iPXE
Data Structures | Macros | Functions | Variables
sec80211.c File Reference

General secured-network routines required whenever any secure network support at all is compiled in. More...

#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <ipxe/ieee80211.h>
#include <ipxe/net80211.h>
#include <ipxe/sec80211.h>

Go to the source code of this file.

Data Structures

struct  descriptor_map
 Mapping from net80211 crypto/secprot types to RSN OUI descriptors. More...
 

Macros

#define ENOTSUP_WEP   __einfo_error ( EINFO_ENOTSUP_WEP )
 
#define EINFO_ENOTSUP_WEP
 
#define ENOTSUP_TKIP   __einfo_error ( EINFO_ENOTSUP_TKIP )
 
#define EINFO_ENOTSUP_TKIP
 
#define ENOTSUP_CCMP   __einfo_error ( EINFO_ENOTSUP_CCMP )
 
#define EINFO_ENOTSUP_CCMP
 
#define ENOTSUP_CRYPT(crypt)
 
#define END_MAGIC   0xFFFFFFFF
 Magic number in oui_type showing end of list. More...
 

Functions

 FILE_LICENCE (GPL2_OR_LATER)
 
 FILE_SECBOOT (FORBIDDEN)
 
int sec80211_install (struct net80211_crypto **which, enum net80211_crypto_alg crypt, const void *key, int len, const void *rsc)
 Install 802.11 cryptosystem. More...
 
static struct descriptor_maprsn_pick_desc (u8 **rsnp, u8 *rsn_end, struct descriptor_map *map, void *tbl_start, void *tbl_end)
 Determine net80211 crypto or handshaking type value to return for RSN info. More...
 
u8sec80211_find_rsn (union ieee80211_ie *ie, void *ie_end, int *is_rsn, u8 **end)
 Find the RSN or WPA information element in the provided beacon frame. More...
 
int sec80211_detect_ie (int is_rsn, u8 *start, u8 *end, enum net80211_security_proto *secprot, enum net80211_crypto_alg *crypt)
 Detect crypto and AKM types from RSN information element. More...
 
int sec80211_detect (struct io_buffer *iob, enum net80211_security_proto *secprot, enum net80211_crypto_alg *crypt)
 Detect the cryptosystem and handshaking protocol used by an 802.11 network. More...
 
static u32 rsn_get_desc (unsigned id, int rsnie, struct descriptor_map *map)
 Determine RSN descriptor for specified net80211 ID. More...
 
u32 sec80211_rsn_get_crypto_desc (enum net80211_crypto_alg crypt, int rsnie)
 Determine RSN descriptor for specified net80211 cryptosystem number. More...
 
u32 sec80211_rsn_get_akm_desc (enum net80211_security_proto secprot, int rsnie)
 Determine RSN descriptor for specified net80211 handshaker number. More...
 
enum net80211_crypto_alg sec80211_rsn_get_net80211_crypt (u32 desc)
 Determine net80211 cryptosystem number from RSN descriptor. More...
 

Variables

static struct descriptor_map rsn_cipher_map []
 Mapping between net80211 cryptosystems and 802.11i cipher IDs. More...
 
static struct descriptor_map rsn_akm_map []
 Mapping between net80211 handshakers and 802.11i AKM IDs. More...
 

Detailed Description

General secured-network routines required whenever any secure network support at all is compiled in.

This involves things like installing keys, determining the type of security used by a probed network, and some small helper functions that take advantage of static data in this file.

Definition in file sec80211.c.

Macro Definition Documentation

◆ ENOTSUP_WEP

#define ENOTSUP_WEP   __einfo_error ( EINFO_ENOTSUP_WEP )

Definition at line 40 of file sec80211.c.

◆ EINFO_ENOTSUP_WEP

#define EINFO_ENOTSUP_WEP
Value:
( 0x10 | NET80211_CRYPT_WEP ), "WEP not supported" )
#define EINFO_ENOTSUP
Definition: errno.h:591
Network protected with WEP (awful RC4-based system)
Definition: net80211.h:145
#define __einfo_uniqify(einfo_base, uniq, desc)
Declare disambiguated error.
Definition: errno.h:181

Definition at line 41 of file sec80211.c.

◆ ENOTSUP_TKIP

#define ENOTSUP_TKIP   __einfo_error ( EINFO_ENOTSUP_TKIP )

Definition at line 43 of file sec80211.c.

◆ EINFO_ENOTSUP_TKIP

#define EINFO_ENOTSUP_TKIP
Value:
( 0x10 | NET80211_CRYPT_TKIP ), "TKIP not supported" )
#define EINFO_ENOTSUP
Definition: errno.h:591
#define __einfo_uniqify(einfo_base, uniq, desc)
Declare disambiguated error.
Definition: errno.h:181
Network protected with TKIP (better RC4-based system)
Definition: net80211.h:163

Definition at line 44 of file sec80211.c.

◆ ENOTSUP_CCMP

#define ENOTSUP_CCMP   __einfo_error ( EINFO_ENOTSUP_CCMP )

Definition at line 46 of file sec80211.c.

◆ EINFO_ENOTSUP_CCMP

#define EINFO_ENOTSUP_CCMP
Value:
( 0x10 | NET80211_CRYPT_CCMP ), "CCMP not supported" )
#define EINFO_ENOTSUP
Definition: errno.h:591
Network protected with CCMP (AES-based system)
Definition: net80211.h:174
#define __einfo_uniqify(einfo_base, uniq, desc)
Declare disambiguated error.
Definition: errno.h:181

Definition at line 47 of file sec80211.c.

◆ ENOTSUP_CRYPT

#define ENOTSUP_CRYPT (   crypt)
Value:
EUNIQ ( EINFO_ENOTSUP, ( 0x10 | (crypt) ), \
#define EINFO_ENOTSUP
Definition: errno.h:591
#define ENOTSUP_WEP
Definition: sec80211.c:40
#define ENOTSUP_CCMP
Definition: sec80211.c:46
#define ENOTSUP_TKIP
Definition: sec80211.c:43
#define EUNIQ(einfo_base, uniq,...)
Disambiguate a base error based on non-constant information.
Definition: errno.h:226

Definition at line 49 of file sec80211.c.

◆ END_MAGIC

#define END_MAGIC   0xFFFFFFFF

Magic number in oui_type showing end of list.

Definition at line 63 of file sec80211.c.

Function Documentation

◆ FILE_LICENCE()

FILE_LICENCE ( GPL2_OR_LATER  )

◆ FILE_SECBOOT()

FILE_SECBOOT ( FORBIDDEN  )

◆ sec80211_install()

int sec80211_install ( struct net80211_crypto **  which,
enum net80211_crypto_alg  crypt,
const void *  key,
int  len,
const void *  rsc 
)

Install 802.11 cryptosystem.

Parameters
whichPointer to the cryptosystem structure to install in
cryptCryptosystem ID number
keyEncryption key to use
lenLength of encryption key
rscInitial receive sequence counter, if applicable
Return values
rcReturn status code

The encryption key will not be accessed via the provided pointer after this function returns, so you may keep it on the stack.

which must point to either dev->crypto (for the normal case of installing a unicast cryptosystem) or dev->gcrypto (to install a cryptosystem that will be used only for decrypting group-source frames).

Definition at line 114 of file sec80211.c.

117 {
118  struct net80211_crypto *crypto = *which;
119  struct net80211_crypto *tbl_crypto;
120 
121  /* Remove old crypto if it exists */
122  free ( *which );
123  *which = NULL;
124 
125  if ( crypt == NET80211_CRYPT_NONE ) {
126  DBG ( "802.11-Sec not installing null cryptography\n" );
127  return 0;
128  }
129 
130  /* Find cryptosystem to use */
131  for_each_table_entry ( tbl_crypto, NET80211_CRYPTOS ) {
132  if ( tbl_crypto->algorithm == crypt ) {
133  crypto = zalloc ( sizeof ( *crypto ) +
134  tbl_crypto->priv_len );
135  if ( ! crypto ) {
136  DBG ( "802.11-Sec out of memory\n" );
137  return -ENOMEM;
138  }
139 
140  memcpy ( crypto, tbl_crypto, sizeof ( *crypto ) );
141  crypto->priv = ( ( void * ) crypto +
142  sizeof ( *crypto ) );
143  break;
144  }
145  }
146 
147  if ( ! crypto ) {
148  DBG ( "802.11-Sec no support for cryptosystem %d\n", crypt );
149  return -ENOTSUP_CRYPT ( crypt );
150  }
151 
152  *which = crypto;
153 
154  DBG ( "802.11-Sec installing cryptosystem %d as %p with key of "
155  "length %d\n", crypt, crypto, len );
156 
157  return crypto->init ( crypto, key, len, rsc );
158 }
int(* init)(struct net80211_crypto *crypto, const void *key, int keylen, const void *rsc)
Initialize cryptosystem using a given key.
Definition: net80211.h:707
int priv_len
Length of private data requested to be allocated.
Definition: net80211.h:763
#define ENOTSUP_CRYPT(crypt)
Definition: sec80211.c:49
#define ENOMEM
Not enough space.
Definition: errno.h:535
enum net80211_crypto_alg algorithm
The cryptographic algorithm implemented.
Definition: net80211.h:692
void * memcpy(void *dest, const void *src, size_t len) __nonnull
ring len
Length.
Definition: dwmac.h:231
u8 rsc[8]
Receive sequence counter for GTK.
Definition: wpa.h:69
#define NET80211_CRYPTOS
Definition: net80211.h:769
static void(* free)(struct refcnt *refcnt))
Definition: refcnt.h:55
void * zalloc(size_t size)
Allocate cleared memory.
Definition: malloc.c:662
No security, an "Open" network.
Definition: net80211.h:131
#define for_each_table_entry(pointer, table)
Iterate through all entries within a linker table.
Definition: tables.h:386
void * priv
Private data for the algorithm to store key and state info.
Definition: net80211.h:766
#define DBG(...)
Print a debugging message.
Definition: compiler.h:498
Interface to an 802.11 cryptosystem.
Definition: net80211.h:689
#define NULL
NULL pointer (VOID *)
Definition: Base.h:322
union @391 key
Sense key.
Definition: scsi.h:18

References net80211_crypto::algorithm, DBG, ENOMEM, ENOTSUP_CRYPT, for_each_table_entry, free, net80211_crypto::init, key, len, memcpy(), NET80211_CRYPT_NONE, NET80211_CRYPTOS, NULL, net80211_crypto::priv, net80211_crypto::priv_len, rsc, and zalloc().

Referenced by trivial_init(), wpa_install_gtk(), and wpa_install_ptk().

◆ rsn_pick_desc()

static struct descriptor_map* rsn_pick_desc ( u8 **  rsnp,
u8 rsn_end,
struct descriptor_map map,
void *  tbl_start,
void *  tbl_end 
)
static

Determine net80211 crypto or handshaking type value to return for RSN info.

Parameters
rsnpPointer to next descriptor count field in RSN IE
rsn_endPointer to end of RSN IE
mapDescriptor map to use
tbl_startStart of linker table to examine for iPXE support
tbl_endEnd of linker table to examine for iPXE support
Return values
rsnpUpdated to point to first byte after descriptors
map_entDescriptor map entry of translation to use

The entries in the linker table must be either net80211_crypto or net80211_handshaker structures, and tbl_stride must be set to sizeof() the appropriate one.

This function expects rsnp to point at a two-byte descriptor count followed by a list of four-byte cipher or AKM descriptors; it will return NULL if the input packet is malformed, and otherwise set rsnp to the first byte it has not looked at. It will return the first cipher in the list that is supported by the current build of iPXE, or the first of all if none are supported.

We play rather fast and loose with type checking, because this function is only called from two well-defined places in the RSN-checking code. Don't try to use it for anything else.

Definition at line 187 of file sec80211.c.

190 {
191  int ndesc;
192  int ok = 0;
193  struct descriptor_map *map_ent, *map_ret = NULL;
194  u8 *rsn = *rsnp;
195  void *tblp;
196  size_t tbl_stride = ( map == rsn_cipher_map ?
197  sizeof ( struct net80211_crypto ) :
198  sizeof ( struct net80211_handshaker ) );
199 
200  if ( map != rsn_cipher_map && map != rsn_akm_map )
201  return NULL;
202 
203  /* Determine which types we support */
204  for ( tblp = tbl_start; tblp < tbl_end; tblp += tbl_stride ) {
205  struct net80211_crypto *crypto = tblp;
206  struct net80211_handshaker *hs = tblp;
207 
208  if ( map == rsn_cipher_map )
209  ok |= ( 1 << crypto->algorithm );
210  else
211  ok |= ( 1 << hs->protocol );
212  }
213 
214  /* RSN sanity checks */
215  if ( rsn + 2 > rsn_end ) {
216  DBG ( "RSN detect: malformed descriptor count\n" );
217  return NULL;
218  }
219 
220  ndesc = *( u16 * ) rsn;
221  rsn += 2;
222 
223  if ( ! ndesc ) {
224  DBG ( "RSN detect: no descriptors\n" );
225  return NULL;
226  }
227 
228  /* Determine which net80211 crypto types are listed */
229  while ( ndesc-- ) {
230  u32 desc;
231 
232  if ( rsn + 4 > rsn_end ) {
233  DBG ( "RSN detect: malformed descriptor (%d left)\n",
234  ndesc );
235  return NULL;
236  }
237 
238  desc = *( u32 * ) rsn;
239  rsn += 4;
240 
241  for ( map_ent = map; map_ent->oui_type != END_MAGIC; map_ent++ )
242  if ( map_ent->oui_type == ( desc & OUI_TYPE_MASK ) )
243  break;
244 
245  /* Use first cipher as a fallback */
246  if ( ! map_ret )
247  map_ret = map_ent;
248 
249  /* Once we find one we support, use it */
250  if ( ok & ( 1 << map_ent->net80211_type ) ) {
251  map_ret = map_ent;
252  break;
253  }
254  }
255 
256  if ( ndesc > 0 )
257  rsn += 4 * ndesc;
258 
259  *rsnp = rsn;
260  return map_ret;
261 }
Mapping from net80211 crypto/secprot types to RSN OUI descriptors.
Definition: sec80211.c:54
static struct descriptor_map rsn_cipher_map[]
Mapping between net80211 cryptosystems and 802.11i cipher IDs.
Definition: sec80211.c:66
u32 oui_type
OUI + type byte.
Definition: wpa.h:34
static __always_inline int struct dma_mapping * map
Definition: dma.h:184
return
Definition: natsemi.h:326
Interface to an 802.11 cryptosystem.
Definition: net80211.h:689
#define ok(success)
Definition: test.h:46
#define NULL
NULL pointer (VOID *)
Definition: Base.h:322
uint8_t u8
Definition: stdint.h:20
if(natsemi->flags &NATSEMI_64BIT) return 1

References if(), map, NULL, ok, oui_type, return, and rsn_cipher_map.

Referenced by sec80211_detect_ie().

◆ sec80211_find_rsn()

u8* sec80211_find_rsn ( union ieee80211_ie ie,
void *  ie_end,
int *  is_rsn,
u8 **  end 
)

Find the RSN or WPA information element in the provided beacon frame.

Parameters
iePointer to first information element to check
ie_endPointer to end of information element space
Return values
is_rsnTRUE if returned IE is RSN, FALSE if it's WPA
endPointer to byte immediately after last byte of data
dataPointer to first byte of data (the ‘version’ field)

If both an RSN and a WPA information element are found, this function will return the first one seen, which by ordering rules should always prefer the newer RSN IE.

If no RSN or WPA infomration element is found, returns NULL and leaves is_rsn and end in an undefined state.

This function will not return a pointer to an information element that states it extends past the tail of the io_buffer, or whose version field is incorrect.

Definition at line 284 of file sec80211.c.

286 {
287  u8 *rsn = NULL;
288 
289  if ( ! ieee80211_ie_bound ( ie, ie_end ) )
290  return NULL;
291 
292  while ( ie ) {
293  if ( ie->id == IEEE80211_IE_VENDOR &&
294  ie->vendor.oui == IEEE80211_WPA_OUI_VEN ) {
295  DBG ( "RSN detect: old-style WPA IE found\n" );
296  rsn = &ie->vendor.data[0];
297  *end = rsn + ie->len - 4;
298  *is_rsn = 0;
299  } else if ( ie->id == IEEE80211_IE_RSN ) {
300  DBG ( "RSN detect: 802.11i RSN IE found\n" );
301  rsn = ( u8 * ) &ie->rsn.version;
302  *end = rsn + ie->len;
303  *is_rsn = 1;
304  }
305 
306  if ( rsn && ( *end > ( u8 * ) ie_end || rsn >= *end ||
307  *( u16 * ) rsn != IEEE80211_RSN_VERSION ) ) {
308  DBG ( "RSN detect: malformed RSN IE or unknown "
309  "version, keep trying\n" );
310  rsn = NULL;
311  }
312 
313  if ( rsn )
314  break;
315 
316  ie = ieee80211_next_ie ( ie, ie_end );
317  }
318 
319  if ( ! ie ) {
320  DBG ( "RSN detect: no RSN IE found\n" );
321  return NULL;
322  }
323 
324  return rsn;
325 }
uint16_t u16
Definition: stdint.h:22
static union ieee80211_ie * ieee80211_next_ie(union ieee80211_ie *ie, void *end)
Advance to next 802.11 information element.
Definition: ieee80211.h:1028
u16 version
RSN information element version.
Definition: ieee80211.h:806
struct ieee80211_ie_rsn rsn
Security information.
Definition: ieee80211.h:1000
u32 oui
OUI and vendor-specific type byte.
Definition: ieee80211.h:955
u8 id
Information element ID.
Definition: ieee80211.h:976
#define IEEE80211_WPA_OUI_VEN
Old vendor-type WPA IE OUI type + subtype.
Definition: ieee80211.h:869
u8 data[0]
Vendor-specific data.
Definition: ieee80211.h:956
#define IEEE80211_IE_VENDOR
Information element ID for Vendor Specific information element.
Definition: ieee80211.h:960
#define IEEE80211_IE_RSN
Information element ID for Robust Security Network information element.
Definition: ieee80211.h:834
struct ieee80211_ie_vendor vendor
Vendor-specific.
Definition: ieee80211.h:1003
static int ieee80211_ie_bound(union ieee80211_ie *ie, void *end)
Check that 802.11 information element is bounded by buffer.
Definition: ieee80211.h:1012
u8 len
Information element data length.
Definition: ieee80211.h:977
uint32_t end
Ending offset.
Definition: netvsc.h:18
#define IEEE80211_RSN_VERSION
802.11 RSN IE: expected version number
Definition: ieee80211.h:873
#define DBG(...)
Print a debugging message.
Definition: compiler.h:498
#define NULL
NULL pointer (VOID *)
Definition: Base.h:322
uint8_t u8
Definition: stdint.h:20

References DBG, end, ieee80211_ie_bound(), IEEE80211_IE_RSN, IEEE80211_IE_VENDOR, ieee80211_next_ie(), IEEE80211_RSN_VERSION, IEEE80211_WPA_OUI_VEN, and NULL.

Referenced by sec80211_detect(), wpa_handle_3_of_4(), wpa_make_rsn_ie(), and wpa_start().

◆ sec80211_detect_ie()

int sec80211_detect_ie ( int  is_rsn,
u8 start,
u8 end,
enum net80211_security_proto secprot,
enum net80211_crypto_alg crypt 
)

Detect crypto and AKM types from RSN information element.

Parameters
is_rsnIf TRUE, IE is a new-style RSN information element
startPointer to first byte of version field
endPointer to first byte not in the RSN IE
Return values
secprotSecurity handshaking protocol used by network
cryptCryptosystem used by network
rcReturn status code

If the IE cannot be parsed, returns an error indication and leaves secprot and crypt unchanged.

Definition at line 341 of file sec80211.c.

344 {
346  enum net80211_crypto_alg cr;
347  struct descriptor_map *map;
348  u8 *rsn = start;
349 
350  /* Set some defaults */
351  cr = ( is_rsn ? NET80211_CRYPT_CCMP : NET80211_CRYPT_TKIP );
353 
354  rsn += 2; /* version - already checked */
355  rsn += 4; /* group cipher - we don't use it here */
356 
357  if ( rsn >= end )
358  goto done;
359 
360  /* Pick crypto algorithm */
361  map = rsn_pick_desc ( &rsn, end, rsn_cipher_map,
364  if ( ! map )
365  goto invalid_rsn;
366 
367  cr = map->net80211_type;
368 
369  if ( rsn >= end )
370  goto done;
371 
372  /* Pick handshaking algorithm */
373  map = rsn_pick_desc ( &rsn, end, rsn_akm_map,
376  if ( ! map )
377  goto invalid_rsn;
378 
379  sp = map->net80211_type;
380 
381  done:
382  DBG ( "RSN detect: OK, crypto type %d, secprot type %d\n", cr, sp );
383  *secprot = sp;
384  *crypt = cr;
385  return 0;
386 
387  invalid_rsn:
388  DBG ( "RSN detect: invalid RSN IE\n" );
389  return -EINVAL;
390 }
#define EINVAL
Invalid argument.
Definition: errno.h:429
Network protected with CCMP (AES-based system)
Definition: net80211.h:174
#define table_start(table)
Get start of linker table.
Definition: tables.h:283
net80211_security_proto
An 802.11 security handshaking protocol.
Definition: net80211.h:96
Full EAP 802.1X handshaking.
Definition: net80211.h:121
static struct descriptor_map * rsn_pick_desc(u8 **rsnp, u8 *rsn_end, struct descriptor_map *map, void *tbl_start, void *tbl_end)
Determine net80211 crypto or handshaking type value to return for RSN info.
Definition: sec80211.c:187
uint32_t start
Starting offset.
Definition: netvsc.h:12
#define NET80211_CRYPTOS
Definition: net80211.h:769
Mapping from net80211 crypto/secprot types to RSN OUI descriptors.
Definition: sec80211.c:54
#define NET80211_HANDSHAKERS
Definition: net80211.h:675
static struct descriptor_map rsn_cipher_map[]
Mapping between net80211 cryptosystems and 802.11i cipher IDs.
Definition: sec80211.c:66
Definition: sis900.h:22
static __always_inline int struct dma_mapping * map
Definition: dma.h:184
static struct descriptor_map rsn_akm_map[]
Mapping between net80211 handshakers and 802.11i AKM IDs.
Definition: sec80211.c:84
net80211_crypto_alg
An 802.11 data encryption algorithm.
Definition: net80211.h:129
uint32_t end
Ending offset.
Definition: netvsc.h:18
#define table_end(table)
Get end of linker table.
Definition: tables.h:309
Network protected with TKIP (better RC4-based system)
Definition: net80211.h:163
#define DBG(...)
Print a debugging message.
Definition: compiler.h:498
struct bofm_section_header done
Definition: bofm_test.c:46
uint8_t u8
Definition: stdint.h:20
uint16_t sp
Definition: registers.h:27

References cr, DBG, done, EINVAL, end, map, NET80211_CRYPT_CCMP, NET80211_CRYPT_TKIP, NET80211_CRYPTOS, NET80211_HANDSHAKERS, NET80211_SECPROT_EAP, rsn_akm_map, rsn_cipher_map, rsn_pick_desc(), sp, start, table_end, and table_start.

Referenced by sec80211_detect(), and wpa_handle_3_of_4().

◆ sec80211_detect()

int sec80211_detect ( struct io_buffer iob,
enum net80211_security_proto secprot,
enum net80211_crypto_alg crypt 
)

Detect the cryptosystem and handshaking protocol used by an 802.11 network.

Parameters
iobI/O buffer containing beacon frame
Return values
secprotSecurity handshaking protocol used by network
cryptCryptosystem used by network
rcReturn status code

This function uses weak linkage, as it must be called from generic contexts but should only be linked in if some encryption is supported; you must test its address against NULL before calling it. If it does not exist, any network with the PRIVACY bit set in beacon->capab should be considered unknown.

Definition at line 407 of file sec80211.c.

410 {
411  struct ieee80211_frame *hdr = iob->data;
412  struct ieee80211_beacon *beacon =
413  ( struct ieee80211_beacon * ) hdr->data;
414  u8 *rsn, *rsn_end;
415  int is_rsn, rc;
416 
417  *crypt = NET80211_CRYPT_UNKNOWN;
418  *secprot = NET80211_SECPROT_UNKNOWN;
419 
420  /* Find RSN or WPA IE */
421  if ( ! ( rsn = sec80211_find_rsn ( beacon->info_element, iob->tail,
422  &is_rsn, &rsn_end ) ) ) {
423  /* No security IE at all; either WEP or no security. */
424  *secprot = NET80211_SECPROT_NONE;
425 
426  if ( beacon->capability & IEEE80211_CAPAB_PRIVACY )
427  *crypt = NET80211_CRYPT_WEP;
428  else
429  *crypt = NET80211_CRYPT_NONE;
430 
431  return 0;
432  }
433 
434  /* Determine type of security */
435  if ( ( rc = sec80211_detect_ie ( is_rsn, rsn, rsn_end, secprot,
436  crypt ) ) == 0 )
437  return 0;
438 
439  /* If we get here, the RSN IE was invalid */
440 
441  *crypt = NET80211_CRYPT_UNKNOWN;
442  *secprot = NET80211_SECPROT_UNKNOWN;
443  DBG ( "Failed to handle RSN IE:\n" );
444  DBG_HD ( rsn, rsn_end - rsn );
445  return rc;
446 }
struct arbelprm_rc_send_wqe rc
Definition: arbel.h:14
No security handshaking.
Definition: net80211.h:102
Dummy value used when the cryptosystem can't be detected.
Definition: net80211.h:177
#define DBG_HD(...)
Definition: compiler.h:500
struct golan_inbox_hdr hdr
Message header.
Definition: CIB_PRM.h:28
#define IEEE80211_CAPAB_PRIVACY
Set if the network is encrypted (by any method)
Definition: ieee80211.h:401
An 802.11 data or management frame without QoS or WDS header fields.
Definition: ieee80211.h:300
Network protected with WEP (awful RC4-based system)
Definition: net80211.h:145
Dummy value used when the handshaking type can't be detected.
Definition: net80211.h:124
void * tail
End of data.
Definition: iobuf.h:55
#define ieee80211_beacon
Definition: ieee80211.h:1069
No security, an "Open" network.
Definition: net80211.h:131
int sec80211_detect_ie(int is_rsn, u8 *start, u8 *end, enum net80211_security_proto *secprot, enum net80211_crypto_alg *crypt)
Detect crypto and AKM types from RSN information element.
Definition: sec80211.c:341
void * data
Start of data.
Definition: iobuf.h:53
#define DBG(...)
Print a debugging message.
Definition: compiler.h:498
u8 * sec80211_find_rsn(union ieee80211_ie *ie, void *ie_end, int *is_rsn, u8 **end)
Find the RSN or WPA information element in the provided beacon frame.
Definition: sec80211.c:284
uint8_t u8
Definition: stdint.h:20
if(natsemi->flags &NATSEMI_64BIT) return 1

References io_buffer::data, DBG, DBG_HD, hdr, ieee80211_beacon, IEEE80211_CAPAB_PRIVACY, if(), NET80211_CRYPT_NONE, NET80211_CRYPT_UNKNOWN, NET80211_CRYPT_WEP, NET80211_SECPROT_NONE, NET80211_SECPROT_UNKNOWN, rc, sec80211_detect_ie(), sec80211_find_rsn(), and io_buffer::tail.

◆ rsn_get_desc()

static u32 rsn_get_desc ( unsigned  id,
int  rsnie,
struct descriptor_map map 
)
static

Determine RSN descriptor for specified net80211 ID.

Parameters
idnet80211 ID value
rsnieWhether to return a new-format (RSN IE) descriptor
mapMap to use in translation
Return values
descRSN descriptor, or 0 on error

If rsnie is false, returns an old-format (WPA vendor IE) descriptor.

Definition at line 460 of file sec80211.c.

461 {
463 
464  for ( ; map->oui_type != END_MAGIC; map++ ) {
465  if ( map->net80211_type == id )
466  return map->oui_type | vendor;
467  }
468 
469  return 0;
470 }
#define IEEE80211_RSN_OUI
Organization part for OUIs in standard RSN IE.
Definition: ieee80211.h:863
static unsigned short vendor
Definition: davicom.c:128
#define END_MAGIC
Magic number in oui_type showing end of list.
Definition: sec80211.c:63
#define IEEE80211_WPA_OUI
Organization part for OUIs in old WPA IE.
Definition: ieee80211.h:866
static __always_inline int struct dma_mapping * map
Definition: dma.h:184
uint32_t u32
Definition: stdint.h:24

References END_MAGIC, IEEE80211_RSN_OUI, IEEE80211_WPA_OUI, map, and vendor.

Referenced by sec80211_rsn_get_akm_desc(), and sec80211_rsn_get_crypto_desc().

◆ sec80211_rsn_get_crypto_desc()

u32 sec80211_rsn_get_crypto_desc ( enum net80211_crypto_alg  crypt,
int  rsnie 
)

Determine RSN descriptor for specified net80211 cryptosystem number.

Parameters
cryptCryptosystem number
rsnieWhether to return a new-format (RSN IE) descriptor
Return values
descRSN descriptor

If rsnie is false, returns an old-format (WPA vendor IE) descriptor.

Definition at line 482 of file sec80211.c.

483 {
484  return rsn_get_desc ( crypt, rsnie, rsn_cipher_map );
485 }
static u32 rsn_get_desc(unsigned id, int rsnie, struct descriptor_map *map)
Determine RSN descriptor for specified net80211 ID.
Definition: sec80211.c:460
static struct descriptor_map rsn_cipher_map[]
Mapping between net80211 cryptosystems and 802.11i cipher IDs.
Definition: sec80211.c:66

References rsn_cipher_map, and rsn_get_desc().

Referenced by wpa_make_rsn_ie().

◆ sec80211_rsn_get_akm_desc()

u32 sec80211_rsn_get_akm_desc ( enum net80211_security_proto  secprot,
int  rsnie 
)

Determine RSN descriptor for specified net80211 handshaker number.

Parameters
secprotHandshaker number
rsnieWhether to return a new-format (RSN IE) descriptor
Return values
descRSN descriptor

If rsnie is false, returns an old-format (WPA vendor IE) descriptor.

Definition at line 497 of file sec80211.c.

499 {
500  return rsn_get_desc ( secprot, rsnie, rsn_akm_map );
501 }
static u32 rsn_get_desc(unsigned id, int rsnie, struct descriptor_map *map)
Determine RSN descriptor for specified net80211 ID.
Definition: sec80211.c:460
static struct descriptor_map rsn_akm_map[]
Mapping between net80211 handshakers and 802.11i AKM IDs.
Definition: sec80211.c:84

References rsn_akm_map, and rsn_get_desc().

Referenced by wpa_make_rsn_ie().

◆ sec80211_rsn_get_net80211_crypt()

enum net80211_crypto_alg sec80211_rsn_get_net80211_crypt ( u32  desc)

Determine net80211 cryptosystem number from RSN descriptor.

Parameters
descRSN descriptor
Return values
cryptnet80211 cryptosystem enumeration value

Definition at line 509 of file sec80211.c.

510 {
512 
513  for ( ; map->oui_type != END_MAGIC; map++ ) {
514  if ( map->oui_type == ( desc & OUI_TYPE_MASK ) )
515  break;
516  }
517 
518  return map->net80211_type;
519 }
#define OUI_TYPE_MASK
Definition: ieee80211.h:859
#define END_MAGIC
Magic number in oui_type showing end of list.
Definition: sec80211.c:63
struct ena_llq_option desc
Descriptor counts.
Definition: ena.h:20
Mapping from net80211 crypto/secprot types to RSN OUI descriptors.
Definition: sec80211.c:54
static struct descriptor_map rsn_cipher_map[]
Mapping between net80211 cryptosystems and 802.11i cipher IDs.
Definition: sec80211.c:66
static __always_inline int struct dma_mapping * map
Definition: dma.h:184

References desc, END_MAGIC, map, OUI_TYPE_MASK, and rsn_cipher_map.

Referenced by wpa_handle_3_of_4(), and wpa_make_rsn_ie().

Variable Documentation

◆ rsn_cipher_map

struct descriptor_map rsn_cipher_map[]
static
Initial value:
= {
{ .net80211_type = NET80211_CRYPT_WEP,
{ .net80211_type = NET80211_CRYPT_WEP,
{ .net80211_type = NET80211_CRYPT_TKIP,
.oui_type = IEEE80211_RSN_CTYPE_TKIP },
{ .net80211_type = NET80211_CRYPT_CCMP,
.oui_type = IEEE80211_RSN_CTYPE_CCMP },
{ .net80211_type = NET80211_CRYPT_UNKNOWN,
.oui_type = END_MAGIC },
}
#define IEEE80211_RSN_CTYPE_CCMP
802.11 RSN IE: cipher type for CCMP ("WPA2")
Definition: ieee80211.h:885
Network protected with CCMP (AES-based system)
Definition: net80211.h:174
Dummy value used when the cryptosystem can't be detected.
Definition: net80211.h:177
#define IEEE80211_RSN_CTYPE_WEP104
802.11 RSN IE: cipher type for 104-bit WEP
Definition: ieee80211.h:879
#define IEEE80211_RSN_CTYPE_WEP40
802.11 RSN IE: cipher type for 40-bit WEP
Definition: ieee80211.h:876
Network protected with WEP (awful RC4-based system)
Definition: net80211.h:145
#define END_MAGIC
Magic number in oui_type showing end of list.
Definition: sec80211.c:63
#define IEEE80211_RSN_CTYPE_TKIP
802.11 RSN IE: cipher type for TKIP ("WPA")
Definition: ieee80211.h:882
Network protected with TKIP (better RC4-based system)
Definition: net80211.h:163

Mapping between net80211 cryptosystems and 802.11i cipher IDs.

Definition at line 66 of file sec80211.c.

Referenced by rsn_pick_desc(), sec80211_detect_ie(), sec80211_rsn_get_crypto_desc(), and sec80211_rsn_get_net80211_crypt().

◆ rsn_akm_map

struct descriptor_map rsn_akm_map[]
static
Initial value:
= {
{ .net80211_type = NET80211_SECPROT_EAP,
{ .net80211_type = NET80211_SECPROT_PSK,
.oui_type = IEEE80211_RSN_ATYPE_PSK },
{ .net80211_type = NET80211_SECPROT_UNKNOWN,
.oui_type = END_MAGIC },
}
#define IEEE80211_RSN_ATYPE_8021X
802.11 RSN IE: auth method type for using an 802.1X server
Definition: ieee80211.h:895
Full EAP 802.1X handshaking.
Definition: net80211.h:121
Dummy value used when the handshaking type can't be detected.
Definition: net80211.h:124
#define END_MAGIC
Magic number in oui_type showing end of list.
Definition: sec80211.c:63
#define IEEE80211_RSN_ATYPE_PSK
802.11 RSN IE: auth method type for using a pre-shared key
Definition: ieee80211.h:898
Pre-shared key handshaking.
Definition: net80211.h:112

Mapping between net80211 handshakers and 802.11i AKM IDs.

Definition at line 84 of file sec80211.c.

Referenced by sec80211_detect_ie(), and sec80211_rsn_get_akm_desc().