diff options
Diffstat (limited to 'wlantest/inject.c')
-rw-r--r-- | wlantest/inject.c | 341 |
1 files changed, 0 insertions, 341 deletions
diff --git a/wlantest/inject.c b/wlantest/inject.c deleted file mode 100644 index b177bcfd9301..000000000000 --- a/wlantest/inject.c +++ /dev/null @@ -1,341 +0,0 @@ -/* - * wlantest frame injection - * Copyright (c) 2010-2015, Jouni Malinen <j@w1.fi> - * - * This software may be distributed under the terms of the BSD license. - * See README for more details. - */ - -#include "utils/includes.h" - -#include "utils/common.h" -#include "common/defs.h" -#include "common/ieee802_11_defs.h" -#include "crypto/aes_wrap.h" -#include "wlantest.h" - - -static int inject_frame(int s, const void *data, size_t len) -{ -#define IEEE80211_RADIOTAP_F_FRAG 0x08 - unsigned char rtap_hdr[] = { - 0x00, 0x00, /* radiotap version */ - 0x0e, 0x00, /* radiotap length */ - 0x02, 0xc0, 0x00, 0x00, /* bmap: flags, tx and rx flags */ - IEEE80211_RADIOTAP_F_FRAG, /* F_FRAG (fragment if required) */ - 0x00, /* padding */ - 0x00, 0x00, /* RX and TX flags to indicate that */ - 0x00, 0x00, /* this is the injected frame directly */ - }; - struct iovec iov[2] = { - { - .iov_base = &rtap_hdr, - .iov_len = sizeof(rtap_hdr), - }, - { - .iov_base = (void *) data, - .iov_len = len, - } - }; - struct msghdr msg = { - .msg_name = NULL, - .msg_namelen = 0, - .msg_iov = iov, - .msg_iovlen = 2, - .msg_control = NULL, - .msg_controllen = 0, - .msg_flags = 0, - }; - int ret; - - ret = sendmsg(s, &msg, 0); - if (ret < 0) - wpa_printf(MSG_ERROR, "sendmsg: %s", strerror(errno)); - return ret; -} - - -static int is_robust_mgmt(u8 *frame, size_t len) -{ - struct ieee80211_mgmt *mgmt; - u16 fc, stype; - if (len < 24) - return 0; - mgmt = (struct ieee80211_mgmt *) frame; - fc = le_to_host16(mgmt->frame_control); - if (WLAN_FC_GET_TYPE(fc) != WLAN_FC_TYPE_MGMT) - return 0; - stype = WLAN_FC_GET_STYPE(fc); - if (stype == WLAN_FC_STYPE_DEAUTH || stype == WLAN_FC_STYPE_DISASSOC) - return 1; - if (stype == WLAN_FC_STYPE_ACTION || - stype == WLAN_FC_STYPE_ACTION_NO_ACK) { - if (len < 25) - return 0; - if (mgmt->u.action.category != WLAN_ACTION_PUBLIC) - return 1; - } - return 0; -} - - -static int wlantest_inject_bip(struct wlantest *wt, struct wlantest_bss *bss, - u8 *frame, size_t len, int incorrect_key) -{ - u8 *prot; - u8 stub[32]; - int ret; - size_t plen; - - if (!bss->igtk_len[bss->igtk_idx]) - return -1; - - os_memset(stub, 0x11, sizeof(stub)); - inc_byte_array(bss->ipn[bss->igtk_idx], 6); - - prot = bip_protect(incorrect_key ? stub : bss->igtk[bss->igtk_idx], - bss->igtk_len[bss->igtk_idx], - frame, len, bss->ipn[bss->igtk_idx], - bss->igtk_idx, &plen); - if (prot == NULL) - return -1; - - - ret = inject_frame(wt->monitor_sock, prot, plen); - os_free(prot); - - return (ret < 0) ? -1 : 0; -} - - -static int wlantest_inject_prot_bc(struct wlantest *wt, - struct wlantest_bss *bss, - u8 *frame, size_t len, int incorrect_key) -{ - u8 *crypt; - size_t crypt_len; - int ret; - u8 stub[64]; - u8 *pn; - struct ieee80211_hdr *hdr; - u16 fc; - int hdrlen; - - hdr = (struct ieee80211_hdr *) frame; - hdrlen = 24; - fc = le_to_host16(hdr->frame_control); - - if (!bss->gtk_len[bss->gtk_idx]) - return -1; - - if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == - (WLAN_FC_TODS | WLAN_FC_FROMDS)) - hdrlen += ETH_ALEN; - pn = bss->rsc[bss->gtk_idx]; - inc_byte_array(pn, 6); - - os_memset(stub, 0x11, sizeof(stub)); - if (bss->group_cipher == WPA_CIPHER_TKIP) - crypt = tkip_encrypt(incorrect_key ? stub : - bss->gtk[bss->gtk_idx], - frame, len, hdrlen, NULL, pn, - bss->gtk_idx, &crypt_len); - else - crypt = ccmp_encrypt(incorrect_key ? stub : - bss->gtk[bss->gtk_idx], - frame, len, hdrlen, NULL, pn, - bss->gtk_idx, &crypt_len); - - if (crypt == NULL) - return -1; - - ret = inject_frame(wt->monitor_sock, crypt, crypt_len); - os_free(crypt); - - return (ret < 0) ? -1 : 0; -} - - -static int wlantest_inject_prot(struct wlantest *wt, struct wlantest_bss *bss, - struct wlantest_sta *sta, u8 *frame, - size_t len, int incorrect_key) -{ - u8 *crypt; - size_t crypt_len; - int ret; - u8 stub[64]; - u8 *pn; - struct ieee80211_hdr *hdr; - u16 fc; - int tid = 0; - u8 *qos = NULL; - int hdrlen; - struct wlantest_tdls *tdls = NULL; - const u8 *tk = NULL; - - hdr = (struct ieee80211_hdr *) frame; - hdrlen = 24; - fc = le_to_host16(hdr->frame_control); - - if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && - (fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == 0) { - struct wlantest_sta *sta2; - bss = bss_get(wt, hdr->addr3); - if (bss == NULL) { - wpa_printf(MSG_DEBUG, "No BSS found for TDLS " - "injection"); - return -1; - } - sta = sta_find(bss, hdr->addr2); - sta2 = sta_find(bss, hdr->addr1); - if (sta == NULL || sta2 == NULL) { - wpa_printf(MSG_DEBUG, "No stations found for TDLS " - "injection"); - return -1; - } - dl_list_for_each(tdls, &bss->tdls, struct wlantest_tdls, list) - { - if ((tdls->init == sta && tdls->resp == sta2) || - (tdls->init == sta2 && tdls->resp == sta)) { - if (!tdls->link_up) - wpa_printf(MSG_DEBUG, "TDLS: Link not " - "up, but injecting Data " - "frame on direct link"); - tk = tdls->tpk.tk; - break; - } - } - } - - if (tk == NULL && sta == NULL) { - if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT) - return wlantest_inject_bip(wt, bss, frame, len, - incorrect_key); - return wlantest_inject_prot_bc(wt, bss, frame, len, - incorrect_key); - } - - if (tk == NULL && !sta->ptk_set) { - wpa_printf(MSG_DEBUG, "No key known for injection"); - return -1; - } - - if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT) - tid = 16; - else if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA) { - if ((fc & (WLAN_FC_TODS | WLAN_FC_FROMDS)) == - (WLAN_FC_TODS | WLAN_FC_FROMDS)) - hdrlen += ETH_ALEN; - if (WLAN_FC_GET_STYPE(fc) & 0x08) { - qos = frame + hdrlen; - hdrlen += 2; - tid = qos[0] & 0x0f; - } - } - if (tk) { - if (os_memcmp(hdr->addr2, tdls->init->addr, ETH_ALEN) == 0) - pn = tdls->rsc_init[tid]; - else - pn = tdls->rsc_resp[tid]; - } else if (os_memcmp(hdr->addr2, bss->bssid, ETH_ALEN) == 0) - pn = sta->rsc_fromds[tid]; - else - pn = sta->rsc_tods[tid]; - inc_byte_array(pn, 6); - - os_memset(stub, 0x11, sizeof(stub)); - if (tk) - crypt = ccmp_encrypt(incorrect_key ? stub : tk, - frame, len, hdrlen, qos, pn, 0, - &crypt_len); - else if (sta->pairwise_cipher == WPA_CIPHER_TKIP) - crypt = tkip_encrypt(incorrect_key ? stub : sta->ptk.tk, - frame, len, hdrlen, qos, pn, 0, - &crypt_len); - else - crypt = ccmp_encrypt(incorrect_key ? stub : sta->ptk.tk, - frame, len, hdrlen, qos, pn, 0, - &crypt_len); - - if (crypt == NULL) { - wpa_printf(MSG_DEBUG, "Frame encryption failed"); - return -1; - } - - wpa_hexdump(MSG_DEBUG, "Inject frame (encrypted)", crypt, crypt_len); - ret = inject_frame(wt->monitor_sock, crypt, crypt_len); - os_free(crypt); - wpa_printf(MSG_DEBUG, "inject_frame for protected frame: %d", ret); - - return (ret < 0) ? -1 : 0; -} - - -int wlantest_inject(struct wlantest *wt, struct wlantest_bss *bss, - struct wlantest_sta *sta, u8 *frame, size_t len, - enum wlantest_inject_protection prot) -{ - int ret; - struct ieee80211_hdr *hdr; - u16 fc; - int protectable, protect = 0; - - wpa_hexdump(MSG_DEBUG, "Inject frame", frame, len); - if (wt->monitor_sock < 0) { - wpa_printf(MSG_INFO, "Cannot inject frames when monitor " - "interface is not in use"); - return -1; - } - - if (prot != WLANTEST_INJECT_UNPROTECTED && bss == NULL) { - wpa_printf(MSG_INFO, "No BSS information to inject " - "protected frames"); - return -1; - } - - hdr = (struct ieee80211_hdr *) frame; - fc = le_to_host16(hdr->frame_control); - protectable = WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA || - is_robust_mgmt(frame, len); - - if ((prot == WLANTEST_INJECT_PROTECTED || - prot == WLANTEST_INJECT_INCORRECT_KEY) && bss) { - if (!sta && - ((WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT && - !bss->igtk_len[bss->igtk_idx]) || - (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && - !bss->gtk_len[bss->gtk_idx]))) { - wpa_printf(MSG_INFO, "No GTK/IGTK known for " - MACSTR " to protect the injected " - "frame", MAC2STR(bss->bssid)); - return -1; - } - if (sta && !sta->ptk_set) { - wpa_printf(MSG_INFO, "No PTK known for the STA " MACSTR - " to encrypt the injected frame", - MAC2STR(sta->addr)); - return -1; - } - protect = 1; - } else if (protectable && prot != WLANTEST_INJECT_UNPROTECTED && bss) { - if (sta && sta->ptk_set) - protect = 1; - else if (!sta) { - if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_DATA && - bss->gtk_len[bss->gtk_idx]) - protect = 1; - if (WLAN_FC_GET_TYPE(fc) == WLAN_FC_TYPE_MGMT && - bss->igtk_len[bss->igtk_idx]) - protect = 1; - } - } - - if (protect && bss) - return wlantest_inject_prot( - wt, bss, sta, frame, len, - prot == WLANTEST_INJECT_INCORRECT_KEY); - - ret = inject_frame(wt->monitor_sock, frame, len); - wpa_printf(MSG_DEBUG, "inject_frame for unprotected frame: %d", ret); - return (ret < 0) ? -1 : 0; -} |