPE_REASSOC_REQ)
2987 ie_start = mgmt->u.reassoc_req.variable;
2988 else
2989 ie_start = mgmt->u.assoc_req.variable;
2990 ie = ie_start;
2991
2992 /*
2993 * Find FILS Session element which is the last unencrypted element in
2994 * the frame.
2995 */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07002996 session = wpa_fils_validate_fils_session(sm, ie, end - ie,
2997 fils_session);
2998 if (!session) {
2999 wpa_printf(MSG_DEBUG, "FILS: Session validation failed");
3000 return -1;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003001 }
3002
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003003 crypt = session + 2 + session[1];
3004
3005 if (end - crypt < AES_BLOCK_SIZE) {
3006 wpa_printf(MSG_DEBUG,
3007 "FILS: Too short frame to include AES-SIV data");
3008 return -1;
3009 }
3010
3011 /* AES-SIV AAD vectors */
3012
3013 /* The STA's MAC address */
3014 aad[0] = mgmt->sa;
3015 aad_len[0] = ETH_ALEN;
3016 /* The AP's BSSID */
3017 aad[1] = mgmt->da;
3018 aad_len[1] = ETH_ALEN;
3019 /* The STA's nonce */
3020 aad[2] = sm->SNonce;
3021 aad_len[2] = FILS_NONCE_LEN;
3022 /* The AP's nonce */
3023 aad[3] = sm->ANonce;
3024 aad_len[3] = FILS_NONCE_LEN;
3025 /*
3026 * The (Re)Association Request frame from the Capability Information
3027 * field to the FILS Session element (both inclusive).
3028 */
3029 aad[4] = (const u8 *) &mgmt->u.assoc_req.capab_info;
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003030 aad_len[4] = crypt - aad[4];
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003031
3032 if (aes_siv_decrypt(sm->PTK.kek, sm->PTK.kek_len, crypt, end - crypt,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003033 5, aad, aad_len, pos + (crypt - ie_start)) < 0) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003034 wpa_printf(MSG_DEBUG,
3035 "FILS: Invalid AES-SIV data in the frame");
3036 return -1;
3037 }
3038 wpa_hexdump(MSG_DEBUG, "FILS: Decrypted Association Request elements",
3039 pos, left - AES_BLOCK_SIZE);
3040
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003041 if (wpa_fils_validate_key_confirm(sm, pos, left - AES_BLOCK_SIZE) < 0) {
3042 wpa_printf(MSG_DEBUG, "FILS: Key Confirm validation failed");
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003043 return -1;
3044 }
3045
3046 return left - AES_BLOCK_SIZE;
3047}
3048
3049
3050int fils_encrypt_assoc(struct wpa_state_machine *sm, u8 *buf,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003051 size_t current_len, size_t max_len,
3052 const struct wpabuf *hlp)
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003053{
3054 u8 *end = buf + max_len;
3055 u8 *pos = buf + current_len;
3056 struct ieee80211_mgmt *mgmt;
3057 struct wpabuf *plain;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003058 const u8 *aad[5];
3059 size_t aad_len[5];
3060
3061 if (!sm || !sm->PTK_valid)
3062 return -1;
3063
3064 wpa_hexdump(MSG_DEBUG,
3065 "FILS: Association Response frame before FILS processing",
3066 buf, current_len);
3067
3068 mgmt = (struct ieee80211_mgmt *) buf;
3069
3070 /* AES-SIV AAD vectors */
3071
3072 /* The AP's BSSID */
3073 aad[0] = mgmt->sa;
3074 aad_len[0] = ETH_ALEN;
3075 /* The STA's MAC address */
3076 aad[1] = mgmt->da;
3077 aad_len[1] = ETH_ALEN;
3078 /* The AP's nonce */
3079 aad[2] = sm->ANonce;
3080 aad_len[2] = FILS_NONCE_LEN;
3081 /* The STA's nonce */
3082 aad[3] = sm->SNonce;
3083 aad_len[3] = FILS_NONCE_LEN;
3084 /*
3085 * The (Re)Association Response frame from the Capability Information
3086 * field (the same offset in both Association and Reassociation
3087 * Response frames) to the FILS Session element (both inclusive).
3088 */
3089 aad[4] = (const u8 *) &mgmt->u.assoc_resp.capab_info;
3090 aad_len[4] = pos - aad[4];
3091
3092 /* The following elements will be encrypted with AES-SIV */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003093 plain = fils_prepare_plainbuf(sm, hlp);
3094 if (!plain) {
3095 wpa_printf(MSG_DEBUG, "FILS: Plain buffer prep failed");
3096 return -1;
3097 }
3098
3099 if (pos + wpabuf_len(plain) + AES_BLOCK_SIZE > end) {
3100 wpa_printf(MSG_DEBUG,
3101 "FILS: Not enough room for FILS elements");
Hai Shalom81f62d82019-07-22 12:10:00 -07003102 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003103 return -1;
3104 }
3105
3106 wpa_hexdump_buf_key(MSG_DEBUG, "FILS: Association Response plaintext",
3107 plain);
3108
3109 if (aes_siv_encrypt(sm->PTK.kek, sm->PTK.kek_len,
3110 wpabuf_head(plain), wpabuf_len(plain),
3111 5, aad, aad_len, pos) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003112 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003113 return -1;
3114 }
3115
3116 wpa_hexdump(MSG_DEBUG,
3117 "FILS: Encrypted Association Response elements",
3118 pos, AES_BLOCK_SIZE + wpabuf_len(plain));
3119 current_len += wpabuf_len(plain) + AES_BLOCK_SIZE;
Hai Shalom81f62d82019-07-22 12:10:00 -07003120 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003121
3122 sm->fils_completed = 1;
3123
3124 return current_len;
3125}
3126
3127
3128static struct wpabuf * fils_prepare_plainbuf(struct wpa_state_machine *sm,
3129 const struct wpabuf *hlp)
3130{
3131 struct wpabuf *plain;
3132 u8 *len, *tmp, *tmp2;
3133 u8 hdr[2];
Hai Shaloma20dcd72022-02-04 13:43:00 -08003134 u8 *gtk, stub_gtk[32];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003135 size_t gtk_len;
3136 struct wpa_group *gsm;
Hai Shalomfdcde762020-04-02 11:19:20 -07003137 size_t plain_len;
3138 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003139
Hai Shalomfdcde762020-04-02 11:19:20 -07003140 plain_len = 1000 + ieee80211w_kde_len(sm);
3141 if (conf->transition_disable)
3142 plain_len += 2 + RSN_SELECTOR_LEN + 1;
3143 plain = wpabuf_alloc(plain_len);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003144 if (!plain)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003145 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003146
3147 /* TODO: FILS Public Key */
3148
3149 /* FILS Key Confirmation */
3150 wpabuf_put_u8(plain, WLAN_EID_EXTENSION); /* Element ID */
3151 wpabuf_put_u8(plain, 1 + sm->fils_key_auth_len); /* Length */
3152 /* Element ID Extension */
3153 wpabuf_put_u8(plain, WLAN_EID_EXT_FILS_KEY_CONFIRM);
3154 wpabuf_put_data(plain, sm->fils_key_auth_ap, sm->fils_key_auth_len);
3155
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003156 /* FILS HLP Container */
3157 if (hlp)
3158 wpabuf_put_buf(plain, hlp);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003159
3160 /* TODO: FILS IP Address Assignment */
3161
3162 /* Key Delivery */
3163 gsm = sm->group;
3164 wpabuf_put_u8(plain, WLAN_EID_EXTENSION); /* Element ID */
3165 len = wpabuf_put(plain, 1);
3166 wpabuf_put_u8(plain, WLAN_EID_EXT_KEY_DELIVERY);
3167 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN,
3168 wpabuf_put(plain, WPA_KEY_RSC_LEN));
3169 /* GTK KDE */
3170 gtk = gsm->GTK[gsm->GN - 1];
3171 gtk_len = gsm->GTK_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07003172 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003173 /*
3174 * Provide unique random GTK to each STA to prevent use
3175 * of GTK in the BSS.
3176 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08003177 if (random_get_bytes(stub_gtk, gtk_len) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003178 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003179 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003180 }
Hai Shaloma20dcd72022-02-04 13:43:00 -08003181 gtk = stub_gtk;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003182 }
3183 hdr[0] = gsm->GN & 0x03;
3184 hdr[1] = 0;
3185 tmp = wpabuf_put(plain, 0);
3186 tmp2 = wpa_add_kde(tmp, RSN_KEY_DATA_GROUPKEY, hdr, 2,
3187 gtk, gtk_len);
3188 wpabuf_put(plain, tmp2 - tmp);
3189
Hai Shalomfdcde762020-04-02 11:19:20 -07003190 /* IGTK KDE and BIGTK KDE */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003191 tmp = wpabuf_put(plain, 0);
3192 tmp2 = ieee80211w_kde_add(sm, tmp);
3193 wpabuf_put(plain, tmp2 - tmp);
3194
Hai Shalomfdcde762020-04-02 11:19:20 -07003195 if (conf->transition_disable) {
3196 tmp = wpabuf_put(plain, 0);
3197 tmp2 = wpa_add_kde(tmp, WFA_KEY_DATA_TRANSITION_DISABLE,
3198 &conf->transition_disable, 1, NULL, 0);
3199 wpabuf_put(plain, tmp2 - tmp);
3200 }
3201
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003202 *len = (u8 *) wpabuf_put(plain, 0) - len - 1;
Hai Shalom74f70d42019-02-11 14:42:39 -08003203
3204#ifdef CONFIG_OCV
3205 if (wpa_auth_uses_ocv(sm)) {
3206 struct wpa_channel_info ci;
3207 u8 *pos;
3208
3209 if (wpa_channel_info(sm->wpa_auth, &ci) != 0) {
3210 wpa_printf(MSG_WARNING,
3211 "FILS: Failed to get channel info for OCI element");
Hai Shalom81f62d82019-07-22 12:10:00 -07003212 wpabuf_clear_free(plain);
Hai Shalom74f70d42019-02-11 14:42:39 -08003213 return NULL;
3214 }
Hai Shalom899fcc72020-10-19 14:38:18 -07003215#ifdef CONFIG_TESTING_OPTIONS
3216 if (conf->oci_freq_override_fils_assoc) {
3217 wpa_printf(MSG_INFO,
3218 "TEST: Override OCI frequency %d -> %u MHz",
3219 ci.frequency,
3220 conf->oci_freq_override_fils_assoc);
3221 ci.frequency = conf->oci_freq_override_fils_assoc;
3222 }
3223#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalom74f70d42019-02-11 14:42:39 -08003224
3225 pos = wpabuf_put(plain, OCV_OCI_EXTENDED_LEN);
3226 if (ocv_insert_extended_oci(&ci, pos) < 0) {
Hai Shalom81f62d82019-07-22 12:10:00 -07003227 wpabuf_clear_free(plain);
Hai Shalom74f70d42019-02-11 14:42:39 -08003228 return NULL;
3229 }
3230 }
3231#endif /* CONFIG_OCV */
3232
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003233 return plain;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003234}
3235
3236
3237int fils_set_tk(struct wpa_state_machine *sm)
3238{
3239 enum wpa_alg alg;
3240 int klen;
3241
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003242 if (!sm || !sm->PTK_valid) {
3243 wpa_printf(MSG_DEBUG, "FILS: No valid PTK available to set TK");
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003244 return -1;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003245 }
3246 if (sm->tk_already_set) {
3247 wpa_printf(MSG_DEBUG, "FILS: TK already set to the driver");
3248 return -1;
3249 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003250
3251 alg = wpa_cipher_to_alg(sm->pairwise);
3252 klen = wpa_cipher_key_len(sm->pairwise);
3253
3254 wpa_printf(MSG_DEBUG, "FILS: Configure TK to the driver");
3255 if (wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr, 0,
Hai Shalomfdcde762020-04-02 11:19:20 -07003256 sm->PTK.tk, klen, KEY_FLAG_PAIRWISE_RX_TX)) {
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003257 wpa_printf(MSG_DEBUG, "FILS: Failed to set TK to the driver");
3258 return -1;
3259 }
Sunil Ravi89eba102022-09-13 21:04:37 -07003260
3261#ifdef CONFIG_PASN
3262 if (sm->wpa_auth->conf.secure_ltf &&
3263 ieee802_11_rsnx_capab(sm->rsnxe, WLAN_RSNX_CAPAB_SECURE_LTF) &&
3264 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
3265 sm->PTK.ltf_keyseed,
3266 sm->PTK.ltf_keyseed_len)) {
3267 wpa_printf(MSG_ERROR,
3268 "FILS: Failed to set LTF keyseed to driver");
3269 return -1;
3270 }
3271#endif /* CONFIG_PASN */
3272
Sunil8cd6f4d2022-06-28 18:40:46 +00003273 sm->pairwise_set = true;
Hai Shalome21d4e82020-04-29 16:34:06 -07003274 sm->tk_already_set = true;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003275
Hai Shalom60840252021-02-19 19:02:11 -08003276 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
3277 dot11RSNAConfigPMKLifetime, &sm->PTK);
3278
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003279 return 0;
3280}
3281
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003282
3283u8 * hostapd_eid_assoc_fils_session(struct wpa_state_machine *sm, u8 *buf,
3284 const u8 *fils_session, struct wpabuf *hlp)
3285{
3286 struct wpabuf *plain;
3287 u8 *pos = buf;
3288
3289 /* FILS Session */
3290 *pos++ = WLAN_EID_EXTENSION; /* Element ID */
3291 *pos++ = 1 + FILS_SESSION_LEN; /* Length */
3292 *pos++ = WLAN_EID_EXT_FILS_SESSION; /* Element ID Extension */
3293 os_memcpy(pos, fils_session, FILS_SESSION_LEN);
3294 pos += FILS_SESSION_LEN;
3295
3296 plain = fils_prepare_plainbuf(sm, hlp);
3297 if (!plain) {
3298 wpa_printf(MSG_DEBUG, "FILS: Plain buffer prep failed");
3299 return NULL;
3300 }
3301
3302 os_memcpy(pos, wpabuf_head(plain), wpabuf_len(plain));
3303 pos += wpabuf_len(plain);
3304
Hai Shalomfdcde762020-04-02 11:19:20 -07003305 wpa_printf(MSG_DEBUG, "%s: plain buf_len: %zu", __func__,
3306 wpabuf_len(plain));
Hai Shalom81f62d82019-07-22 12:10:00 -07003307 wpabuf_clear_free(plain);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003308 sm->fils_completed = 1;
3309 return pos;
3310}
3311
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003312#endif /* CONFIG_FILS */
3313
3314
Hai Shalom74f70d42019-02-11 14:42:39 -08003315#ifdef CONFIG_OCV
3316int get_sta_tx_parameters(struct wpa_state_machine *sm, int ap_max_chanwidth,
3317 int ap_seg1_idx, int *bandwidth, int *seg1_idx)
3318{
3319 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
3320
3321 if (!wpa_auth->cb->get_sta_tx_params)
3322 return -1;
3323 return wpa_auth->cb->get_sta_tx_params(wpa_auth->cb_ctx, sm->addr,
3324 ap_max_chanwidth, ap_seg1_idx,
3325 bandwidth, seg1_idx);
3326}
3327#endif /* CONFIG_OCV */
3328
3329
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003330static int wpa_auth_validate_ml_kdes_m2(struct wpa_state_machine *sm,
3331 struct wpa_eapol_ie_parse *kde)
3332{
3333#ifdef CONFIG_IEEE80211BE
3334 int i;
3335 unsigned int n_links = 0;
3336
3337 if (sm->mld_assoc_link_id < 0)
3338 return 0;
3339
3340 /* MLD MAC address must be the same */
3341 if (!kde->mac_addr ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003342 !ether_addr_equal(kde->mac_addr, sm->peer_mld_addr)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003343 wpa_printf(MSG_DEBUG, "RSN: MLD: Invalid MLD address");
3344 return -1;
3345 }
3346
3347 /* Find matching link ID and the MAC address for each link */
Sunil Ravi88611412024-06-28 17:34:56 +00003348 for (i = 0; i < MAX_NUM_MLD_LINKS; i++) {
3349 if (!(kde->valid_mlo_links & BIT(i)))
3350 continue;
3351
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003352 /*
3353 * Each entry should contain the link information and the MAC
3354 * address.
3355 */
3356 if (kde->mlo_link_len[i] != 1 + ETH_ALEN) {
3357 wpa_printf(MSG_DEBUG,
3358 "RSN: MLD: Invalid MLO Link (ID %u) KDE len=%zu",
3359 i, kde->mlo_link_len[i]);
3360 return -1;
3361 }
3362
3363 if (!sm->mld_links[i].valid || i == sm->mld_assoc_link_id) {
3364 wpa_printf(MSG_DEBUG,
3365 "RSN: MLD: Invalid link ID=%u", i);
3366 return -1;
3367 }
3368
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003369 if (!ether_addr_equal(sm->mld_links[i].peer_addr,
3370 kde->mlo_link[i] + 1)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003371 wpa_printf(MSG_DEBUG,
3372 "RSN: MLD: invalid MAC address=" MACSTR
3373 " expected " MACSTR " (link ID %u)",
3374 MAC2STR(kde->mlo_link[i] + 1),
3375 MAC2STR(sm->mld_links[i].peer_addr), i);
3376 return -1;
3377 }
3378
3379 n_links++;
3380 }
3381
3382 /* Must have the same number of MLO links (excluding the local one) */
3383 if (n_links != sm->n_mld_affiliated_links) {
3384 wpa_printf(MSG_DEBUG,
3385 "RSN: MLD: Expecting %u MLD links in msg 2, but got %u",
3386 sm->n_mld_affiliated_links, n_links);
3387 return -1;
3388 }
3389#endif /* CONFIG_IEEE80211BE */
3390
3391 return 0;
3392}
3393
3394
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003395SM_STATE(WPA_PTK, PTKCALCNEGOTIATING)
3396{
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003397 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003398 struct wpa_ptk PTK;
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003399 int ok = 0, psk_found = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003400 const u8 *pmk = NULL;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003401 size_t pmk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003402 int ft;
3403 const u8 *eapol_key_ie, *key_data, *mic;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003404 u16 key_info, ver, key_data_length;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003405 size_t mic_len, eapol_key_ie_len;
3406 struct ieee802_1x_hdr *hdr;
3407 struct wpa_eapol_key *key;
3408 struct wpa_eapol_ie_parse kde;
Hai Shalom021b0b52019-04-10 11:17:58 -07003409 int vlan_id = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07003410 int owe_ptk_workaround = !!wpa_auth->conf.owe_ptk_workaround;
Sunil Raviaf8751c2023-03-29 11:35:17 -07003411 u8 pmk_r0[PMK_LEN_MAX], pmk_r0_name[WPA_PMK_NAME_LEN];
3412 u8 pmk_r1[PMK_LEN_MAX];
3413 size_t key_len;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003414 u8 *key_data_buf = NULL;
3415 size_t key_data_buf_len = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003416
3417 SM_ENTRY_MA(WPA_PTK, PTKCALCNEGOTIATING, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07003418 sm->EAPOLKeyReceived = false;
3419 sm->update_snonce = false;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003420 os_memset(&PTK, 0, sizeof(PTK));
3421
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003422 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003423
3424 /* WPA with IEEE 802.1X: use the derived PMK from EAP
3425 * WPA-PSK: iterate through possible PSKs and select the one matching
3426 * the packet */
3427 for (;;) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003428 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
3429 !wpa_key_mgmt_sae(sm->wpa_key_mgmt)) {
Dmitry Shmidt391c59f2013-09-03 12:16:28 -07003430 pmk = wpa_auth_get_psk(sm->wpa_auth, sm->addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07003431 sm->p2p_dev_addr, pmk, &pmk_len,
3432 &vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07003433 if (!pmk)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003434 break;
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003435 psk_found = 1;
Roshan Pius3a1667e2018-07-03 15:17:14 -07003436#ifdef CONFIG_IEEE80211R_AP
3437 if (wpa_key_mgmt_ft_psk(sm->wpa_key_mgmt)) {
3438 os_memcpy(sm->xxkey, pmk, pmk_len);
3439 sm->xxkey_len = pmk_len;
3440 }
3441#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003442 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003443 pmk = sm->PMK;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003444 pmk_len = sm->pmk_len;
3445 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003446
Hai Shalom81f62d82019-07-22 12:10:00 -07003447 if ((!pmk || !pmk_len) && sm->pmksa) {
3448 wpa_printf(MSG_DEBUG, "WPA: Use PMK from PMKSA cache");
3449 pmk = sm->pmksa->pmk;
3450 pmk_len = sm->pmksa->pmk_len;
3451 }
3452
Hai Shalomfdcde762020-04-02 11:19:20 -07003453 if (wpa_derive_ptk(sm, sm->SNonce, pmk, pmk_len, &PTK,
Sunil Raviaf8751c2023-03-29 11:35:17 -07003454 owe_ptk_workaround == 2, pmk_r0, pmk_r1,
3455 pmk_r0_name, &key_len) < 0)
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08003456 break;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003457
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003458 if (mic_len &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003459 wpa_verify_key_mic(sm->wpa_key_mgmt, pmk_len, &PTK,
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08003460 sm->last_rx_eapol_key,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003461 sm->last_rx_eapol_key_len) == 0) {
Hai Shalom021b0b52019-04-10 11:17:58 -07003462 if (sm->PMK != pmk) {
3463 os_memcpy(sm->PMK, pmk, pmk_len);
3464 sm->pmk_len = pmk_len;
3465 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003466 ok = 1;
3467 break;
3468 }
3469
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003470#ifdef CONFIG_FILS
3471 if (!mic_len &&
3472 wpa_aead_decrypt(sm, &PTK, sm->last_rx_eapol_key,
3473 sm->last_rx_eapol_key_len, NULL) == 0) {
3474 ok = 1;
3475 break;
3476 }
3477#endif /* CONFIG_FILS */
3478
Hai Shalomfdcde762020-04-02 11:19:20 -07003479#ifdef CONFIG_OWE
3480 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE && pmk_len > 32 &&
3481 owe_ptk_workaround == 1) {
3482 wpa_printf(MSG_DEBUG,
3483 "OWE: Try PTK derivation workaround with SHA256");
3484 owe_ptk_workaround = 2;
3485 continue;
3486 }
3487#endif /* CONFIG_OWE */
3488
Roshan Pius3a1667e2018-07-03 15:17:14 -07003489 if (!wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
3490 wpa_key_mgmt_sae(sm->wpa_key_mgmt))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003491 break;
3492 }
3493
Sunil Ravia04bd252022-05-02 22:54:18 -07003494 if (!ok && wpa_key_mgmt_wpa_psk_no_sae(sm->wpa_key_mgmt) &&
3495 wpa_auth->conf.radius_psk && wpa_auth->cb->request_radius_psk &&
3496 !sm->waiting_radius_psk) {
3497 wpa_printf(MSG_DEBUG, "No PSK available - ask RADIUS server");
3498 wpa_auth->cb->request_radius_psk(wpa_auth->cb_ctx, sm->addr,
3499 sm->wpa_key_mgmt,
3500 sm->ANonce,
3501 sm->last_rx_eapol_key,
3502 sm->last_rx_eapol_key_len);
3503 sm->waiting_radius_psk = 1;
Sunil Raviaf8751c2023-03-29 11:35:17 -07003504 goto out;
Sunil Ravia04bd252022-05-02 22:54:18 -07003505 }
3506
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003507 if (!ok) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003508 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
3509 LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003510 "invalid MIC in msg 2/4 of 4-Way Handshake");
Dmitry Shmidtdda10c22015-03-24 16:05:01 -07003511 if (psk_found)
3512 wpa_auth_psk_failure_report(sm->wpa_auth, sm->addr);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003513 goto out;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003514 }
3515
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003516 /*
3517 * Note: last_rx_eapol_key length fields have already been validated in
3518 * wpa_receive().
3519 */
3520 hdr = (struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
3521 key = (struct wpa_eapol_key *) (hdr + 1);
3522 mic = (u8 *) (key + 1);
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003523 key_info = WPA_GET_BE16(key->key_info);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003524 key_data = mic + mic_len + 2;
3525 key_data_length = WPA_GET_BE16(mic + mic_len);
3526 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
3527 sizeof(*key) - mic_len - 2)
Sunil Raviaf8751c2023-03-29 11:35:17 -07003528 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003529
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003530 ver = key_info & WPA_KEY_INFO_TYPE_MASK;
3531 if (mic_len && (key_info & WPA_KEY_INFO_ENCR_KEY_DATA)) {
3532 if (ver != WPA_KEY_INFO_TYPE_HMAC_SHA1_AES &&
3533 ver != WPA_KEY_INFO_TYPE_AES_128_CMAC &&
3534 !wpa_use_aes_key_wrap(sm->wpa_key_mgmt)) {
3535 wpa_printf(MSG_INFO,
3536 "Unsupported EAPOL-Key Key Data field encryption");
3537 goto out;
3538 }
3539
3540 if (key_data_length < 8 || key_data_length % 8) {
3541 wpa_printf(MSG_INFO,
3542 "RSN: Unsupported AES-WRAP len %u",
3543 key_data_length);
3544 goto out;
3545 }
3546 key_data_length -= 8; /* AES-WRAP adds 8 bytes */
3547 key_data_buf = os_malloc(key_data_length);
3548 if (!key_data_buf)
3549 goto out;
3550 key_data_buf_len = key_data_length;
3551 if (aes_unwrap(PTK.kek, PTK.kek_len, key_data_length / 8,
3552 key_data, key_data_buf)) {
3553 bin_clear_free(key_data_buf, key_data_buf_len);
3554 wpa_printf(MSG_INFO,
3555 "RSN: AES unwrap failed - could not decrypt EAPOL-Key key data");
3556 goto out;
3557 }
3558 key_data = key_data_buf;
3559 wpa_hexdump_key(MSG_DEBUG, "RSN: Decrypted EAPOL-Key Key Data",
3560 key_data, key_data_length);
3561 }
3562
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003563 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003564 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003565 "received EAPOL-Key msg 2/4 with invalid Key Data contents");
Sunil Raviaf8751c2023-03-29 11:35:17 -07003566 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003567 }
3568 if (kde.rsn_ie) {
3569 eapol_key_ie = kde.rsn_ie;
3570 eapol_key_ie_len = kde.rsn_ie_len;
3571 } else if (kde.osen) {
3572 eapol_key_ie = kde.osen;
3573 eapol_key_ie_len = kde.osen_len;
3574 } else {
3575 eapol_key_ie = kde.wpa_ie;
3576 eapol_key_ie_len = kde.wpa_ie_len;
3577 }
3578 ft = sm->wpa == WPA_VERSION_WPA2 && wpa_key_mgmt_ft(sm->wpa_key_mgmt);
Hai Shalomfdcde762020-04-02 11:19:20 -07003579 if (!sm->wpa_ie ||
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003580 wpa_compare_rsn_ie(ft, sm->wpa_ie, sm->wpa_ie_len,
3581 eapol_key_ie, eapol_key_ie_len)) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003582 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003583 "WPA IE from (Re)AssocReq did not match with msg 2/4");
3584 if (sm->wpa_ie) {
3585 wpa_hexdump(MSG_DEBUG, "WPA IE in AssocReq",
3586 sm->wpa_ie, sm->wpa_ie_len);
3587 }
3588 wpa_hexdump(MSG_DEBUG, "WPA IE in msg 2/4",
3589 eapol_key_ie, eapol_key_ie_len);
3590 /* MLME-DEAUTHENTICATE.request */
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003591 wpa_sta_disconnect(wpa_auth, sm->addr,
3592 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003593 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003594 }
Hai Shalomc3565922019-10-28 11:58:20 -07003595 if ((!sm->rsnxe && kde.rsnxe) ||
3596 (sm->rsnxe && !kde.rsnxe) ||
3597 (sm->rsnxe && kde.rsnxe &&
3598 (sm->rsnxe_len != kde.rsnxe_len ||
3599 os_memcmp(sm->rsnxe, kde.rsnxe, sm->rsnxe_len) != 0))) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003600 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalomc3565922019-10-28 11:58:20 -07003601 "RSNXE from (Re)AssocReq did not match the one in EAPOL-Key msg 2/4");
3602 wpa_hexdump(MSG_DEBUG, "RSNXE in AssocReq",
3603 sm->rsnxe, sm->rsnxe_len);
3604 wpa_hexdump(MSG_DEBUG, "RSNXE in EAPOL-Key msg 2/4",
3605 kde.rsnxe, kde.rsnxe_len);
3606 /* MLME-DEAUTHENTICATE.request */
3607 wpa_sta_disconnect(wpa_auth, sm->addr,
3608 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003609 goto out;
Hai Shalomc3565922019-10-28 11:58:20 -07003610 }
Hai Shalom74f70d42019-02-11 14:42:39 -08003611#ifdef CONFIG_OCV
3612 if (wpa_auth_uses_ocv(sm)) {
3613 struct wpa_channel_info ci;
3614 int tx_chanwidth;
3615 int tx_seg1_idx;
Hai Shalom899fcc72020-10-19 14:38:18 -07003616 enum oci_verify_result res;
Hai Shalom74f70d42019-02-11 14:42:39 -08003617
3618 if (wpa_channel_info(wpa_auth, &ci) != 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003619 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
3620 LOGGER_INFO,
Hai Shalom74f70d42019-02-11 14:42:39 -08003621 "Failed to get channel info to validate received OCI in EAPOL-Key 2/4");
Sunil Raviaf8751c2023-03-29 11:35:17 -07003622 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003623 }
3624
3625 if (get_sta_tx_parameters(sm,
3626 channel_width_to_int(ci.chanwidth),
3627 ci.seg1_idx, &tx_chanwidth,
3628 &tx_seg1_idx) < 0)
Sunil Raviaf8751c2023-03-29 11:35:17 -07003629 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003630
Hai Shalom899fcc72020-10-19 14:38:18 -07003631 res = ocv_verify_tx_params(kde.oci, kde.oci_len, &ci,
3632 tx_chanwidth, tx_seg1_idx);
3633 if (wpa_auth_uses_ocv(sm) == 2 && res == OCI_NOT_FOUND) {
3634 /* Work around misbehaving STAs */
Sunil Raviaf8751c2023-03-29 11:35:17 -07003635 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
3636 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07003637 "Disable OCV with a STA that does not send OCI");
3638 wpa_auth_set_ocv(sm, 0);
3639 } else if (res != OCI_SUCCESS) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07003640 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
3641 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07003642 "OCV failed: %s", ocv_errorstr);
3643 if (wpa_auth->conf.msg_ctx)
3644 wpa_msg(wpa_auth->conf.msg_ctx, MSG_INFO,
3645 OCV_FAILURE "addr=" MACSTR
3646 " frame=eapol-key-m2 error=%s",
Sunil Raviaf8751c2023-03-29 11:35:17 -07003647 MAC2STR(wpa_auth_get_spa(sm)),
3648 ocv_errorstr);
3649 goto out;
Hai Shalom74f70d42019-02-11 14:42:39 -08003650 }
3651 }
3652#endif /* CONFIG_OCV */
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003653#ifdef CONFIG_IEEE80211R_AP
3654 if (ft && ft_check_msg_2_of_4(wpa_auth, sm, &kde) < 0) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07003655 wpa_sta_disconnect(wpa_auth, sm->addr,
3656 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003657 goto out;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003658 }
3659#endif /* CONFIG_IEEE80211R_AP */
3660#ifdef CONFIG_P2P
3661 if (kde.ip_addr_req && kde.ip_addr_req[0] &&
3662 wpa_auth->ip_pool && WPA_GET_BE32(sm->ip_addr) == 0) {
3663 int idx;
3664 wpa_printf(MSG_DEBUG,
3665 "P2P: IP address requested in EAPOL-Key exchange");
3666 idx = bitfield_get_first_zero(wpa_auth->ip_pool);
3667 if (idx >= 0) {
3668 u32 start = WPA_GET_BE32(wpa_auth->conf.ip_addr_start);
3669 bitfield_set(wpa_auth->ip_pool, idx);
Sunil8cd6f4d2022-06-28 18:40:46 +00003670 sm->ip_addr_bit = idx;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003671 WPA_PUT_BE32(sm->ip_addr, start + idx);
3672 wpa_printf(MSG_DEBUG,
3673 "P2P: Assigned IP address %u.%u.%u.%u to "
Sunil8cd6f4d2022-06-28 18:40:46 +00003674 MACSTR " (bit %u)",
3675 sm->ip_addr[0], sm->ip_addr[1],
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003676 sm->ip_addr[2], sm->ip_addr[3],
Sunil Raviaf8751c2023-03-29 11:35:17 -07003677 MAC2STR(wpa_auth_get_spa(sm)),
3678 sm->ip_addr_bit);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08003679 }
3680 }
3681#endif /* CONFIG_P2P */
3682
Hai Shalom4fbc08f2020-05-18 12:37:00 -07003683#ifdef CONFIG_DPP2
3684 if (DPP_VERSION > 1 && kde.dpp_kde) {
3685 wpa_printf(MSG_DEBUG,
3686 "DPP: peer Protocol Version %u Flags 0x%x",
3687 kde.dpp_kde[0], kde.dpp_kde[1]);
3688 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP &&
3689 wpa_auth->conf.dpp_pfs != 2 &&
3690 (kde.dpp_kde[1] & DPP_KDE_PFS_ALLOWED) &&
3691 !sm->dpp_z) {
3692 wpa_printf(MSG_INFO,
3693 "DPP: Peer indicated it supports PFS and local configuration allows this, but PFS was not negotiated for the association");
3694 wpa_sta_disconnect(wpa_auth, sm->addr,
3695 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003696 goto out;
Hai Shalom4fbc08f2020-05-18 12:37:00 -07003697 }
3698 }
3699#endif /* CONFIG_DPP2 */
3700
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003701 if (wpa_auth_validate_ml_kdes_m2(sm, &kde) < 0) {
3702 wpa_sta_disconnect(wpa_auth, sm->addr,
3703 WLAN_REASON_PREV_AUTH_NOT_VALID);
3704 return;
3705 }
3706
Hai Shalom021b0b52019-04-10 11:17:58 -07003707 if (vlan_id && wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) &&
3708 wpa_auth_update_vlan(wpa_auth, sm->addr, vlan_id) < 0) {
3709 wpa_sta_disconnect(wpa_auth, sm->addr,
3710 WLAN_REASON_PREV_AUTH_NOT_VALID);
Sunil Raviaf8751c2023-03-29 11:35:17 -07003711 goto out;
Hai Shalom021b0b52019-04-10 11:17:58 -07003712 }
3713
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003714 sm->pending_1_of_4_timeout = 0;
3715 eloop_cancel_timeout(wpa_send_eapol_timeout, sm->wpa_auth, sm);
3716
Hai Shalom60840252021-02-19 19:02:11 -08003717 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) && sm->PMK != pmk) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003718 /* PSK may have changed from the previous choice, so update
3719 * state machine data based on whatever PSK was selected here.
3720 */
3721 os_memcpy(sm->PMK, pmk, PMK_LEN);
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08003722 sm->pmk_len = PMK_LEN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003723 }
3724
Hai Shalome21d4e82020-04-29 16:34:06 -07003725 sm->MICVerified = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003726
Sunil Raviaf8751c2023-03-29 11:35:17 -07003727#ifdef CONFIG_IEEE80211R_AP
3728 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt) && !sm->ft_completed) {
3729 wpa_printf(MSG_DEBUG, "FT: Store PMK-R0/PMK-R1");
3730 wpa_auth_ft_store_keys(sm, pmk_r0, pmk_r1, pmk_r0_name,
3731 key_len);
3732 }
3733#endif /* CONFIG_IEEE80211R_AP */
3734
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003735 os_memcpy(&sm->PTK, &PTK, sizeof(PTK));
Hai Shalom81f62d82019-07-22 12:10:00 -07003736 forced_memzero(&PTK, sizeof(PTK));
Hai Shalome21d4e82020-04-29 16:34:06 -07003737 sm->PTK_valid = true;
Sunil Raviaf8751c2023-03-29 11:35:17 -07003738out:
3739 forced_memzero(pmk_r0, sizeof(pmk_r0));
3740 forced_memzero(pmk_r1, sizeof(pmk_r1));
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003741 bin_clear_free(key_data_buf, key_data_buf_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003742}
3743
3744
3745SM_STATE(WPA_PTK, PTKCALCNEGOTIATING2)
3746{
3747 SM_ENTRY_MA(WPA_PTK, PTKCALCNEGOTIATING2, wpa_ptk);
3748 sm->TimeoutCtr = 0;
3749}
3750
3751
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003752static int ieee80211w_kde_len(struct wpa_state_machine *sm)
3753{
Hai Shalomfdcde762020-04-02 11:19:20 -07003754 size_t len = 0;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003755 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07003756
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003757 if (sm->mgmt_frame_prot) {
Hai Shalomfdcde762020-04-02 11:19:20 -07003758 len += 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003759 len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Hai Shalomfdcde762020-04-02 11:19:20 -07003760 }
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003761
3762 if (wpa_auth->conf.tx_bss_auth)
3763 wpa_auth = wpa_auth->conf.tx_bss_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07003764 if (sm->mgmt_frame_prot && sm->wpa_auth->conf.beacon_prot) {
3765 len += 2 + RSN_SELECTOR_LEN + WPA_BIGTK_KDE_PREFIX_LEN;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003766 len += wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003767 }
3768
Hai Shalomfdcde762020-04-02 11:19:20 -07003769 return len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003770}
3771
3772
3773static u8 * ieee80211w_kde_add(struct wpa_state_machine *sm, u8 *pos)
3774{
3775 struct wpa_igtk_kde igtk;
Hai Shalomfdcde762020-04-02 11:19:20 -07003776 struct wpa_bigtk_kde bigtk;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003777 struct wpa_group *gsm = sm->group;
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07003778 u8 rsc[WPA_KEY_RSC_LEN];
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003779 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
3780 struct wpa_auth_config *conf = &wpa_auth->conf;
Hai Shalomfdcde762020-04-02 11:19:20 -07003781 size_t len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003782
3783 if (!sm->mgmt_frame_prot)
3784 return pos;
3785
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003786#ifdef CONFIG_IEEE80211BE
3787 if (sm->mld_assoc_link_id >= 0)
3788 return pos; /* Use per-link MLO KDEs instead */
3789#endif /* CONFIG_IEEE80211BE */
3790
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003791 igtk.keyid[0] = gsm->GN_igtk;
3792 igtk.keyid[1] = 0;
3793 if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE ||
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07003794 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, rsc) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003795 os_memset(igtk.pn, 0, sizeof(igtk.pn));
Dmitry Shmidt68d0e3e2013-10-28 17:59:21 -07003796 else
3797 os_memcpy(igtk.pn, rsc, sizeof(igtk.pn));
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07003798 os_memcpy(igtk.igtk, gsm->IGTK[gsm->GN_igtk - 4], len);
Hai Shalomfdcde762020-04-02 11:19:20 -07003799 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07003800 /*
3801 * Provide unique random IGTK to each STA to prevent use of
3802 * IGTK in the BSS.
3803 */
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07003804 if (random_get_bytes(igtk.igtk, len) < 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07003805 return pos;
3806 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003807 pos = wpa_add_kde(pos, RSN_KEY_DATA_IGTK,
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07003808 (const u8 *) &igtk, WPA_IGTK_KDE_PREFIX_LEN + len,
3809 NULL, 0);
Sunil Ravia04bd252022-05-02 22:54:18 -07003810 forced_memzero(&igtk, sizeof(igtk));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003811
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003812 if (wpa_auth->conf.tx_bss_auth) {
3813 wpa_auth = wpa_auth->conf.tx_bss_auth;
3814 conf = &wpa_auth->conf;
3815 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
3816 gsm = wpa_auth->group;
3817 }
3818
3819 if (!sm->wpa_auth->conf.beacon_prot)
Hai Shalomfdcde762020-04-02 11:19:20 -07003820 return pos;
3821
3822 bigtk.keyid[0] = gsm->GN_bigtk;
3823 bigtk.keyid[1] = 0;
3824 if (gsm->wpa_group_state != WPA_GROUP_SETKEYSDONE ||
3825 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_bigtk, rsc) < 0)
3826 os_memset(bigtk.pn, 0, sizeof(bigtk.pn));
3827 else
3828 os_memcpy(bigtk.pn, rsc, sizeof(bigtk.pn));
3829 os_memcpy(bigtk.bigtk, gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07003830 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
3831 /*
3832 * Provide unique random BIGTK to each OSEN STA to prevent use
3833 * of BIGTK in the BSS.
3834 */
3835 if (random_get_bytes(bigtk.bigtk, len) < 0)
3836 return pos;
3837 }
Hai Shalomfdcde762020-04-02 11:19:20 -07003838 pos = wpa_add_kde(pos, RSN_KEY_DATA_BIGTK,
3839 (const u8 *) &bigtk, WPA_BIGTK_KDE_PREFIX_LEN + len,
3840 NULL, 0);
Sunil Ravia04bd252022-05-02 22:54:18 -07003841 forced_memzero(&bigtk, sizeof(bigtk));
Hai Shalomfdcde762020-04-02 11:19:20 -07003842
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003843 return pos;
3844}
3845
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07003846
Hai Shalom74f70d42019-02-11 14:42:39 -08003847static int ocv_oci_len(struct wpa_state_machine *sm)
3848{
3849#ifdef CONFIG_OCV
3850 if (wpa_auth_uses_ocv(sm))
3851 return OCV_OCI_KDE_LEN;
3852#endif /* CONFIG_OCV */
3853 return 0;
3854}
3855
Hai Shalom899fcc72020-10-19 14:38:18 -07003856
3857static int ocv_oci_add(struct wpa_state_machine *sm, u8 **argpos,
3858 unsigned int freq)
Hai Shalom74f70d42019-02-11 14:42:39 -08003859{
3860#ifdef CONFIG_OCV
3861 struct wpa_channel_info ci;
3862
3863 if (!wpa_auth_uses_ocv(sm))
3864 return 0;
3865
3866 if (wpa_channel_info(sm->wpa_auth, &ci) != 0) {
3867 wpa_printf(MSG_WARNING,
3868 "Failed to get channel info for OCI element");
3869 return -1;
3870 }
Hai Shalom899fcc72020-10-19 14:38:18 -07003871#ifdef CONFIG_TESTING_OPTIONS
3872 if (freq) {
3873 wpa_printf(MSG_INFO,
3874 "TEST: Override OCI KDE frequency %d -> %u MHz",
3875 ci.frequency, freq);
3876 ci.frequency = freq;
3877 }
3878#endif /* CONFIG_TESTING_OPTIONS */
Hai Shalom74f70d42019-02-11 14:42:39 -08003879
3880 return ocv_insert_oci_kde(&ci, argpos);
3881#else /* CONFIG_OCV */
3882 return 0;
3883#endif /* CONFIG_OCV */
3884}
3885
3886
Hai Shalomfdcde762020-04-02 11:19:20 -07003887#ifdef CONFIG_TESTING_OPTIONS
3888static u8 * replace_ie(const char *name, const u8 *old_buf, size_t *len, u8 eid,
3889 const u8 *ie, size_t ie_len)
3890{
3891 const u8 *elem;
3892 u8 *buf;
3893
3894 wpa_printf(MSG_DEBUG, "TESTING: %s EAPOL override", name);
3895 wpa_hexdump(MSG_DEBUG, "TESTING: wpa_ie before override",
3896 old_buf, *len);
3897 buf = os_malloc(*len + ie_len);
3898 if (!buf)
3899 return NULL;
3900 os_memcpy(buf, old_buf, *len);
3901 elem = get_ie(buf, *len, eid);
3902 if (elem) {
3903 u8 elem_len = 2 + elem[1];
3904
3905 os_memmove((void *) elem, elem + elem_len,
3906 *len - (elem - buf) - elem_len);
3907 *len -= elem_len;
3908 }
3909 os_memcpy(buf + *len, ie, ie_len);
3910 *len += ie_len;
3911 wpa_hexdump(MSG_DEBUG, "TESTING: wpa_ie after EAPOL override",
3912 buf, *len);
3913
3914 return buf;
3915}
3916#endif /* CONFIG_TESTING_OPTIONS */
3917
3918
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003919#ifdef CONFIG_IEEE80211BE
3920
3921void wpa_auth_ml_get_rsn_info(struct wpa_authenticator *a,
3922 struct wpa_auth_ml_link_rsn_info *info)
3923{
3924 info->rsn_ies = a->wpa_ie;
3925 info->rsn_ies_len = a->wpa_ie_len;
3926
3927 wpa_printf(MSG_DEBUG, "RSN: MLD: link_id=%u, rsn_ies_len=%zu",
3928 info->link_id, info->rsn_ies_len);
3929}
3930
3931
3932static void wpa_auth_get_ml_rsn_info(struct wpa_authenticator *wpa_auth,
3933 struct wpa_auth_ml_rsn_info *info)
3934{
3935 if (!wpa_auth->cb->get_ml_rsn_info)
3936 return;
3937
3938 wpa_auth->cb->get_ml_rsn_info(wpa_auth->cb_ctx, info);
3939}
3940
3941
3942void wpa_auth_ml_get_key_info(struct wpa_authenticator *a,
3943 struct wpa_auth_ml_link_key_info *info,
3944 bool mgmt_frame_prot, bool beacon_prot)
3945{
3946 struct wpa_group *gsm = a->group;
3947 u8 rsc[WPA_KEY_RSC_LEN];
3948
3949 wpa_printf(MSG_DEBUG,
3950 "MLD: Get group key info: link_id=%u, IGTK=%u, BIGTK=%u",
3951 info->link_id, mgmt_frame_prot, beacon_prot);
3952
3953 info->gtkidx = gsm->GN & 0x03;
3954 info->gtk = gsm->GTK[gsm->GN - 1];
3955 info->gtk_len = gsm->GTK_len;
3956
3957 if (wpa_auth_get_seqnum(a, NULL, gsm->GN, rsc) < 0)
3958 os_memset(info->pn, 0, sizeof(info->pn));
3959 else
3960 os_memcpy(info->pn, rsc, sizeof(info->pn));
3961
3962 if (!mgmt_frame_prot)
3963 return;
3964
3965 info->igtkidx = gsm->GN_igtk;
3966 info->igtk = gsm->IGTK[gsm->GN_igtk - 4];
3967 info->igtk_len = wpa_cipher_key_len(a->conf.group_mgmt_cipher);
3968
3969 if (wpa_auth_get_seqnum(a, NULL, gsm->GN_igtk, rsc) < 0)
3970 os_memset(info->ipn, 0, sizeof(info->ipn));
3971 else
3972 os_memcpy(info->ipn, rsc, sizeof(info->ipn));
3973
3974 if (!beacon_prot)
3975 return;
3976
Sunil Ravib0ac25f2024-07-12 01:42:03 +00003977 if (a->conf.tx_bss_auth) {
3978 a = a->conf.tx_bss_auth;
3979 gsm = a->group;
3980 }
3981
Sunil Ravi2a14cf12023-11-21 00:54:38 +00003982 info->bigtkidx = gsm->GN_bigtk;
3983 info->bigtk = gsm->BIGTK[gsm->GN_bigtk - 6];
3984
3985 if (wpa_auth_get_seqnum(a, NULL, gsm->GN_bigtk, rsc) < 0)
3986 os_memset(info->bipn, 0, sizeof(info->bipn));
3987 else
3988 os_memcpy(info->bipn, rsc, sizeof(info->bipn));
3989}
3990
3991
3992static void wpa_auth_get_ml_key_info(struct wpa_authenticator *wpa_auth,
3993 struct wpa_auth_ml_key_info *info)
3994{
3995 if (!wpa_auth->cb->get_ml_key_info)
3996 return;
3997
3998 wpa_auth->cb->get_ml_key_info(wpa_auth->cb_ctx, info);
3999}
4000
4001
4002static size_t wpa_auth_ml_group_kdes_len(struct wpa_state_machine *sm)
4003{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004004 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004005 struct wpa_group *gsm = sm->group;
4006 size_t gtk_len = gsm->GTK_len;
4007 size_t igtk_len;
4008 size_t kde_len;
4009 unsigned int n_links;
4010
4011 if (sm->mld_assoc_link_id < 0)
4012 return 0;
4013
4014 n_links = sm->n_mld_affiliated_links + 1;
4015
4016 /* MLO GTK KDE for each link */
4017 kde_len = n_links * (2 + RSN_SELECTOR_LEN + 1 + 6 + gtk_len);
4018
4019 if (!sm->mgmt_frame_prot)
4020 return kde_len;
4021
4022 /* MLO IGTK KDE for each link */
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004023 igtk_len = wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004024 kde_len += n_links * (2 + RSN_SELECTOR_LEN + 2 + 6 + 1 + igtk_len);
4025
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004026 if (wpa_auth->conf.tx_bss_auth) {
4027 wpa_auth = wpa_auth->conf.tx_bss_auth;
4028 igtk_len = wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
4029 }
4030
4031 if (!wpa_auth->conf.beacon_prot)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004032 return kde_len;
4033
4034 /* MLO BIGTK KDE for each link */
4035 kde_len += n_links * (2 + RSN_SELECTOR_LEN + 2 + 6 + 1 + igtk_len);
4036
4037 return kde_len;
4038}
4039
4040
4041static u8 * wpa_auth_ml_group_kdes(struct wpa_state_machine *sm, u8 *pos)
4042{
4043 struct wpa_auth_ml_key_info ml_key_info;
4044 unsigned int i, link_id;
4045
4046 /* First fetch the key information from all the authenticators */
4047 os_memset(&ml_key_info, 0, sizeof(ml_key_info));
4048 ml_key_info.n_mld_links = sm->n_mld_affiliated_links + 1;
4049
4050 /*
4051 * Assume that management frame protection and beacon protection are the
4052 * same on all links.
4053 */
4054 ml_key_info.mgmt_frame_prot = sm->mgmt_frame_prot;
4055 ml_key_info.beacon_prot = sm->wpa_auth->conf.beacon_prot;
4056
4057 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
4058 if (!sm->mld_links[link_id].valid)
4059 continue;
4060
4061 ml_key_info.links[i++].link_id = link_id;
4062 }
4063
4064 wpa_auth_get_ml_key_info(sm->wpa_auth, &ml_key_info);
4065
4066 /* Add MLO GTK KDEs */
4067 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004068 if (!sm->mld_links[link_id].valid ||
4069 !ml_key_info.links[i].gtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004070 continue;
4071
4072 wpa_printf(MSG_DEBUG, "RSN: MLO GTK: link=%u", link_id);
4073 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO GTK",
4074 ml_key_info.links[i].gtk,
4075 ml_key_info.links[i].gtk_len);
4076
4077 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4078 *pos++ = RSN_SELECTOR_LEN + 1 + 6 +
4079 ml_key_info.links[i].gtk_len;
4080
4081 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_GTK);
4082 pos += RSN_SELECTOR_LEN;
4083
4084 *pos++ = (ml_key_info.links[i].gtkidx & 0x3) | (link_id << 4);
4085
4086 os_memcpy(pos, ml_key_info.links[i].pn, 6);
4087 pos += 6;
4088
4089 os_memcpy(pos, ml_key_info.links[i].gtk,
4090 ml_key_info.links[i].gtk_len);
4091 pos += ml_key_info.links[i].gtk_len;
4092
4093 i++;
4094 }
4095
4096 if (!sm->mgmt_frame_prot)
4097 return pos;
4098
4099 /* Add MLO IGTK KDEs */
4100 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004101 if (!sm->mld_links[link_id].valid ||
4102 !ml_key_info.links[i].igtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004103 continue;
4104
4105 wpa_printf(MSG_DEBUG, "RSN: MLO IGTK: link=%u", link_id);
4106 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO IGTK",
4107 ml_key_info.links[i].igtk,
4108 ml_key_info.links[i].igtk_len);
4109
4110 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4111 *pos++ = RSN_SELECTOR_LEN + 2 + 1 +
4112 sizeof(ml_key_info.links[i].ipn) +
4113 ml_key_info.links[i].igtk_len;
4114
4115 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_IGTK);
4116 pos += RSN_SELECTOR_LEN;
4117
4118 /* Add the Key ID */
4119 *pos++ = ml_key_info.links[i].igtkidx;
4120 *pos++ = 0;
4121
4122 /* Add the IPN */
4123 os_memcpy(pos, ml_key_info.links[i].ipn,
4124 sizeof(ml_key_info.links[i].ipn));
4125 pos += sizeof(ml_key_info.links[i].ipn);
4126
4127 *pos++ = ml_key_info.links[i].link_id << 4;
4128
4129 os_memcpy(pos, ml_key_info.links[i].igtk,
4130 ml_key_info.links[i].igtk_len);
4131 pos += ml_key_info.links[i].igtk_len;
4132
4133 i++;
4134 }
4135
4136 if (!sm->wpa_auth->conf.beacon_prot)
4137 return pos;
4138
4139 /* Add MLO BIGTK KDEs */
4140 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004141 if (!sm->mld_links[link_id].valid ||
4142 !ml_key_info.links[i].bigtk ||
4143 !ml_key_info.links[i].igtk_len)
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004144 continue;
4145
4146 wpa_printf(MSG_DEBUG, "RSN: MLO BIGTK: link=%u", link_id);
4147 wpa_hexdump_key(MSG_DEBUG, "RSN: MLO BIGTK",
4148 ml_key_info.links[i].bigtk,
4149 ml_key_info.links[i].igtk_len);
4150
4151 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4152 *pos++ = RSN_SELECTOR_LEN + 2 + 1 +
4153 sizeof(ml_key_info.links[i].bipn) +
4154 ml_key_info.links[i].igtk_len;
4155
4156 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_BIGTK);
4157 pos += RSN_SELECTOR_LEN;
4158
4159 /* Add the Key ID */
4160 *pos++ = ml_key_info.links[i].bigtkidx;
4161 *pos++ = 0;
4162
4163 /* Add the BIPN */
4164 os_memcpy(pos, ml_key_info.links[i].bipn,
4165 sizeof(ml_key_info.links[i].bipn));
4166 pos += sizeof(ml_key_info.links[i].bipn);
4167
4168 *pos++ = ml_key_info.links[i].link_id << 4;
4169
4170 os_memcpy(pos, ml_key_info.links[i].bigtk,
4171 ml_key_info.links[i].igtk_len);
4172 pos += ml_key_info.links[i].igtk_len;
4173
4174 i++;
4175 }
4176
4177 return pos;
4178}
4179
4180#endif /* CONFIG_IEEE80211BE */
4181
4182
4183static size_t wpa_auth_ml_kdes_len(struct wpa_state_machine *sm)
4184{
4185 size_t kde_len = 0;
4186
4187#ifdef CONFIG_IEEE80211BE
4188 unsigned int link_id;
4189
4190 if (sm->mld_assoc_link_id < 0)
4191 return 0;
4192
4193 /* For the MAC Address KDE */
4194 kde_len = 2 + RSN_SELECTOR_LEN + ETH_ALEN;
4195
4196 /* MLO Link KDE for each link */
4197 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
4198 if (!sm->mld_links[link_id].valid)
4199 continue;
4200
4201 kde_len += 2 + RSN_SELECTOR_LEN + 1 + ETH_ALEN +
4202 sm->mld_links[link_id].rsne_len +
4203 sm->mld_links[link_id].rsnxe_len;
4204 }
4205
4206 kde_len += wpa_auth_ml_group_kdes_len(sm);
4207#endif /* CONFIG_IEEE80211BE */
4208
4209 return kde_len;
4210}
4211
4212
4213static u8 * wpa_auth_ml_kdes(struct wpa_state_machine *sm, u8 *pos)
4214{
4215#ifdef CONFIG_IEEE80211BE
4216 u8 link_id;
4217
4218 if (sm->mld_assoc_link_id < 0)
4219 return pos;
4220
4221 wpa_printf(MSG_DEBUG, "RSN: MLD: Adding MAC Address KDE");
4222 pos = wpa_add_kde(pos, RSN_KEY_DATA_MAC_ADDR,
4223 sm->own_mld_addr, ETH_ALEN, NULL, 0);
4224
4225 for (link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
4226 if (!sm->mld_links[link_id].valid)
4227 continue;
4228
4229 wpa_printf(MSG_DEBUG,
4230 "RSN: MLO Link: link=%u, len=%zu", link_id,
4231 RSN_SELECTOR_LEN + 1 + ETH_ALEN +
4232 sm->mld_links[link_id].rsne_len +
4233 sm->mld_links[link_id].rsnxe_len);
4234
4235 *pos++ = WLAN_EID_VENDOR_SPECIFIC;
4236 *pos++ = RSN_SELECTOR_LEN + 1 + ETH_ALEN +
4237 sm->mld_links[link_id].rsne_len +
4238 sm->mld_links[link_id].rsnxe_len;
4239
4240 RSN_SELECTOR_PUT(pos, RSN_KEY_DATA_MLO_LINK);
4241 pos += RSN_SELECTOR_LEN;
4242
4243 /* Add the Link Information */
4244 *pos = link_id;
4245 if (sm->mld_links[link_id].rsne_len)
4246 *pos |= RSN_MLO_LINK_KDE_LI_RSNE_INFO;
4247 if (sm->mld_links[link_id].rsnxe_len)
4248 *pos |= RSN_MLO_LINK_KDE_LI_RSNXE_INFO;
4249
4250 pos++;
4251 os_memcpy(pos, sm->mld_links[link_id].own_addr, ETH_ALEN);
4252 pos += ETH_ALEN;
4253
4254 if (sm->mld_links[link_id].rsne_len) {
4255 os_memcpy(pos, sm->mld_links[link_id].rsne,
4256 sm->mld_links[link_id].rsne_len);
4257 pos += sm->mld_links[link_id].rsne_len;
4258 }
4259
4260 if (sm->mld_links[link_id].rsnxe_len) {
4261 os_memcpy(pos, sm->mld_links[link_id].rsnxe,
4262 sm->mld_links[link_id].rsnxe_len);
4263 pos += sm->mld_links[link_id].rsnxe_len;
4264 }
4265 }
4266
4267 pos = wpa_auth_ml_group_kdes(sm, pos);
4268#endif /* CONFIG_IEEE80211BE */
4269
4270 return pos;
4271}
4272
4273
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004274SM_STATE(WPA_PTK, PTKINITNEGOTIATING)
4275{
Hai Shaloma20dcd72022-02-04 13:43:00 -08004276 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde = NULL, *pos, stub_gtk[32];
Sunil Ravia04bd252022-05-02 22:54:18 -07004277 size_t gtk_len, kde_len = 0, wpa_ie_len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004278 struct wpa_group *gsm = sm->group;
4279 u8 *wpa_ie;
Hai Shalomfdcde762020-04-02 11:19:20 -07004280 int secure, gtkidx, encr = 0;
4281 u8 *wpa_ie_buf = NULL, *wpa_ie_buf2 = NULL;
4282 u8 hdr[2];
4283 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004284#ifdef CONFIG_IEEE80211BE
4285 bool is_mld = sm->mld_assoc_link_id >= 0;
4286#else /* CONFIG_IEEE80211BE */
4287 bool is_mld = false;
4288#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004289
4290 SM_ENTRY_MA(WPA_PTK, PTKINITNEGOTIATING, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07004291 sm->TimeoutEvt = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004292
4293 sm->TimeoutCtr++;
Hai Shalomfdcde762020-04-02 11:19:20 -07004294 if (conf->wpa_disable_eapol_key_retries && sm->TimeoutCtr > 1) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004295 /* Do not allow retransmission of EAPOL-Key msg 3/4 */
4296 return;
4297 }
Hai Shalomfdcde762020-04-02 11:19:20 -07004298 if (sm->TimeoutCtr > conf->wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004299 /* No point in sending the EAPOL-Key - we will disconnect
4300 * immediately following this. */
4301 return;
4302 }
4303
4304 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
Hai Shalomfdcde762020-04-02 11:19:20 -07004305 GTK[GN], IGTK, [BIGTK], [FTIE], [TIE * 2])
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004306 */
4307 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
4308 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc);
4309 /* If FT is used, wpa_auth->wpa_ie includes both RSNIE and MDIE */
4310 wpa_ie = sm->wpa_auth->wpa_ie;
4311 wpa_ie_len = sm->wpa_auth->wpa_ie_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07004312 if (sm->wpa == WPA_VERSION_WPA && (conf->wpa & WPA_PROTO_RSN) &&
4313 wpa_ie_len > wpa_ie[1] + 2U && wpa_ie[0] == WLAN_EID_RSN) {
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004314 /* WPA-only STA, remove RSN IE and possible MDIE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004315 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Hai Shalom60840252021-02-19 19:02:11 -08004316 if (wpa_ie[0] == WLAN_EID_RSNX)
4317 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004318 if (wpa_ie[0] == WLAN_EID_MOBILITY_DOMAIN)
4319 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004320 wpa_ie_len = wpa_ie[1] + 2;
4321 }
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004322#ifdef CONFIG_TESTING_OPTIONS
Hai Shalomfdcde762020-04-02 11:19:20 -07004323 if (conf->rsne_override_eapol_set) {
4324 wpa_ie_buf2 = replace_ie(
4325 "RSNE", wpa_ie, &wpa_ie_len, WLAN_EID_RSN,
4326 conf->rsne_override_eapol,
4327 conf->rsne_override_eapol_len);
4328 if (!wpa_ie_buf2)
4329 goto done;
4330 wpa_ie = wpa_ie_buf2;
4331 }
4332 if (conf->rsnxe_override_eapol_set) {
4333 wpa_ie_buf = replace_ie(
4334 "RSNXE", wpa_ie, &wpa_ie_len, WLAN_EID_RSNX,
4335 conf->rsnxe_override_eapol,
4336 conf->rsnxe_override_eapol_len);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004337 if (!wpa_ie_buf)
Hai Shalomfdcde762020-04-02 11:19:20 -07004338 goto done;
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004339 wpa_ie = wpa_ie_buf;
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004340 }
4341#endif /* CONFIG_TESTING_OPTIONS */
Sunil Raviaf8751c2023-03-29 11:35:17 -07004342 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004343 "sending 3/4 msg of 4-Way Handshake");
4344 if (sm->wpa == WPA_VERSION_WPA2) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004345 if (sm->use_ext_key_id && sm->TimeoutCtr == 1 &&
4346 wpa_auth_set_key(sm->wpa_auth, 0,
4347 wpa_cipher_to_alg(sm->pairwise),
4348 sm->addr,
4349 sm->keyidx_active, sm->PTK.tk,
4350 wpa_cipher_key_len(sm->pairwise),
4351 KEY_FLAG_PAIRWISE_RX)) {
4352 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4353 WLAN_REASON_PREV_AUTH_NOT_VALID);
4354 return;
4355 }
4356
Sunil Ravi89eba102022-09-13 21:04:37 -07004357#ifdef CONFIG_PASN
4358 if (sm->wpa_auth->conf.secure_ltf &&
4359 ieee802_11_rsnx_capab(sm->rsnxe,
4360 WLAN_RSNX_CAPAB_SECURE_LTF) &&
4361 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
4362 sm->PTK.ltf_keyseed,
4363 sm->PTK.ltf_keyseed_len)) {
4364 wpa_printf(MSG_ERROR,
4365 "WPA: Failed to set LTF keyseed to driver");
4366 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4367 WLAN_REASON_PREV_AUTH_NOT_VALID);
4368 return;
4369 }
4370#endif /* CONFIG_PASN */
4371
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004372 /* WPA2 send GTK in the 4-way handshake */
4373 secure = 1;
4374 gtk = gsm->GTK[gsm->GN - 1];
4375 gtk_len = gsm->GTK_len;
Hai Shalomfdcde762020-04-02 11:19:20 -07004376 if (conf->disable_gtk ||
Roshan Pius3a1667e2018-07-03 15:17:14 -07004377 sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004378 /*
4379 * Provide unique random GTK to each STA to prevent use
4380 * of GTK in the BSS.
4381 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08004382 if (random_get_bytes(stub_gtk, gtk_len) < 0)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004383 goto done;
Hai Shaloma20dcd72022-02-04 13:43:00 -08004384 gtk = stub_gtk;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004385 }
Hai Shalomc3565922019-10-28 11:58:20 -07004386 gtkidx = gsm->GN;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004387 _rsc = rsc;
4388 encr = 1;
4389 } else {
4390 /* WPA does not include GTK in msg 3/4 */
4391 secure = 0;
4392 gtk = NULL;
4393 gtk_len = 0;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004394 gtkidx = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004395 _rsc = NULL;
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08004396 if (sm->rx_eapol_key_secure) {
4397 /*
4398 * It looks like Windows 7 supplicant tries to use
4399 * Secure bit in msg 2/4 after having reported Michael
4400 * MIC failure and it then rejects the 4-way handshake
4401 * if msg 3/4 does not set Secure bit. Work around this
4402 * by setting the Secure bit here even in the case of
4403 * WPA if the supplicant used it first.
4404 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07004405 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
4406 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07004407 "STA used Secure bit in WPA msg 2/4 - set Secure for 3/4 as workaround");
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08004408 secure = 1;
4409 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004410 }
4411
Hai Shalom74f70d42019-02-11 14:42:39 -08004412 kde_len = wpa_ie_len + ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Hai Shalomfdcde762020-04-02 11:19:20 -07004413
4414 if (sm->use_ext_key_id)
4415 kde_len += 2 + RSN_SELECTOR_LEN + 2;
4416
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004417 if (gtk)
4418 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004419#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004420 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
4421 kde_len += 2 + PMKID_LEN; /* PMKR1Name into RSN IE */
4422 kde_len += 300; /* FTIE + 2 * TIE */
4423 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004424#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004425#ifdef CONFIG_P2P
4426 if (WPA_GET_BE32(sm->ip_addr) > 0)
4427 kde_len += 2 + RSN_SELECTOR_LEN + 3 * 4;
4428#endif /* CONFIG_P2P */
Hai Shalomfdcde762020-04-02 11:19:20 -07004429
4430 if (conf->transition_disable)
4431 kde_len += 2 + RSN_SELECTOR_LEN + 1;
4432
Hai Shalom4fbc08f2020-05-18 12:37:00 -07004433#ifdef CONFIG_DPP2
4434 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP)
4435 kde_len += 2 + RSN_SELECTOR_LEN + 2;
4436#endif /* CONFIG_DPP2 */
4437
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004438 kde_len += wpa_auth_ml_kdes_len(sm);
4439
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004440#ifdef CONFIG_TESTING_OPTIONS
4441 if (conf->eapol_m3_elements)
4442 kde_len += wpabuf_len(conf->eapol_m3_elements);
4443#endif /* CONFIG_TESTING_OPTIONS */
4444
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004445 kde = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07004446 if (!kde)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004447 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004448
4449 pos = kde;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004450 if (!is_mld) {
4451 os_memcpy(pos, wpa_ie, wpa_ie_len);
4452 pos += wpa_ie_len;
4453 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004454#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004455 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004456 int res;
4457 size_t elen;
4458
4459 elen = pos - kde;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004460 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004461 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004462 wpa_printf(MSG_ERROR,
4463 "FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004464 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004465 }
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004466 pos -= wpa_ie_len;
4467 pos += elen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004468 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004469#endif /* CONFIG_IEEE80211R_AP */
Hai Shalomfdcde762020-04-02 11:19:20 -07004470 hdr[1] = 0;
4471
4472 if (sm->use_ext_key_id) {
4473 hdr[0] = sm->keyidx_active & 0x01;
4474 pos = wpa_add_kde(pos, RSN_KEY_DATA_KEYID, hdr, 2, NULL, 0);
4475 }
4476
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004477 if (gtk && !is_mld) {
Hai Shalomc3565922019-10-28 11:58:20 -07004478 hdr[0] = gtkidx & 0x03;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004479 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
4480 gtk, gtk_len);
4481 }
4482 pos = ieee80211w_kde_add(sm, pos);
Hai Shalom899fcc72020-10-19 14:38:18 -07004483 if (ocv_oci_add(sm, &pos, conf->oci_freq_override_eapol_m3) < 0)
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004484 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004485
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004486#ifdef CONFIG_IEEE80211R_AP
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004487 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
4488 int res;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004489
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004490 if (sm->assoc_resp_ftie &&
4491 kde + kde_len - pos >= 2 + sm->assoc_resp_ftie[1]) {
4492 os_memcpy(pos, sm->assoc_resp_ftie,
4493 2 + sm->assoc_resp_ftie[1]);
4494 res = 2 + sm->assoc_resp_ftie[1];
4495 } else {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00004496 res = wpa_write_ftie(conf, sm->wpa_key_mgmt,
4497 sm->xxkey_len,
Roshan Pius3a1667e2018-07-03 15:17:14 -07004498 conf->r0_key_holder,
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004499 conf->r0_key_holder_len,
4500 NULL, NULL, pos,
4501 kde + kde_len - pos,
Hai Shalomfdcde762020-04-02 11:19:20 -07004502 NULL, 0, 0);
Dmitry Shmidt55840ad2015-12-14 12:45:46 -08004503 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004504 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07004505 wpa_printf(MSG_ERROR,
4506 "FT: Failed to insert FTIE into EAPOL-Key Key Data");
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004507 goto done;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004508 }
4509 pos += res;
4510
4511 /* TIE[ReassociationDeadline] (TU) */
4512 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
4513 *pos++ = 5;
4514 *pos++ = WLAN_TIMEOUT_REASSOC_DEADLINE;
4515 WPA_PUT_LE32(pos, conf->reassociation_deadline);
4516 pos += 4;
4517
4518 /* TIE[KeyLifetime] (seconds) */
4519 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
4520 *pos++ = 5;
4521 *pos++ = WLAN_TIMEOUT_KEY_LIFETIME;
Roshan Pius3a1667e2018-07-03 15:17:14 -07004522 WPA_PUT_LE32(pos, conf->r0_key_lifetime);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004523 pos += 4;
4524 }
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004525#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004526#ifdef CONFIG_P2P
4527 if (WPA_GET_BE32(sm->ip_addr) > 0) {
4528 u8 addr[3 * 4];
4529 os_memcpy(addr, sm->ip_addr, 4);
Hai Shalomfdcde762020-04-02 11:19:20 -07004530 os_memcpy(addr + 4, conf->ip_addr_mask, 4);
4531 os_memcpy(addr + 8, conf->ip_addr_go, 4);
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08004532 pos = wpa_add_kde(pos, WFA_KEY_DATA_IP_ADDR_ALLOC,
4533 addr, sizeof(addr), NULL, 0);
4534 }
4535#endif /* CONFIG_P2P */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004536
Hai Shalomfdcde762020-04-02 11:19:20 -07004537 if (conf->transition_disable)
4538 pos = wpa_add_kde(pos, WFA_KEY_DATA_TRANSITION_DISABLE,
4539 &conf->transition_disable, 1, NULL, 0);
4540
Hai Shalom4fbc08f2020-05-18 12:37:00 -07004541#ifdef CONFIG_DPP2
4542 if (DPP_VERSION > 1 && sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP) {
4543 u8 payload[2];
4544
4545 payload[0] = DPP_VERSION; /* Protocol Version */
4546 payload[1] = 0; /* Flags */
4547 if (conf->dpp_pfs == 0)
4548 payload[1] |= DPP_KDE_PFS_ALLOWED;
4549 else if (conf->dpp_pfs == 1)
4550 payload[1] |= DPP_KDE_PFS_ALLOWED |
4551 DPP_KDE_PFS_REQUIRED;
4552 pos = wpa_add_kde(pos, WFA_KEY_DATA_DPP,
4553 payload, sizeof(payload), NULL, 0);
4554 }
4555#endif /* CONFIG_DPP2 */
4556
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004557 pos = wpa_auth_ml_kdes(sm, pos);
4558
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004559#ifdef CONFIG_TESTING_OPTIONS
4560 if (conf->eapol_m3_elements) {
4561 os_memcpy(pos, wpabuf_head(conf->eapol_m3_elements),
4562 wpabuf_len(conf->eapol_m3_elements));
4563 pos += wpabuf_len(conf->eapol_m3_elements);
4564 }
4565
4566 if (conf->eapol_m3_no_encrypt)
4567 encr = 0;
4568#endif /* CONFIG_TESTING_OPTIONS */
4569
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004570 wpa_send_eapol(sm->wpa_auth, sm,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004571 (secure ? WPA_KEY_INFO_SECURE : 0) |
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004572 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
4573 WPA_KEY_INFO_MIC : 0) |
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004574 WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
4575 WPA_KEY_INFO_KEY_TYPE,
Hai Shalomc3565922019-10-28 11:58:20 -07004576 _rsc, sm->ANonce, kde, pos - kde, 0, encr);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004577done:
Sunil Ravia04bd252022-05-02 22:54:18 -07004578 bin_clear_free(kde, kde_len);
Ahmed ElArabawy0ff61c52019-12-26 12:38:39 -08004579 os_free(wpa_ie_buf);
Hai Shalomfdcde762020-04-02 11:19:20 -07004580 os_free(wpa_ie_buf2);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004581}
4582
4583
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004584static int wpa_auth_validate_ml_kdes_m4(struct wpa_state_machine *sm)
4585{
4586#ifdef CONFIG_IEEE80211BE
4587 const struct ieee802_1x_hdr *hdr;
4588 const struct wpa_eapol_key *key;
4589 struct wpa_eapol_ie_parse kde;
4590 const u8 *key_data, *mic;
4591 u16 key_data_length;
4592 size_t mic_len;
4593
4594 if (sm->mld_assoc_link_id < 0)
4595 return 0;
4596
4597 /*
4598 * Note: last_rx_eapol_key length fields have already been validated in
4599 * wpa_receive().
4600 */
4601 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
4602
4603 hdr = (const struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
4604 key = (const struct wpa_eapol_key *) (hdr + 1);
4605 mic = (const u8 *) (key + 1);
4606 key_data = mic + mic_len + 2;
4607 key_data_length = WPA_GET_BE16(mic + mic_len);
4608 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
4609 sizeof(*key) - mic_len - 2)
4610 return -1;
4611
4612 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
4613 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm),
4614 LOGGER_INFO,
4615 "received EAPOL-Key msg 4/4 with invalid Key Data contents");
4616 return -1;
4617 }
4618
4619 /* MLD MAC address must be the same */
4620 if (!kde.mac_addr ||
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004621 !ether_addr_equal(kde.mac_addr, sm->peer_mld_addr)) {
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004622 wpa_printf(MSG_DEBUG,
4623 "MLD: Mismatching or missing MLD address in EAPOL-Key msg 4/4");
4624 return -1;
4625 }
4626
4627 wpa_printf(MSG_DEBUG, "MLD: MLD address in EAPOL-Key msg 4/4: " MACSTR,
4628 MAC2STR(kde.mac_addr));
4629#endif /* CONFIG_IEEE80211BE */
4630
4631 return 0;
4632}
4633
4634
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004635SM_STATE(WPA_PTK, PTKINITDONE)
4636{
4637 SM_ENTRY_MA(WPA_PTK, PTKINITDONE, wpa_ptk);
Hai Shalome21d4e82020-04-29 16:34:06 -07004638 sm->EAPOLKeyReceived = false;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004639
4640 if (wpa_auth_validate_ml_kdes_m4(sm) < 0) {
4641 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4642 WLAN_REASON_PREV_AUTH_NOT_VALID);
4643 return;
4644 }
4645
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004646 if (sm->Pair) {
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -07004647 enum wpa_alg alg = wpa_cipher_to_alg(sm->pairwise);
4648 int klen = wpa_cipher_key_len(sm->pairwise);
Hai Shalomfdcde762020-04-02 11:19:20 -07004649 int res;
4650
4651 if (sm->use_ext_key_id)
4652 res = wpa_auth_set_key(sm->wpa_auth, 0, 0, sm->addr,
4653 sm->keyidx_active, NULL, 0,
4654 KEY_FLAG_PAIRWISE_RX_TX_MODIFY);
4655 else
4656 res = wpa_auth_set_key(sm->wpa_auth, 0, alg, sm->addr,
4657 0, sm->PTK.tk, klen,
4658 KEY_FLAG_PAIRWISE_RX_TX);
4659 if (res) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004660 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4661 WLAN_REASON_PREV_AUTH_NOT_VALID);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004662 return;
4663 }
Sunil Ravi89eba102022-09-13 21:04:37 -07004664
4665#ifdef CONFIG_PASN
4666 if (sm->wpa_auth->conf.secure_ltf &&
4667 ieee802_11_rsnx_capab(sm->rsnxe,
4668 WLAN_RSNX_CAPAB_SECURE_LTF) &&
4669 wpa_auth_set_ltf_keyseed(sm->wpa_auth, sm->addr,
4670 sm->PTK.ltf_keyseed,
4671 sm->PTK.ltf_keyseed_len)) {
4672 wpa_printf(MSG_ERROR,
4673 "WPA: Failed to set LTF keyseed to driver");
4674 wpa_sta_disconnect(sm->wpa_auth, sm->addr,
4675 WLAN_REASON_PREV_AUTH_NOT_VALID);
4676 return;
4677 }
4678#endif /* CONFIG_PASN */
4679
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004680 /* FIX: MLME-SetProtection.Request(TA, Tx_Rx) */
Hai Shalome21d4e82020-04-29 16:34:06 -07004681 sm->pairwise_set = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004682
Hai Shalom81f62d82019-07-22 12:10:00 -07004683 wpa_auth_set_ptk_rekey_timer(sm);
Hai Shalom60840252021-02-19 19:02:11 -08004684 wpa_auth_store_ptksa(sm->wpa_auth, sm->addr, sm->pairwise,
4685 dot11RSNAConfigPMKLifetime, &sm->PTK);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004686
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004687 if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
4688 sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP ||
4689 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004690 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
4691 WPA_EAPOL_authorized, 1);
4692 }
4693 }
4694
4695 if (0 /* IBSS == TRUE */) {
4696 sm->keycount++;
4697 if (sm->keycount == 2) {
4698 wpa_auth_set_eapol(sm->wpa_auth, sm->addr,
4699 WPA_EAPOL_portValid, 1);
4700 }
4701 } else {
4702 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_portValid,
4703 1);
4704 }
Hai Shalome21d4e82020-04-29 16:34:06 -07004705 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyAvailable,
4706 false);
4707 wpa_auth_set_eapol(sm->wpa_auth, sm->addr, WPA_EAPOL_keyDone, true);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004708 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07004709 sm->PInitAKeys = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004710 else
Hai Shalome21d4e82020-04-29 16:34:06 -07004711 sm->has_GTK = true;
Sunil Raviaf8751c2023-03-29 11:35:17 -07004712 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004713 "pairwise key handshake completed (%s)",
4714 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN");
Hai Shaloma20dcd72022-02-04 13:43:00 -08004715 wpa_msg(sm->wpa_auth->conf.msg_ctx, MSG_INFO, "EAPOL-4WAY-HS-COMPLETED "
4716 MACSTR, MAC2STR(sm->addr));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004717
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004718#ifdef CONFIG_IEEE80211R_AP
Sunil Raviaf8751c2023-03-29 11:35:17 -07004719 wpa_ft_push_pmk_r1(sm->wpa_auth, wpa_auth_get_spa(sm));
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004720#endif /* CONFIG_IEEE80211R_AP */
Sunil Ravia04bd252022-05-02 22:54:18 -07004721
4722 sm->ptkstart_without_success = 0;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004723}
4724
4725
4726SM_STEP(WPA_PTK)
4727{
4728 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07004729 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004730
4731 if (sm->Init)
4732 SM_ENTER(WPA_PTK, INITIALIZE);
4733 else if (sm->Disconnect
4734 /* || FIX: dot11RSNAConfigSALifetime timeout */) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07004735 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004736 "WPA_PTK: sm->Disconnect");
4737 SM_ENTER(WPA_PTK, DISCONNECT);
4738 }
4739 else if (sm->DeauthenticationRequest)
4740 SM_ENTER(WPA_PTK, DISCONNECTED);
4741 else if (sm->AuthenticationRequest)
4742 SM_ENTER(WPA_PTK, AUTHENTICATION);
4743 else if (sm->ReAuthenticationRequest)
4744 SM_ENTER(WPA_PTK, AUTHENTICATION2);
Jouni Malinen1420a892017-10-01 12:32:57 +03004745 else if (sm->PTKRequest) {
4746 if (wpa_auth_sm_ptk_update(sm) < 0)
4747 SM_ENTER(WPA_PTK, DISCONNECTED);
4748 else
4749 SM_ENTER(WPA_PTK, PTKSTART);
4750 } else switch (sm->wpa_ptk_state) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004751 case WPA_PTK_INITIALIZE:
4752 break;
4753 case WPA_PTK_DISCONNECT:
4754 SM_ENTER(WPA_PTK, DISCONNECTED);
4755 break;
4756 case WPA_PTK_DISCONNECTED:
4757 SM_ENTER(WPA_PTK, INITIALIZE);
4758 break;
4759 case WPA_PTK_AUTHENTICATION:
4760 SM_ENTER(WPA_PTK, AUTHENTICATION2);
4761 break;
4762 case WPA_PTK_AUTHENTICATION2:
4763 if (wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) &&
Hai Shalomfdcde762020-04-02 11:19:20 -07004764 wpa_auth_get_eapol(wpa_auth, sm->addr,
Hai Shalome21d4e82020-04-29 16:34:06 -07004765 WPA_EAPOL_keyRun))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004766 SM_ENTER(WPA_PTK, INITPMK);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004767 else if (wpa_key_mgmt_wpa_psk(sm->wpa_key_mgmt) ||
4768 sm->wpa_key_mgmt == WPA_KEY_MGMT_OWE
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004769 /* FIX: && 802.1X::keyRun */)
4770 SM_ENTER(WPA_PTK, INITPSK);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004771 else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP)
4772 SM_ENTER(WPA_PTK, INITPMK);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004773 break;
4774 case WPA_PTK_INITPMK:
Hai Shalomfdcde762020-04-02 11:19:20 -07004775 if (wpa_auth_get_eapol(wpa_auth, sm->addr,
Hai Shalome21d4e82020-04-29 16:34:06 -07004776 WPA_EAPOL_keyAvailable)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004777 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004778#ifdef CONFIG_DPP
4779 } else if (sm->wpa_key_mgmt == WPA_KEY_MGMT_DPP && sm->pmksa) {
4780 SM_ENTER(WPA_PTK, PTKSTART);
4781#endif /* CONFIG_DPP */
4782 } else {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004783 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07004784 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
4785 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004786 "INITPMK - keyAvailable = false");
4787 SM_ENTER(WPA_PTK, DISCONNECT);
4788 }
4789 break;
4790 case WPA_PTK_INITPSK:
Hai Shalomfdcde762020-04-02 11:19:20 -07004791 if (wpa_auth_get_psk(wpa_auth, sm->addr, sm->p2p_dev_addr,
Hai Shalom021b0b52019-04-10 11:17:58 -07004792 NULL, NULL, NULL)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004793 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004794#ifdef CONFIG_SAE
4795 } else if (wpa_auth_uses_sae(sm) && sm->pmksa) {
4796 SM_ENTER(WPA_PTK, PTKSTART);
4797#endif /* CONFIG_SAE */
Sunil Ravia04bd252022-05-02 22:54:18 -07004798 } else if (wpa_key_mgmt_wpa_psk_no_sae(sm->wpa_key_mgmt) &&
4799 wpa_auth->conf.radius_psk) {
4800 wpa_printf(MSG_DEBUG,
4801 "INITPSK: No PSK yet available for STA - use RADIUS later");
4802 SM_ENTER(WPA_PTK, PTKSTART);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004803 } else {
Sunil Raviaf8751c2023-03-29 11:35:17 -07004804 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
4805 LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004806 "no PSK configured for the STA");
4807 wpa_auth->dot11RSNA4WayHandshakeFailures++;
4808 SM_ENTER(WPA_PTK, DISCONNECT);
4809 }
4810 break;
4811 case WPA_PTK_PTKSTART:
4812 if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
4813 sm->EAPOLKeyPairwise)
4814 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
Hai Shalomfdcde762020-04-02 11:19:20 -07004815 else if (sm->TimeoutCtr > conf->wpa_pairwise_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004816 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07004817 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
4818 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07004819 "PTKSTART: Retry limit %u reached",
4820 conf->wpa_pairwise_update_count);
Hai Shalome21d4e82020-04-29 16:34:06 -07004821 sm->disconnect_reason =
4822 WLAN_REASON_4WAY_HANDSHAKE_TIMEOUT;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004823 SM_ENTER(WPA_PTK, DISCONNECT);
4824 } else if (sm->TimeoutEvt)
4825 SM_ENTER(WPA_PTK, PTKSTART);
4826 break;
4827 case WPA_PTK_PTKCALCNEGOTIATING:
4828 if (sm->MICVerified)
4829 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING2);
4830 else if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
4831 sm->EAPOLKeyPairwise)
4832 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
4833 else if (sm->TimeoutEvt)
4834 SM_ENTER(WPA_PTK, PTKSTART);
4835 break;
4836 case WPA_PTK_PTKCALCNEGOTIATING2:
4837 SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);
4838 break;
4839 case WPA_PTK_PTKINITNEGOTIATING:
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08004840 if (sm->update_snonce)
4841 SM_ENTER(WPA_PTK, PTKCALCNEGOTIATING);
4842 else if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
4843 sm->EAPOLKeyPairwise && sm->MICVerified)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004844 SM_ENTER(WPA_PTK, PTKINITDONE);
4845 else if (sm->TimeoutCtr >
Hai Shalomfdcde762020-04-02 11:19:20 -07004846 conf->wpa_pairwise_update_count ||
4847 (conf->wpa_disable_eapol_key_retries &&
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004848 sm->TimeoutCtr > 1)) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004849 wpa_auth->dot11RSNA4WayHandshakeFailures++;
Sunil Raviaf8751c2023-03-29 11:35:17 -07004850 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
4851 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07004852 "PTKINITNEGOTIATING: Retry limit %u reached",
4853 conf->wpa_pairwise_update_count);
Hai Shalome21d4e82020-04-29 16:34:06 -07004854 sm->disconnect_reason =
4855 WLAN_REASON_4WAY_HANDSHAKE_TIMEOUT;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004856 SM_ENTER(WPA_PTK, DISCONNECT);
4857 } else if (sm->TimeoutEvt)
4858 SM_ENTER(WPA_PTK, PTKINITNEGOTIATING);
4859 break;
4860 case WPA_PTK_PTKINITDONE:
4861 break;
4862 }
4863}
4864
4865
4866SM_STATE(WPA_PTK_GROUP, IDLE)
4867{
4868 SM_ENTRY_MA(WPA_PTK_GROUP, IDLE, wpa_ptk_group);
4869 if (sm->Init) {
4870 /* Init flag is not cleared here, so avoid busy
4871 * loop by claiming nothing changed. */
Hai Shalome21d4e82020-04-29 16:34:06 -07004872 sm->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004873 }
4874 sm->GTimeoutCtr = 0;
4875}
4876
4877
4878SM_STATE(WPA_PTK_GROUP, REKEYNEGOTIATING)
4879{
4880 u8 rsc[WPA_KEY_RSC_LEN];
4881 struct wpa_group *gsm = sm->group;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004882 const u8 *kde = NULL;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004883 u8 *kde_buf = NULL, *pos, hdr[2];
Sunil Ravia04bd252022-05-02 22:54:18 -07004884 size_t kde_len = 0;
Hai Shaloma20dcd72022-02-04 13:43:00 -08004885 u8 *gtk, stub_gtk[32];
Hai Shalomfdcde762020-04-02 11:19:20 -07004886 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004887 bool is_mld = false;
4888
4889#ifdef CONFIG_IEEE80211BE
4890 is_mld = sm->mld_assoc_link_id >= 0;
4891#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004892
4893 SM_ENTRY_MA(WPA_PTK_GROUP, REKEYNEGOTIATING, wpa_ptk_group);
4894
4895 sm->GTimeoutCtr++;
Hai Shalomfdcde762020-04-02 11:19:20 -07004896 if (conf->wpa_disable_eapol_key_retries && sm->GTimeoutCtr > 1) {
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004897 /* Do not allow retransmission of EAPOL-Key group msg 1/2 */
4898 return;
4899 }
Hai Shalomfdcde762020-04-02 11:19:20 -07004900 if (sm->GTimeoutCtr > conf->wpa_group_update_count) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004901 /* No point in sending the EAPOL-Key - we will disconnect
4902 * immediately following this. */
4903 return;
4904 }
4905
4906 if (sm->wpa == WPA_VERSION_WPA)
Hai Shalome21d4e82020-04-29 16:34:06 -07004907 sm->PInitAKeys = false;
4908 sm->TimeoutEvt = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004909 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
4910 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
4911 if (gsm->wpa_group_state == WPA_GROUP_SETKEYSDONE)
4912 wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, rsc);
Sunil Raviaf8751c2023-03-29 11:35:17 -07004913 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004914 "sending 1/2 msg of Group Key Handshake");
4915
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004916 gtk = gsm->GTK[gsm->GN - 1];
Hai Shalomfdcde762020-04-02 11:19:20 -07004917 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004918 /*
4919 * Provide unique random GTK to each STA to prevent use
4920 * of GTK in the BSS.
4921 */
Hai Shaloma20dcd72022-02-04 13:43:00 -08004922 if (random_get_bytes(stub_gtk, gsm->GTK_len) < 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004923 return;
Hai Shaloma20dcd72022-02-04 13:43:00 -08004924 gtk = stub_gtk;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004925 }
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004926
4927 if (sm->wpa == WPA_VERSION_WPA2 && !is_mld) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004928 kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
Hai Shalom74f70d42019-02-11 14:42:39 -08004929 ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004930 kde_buf = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07004931 if (!kde_buf)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004932 return;
4933
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004934 kde = pos = kde_buf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004935 hdr[0] = gsm->GN & 0x03;
4936 hdr[1] = 0;
4937 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004938 gtk, gsm->GTK_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004939 pos = ieee80211w_kde_add(sm, pos);
Hai Shalom899fcc72020-10-19 14:38:18 -07004940 if (ocv_oci_add(sm, &pos,
4941 conf->oci_freq_override_eapol_g1) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08004942 os_free(kde_buf);
4943 return;
4944 }
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004945 kde_len = pos - kde;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004946#ifdef CONFIG_IEEE80211BE
4947 } else if (sm->wpa == WPA_VERSION_WPA2 && is_mld) {
4948 kde_len = wpa_auth_ml_group_kdes_len(sm);
4949 if (kde_len) {
4950 kde_buf = os_malloc(kde_len);
4951 if (!kde_buf)
4952 return;
4953
4954 kde = pos = kde_buf;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00004955 pos = wpa_auth_ml_group_kdes(sm, pos);
4956 kde_len = pos - kde_buf;
Sunil Ravi2a14cf12023-11-21 00:54:38 +00004957 }
4958#endif /* CONFIG_IEEE80211BE */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004959 } else {
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07004960 kde = gtk;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004961 kde_len = gsm->GTK_len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004962 }
4963
4964 wpa_send_eapol(sm->wpa_auth, sm,
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08004965 WPA_KEY_INFO_SECURE |
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07004966 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
4967 WPA_KEY_INFO_MIC : 0) |
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004968 WPA_KEY_INFO_ACK |
4969 (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08004970 rsc, NULL, kde, kde_len, gsm->GN, 1);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08004971
Sunil Ravia04bd252022-05-02 22:54:18 -07004972 bin_clear_free(kde_buf, kde_len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004973}
4974
4975
4976SM_STATE(WPA_PTK_GROUP, REKEYESTABLISHED)
4977{
Hai Shalom74f70d42019-02-11 14:42:39 -08004978 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
Hai Shalomfdcde762020-04-02 11:19:20 -07004979#ifdef CONFIG_OCV
Hai Shalom74f70d42019-02-11 14:42:39 -08004980 const u8 *key_data, *mic;
4981 struct ieee802_1x_hdr *hdr;
4982 struct wpa_eapol_key *key;
4983 struct wpa_eapol_ie_parse kde;
4984 size_t mic_len;
4985 u16 key_data_length;
4986#endif /* CONFIG_OCV */
4987
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004988 SM_ENTRY_MA(WPA_PTK_GROUP, REKEYESTABLISHED, wpa_ptk_group);
Hai Shalome21d4e82020-04-29 16:34:06 -07004989 sm->EAPOLKeyReceived = false;
Hai Shalom74f70d42019-02-11 14:42:39 -08004990
4991#ifdef CONFIG_OCV
4992 mic_len = wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len);
4993
4994 /*
4995 * Note: last_rx_eapol_key length fields have already been validated in
4996 * wpa_receive().
4997 */
4998 hdr = (struct ieee802_1x_hdr *) sm->last_rx_eapol_key;
4999 key = (struct wpa_eapol_key *) (hdr + 1);
5000 mic = (u8 *) (key + 1);
5001 key_data = mic + mic_len + 2;
5002 key_data_length = WPA_GET_BE16(mic + mic_len);
5003 if (key_data_length > sm->last_rx_eapol_key_len - sizeof(*hdr) -
5004 sizeof(*key) - mic_len - 2)
5005 return;
5006
5007 if (wpa_parse_kde_ies(key_data, key_data_length, &kde) < 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005008 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Hai Shalom74f70d42019-02-11 14:42:39 -08005009 "received EAPOL-Key group msg 2/2 with invalid Key Data contents");
5010 return;
5011 }
5012
5013 if (wpa_auth_uses_ocv(sm)) {
5014 struct wpa_channel_info ci;
5015 int tx_chanwidth;
5016 int tx_seg1_idx;
5017
5018 if (wpa_channel_info(wpa_auth, &ci) != 0) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005019 wpa_auth_logger(wpa_auth, wpa_auth_get_spa(sm),
5020 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07005021 "Failed to get channel info to validate received OCI in EAPOL-Key group 2/2");
Hai Shalom74f70d42019-02-11 14:42:39 -08005022 return;
5023 }
5024
5025 if (get_sta_tx_parameters(sm,
5026 channel_width_to_int(ci.chanwidth),
5027 ci.seg1_idx, &tx_chanwidth,
5028 &tx_seg1_idx) < 0)
5029 return;
5030
5031 if (ocv_verify_tx_params(kde.oci, kde.oci_len, &ci,
Hai Shalom899fcc72020-10-19 14:38:18 -07005032 tx_chanwidth, tx_seg1_idx) !=
5033 OCI_SUCCESS) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005034 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm),
5035 LOGGER_INFO,
Hai Shalom899fcc72020-10-19 14:38:18 -07005036 "OCV failed: %s", ocv_errorstr);
5037 if (wpa_auth->conf.msg_ctx)
5038 wpa_msg(wpa_auth->conf.msg_ctx, MSG_INFO,
5039 OCV_FAILURE "addr=" MACSTR
5040 " frame=eapol-key-g2 error=%s",
Sunil Raviaf8751c2023-03-29 11:35:17 -07005041 MAC2STR(wpa_auth_get_spa(sm)),
5042 ocv_errorstr);
Hai Shalom74f70d42019-02-11 14:42:39 -08005043 return;
5044 }
5045 }
5046#endif /* CONFIG_OCV */
5047
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005048 if (sm->GUpdateStationKeys)
5049 sm->group->GKeyDoneStations--;
Hai Shalome21d4e82020-04-29 16:34:06 -07005050 sm->GUpdateStationKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005051 sm->GTimeoutCtr = 0;
5052 /* FIX: MLME.SetProtection.Request(TA, Tx_Rx) */
Sunil Raviaf8751c2023-03-29 11:35:17 -07005053 wpa_auth_vlogger(wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005054 "group key handshake completed (%s)",
5055 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN");
Hai Shalome21d4e82020-04-29 16:34:06 -07005056 sm->has_GTK = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005057}
5058
5059
5060SM_STATE(WPA_PTK_GROUP, KEYERROR)
5061{
5062 SM_ENTRY_MA(WPA_PTK_GROUP, KEYERROR, wpa_ptk_group);
5063 if (sm->GUpdateStationKeys)
5064 sm->group->GKeyDoneStations--;
Hai Shalome21d4e82020-04-29 16:34:06 -07005065 sm->GUpdateStationKeys = false;
5066 sm->Disconnect = true;
5067 sm->disconnect_reason = WLAN_REASON_GROUP_KEY_UPDATE_TIMEOUT;
Sunil Raviaf8751c2023-03-29 11:35:17 -07005068 wpa_auth_vlogger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_INFO,
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08005069 "group key handshake failed (%s) after %u tries",
5070 sm->wpa == WPA_VERSION_WPA ? "WPA" : "RSN",
5071 sm->wpa_auth->conf.wpa_group_update_count);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005072}
5073
5074
5075SM_STEP(WPA_PTK_GROUP)
5076{
5077 if (sm->Init || sm->PtkGroupInit) {
5078 SM_ENTER(WPA_PTK_GROUP, IDLE);
Hai Shalome21d4e82020-04-29 16:34:06 -07005079 sm->PtkGroupInit = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005080 } else switch (sm->wpa_ptk_group_state) {
5081 case WPA_PTK_GROUP_IDLE:
5082 if (sm->GUpdateStationKeys ||
5083 (sm->wpa == WPA_VERSION_WPA && sm->PInitAKeys))
5084 SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
5085 break;
5086 case WPA_PTK_GROUP_REKEYNEGOTIATING:
5087 if (sm->EAPOLKeyReceived && !sm->EAPOLKeyRequest &&
5088 !sm->EAPOLKeyPairwise && sm->MICVerified)
5089 SM_ENTER(WPA_PTK_GROUP, REKEYESTABLISHED);
5090 else if (sm->GTimeoutCtr >
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005091 sm->wpa_auth->conf.wpa_group_update_count ||
5092 (sm->wpa_auth->conf.wpa_disable_eapol_key_retries &&
5093 sm->GTimeoutCtr > 1))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005094 SM_ENTER(WPA_PTK_GROUP, KEYERROR);
5095 else if (sm->TimeoutEvt)
5096 SM_ENTER(WPA_PTK_GROUP, REKEYNEGOTIATING);
5097 break;
5098 case WPA_PTK_GROUP_KEYERROR:
5099 SM_ENTER(WPA_PTK_GROUP, IDLE);
5100 break;
5101 case WPA_PTK_GROUP_REKEYESTABLISHED:
5102 SM_ENTER(WPA_PTK_GROUP, IDLE);
5103 break;
5104 }
5105}
5106
5107
5108static int wpa_gtk_update(struct wpa_authenticator *wpa_auth,
5109 struct wpa_group *group)
5110{
Hai Shalomfdcde762020-04-02 11:19:20 -07005111 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005112 int ret = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07005113 size_t len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005114
5115 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5116 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5117 if (wpa_gmk_to_gtk(group->GMK, "Group key expansion",
5118 wpa_auth->addr, group->GNonce,
5119 group->GTK[group->GN - 1], group->GTK_len) < 0)
5120 ret = -1;
5121 wpa_hexdump_key(MSG_DEBUG, "GTK",
5122 group->GTK[group->GN - 1], group->GTK_len);
5123
Hai Shalomfdcde762020-04-02 11:19:20 -07005124 if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
5125 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005126 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5127 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5128 if (wpa_gmk_to_gtk(group->GMK, "IGTK key expansion",
5129 wpa_auth->addr, group->GNonce,
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005130 group->IGTK[group->GN_igtk - 4], len) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005131 ret = -1;
5132 wpa_hexdump_key(MSG_DEBUG, "IGTK",
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005133 group->IGTK[group->GN_igtk - 4], len);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005134 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005135
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005136 if (!wpa_auth->non_tx_beacon_prot &&
5137 conf->ieee80211w == NO_MGMT_FRAME_PROTECTION)
5138 return ret;
5139 if (!conf->beacon_prot)
5140 return ret;
5141
5142 if (wpa_auth->conf.tx_bss_auth) {
5143 group = wpa_auth->conf.tx_bss_auth->group;
5144 if (group->bigtk_set)
5145 return ret;
5146 wpa_printf(MSG_DEBUG, "Set up BIGTK for TX BSS");
Hai Shalomfdcde762020-04-02 11:19:20 -07005147 }
5148
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005149 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
5150 os_memcpy(group->GNonce, group->Counter, WPA_NONCE_LEN);
5151 inc_byte_array(group->Counter, WPA_NONCE_LEN);
5152 if (wpa_gmk_to_gtk(group->GMK, "BIGTK key expansion",
5153 wpa_auth->addr, group->GNonce,
5154 group->BIGTK[group->GN_bigtk - 6], len) < 0)
5155 return -1;
5156 group->bigtk_set = true;
5157 wpa_hexdump_key(MSG_DEBUG, "BIGTK",
5158 group->BIGTK[group->GN_bigtk - 6], len);
5159
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005160 return ret;
5161}
5162
5163
5164static void wpa_group_gtk_init(struct wpa_authenticator *wpa_auth,
5165 struct wpa_group *group)
5166{
Hai Shalomfdcde762020-04-02 11:19:20 -07005167 wpa_printf(MSG_DEBUG,
5168 "WPA: group state machine entering state GTK_INIT (VLAN-ID %d)",
5169 group->vlan_id);
Hai Shalome21d4e82020-04-29 16:34:06 -07005170 group->changed = false; /* GInit is not cleared here; avoid loop */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005171 group->wpa_group_state = WPA_GROUP_GTK_INIT;
5172
5173 /* GTK[0..N] = 0 */
5174 os_memset(group->GTK, 0, sizeof(group->GTK));
5175 group->GN = 1;
5176 group->GM = 2;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005177 group->GN_igtk = 4;
5178 group->GM_igtk = 5;
Hai Shalomfdcde762020-04-02 11:19:20 -07005179 group->GN_bigtk = 6;
5180 group->GM_bigtk = 7;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005181 /* GTK[GN] = CalcGTK() */
5182 wpa_gtk_update(wpa_auth, group);
5183}
5184
5185
5186static int wpa_group_update_sta(struct wpa_state_machine *sm, void *ctx)
5187{
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005188 if (ctx != NULL && ctx != sm->group)
5189 return 0;
5190
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005191 if (sm->wpa_ptk_state != WPA_PTK_PTKINITDONE) {
Sunil Raviaf8751c2023-03-29 11:35:17 -07005192 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
5193 LOGGER_DEBUG,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005194 "Not in PTKINITDONE; skip Group Key update");
Hai Shalome21d4e82020-04-29 16:34:06 -07005195 sm->GUpdateStationKeys = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005196 return 0;
5197 }
5198 if (sm->GUpdateStationKeys) {
5199 /*
5200 * This should not really happen, so add a debug log entry.
5201 * Since we clear the GKeyDoneStations before the loop, the
5202 * station needs to be counted here anyway.
5203 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07005204 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
5205 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07005206 "GUpdateStationKeys was already set when marking station for GTK rekeying");
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005207 }
5208
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005209 /* Do not rekey GTK/IGTK when STA is in WNM-Sleep Mode */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005210 if (sm->is_wnmsleep)
5211 return 0;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005212
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005213 sm->group->GKeyDoneStations++;
Hai Shalome21d4e82020-04-29 16:34:06 -07005214 sm->GUpdateStationKeys = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005215
5216 wpa_sm_step(sm);
5217 return 0;
5218}
5219
5220
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005221#ifdef CONFIG_WNM_AP
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005222/* update GTK when exiting WNM-Sleep Mode */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005223void wpa_wnmsleep_rekey_gtk(struct wpa_state_machine *sm)
5224{
Hai Shalomfdcde762020-04-02 11:19:20 -07005225 if (!sm || sm->is_wnmsleep)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005226 return;
5227
5228 wpa_group_update_sta(sm, NULL);
5229}
5230
5231
5232void wpa_set_wnmsleep(struct wpa_state_machine *sm, int flag)
5233{
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005234 if (sm)
5235 sm->is_wnmsleep = !!flag;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005236}
5237
5238
5239int wpa_wnmsleep_gtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5240{
Hai Shalom899fcc72020-10-19 14:38:18 -07005241 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005242 struct wpa_group *gsm = sm->group;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005243 u8 *start = pos;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005244
5245 /*
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005246 * GTK subelement:
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005247 * Sub-elem ID[1] | Length[1] | Key Info[2] | Key Length[1] | RSC[8] |
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005248 * Key[5..32]
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005249 */
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005250 *pos++ = WNM_SLEEP_SUBELEM_GTK;
5251 *pos++ = 11 + gsm->GTK_len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005252 /* Key ID in B0-B1 of Key Info */
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005253 WPA_PUT_LE16(pos, gsm->GN & 0x03);
5254 pos += 2;
5255 *pos++ = gsm->GTK_len;
5256 if (wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN, pos) != 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005257 return 0;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005258 pos += 8;
5259 os_memcpy(pos, gsm->GTK[gsm->GN - 1], gsm->GTK_len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005260 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5261 /*
5262 * Provide unique random GTK to each STA to prevent use
5263 * of GTK in the BSS.
5264 */
5265 if (random_get_bytes(pos, gsm->GTK_len) < 0)
5266 return 0;
5267 }
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005268 pos += gsm->GTK_len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005269
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005270 wpa_printf(MSG_DEBUG, "WNM: GTK Key ID %u in WNM-Sleep Mode exit",
5271 gsm->GN);
5272 wpa_hexdump_key(MSG_DEBUG, "WNM: GTK in WNM-Sleep Mode exit",
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005273 gsm->GTK[gsm->GN - 1], gsm->GTK_len);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005274
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005275 return pos - start;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005276}
5277
5278
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005279int wpa_wnmsleep_igtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5280{
Hai Shalom899fcc72020-10-19 14:38:18 -07005281 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005282 struct wpa_group *gsm = sm->group;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005283 u8 *start = pos;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005284 size_t len = wpa_cipher_key_len(sm->wpa_auth->conf.group_mgmt_cipher);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005285
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005286 /*
5287 * IGTK subelement:
5288 * Sub-elem ID[1] | Length[1] | KeyID[2] | PN[6] | Key[16]
5289 */
5290 *pos++ = WNM_SLEEP_SUBELEM_IGTK;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005291 *pos++ = 2 + 6 + len;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005292 WPA_PUT_LE16(pos, gsm->GN_igtk);
5293 pos += 2;
5294 if (wpa_auth_get_seqnum(sm->wpa_auth, NULL, gsm->GN_igtk, pos) != 0)
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005295 return 0;
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005296 pos += 6;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005297
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005298 os_memcpy(pos, gsm->IGTK[gsm->GN_igtk - 4], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005299 if (conf->disable_gtk || sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5300 /*
5301 * Provide unique random IGTK to each STA to prevent use
5302 * of IGTK in the BSS.
5303 */
5304 if (random_get_bytes(pos, len) < 0)
5305 return 0;
5306 }
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005307 pos += len;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005308
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005309 wpa_printf(MSG_DEBUG, "WNM: IGTK Key ID %u in WNM-Sleep Mode exit",
5310 gsm->GN_igtk);
5311 wpa_hexdump_key(MSG_DEBUG, "WNM: IGTK in WNM-Sleep Mode exit",
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005312 gsm->IGTK[gsm->GN_igtk - 4], len);
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005313
Dmitry Shmidta54fa5f2013-01-15 13:53:35 -08005314 return pos - start;
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005315}
Hai Shalomc3565922019-10-28 11:58:20 -07005316
Hai Shalomfdcde762020-04-02 11:19:20 -07005317
5318int wpa_wnmsleep_bigtk_subelem(struct wpa_state_machine *sm, u8 *pos)
5319{
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005320 struct wpa_authenticator *wpa_auth = sm->wpa_auth;
5321 struct wpa_group *gsm = wpa_auth->group;
Hai Shalomfdcde762020-04-02 11:19:20 -07005322 u8 *start = pos;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005323 size_t len = wpa_cipher_key_len(wpa_auth->conf.group_mgmt_cipher);
Hai Shalomfdcde762020-04-02 11:19:20 -07005324
5325 /*
5326 * BIGTK subelement:
5327 * Sub-elem ID[1] | Length[1] | KeyID[2] | PN[6] | Key[16]
5328 */
5329 *pos++ = WNM_SLEEP_SUBELEM_BIGTK;
5330 *pos++ = 2 + 6 + len;
5331 WPA_PUT_LE16(pos, gsm->GN_bigtk);
5332 pos += 2;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005333 if (wpa_auth_get_seqnum(wpa_auth, NULL, gsm->GN_bigtk, pos) != 0)
Hai Shalomfdcde762020-04-02 11:19:20 -07005334 return 0;
5335 pos += 6;
5336
5337 os_memcpy(pos, gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalom899fcc72020-10-19 14:38:18 -07005338 if (sm->wpa_key_mgmt == WPA_KEY_MGMT_OSEN) {
5339 /*
5340 * Provide unique random BIGTK to each STA to prevent use
5341 * of BIGTK in the BSS.
5342 */
5343 if (random_get_bytes(pos, len) < 0)
5344 return 0;
5345 }
Hai Shalomfdcde762020-04-02 11:19:20 -07005346 pos += len;
5347
5348 wpa_printf(MSG_DEBUG, "WNM: BIGTK Key ID %u in WNM-Sleep Mode exit",
5349 gsm->GN_bigtk);
5350 wpa_hexdump_key(MSG_DEBUG, "WNM: BIGTK in WNM-Sleep Mode exit",
Hai Shaloma20dcd72022-02-04 13:43:00 -08005351 gsm->BIGTK[gsm->GN_bigtk - 6], len);
Hai Shalomfdcde762020-04-02 11:19:20 -07005352
5353 return pos - start;
5354}
5355
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005356#endif /* CONFIG_WNM_AP */
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005357
5358
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005359static void wpa_group_setkeys(struct wpa_authenticator *wpa_auth,
5360 struct wpa_group *group)
5361{
5362 int tmp;
5363
Hai Shalomfdcde762020-04-02 11:19:20 -07005364 wpa_printf(MSG_DEBUG,
5365 "WPA: group state machine entering state SETKEYS (VLAN-ID %d)",
5366 group->vlan_id);
Hai Shalome21d4e82020-04-29 16:34:06 -07005367 group->changed = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005368 group->wpa_group_state = WPA_GROUP_SETKEYS;
Hai Shalome21d4e82020-04-29 16:34:06 -07005369 group->GTKReKey = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005370 tmp = group->GM;
5371 group->GM = group->GN;
5372 group->GN = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005373 tmp = group->GM_igtk;
5374 group->GM_igtk = group->GN_igtk;
5375 group->GN_igtk = tmp;
Hai Shalomfdcde762020-04-02 11:19:20 -07005376 tmp = group->GM_bigtk;
5377 group->GM_bigtk = group->GN_bigtk;
5378 group->GN_bigtk = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005379 /* "GKeyDoneStations = GNoStations" is done in more robust way by
5380 * counting the STAs that are marked with GUpdateStationKeys instead of
5381 * including all STAs that could be in not-yet-completed state. */
5382 wpa_gtk_update(wpa_auth, group);
5383
5384 if (group->GKeyDoneStations) {
Hai Shalomfdcde762020-04-02 11:19:20 -07005385 wpa_printf(MSG_DEBUG,
5386 "wpa_group_setkeys: Unexpected GKeyDoneStations=%d when starting new GTK rekey",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005387 group->GKeyDoneStations);
5388 group->GKeyDoneStations = 0;
5389 }
Dmitry Shmidt61d9df32012-08-29 16:22:06 -07005390 wpa_auth_for_each_sta(wpa_auth, wpa_group_update_sta, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005391 wpa_printf(MSG_DEBUG, "wpa_group_setkeys: GKeyDoneStations=%d",
5392 group->GKeyDoneStations);
5393}
5394
5395
5396static int wpa_group_config_group_keys(struct wpa_authenticator *wpa_auth,
5397 struct wpa_group *group)
5398{
Hai Shalomfdcde762020-04-02 11:19:20 -07005399 struct wpa_auth_config *conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005400 int ret = 0;
5401
5402 if (wpa_auth_set_key(wpa_auth, group->vlan_id,
Hai Shalomfdcde762020-04-02 11:19:20 -07005403 wpa_cipher_to_alg(conf->wpa_group),
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005404 broadcast_ether_addr, group->GN,
Hai Shalomfdcde762020-04-02 11:19:20 -07005405 group->GTK[group->GN - 1], group->GTK_len,
5406 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005407 ret = -1;
5408
Hai Shalomfdcde762020-04-02 11:19:20 -07005409 if (conf->ieee80211w != NO_MGMT_FRAME_PROTECTION) {
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005410 enum wpa_alg alg;
5411 size_t len;
5412
Hai Shalomfdcde762020-04-02 11:19:20 -07005413 alg = wpa_cipher_to_alg(conf->group_mgmt_cipher);
5414 len = wpa_cipher_key_len(conf->group_mgmt_cipher);
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005415
5416 if (ret == 0 &&
5417 wpa_auth_set_key(wpa_auth, group->vlan_id, alg,
5418 broadcast_ether_addr, group->GN_igtk,
Hai Shalomfdcde762020-04-02 11:19:20 -07005419 group->IGTK[group->GN_igtk - 4], len,
5420 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
5421 ret = -1;
5422
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005423 if (ret || !conf->beacon_prot)
5424 return ret;
5425 if (wpa_auth->conf.tx_bss_auth) {
5426 wpa_auth = wpa_auth->conf.tx_bss_auth;
5427 group = wpa_auth->group;
5428 if (!group->bigtk_set || group->bigtk_configured)
5429 return ret;
5430 }
5431 if (wpa_auth_set_key(wpa_auth, group->vlan_id, alg,
Hai Shalomfdcde762020-04-02 11:19:20 -07005432 broadcast_ether_addr, group->GN_bigtk,
5433 group->BIGTK[group->GN_bigtk - 6], len,
5434 KEY_FLAG_GROUP_TX_DEFAULT) < 0)
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005435 ret = -1;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005436 else
5437 group->bigtk_configured = true;
Dmitry Shmidtb36ed7c2014-03-17 10:57:26 -07005438 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005439
5440 return ret;
5441}
5442
5443
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005444static int wpa_group_disconnect_cb(struct wpa_state_machine *sm, void *ctx)
5445{
5446 if (sm->group == ctx) {
5447 wpa_printf(MSG_DEBUG, "WPA: Mark STA " MACSTR
Hai Shalomfdcde762020-04-02 11:19:20 -07005448 " for disconnection due to fatal failure",
Sunil Raviaf8751c2023-03-29 11:35:17 -07005449 MAC2STR(wpa_auth_get_spa(sm)));
Hai Shalome21d4e82020-04-29 16:34:06 -07005450 sm->Disconnect = true;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005451 }
5452
5453 return 0;
5454}
5455
5456
5457static void wpa_group_fatal_failure(struct wpa_authenticator *wpa_auth,
5458 struct wpa_group *group)
5459{
Hai Shalomfdcde762020-04-02 11:19:20 -07005460 wpa_printf(MSG_DEBUG,
5461 "WPA: group state machine entering state FATAL_FAILURE");
Hai Shalome21d4e82020-04-29 16:34:06 -07005462 group->changed = true;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005463 group->wpa_group_state = WPA_GROUP_FATAL_FAILURE;
5464 wpa_auth_for_each_sta(wpa_auth, wpa_group_disconnect_cb, group);
5465}
5466
5467
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005468static int wpa_group_setkeysdone(struct wpa_authenticator *wpa_auth,
5469 struct wpa_group *group)
5470{
Hai Shalomfdcde762020-04-02 11:19:20 -07005471 wpa_printf(MSG_DEBUG,
5472 "WPA: group state machine entering state SETKEYSDONE (VLAN-ID %d)",
5473 group->vlan_id);
Hai Shalome21d4e82020-04-29 16:34:06 -07005474 group->changed = true;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005475 group->wpa_group_state = WPA_GROUP_SETKEYSDONE;
5476
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005477 if (wpa_group_config_group_keys(wpa_auth, group) < 0) {
5478 wpa_group_fatal_failure(wpa_auth, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005479 return -1;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005480 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005481
5482 return 0;
5483}
5484
5485
5486static void wpa_group_sm_step(struct wpa_authenticator *wpa_auth,
5487 struct wpa_group *group)
5488{
5489 if (group->GInit) {
5490 wpa_group_gtk_init(wpa_auth, group);
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08005491 } else if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE) {
5492 /* Do not allow group operations */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005493 } else if (group->wpa_group_state == WPA_GROUP_GTK_INIT &&
5494 group->GTKAuthenticator) {
5495 wpa_group_setkeysdone(wpa_auth, group);
5496 } else if (group->wpa_group_state == WPA_GROUP_SETKEYSDONE &&
5497 group->GTKReKey) {
5498 wpa_group_setkeys(wpa_auth, group);
5499 } else if (group->wpa_group_state == WPA_GROUP_SETKEYS) {
5500 if (group->GKeyDoneStations == 0)
5501 wpa_group_setkeysdone(wpa_auth, group);
5502 else if (group->GTKReKey)
5503 wpa_group_setkeys(wpa_auth, group);
5504 }
5505}
5506
5507
5508static int wpa_sm_step(struct wpa_state_machine *sm)
5509{
Hai Shalomfdcde762020-04-02 11:19:20 -07005510 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005511 return 0;
5512
5513 if (sm->in_step_loop) {
5514 /* This should not happen, but if it does, make sure we do not
5515 * end up freeing the state machine too early by exiting the
5516 * recursive call. */
5517 wpa_printf(MSG_ERROR, "WPA: wpa_sm_step() called recursively");
5518 return 0;
5519 }
5520
5521 sm->in_step_loop = 1;
5522 do {
5523 if (sm->pending_deinit)
5524 break;
5525
Hai Shalome21d4e82020-04-29 16:34:06 -07005526 sm->changed = false;
5527 sm->wpa_auth->group->changed = false;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005528
5529 SM_STEP_RUN(WPA_PTK);
5530 if (sm->pending_deinit)
5531 break;
5532 SM_STEP_RUN(WPA_PTK_GROUP);
5533 if (sm->pending_deinit)
5534 break;
5535 wpa_group_sm_step(sm->wpa_auth, sm->group);
5536 } while (sm->changed || sm->wpa_auth->group->changed);
5537 sm->in_step_loop = 0;
5538
5539 if (sm->pending_deinit) {
Hai Shalomfdcde762020-04-02 11:19:20 -07005540 wpa_printf(MSG_DEBUG,
5541 "WPA: Completing pending STA state machine deinit for "
Sunil Raviaf8751c2023-03-29 11:35:17 -07005542 MACSTR, MAC2STR(wpa_auth_get_spa(sm)));
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005543 wpa_free_sta_sm(sm);
5544 return 1;
5545 }
5546 return 0;
5547}
5548
5549
5550static void wpa_sm_call_step(void *eloop_ctx, void *timeout_ctx)
5551{
5552 struct wpa_state_machine *sm = eloop_ctx;
5553 wpa_sm_step(sm);
5554}
5555
5556
5557void wpa_auth_sm_notify(struct wpa_state_machine *sm)
5558{
Hai Shalomfdcde762020-04-02 11:19:20 -07005559 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005560 return;
5561 eloop_register_timeout(0, 0, wpa_sm_call_step, sm, NULL);
5562}
5563
5564
5565void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth)
5566{
5567 int tmp, i;
5568 struct wpa_group *group;
5569
Hai Shalomfdcde762020-04-02 11:19:20 -07005570 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005571 return;
5572
5573 group = wpa_auth->group;
5574
5575 for (i = 0; i < 2; i++) {
5576 tmp = group->GM;
5577 group->GM = group->GN;
5578 group->GN = tmp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005579 tmp = group->GM_igtk;
5580 group->GM_igtk = group->GN_igtk;
5581 group->GN_igtk = tmp;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005582 if (!wpa_auth->conf.tx_bss_auth) {
5583 tmp = group->GM_bigtk;
5584 group->GM_bigtk = group->GN_bigtk;
5585 group->GN_bigtk = tmp;
5586 }
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005587 wpa_gtk_update(wpa_auth, group);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08005588 wpa_group_config_group_keys(wpa_auth, group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005589 }
5590}
5591
5592
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07005593static const char * wpa_bool_txt(int val)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005594{
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07005595 return val ? "TRUE" : "FALSE";
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005596}
5597
5598
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005599#define RSN_SUITE "%02x-%02x-%02x-%d"
5600#define RSN_SUITE_ARG(s) \
5601((s) >> 24) & 0xff, ((s) >> 16) & 0xff, ((s) >> 8) & 0xff, (s) & 0xff
5602
5603int wpa_get_mib(struct wpa_authenticator *wpa_auth, char *buf, size_t buflen)
5604{
Hai Shalomfdcde762020-04-02 11:19:20 -07005605 struct wpa_auth_config *conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005606 int len = 0, ret;
5607 char pmkid_txt[PMKID_LEN * 2 + 1];
5608#ifdef CONFIG_RSN_PREAUTH
5609 const int preauth = 1;
5610#else /* CONFIG_RSN_PREAUTH */
5611 const int preauth = 0;
5612#endif /* CONFIG_RSN_PREAUTH */
5613
Hai Shalomfdcde762020-04-02 11:19:20 -07005614 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005615 return len;
Hai Shalomfdcde762020-04-02 11:19:20 -07005616 conf = &wpa_auth->conf;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005617
5618 ret = os_snprintf(buf + len, buflen - len,
5619 "dot11RSNAOptionImplemented=TRUE\n"
5620 "dot11RSNAPreauthenticationImplemented=%s\n"
5621 "dot11RSNAEnabled=%s\n"
5622 "dot11RSNAPreauthenticationEnabled=%s\n",
5623 wpa_bool_txt(preauth),
Hai Shalomfdcde762020-04-02 11:19:20 -07005624 wpa_bool_txt(conf->wpa & WPA_PROTO_RSN),
5625 wpa_bool_txt(conf->rsn_preauth));
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005626 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005627 return len;
5628 len += ret;
5629
5630 wpa_snprintf_hex(pmkid_txt, sizeof(pmkid_txt),
5631 wpa_auth->dot11RSNAPMKIDUsed, PMKID_LEN);
5632
5633 ret = os_snprintf(
5634 buf + len, buflen - len,
5635 "dot11RSNAConfigVersion=%u\n"
5636 "dot11RSNAConfigPairwiseKeysSupported=9999\n"
5637 /* FIX: dot11RSNAConfigGroupCipher */
5638 /* FIX: dot11RSNAConfigGroupRekeyMethod */
5639 /* FIX: dot11RSNAConfigGroupRekeyTime */
5640 /* FIX: dot11RSNAConfigGroupRekeyPackets */
5641 "dot11RSNAConfigGroupRekeyStrict=%u\n"
5642 "dot11RSNAConfigGroupUpdateCount=%u\n"
5643 "dot11RSNAConfigPairwiseUpdateCount=%u\n"
5644 "dot11RSNAConfigGroupCipherSize=%u\n"
5645 "dot11RSNAConfigPMKLifetime=%u\n"
5646 "dot11RSNAConfigPMKReauthThreshold=%u\n"
5647 "dot11RSNAConfigNumberOfPTKSAReplayCounters=0\n"
5648 "dot11RSNAConfigSATimeout=%u\n"
5649 "dot11RSNAAuthenticationSuiteSelected=" RSN_SUITE "\n"
5650 "dot11RSNAPairwiseCipherSelected=" RSN_SUITE "\n"
5651 "dot11RSNAGroupCipherSelected=" RSN_SUITE "\n"
5652 "dot11RSNAPMKIDUsed=%s\n"
5653 "dot11RSNAAuthenticationSuiteRequested=" RSN_SUITE "\n"
5654 "dot11RSNAPairwiseCipherRequested=" RSN_SUITE "\n"
5655 "dot11RSNAGroupCipherRequested=" RSN_SUITE "\n"
5656 "dot11RSNATKIPCounterMeasuresInvoked=%u\n"
5657 "dot11RSNA4WayHandshakeFailures=%u\n"
5658 "dot11RSNAConfigNumberOfGTKSAReplayCounters=0\n",
5659 RSN_VERSION,
Hai Shalomfdcde762020-04-02 11:19:20 -07005660 !!conf->wpa_strict_rekey,
5661 conf->wpa_group_update_count,
5662 conf->wpa_pairwise_update_count,
5663 wpa_cipher_key_len(conf->wpa_group) * 8,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005664 dot11RSNAConfigPMKLifetime,
5665 dot11RSNAConfigPMKReauthThreshold,
5666 dot11RSNAConfigSATimeout,
5667 RSN_SUITE_ARG(wpa_auth->dot11RSNAAuthenticationSuiteSelected),
5668 RSN_SUITE_ARG(wpa_auth->dot11RSNAPairwiseCipherSelected),
5669 RSN_SUITE_ARG(wpa_auth->dot11RSNAGroupCipherSelected),
5670 pmkid_txt,
5671 RSN_SUITE_ARG(wpa_auth->dot11RSNAAuthenticationSuiteRequested),
5672 RSN_SUITE_ARG(wpa_auth->dot11RSNAPairwiseCipherRequested),
5673 RSN_SUITE_ARG(wpa_auth->dot11RSNAGroupCipherRequested),
5674 wpa_auth->dot11RSNATKIPCounterMeasuresInvoked,
5675 wpa_auth->dot11RSNA4WayHandshakeFailures);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005676 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005677 return len;
5678 len += ret;
5679
5680 /* TODO: dot11RSNAConfigPairwiseCiphersTable */
5681 /* TODO: dot11RSNAConfigAuthenticationSuitesTable */
5682
5683 /* Private MIB */
5684 ret = os_snprintf(buf + len, buflen - len, "hostapdWPAGroupState=%d\n",
5685 wpa_auth->group->wpa_group_state);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005686 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005687 return len;
5688 len += ret;
5689
5690 return len;
5691}
5692
5693
5694int wpa_get_mib_sta(struct wpa_state_machine *sm, char *buf, size_t buflen)
5695{
5696 int len = 0, ret;
5697 u32 pairwise = 0;
5698
Hai Shalomfdcde762020-04-02 11:19:20 -07005699 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005700 return 0;
5701
5702 /* TODO: FF-FF-FF-FF-FF-FF entry for broadcast/multicast stats */
5703
5704 /* dot11RSNAStatsEntry */
5705
Dmitry Shmidt4530cfd2012-09-09 15:20:40 -07005706 pairwise = wpa_cipher_to_suite(sm->wpa == WPA_VERSION_WPA2 ?
5707 WPA_PROTO_RSN : WPA_PROTO_WPA,
5708 sm->pairwise);
5709 if (pairwise == 0)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005710 return 0;
5711
5712 ret = os_snprintf(
5713 buf + len, buflen - len,
5714 /* TODO: dot11RSNAStatsIndex */
5715 "dot11RSNAStatsSTAAddress=" MACSTR "\n"
5716 "dot11RSNAStatsVersion=1\n"
5717 "dot11RSNAStatsSelectedPairwiseCipher=" RSN_SUITE "\n"
5718 /* TODO: dot11RSNAStatsTKIPICVErrors */
5719 "dot11RSNAStatsTKIPLocalMICFailures=%u\n"
5720 "dot11RSNAStatsTKIPRemoteMICFailures=%u\n"
5721 /* TODO: dot11RSNAStatsCCMPReplays */
5722 /* TODO: dot11RSNAStatsCCMPDecryptErrors */
5723 /* TODO: dot11RSNAStatsTKIPReplays */,
5724 MAC2STR(sm->addr),
5725 RSN_SUITE_ARG(pairwise),
5726 sm->dot11RSNAStatsTKIPLocalMICFailures,
5727 sm->dot11RSNAStatsTKIPRemoteMICFailures);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005728 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005729 return len;
5730 len += ret;
5731
5732 /* Private MIB */
5733 ret = os_snprintf(buf + len, buflen - len,
Hai Shalomc3565922019-10-28 11:58:20 -07005734 "wpa=%d\n"
5735 "AKMSuiteSelector=" RSN_SUITE "\n"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005736 "hostapdWPAPTKState=%d\n"
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00005737 "hostapdWPAPTKGroupState=%d\n"
5738 "hostapdMFPR=%d\n",
Hai Shalomc3565922019-10-28 11:58:20 -07005739 sm->wpa,
5740 RSN_SUITE_ARG(wpa_akm_to_suite(sm->wpa_key_mgmt)),
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005741 sm->wpa_ptk_state,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00005742 sm->wpa_ptk_group_state,
5743 sm->mfpr);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005744 if (os_snprintf_error(buflen - len, ret))
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005745 return len;
5746 len += ret;
5747
5748 return len;
5749}
5750
5751
5752void wpa_auth_countermeasures_start(struct wpa_authenticator *wpa_auth)
5753{
5754 if (wpa_auth)
5755 wpa_auth->dot11RSNATKIPCounterMeasuresInvoked++;
5756}
5757
5758
5759int wpa_auth_pairwise_set(struct wpa_state_machine *sm)
5760{
5761 return sm && sm->pairwise_set;
5762}
5763
5764
5765int wpa_auth_get_pairwise(struct wpa_state_machine *sm)
5766{
5767 return sm->pairwise;
5768}
5769
5770
Hai Shalom74f70d42019-02-11 14:42:39 -08005771const u8 * wpa_auth_get_pmk(struct wpa_state_machine *sm, int *len)
5772{
5773 if (!sm)
5774 return NULL;
5775 *len = sm->pmk_len;
5776 return sm->PMK;
5777}
5778
5779
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00005780const u8 * wpa_auth_get_dpp_pkhash(struct wpa_state_machine *sm)
5781{
5782 if (!sm || !sm->pmksa)
5783 return NULL;
5784 return sm->pmksa->dpp_pkhash;
5785}
5786
5787
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005788int wpa_auth_sta_key_mgmt(struct wpa_state_machine *sm)
5789{
Hai Shalomfdcde762020-04-02 11:19:20 -07005790 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005791 return -1;
5792 return sm->wpa_key_mgmt;
5793}
5794
5795
5796int wpa_auth_sta_wpa_version(struct wpa_state_machine *sm)
5797{
Hai Shalomfdcde762020-04-02 11:19:20 -07005798 if (!sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005799 return 0;
5800 return sm->wpa;
5801}
5802
5803
Mathy Vanhoeff6e1f662017-07-14 15:15:35 +02005804int wpa_auth_sta_ft_tk_already_set(struct wpa_state_machine *sm)
5805{
5806 if (!sm || !wpa_key_mgmt_ft(sm->wpa_key_mgmt))
5807 return 0;
5808 return sm->tk_already_set;
5809}
5810
5811
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005812int wpa_auth_sta_fils_tk_already_set(struct wpa_state_machine *sm)
5813{
5814 if (!sm || !wpa_key_mgmt_fils(sm->wpa_key_mgmt))
5815 return 0;
5816 return sm->tk_already_set;
5817}
5818
5819
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005820int wpa_auth_sta_clear_pmksa(struct wpa_state_machine *sm,
5821 struct rsn_pmksa_cache_entry *entry)
5822{
Hai Shalomfdcde762020-04-02 11:19:20 -07005823 if (!sm || sm->pmksa != entry)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005824 return -1;
5825 sm->pmksa = NULL;
5826 return 0;
5827}
5828
5829
5830struct rsn_pmksa_cache_entry *
5831wpa_auth_sta_get_pmksa(struct wpa_state_machine *sm)
5832{
5833 return sm ? sm->pmksa : NULL;
5834}
5835
5836
5837void wpa_auth_sta_local_mic_failure_report(struct wpa_state_machine *sm)
5838{
5839 if (sm)
5840 sm->dot11RSNAStatsTKIPLocalMICFailures++;
5841}
5842
5843
5844const u8 * wpa_auth_get_wpa_ie(struct wpa_authenticator *wpa_auth, size_t *len)
5845{
Hai Shalomfdcde762020-04-02 11:19:20 -07005846 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005847 return NULL;
5848 *len = wpa_auth->wpa_ie_len;
5849 return wpa_auth->wpa_ie;
5850}
5851
5852
5853int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08005854 unsigned int pmk_len,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005855 int session_timeout, struct eapol_state_machine *eapol)
5856{
Hai Shalomfdcde762020-04-02 11:19:20 -07005857 if (!sm || sm->wpa != WPA_VERSION_WPA2 ||
Dmitry Shmidtc55524a2011-07-07 11:18:38 -07005858 sm->wpa_auth->conf.disable_pmksa_caching)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005859 return -1;
5860
Hai Shalom81f62d82019-07-22 12:10:00 -07005861#ifdef CONFIG_IEEE80211R_AP
5862 if (pmk_len >= 2 * PMK_LEN && wpa_key_mgmt_ft(sm->wpa_key_mgmt) &&
5863 wpa_key_mgmt_wpa_ieee8021x(sm->wpa_key_mgmt) &&
5864 !wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
5865 /* Cache MPMK/XXKey instead of initial part from MSK */
5866 pmk = pmk + PMK_LEN;
5867 pmk_len = PMK_LEN;
5868 } else
5869#endif /* CONFIG_IEEE80211R_AP */
Dmitry Shmidtebd93af2017-02-21 13:40:44 -08005870 if (wpa_key_mgmt_sha384(sm->wpa_key_mgmt)) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08005871 if (pmk_len > PMK_LEN_SUITE_B_192)
5872 pmk_len = PMK_LEN_SUITE_B_192;
5873 } else if (pmk_len > PMK_LEN) {
5874 pmk_len = PMK_LEN;
5875 }
5876
Hai Shalom81f62d82019-07-22 12:10:00 -07005877 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK", pmk, pmk_len);
Dmitry Shmidt57c2d392016-02-23 13:40:19 -08005878 if (pmksa_cache_auth_add(sm->wpa_auth->pmksa, pmk, pmk_len, NULL,
Dmitry Shmidt807291d2015-01-27 13:40:23 -08005879 sm->PTK.kck, sm->PTK.kck_len,
Sunil Raviaf8751c2023-03-29 11:35:17 -07005880 wpa_auth_get_aa(sm),
5881 wpa_auth_get_spa(sm), session_timeout,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005882 eapol, sm->wpa_key_mgmt))
5883 return 0;
5884
5885 return -1;
5886}
5887
5888
5889int wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth,
5890 const u8 *pmk, size_t len, const u8 *sta_addr,
5891 int session_timeout,
5892 struct eapol_state_machine *eapol)
5893{
Hai Shalomfdcde762020-04-02 11:19:20 -07005894 if (!wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005895 return -1;
5896
Hai Shalom81f62d82019-07-22 12:10:00 -07005897 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from preauth", pmk, len);
Dmitry Shmidt57c2d392016-02-23 13:40:19 -08005898 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, len, NULL,
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005899 NULL, 0,
5900 wpa_auth->addr,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07005901 sta_addr, session_timeout, eapol,
5902 WPA_KEY_MGMT_IEEE8021X))
5903 return 0;
5904
5905 return -1;
5906}
5907
5908
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005909int wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr,
Sunil Ravi89eba102022-09-13 21:04:37 -07005910 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
5911 int akmp)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005912{
5913 if (wpa_auth->conf.disable_pmksa_caching)
5914 return -1;
5915
Sunil Ravi89eba102022-09-13 21:04:37 -07005916 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK from SAE", pmk, pmk_len);
5917 if (!akmp)
5918 akmp = WPA_KEY_MGMT_SAE;
5919 if (pmksa_cache_auth_add(wpa_auth->pmksa, pmk, pmk_len, pmkid,
5920 NULL, 0, wpa_auth->addr, addr, 0, NULL, akmp))
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08005921 return 0;
5922
5923 return -1;
5924}
5925
5926
Roshan Pius3a1667e2018-07-03 15:17:14 -07005927void wpa_auth_add_sae_pmkid(struct wpa_state_machine *sm, const u8 *pmkid)
5928{
5929 os_memcpy(sm->pmkid, pmkid, PMKID_LEN);
5930 sm->pmkid_set = 1;
5931}
5932
5933
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07005934int wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr,
5935 const u8 *pmk, size_t pmk_len, const u8 *pmkid,
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00005936 int session_timeout, int akmp, const u8 *dpp_pkhash)
5937{
5938 struct rsn_pmksa_cache_entry *entry;
5939
Sunil Ravib0ac25f2024-07-12 01:42:03 +00005940 if (!wpa_auth || wpa_auth->conf.disable_pmksa_caching)
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00005941 return -1;
5942
5943 wpa_hexdump_key(MSG_DEBUG, "RSN: Cache PMK (3)", pmk, PMK_LEN);
5944 entry = pmksa_cache_auth_add(wpa_auth->pmksa, pmk, pmk_len, pmkid,
5945 NULL, 0, wpa_auth->addr, addr, session_timeout,
5946 NULL, akmp);
5947 if (!entry)
5948 return -1;
5949
5950 if (dpp_pkhash)
5951 entry->dpp_pkhash = os_memdup(dpp_pkhash, SHA256_MAC_LEN);
5952
5953 return 0;
5954}
5955
5956
Dmitry Shmidtf7e0a992013-05-23 11:03:10 -07005957void wpa_auth_pmksa_remove(struct wpa_authenticator *wpa_auth,
5958 const u8 *sta_addr)
5959{
5960 struct rsn_pmksa_cache_entry *pmksa;
5961
Hai Shalomfdcde762020-04-02 11:19:20 -07005962 if (!wpa_auth || !wpa_auth->pmksa)
Dmitry Shmidtf7e0a992013-05-23 11:03:10 -07005963 return;
5964 pmksa = pmksa_cache_auth_get(wpa_auth->pmksa, sta_addr, NULL);
5965 if (pmksa) {
5966 wpa_printf(MSG_DEBUG, "WPA: Remove PMKSA cache entry for "
5967 MACSTR " based on request", MAC2STR(sta_addr));
5968 pmksa_cache_free_entry(wpa_auth->pmksa, pmksa);
5969 }
5970}
5971
5972
Dmitry Shmidte4663042016-04-04 10:07:49 -07005973int wpa_auth_pmksa_list(struct wpa_authenticator *wpa_auth, char *buf,
5974 size_t len)
5975{
5976 if (!wpa_auth || !wpa_auth->pmksa)
5977 return 0;
5978 return pmksa_cache_auth_list(wpa_auth->pmksa, buf, len);
5979}
5980
5981
5982void wpa_auth_pmksa_flush(struct wpa_authenticator *wpa_auth)
5983{
5984 if (wpa_auth && wpa_auth->pmksa)
5985 pmksa_cache_auth_flush(wpa_auth->pmksa);
5986}
5987
5988
Paul Stewart092955c2017-02-06 09:13:09 -08005989#ifdef CONFIG_PMKSA_CACHE_EXTERNAL
5990#ifdef CONFIG_MESH
5991
5992int wpa_auth_pmksa_list_mesh(struct wpa_authenticator *wpa_auth, const u8 *addr,
5993 char *buf, size_t len)
5994{
5995 if (!wpa_auth || !wpa_auth->pmksa)
5996 return 0;
5997
5998 return pmksa_cache_auth_list_mesh(wpa_auth->pmksa, addr, buf, len);
5999}
6000
6001
6002struct rsn_pmksa_cache_entry *
6003wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
Sunil Ravi89eba102022-09-13 21:04:37 -07006004 size_t pmk_len, int akmp,
Paul Stewart092955c2017-02-06 09:13:09 -08006005 const u8 *pmkid, int expiration)
6006{
6007 struct rsn_pmksa_cache_entry *entry;
6008 struct os_reltime now;
6009
Sunil Ravi89eba102022-09-13 21:04:37 -07006010 entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, NULL, 0, aa,
6011 spa, 0, NULL, akmp);
Paul Stewart092955c2017-02-06 09:13:09 -08006012 if (!entry)
6013 return NULL;
6014
6015 os_get_reltime(&now);
6016 entry->expiration = now.sec + expiration;
6017 return entry;
6018}
6019
6020
6021int wpa_auth_pmksa_add_entry(struct wpa_authenticator *wpa_auth,
6022 struct rsn_pmksa_cache_entry *entry)
6023{
6024 int ret;
6025
6026 if (!wpa_auth || !wpa_auth->pmksa)
6027 return -1;
6028
6029 ret = pmksa_cache_auth_add_entry(wpa_auth->pmksa, entry);
6030 if (ret < 0)
6031 wpa_printf(MSG_DEBUG,
6032 "RSN: Failed to store external PMKSA cache for "
6033 MACSTR, MAC2STR(entry->spa));
6034
6035 return ret;
6036}
6037
6038#endif /* CONFIG_MESH */
6039#endif /* CONFIG_PMKSA_CACHE_EXTERNAL */
6040
6041
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006042struct rsn_pmksa_cache *
6043wpa_auth_get_pmksa_cache(struct wpa_authenticator *wpa_auth)
6044{
6045 if (!wpa_auth || !wpa_auth->pmksa)
6046 return NULL;
6047 return wpa_auth->pmksa;
6048}
6049
6050
Dmitry Shmidte4663042016-04-04 10:07:49 -07006051struct rsn_pmksa_cache_entry *
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08006052wpa_auth_pmksa_get(struct wpa_authenticator *wpa_auth, const u8 *sta_addr,
6053 const u8 *pmkid)
Dmitry Shmidte4663042016-04-04 10:07:49 -07006054{
6055 if (!wpa_auth || !wpa_auth->pmksa)
6056 return NULL;
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -08006057 return pmksa_cache_auth_get(wpa_auth->pmksa, sta_addr, pmkid);
Dmitry Shmidte4663042016-04-04 10:07:49 -07006058}
6059
6060
6061void wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa,
6062 struct wpa_state_machine *sm,
6063 struct wpa_authenticator *wpa_auth,
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006064 u8 *pmkid, u8 *pmk, size_t *pmk_len)
Dmitry Shmidte4663042016-04-04 10:07:49 -07006065{
6066 if (!sm)
6067 return;
6068
6069 sm->pmksa = pmksa;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006070 os_memcpy(pmk, pmksa->pmk, pmksa->pmk_len);
6071 *pmk_len = pmksa->pmk_len;
Dmitry Shmidte4663042016-04-04 10:07:49 -07006072 os_memcpy(pmkid, pmksa->pmkid, PMKID_LEN);
6073 os_memcpy(wpa_auth->dot11RSNAPMKIDUsed, pmksa->pmkid, PMKID_LEN);
6074}
6075
6076
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006077/*
6078 * Remove and free the group from wpa_authenticator. This is triggered by a
6079 * callback to make sure nobody is currently iterating the group list while it
6080 * gets modified.
6081 */
6082static void wpa_group_free(struct wpa_authenticator *wpa_auth,
6083 struct wpa_group *group)
6084{
6085 struct wpa_group *prev = wpa_auth->group;
6086
6087 wpa_printf(MSG_DEBUG, "WPA: Remove group state machine for VLAN-ID %d",
6088 group->vlan_id);
6089
6090 while (prev) {
6091 if (prev->next == group) {
6092 /* This never frees the special first group as needed */
6093 prev->next = group->next;
6094 os_free(group);
6095 break;
6096 }
6097 prev = prev->next;
6098 }
6099
6100}
6101
6102
6103/* Increase the reference counter for group */
6104static void wpa_group_get(struct wpa_authenticator *wpa_auth,
6105 struct wpa_group *group)
6106{
6107 /* Skip the special first group */
6108 if (wpa_auth->group == group)
6109 return;
6110
6111 group->references++;
6112}
6113
6114
6115/* Decrease the reference counter and maybe free the group */
6116static void wpa_group_put(struct wpa_authenticator *wpa_auth,
6117 struct wpa_group *group)
6118{
6119 /* Skip the special first group */
6120 if (wpa_auth->group == group)
6121 return;
6122
6123 group->references--;
6124 if (group->references)
6125 return;
6126 wpa_group_free(wpa_auth, group);
6127}
6128
6129
6130/*
6131 * Add a group that has its references counter set to zero. Caller needs to
6132 * call wpa_group_get() on the return value to mark the entry in use.
6133 */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006134static struct wpa_group *
6135wpa_auth_add_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6136{
6137 struct wpa_group *group;
6138
Hai Shalomfdcde762020-04-02 11:19:20 -07006139 if (!wpa_auth || !wpa_auth->group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006140 return NULL;
6141
6142 wpa_printf(MSG_DEBUG, "WPA: Add group state machine for VLAN-ID %d",
6143 vlan_id);
Dmitry Shmidt1f69aa52012-01-24 16:10:04 -08006144 group = wpa_group_init(wpa_auth, vlan_id, 0);
Hai Shalomfdcde762020-04-02 11:19:20 -07006145 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006146 return NULL;
6147
6148 group->next = wpa_auth->group->next;
6149 wpa_auth->group->next = group;
6150
6151 return group;
6152}
6153
6154
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006155/*
6156 * Enforce that the group state machine for the VLAN is running, increase
6157 * reference counter as interface is up. References might have been increased
6158 * even if a negative value is returned.
6159 * Returns: -1 on error (group missing, group already failed); otherwise, 0
6160 */
6161int wpa_auth_ensure_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6162{
6163 struct wpa_group *group;
6164
Hai Shalomfdcde762020-04-02 11:19:20 -07006165 if (!wpa_auth)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006166 return 0;
6167
6168 group = wpa_auth->group;
6169 while (group) {
6170 if (group->vlan_id == vlan_id)
6171 break;
6172 group = group->next;
6173 }
6174
Hai Shalomfdcde762020-04-02 11:19:20 -07006175 if (!group) {
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006176 group = wpa_auth_add_group(wpa_auth, vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07006177 if (!group)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006178 return -1;
6179 }
6180
6181 wpa_printf(MSG_DEBUG,
6182 "WPA: Ensure group state machine running for VLAN ID %d",
6183 vlan_id);
6184
6185 wpa_group_get(wpa_auth, group);
6186 group->num_setup_iface++;
6187
6188 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6189 return -1;
6190
6191 return 0;
6192}
6193
6194
6195/*
6196 * Decrease reference counter, expected to be zero afterwards.
6197 * returns: -1 on error (group not found, group in fail state)
6198 * -2 if wpa_group is still referenced
6199 * 0 else
6200 */
6201int wpa_auth_release_group(struct wpa_authenticator *wpa_auth, int vlan_id)
6202{
6203 struct wpa_group *group;
6204 int ret = 0;
6205
Hai Shalomfdcde762020-04-02 11:19:20 -07006206 if (!wpa_auth)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006207 return 0;
6208
6209 group = wpa_auth->group;
6210 while (group) {
6211 if (group->vlan_id == vlan_id)
6212 break;
6213 group = group->next;
6214 }
6215
Hai Shalomfdcde762020-04-02 11:19:20 -07006216 if (!group)
Dmitry Shmidtd80a4012015-11-05 16:35:40 -08006217 return -1;
6218
6219 wpa_printf(MSG_DEBUG,
6220 "WPA: Try stopping group state machine for VLAN ID %d",
6221 vlan_id);
6222
6223 if (group->num_setup_iface <= 0) {
6224 wpa_printf(MSG_ERROR,
6225 "WPA: wpa_auth_release_group called more often than wpa_auth_ensure_group for VLAN ID %d, skipping.",
6226 vlan_id);
6227 return -1;
6228 }
6229 group->num_setup_iface--;
6230
6231 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6232 ret = -1;
6233
6234 if (group->references > 1) {
6235 wpa_printf(MSG_DEBUG,
6236 "WPA: Cannot stop group state machine for VLAN ID %d as references are still hold",
6237 vlan_id);
6238 ret = -2;
6239 }
6240
6241 wpa_group_put(wpa_auth, group);
6242
6243 return ret;
6244}
6245
6246
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006247int wpa_auth_sta_set_vlan(struct wpa_state_machine *sm, int vlan_id)
6248{
6249 struct wpa_group *group;
6250
Hai Shalomfdcde762020-04-02 11:19:20 -07006251 if (!sm || !sm->wpa_auth)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006252 return 0;
6253
6254 group = sm->wpa_auth->group;
6255 while (group) {
6256 if (group->vlan_id == vlan_id)
6257 break;
6258 group = group->next;
6259 }
6260
Hai Shalomfdcde762020-04-02 11:19:20 -07006261 if (!group) {
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006262 group = wpa_auth_add_group(sm->wpa_auth, vlan_id);
Hai Shalomfdcde762020-04-02 11:19:20 -07006263 if (!group)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006264 return -1;
6265 }
6266
6267 if (sm->group == group)
6268 return 0;
6269
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006270 if (group->wpa_group_state == WPA_GROUP_FATAL_FAILURE)
6271 return -1;
6272
Hai Shalomfdcde762020-04-02 11:19:20 -07006273 wpa_printf(MSG_DEBUG, "WPA: Moving STA " MACSTR
6274 " to use group state machine for VLAN ID %d",
Sunil Raviaf8751c2023-03-29 11:35:17 -07006275 MAC2STR(wpa_auth_get_spa(sm)), vlan_id);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006276
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006277 wpa_group_get(sm->wpa_auth, group);
6278 wpa_group_put(sm->wpa_auth, sm->group);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006279 sm->group = group;
Dmitry Shmidt1d755d02015-04-28 10:34:29 -07006280
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006281 return 0;
6282}
6283
6284
6285void wpa_auth_eapol_key_tx_status(struct wpa_authenticator *wpa_auth,
6286 struct wpa_state_machine *sm, int ack)
6287{
Hai Shalomfdcde762020-04-02 11:19:20 -07006288 if (!wpa_auth || !sm)
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006289 return;
6290 wpa_printf(MSG_DEBUG, "WPA: EAPOL-Key TX status for STA " MACSTR
Sunil Raviaf8751c2023-03-29 11:35:17 -07006291 " ack=%d", MAC2STR(wpa_auth_get_spa(sm)), ack);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006292 if (sm->pending_1_of_4_timeout && ack) {
6293 /*
6294 * Some deployed supplicant implementations update their SNonce
6295 * for each EAPOL-Key 2/4 message even within the same 4-way
6296 * handshake and then fail to use the first SNonce when
6297 * deriving the PTK. This results in unsuccessful 4-way
6298 * handshake whenever the relatively short initial timeout is
6299 * reached and EAPOL-Key 1/4 is retransmitted. Try to work
6300 * around this by increasing the timeout now that we know that
6301 * the station has received the frame.
6302 */
6303 int timeout_ms = eapol_key_timeout_subseq;
Hai Shalomfdcde762020-04-02 11:19:20 -07006304 wpa_printf(MSG_DEBUG,
6305 "WPA: Increase initial EAPOL-Key 1/4 timeout by %u ms because of acknowledged frame",
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006306 timeout_ms);
6307 eloop_cancel_timeout(wpa_send_eapol_timeout, wpa_auth, sm);
6308 eloop_register_timeout(timeout_ms / 1000,
6309 (timeout_ms % 1000) * 1000,
6310 wpa_send_eapol_timeout, wpa_auth, sm);
6311 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006312
6313#ifdef CONFIG_TESTING_OPTIONS
6314 if (sm->eapol_status_cb) {
6315 sm->eapol_status_cb(sm->eapol_status_cb_ctx1,
6316 sm->eapol_status_cb_ctx2);
6317 sm->eapol_status_cb = NULL;
6318 }
6319#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07006320}
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08006321
6322
6323int wpa_auth_uses_sae(struct wpa_state_machine *sm)
6324{
Hai Shalomfdcde762020-04-02 11:19:20 -07006325 if (!sm)
Dmitry Shmidtd5e49232012-12-03 15:08:10 -08006326 return 0;
6327 return wpa_key_mgmt_sae(sm->wpa_key_mgmt);
6328}
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006329
6330
6331int wpa_auth_uses_ft_sae(struct wpa_state_machine *sm)
6332{
Hai Shalomfdcde762020-04-02 11:19:20 -07006333 if (!sm)
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006334 return 0;
Sunil Ravi89eba102022-09-13 21:04:37 -07006335 return sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE ||
6336 sm->wpa_key_mgmt == WPA_KEY_MGMT_FT_SAE_EXT_KEY;
Dmitry Shmidtfb79edc2014-01-10 10:45:54 -08006337}
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08006338
6339
6340#ifdef CONFIG_P2P
6341int wpa_auth_get_ip_addr(struct wpa_state_machine *sm, u8 *addr)
6342{
Hai Shalomfdcde762020-04-02 11:19:20 -07006343 if (!sm || WPA_GET_BE32(sm->ip_addr) == 0)
Dmitry Shmidtcf32e602014-01-28 10:57:39 -08006344 return -1;
6345 os_memcpy(addr, sm->ip_addr, 4);
6346 return 0;
6347}
6348#endif /* CONFIG_P2P */
Dmitry Shmidt2f74e362015-01-21 13:19:05 -08006349
6350
6351int wpa_auth_radius_das_disconnect_pmksa(struct wpa_authenticator *wpa_auth,
6352 struct radius_das_attrs *attr)
6353{
6354 return pmksa_cache_auth_radius_das_disconnect(wpa_auth->pmksa, attr);
6355}
Dmitry Shmidt7f656022015-02-25 14:36:37 -08006356
6357
6358void wpa_auth_reconfig_group_keys(struct wpa_authenticator *wpa_auth)
6359{
6360 struct wpa_group *group;
6361
6362 if (!wpa_auth)
6363 return;
6364 for (group = wpa_auth->group; group; group = group->next)
6365 wpa_group_config_group_keys(wpa_auth, group);
6366}
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006367
6368
6369#ifdef CONFIG_FILS
6370
6371struct wpa_auth_fils_iter_data {
6372 struct wpa_authenticator *auth;
6373 const u8 *cache_id;
6374 struct rsn_pmksa_cache_entry *pmksa;
6375 const u8 *spa;
6376 const u8 *pmkid;
6377};
6378
6379
6380static int wpa_auth_fils_iter(struct wpa_authenticator *a, void *ctx)
6381{
6382 struct wpa_auth_fils_iter_data *data = ctx;
6383
6384 if (a == data->auth || !a->conf.fils_cache_id_set ||
6385 os_memcmp(a->conf.fils_cache_id, data->cache_id,
6386 FILS_CACHE_ID_LEN) != 0)
6387 return 0;
6388 data->pmksa = pmksa_cache_auth_get(a->pmksa, data->spa, data->pmkid);
6389 return data->pmksa != NULL;
6390}
6391
6392
6393struct rsn_pmksa_cache_entry *
6394wpa_auth_pmksa_get_fils_cache_id(struct wpa_authenticator *wpa_auth,
6395 const u8 *sta_addr, const u8 *pmkid)
6396{
6397 struct wpa_auth_fils_iter_data idata;
6398
6399 if (!wpa_auth->conf.fils_cache_id_set)
6400 return NULL;
6401 idata.auth = wpa_auth;
6402 idata.cache_id = wpa_auth->conf.fils_cache_id;
6403 idata.pmksa = NULL;
6404 idata.spa = sta_addr;
6405 idata.pmkid = pmkid;
6406 wpa_auth_for_each_auth(wpa_auth, wpa_auth_fils_iter, &idata);
6407 return idata.pmksa;
6408}
6409
6410
6411#ifdef CONFIG_IEEE80211R_AP
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006412int wpa_auth_write_fte(struct wpa_authenticator *wpa_auth,
6413 struct wpa_state_machine *sm,
Roshan Pius3a1667e2018-07-03 15:17:14 -07006414 u8 *buf, size_t len)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006415{
6416 struct wpa_auth_config *conf = &wpa_auth->conf;
6417
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006418 return wpa_write_ftie(conf, sm->wpa_key_mgmt, sm->xxkey_len,
6419 conf->r0_key_holder, conf->r0_key_holder_len,
Hai Shalomfdcde762020-04-02 11:19:20 -07006420 NULL, NULL, buf, len, NULL, 0, 0);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006421}
6422#endif /* CONFIG_IEEE80211R_AP */
6423
6424
6425void wpa_auth_get_fils_aead_params(struct wpa_state_machine *sm,
6426 u8 *fils_anonce, u8 *fils_snonce,
6427 u8 *fils_kek, size_t *fils_kek_len)
6428{
6429 os_memcpy(fils_anonce, sm->ANonce, WPA_NONCE_LEN);
6430 os_memcpy(fils_snonce, sm->SNonce, WPA_NONCE_LEN);
6431 os_memcpy(fils_kek, sm->PTK.kek, WPA_KEK_MAX_LEN);
6432 *fils_kek_len = sm->PTK.kek_len;
6433}
6434
Hai Shalom81f62d82019-07-22 12:10:00 -07006435
6436void wpa_auth_add_fils_pmk_pmkid(struct wpa_state_machine *sm, const u8 *pmk,
6437 size_t pmk_len, const u8 *pmkid)
6438{
6439 os_memcpy(sm->PMK, pmk, pmk_len);
6440 sm->pmk_len = pmk_len;
6441 os_memcpy(sm->pmkid, pmkid, PMKID_LEN);
6442 sm->pmkid_set = 1;
6443}
6444
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006445#endif /* CONFIG_FILS */
6446
6447
Hai Shalom021b0b52019-04-10 11:17:58 -07006448void wpa_auth_set_auth_alg(struct wpa_state_machine *sm, u16 auth_alg)
6449{
6450 if (sm)
6451 sm->auth_alg = auth_alg;
6452}
6453
6454
6455#ifdef CONFIG_DPP2
6456void wpa_auth_set_dpp_z(struct wpa_state_machine *sm, const struct wpabuf *z)
6457{
6458 if (sm) {
6459 wpabuf_clear_free(sm->dpp_z);
6460 sm->dpp_z = z ? wpabuf_dup(z) : NULL;
6461 }
6462}
6463#endif /* CONFIG_DPP2 */
6464
6465
Hai Shalom899fcc72020-10-19 14:38:18 -07006466void wpa_auth_set_transition_disable(struct wpa_authenticator *wpa_auth,
6467 u8 val)
6468{
6469 if (wpa_auth)
6470 wpa_auth->conf.transition_disable = val;
6471}
6472
6473
Roshan Pius3a1667e2018-07-03 15:17:14 -07006474#ifdef CONFIG_TESTING_OPTIONS
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006475
6476int wpa_auth_resend_m1(struct wpa_state_machine *sm, int change_anonce,
6477 void (*cb)(void *ctx1, void *ctx2),
6478 void *ctx1, void *ctx2)
6479{
6480 const u8 *anonce = sm->ANonce;
6481 u8 anonce_buf[WPA_NONCE_LEN];
6482
6483 if (change_anonce) {
6484 if (random_get_bytes(anonce_buf, WPA_NONCE_LEN))
6485 return -1;
6486 anonce = anonce_buf;
6487 }
6488
Sunil Raviaf8751c2023-03-29 11:35:17 -07006489 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006490 "sending 1/4 msg of 4-Way Handshake (TESTING)");
6491 wpa_send_eapol(sm->wpa_auth, sm,
6492 WPA_KEY_INFO_ACK | WPA_KEY_INFO_KEY_TYPE, NULL,
6493 anonce, NULL, 0, 0, 0);
6494 return 0;
6495}
6496
6497
6498int wpa_auth_resend_m3(struct wpa_state_machine *sm,
6499 void (*cb)(void *ctx1, void *ctx2),
6500 void *ctx1, void *ctx2)
6501{
Roshan Pius3a1667e2018-07-03 15:17:14 -07006502 u8 rsc[WPA_KEY_RSC_LEN], *_rsc, *gtk, *kde, *pos;
Roshan Pius3a1667e2018-07-03 15:17:14 -07006503 u8 *opos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006504 size_t gtk_len, kde_len;
Hai Shalom899fcc72020-10-19 14:38:18 -07006505 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006506 struct wpa_group *gsm = sm->group;
6507 u8 *wpa_ie;
Hai Shalomc3565922019-10-28 11:58:20 -07006508 int wpa_ie_len, secure, gtkidx, encr = 0;
Hai Shalomfdcde762020-04-02 11:19:20 -07006509 u8 hdr[2];
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006510
6511 /* Send EAPOL(1, 1, 1, Pair, P, RSC, ANonce, MIC(PTK), RSNIE, [MDIE],
Hai Shalomfdcde762020-04-02 11:19:20 -07006512 GTK[GN], IGTK, [BIGTK], [FTIE], [TIE * 2])
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006513 */
6514
6515 /* Use 0 RSC */
6516 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
6517 /* If FT is used, wpa_auth->wpa_ie includes both RSNIE and MDIE */
6518 wpa_ie = sm->wpa_auth->wpa_ie;
6519 wpa_ie_len = sm->wpa_auth->wpa_ie_len;
6520 if (sm->wpa == WPA_VERSION_WPA &&
6521 (sm->wpa_auth->conf.wpa & WPA_PROTO_RSN) &&
6522 wpa_ie_len > wpa_ie[1] + 2 && wpa_ie[0] == WLAN_EID_RSN) {
6523 /* WPA-only STA, remove RSN IE and possible MDIE */
6524 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Hai Shalom60840252021-02-19 19:02:11 -08006525 if (wpa_ie[0] == WLAN_EID_RSNX)
6526 wpa_ie = wpa_ie + wpa_ie[1] + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006527 if (wpa_ie[0] == WLAN_EID_MOBILITY_DOMAIN)
6528 wpa_ie = wpa_ie + wpa_ie[1] + 2;
6529 wpa_ie_len = wpa_ie[1] + 2;
6530 }
Sunil Raviaf8751c2023-03-29 11:35:17 -07006531 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006532 "sending 3/4 msg of 4-Way Handshake (TESTING)");
6533 if (sm->wpa == WPA_VERSION_WPA2) {
6534 /* WPA2 send GTK in the 4-way handshake */
6535 secure = 1;
6536 gtk = gsm->GTK[gsm->GN - 1];
6537 gtk_len = gsm->GTK_len;
Hai Shalomc3565922019-10-28 11:58:20 -07006538 gtkidx = gsm->GN;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006539 _rsc = rsc;
6540 encr = 1;
6541 } else {
6542 /* WPA does not include GTK in msg 3/4 */
6543 secure = 0;
6544 gtk = NULL;
6545 gtk_len = 0;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006546 _rsc = NULL;
6547 if (sm->rx_eapol_key_secure) {
6548 /*
6549 * It looks like Windows 7 supplicant tries to use
6550 * Secure bit in msg 2/4 after having reported Michael
6551 * MIC failure and it then rejects the 4-way handshake
6552 * if msg 3/4 does not set Secure bit. Work around this
6553 * by setting the Secure bit here even in the case of
6554 * WPA if the supplicant used it first.
6555 */
Sunil Raviaf8751c2023-03-29 11:35:17 -07006556 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm),
6557 LOGGER_DEBUG,
Hai Shalomfdcde762020-04-02 11:19:20 -07006558 "STA used Secure bit in WPA msg 2/4 - set Secure for 3/4 as workaround");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006559 secure = 1;
6560 }
6561 }
6562
Hai Shalom74f70d42019-02-11 14:42:39 -08006563 kde_len = wpa_ie_len + ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Hai Shalomfdcde762020-04-02 11:19:20 -07006564
6565 if (sm->use_ext_key_id)
6566 kde_len += 2 + RSN_SELECTOR_LEN + 2;
6567
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006568 if (gtk)
6569 kde_len += 2 + RSN_SELECTOR_LEN + 2 + gtk_len;
6570#ifdef CONFIG_IEEE80211R_AP
6571 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
6572 kde_len += 2 + PMKID_LEN; /* PMKR1Name into RSN IE */
6573 kde_len += 300; /* FTIE + 2 * TIE */
6574 }
6575#endif /* CONFIG_IEEE80211R_AP */
6576 kde = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07006577 if (!kde)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006578 return -1;
6579
6580 pos = kde;
6581 os_memcpy(pos, wpa_ie, wpa_ie_len);
6582 pos += wpa_ie_len;
6583#ifdef CONFIG_IEEE80211R_AP
6584 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
6585 int res;
6586 size_t elen;
6587
6588 elen = pos - kde;
Sunil Ravib0ac25f2024-07-12 01:42:03 +00006589 res = wpa_insert_pmkid(kde, &elen, sm->pmk_r1_name, true);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006590 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07006591 wpa_printf(MSG_ERROR,
6592 "FT: Failed to insert PMKR1Name into RSN IE in EAPOL-Key data");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006593 os_free(kde);
6594 return -1;
6595 }
6596 pos -= wpa_ie_len;
6597 pos += elen;
6598 }
6599#endif /* CONFIG_IEEE80211R_AP */
Hai Shalomfdcde762020-04-02 11:19:20 -07006600 hdr[1] = 0;
6601
6602 if (sm->use_ext_key_id) {
6603 hdr[0] = sm->keyidx_active & 0x01;
6604 pos = wpa_add_kde(pos, RSN_KEY_DATA_KEYID, hdr, 2, NULL, 0);
6605 }
6606
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006607 if (gtk) {
Hai Shalomc3565922019-10-28 11:58:20 -07006608 hdr[0] = gtkidx & 0x03;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006609 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
6610 gtk, gtk_len);
6611 }
6612 opos = pos;
6613 pos = ieee80211w_kde_add(sm, pos);
Roshan Pius3a1667e2018-07-03 15:17:14 -07006614 if (pos - opos >= 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN) {
6615 /* skip KDE header and keyid */
6616 opos += 2 + RSN_SELECTOR_LEN + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006617 os_memset(opos, 0, 6); /* clear PN */
6618 }
Hai Shalom899fcc72020-10-19 14:38:18 -07006619 if (ocv_oci_add(sm, &pos, conf->oci_freq_override_eapol_m3) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08006620 os_free(kde);
6621 return -1;
6622 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006623
6624#ifdef CONFIG_IEEE80211R_AP
6625 if (wpa_key_mgmt_ft(sm->wpa_key_mgmt)) {
6626 int res;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006627
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006628 if (sm->assoc_resp_ftie &&
6629 kde + kde_len - pos >= 2 + sm->assoc_resp_ftie[1]) {
6630 os_memcpy(pos, sm->assoc_resp_ftie,
6631 2 + sm->assoc_resp_ftie[1]);
6632 res = 2 + sm->assoc_resp_ftie[1];
6633 } else {
Sunil Ravi38ad1ed2023-01-17 23:58:31 +00006634 res = wpa_write_ftie(conf, sm->wpa_key_mgmt,
6635 sm->xxkey_len,
Roshan Pius3a1667e2018-07-03 15:17:14 -07006636 conf->r0_key_holder,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006637 conf->r0_key_holder_len,
6638 NULL, NULL, pos,
6639 kde + kde_len - pos,
Hai Shalomfdcde762020-04-02 11:19:20 -07006640 NULL, 0, 0);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006641 }
6642 if (res < 0) {
Hai Shalomfdcde762020-04-02 11:19:20 -07006643 wpa_printf(MSG_ERROR,
6644 "FT: Failed to insert FTIE into EAPOL-Key Key Data");
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006645 os_free(kde);
6646 return -1;
6647 }
6648 pos += res;
6649
6650 /* TIE[ReassociationDeadline] (TU) */
6651 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
6652 *pos++ = 5;
6653 *pos++ = WLAN_TIMEOUT_REASSOC_DEADLINE;
6654 WPA_PUT_LE32(pos, conf->reassociation_deadline);
6655 pos += 4;
6656
6657 /* TIE[KeyLifetime] (seconds) */
6658 *pos++ = WLAN_EID_TIMEOUT_INTERVAL;
6659 *pos++ = 5;
6660 *pos++ = WLAN_TIMEOUT_KEY_LIFETIME;
Roshan Pius3a1667e2018-07-03 15:17:14 -07006661 WPA_PUT_LE32(pos, conf->r0_key_lifetime);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006662 pos += 4;
6663 }
6664#endif /* CONFIG_IEEE80211R_AP */
6665
6666 wpa_send_eapol(sm->wpa_auth, sm,
6667 (secure ? WPA_KEY_INFO_SECURE : 0) |
6668 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
6669 WPA_KEY_INFO_MIC : 0) |
6670 WPA_KEY_INFO_ACK | WPA_KEY_INFO_INSTALL |
6671 WPA_KEY_INFO_KEY_TYPE,
Hai Shalomc3565922019-10-28 11:58:20 -07006672 _rsc, sm->ANonce, kde, pos - kde, 0, encr);
Sunil Ravia04bd252022-05-02 22:54:18 -07006673 bin_clear_free(kde, kde_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006674 return 0;
6675}
6676
6677
6678int wpa_auth_resend_group_m1(struct wpa_state_machine *sm,
6679 void (*cb)(void *ctx1, void *ctx2),
6680 void *ctx1, void *ctx2)
6681{
6682 u8 rsc[WPA_KEY_RSC_LEN];
Hai Shalom899fcc72020-10-19 14:38:18 -07006683 struct wpa_auth_config *conf = &sm->wpa_auth->conf;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006684 struct wpa_group *gsm = sm->group;
6685 const u8 *kde;
Roshan Pius3a1667e2018-07-03 15:17:14 -07006686 u8 *kde_buf = NULL, *pos, hdr[2];
Roshan Pius3a1667e2018-07-03 15:17:14 -07006687 u8 *opos;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006688 size_t kde_len;
6689 u8 *gtk;
6690
6691 /* Send EAPOL(1, 1, 1, !Pair, G, RSC, GNonce, MIC(PTK), GTK[GN]) */
6692 os_memset(rsc, 0, WPA_KEY_RSC_LEN);
6693 /* Use 0 RSC */
Sunil Raviaf8751c2023-03-29 11:35:17 -07006694 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006695 "sending 1/2 msg of Group Key Handshake (TESTING)");
6696
6697 gtk = gsm->GTK[gsm->GN - 1];
6698 if (sm->wpa == WPA_VERSION_WPA2) {
6699 kde_len = 2 + RSN_SELECTOR_LEN + 2 + gsm->GTK_len +
Hai Shalom74f70d42019-02-11 14:42:39 -08006700 ieee80211w_kde_len(sm) + ocv_oci_len(sm);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006701 kde_buf = os_malloc(kde_len);
Hai Shalomfdcde762020-04-02 11:19:20 -07006702 if (!kde_buf)
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006703 return -1;
6704
6705 kde = pos = kde_buf;
6706 hdr[0] = gsm->GN & 0x03;
6707 hdr[1] = 0;
6708 pos = wpa_add_kde(pos, RSN_KEY_DATA_GROUPKEY, hdr, 2,
6709 gtk, gsm->GTK_len);
6710 opos = pos;
6711 pos = ieee80211w_kde_add(sm, pos);
Roshan Pius3a1667e2018-07-03 15:17:14 -07006712 if (pos - opos >=
6713 2 + RSN_SELECTOR_LEN + WPA_IGTK_KDE_PREFIX_LEN) {
6714 /* skip KDE header and keyid */
6715 opos += 2 + RSN_SELECTOR_LEN + 2;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006716 os_memset(opos, 0, 6); /* clear PN */
6717 }
Hai Shalom899fcc72020-10-19 14:38:18 -07006718 if (ocv_oci_add(sm, &pos,
6719 conf->oci_freq_override_eapol_g1) < 0) {
Hai Shalom74f70d42019-02-11 14:42:39 -08006720 os_free(kde_buf);
6721 return -1;
6722 }
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006723 kde_len = pos - kde;
6724 } else {
6725 kde = gtk;
6726 kde_len = gsm->GTK_len;
6727 }
6728
6729 sm->eapol_status_cb = cb;
6730 sm->eapol_status_cb_ctx1 = ctx1;
6731 sm->eapol_status_cb_ctx2 = ctx2;
6732
6733 wpa_send_eapol(sm->wpa_auth, sm,
6734 WPA_KEY_INFO_SECURE |
6735 (wpa_mic_len(sm->wpa_key_mgmt, sm->pmk_len) ?
6736 WPA_KEY_INFO_MIC : 0) |
6737 WPA_KEY_INFO_ACK |
6738 (!sm->Pair ? WPA_KEY_INFO_INSTALL : 0),
6739 rsc, NULL, kde, kde_len, gsm->GN, 1);
6740
Sunil Ravia04bd252022-05-02 22:54:18 -07006741 bin_clear_free(kde_buf, kde_len);
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006742 return 0;
6743}
6744
Roshan Pius3a1667e2018-07-03 15:17:14 -07006745
6746int wpa_auth_rekey_gtk(struct wpa_authenticator *wpa_auth)
6747{
6748 if (!wpa_auth)
6749 return -1;
6750 eloop_cancel_timeout(wpa_rekey_gtk, wpa_auth, NULL);
6751 return eloop_register_timeout(0, 0, wpa_rekey_gtk, wpa_auth, NULL);
6752}
6753
Hai Shalomb755a2a2020-04-23 21:49:02 -07006754
Hai Shaloma20dcd72022-02-04 13:43:00 -08006755int wpa_auth_rekey_ptk(struct wpa_authenticator *wpa_auth,
6756 struct wpa_state_machine *sm)
6757{
6758 if (!wpa_auth || !sm)
6759 return -1;
6760 wpa_auth_logger(wpa_auth, sm->addr, LOGGER_DEBUG, "rekeying PTK");
6761 wpa_request_new_ptk(sm);
6762 wpa_sm_step(sm);
6763 return 0;
6764}
6765
6766
Hai Shalomb755a2a2020-04-23 21:49:02 -07006767void wpa_auth_set_ft_rsnxe_used(struct wpa_authenticator *wpa_auth, int val)
6768{
6769 if (wpa_auth)
6770 wpa_auth->conf.ft_rsnxe_used = val;
6771}
6772
Hai Shalom899fcc72020-10-19 14:38:18 -07006773
6774void wpa_auth_set_ocv_override_freq(struct wpa_authenticator *wpa_auth,
6775 enum wpa_auth_ocv_override_frame frame,
6776 unsigned int freq)
6777{
6778 if (!wpa_auth)
6779 return;
6780 switch (frame) {
6781 case WPA_AUTH_OCV_OVERRIDE_EAPOL_M3:
6782 wpa_auth->conf.oci_freq_override_eapol_m3 = freq;
6783 break;
6784 case WPA_AUTH_OCV_OVERRIDE_EAPOL_G1:
6785 wpa_auth->conf.oci_freq_override_eapol_g1 = freq;
6786 break;
6787 case WPA_AUTH_OCV_OVERRIDE_FT_ASSOC:
6788 wpa_auth->conf.oci_freq_override_ft_assoc = freq;
6789 break;
6790 case WPA_AUTH_OCV_OVERRIDE_FILS_ASSOC:
6791 wpa_auth->conf.oci_freq_override_fils_assoc = freq;
6792 break;
6793 }
6794}
6795
Kai Shie75b0652020-11-24 20:31:29 -08006796void wpa_auth_set_skip_send_eapol(struct wpa_authenticator *wpa_auth,
6797 u8 val)
6798{
6799 if (wpa_auth)
6800 wpa_auth->conf.skip_send_eapol = val;
6801}
6802
6803void wpa_auth_set_enable_eapol_large_timeout(struct wpa_authenticator *wpa_auth,
6804 u8 val)
6805{
6806 if (wpa_auth)
6807 wpa_auth->conf.enable_eapol_large_timeout = val;
6808}
6809
6810
Dmitry Shmidtd2986c22017-10-23 14:22:09 -07006811#endif /* CONFIG_TESTING_OPTIONS */
Sunil Ravia04bd252022-05-02 22:54:18 -07006812
6813
6814void wpa_auth_sta_radius_psk_resp(struct wpa_state_machine *sm, bool success)
6815{
6816 if (!sm->waiting_radius_psk) {
6817 wpa_printf(MSG_DEBUG,
6818 "Ignore RADIUS PSK response for " MACSTR
6819 " that did not wait one",
6820 MAC2STR(sm->addr));
6821 return;
6822 }
6823
6824 wpa_printf(MSG_DEBUG, "RADIUS PSK response for " MACSTR " (%s)",
6825 MAC2STR(sm->addr), success ? "success" : "fail");
6826 sm->waiting_radius_psk = 0;
6827
6828 if (success) {
6829 /* Try to process the EAPOL-Key msg 2/4 again */
6830 sm->EAPOLKeyReceived = true;
6831 } else {
6832 sm->Disconnect = true;
6833 }
6834
6835 eloop_register_timeout(0, 0, wpa_sm_call_step, sm, NULL);
6836}
Sunil Ravi2a14cf12023-11-21 00:54:38 +00006837
6838
6839void wpa_auth_set_ml_info(struct wpa_state_machine *sm, const u8 *mld_addr,
6840 u8 mld_assoc_link_id, struct mld_info *info)
6841{
6842#ifdef CONFIG_IEEE80211BE
6843 struct wpa_auth_ml_rsn_info ml_rsn_info;
6844 unsigned int link_id, i;
6845
6846 if (!info)
6847 return;
6848
6849 os_memset(sm->mld_links, 0, sizeof(sm->mld_links));
6850
6851 wpa_auth_logger(sm->wpa_auth, wpa_auth_get_spa(sm), LOGGER_DEBUG,
6852 "MLD: Initialization");
6853
6854 os_memcpy(sm->own_mld_addr, mld_addr, ETH_ALEN);
6855 os_memcpy(sm->peer_mld_addr, info->common_info.mld_addr, ETH_ALEN);
6856
6857 sm->mld_assoc_link_id = mld_assoc_link_id;
6858
6859 os_memset(&ml_rsn_info, 0, sizeof(ml_rsn_info));
6860
6861 for (i = 0, link_id = 0; link_id < MAX_NUM_MLD_LINKS; link_id++) {
6862 struct mld_link_info *link = &info->links[link_id];
6863 struct mld_link *sm_link = &sm->mld_links[link_id];
6864
6865 sm_link->valid = link->valid;
6866 if (!link->valid)
6867 continue;
6868
6869 os_memcpy(sm_link->peer_addr, link->peer_addr, ETH_ALEN);
6870 os_memcpy(sm_link->own_addr, link->local_addr, ETH_ALEN);
6871
6872 wpa_printf(MSG_DEBUG,
6873 "WPA_AUTH: MLD: id=%u, addr=" MACSTR " peer=" MACSTR,
6874 link_id,
6875 MAC2STR(sm_link->own_addr),
6876 MAC2STR(sm_link->peer_addr));
6877
6878 if (link_id != mld_assoc_link_id)
6879 sm->n_mld_affiliated_links++;
6880
6881 ml_rsn_info.links[i++].link_id = link_id;
6882 }
6883
6884 ml_rsn_info.n_mld_links = i;
6885
6886 wpa_auth_get_ml_rsn_info(sm->wpa_auth, &ml_rsn_info);
6887
6888 for (i = 0; i < ml_rsn_info.n_mld_links; i++) {
6889 struct mld_link *sm_link;
6890 const u8 *rsn_ies;
6891 u8 rsn_ies_len;
6892
6893 sm_link = &sm->mld_links[ml_rsn_info.links[i].link_id];
6894 rsn_ies = ml_rsn_info.links[i].rsn_ies;
6895 rsn_ies_len = ml_rsn_info.links[i].rsn_ies_len;
6896
6897 /* This should not really happen */
6898 if (!rsn_ies || rsn_ies_len < 2 || rsn_ies[0] != WLAN_EID_RSN ||
6899 rsn_ies[1] + 2 > rsn_ies_len) {
6900 wpa_printf(MSG_INFO, "WPA_AUTH: MLD: Invalid RSNE");
6901 continue;
6902 }
6903
6904 sm_link->rsne = rsn_ies;
6905 sm_link->rsne_len = rsn_ies[1] + 2;
6906
6907 if (rsn_ies[1] + 2UL + 2UL < rsn_ies_len &&
6908 rsn_ies[rsn_ies[1] + 2] == WLAN_EID_RSNX) {
6909 sm_link->rsnxe = rsn_ies + 2 + rsn_ies[1];
6910 sm_link->rsnxe_len = sm_link->rsnxe[1] + 2;
6911 }
6912 }
6913#endif /* CONFIG_IEEE80211BE */
6914}