1 1.1 christos /* 2 1.1 christos * IEEE 802.1X-2010 KaY Interface 3 1.1 christos * Copyright (c) 2013-2014, Qualcomm Atheros, Inc. 4 1.1 christos * 5 1.1 christos * This software may be distributed under the terms of the BSD license. 6 1.1 christos * See README for more details. 7 1.1 christos */ 8 1.1.1.3 christos 9 1.1 christos #include "utils/includes.h" 10 1.1 christos 11 1.1 christos #include "utils/common.h" 12 1.1 christos #include "eap_peer/eap.h" 13 1.1 christos #include "eap_peer/eap_i.h" 14 1.1 christos #include "eapol_supp/eapol_supp_sm.h" 15 1.1 christos #include "pae/ieee802_1x_key.h" 16 1.1 christos #include "pae/ieee802_1x_kay.h" 17 1.1 christos #include "wpa_supplicant_i.h" 18 1.1 christos #include "config.h" 19 1.1 christos #include "config_ssid.h" 20 1.1 christos #include "driver_i.h" 21 1.1 christos #include "wpas_kay.h" 22 1.1 christos 23 1.1 christos 24 1.1 christos #define DEFAULT_KEY_LEN 16 25 1.1 christos /* secure Connectivity Association Key Name (CKN) */ 26 1.1 christos #define DEFAULT_CKN_LEN 16 27 1.1 christos 28 1.1 christos 29 1.1 christos static int wpas_macsec_init(void *priv, struct macsec_init_params *params) 30 1.1 christos { 31 1.1 christos return wpa_drv_macsec_init(priv, params); 32 1.1 christos } 33 1.1 christos 34 1.1 christos 35 1.1 christos static int wpas_macsec_deinit(void *priv) 36 1.1 christos { 37 1.1 christos return wpa_drv_macsec_deinit(priv); 38 1.1 christos } 39 1.1 christos 40 1.1 christos 41 1.1.1.3 christos static int wpas_macsec_get_capability(void *priv, enum macsec_cap *cap) 42 1.1.1.3 christos { 43 1.1.1.3 christos return wpa_drv_macsec_get_capability(priv, cap); 44 1.1.1.3 christos } 45 1.1.1.3 christos 46 1.1.1.3 christos 47 1.1.1.5 christos static int wpas_enable_protect_frames(void *wpa_s, bool enabled) 48 1.1 christos { 49 1.1 christos return wpa_drv_enable_protect_frames(wpa_s, enabled); 50 1.1 christos } 51 1.1 christos 52 1.1 christos 53 1.1.1.5 christos static int wpas_enable_encrypt(void *wpa_s, bool enabled) 54 1.1.1.3 christos { 55 1.1.1.3 christos return wpa_drv_enable_encrypt(wpa_s, enabled); 56 1.1.1.3 christos } 57 1.1.1.3 christos 58 1.1.1.3 christos 59 1.1.1.5 christos static int wpas_set_replay_protect(void *wpa_s, bool enabled, u32 window) 60 1.1 christos { 61 1.1 christos return wpa_drv_set_replay_protect(wpa_s, enabled, window); 62 1.1 christos } 63 1.1 christos 64 1.1 christos 65 1.1.1.2 christos static int wpas_set_current_cipher_suite(void *wpa_s, u64 cs) 66 1.1 christos { 67 1.1.1.2 christos return wpa_drv_set_current_cipher_suite(wpa_s, cs); 68 1.1 christos } 69 1.1 christos 70 1.1 christos 71 1.1.1.5 christos static int wpas_enable_controlled_port(void *wpa_s, bool enabled) 72 1.1 christos { 73 1.1 christos return wpa_drv_enable_controlled_port(wpa_s, enabled); 74 1.1 christos } 75 1.1 christos 76 1.1 christos 77 1.1.1.3 christos static int wpas_get_receive_lowest_pn(void *wpa_s, struct receive_sa *sa) 78 1.1 christos { 79 1.1.1.3 christos return wpa_drv_get_receive_lowest_pn(wpa_s, sa); 80 1.1 christos } 81 1.1 christos 82 1.1 christos 83 1.1.1.3 christos static int wpas_get_transmit_next_pn(void *wpa_s, struct transmit_sa *sa) 84 1.1 christos { 85 1.1.1.3 christos return wpa_drv_get_transmit_next_pn(wpa_s, sa); 86 1.1 christos } 87 1.1 christos 88 1.1 christos 89 1.1.1.3 christos static int wpas_set_transmit_next_pn(void *wpa_s, struct transmit_sa *sa) 90 1.1 christos { 91 1.1.1.3 christos return wpa_drv_set_transmit_next_pn(wpa_s, sa); 92 1.1 christos } 93 1.1 christos 94 1.1 christos 95 1.1.1.4 christos static int wpas_set_receive_lowest_pn(void *wpa_s, struct receive_sa *sa) 96 1.1.1.4 christos { 97 1.1.1.4 christos return wpa_drv_set_receive_lowest_pn(wpa_s, sa); 98 1.1.1.4 christos } 99 1.1.1.4 christos 100 1.1.1.4 christos 101 1.1.1.5 christos static int wpas_set_offload(void *wpa_s, u8 offload) 102 1.1.1.5 christos { 103 1.1.1.5 christos return wpa_drv_set_offload(wpa_s, offload); 104 1.1.1.5 christos } 105 1.1.1.5 christos 106 1.1.1.5 christos 107 1.1 christos static unsigned int conf_offset_val(enum confidentiality_offset co) 108 1.1 christos { 109 1.1 christos switch (co) { 110 1.1 christos case CONFIDENTIALITY_OFFSET_30: 111 1.1 christos return 30; 112 1.1 christos case CONFIDENTIALITY_OFFSET_50: 113 1.1 christos return 50; 114 1.1 christos default: 115 1.1 christos return 0; 116 1.1 christos } 117 1.1 christos } 118 1.1 christos 119 1.1 christos 120 1.1.1.3 christos static int wpas_create_receive_sc(void *wpa_s, struct receive_sc *sc, 121 1.1 christos enum validate_frames vf, 122 1.1 christos enum confidentiality_offset co) 123 1.1 christos { 124 1.1.1.3 christos return wpa_drv_create_receive_sc(wpa_s, sc, conf_offset_val(co), vf); 125 1.1 christos } 126 1.1 christos 127 1.1 christos 128 1.1.1.3 christos static int wpas_delete_receive_sc(void *wpa_s, struct receive_sc *sc) 129 1.1 christos { 130 1.1.1.3 christos return wpa_drv_delete_receive_sc(wpa_s, sc); 131 1.1 christos } 132 1.1 christos 133 1.1 christos 134 1.1.1.3 christos static int wpas_create_receive_sa(void *wpa_s, struct receive_sa *sa) 135 1.1 christos { 136 1.1.1.3 christos return wpa_drv_create_receive_sa(wpa_s, sa); 137 1.1 christos } 138 1.1 christos 139 1.1 christos 140 1.1.1.3 christos static int wpas_delete_receive_sa(void *wpa_s, struct receive_sa *sa) 141 1.1 christos { 142 1.1.1.3 christos return wpa_drv_delete_receive_sa(wpa_s, sa); 143 1.1 christos } 144 1.1 christos 145 1.1 christos 146 1.1.1.3 christos static int wpas_enable_receive_sa(void *wpa_s, struct receive_sa *sa) 147 1.1 christos { 148 1.1.1.3 christos return wpa_drv_enable_receive_sa(wpa_s, sa); 149 1.1 christos } 150 1.1 christos 151 1.1 christos 152 1.1.1.3 christos static int wpas_disable_receive_sa(void *wpa_s, struct receive_sa *sa) 153 1.1 christos { 154 1.1.1.3 christos return wpa_drv_disable_receive_sa(wpa_s, sa); 155 1.1 christos } 156 1.1 christos 157 1.1 christos 158 1.1 christos static int 159 1.1.1.3 christos wpas_create_transmit_sc(void *wpa_s, struct transmit_sc *sc, 160 1.1 christos enum confidentiality_offset co) 161 1.1 christos { 162 1.1.1.3 christos return wpa_drv_create_transmit_sc(wpa_s, sc, conf_offset_val(co)); 163 1.1.1.3 christos } 164 1.1.1.3 christos 165 1.1.1.3 christos 166 1.1.1.3 christos static int wpas_delete_transmit_sc(void *wpa_s, struct transmit_sc *sc) 167 1.1.1.3 christos { 168 1.1.1.3 christos return wpa_drv_delete_transmit_sc(wpa_s, sc); 169 1.1 christos } 170 1.1 christos 171 1.1 christos 172 1.1.1.3 christos static int wpas_create_transmit_sa(void *wpa_s, struct transmit_sa *sa) 173 1.1 christos { 174 1.1.1.3 christos return wpa_drv_create_transmit_sa(wpa_s, sa); 175 1.1 christos } 176 1.1 christos 177 1.1 christos 178 1.1.1.3 christos static int wpas_delete_transmit_sa(void *wpa_s, struct transmit_sa *sa) 179 1.1 christos { 180 1.1.1.3 christos return wpa_drv_delete_transmit_sa(wpa_s, sa); 181 1.1 christos } 182 1.1 christos 183 1.1 christos 184 1.1.1.3 christos static int wpas_enable_transmit_sa(void *wpa_s, struct transmit_sa *sa) 185 1.1 christos { 186 1.1.1.3 christos return wpa_drv_enable_transmit_sa(wpa_s, sa); 187 1.1 christos } 188 1.1 christos 189 1.1 christos 190 1.1.1.3 christos static int wpas_disable_transmit_sa(void *wpa_s, struct transmit_sa *sa) 191 1.1 christos { 192 1.1.1.3 christos return wpa_drv_disable_transmit_sa(wpa_s, sa); 193 1.1 christos } 194 1.1 christos 195 1.1 christos 196 1.1 christos int ieee802_1x_alloc_kay_sm(struct wpa_supplicant *wpa_s, struct wpa_ssid *ssid) 197 1.1 christos { 198 1.1 christos struct ieee802_1x_kay_ctx *kay_ctx; 199 1.1 christos struct ieee802_1x_kay *res = NULL; 200 1.1 christos enum macsec_policy policy; 201 1.1 christos 202 1.1 christos ieee802_1x_dealloc_kay_sm(wpa_s); 203 1.1 christos 204 1.1 christos if (!ssid || ssid->macsec_policy == 0) 205 1.1 christos return 0; 206 1.1 christos 207 1.1.1.3 christos if (ssid->macsec_policy == 1) { 208 1.1.1.3 christos if (ssid->macsec_integ_only == 1) 209 1.1.1.3 christos policy = SHOULD_SECURE; 210 1.1.1.3 christos else 211 1.1.1.3 christos policy = SHOULD_ENCRYPT; 212 1.1.1.3 christos } else { 213 1.1.1.3 christos policy = DO_NOT_SECURE; 214 1.1.1.3 christos } 215 1.1 christos 216 1.1 christos kay_ctx = os_zalloc(sizeof(*kay_ctx)); 217 1.1 christos if (!kay_ctx) 218 1.1 christos return -1; 219 1.1 christos 220 1.1 christos kay_ctx->ctx = wpa_s; 221 1.1 christos 222 1.1 christos kay_ctx->macsec_init = wpas_macsec_init; 223 1.1 christos kay_ctx->macsec_deinit = wpas_macsec_deinit; 224 1.1.1.3 christos kay_ctx->macsec_get_capability = wpas_macsec_get_capability; 225 1.1 christos kay_ctx->enable_protect_frames = wpas_enable_protect_frames; 226 1.1.1.3 christos kay_ctx->enable_encrypt = wpas_enable_encrypt; 227 1.1 christos kay_ctx->set_replay_protect = wpas_set_replay_protect; 228 1.1.1.5 christos kay_ctx->set_offload = wpas_set_offload; 229 1.1 christos kay_ctx->set_current_cipher_suite = wpas_set_current_cipher_suite; 230 1.1 christos kay_ctx->enable_controlled_port = wpas_enable_controlled_port; 231 1.1 christos kay_ctx->get_receive_lowest_pn = wpas_get_receive_lowest_pn; 232 1.1 christos kay_ctx->get_transmit_next_pn = wpas_get_transmit_next_pn; 233 1.1 christos kay_ctx->set_transmit_next_pn = wpas_set_transmit_next_pn; 234 1.1.1.4 christos kay_ctx->set_receive_lowest_pn = wpas_set_receive_lowest_pn; 235 1.1 christos kay_ctx->create_receive_sc = wpas_create_receive_sc; 236 1.1 christos kay_ctx->delete_receive_sc = wpas_delete_receive_sc; 237 1.1 christos kay_ctx->create_receive_sa = wpas_create_receive_sa; 238 1.1.1.3 christos kay_ctx->delete_receive_sa = wpas_delete_receive_sa; 239 1.1 christos kay_ctx->enable_receive_sa = wpas_enable_receive_sa; 240 1.1 christos kay_ctx->disable_receive_sa = wpas_disable_receive_sa; 241 1.1 christos kay_ctx->create_transmit_sc = wpas_create_transmit_sc; 242 1.1 christos kay_ctx->delete_transmit_sc = wpas_delete_transmit_sc; 243 1.1 christos kay_ctx->create_transmit_sa = wpas_create_transmit_sa; 244 1.1.1.3 christos kay_ctx->delete_transmit_sa = wpas_delete_transmit_sa; 245 1.1 christos kay_ctx->enable_transmit_sa = wpas_enable_transmit_sa; 246 1.1 christos kay_ctx->disable_transmit_sa = wpas_disable_transmit_sa; 247 1.1 christos 248 1.1.1.4 christos res = ieee802_1x_kay_init(kay_ctx, policy, ssid->macsec_replay_protect, 249 1.1.1.5 christos ssid->macsec_replay_window, 250 1.1.1.5 christos ssid->macsec_offload, ssid->macsec_port, 251 1.1.1.5 christos ssid->mka_priority, ssid->macsec_csindex, 252 1.1.1.5 christos wpa_s->ifname, wpa_s->own_addr); 253 1.1.1.3 christos /* ieee802_1x_kay_init() frees kay_ctx on failure */ 254 1.1.1.3 christos if (res == NULL) 255 1.1 christos return -1; 256 1.1 christos 257 1.1 christos wpa_s->kay = res; 258 1.1 christos 259 1.1 christos return 0; 260 1.1 christos } 261 1.1 christos 262 1.1 christos 263 1.1 christos void ieee802_1x_dealloc_kay_sm(struct wpa_supplicant *wpa_s) 264 1.1 christos { 265 1.1 christos if (!wpa_s->kay) 266 1.1 christos return; 267 1.1 christos 268 1.1 christos ieee802_1x_kay_deinit(wpa_s->kay); 269 1.1 christos wpa_s->kay = NULL; 270 1.1 christos } 271 1.1 christos 272 1.1 christos 273 1.1 christos static int ieee802_1x_auth_get_msk(struct wpa_supplicant *wpa_s, const u8 *addr, 274 1.1 christos u8 *msk, size_t *len) 275 1.1 christos { 276 1.1 christos u8 key[EAP_MSK_LEN]; 277 1.1 christos size_t keylen; 278 1.1 christos struct eapol_sm *sm; 279 1.1 christos int res; 280 1.1 christos 281 1.1 christos sm = wpa_s->eapol; 282 1.1 christos if (sm == NULL) 283 1.1 christos return -1; 284 1.1 christos 285 1.1 christos keylen = EAP_MSK_LEN; 286 1.1 christos res = eapol_sm_get_key(sm, key, keylen); 287 1.1 christos if (res) { 288 1.1 christos wpa_printf(MSG_DEBUG, 289 1.1 christos "Failed to get MSK from EAPOL state machines"); 290 1.1 christos return -1; 291 1.1 christos } 292 1.1 christos 293 1.1 christos if (keylen > *len) 294 1.1 christos keylen = *len; 295 1.1 christos os_memcpy(msk, key, keylen); 296 1.1 christos *len = keylen; 297 1.1 christos 298 1.1 christos return 0; 299 1.1 christos } 300 1.1 christos 301 1.1 christos 302 1.1 christos void * ieee802_1x_notify_create_actor(struct wpa_supplicant *wpa_s, 303 1.1 christos const u8 *peer_addr) 304 1.1 christos { 305 1.1.1.5 christos const u8 *sid; 306 1.1.1.5 christos size_t sid_len; 307 1.1 christos struct mka_key_name *ckn; 308 1.1 christos struct mka_key *cak; 309 1.1 christos struct mka_key *msk; 310 1.1 christos void *res = NULL; 311 1.1 christos 312 1.1 christos if (!wpa_s->kay || wpa_s->kay->policy == DO_NOT_SECURE) 313 1.1 christos return NULL; 314 1.1 christos 315 1.1 christos wpa_printf(MSG_DEBUG, 316 1.1 christos "IEEE 802.1X: External notification - Create MKA for " 317 1.1 christos MACSTR, MAC2STR(peer_addr)); 318 1.1 christos 319 1.1 christos msk = os_zalloc(sizeof(*msk)); 320 1.1 christos ckn = os_zalloc(sizeof(*ckn)); 321 1.1 christos cak = os_zalloc(sizeof(*cak)); 322 1.1.1.5 christos if (!msk || !ckn || !cak) 323 1.1 christos goto fail; 324 1.1 christos 325 1.1 christos msk->len = DEFAULT_KEY_LEN; 326 1.1 christos if (ieee802_1x_auth_get_msk(wpa_s, wpa_s->bssid, msk->key, &msk->len)) { 327 1.1 christos wpa_printf(MSG_ERROR, "IEEE 802.1X: Could not get MSK"); 328 1.1 christos goto fail; 329 1.1 christos } 330 1.1 christos 331 1.1.1.5 christos sid = eapol_sm_get_session_id(wpa_s->eapol, &sid_len); 332 1.1.1.5 christos if (!sid) { 333 1.1 christos wpa_printf(MSG_ERROR, 334 1.1 christos "IEEE 802.1X: Could not get EAP Session Id"); 335 1.1 christos goto fail; 336 1.1 christos } 337 1.1 christos 338 1.1 christos /* Derive CAK from MSK */ 339 1.1 christos cak->len = DEFAULT_KEY_LEN; 340 1.1.1.4 christos if (ieee802_1x_cak_aes_cmac(msk->key, msk->len, wpa_s->own_addr, 341 1.1.1.4 christos peer_addr, cak->key, cak->len)) { 342 1.1 christos wpa_printf(MSG_ERROR, 343 1.1 christos "IEEE 802.1X: Deriving CAK failed"); 344 1.1 christos goto fail; 345 1.1 christos } 346 1.1 christos wpa_hexdump_key(MSG_DEBUG, "Derived CAK", cak->key, cak->len); 347 1.1 christos 348 1.1 christos /* Derive CKN from MSK */ 349 1.1 christos ckn->len = DEFAULT_CKN_LEN; 350 1.1.1.4 christos if (ieee802_1x_ckn_aes_cmac(msk->key, msk->len, wpa_s->own_addr, 351 1.1.1.4 christos peer_addr, sid, sid_len, ckn->name)) { 352 1.1 christos wpa_printf(MSG_ERROR, 353 1.1 christos "IEEE 802.1X: Deriving CKN failed"); 354 1.1 christos goto fail; 355 1.1 christos } 356 1.1 christos wpa_hexdump(MSG_DEBUG, "Derived CKN", ckn->name, ckn->len); 357 1.1 christos 358 1.1 christos res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, 359 1.1.1.5 christos EAP_EXCHANGE, false); 360 1.1 christos 361 1.1 christos fail: 362 1.1 christos if (msk) { 363 1.1 christos os_memset(msk, 0, sizeof(*msk)); 364 1.1 christos os_free(msk); 365 1.1 christos } 366 1.1 christos os_free(ckn); 367 1.1 christos if (cak) { 368 1.1 christos os_memset(cak, 0, sizeof(*cak)); 369 1.1 christos os_free(cak); 370 1.1 christos } 371 1.1 christos 372 1.1 christos return res; 373 1.1 christos } 374 1.1.1.3 christos 375 1.1.1.3 christos 376 1.1.1.3 christos void * ieee802_1x_create_preshared_mka(struct wpa_supplicant *wpa_s, 377 1.1.1.3 christos struct wpa_ssid *ssid) 378 1.1.1.3 christos { 379 1.1.1.3 christos struct mka_key *cak; 380 1.1.1.3 christos struct mka_key_name *ckn; 381 1.1.1.3 christos void *res = NULL; 382 1.1.1.3 christos 383 1.1.1.3 christos if ((ssid->mka_psk_set & MKA_PSK_SET) != MKA_PSK_SET) 384 1.1.1.3 christos goto end; 385 1.1.1.3 christos 386 1.1.1.3 christos ckn = os_zalloc(sizeof(*ckn)); 387 1.1.1.3 christos if (!ckn) 388 1.1.1.3 christos goto end; 389 1.1.1.3 christos 390 1.1.1.3 christos cak = os_zalloc(sizeof(*cak)); 391 1.1.1.3 christos if (!cak) 392 1.1.1.3 christos goto free_ckn; 393 1.1.1.3 christos 394 1.1.1.3 christos if (ieee802_1x_alloc_kay_sm(wpa_s, ssid) < 0 || !wpa_s->kay) 395 1.1.1.3 christos goto free_cak; 396 1.1.1.3 christos 397 1.1.1.3 christos if (wpa_s->kay->policy == DO_NOT_SECURE) 398 1.1.1.3 christos goto dealloc; 399 1.1.1.3 christos 400 1.1.1.4 christos cak->len = ssid->mka_cak_len; 401 1.1.1.3 christos os_memcpy(cak->key, ssid->mka_cak, cak->len); 402 1.1.1.3 christos 403 1.1.1.4 christos ckn->len = ssid->mka_ckn_len; 404 1.1.1.3 christos os_memcpy(ckn->name, ssid->mka_ckn, ckn->len); 405 1.1.1.3 christos 406 1.1.1.5 christos res = ieee802_1x_kay_create_mka(wpa_s->kay, ckn, cak, 0, PSK, false); 407 1.1.1.3 christos if (res) 408 1.1.1.3 christos goto free_cak; 409 1.1.1.3 christos 410 1.1.1.3 christos dealloc: 411 1.1.1.3 christos /* Failed to create MKA */ 412 1.1.1.3 christos ieee802_1x_dealloc_kay_sm(wpa_s); 413 1.1.1.3 christos free_cak: 414 1.1.1.3 christos os_free(cak); 415 1.1.1.3 christos free_ckn: 416 1.1.1.3 christos os_free(ckn); 417 1.1.1.3 christos end: 418 1.1.1.3 christos return res; 419 1.1.1.3 christos } 420