fragattacks/wlantest/wired.c
Jouni Malinen e9db8b59c9 wlantest: Use BSD compatible UDP header struct
Signed-off-by: Jouni Malinen <j@w1.fi>
2020-04-05 18:53:59 +03:00

296 lines
6.3 KiB
C

/*
* Received frame processing for wired interface
* Copyright (c) 2010, Jouni Malinen <j@w1.fi>
*
* This software may be distributed under the terms of the BSD license.
* See README for more details.
*/
#include "utils/includes.h"
#include <net/ethernet.h>
#include <netinet/ip.h>
#include <netinet/udp.h>
#include "utils/common.h"
#include "radius/radius.h"
#include "wlantest.h"
static struct wlantest_radius * radius_get(struct wlantest *wt, u32 srv,
u32 cli)
{
struct wlantest_radius *r;
dl_list_for_each(r, &wt->radius, struct wlantest_radius, list) {
if (r->srv == srv && r->cli == cli)
return r;
}
r = os_zalloc(sizeof(*r));
if (r == NULL)
return NULL;
r->srv = srv;
r->cli = cli;
dl_list_add(&wt->radius, &r->list);
return r;
}
static const char * radius_code_string(u8 code)
{
switch (code) {
case RADIUS_CODE_ACCESS_REQUEST:
return "Access-Request";
case RADIUS_CODE_ACCESS_ACCEPT:
return "Access-Accept";
case RADIUS_CODE_ACCESS_REJECT:
return "Access-Reject";
case RADIUS_CODE_ACCOUNTING_REQUEST:
return "Accounting-Request";
case RADIUS_CODE_ACCOUNTING_RESPONSE:
return "Accounting-Response";
case RADIUS_CODE_ACCESS_CHALLENGE:
return "Access-Challenge";
case RADIUS_CODE_STATUS_SERVER:
return "Status-Server";
case RADIUS_CODE_STATUS_CLIENT:
return "Status-Client";
case RADIUS_CODE_RESERVED:
return "Reserved";
default:
return "?Unknown?";
}
}
static void process_radius_access_request(struct wlantest *wt, u32 dst,
u32 src, const u8 *data, size_t len)
{
struct radius_msg *msg;
struct wlantest_radius *r;
msg = radius_msg_parse(data, len);
if (msg == NULL) {
wpa_printf(MSG_DEBUG, "Failed to parse RADIUS Access-Request");
return;
}
r = radius_get(wt, dst, src);
if (r) {
radius_msg_free(r->last_req);
r->last_req = msg;
return;
}
radius_msg_free(msg);
}
static void wlantest_add_pmk(struct wlantest *wt, const u8 *pmk, size_t pmk_len)
{
struct wlantest_pmk *p;
p = os_zalloc(sizeof(*p));
if (p == NULL)
return;
os_memcpy(p->pmk, pmk, pmk_len);
p->pmk_len = pmk_len;
dl_list_add(&wt->pmk, &p->list);
wpa_hexdump(MSG_INFO, "Add PMK", pmk, pmk_len);
}
static void process_radius_access_accept(struct wlantest *wt, u32 dst, u32 src,
const u8 *data, size_t len)
{
struct radius_msg *msg;
struct wlantest_radius *r;
struct radius_ms_mppe_keys *keys;
struct wlantest_radius_secret *s;
r = radius_get(wt, src, dst);
if (r == NULL || r->last_req == NULL) {
wpa_printf(MSG_DEBUG, "No RADIUS Access-Challenge found for "
"decrypting Access-Accept keys");
return;
}
msg = radius_msg_parse(data, len);
if (msg == NULL) {
wpa_printf(MSG_DEBUG, "Failed to parse RADIUS Access-Accept");
return;
}
dl_list_for_each(s, &wt->secret, struct wlantest_radius_secret, list) {
int found = 0;
keys = radius_msg_get_ms_keys(msg, r->last_req,
(u8 *) s->secret,
os_strlen(s->secret));
if (keys && keys->send && keys->recv) {
u8 pmk[PMK_LEN_MAX];
size_t pmk_len, len2;
wpa_hexdump_key(MSG_DEBUG, "MS-MPPE-Send-Key",
keys->send, keys->send_len);
wpa_hexdump_key(MSG_DEBUG, "MS-MPPE-Recv-Key",
keys->recv, keys->recv_len);
pmk_len = keys->recv_len;
if (pmk_len > PMK_LEN_MAX)
pmk_len = PMK_LEN_MAX;
os_memcpy(pmk, keys->recv, pmk_len);
if (pmk_len < PMK_LEN_MAX) {
len2 = keys->send_len;
if (pmk_len + len2 > PMK_LEN_MAX)
len2 = PMK_LEN_MAX - pmk_len;
os_memcpy(pmk + pmk_len, keys->send, len2);
pmk_len += len2;
}
wlantest_add_pmk(wt, pmk, pmk_len);
found = 1;
}
if (keys) {
os_free(keys->send);
os_free(keys->recv);
os_free(keys);
}
if (found)
break;
}
radius_msg_free(msg);
}
static void process_radius(struct wlantest *wt, u32 dst, u16 dport, u32 src,
u16 sport, const u8 *data, size_t len)
{
struct in_addr addr;
char buf[20];
const struct radius_hdr *hdr;
u16 rlen;
if (len < sizeof(*hdr))
return;
hdr = (const struct radius_hdr *) data;
rlen = be_to_host16(hdr->length);
if (len < rlen)
return;
if (len > rlen)
len = rlen;
addr.s_addr = dst;
snprintf(buf, sizeof(buf), "%s", inet_ntoa(addr));
addr.s_addr = src;
wpa_printf(MSG_DEBUG, "RADIUS %s:%u -> %s:%u id=%u %s",
inet_ntoa(addr), sport, buf, dport, hdr->identifier,
radius_code_string(hdr->code));
switch (hdr->code) {
case RADIUS_CODE_ACCESS_REQUEST:
process_radius_access_request(wt, dst, src, data, len);
break;
case RADIUS_CODE_ACCESS_ACCEPT:
process_radius_access_accept(wt, dst, src, data, len);
break;
}
}
static void process_udp(struct wlantest *wt, u32 dst, u32 src,
const u8 *data, size_t len)
{
const struct udphdr *udp;
u16 sport, dport, ulen;
const u8 *payload;
size_t plen;
if (len < sizeof(*udp))
return;
udp = (const struct udphdr *) data;
/* TODO: check UDP checksum */
sport = be_to_host16(udp->uh_sport);
dport = be_to_host16(udp->uh_dport);
ulen = be_to_host16(udp->uh_ulen);
if (ulen > len)
return;
if (len < ulen)
len = ulen;
payload = (const u8 *) (udp + 1);
plen = len - sizeof(*udp);
if (sport == 1812 || dport == 1812)
process_radius(wt, dst, dport, src, sport, payload, plen);
}
static void process_ipv4(struct wlantest *wt, const u8 *data, size_t len)
{
const struct ip *ip;
const u8 *payload;
size_t plen;
uint16_t frag_off, ip_len;
if (len < sizeof(*ip))
return;
ip = (const struct ip *) data;
if (ip->ip_v != 4)
return;
if (ip->ip_hl < 5)
return;
/* TODO: check header checksum in ip->check */
frag_off = be_to_host16(ip->ip_off);
if (frag_off & 0x1fff) {
wpa_printf(MSG_EXCESSIVE, "IP fragment reassembly not yet "
"supported");
return;
}
ip_len = be_to_host16(ip->ip_len);
if (ip_len > len)
return;
if (ip_len < len)
len = ip_len;
payload = data + 4 * ip->ip_hl;
plen = len - 4 * ip->ip_hl;
if (payload + plen > data + len)
return;
switch (ip->ip_p) {
case IPPROTO_UDP:
process_udp(wt, ip->ip_dst.s_addr, ip->ip_src.s_addr,
payload, plen);
break;
}
}
void wlantest_process_wired(struct wlantest *wt, const u8 *data, size_t len)
{
const struct ether_header *eth;
u16 ethertype;
wpa_hexdump(MSG_EXCESSIVE, "Process wired frame", data, len);
if (len < sizeof(*eth))
return;
eth = (const struct ether_header *) data;
ethertype = be_to_host16(eth->ether_type);
switch (ethertype) {
case ETHERTYPE_IP:
process_ipv4(wt, data + sizeof(*eth), len - sizeof(*eth));
break;
}
}