1 /*
2  * Copyright (c) 2009 Joshua Oreman <oremanj@rwcr.net>.
3  *
4  * This program is free software; you can redistribute it and/or
5  * modify it under the terms of the GNU General Public License as
6  * published by the Free Software Foundation; either version 2 of the
7  * License, or any later version.
8  *
9  * This program is distributed in the hope that it will be useful, but
10  * WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
12  * General Public License for more details.
13  *
14  * You should have received a copy of the GNU General Public License
15  * along with this program; if not, write to the Free Software
16  * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
17  */
18 
19 FILE_LICENCE ( GPL2_OR_LATER );
20 
21 #include <gpxe/net80211.h>
22 #include <gpxe/sec80211.h>
23 #include <gpxe/wpa.h>
24 #include <gpxe/eapol.h>
25 #include <gpxe/crypto.h>
26 #include <gpxe/arc4.h>
27 #include <gpxe/crc32.h>
28 #include <gpxe/sha1.h>
29 #include <gpxe/hmac.h>
30 #include <gpxe/list.h>
31 #include <gpxe/ethernet.h>
32 #include <stdlib.h>
33 #include <string.h>
34 #include <errno.h>
35 
36 /** @file
37  *
38  * Handler for the aspects of WPA handshaking that are independent of
39  * 802.1X/PSK or TKIP/CCMP; this mostly involves the 4-Way Handshake.
40  */
41 
42 /** List of WPA contexts in active use. */
43 struct list_head wpa_contexts = LIST_HEAD_INIT ( wpa_contexts );
44 
45 
46 /**
47  * Return an error code and deauthenticate
48  *
49  * @v ctx	WPA common context
50  * @v rc	Return status code
51  * @ret rc	The passed return status code
52  */
wpa_fail(struct wpa_common_ctx * ctx,int rc)53 static int wpa_fail ( struct wpa_common_ctx *ctx, int rc )
54 {
55 	net80211_deauthenticate ( ctx->dev, rc );
56 	return rc;
57 }
58 
59 
60 /**
61  * Find a cryptosystem handler structure from a crypto ID
62  *
63  * @v crypt	Cryptosystem ID
64  * @ret crypto	Cryptosystem handler structure
65  *
66  * If support for @a crypt is not compiled in to gPXE, or if @a crypt
67  * is NET80211_CRYPT_UNKNOWN, returns @c NULL.
68  */
69 static struct net80211_crypto *
wpa_find_cryptosystem(enum net80211_crypto_alg crypt)70 wpa_find_cryptosystem ( enum net80211_crypto_alg crypt )
71 {
72 	struct net80211_crypto *crypto;
73 
74 	for_each_table_entry ( crypto, NET80211_CRYPTOS ) {
75 		if ( crypto->algorithm == crypt )
76 			return crypto;
77 	}
78 
79 	return NULL;
80 }
81 
82 
83 /**
84  * Find WPA key integrity and encryption handler from key version field
85  *
86  * @v ver	Version bits of EAPOL-Key info field
87  * @ret kie	Key integrity and encryption handler
88  */
wpa_find_kie(int version)89 struct wpa_kie * wpa_find_kie ( int version )
90 {
91 	struct wpa_kie *kie;
92 
93 	for_each_table_entry ( kie, WPA_KIES ) {
94 		if ( kie->version == version )
95 			return kie;
96 	}
97 
98 	return NULL;
99 }
100 
101 
102 /**
103  * Construct RSN or WPA information element
104  *
105  * @v dev	802.11 device
106  * @ret ie_ret	RSN or WPA information element
107  * @ret rc	Return status code
108  *
109  * This function allocates, fills, and returns a RSN or WPA
110  * information element suitable for including in an association
111  * request frame to the network identified by @c dev->associating.
112  * If it is impossible to construct an information element consistent
113  * with gPXE's capabilities that is compatible with that network, or
114  * if none should be sent because that network's beacon included no
115  * security information, returns an error indication and leaves
116  * @a ie_ret unchanged.
117  *
118  * The returned IE will be of the same type (RSN or WPA) as was
119  * included in the beacon for the network it is destined for.
120  */
wpa_make_rsn_ie(struct net80211_device * dev,union ieee80211_ie ** ie_ret)121 int wpa_make_rsn_ie ( struct net80211_device *dev, union ieee80211_ie **ie_ret )
122 {
123 	u8 *rsn, *rsn_end;
124 	int is_rsn;
125 	u32 group_cipher;
126 	enum net80211_crypto_alg gcrypt;
127 	int ie_len;
128 	u8 *iep;
129 	struct ieee80211_ie_rsn *ie;
130 	struct ieee80211_frame *hdr;
131 	struct ieee80211_beacon *beacon;
132 
133 	if ( ! dev->associating ) {
134 		DBG ( "WPA: Can't make RSN IE for a non-associating device\n" );
135 		return -EINVAL;
136 	}
137 
138 	hdr = dev->associating->beacon->data;
139 	beacon = ( struct ieee80211_beacon * ) hdr->data;
140 	rsn = sec80211_find_rsn ( beacon->info_element,
141 				  dev->associating->beacon->tail, &is_rsn,
142 				  &rsn_end );
143 	if ( ! rsn ) {
144 		DBG ( "WPA: Can't make RSN IE when we didn't get one\n" );
145 		return -EINVAL;
146 	}
147 
148 	rsn += 2;		/* skip version */
149 	group_cipher = *( u32 * ) rsn;
150 	gcrypt = sec80211_rsn_get_net80211_crypt ( group_cipher );
151 
152 	if ( ! wpa_find_cryptosystem ( gcrypt ) ||
153 	     ! wpa_find_cryptosystem ( dev->associating->crypto ) ) {
154 		DBG ( "WPA: No support for (GC:%d, PC:%d)\n",
155 		      gcrypt, dev->associating->crypto );
156 		return -ENOTSUP;
157 	}
158 
159 	/* Everything looks good - make our IE. */
160 
161 	/* WPA IEs need 4 more bytes for the OUI+type */
162 	ie_len = ieee80211_rsn_size ( 1, 1, 0, is_rsn ) + ( 4 * ! is_rsn );
163 	iep = malloc ( ie_len );
164 	if ( ! iep )
165 		return -ENOMEM;
166 
167 	*ie_ret = ( union ieee80211_ie * ) iep;
168 
169 	/* Store ID and length bytes. */
170 	*iep++ = ( is_rsn ? IEEE80211_IE_RSN : IEEE80211_IE_VENDOR );
171 	*iep++ = ie_len - 2;
172 
173 	/* Store OUI+type for WPA IEs. */
174 	if ( ! is_rsn ) {
175 		*( u32 * ) iep = IEEE80211_WPA_OUI_VEN;
176 		iep += 4;
177 	}
178 
179 	/* If this is a WPA IE, the id and len bytes in the
180 	   ieee80211_ie_rsn structure will not be valid, but by doing
181 	   the cast we can fill all the other fields much more
182 	   readily. */
183 
184 	ie = ( struct ieee80211_ie_rsn * ) ( iep - 2 );
185 	ie->version = IEEE80211_RSN_VERSION;
186 	ie->group_cipher = group_cipher;
187 	ie->pairwise_count = 1;
188 	ie->pairwise_cipher[0] =
189 		sec80211_rsn_get_crypto_desc ( dev->associating->crypto,
190 					       is_rsn );
191 	ie->akm_count = 1;
192 	ie->akm_list[0] =
193 		sec80211_rsn_get_akm_desc ( dev->associating->handshaking,
194 					    is_rsn );
195 	if ( is_rsn ) {
196 		ie->rsn_capab = 0;
197 		ie->pmkid_count = 0;
198 	}
199 
200 	return 0;
201 }
202 
203 
204 /**
205  * Set up generic WPA support to handle 4-Way Handshake
206  *
207  * @v dev	802.11 device
208  * @v ctx	WPA common context
209  * @v pmk	Pairwise Master Key to use for session
210  * @v pmk_len	Length of PMK, almost always 32
211  * @ret rc	Return status code
212  */
wpa_start(struct net80211_device * dev,struct wpa_common_ctx * ctx,const void * pmk,size_t pmk_len)213 int wpa_start ( struct net80211_device *dev, struct wpa_common_ctx *ctx,
214 		const void *pmk, size_t pmk_len )
215 {
216 	struct io_buffer *iob;
217 	struct ieee80211_frame *hdr;
218 	struct ieee80211_beacon *beacon;
219 	u8 *ap_rsn_ie = NULL, *ap_rsn_ie_end;
220 
221 	if ( ! dev->rsn_ie || ! dev->associating )
222 		return -EINVAL;
223 
224 	ctx->dev = dev;
225 	memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len );
226 	ctx->state = WPA_READY;
227 	ctx->replay = ~0ULL;
228 
229 	iob = dev->associating->beacon;
230 	hdr = iob->data;
231 	beacon = ( struct ieee80211_beacon * ) hdr->data;
232 	ap_rsn_ie = sec80211_find_rsn ( beacon->info_element, iob->tail,
233 					&ctx->ap_rsn_is_rsn, &ap_rsn_ie_end );
234 	if ( ap_rsn_ie ) {
235 		ctx->ap_rsn_ie = malloc ( ap_rsn_ie_end - ap_rsn_ie );
236 		if ( ! ctx->ap_rsn_ie )
237 			return -ENOMEM;
238 		memcpy ( ctx->ap_rsn_ie, ap_rsn_ie, ap_rsn_ie_end - ap_rsn_ie );
239 		ctx->ap_rsn_ie_len = ap_rsn_ie_end - ap_rsn_ie;
240 	} else {
241 		return -ENOENT;
242 	}
243 
244 	ctx->crypt = dev->associating->crypto;
245 	ctx->gcrypt = NET80211_CRYPT_UNKNOWN;
246 
247 	list_add_tail ( &ctx->list, &wpa_contexts );
248 	return 0;
249 }
250 
251 
252 /**
253  * Disable handling of received WPA handshake frames
254  *
255  * @v dev	802.11 device
256  */
wpa_stop(struct net80211_device * dev)257 void wpa_stop ( struct net80211_device *dev )
258 {
259 	struct wpa_common_ctx *ctx, *tmp;
260 
261 	list_for_each_entry_safe ( ctx, tmp, &wpa_contexts, list ) {
262 		if ( ctx->dev == dev ) {
263 			free ( ctx->ap_rsn_ie );
264 			ctx->ap_rsn_ie = NULL;
265 			list_del ( &ctx->list );
266 		}
267 	}
268 }
269 
270 
271 /**
272  * Check PMKID consistency
273  *
274  * @v ctx	WPA common context
275  * @v pmkid	PMKID to check against (16 bytes long)
276  * @ret rc	Zero if they match, or a negative error code if not
277  */
wpa_check_pmkid(struct wpa_common_ctx * ctx,const u8 * pmkid)278 int wpa_check_pmkid ( struct wpa_common_ctx *ctx, const u8 *pmkid )
279 {
280 	u8 sha1_ctx[SHA1_CTX_SIZE];
281 	u8 my_pmkid[SHA1_SIZE];
282 	u8 pmk[ctx->pmk_len];
283 	size_t pmk_len;
284 	struct {
285 		char name[8];
286 		u8 aa[ETH_ALEN];
287 		u8 spa[ETH_ALEN];
288 	} __attribute__ (( packed )) pmkid_data;
289 
290 	memcpy ( pmk, ctx->pmk, ctx->pmk_len );
291 	pmk_len = ctx->pmk_len;
292 
293 	memcpy ( pmkid_data.name, "PMK Name", 8 );
294 	memcpy ( pmkid_data.aa, ctx->dev->bssid, ETH_ALEN );
295 	memcpy ( pmkid_data.spa, ctx->dev->netdev->ll_addr, ETH_ALEN );
296 
297 	hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len );
298 	hmac_update ( &sha1_algorithm, sha1_ctx, &pmkid_data,
299 		      sizeof ( pmkid_data ) );
300 	hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid );
301 
302 	if ( memcmp ( my_pmkid, pmkid, WPA_PMKID_LEN ) != 0 )
303 		return -EACCES;
304 
305 	return 0;
306 }
307 
308 
309 /**
310  * Derive pairwise transient key
311  *
312  * @v ctx	WPA common context
313  */
wpa_derive_ptk(struct wpa_common_ctx * ctx)314 static void wpa_derive_ptk ( struct wpa_common_ctx *ctx )
315 {
316 	struct {
317 		u8 mac1[ETH_ALEN];
318 		u8 mac2[ETH_ALEN];
319 		u8 nonce1[WPA_NONCE_LEN];
320 		u8 nonce2[WPA_NONCE_LEN];
321 	} __attribute__ (( packed )) ptk_data;
322 
323 	/* The addresses and nonces are stored in numerical order (!) */
324 
325 	if ( memcmp ( ctx->dev->netdev->ll_addr, ctx->dev->bssid,
326 		      ETH_ALEN ) < 0 ) {
327 		memcpy ( ptk_data.mac1, ctx->dev->netdev->ll_addr, ETH_ALEN );
328 		memcpy ( ptk_data.mac2, ctx->dev->bssid, ETH_ALEN );
329 	} else {
330 		memcpy ( ptk_data.mac1, ctx->dev->bssid, ETH_ALEN );
331 		memcpy ( ptk_data.mac2, ctx->dev->netdev->ll_addr, ETH_ALEN );
332 	}
333 
334 	if ( memcmp ( ctx->Anonce, ctx->Snonce, WPA_NONCE_LEN ) < 0 ) {
335 		memcpy ( ptk_data.nonce1, ctx->Anonce, WPA_NONCE_LEN );
336 		memcpy ( ptk_data.nonce2, ctx->Snonce, WPA_NONCE_LEN );
337 	} else {
338 		memcpy ( ptk_data.nonce1, ctx->Snonce, WPA_NONCE_LEN );
339 		memcpy ( ptk_data.nonce2, ctx->Anonce, WPA_NONCE_LEN );
340 	}
341 
342 	DBGC2 ( ctx, "WPA %p A1 %s, A2 %s\n", ctx, eth_ntoa ( ptk_data.mac1 ),
343 	       eth_ntoa ( ptk_data.mac2 ) );
344 	DBGC2 ( ctx, "WPA %p Nonce1, Nonce2:\n", ctx );
345 	DBGC2_HD ( ctx, ptk_data.nonce1, WPA_NONCE_LEN );
346 	DBGC2_HD ( ctx, ptk_data.nonce2, WPA_NONCE_LEN );
347 
348 	prf_sha1 ( ctx->pmk, ctx->pmk_len,
349 		   "Pairwise key expansion",
350 		   &ptk_data, sizeof ( ptk_data ),
351 		   &ctx->ptk, sizeof ( ctx->ptk ) );
352 
353 	DBGC2 ( ctx, "WPA %p PTK:\n", ctx );
354 	DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) );
355 }
356 
357 
358 /**
359  * Install pairwise transient key
360  *
361  * @v ctx	WPA common context
362  * @v len	Key length (16 for CCMP, 32 for TKIP)
363  * @ret rc	Return status code
364  */
wpa_install_ptk(struct wpa_common_ctx * ctx,int len)365 static inline int wpa_install_ptk ( struct wpa_common_ctx *ctx, int len )
366 {
367 	DBGC ( ctx, "WPA %p: installing %d-byte pairwise transient key\n",
368 	       ctx, len );
369 	DBGC2_HD ( ctx, &ctx->ptk.tk, len );
370 
371 	return sec80211_install ( &ctx->dev->crypto, ctx->crypt,
372 				  &ctx->ptk.tk, len, NULL );
373 }
374 
375 /**
376  * Install group transient key
377  *
378  * @v ctx	WPA common context
379  * @v len	Key length (16 for CCMP, 32 for TKIP)
380  * @v rsc	Receive sequence counter field in EAPOL-Key packet
381  * @ret rc	Return status code
382  */
wpa_install_gtk(struct wpa_common_ctx * ctx,int len,const void * rsc)383 static inline int wpa_install_gtk ( struct wpa_common_ctx *ctx, int len,
384 				    const void *rsc )
385 {
386 	DBGC ( ctx, "WPA %p: installing %d-byte group transient key\n",
387 	       ctx, len );
388 	DBGC2_HD ( ctx, &ctx->gtk.tk, len );
389 
390 	return sec80211_install ( &ctx->dev->gcrypto, ctx->gcrypt,
391 				  &ctx->gtk.tk, len, rsc );
392 }
393 
394 /**
395  * Search for group transient key, and install it if found
396  *
397  * @v ctx	WPA common context
398  * @v ie	Pointer to first IE in key data field
399  * @v ie_end	Pointer to first byte not in key data field
400  * @v rsc	Receive sequence counter field in EAPOL-Key packet
401  * @ret rc	Return status code
402  */
wpa_maybe_install_gtk(struct wpa_common_ctx * ctx,union ieee80211_ie * ie,void * ie_end,const void * rsc)403 static int wpa_maybe_install_gtk ( struct wpa_common_ctx *ctx,
404 				   union ieee80211_ie *ie, void *ie_end,
405 				   const void *rsc )
406 {
407 	struct wpa_kde *kde;
408 
409 	if ( ! ieee80211_ie_bound ( ie, ie_end ) )
410 		return -ENOENT;
411 
412 	while ( ie ) {
413 		if ( ie->id == IEEE80211_IE_VENDOR &&
414 		     ie->vendor.oui == WPA_KDE_GTK )
415 			break;
416 
417 		ie = ieee80211_next_ie ( ie, ie_end );
418 	}
419 
420 	if ( ! ie )
421 		return -ENOENT;
422 
423 	if ( ie->len - 6u > sizeof ( ctx->gtk.tk ) ) {
424 		DBGC ( ctx, "WPA %p: GTK KDE is too long (%d bytes, max %d)\n",
425 		       ctx, ie->len - 4, sizeof ( ctx->gtk.tk ) );
426 		return -EINVAL;
427 	}
428 
429 	/* XXX We ignore key ID for now. */
430 	kde = ( struct wpa_kde * ) ie;
431 	memcpy ( &ctx->gtk.tk, &kde->gtk_encap.gtk, kde->len - 6 );
432 
433 	return wpa_install_gtk ( ctx, kde->len - 6, rsc );
434 }
435 
436 
437 /**
438  * Allocate I/O buffer for construction of outgoing EAPOL-Key frame
439  *
440  * @v kdlen	Maximum number of bytes in the Key Data field
441  * @ret iob	Newly allocated I/O buffer
442  *
443  * The returned buffer will have space reserved for the link-layer and
444  * EAPOL headers, and will have @c iob->tail pointing to the start of
445  * the Key Data field. Thus, it is necessary to use iob_put() in
446  * filling the Key Data.
447  */
wpa_alloc_frame(int kdlen)448 static struct io_buffer * wpa_alloc_frame ( int kdlen )
449 {
450 	struct io_buffer *ret = alloc_iob ( sizeof ( struct eapol_key_pkt ) +
451 					    kdlen + EAPOL_HDR_LEN +
452 					    MAX_LL_HEADER_LEN );
453 	if ( ! ret )
454 		return NULL;
455 
456 	iob_reserve ( ret, MAX_LL_HEADER_LEN + EAPOL_HDR_LEN );
457 	memset ( iob_put ( ret, sizeof ( struct eapol_key_pkt ) ), 0,
458 		 sizeof ( struct eapol_key_pkt ) );
459 
460 	return ret;
461 }
462 
463 
464 /**
465  * Send EAPOL-Key packet
466  *
467  * @v iob	I/O buffer, with sufficient headroom for headers
468  * @v dev	802.11 device
469  * @v kie	Key integrity and encryption handler
470  * @v is_rsn	If TRUE, handshake uses new RSN format
471  * @ret rc	Return status code
472  *
473  * If a KIE is specified, the MIC will be filled in before transmission.
474  */
wpa_send_eapol(struct io_buffer * iob,struct wpa_common_ctx * ctx,struct wpa_kie * kie)475 static int wpa_send_eapol ( struct io_buffer *iob, struct wpa_common_ctx *ctx,
476 			    struct wpa_kie *kie )
477 {
478 	struct eapol_key_pkt *pkt = iob->data;
479 	struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN );
480 
481 	pkt->info = htons ( pkt->info );
482 	pkt->keysize = htons ( pkt->keysize );
483 	pkt->datalen = htons ( pkt->datalen );
484 	pkt->replay = cpu_to_be64 ( pkt->replay );
485 	eapol->version = EAPOL_THIS_VERSION;
486 	eapol->type = EAPOL_TYPE_KEY;
487 	eapol->length = htons ( iob->tail - iob->data - sizeof ( *eapol ) );
488 
489 	memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
490 	if ( kie )
491 		kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN +
492 			   sizeof ( *pkt ) + ntohs ( pkt->datalen ),
493 			   pkt->mic );
494 
495 	return net_tx ( iob, ctx->dev->netdev, &eapol_protocol,
496 			ctx->dev->bssid );
497 }
498 
499 
500 /**
501  * Send second frame in 4-Way Handshake
502  *
503  * @v ctx	WPA common context
504  * @v pkt	First frame, to which this is a reply
505  * @v is_rsn	If TRUE, handshake uses new RSN format
506  * @v kie	Key integrity and encryption handler
507  * @ret rc	Return status code
508  */
wpa_send_2_of_4(struct wpa_common_ctx * ctx,struct eapol_key_pkt * pkt,int is_rsn,struct wpa_kie * kie)509 static int wpa_send_2_of_4 ( struct wpa_common_ctx *ctx,
510 			     struct eapol_key_pkt *pkt, int is_rsn,
511 			     struct wpa_kie *kie )
512 {
513 	struct io_buffer *iob = wpa_alloc_frame ( ctx->dev->rsn_ie->len + 2 );
514 	struct eapol_key_pkt *npkt;
515 
516 	if ( ! iob )
517 		return -ENOMEM;
518 
519 	npkt = iob->data;
520 	memcpy ( npkt, pkt, sizeof ( *pkt ) );
521 	npkt->info &= ~EAPOL_KEY_INFO_KEY_ACK;
522 	npkt->info |= EAPOL_KEY_INFO_KEY_MIC;
523 	if ( is_rsn )
524 		npkt->keysize = 0;
525 	memcpy ( npkt->nonce, ctx->Snonce, sizeof ( npkt->nonce ) );
526 	npkt->datalen = ctx->dev->rsn_ie->len + 2;
527 	memcpy ( iob_put ( iob, npkt->datalen ), ctx->dev->rsn_ie,
528 		 npkt->datalen );
529 
530 	DBGC ( ctx, "WPA %p: sending 2/4\n", ctx );
531 
532 	return wpa_send_eapol ( iob, ctx, kie );
533 }
534 
535 
536 /**
537  * Handle receipt of first frame in 4-Way Handshake
538  *
539  * @v ctx	WPA common context
540  * @v pkt	EAPOL-Key packet
541  * @v is_rsn	If TRUE, frame uses new RSN format
542  * @v kie	Key integrity and encryption handler
543  * @ret rc	Return status code
544  */
wpa_handle_1_of_4(struct wpa_common_ctx * ctx,struct eapol_key_pkt * pkt,int is_rsn,struct wpa_kie * kie)545 static int wpa_handle_1_of_4 ( struct wpa_common_ctx *ctx,
546 			       struct eapol_key_pkt *pkt, int is_rsn,
547 			       struct wpa_kie *kie )
548 {
549 	int rc;
550 
551 	if ( ctx->state == WPA_WAITING )
552 		return -EINVAL;
553 
554 	ctx->state = WPA_WORKING;
555 	memcpy ( ctx->Anonce, pkt->nonce, sizeof ( ctx->Anonce ) );
556 	if ( ! ctx->have_Snonce ) {
557 		get_random_bytes ( ctx->Snonce, sizeof ( ctx->Snonce ) );
558 		ctx->have_Snonce = 1;
559 	}
560 
561 	if ( is_rsn && pkt->datalen ) {
562 		union ieee80211_ie *ie = ( union ieee80211_ie * ) pkt->data;
563 		void *ie_end = pkt->data + pkt->datalen;
564 
565 		if ( ! ieee80211_ie_bound ( ie, ie_end ) ) {
566 			DBGC ( ctx, "WPA %p: malformed PMKID KDE\n", ctx );
567 			return wpa_fail ( ctx, -EINVAL );
568 		}
569 
570 		while ( ie ) {
571 			if ( ie->id == IEEE80211_IE_VENDOR &&
572 			     ie->vendor.oui == WPA_KDE_PMKID ) {
573 				rc = wpa_check_pmkid ( ctx, ie->vendor.data );
574 				if ( rc < 0 ) {
575 					DBGC ( ctx, "WPA %p ALERT: PMKID "
576 					       "mismatch in 1/4\n", ctx );
577 					return wpa_fail ( ctx, rc );
578 				}
579 			}
580 
581 			ie = ieee80211_next_ie ( ie, ie_end );
582 		}
583 	}
584 
585 	DBGC ( ctx, "WPA %p: received 1/4, looks OK\n", ctx );
586 
587 	wpa_derive_ptk ( ctx );
588 
589 	return wpa_send_2_of_4 ( ctx, pkt, is_rsn, kie );
590 }
591 
592 
593 /**
594  * Send fourth frame in 4-Way Handshake, or second in Group Key Handshake
595  *
596  * @v ctx	WPA common context
597  * @v pkt	EAPOL-Key packet for frame to which we're replying
598  * @v is_rsn	If TRUE, frame uses new RSN format
599  * @v kie	Key integrity and encryption handler
600  * @ret rc	Return status code
601  */
wpa_send_final(struct wpa_common_ctx * ctx,struct eapol_key_pkt * pkt,int is_rsn,struct wpa_kie * kie)602 static int wpa_send_final ( struct wpa_common_ctx *ctx,
603 			    struct eapol_key_pkt *pkt, int is_rsn,
604 			    struct wpa_kie *kie )
605 {
606 	struct io_buffer *iob = wpa_alloc_frame ( 0 );
607 	struct eapol_key_pkt *npkt;
608 
609 	if ( ! iob )
610 		return -ENOMEM;
611 
612 	npkt = iob->data;
613 	memcpy ( npkt, pkt, sizeof ( *pkt ) );
614 	npkt->info &= ~( EAPOL_KEY_INFO_KEY_ACK | EAPOL_KEY_INFO_INSTALL |
615 			 EAPOL_KEY_INFO_KEY_ENC );
616 	if ( is_rsn )
617 		npkt->keysize = 0;
618 	memset ( npkt->nonce, 0, sizeof ( npkt->nonce ) );
619 	memset ( npkt->iv, 0, sizeof ( npkt->iv ) );
620 	npkt->datalen = 0;
621 
622 	if ( npkt->info & EAPOL_KEY_INFO_TYPE )
623 		DBGC ( ctx, "WPA %p: sending 4/4\n", ctx );
624 	else
625 		DBGC ( ctx, "WPA %p: sending 2/2\n", ctx );
626 
627 	return wpa_send_eapol ( iob, ctx, kie );
628 
629 }
630 
631 
632 /**
633  * Handle receipt of third frame in 4-Way Handshake
634  *
635  * @v ctx	WPA common context
636  * @v pkt	EAPOL-Key packet
637  * @v is_rsn	If TRUE, frame uses new RSN format
638  * @v kie	Key integrity and encryption handler
639  * @ret rc	Return status code
640  */
wpa_handle_3_of_4(struct wpa_common_ctx * ctx,struct eapol_key_pkt * pkt,int is_rsn,struct wpa_kie * kie)641 static int wpa_handle_3_of_4 ( struct wpa_common_ctx *ctx,
642 			       struct eapol_key_pkt *pkt, int is_rsn,
643 			       struct wpa_kie *kie )
644 {
645 	int rc;
646 	u8 *this_rsn, *this_rsn_end;
647 	u8 *new_rsn, *new_rsn_end;
648 	int this_is_rsn, new_is_rsn;
649 
650 	if ( ctx->state == WPA_WAITING )
651 		return -EINVAL;
652 
653 	ctx->state = WPA_WORKING;
654 
655 	/* Check nonce */
656 	if ( memcmp ( ctx->Anonce, pkt->nonce, WPA_NONCE_LEN ) != 0 ) {
657 		DBGC ( ctx, "WPA %p ALERT: nonce mismatch in 3/4\n", ctx );
658 		return wpa_fail ( ctx, -EACCES );
659 	}
660 
661 	/* Check RSN IE */
662 	this_rsn = sec80211_find_rsn ( ( union ieee80211_ie * ) pkt->data,
663 				       pkt->data + pkt->datalen,
664 				       &this_is_rsn, &this_rsn_end );
665 	if ( this_rsn )
666 		new_rsn = sec80211_find_rsn ( ( union ieee80211_ie * )
667 					              this_rsn_end,
668 					      pkt->data + pkt->datalen,
669 					      &new_is_rsn, &new_rsn_end );
670 	else
671 		new_rsn = NULL;
672 
673 	if ( ! ctx->ap_rsn_ie || ! this_rsn ||
674 	     ctx->ap_rsn_ie_len != ( this_rsn_end - this_rsn ) ||
675 	     ctx->ap_rsn_is_rsn != this_is_rsn ||
676 	     memcmp ( ctx->ap_rsn_ie, this_rsn, ctx->ap_rsn_ie_len ) != 0 ) {
677 		DBGC ( ctx, "WPA %p ALERT: RSN mismatch in 3/4\n", ctx );
678 		DBGC2 ( ctx, "WPA %p RSNs (in 3/4, in beacon):\n", ctx );
679 		DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
680 		DBGC2_HD ( ctx, ctx->ap_rsn_ie, ctx->ap_rsn_ie_len );
681 		return wpa_fail ( ctx, -EACCES );
682 	}
683 
684 	/* Don't switch if they just supplied both styles of IE
685 	   simultaneously; we need two RSN IEs or two WPA IEs to
686 	   switch ciphers. They'll be immediately consecutive because
687 	   of ordering guarantees. */
688 	if ( new_rsn && this_is_rsn == new_is_rsn ) {
689 		struct net80211_wlan *assoc = ctx->dev->associating;
690 		DBGC ( ctx, "WPA %p: accommodating bait-and-switch tactics\n",
691 		       ctx );
692 		DBGC2 ( ctx, "WPA %p RSNs (in 3/4+beacon, new in 3/4):\n",
693 			ctx );
694 		DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
695 		DBGC2_HD ( ctx, new_rsn, new_rsn_end - new_rsn );
696 
697 		if ( ( rc = sec80211_detect_ie ( new_is_rsn, new_rsn,
698 						 new_rsn_end,
699 						 &assoc->handshaking,
700 						 &assoc->crypto ) ) != 0 )
701 			DBGC ( ctx, "WPA %p: bait-and-switch invalid, staying "
702 			       "with original request\n", ctx );
703 	} else {
704 		new_rsn = this_rsn;
705 		new_is_rsn = this_is_rsn;
706 		new_rsn_end = this_rsn_end;
707 	}
708 
709 	/* Grab group cryptosystem ID */
710 	ctx->gcrypt = sec80211_rsn_get_net80211_crypt ( *( u32 * )
711 							( new_rsn + 2 ) );
712 
713 	/* Check for a GTK, if info field is encrypted */
714 	if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
715 		rc = wpa_maybe_install_gtk ( ctx,
716 					     ( union ieee80211_ie * ) pkt->data,
717 					     pkt->data + pkt->datalen,
718 					     pkt->rsc );
719 		if ( rc < 0 ) {
720 			DBGC ( ctx, "WPA %p did not install GTK in 3/4: %s\n",
721 			       ctx, strerror ( rc ) );
722 			if ( rc != -ENOENT )
723 				return wpa_fail ( ctx, rc );
724 		}
725 	}
726 
727 	DBGC ( ctx, "WPA %p: received 3/4, looks OK\n", ctx );
728 
729 	/* Send final message */
730 	rc = wpa_send_final ( ctx, pkt, is_rsn, kie );
731 	if ( rc < 0 )
732 		return wpa_fail ( ctx, rc );
733 
734 	/* Install PTK */
735 	rc = wpa_install_ptk ( ctx, pkt->keysize );
736 	if ( rc < 0 ) {
737 		DBGC ( ctx, "WPA %p failed to install PTK: %s\n", ctx,
738 		       strerror ( rc ) );
739 		return wpa_fail ( ctx, rc );
740 	}
741 
742 	/* Mark us as needing a new Snonce if we rekey */
743 	ctx->have_Snonce = 0;
744 
745 	/* Done! */
746 	ctx->state = WPA_SUCCESS;
747 	return 0;
748 }
749 
750 
751 /**
752  * Handle receipt of first frame in Group Key Handshake
753  *
754  * @v ctx	WPA common context
755  * @v pkt	EAPOL-Key packet
756  * @v is_rsn	If TRUE, frame uses new RSN format
757  * @v kie	Key integrity and encryption handler
758  * @ret rc	Return status code
759  */
wpa_handle_1_of_2(struct wpa_common_ctx * ctx,struct eapol_key_pkt * pkt,int is_rsn,struct wpa_kie * kie)760 static int wpa_handle_1_of_2 ( struct wpa_common_ctx *ctx,
761 			       struct eapol_key_pkt *pkt, int is_rsn,
762 			       struct wpa_kie *kie )
763 {
764 	int rc;
765 
766 	/*
767 	 * WPA and RSN do this completely differently.
768 	 *
769 	 * The idea of encoding the GTK (or PMKID, or various other
770 	 * things) into a KDE that looks like an information element
771 	 * is an RSN innovation; old WPA code never encapsulates
772 	 * things like that. If it looks like an info element, it
773 	 * really is (for the WPA IE check in frames 2/4 and 3/4). The
774 	 * "key data encrypted" bit in the info field is also specific
775 	 * to RSN.
776 	 *
777 	 * So from an old WPA host, 3/4 does not contain an
778 	 * encapsulated GTK. The first frame of the GK handshake
779 	 * contains it, encrypted, but without a KDE wrapper, and with
780 	 * the key ID field (which gPXE doesn't use) shoved away in
781 	 * the reserved bits in the info field, and the TxRx bit
782 	 * stealing the Install bit's spot.
783 	 */
784 
785 	if ( is_rsn && ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) ) {
786 		rc = wpa_maybe_install_gtk ( ctx,
787 					     ( union ieee80211_ie * ) pkt->data,
788 					     pkt->data + pkt->datalen,
789 					     pkt->rsc );
790 		if ( rc < 0 ) {
791 			DBGC ( ctx, "WPA %p: failed to install GTK in 1/2: "
792 			       "%s\n", ctx, strerror ( rc ) );
793 			return wpa_fail ( ctx, rc );
794 		}
795 	} else {
796 		rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
797 				    &pkt->datalen );
798 		if ( rc < 0 ) {
799 			DBGC ( ctx, "WPA %p: failed to decrypt GTK: %s\n",
800 			       ctx, strerror ( rc ) );
801 			return rc; /* non-fatal */
802 		}
803 		if ( pkt->datalen > sizeof ( ctx->gtk.tk ) ) {
804 			DBGC ( ctx, "WPA %p: too much GTK data (%d > %d)\n",
805 			       ctx, pkt->datalen, sizeof ( ctx->gtk.tk ) );
806 			return wpa_fail ( ctx, -EINVAL );
807 		}
808 
809 		memcpy ( &ctx->gtk.tk, pkt->data, pkt->datalen );
810 		wpa_install_gtk ( ctx, pkt->datalen, pkt->rsc );
811 	}
812 
813 	DBGC ( ctx, "WPA %p: received 1/2, looks OK\n", ctx );
814 
815 	return wpa_send_final ( ctx, pkt, is_rsn, kie );
816 }
817 
818 
819 /**
820  * Handle receipt of EAPOL-Key frame for WPA
821  *
822  * @v iob	I/O buffer
823  * @v netdev	Network device
824  * @v ll_source	Source link-layer address
825  */
eapol_key_rx(struct io_buffer * iob,struct net_device * netdev,const void * ll_source)826 static int eapol_key_rx ( struct io_buffer *iob, struct net_device *netdev,
827 			  const void *ll_source )
828 {
829 	struct net80211_device *dev = net80211_get ( netdev );
830 	struct eapol_key_pkt *pkt = iob->data;
831 	int is_rsn, found_ctx;
832 	struct wpa_common_ctx *ctx;
833 	int rc = 0;
834 	struct wpa_kie *kie;
835 	u8 their_mic[16], our_mic[16];
836 
837 	if ( pkt->type != EAPOL_KEY_TYPE_WPA &&
838 	     pkt->type != EAPOL_KEY_TYPE_RSN ) {
839 		DBG ( "EAPOL-Key: packet not of 802.11 type\n" );
840 		rc = -EINVAL;
841 		goto drop;
842 	}
843 
844 	is_rsn = ( pkt->type == EAPOL_KEY_TYPE_RSN );
845 
846 	if ( ! dev ) {
847 		DBG ( "EAPOL-Key: packet not from 802.11\n" );
848 		rc = -EINVAL;
849 		goto drop;
850 	}
851 
852 	if ( memcmp ( dev->bssid, ll_source, ETH_ALEN ) != 0 ) {
853 		DBG ( "EAPOL-Key: packet not from associated AP\n" );
854 		rc = -EINVAL;
855 		goto drop;
856 	}
857 
858 	if ( ! ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_ACK ) ) {
859 		DBG ( "EAPOL-Key: packet sent in wrong direction\n" );
860 		rc = -EINVAL;
861 		goto drop;
862 	}
863 
864 	found_ctx = 0;
865 	list_for_each_entry ( ctx, &wpa_contexts, list ) {
866 		if ( ctx->dev == dev ) {
867 			found_ctx = 1;
868 			break;
869 		}
870 	}
871 
872 	if ( ! found_ctx ) {
873 		DBG ( "EAPOL-Key: no WPA context to handle packet for %p\n",
874 		      dev );
875 		rc = -ENOENT;
876 		goto drop;
877 	}
878 
879 	if ( ( void * ) ( pkt + 1 ) + ntohs ( pkt->datalen ) > iob->tail ) {
880 		DBGC ( ctx, "WPA %p: packet truncated (has %d extra bytes, "
881 		       "states %d)\n", ctx, iob->tail - ( void * ) ( pkt + 1 ),
882 		       ntohs ( pkt->datalen ) );
883 		rc = -EINVAL;
884 		goto drop;
885 	}
886 
887 	/* Get a handle on key integrity/encryption handler */
888 	kie = wpa_find_kie ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
889 	if ( ! kie ) {
890 		DBGC ( ctx, "WPA %p: no support for packet version %d\n", ctx,
891 		       ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
892 		rc = wpa_fail ( ctx, -ENOTSUP );
893 		goto drop;
894 	}
895 
896 	/* Check MIC */
897 	if ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_MIC ) {
898 		memcpy ( their_mic, pkt->mic, sizeof ( pkt->mic ) );
899 		memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
900 		kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN,
901 			   EAPOL_HDR_LEN + sizeof ( *pkt ) +
902 			   ntohs ( pkt->datalen ), our_mic );
903 		DBGC2 ( ctx, "WPA %p MIC comparison (theirs, ours):\n", ctx );
904 		DBGC2_HD ( ctx, their_mic, 16 );
905 		DBGC2_HD ( ctx, our_mic, 16 );
906 		if ( memcmp ( their_mic, our_mic, sizeof ( pkt->mic ) ) != 0 ) {
907 			DBGC ( ctx, "WPA %p: EAPOL MIC failure\n", ctx );
908 			goto drop;
909 		}
910 	}
911 
912 	/* Fix byte order to local */
913 	pkt->info = ntohs ( pkt->info );
914 	pkt->keysize = ntohs ( pkt->keysize );
915 	pkt->datalen = ntohs ( pkt->datalen );
916 	pkt->replay = be64_to_cpu ( pkt->replay );
917 
918 	/* Check replay counter */
919 	if ( ctx->replay != ~0ULL && ctx->replay >= pkt->replay ) {
920 		DBGC ( ctx, "WPA %p ALERT: Replay detected! "
921 		       "(%08x:%08x >= %08x:%08x)\n", ctx,
922 		       ( u32 ) ( ctx->replay >> 32 ), ( u32 ) ctx->replay,
923 		       ( u32 ) ( pkt->replay >> 32 ), ( u32 ) pkt->replay );
924 		rc = 0;		/* ignore without error */
925 		goto drop;
926 	}
927 	ctx->replay = pkt->replay;
928 
929 	/* Decrypt key data */
930 	if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
931 		rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
932 				    &pkt->datalen );
933 		if ( rc < 0 ) {
934 			DBGC ( ctx, "WPA %p: failed to decrypt packet: %s\n",
935 			       ctx, strerror ( rc ) );
936 			goto drop;
937 		}
938 	}
939 
940 	/* Hand it off to appropriate handler */
941 	switch ( pkt->info & ( EAPOL_KEY_INFO_TYPE |
942 			       EAPOL_KEY_INFO_KEY_MIC ) ) {
943 	case EAPOL_KEY_TYPE_PTK:
944 		rc = wpa_handle_1_of_4 ( ctx, pkt, is_rsn, kie );
945 		break;
946 
947 	case EAPOL_KEY_TYPE_PTK | EAPOL_KEY_INFO_KEY_MIC:
948 		rc = wpa_handle_3_of_4 ( ctx, pkt, is_rsn, kie );
949 		break;
950 
951 	case EAPOL_KEY_TYPE_GTK | EAPOL_KEY_INFO_KEY_MIC:
952 		rc = wpa_handle_1_of_2 ( ctx, pkt, is_rsn, kie );
953 		break;
954 
955 	default:
956 		DBGC ( ctx, "WPA %p: Invalid combination of key flags %04x\n",
957 		       ctx, pkt->info );
958 		rc = -EINVAL;
959 		break;
960 	}
961 
962  drop:
963 	free_iob ( iob );
964 	return rc;
965 }
966 
967 struct eapol_handler eapol_key_handler __eapol_handler = {
968 	.type = EAPOL_TYPE_KEY,
969 	.rx = eapol_key_rx,
970 };
971 
972 /* WPA always needs EAPOL in order to be useful */
973 REQUIRE_OBJECT ( eapol );
974