mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 10:18:21 -05:00
wlantest: Verify that WPA/RSN IE matches in EAPOL-Key and mgmt frames
Verify that WPA/RSN IE in (Re)Association Request is identical to the one used in EAPOL-Key message 2/4. Verify that WPA/RSN IE in Beacon/Probe Response is identical to the one(s) used in EAPOL-Key message 3/4.
This commit is contained in:
parent
327f71604c
commit
9bb6cdaaaf
@ -209,11 +209,33 @@ static void rx_data_eapol_key_2_of_4(struct wlantest *wt, const u8 *dst,
|
||||
if (ie.wpa_ie) {
|
||||
wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - WPA IE",
|
||||
ie.wpa_ie, ie.wpa_ie_len);
|
||||
if (os_memcmp(ie.wpa_ie, sta->rsnie, ie.wpa_ie_len) != 0) {
|
||||
wpa_printf(MSG_INFO, "Mismatch in WPA IE between "
|
||||
"EAPOL-Key 2/4 and (Re)Association "
|
||||
"Request from " MACSTR, MAC2STR(sta->addr));
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
|
||||
ie.wpa_ie, ie.wpa_ie_len);
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in (Re)Association "
|
||||
"Request",
|
||||
sta->rsnie,
|
||||
sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
|
||||
}
|
||||
}
|
||||
|
||||
if (ie.rsn_ie) {
|
||||
wpa_hexdump(MSG_MSGDUMP, "EAPOL-Key Key Data - RSN IE",
|
||||
ie.rsn_ie, ie.rsn_ie_len);
|
||||
if (os_memcmp(ie.rsn_ie, sta->rsnie, ie.rsn_ie_len) != 0) {
|
||||
wpa_printf(MSG_INFO, "Mismatch in WPA IE between "
|
||||
"EAPOL-Key 2/4 and (Re)Association "
|
||||
"Request from " MACSTR, MAC2STR(sta->addr));
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
|
||||
ie.rsn_ie, ie.rsn_ie_len);
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in (Re)Association "
|
||||
"Request",
|
||||
sta->rsnie,
|
||||
sta->rsnie[0] ? 2 + sta->rsnie[1] : 0);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@ -375,6 +397,7 @@ static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
|
||||
u16 key_info, ver;
|
||||
u8 *decrypted;
|
||||
size_t decrypted_len = 0;
|
||||
struct wpa_eapol_ie_parse ie;
|
||||
|
||||
wpa_printf(MSG_DEBUG, "EAPOL-Key 3/4 " MACSTR " -> " MACSTR,
|
||||
MAC2STR(src), MAC2STR(dst));
|
||||
@ -465,6 +488,41 @@ static void rx_data_eapol_key_3_of_4(struct wlantest *wt, const u8 *dst,
|
||||
write_pcap_decrypted(wt, buf, sizeof(buf),
|
||||
decrypted, plain_len);
|
||||
}
|
||||
|
||||
if (wpa_supplicant_parse_ies(decrypted, decrypted_len, &ie) < 0) {
|
||||
wpa_printf(MSG_INFO, "Failed to parse EAPOL-Key Key Data");
|
||||
os_free(decrypted);
|
||||
return;
|
||||
}
|
||||
|
||||
if ((ie.wpa_ie &&
|
||||
os_memcmp(ie.wpa_ie, bss->wpaie, ie.wpa_ie_len) != 0) ||
|
||||
(ie.wpa_ie == NULL && bss->wpaie[0])) {
|
||||
wpa_printf(MSG_INFO, "Mismatch in WPA IE between "
|
||||
"EAPOL-Key 3/4 and Beacon/Probe Response "
|
||||
"from " MACSTR, MAC2STR(bss->bssid));
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in EAPOL-Key",
|
||||
ie.wpa_ie, ie.wpa_ie_len);
|
||||
wpa_hexdump(MSG_INFO, "WPA IE in Beacon/Probe "
|
||||
"Response",
|
||||
bss->wpaie,
|
||||
bss->wpaie[0] ? 2 + bss->wpaie[1] : 0);
|
||||
}
|
||||
|
||||
if ((ie.rsn_ie &&
|
||||
os_memcmp(ie.rsn_ie, bss->rsnie, ie.rsn_ie_len) != 0) ||
|
||||
(ie.rsn_ie == NULL && bss->rsnie[0])) {
|
||||
wpa_printf(MSG_INFO, "Mismatch in RSN IE between "
|
||||
"EAPOL-Key 3/4 and Beacon/Probe Response "
|
||||
"from " MACSTR, MAC2STR(bss->bssid));
|
||||
wpa_hexdump(MSG_INFO, "RSN IE in EAPOL-Key",
|
||||
ie.rsn_ie, ie.rsn_ie_len);
|
||||
wpa_hexdump(MSG_INFO, "RSN IE in (Re)Association "
|
||||
"Request",
|
||||
bss->rsnie,
|
||||
bss->rsnie[0] ? 2 + bss->rsnie[1] : 0);
|
||||
}
|
||||
|
||||
learn_kde_keys(bss, decrypted, decrypted_len, hdr->key_rsc);
|
||||
os_free(decrypted);
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user