mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-11-28 18:28:23 -05:00
DPP: Allow protocol key to be overridden for testing purposes
This can be used for various testing needs. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
This commit is contained in:
parent
33cddd7fe9
commit
f55269753c
@ -34,6 +34,8 @@ u8 dpp_pkex_own_mac_override[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
|
||||
u8 dpp_pkex_peer_mac_override[ETH_ALEN] = { 0, 0, 0, 0, 0, 0 };
|
||||
u8 dpp_pkex_ephemeral_key_override[600];
|
||||
size_t dpp_pkex_ephemeral_key_override_len = 0;
|
||||
u8 dpp_protocol_key_override[600];
|
||||
size_t dpp_protocol_key_override_len = 0;
|
||||
|
||||
static int dpp_test_gen_invalid_key(struct wpabuf *msg,
|
||||
const struct dpp_curve_params *curve);
|
||||
@ -2091,7 +2093,21 @@ struct dpp_authentication * dpp_auth_init(void *msg_ctx,
|
||||
}
|
||||
wpa_hexdump(MSG_DEBUG, "DPP: I-nonce", auth->i_nonce, nonce_len);
|
||||
|
||||
#ifdef CONFIG_TESTING_OPTIONS
|
||||
if (dpp_protocol_key_override_len) {
|
||||
const struct dpp_curve_params *tmp_curve;
|
||||
|
||||
wpa_printf(MSG_INFO,
|
||||
"DPP: TESTING - override protocol key");
|
||||
auth->own_protocol_key = dpp_set_keypair(
|
||||
&tmp_curve, dpp_protocol_key_override,
|
||||
dpp_protocol_key_override_len);
|
||||
} else {
|
||||
auth->own_protocol_key = dpp_gen_keypair(auth->curve);
|
||||
}
|
||||
#else /* CONFIG_TESTING_OPTIONS */
|
||||
auth->own_protocol_key = dpp_gen_keypair(auth->curve);
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
if (!auth->own_protocol_key)
|
||||
goto fail;
|
||||
|
||||
@ -2607,7 +2623,21 @@ static int dpp_auth_build_resp_ok(struct dpp_authentication *auth)
|
||||
}
|
||||
wpa_hexdump(MSG_DEBUG, "DPP: R-nonce", auth->r_nonce, nonce_len);
|
||||
|
||||
#ifdef CONFIG_TESTING_OPTIONS
|
||||
if (dpp_protocol_key_override_len) {
|
||||
const struct dpp_curve_params *tmp_curve;
|
||||
|
||||
wpa_printf(MSG_INFO,
|
||||
"DPP: TESTING - override protocol key");
|
||||
auth->own_protocol_key = dpp_set_keypair(
|
||||
&tmp_curve, dpp_protocol_key_override,
|
||||
dpp_protocol_key_override_len);
|
||||
} else {
|
||||
auth->own_protocol_key = dpp_gen_keypair(auth->curve);
|
||||
}
|
||||
#else /* CONFIG_TESTING_OPTIONS */
|
||||
auth->own_protocol_key = dpp_gen_keypair(auth->curve);
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
if (!auth->own_protocol_key)
|
||||
goto fail;
|
||||
|
||||
|
@ -339,6 +339,8 @@ extern u8 dpp_pkex_own_mac_override[ETH_ALEN];
|
||||
extern u8 dpp_pkex_peer_mac_override[ETH_ALEN];
|
||||
extern u8 dpp_pkex_ephemeral_key_override[600];
|
||||
extern size_t dpp_pkex_ephemeral_key_override_len;
|
||||
extern u8 dpp_protocol_key_override[600];
|
||||
extern size_t dpp_protocol_key_override_len;
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
|
||||
void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info);
|
||||
|
@ -633,6 +633,16 @@ static int wpa_supplicant_ctrl_iface_set(struct wpa_supplicant *wpa_s,
|
||||
ret = -1;
|
||||
else
|
||||
dpp_pkex_ephemeral_key_override_len = hex_len / 2;
|
||||
} else if (os_strcasecmp(cmd, "dpp_protocol_key_override") == 0) {
|
||||
size_t hex_len = os_strlen(value);
|
||||
|
||||
if (hex_len > 2 * sizeof(dpp_protocol_key_override))
|
||||
ret = -1;
|
||||
else if (hexstr2bin(value, dpp_protocol_key_override,
|
||||
hex_len / 2))
|
||||
ret = -1;
|
||||
else
|
||||
dpp_protocol_key_override_len = hex_len / 2;
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
#endif /* CONFIG_DPP */
|
||||
#ifdef CONFIG_TESTING_OPTIONS
|
||||
@ -7784,6 +7794,7 @@ static void wpa_supplicant_ctrl_iface_flush(struct wpa_supplicant *wpa_s)
|
||||
os_memset(dpp_pkex_own_mac_override, 0, ETH_ALEN);
|
||||
os_memset(dpp_pkex_peer_mac_override, 0, ETH_ALEN);
|
||||
dpp_pkex_ephemeral_key_override_len = 0;
|
||||
dpp_protocol_key_override_len = 0;
|
||||
#endif /* CONFIG_TESTING_OPTIONS */
|
||||
#endif /* CONFIG_DPP */
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user