| /* |
| * BIP |
| * Copyright (c) 2010-2012, Jouni Malinen <j@w1.fi> |
| * |
| * This software may be distributed under the terms of the BSD license. |
| * See README for more details. |
| */ |
| |
| #include "utils/includes.h" |
| |
| #include "utils/common.h" |
| #include "common/ieee802_11_defs.h" |
| #include "crypto/aes_wrap.h" |
| #include "wlantest.h" |
| |
| |
| u8 * bip_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, |
| u8 *ipn, int keyid, size_t *prot_len) |
| { |
| u8 *prot, *pos, *buf; |
| u8 mic[16]; |
| u16 fc; |
| struct ieee80211_hdr *hdr; |
| size_t plen; |
| |
| plen = len + (igtk_len == 32 ? 26 : 18); |
| prot = os_malloc(plen); |
| if (prot == NULL) |
| return NULL; |
| os_memcpy(prot, frame, len); |
| pos = prot + len; |
| *pos++ = WLAN_EID_MMIE; |
| *pos++ = igtk_len == 32 ? 24 : 16; |
| WPA_PUT_LE16(pos, keyid); |
| pos += 2; |
| os_memcpy(pos, ipn, 6); |
| pos += 6; |
| os_memset(pos, 0, igtk_len == 32 ? 16 : 8); /* MIC */ |
| |
| buf = os_malloc(plen + 20 - 24); |
| if (buf == NULL) { |
| os_free(prot); |
| return NULL; |
| } |
| |
| /* BIP AAD: FC(masked) A1 A2 A3 */ |
| hdr = (struct ieee80211_hdr *) frame; |
| fc = le_to_host16(hdr->frame_control); |
| fc &= ~(WLAN_FC_RETRY | WLAN_FC_PWRMGT | WLAN_FC_MOREDATA); |
| WPA_PUT_LE16(buf, fc); |
| os_memcpy(buf + 2, hdr->addr1, 3 * ETH_ALEN); |
| os_memcpy(buf + 20, prot + 24, plen - 24); |
| wpa_hexdump(MSG_MSGDUMP, "BIP: AAD|Body(masked)", buf, plen + 20 - 24); |
| /* MIC = L(AES-128-CMAC(AAD || Frame Body(masked)), 0, 64) */ |
| if (omac1_aes_128(igtk, buf, plen + 20 - 24, mic) < 0) { |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| os_free(buf); |
| |
| os_memcpy(pos, mic, igtk_len == 32 ? 16 : 8); |
| wpa_hexdump(MSG_DEBUG, "BIP MMIE MIC", pos, igtk_len == 32 ? 16 : 8); |
| |
| *prot_len = plen; |
| return prot; |
| } |
| |
| |
| #define MME_LEN_LESS_MIC 10 |
| #define MIC_ELEM_LEN_LESS_MIC 2 |
| |
| u8 * bip_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, const u8 *frame, |
| size_t len, const u8 *ipn, int keyid, bool bce, |
| size_t *prot_len) |
| { |
| u8 *prot, *pos, *buf; |
| u8 mic[16]; |
| u16 fc; |
| struct ieee80211_hdr_s1g_beacon *hdr; |
| struct ieee80211_s1g_beacon_compat *bc; |
| size_t plen, mic_len, element_len, buf_len; |
| size_t hdr_add_len = 0, bce_add_len = 0; |
| |
| mic_len = igtk_len == 32 ? 16 : 8; |
| if (bce) |
| element_len = MIC_ELEM_LEN_LESS_MIC + mic_len; |
| else |
| element_len = MME_LEN_LESS_MIC + mic_len; |
| |
| plen = len + element_len; /* add element length */ |
| prot = os_malloc(plen); |
| if (!prot) |
| return NULL; |
| os_memcpy(prot, frame, len); |
| pos = prot + len; |
| |
| /* Add MME/MIC element to the end of the frame */ |
| if (bce) { |
| bce_add_len = 6; /* AAD increases by 6 bytes for BCE */ |
| *pos++ = WLAN_EID_MIC; /* Element ID */ |
| *pos++ = element_len - 2; /* Length field */ |
| } else { |
| *pos++ = WLAN_EID_MMIE; /* Element ID */ |
| *pos++ = element_len - 2; /* Length field */ |
| WPA_PUT_LE16(pos, keyid); /* KeyID */ |
| pos += 2; |
| os_memcpy(pos, ipn, 6); /* BIPN */ |
| pos += 6; |
| } |
| os_memset(pos, 0, mic_len); /* MIC */ |
| |
| /* Duration (2) and Timestamp (4) are omitted from AAD, BIPN (6) is |
| * added if BCE is used */ |
| buf_len = plen - 6 + bce_add_len; |
| buf = os_malloc(buf_len); |
| if (!buf) { |
| os_free(prot); |
| return NULL; |
| } |
| |
| /* BIP AAD: FC SA ChangeSeq NextTBTT(if present) |
| * CompressedSSID(if present) ANO(if present), BIPN(if using BCE) */ |
| hdr = (struct ieee80211_hdr_s1g_beacon *) frame; |
| fc = le_to_host16(hdr->frame_control); |
| if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_EXT || |
| WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_S1G_BEACON) { |
| wpa_printf(MSG_ERROR, "Frame is not an S1G Beacon"); |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| |
| WPA_PUT_LE16(buf, fc); |
| os_memcpy(buf + 2, hdr->sa, ETH_ALEN); |
| os_memcpy(buf + 8, hdr->change_seq, 1); |
| if (fc & WLAN_FC_S1G_BEACON_NEXT_TBTT) |
| hdr_add_len += 3; |
| if (fc & WLAN_FC_S1G_BEACON_COMP_SSID) |
| hdr_add_len += 4; |
| if (fc & WLAN_FC_S1G_BEACON_ANO) |
| hdr_add_len++; |
| os_memcpy(buf + 9, prot + IEEE80211_HDRLEN_S1G_BEACON, hdr_add_len); |
| if (bce) |
| os_memcpy(buf + 9 + hdr_add_len, ipn, bce_add_len); |
| os_memcpy(buf + 9 + hdr_add_len + bce_add_len, |
| prot + IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len, |
| plen - (IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len)); |
| /* The S1G Beacon Compatibility element, when present, is the first |
| * element in the S1G Beacon frame body */ |
| if (len >= IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len + |
| sizeof(struct ieee80211_s1g_beacon_compat)) { |
| bc = (struct ieee80211_s1g_beacon_compat *) |
| (buf + 9 + hdr_add_len + bce_add_len); |
| if (bc->element_id == WLAN_EID_S1G_BCN_COMPAT) { |
| wpa_printf(MSG_DEBUG, |
| "S1G Beacon Compatibility element found, masking TSF Completion field"); |
| os_memset(&bc->tsf_completion, 0, |
| sizeof(bc->tsf_completion)); |
| if (bce && keyid - 6 != (bc->compat_info & 0x80) >> 7) { |
| wpa_printf(MSG_ERROR, |
| "Key ID does not match BIGTK Key ID Index in S1G Beacon Compatibility element"); |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| } |
| } |
| |
| wpa_hexdump(MSG_MSGDUMP, "S1G BIP-CMAC AAD|Body(masked)", buf, buf_len); |
| |
| /* MIC = L(AES-128-CMAC(AAD || Frame Body), 0, 64) */ |
| if (omac1_aes_128(igtk, buf, buf_len, mic) < 0) { |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| os_free(buf); |
| |
| os_memcpy(pos, mic, mic_len); |
| wpa_hexdump(MSG_DEBUG, "S1G BIP-CMAC MIC", pos, mic_len); |
| |
| *prot_len = plen; |
| return prot; |
| } |
| |
| |
| u8 * bip_gmac_protect(const u8 *igtk, size_t igtk_len, u8 *frame, size_t len, |
| u8 *ipn, int keyid, size_t *prot_len) |
| { |
| u8 *prot, *pos, *buf; |
| u16 fc; |
| struct ieee80211_hdr *hdr; |
| size_t plen; |
| u8 nonce[12], *npos; |
| |
| plen = len + 26; |
| prot = os_malloc(plen); |
| if (prot == NULL) |
| return NULL; |
| os_memcpy(prot, frame, len); |
| pos = prot + len; |
| *pos++ = WLAN_EID_MMIE; |
| *pos++ = 24; |
| WPA_PUT_LE16(pos, keyid); |
| pos += 2; |
| os_memcpy(pos, ipn, 6); |
| pos += 6; |
| os_memset(pos, 0, 16); /* MIC */ |
| |
| buf = os_malloc(plen + 20 - 24); |
| if (buf == NULL) { |
| os_free(prot); |
| return NULL; |
| } |
| |
| /* BIP AAD: FC(masked) A1 A2 A3 */ |
| hdr = (struct ieee80211_hdr *) frame; |
| fc = le_to_host16(hdr->frame_control); |
| fc &= ~(WLAN_FC_RETRY | WLAN_FC_PWRMGT | WLAN_FC_MOREDATA); |
| WPA_PUT_LE16(buf, fc); |
| os_memcpy(buf + 2, hdr->addr1, 3 * ETH_ALEN); |
| os_memcpy(buf + 20, prot + 24, plen - 24); |
| wpa_hexdump(MSG_MSGDUMP, "BIP-GMAC: AAD|Body(masked)", |
| buf, plen + 20 - 24); |
| |
| /* Nonce: A2 | IPN */ |
| os_memcpy(nonce, hdr->addr2, ETH_ALEN); |
| npos = nonce + ETH_ALEN; |
| *npos++ = ipn[5]; |
| *npos++ = ipn[4]; |
| *npos++ = ipn[3]; |
| *npos++ = ipn[2]; |
| *npos++ = ipn[1]; |
| *npos++ = ipn[0]; |
| wpa_hexdump(MSG_EXCESSIVE, "BIP-GMAC: Nonce", nonce, sizeof(nonce)); |
| |
| /* MIC = AES-GMAC(AAD || Frame Body(masked)) */ |
| if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), |
| buf, plen + 20 - 24, pos) < 0) { |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| os_free(buf); |
| |
| wpa_hexdump(MSG_DEBUG, "BIP-GMAC MMIE MIC", pos, 16); |
| |
| *prot_len = plen; |
| return prot; |
| } |
| |
| |
| u8 * bip_gmac_protect_s1g_beacon(const u8 *igtk, size_t igtk_len, |
| const u8 *frame, size_t len, const u8 *ipn, |
| int keyid, bool bce, size_t *prot_len) |
| { |
| u8 *prot, *pos, *buf; |
| u16 fc; |
| struct ieee80211_hdr_s1g_beacon *hdr; |
| struct ieee80211_s1g_beacon_compat *bc; |
| size_t plen, mic_len, element_len, buf_len; |
| size_t hdr_add_len = 0, bce_add_len = 0; |
| u8 nonce[12], *npos; |
| |
| mic_len = 16; |
| if (bce) |
| element_len = MIC_ELEM_LEN_LESS_MIC + mic_len; |
| else |
| element_len = MME_LEN_LESS_MIC + mic_len; |
| |
| plen = len + element_len; /* add element length */ |
| prot = os_malloc(plen); |
| if (!prot) |
| return NULL; |
| os_memcpy(prot, frame, len); |
| pos = prot + len; |
| /* Add MME/MIC element to the end of the frame */ |
| if (bce) { |
| bce_add_len = 6; |
| *pos++ = WLAN_EID_MIC; /* Element ID */ |
| *pos++ = element_len - 2; /* Length field */ |
| } else { |
| *pos++ = WLAN_EID_MMIE; /* Element ID */ |
| *pos++ = element_len - 2; /* Length field */ |
| WPA_PUT_LE16(pos, keyid); /* KeyID */ |
| pos += 2; |
| os_memcpy(pos, ipn, 6); /* BIPN */ |
| pos += 6; |
| } |
| os_memset(pos, 0, mic_len); /* MIC */ |
| |
| /* Duration (2) and Timestamp (4) are omitted from AAD, |
| * BIPN (6) is added if BCE is used */ |
| buf_len = plen - 6 + bce_add_len; |
| buf = os_malloc(buf_len); |
| if (!buf) { |
| os_free(prot); |
| return NULL; |
| } |
| |
| /* BIP AAD: FC SA ChangeSeq NextTBTT(if present) |
| * CompressedSSID(if present) ANO(if present) */ |
| hdr = (struct ieee80211_hdr_s1g_beacon *) frame; |
| fc = le_to_host16(hdr->frame_control); |
| if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_EXT || |
| WLAN_FC_GET_STYPE(fc) != WLAN_FC_STYPE_S1G_BEACON) { |
| wpa_printf(MSG_ERROR, "Frame is not an S1G Beacon"); |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| |
| WPA_PUT_LE16(buf, fc); |
| os_memcpy(buf + 2, hdr->sa, ETH_ALEN); |
| os_memcpy(buf + 8, hdr->change_seq, 1); |
| if (fc & WLAN_FC_S1G_BEACON_NEXT_TBTT) |
| hdr_add_len += 3; |
| if (fc & WLAN_FC_S1G_BEACON_COMP_SSID) |
| hdr_add_len += 4; |
| if (fc & WLAN_FC_S1G_BEACON_ANO) |
| hdr_add_len++; |
| os_memcpy(buf + 9, prot + IEEE80211_HDRLEN_S1G_BEACON, hdr_add_len); |
| if (bce) |
| os_memcpy(buf + 9 + hdr_add_len, ipn, bce_add_len); |
| os_memcpy(buf + 9 + hdr_add_len + bce_add_len, |
| prot + IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len, |
| plen - (IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len)); |
| /* The S1G Beacon Compatibility element, when present, is the first |
| * element in the S1G Beacon frame body */ |
| if (len >= IEEE80211_HDRLEN_S1G_BEACON + hdr_add_len + |
| sizeof(struct ieee80211_s1g_beacon_compat)) { |
| bc = (struct ieee80211_s1g_beacon_compat *) |
| (buf + 9 + hdr_add_len + bce_add_len); |
| if (bc->element_id == WLAN_EID_S1G_BCN_COMPAT) { |
| wpa_printf(MSG_DEBUG, |
| "S1G Beacon Compatibility element found, masking TSF Completion field"); |
| os_memset(&bc->tsf_completion, 0, |
| sizeof(bc->tsf_completion)); |
| if (bce && keyid - 6 != (bc->compat_info & 0x80) >> 7) { |
| wpa_printf(MSG_ERROR, |
| "Key ID does not match BIGTK Key ID Index in S1G Beacon Compatibility element"); |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| } |
| } |
| wpa_hexdump(MSG_MSGDUMP, "S1G BIP-GMAC AAD|Body(masked)", buf, buf_len); |
| |
| /* Nonce: SA | IPN */ |
| os_memcpy(nonce, hdr->sa, ETH_ALEN); |
| npos = nonce + ETH_ALEN; |
| *npos++ = ipn[5]; |
| *npos++ = ipn[4]; |
| *npos++ = ipn[3]; |
| *npos++ = ipn[2]; |
| *npos++ = ipn[1]; |
| *npos++ = ipn[0]; |
| wpa_hexdump(MSG_EXCESSIVE, "S1G BIP-GMAC Nonce", nonce, sizeof(nonce)); |
| |
| /* MIC = AES-GMAC(AAD || Frame Body) */ |
| if (aes_gmac(igtk, igtk_len, nonce, sizeof(nonce), buf, buf_len, pos) < |
| 0) { |
| os_free(prot); |
| os_free(buf); |
| return NULL; |
| } |
| os_free(buf); |
| |
| wpa_hexdump(MSG_DEBUG, "S1G BIP-GMAC MIC", pos, 16); |
| |
| *prot_len = plen; |
| return prot; |
| } |