Home | History | Annotate | Download | only in 80211
      1 /*
      2  * Copyright (c) 2009 Joshua Oreman <oremanj (at) rwcr.net>.
      3  *
      4  * This program is free software; you can redistribute it and/or
      5  * modify it under the terms of the GNU General Public License as
      6  * published by the Free Software Foundation; either version 2 of the
      7  * License, or any later version.
      8  *
      9  * This program is distributed in the hope that it will be useful, but
     10  * WITHOUT ANY WARRANTY; without even the implied warranty of
     11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
     12  * General Public License for more details.
     13  *
     14  * You should have received a copy of the GNU General Public License
     15  * along with this program; if not, write to the Free Software
     16  * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
     17  */
     18 
     19 FILE_LICENCE ( GPL2_OR_LATER );
     20 
     21 #include <gpxe/net80211.h>
     22 #include <gpxe/sec80211.h>
     23 #include <gpxe/wpa.h>
     24 #include <gpxe/eapol.h>
     25 #include <gpxe/crypto.h>
     26 #include <gpxe/arc4.h>
     27 #include <gpxe/crc32.h>
     28 #include <gpxe/sha1.h>
     29 #include <gpxe/hmac.h>
     30 #include <gpxe/list.h>
     31 #include <gpxe/ethernet.h>
     32 #include <stdlib.h>
     33 #include <string.h>
     34 #include <errno.h>
     35 
     36 /** @file
     37  *
     38  * Handler for the aspects of WPA handshaking that are independent of
     39  * 802.1X/PSK or TKIP/CCMP; this mostly involves the 4-Way Handshake.
     40  */
     41 
     42 /** List of WPA contexts in active use. */
     43 struct list_head wpa_contexts = LIST_HEAD_INIT ( wpa_contexts );
     44 
     45 
     46 /**
     47  * Return an error code and deauthenticate
     48  *
     49  * @v ctx	WPA common context
     50  * @v rc	Return status code
     51  * @ret rc	The passed return status code
     52  */
     53 static int wpa_fail ( struct wpa_common_ctx *ctx, int rc )
     54 {
     55 	net80211_deauthenticate ( ctx->dev, rc );
     56 	return rc;
     57 }
     58 
     59 
     60 /**
     61  * Find a cryptosystem handler structure from a crypto ID
     62  *
     63  * @v crypt	Cryptosystem ID
     64  * @ret crypto	Cryptosystem handler structure
     65  *
     66  * If support for @a crypt is not compiled in to gPXE, or if @a crypt
     67  * is NET80211_CRYPT_UNKNOWN, returns @c NULL.
     68  */
     69 static struct net80211_crypto *
     70 wpa_find_cryptosystem ( enum net80211_crypto_alg crypt )
     71 {
     72 	struct net80211_crypto *crypto;
     73 
     74 	for_each_table_entry ( crypto, NET80211_CRYPTOS ) {
     75 		if ( crypto->algorithm == crypt )
     76 			return crypto;
     77 	}
     78 
     79 	return NULL;
     80 }
     81 
     82 
     83 /**
     84  * Find WPA key integrity and encryption handler from key version field
     85  *
     86  * @v ver	Version bits of EAPOL-Key info field
     87  * @ret kie	Key integrity and encryption handler
     88  */
     89 struct wpa_kie * wpa_find_kie ( int version )
     90 {
     91 	struct wpa_kie *kie;
     92 
     93 	for_each_table_entry ( kie, WPA_KIES ) {
     94 		if ( kie->version == version )
     95 			return kie;
     96 	}
     97 
     98 	return NULL;
     99 }
    100 
    101 
    102 /**
    103  * Construct RSN or WPA information element
    104  *
    105  * @v dev	802.11 device
    106  * @ret ie_ret	RSN or WPA information element
    107  * @ret rc	Return status code
    108  *
    109  * This function allocates, fills, and returns a RSN or WPA
    110  * information element suitable for including in an association
    111  * request frame to the network identified by @c dev->associating.
    112  * If it is impossible to construct an information element consistent
    113  * with gPXE's capabilities that is compatible with that network, or
    114  * if none should be sent because that network's beacon included no
    115  * security information, returns an error indication and leaves
    116  * @a ie_ret unchanged.
    117  *
    118  * The returned IE will be of the same type (RSN or WPA) as was
    119  * included in the beacon for the network it is destined for.
    120  */
    121 int wpa_make_rsn_ie ( struct net80211_device *dev, union ieee80211_ie **ie_ret )
    122 {
    123 	u8 *rsn, *rsn_end;
    124 	int is_rsn;
    125 	u32 group_cipher;
    126 	enum net80211_crypto_alg gcrypt;
    127 	int ie_len;
    128 	u8 *iep;
    129 	struct ieee80211_ie_rsn *ie;
    130 	struct ieee80211_frame *hdr;
    131 	struct ieee80211_beacon *beacon;
    132 
    133 	if ( ! dev->associating ) {
    134 		DBG ( "WPA: Can't make RSN IE for a non-associating device\n" );
    135 		return -EINVAL;
    136 	}
    137 
    138 	hdr = dev->associating->beacon->data;
    139 	beacon = ( struct ieee80211_beacon * ) hdr->data;
    140 	rsn = sec80211_find_rsn ( beacon->info_element,
    141 				  dev->associating->beacon->tail, &is_rsn,
    142 				  &rsn_end );
    143 	if ( ! rsn ) {
    144 		DBG ( "WPA: Can't make RSN IE when we didn't get one\n" );
    145 		return -EINVAL;
    146 	}
    147 
    148 	rsn += 2;		/* skip version */
    149 	group_cipher = *( u32 * ) rsn;
    150 	gcrypt = sec80211_rsn_get_net80211_crypt ( group_cipher );
    151 
    152 	if ( ! wpa_find_cryptosystem ( gcrypt ) ||
    153 	     ! wpa_find_cryptosystem ( dev->associating->crypto ) ) {
    154 		DBG ( "WPA: No support for (GC:%d, PC:%d)\n",
    155 		      gcrypt, dev->associating->crypto );
    156 		return -ENOTSUP;
    157 	}
    158 
    159 	/* Everything looks good - make our IE. */
    160 
    161 	/* WPA IEs need 4 more bytes for the OUI+type */
    162 	ie_len = ieee80211_rsn_size ( 1, 1, 0, is_rsn ) + ( 4 * ! is_rsn );
    163 	iep = malloc ( ie_len );
    164 	if ( ! iep )
    165 		return -ENOMEM;
    166 
    167 	*ie_ret = ( union ieee80211_ie * ) iep;
    168 
    169 	/* Store ID and length bytes. */
    170 	*iep++ = ( is_rsn ? IEEE80211_IE_RSN : IEEE80211_IE_VENDOR );
    171 	*iep++ = ie_len - 2;
    172 
    173 	/* Store OUI+type for WPA IEs. */
    174 	if ( ! is_rsn ) {
    175 		*( u32 * ) iep = IEEE80211_WPA_OUI_VEN;
    176 		iep += 4;
    177 	}
    178 
    179 	/* If this is a WPA IE, the id and len bytes in the
    180 	   ieee80211_ie_rsn structure will not be valid, but by doing
    181 	   the cast we can fill all the other fields much more
    182 	   readily. */
    183 
    184 	ie = ( struct ieee80211_ie_rsn * ) ( iep - 2 );
    185 	ie->version = IEEE80211_RSN_VERSION;
    186 	ie->group_cipher = group_cipher;
    187 	ie->pairwise_count = 1;
    188 	ie->pairwise_cipher[0] =
    189 		sec80211_rsn_get_crypto_desc ( dev->associating->crypto,
    190 					       is_rsn );
    191 	ie->akm_count = 1;
    192 	ie->akm_list[0] =
    193 		sec80211_rsn_get_akm_desc ( dev->associating->handshaking,
    194 					    is_rsn );
    195 	if ( is_rsn ) {
    196 		ie->rsn_capab = 0;
    197 		ie->pmkid_count = 0;
    198 	}
    199 
    200 	return 0;
    201 }
    202 
    203 
    204 /**
    205  * Set up generic WPA support to handle 4-Way Handshake
    206  *
    207  * @v dev	802.11 device
    208  * @v ctx	WPA common context
    209  * @v pmk	Pairwise Master Key to use for session
    210  * @v pmk_len	Length of PMK, almost always 32
    211  * @ret rc	Return status code
    212  */
    213 int wpa_start ( struct net80211_device *dev, struct wpa_common_ctx *ctx,
    214 		const void *pmk, size_t pmk_len )
    215 {
    216 	struct io_buffer *iob;
    217 	struct ieee80211_frame *hdr;
    218 	struct ieee80211_beacon *beacon;
    219 	u8 *ap_rsn_ie = NULL, *ap_rsn_ie_end;
    220 
    221 	if ( ! dev->rsn_ie || ! dev->associating )
    222 		return -EINVAL;
    223 
    224 	ctx->dev = dev;
    225 	memcpy ( ctx->pmk, pmk, ctx->pmk_len = pmk_len );
    226 	ctx->state = WPA_READY;
    227 	ctx->replay = ~0ULL;
    228 
    229 	iob = dev->associating->beacon;
    230 	hdr = iob->data;
    231 	beacon = ( struct ieee80211_beacon * ) hdr->data;
    232 	ap_rsn_ie = sec80211_find_rsn ( beacon->info_element, iob->tail,
    233 					&ctx->ap_rsn_is_rsn, &ap_rsn_ie_end );
    234 	if ( ap_rsn_ie ) {
    235 		ctx->ap_rsn_ie = malloc ( ap_rsn_ie_end - ap_rsn_ie );
    236 		if ( ! ctx->ap_rsn_ie )
    237 			return -ENOMEM;
    238 		memcpy ( ctx->ap_rsn_ie, ap_rsn_ie, ap_rsn_ie_end - ap_rsn_ie );
    239 		ctx->ap_rsn_ie_len = ap_rsn_ie_end - ap_rsn_ie;
    240 	} else {
    241 		return -ENOENT;
    242 	}
    243 
    244 	ctx->crypt = dev->associating->crypto;
    245 	ctx->gcrypt = NET80211_CRYPT_UNKNOWN;
    246 
    247 	list_add_tail ( &ctx->list, &wpa_contexts );
    248 	return 0;
    249 }
    250 
    251 
    252 /**
    253  * Disable handling of received WPA handshake frames
    254  *
    255  * @v dev	802.11 device
    256  */
    257 void wpa_stop ( struct net80211_device *dev )
    258 {
    259 	struct wpa_common_ctx *ctx, *tmp;
    260 
    261 	list_for_each_entry_safe ( ctx, tmp, &wpa_contexts, list ) {
    262 		if ( ctx->dev == dev ) {
    263 			free ( ctx->ap_rsn_ie );
    264 			ctx->ap_rsn_ie = NULL;
    265 			list_del ( &ctx->list );
    266 		}
    267 	}
    268 }
    269 
    270 
    271 /**
    272  * Check PMKID consistency
    273  *
    274  * @v ctx	WPA common context
    275  * @v pmkid	PMKID to check against (16 bytes long)
    276  * @ret rc	Zero if they match, or a negative error code if not
    277  */
    278 int wpa_check_pmkid ( struct wpa_common_ctx *ctx, const u8 *pmkid )
    279 {
    280 	u8 sha1_ctx[SHA1_CTX_SIZE];
    281 	u8 my_pmkid[SHA1_SIZE];
    282 	u8 pmk[ctx->pmk_len];
    283 	size_t pmk_len;
    284 	struct {
    285 		char name[8];
    286 		u8 aa[ETH_ALEN];
    287 		u8 spa[ETH_ALEN];
    288 	} __attribute__ (( packed )) pmkid_data;
    289 
    290 	memcpy ( pmk, ctx->pmk, ctx->pmk_len );
    291 	pmk_len = ctx->pmk_len;
    292 
    293 	memcpy ( pmkid_data.name, "PMK Name", 8 );
    294 	memcpy ( pmkid_data.aa, ctx->dev->bssid, ETH_ALEN );
    295 	memcpy ( pmkid_data.spa, ctx->dev->netdev->ll_addr, ETH_ALEN );
    296 
    297 	hmac_init ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len );
    298 	hmac_update ( &sha1_algorithm, sha1_ctx, &pmkid_data,
    299 		      sizeof ( pmkid_data ) );
    300 	hmac_final ( &sha1_algorithm, sha1_ctx, pmk, &pmk_len, my_pmkid );
    301 
    302 	if ( memcmp ( my_pmkid, pmkid, WPA_PMKID_LEN ) != 0 )
    303 		return -EACCES;
    304 
    305 	return 0;
    306 }
    307 
    308 
    309 /**
    310  * Derive pairwise transient key
    311  *
    312  * @v ctx	WPA common context
    313  */
    314 static void wpa_derive_ptk ( struct wpa_common_ctx *ctx )
    315 {
    316 	struct {
    317 		u8 mac1[ETH_ALEN];
    318 		u8 mac2[ETH_ALEN];
    319 		u8 nonce1[WPA_NONCE_LEN];
    320 		u8 nonce2[WPA_NONCE_LEN];
    321 	} __attribute__ (( packed )) ptk_data;
    322 
    323 	/* The addresses and nonces are stored in numerical order (!) */
    324 
    325 	if ( memcmp ( ctx->dev->netdev->ll_addr, ctx->dev->bssid,
    326 		      ETH_ALEN ) < 0 ) {
    327 		memcpy ( ptk_data.mac1, ctx->dev->netdev->ll_addr, ETH_ALEN );
    328 		memcpy ( ptk_data.mac2, ctx->dev->bssid, ETH_ALEN );
    329 	} else {
    330 		memcpy ( ptk_data.mac1, ctx->dev->bssid, ETH_ALEN );
    331 		memcpy ( ptk_data.mac2, ctx->dev->netdev->ll_addr, ETH_ALEN );
    332 	}
    333 
    334 	if ( memcmp ( ctx->Anonce, ctx->Snonce, WPA_NONCE_LEN ) < 0 ) {
    335 		memcpy ( ptk_data.nonce1, ctx->Anonce, WPA_NONCE_LEN );
    336 		memcpy ( ptk_data.nonce2, ctx->Snonce, WPA_NONCE_LEN );
    337 	} else {
    338 		memcpy ( ptk_data.nonce1, ctx->Snonce, WPA_NONCE_LEN );
    339 		memcpy ( ptk_data.nonce2, ctx->Anonce, WPA_NONCE_LEN );
    340 	}
    341 
    342 	DBGC2 ( ctx, "WPA %p A1 %s, A2 %s\n", ctx, eth_ntoa ( ptk_data.mac1 ),
    343 	       eth_ntoa ( ptk_data.mac2 ) );
    344 	DBGC2 ( ctx, "WPA %p Nonce1, Nonce2:\n", ctx );
    345 	DBGC2_HD ( ctx, ptk_data.nonce1, WPA_NONCE_LEN );
    346 	DBGC2_HD ( ctx, ptk_data.nonce2, WPA_NONCE_LEN );
    347 
    348 	prf_sha1 ( ctx->pmk, ctx->pmk_len,
    349 		   "Pairwise key expansion",
    350 		   &ptk_data, sizeof ( ptk_data ),
    351 		   &ctx->ptk, sizeof ( ctx->ptk ) );
    352 
    353 	DBGC2 ( ctx, "WPA %p PTK:\n", ctx );
    354 	DBGC2_HD ( ctx, &ctx->ptk, sizeof ( ctx->ptk ) );
    355 }
    356 
    357 
    358 /**
    359  * Install pairwise transient key
    360  *
    361  * @v ctx	WPA common context
    362  * @v len	Key length (16 for CCMP, 32 for TKIP)
    363  * @ret rc	Return status code
    364  */
    365 static inline int wpa_install_ptk ( struct wpa_common_ctx *ctx, int len )
    366 {
    367 	DBGC ( ctx, "WPA %p: installing %d-byte pairwise transient key\n",
    368 	       ctx, len );
    369 	DBGC2_HD ( ctx, &ctx->ptk.tk, len );
    370 
    371 	return sec80211_install ( &ctx->dev->crypto, ctx->crypt,
    372 				  &ctx->ptk.tk, len, NULL );
    373 }
    374 
    375 /**
    376  * Install group transient key
    377  *
    378  * @v ctx	WPA common context
    379  * @v len	Key length (16 for CCMP, 32 for TKIP)
    380  * @v rsc	Receive sequence counter field in EAPOL-Key packet
    381  * @ret rc	Return status code
    382  */
    383 static inline int wpa_install_gtk ( struct wpa_common_ctx *ctx, int len,
    384 				    const void *rsc )
    385 {
    386 	DBGC ( ctx, "WPA %p: installing %d-byte group transient key\n",
    387 	       ctx, len );
    388 	DBGC2_HD ( ctx, &ctx->gtk.tk, len );
    389 
    390 	return sec80211_install ( &ctx->dev->gcrypto, ctx->gcrypt,
    391 				  &ctx->gtk.tk, len, rsc );
    392 }
    393 
    394 /**
    395  * Search for group transient key, and install it if found
    396  *
    397  * @v ctx	WPA common context
    398  * @v ie	Pointer to first IE in key data field
    399  * @v ie_end	Pointer to first byte not in key data field
    400  * @v rsc	Receive sequence counter field in EAPOL-Key packet
    401  * @ret rc	Return status code
    402  */
    403 static int wpa_maybe_install_gtk ( struct wpa_common_ctx *ctx,
    404 				   union ieee80211_ie *ie, void *ie_end,
    405 				   const void *rsc )
    406 {
    407 	struct wpa_kde *kde;
    408 
    409 	if ( ! ieee80211_ie_bound ( ie, ie_end ) )
    410 		return -ENOENT;
    411 
    412 	while ( ie ) {
    413 		if ( ie->id == IEEE80211_IE_VENDOR &&
    414 		     ie->vendor.oui == WPA_KDE_GTK )
    415 			break;
    416 
    417 		ie = ieee80211_next_ie ( ie, ie_end );
    418 	}
    419 
    420 	if ( ! ie )
    421 		return -ENOENT;
    422 
    423 	if ( ie->len - 6u > sizeof ( ctx->gtk.tk ) ) {
    424 		DBGC ( ctx, "WPA %p: GTK KDE is too long (%d bytes, max %d)\n",
    425 		       ctx, ie->len - 4, sizeof ( ctx->gtk.tk ) );
    426 		return -EINVAL;
    427 	}
    428 
    429 	/* XXX We ignore key ID for now. */
    430 	kde = ( struct wpa_kde * ) ie;
    431 	memcpy ( &ctx->gtk.tk, &kde->gtk_encap.gtk, kde->len - 6 );
    432 
    433 	return wpa_install_gtk ( ctx, kde->len - 6, rsc );
    434 }
    435 
    436 
    437 /**
    438  * Allocate I/O buffer for construction of outgoing EAPOL-Key frame
    439  *
    440  * @v kdlen	Maximum number of bytes in the Key Data field
    441  * @ret iob	Newly allocated I/O buffer
    442  *
    443  * The returned buffer will have space reserved for the link-layer and
    444  * EAPOL headers, and will have @c iob->tail pointing to the start of
    445  * the Key Data field. Thus, it is necessary to use iob_put() in
    446  * filling the Key Data.
    447  */
    448 static struct io_buffer * wpa_alloc_frame ( int kdlen )
    449 {
    450 	struct io_buffer *ret = alloc_iob ( sizeof ( struct eapol_key_pkt ) +
    451 					    kdlen + EAPOL_HDR_LEN +
    452 					    MAX_LL_HEADER_LEN );
    453 	if ( ! ret )
    454 		return NULL;
    455 
    456 	iob_reserve ( ret, MAX_LL_HEADER_LEN + EAPOL_HDR_LEN );
    457 	memset ( iob_put ( ret, sizeof ( struct eapol_key_pkt ) ), 0,
    458 		 sizeof ( struct eapol_key_pkt ) );
    459 
    460 	return ret;
    461 }
    462 
    463 
    464 /**
    465  * Send EAPOL-Key packet
    466  *
    467  * @v iob	I/O buffer, with sufficient headroom for headers
    468  * @v dev	802.11 device
    469  * @v kie	Key integrity and encryption handler
    470  * @v is_rsn	If TRUE, handshake uses new RSN format
    471  * @ret rc	Return status code
    472  *
    473  * If a KIE is specified, the MIC will be filled in before transmission.
    474  */
    475 static int wpa_send_eapol ( struct io_buffer *iob, struct wpa_common_ctx *ctx,
    476 			    struct wpa_kie *kie )
    477 {
    478 	struct eapol_key_pkt *pkt = iob->data;
    479 	struct eapol_frame *eapol = iob_push ( iob, EAPOL_HDR_LEN );
    480 
    481 	pkt->info = htons ( pkt->info );
    482 	pkt->keysize = htons ( pkt->keysize );
    483 	pkt->datalen = htons ( pkt->datalen );
    484 	pkt->replay = cpu_to_be64 ( pkt->replay );
    485 	eapol->version = EAPOL_THIS_VERSION;
    486 	eapol->type = EAPOL_TYPE_KEY;
    487 	eapol->length = htons ( iob->tail - iob->data - sizeof ( *eapol ) );
    488 
    489 	memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
    490 	if ( kie )
    491 		kie->mic ( &ctx->ptk.kck, eapol, EAPOL_HDR_LEN +
    492 			   sizeof ( *pkt ) + ntohs ( pkt->datalen ),
    493 			   pkt->mic );
    494 
    495 	return net_tx ( iob, ctx->dev->netdev, &eapol_protocol,
    496 			ctx->dev->bssid );
    497 }
    498 
    499 
    500 /**
    501  * Send second frame in 4-Way Handshake
    502  *
    503  * @v ctx	WPA common context
    504  * @v pkt	First frame, to which this is a reply
    505  * @v is_rsn	If TRUE, handshake uses new RSN format
    506  * @v kie	Key integrity and encryption handler
    507  * @ret rc	Return status code
    508  */
    509 static int wpa_send_2_of_4 ( struct wpa_common_ctx *ctx,
    510 			     struct eapol_key_pkt *pkt, int is_rsn,
    511 			     struct wpa_kie *kie )
    512 {
    513 	struct io_buffer *iob = wpa_alloc_frame ( ctx->dev->rsn_ie->len + 2 );
    514 	struct eapol_key_pkt *npkt;
    515 
    516 	if ( ! iob )
    517 		return -ENOMEM;
    518 
    519 	npkt = iob->data;
    520 	memcpy ( npkt, pkt, sizeof ( *pkt ) );
    521 	npkt->info &= ~EAPOL_KEY_INFO_KEY_ACK;
    522 	npkt->info |= EAPOL_KEY_INFO_KEY_MIC;
    523 	if ( is_rsn )
    524 		npkt->keysize = 0;
    525 	memcpy ( npkt->nonce, ctx->Snonce, sizeof ( npkt->nonce ) );
    526 	npkt->datalen = ctx->dev->rsn_ie->len + 2;
    527 	memcpy ( iob_put ( iob, npkt->datalen ), ctx->dev->rsn_ie,
    528 		 npkt->datalen );
    529 
    530 	DBGC ( ctx, "WPA %p: sending 2/4\n", ctx );
    531 
    532 	return wpa_send_eapol ( iob, ctx, kie );
    533 }
    534 
    535 
    536 /**
    537  * Handle receipt of first frame in 4-Way Handshake
    538  *
    539  * @v ctx	WPA common context
    540  * @v pkt	EAPOL-Key packet
    541  * @v is_rsn	If TRUE, frame uses new RSN format
    542  * @v kie	Key integrity and encryption handler
    543  * @ret rc	Return status code
    544  */
    545 static int wpa_handle_1_of_4 ( struct wpa_common_ctx *ctx,
    546 			       struct eapol_key_pkt *pkt, int is_rsn,
    547 			       struct wpa_kie *kie )
    548 {
    549 	int rc;
    550 
    551 	if ( ctx->state == WPA_WAITING )
    552 		return -EINVAL;
    553 
    554 	ctx->state = WPA_WORKING;
    555 	memcpy ( ctx->Anonce, pkt->nonce, sizeof ( ctx->Anonce ) );
    556 	if ( ! ctx->have_Snonce ) {
    557 		get_random_bytes ( ctx->Snonce, sizeof ( ctx->Snonce ) );
    558 		ctx->have_Snonce = 1;
    559 	}
    560 
    561 	if ( is_rsn && pkt->datalen ) {
    562 		union ieee80211_ie *ie = ( union ieee80211_ie * ) pkt->data;
    563 		void *ie_end = pkt->data + pkt->datalen;
    564 
    565 		if ( ! ieee80211_ie_bound ( ie, ie_end ) ) {
    566 			DBGC ( ctx, "WPA %p: malformed PMKID KDE\n", ctx );
    567 			return wpa_fail ( ctx, -EINVAL );
    568 		}
    569 
    570 		while ( ie ) {
    571 			if ( ie->id == IEEE80211_IE_VENDOR &&
    572 			     ie->vendor.oui == WPA_KDE_PMKID ) {
    573 				rc = wpa_check_pmkid ( ctx, ie->vendor.data );
    574 				if ( rc < 0 ) {
    575 					DBGC ( ctx, "WPA %p ALERT: PMKID "
    576 					       "mismatch in 1/4\n", ctx );
    577 					return wpa_fail ( ctx, rc );
    578 				}
    579 			}
    580 
    581 			ie = ieee80211_next_ie ( ie, ie_end );
    582 		}
    583 	}
    584 
    585 	DBGC ( ctx, "WPA %p: received 1/4, looks OK\n", ctx );
    586 
    587 	wpa_derive_ptk ( ctx );
    588 
    589 	return wpa_send_2_of_4 ( ctx, pkt, is_rsn, kie );
    590 }
    591 
    592 
    593 /**
    594  * Send fourth frame in 4-Way Handshake, or second in Group Key Handshake
    595  *
    596  * @v ctx	WPA common context
    597  * @v pkt	EAPOL-Key packet for frame to which we're replying
    598  * @v is_rsn	If TRUE, frame uses new RSN format
    599  * @v kie	Key integrity and encryption handler
    600  * @ret rc	Return status code
    601  */
    602 static int wpa_send_final ( struct wpa_common_ctx *ctx,
    603 			    struct eapol_key_pkt *pkt, int is_rsn,
    604 			    struct wpa_kie *kie )
    605 {
    606 	struct io_buffer *iob = wpa_alloc_frame ( 0 );
    607 	struct eapol_key_pkt *npkt;
    608 
    609 	if ( ! iob )
    610 		return -ENOMEM;
    611 
    612 	npkt = iob->data;
    613 	memcpy ( npkt, pkt, sizeof ( *pkt ) );
    614 	npkt->info &= ~( EAPOL_KEY_INFO_KEY_ACK | EAPOL_KEY_INFO_INSTALL |
    615 			 EAPOL_KEY_INFO_KEY_ENC );
    616 	if ( is_rsn )
    617 		npkt->keysize = 0;
    618 	memset ( npkt->nonce, 0, sizeof ( npkt->nonce ) );
    619 	memset ( npkt->iv, 0, sizeof ( npkt->iv ) );
    620 	npkt->datalen = 0;
    621 
    622 	if ( npkt->info & EAPOL_KEY_INFO_TYPE )
    623 		DBGC ( ctx, "WPA %p: sending 4/4\n", ctx );
    624 	else
    625 		DBGC ( ctx, "WPA %p: sending 2/2\n", ctx );
    626 
    627 	return wpa_send_eapol ( iob, ctx, kie );
    628 
    629 }
    630 
    631 
    632 /**
    633  * Handle receipt of third frame in 4-Way Handshake
    634  *
    635  * @v ctx	WPA common context
    636  * @v pkt	EAPOL-Key packet
    637  * @v is_rsn	If TRUE, frame uses new RSN format
    638  * @v kie	Key integrity and encryption handler
    639  * @ret rc	Return status code
    640  */
    641 static int wpa_handle_3_of_4 ( struct wpa_common_ctx *ctx,
    642 			       struct eapol_key_pkt *pkt, int is_rsn,
    643 			       struct wpa_kie *kie )
    644 {
    645 	int rc;
    646 	u8 *this_rsn, *this_rsn_end;
    647 	u8 *new_rsn, *new_rsn_end;
    648 	int this_is_rsn, new_is_rsn;
    649 
    650 	if ( ctx->state == WPA_WAITING )
    651 		return -EINVAL;
    652 
    653 	ctx->state = WPA_WORKING;
    654 
    655 	/* Check nonce */
    656 	if ( memcmp ( ctx->Anonce, pkt->nonce, WPA_NONCE_LEN ) != 0 ) {
    657 		DBGC ( ctx, "WPA %p ALERT: nonce mismatch in 3/4\n", ctx );
    658 		return wpa_fail ( ctx, -EACCES );
    659 	}
    660 
    661 	/* Check RSN IE */
    662 	this_rsn = sec80211_find_rsn ( ( union ieee80211_ie * ) pkt->data,
    663 				       pkt->data + pkt->datalen,
    664 				       &this_is_rsn, &this_rsn_end );
    665 	if ( this_rsn )
    666 		new_rsn = sec80211_find_rsn ( ( union ieee80211_ie * )
    667 					              this_rsn_end,
    668 					      pkt->data + pkt->datalen,
    669 					      &new_is_rsn, &new_rsn_end );
    670 	else
    671 		new_rsn = NULL;
    672 
    673 	if ( ! ctx->ap_rsn_ie || ! this_rsn ||
    674 	     ctx->ap_rsn_ie_len != ( this_rsn_end - this_rsn ) ||
    675 	     ctx->ap_rsn_is_rsn != this_is_rsn ||
    676 	     memcmp ( ctx->ap_rsn_ie, this_rsn, ctx->ap_rsn_ie_len ) != 0 ) {
    677 		DBGC ( ctx, "WPA %p ALERT: RSN mismatch in 3/4\n", ctx );
    678 		DBGC2 ( ctx, "WPA %p RSNs (in 3/4, in beacon):\n", ctx );
    679 		DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
    680 		DBGC2_HD ( ctx, ctx->ap_rsn_ie, ctx->ap_rsn_ie_len );
    681 		return wpa_fail ( ctx, -EACCES );
    682 	}
    683 
    684 	/* Don't switch if they just supplied both styles of IE
    685 	   simultaneously; we need two RSN IEs or two WPA IEs to
    686 	   switch ciphers. They'll be immediately consecutive because
    687 	   of ordering guarantees. */
    688 	if ( new_rsn && this_is_rsn == new_is_rsn ) {
    689 		struct net80211_wlan *assoc = ctx->dev->associating;
    690 		DBGC ( ctx, "WPA %p: accommodating bait-and-switch tactics\n",
    691 		       ctx );
    692 		DBGC2 ( ctx, "WPA %p RSNs (in 3/4+beacon, new in 3/4):\n",
    693 			ctx );
    694 		DBGC2_HD ( ctx, this_rsn, this_rsn_end - this_rsn );
    695 		DBGC2_HD ( ctx, new_rsn, new_rsn_end - new_rsn );
    696 
    697 		if ( ( rc = sec80211_detect_ie ( new_is_rsn, new_rsn,
    698 						 new_rsn_end,
    699 						 &assoc->handshaking,
    700 						 &assoc->crypto ) ) != 0 )
    701 			DBGC ( ctx, "WPA %p: bait-and-switch invalid, staying "
    702 			       "with original request\n", ctx );
    703 	} else {
    704 		new_rsn = this_rsn;
    705 		new_is_rsn = this_is_rsn;
    706 		new_rsn_end = this_rsn_end;
    707 	}
    708 
    709 	/* Grab group cryptosystem ID */
    710 	ctx->gcrypt = sec80211_rsn_get_net80211_crypt ( *( u32 * )
    711 							( new_rsn + 2 ) );
    712 
    713 	/* Check for a GTK, if info field is encrypted */
    714 	if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
    715 		rc = wpa_maybe_install_gtk ( ctx,
    716 					     ( union ieee80211_ie * ) pkt->data,
    717 					     pkt->data + pkt->datalen,
    718 					     pkt->rsc );
    719 		if ( rc < 0 ) {
    720 			DBGC ( ctx, "WPA %p did not install GTK in 3/4: %s\n",
    721 			       ctx, strerror ( rc ) );
    722 			if ( rc != -ENOENT )
    723 				return wpa_fail ( ctx, rc );
    724 		}
    725 	}
    726 
    727 	DBGC ( ctx, "WPA %p: received 3/4, looks OK\n", ctx );
    728 
    729 	/* Send final message */
    730 	rc = wpa_send_final ( ctx, pkt, is_rsn, kie );
    731 	if ( rc < 0 )
    732 		return wpa_fail ( ctx, rc );
    733 
    734 	/* Install PTK */
    735 	rc = wpa_install_ptk ( ctx, pkt->keysize );
    736 	if ( rc < 0 ) {
    737 		DBGC ( ctx, "WPA %p failed to install PTK: %s\n", ctx,
    738 		       strerror ( rc ) );
    739 		return wpa_fail ( ctx, rc );
    740 	}
    741 
    742 	/* Mark us as needing a new Snonce if we rekey */
    743 	ctx->have_Snonce = 0;
    744 
    745 	/* Done! */
    746 	ctx->state = WPA_SUCCESS;
    747 	return 0;
    748 }
    749 
    750 
    751 /**
    752  * Handle receipt of first frame in Group Key Handshake
    753  *
    754  * @v ctx	WPA common context
    755  * @v pkt	EAPOL-Key packet
    756  * @v is_rsn	If TRUE, frame uses new RSN format
    757  * @v kie	Key integrity and encryption handler
    758  * @ret rc	Return status code
    759  */
    760 static int wpa_handle_1_of_2 ( struct wpa_common_ctx *ctx,
    761 			       struct eapol_key_pkt *pkt, int is_rsn,
    762 			       struct wpa_kie *kie )
    763 {
    764 	int rc;
    765 
    766 	/*
    767 	 * WPA and RSN do this completely differently.
    768 	 *
    769 	 * The idea of encoding the GTK (or PMKID, or various other
    770 	 * things) into a KDE that looks like an information element
    771 	 * is an RSN innovation; old WPA code never encapsulates
    772 	 * things like that. If it looks like an info element, it
    773 	 * really is (for the WPA IE check in frames 2/4 and 3/4). The
    774 	 * "key data encrypted" bit in the info field is also specific
    775 	 * to RSN.
    776 	 *
    777 	 * So from an old WPA host, 3/4 does not contain an
    778 	 * encapsulated GTK. The first frame of the GK handshake
    779 	 * contains it, encrypted, but without a KDE wrapper, and with
    780 	 * the key ID field (which gPXE doesn't use) shoved away in
    781 	 * the reserved bits in the info field, and the TxRx bit
    782 	 * stealing the Install bit's spot.
    783 	 */
    784 
    785 	if ( is_rsn && ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) ) {
    786 		rc = wpa_maybe_install_gtk ( ctx,
    787 					     ( union ieee80211_ie * ) pkt->data,
    788 					     pkt->data + pkt->datalen,
    789 					     pkt->rsc );
    790 		if ( rc < 0 ) {
    791 			DBGC ( ctx, "WPA %p: failed to install GTK in 1/2: "
    792 			       "%s\n", ctx, strerror ( rc ) );
    793 			return wpa_fail ( ctx, rc );
    794 		}
    795 	} else {
    796 		rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
    797 				    &pkt->datalen );
    798 		if ( rc < 0 ) {
    799 			DBGC ( ctx, "WPA %p: failed to decrypt GTK: %s\n",
    800 			       ctx, strerror ( rc ) );
    801 			return rc; /* non-fatal */
    802 		}
    803 		if ( pkt->datalen > sizeof ( ctx->gtk.tk ) ) {
    804 			DBGC ( ctx, "WPA %p: too much GTK data (%d > %d)\n",
    805 			       ctx, pkt->datalen, sizeof ( ctx->gtk.tk ) );
    806 			return wpa_fail ( ctx, -EINVAL );
    807 		}
    808 
    809 		memcpy ( &ctx->gtk.tk, pkt->data, pkt->datalen );
    810 		wpa_install_gtk ( ctx, pkt->datalen, pkt->rsc );
    811 	}
    812 
    813 	DBGC ( ctx, "WPA %p: received 1/2, looks OK\n", ctx );
    814 
    815 	return wpa_send_final ( ctx, pkt, is_rsn, kie );
    816 }
    817 
    818 
    819 /**
    820  * Handle receipt of EAPOL-Key frame for WPA
    821  *
    822  * @v iob	I/O buffer
    823  * @v netdev	Network device
    824  * @v ll_source	Source link-layer address
    825  */
    826 static int eapol_key_rx ( struct io_buffer *iob, struct net_device *netdev,
    827 			  const void *ll_source )
    828 {
    829 	struct net80211_device *dev = net80211_get ( netdev );
    830 	struct eapol_key_pkt *pkt = iob->data;
    831 	int is_rsn, found_ctx;
    832 	struct wpa_common_ctx *ctx;
    833 	int rc = 0;
    834 	struct wpa_kie *kie;
    835 	u8 their_mic[16], our_mic[16];
    836 
    837 	if ( pkt->type != EAPOL_KEY_TYPE_WPA &&
    838 	     pkt->type != EAPOL_KEY_TYPE_RSN ) {
    839 		DBG ( "EAPOL-Key: packet not of 802.11 type\n" );
    840 		rc = -EINVAL;
    841 		goto drop;
    842 	}
    843 
    844 	is_rsn = ( pkt->type == EAPOL_KEY_TYPE_RSN );
    845 
    846 	if ( ! dev ) {
    847 		DBG ( "EAPOL-Key: packet not from 802.11\n" );
    848 		rc = -EINVAL;
    849 		goto drop;
    850 	}
    851 
    852 	if ( memcmp ( dev->bssid, ll_source, ETH_ALEN ) != 0 ) {
    853 		DBG ( "EAPOL-Key: packet not from associated AP\n" );
    854 		rc = -EINVAL;
    855 		goto drop;
    856 	}
    857 
    858 	if ( ! ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_ACK ) ) {
    859 		DBG ( "EAPOL-Key: packet sent in wrong direction\n" );
    860 		rc = -EINVAL;
    861 		goto drop;
    862 	}
    863 
    864 	found_ctx = 0;
    865 	list_for_each_entry ( ctx, &wpa_contexts, list ) {
    866 		if ( ctx->dev == dev ) {
    867 			found_ctx = 1;
    868 			break;
    869 		}
    870 	}
    871 
    872 	if ( ! found_ctx ) {
    873 		DBG ( "EAPOL-Key: no WPA context to handle packet for %p\n",
    874 		      dev );
    875 		rc = -ENOENT;
    876 		goto drop;
    877 	}
    878 
    879 	if ( ( void * ) ( pkt + 1 ) + ntohs ( pkt->datalen ) > iob->tail ) {
    880 		DBGC ( ctx, "WPA %p: packet truncated (has %d extra bytes, "
    881 		       "states %d)\n", ctx, iob->tail - ( void * ) ( pkt + 1 ),
    882 		       ntohs ( pkt->datalen ) );
    883 		rc = -EINVAL;
    884 		goto drop;
    885 	}
    886 
    887 	/* Get a handle on key integrity/encryption handler */
    888 	kie = wpa_find_kie ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
    889 	if ( ! kie ) {
    890 		DBGC ( ctx, "WPA %p: no support for packet version %d\n", ctx,
    891 		       ntohs ( pkt->info ) & EAPOL_KEY_INFO_VERSION );
    892 		rc = wpa_fail ( ctx, -ENOTSUP );
    893 		goto drop;
    894 	}
    895 
    896 	/* Check MIC */
    897 	if ( ntohs ( pkt->info ) & EAPOL_KEY_INFO_KEY_MIC ) {
    898 		memcpy ( their_mic, pkt->mic, sizeof ( pkt->mic ) );
    899 		memset ( pkt->mic, 0, sizeof ( pkt->mic ) );
    900 		kie->mic ( &ctx->ptk.kck, ( void * ) pkt - EAPOL_HDR_LEN,
    901 			   EAPOL_HDR_LEN + sizeof ( *pkt ) +
    902 			   ntohs ( pkt->datalen ), our_mic );
    903 		DBGC2 ( ctx, "WPA %p MIC comparison (theirs, ours):\n", ctx );
    904 		DBGC2_HD ( ctx, their_mic, 16 );
    905 		DBGC2_HD ( ctx, our_mic, 16 );
    906 		if ( memcmp ( their_mic, our_mic, sizeof ( pkt->mic ) ) != 0 ) {
    907 			DBGC ( ctx, "WPA %p: EAPOL MIC failure\n", ctx );
    908 			goto drop;
    909 		}
    910 	}
    911 
    912 	/* Fix byte order to local */
    913 	pkt->info = ntohs ( pkt->info );
    914 	pkt->keysize = ntohs ( pkt->keysize );
    915 	pkt->datalen = ntohs ( pkt->datalen );
    916 	pkt->replay = be64_to_cpu ( pkt->replay );
    917 
    918 	/* Check replay counter */
    919 	if ( ctx->replay != ~0ULL && ctx->replay >= pkt->replay ) {
    920 		DBGC ( ctx, "WPA %p ALERT: Replay detected! "
    921 		       "(%08x:%08x >= %08x:%08x)\n", ctx,
    922 		       ( u32 ) ( ctx->replay >> 32 ), ( u32 ) ctx->replay,
    923 		       ( u32 ) ( pkt->replay >> 32 ), ( u32 ) pkt->replay );
    924 		rc = 0;		/* ignore without error */
    925 		goto drop;
    926 	}
    927 	ctx->replay = pkt->replay;
    928 
    929 	/* Decrypt key data */
    930 	if ( pkt->info & EAPOL_KEY_INFO_KEY_ENC ) {
    931 		rc = kie->decrypt ( &ctx->ptk.kek, pkt->iv, pkt->data,
    932 				    &pkt->datalen );
    933 		if ( rc < 0 ) {
    934 			DBGC ( ctx, "WPA %p: failed to decrypt packet: %s\n",
    935 			       ctx, strerror ( rc ) );
    936 			goto drop;
    937 		}
    938 	}
    939 
    940 	/* Hand it off to appropriate handler */
    941 	switch ( pkt->info & ( EAPOL_KEY_INFO_TYPE |
    942 			       EAPOL_KEY_INFO_KEY_MIC ) ) {
    943 	case EAPOL_KEY_TYPE_PTK:
    944 		rc = wpa_handle_1_of_4 ( ctx, pkt, is_rsn, kie );
    945 		break;
    946 
    947 	case EAPOL_KEY_TYPE_PTK | EAPOL_KEY_INFO_KEY_MIC:
    948 		rc = wpa_handle_3_of_4 ( ctx, pkt, is_rsn, kie );
    949 		break;
    950 
    951 	case EAPOL_KEY_TYPE_GTK | EAPOL_KEY_INFO_KEY_MIC:
    952 		rc = wpa_handle_1_of_2 ( ctx, pkt, is_rsn, kie );
    953 		break;
    954 
    955 	default:
    956 		DBGC ( ctx, "WPA %p: Invalid combination of key flags %04x\n",
    957 		       ctx, pkt->info );
    958 		rc = -EINVAL;
    959 		break;
    960 	}
    961 
    962  drop:
    963 	free_iob ( iob );
    964 	return rc;
    965 }
    966 
    967 struct eapol_handler eapol_key_handler __eapol_handler = {
    968 	.type = EAPOL_TYPE_KEY,
    969 	.rx = eapol_key_rx,
    970 };
    971 
    972 /* WPA always needs EAPOL in order to be useful */
    973 REQUIRE_OBJECT ( eapol );
    974