summaryrefslogtreecommitdiffstats
path: root/epan/crypt/dot11decrypt_system.h
diff options
context:
space:
mode:
authorDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
committerDaniel Baumann <daniel.baumann@progress-linux.org>2024-04-10 20:34:10 +0000
commite4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc (patch)
tree68cb5ef9081156392f1dd62a00c6ccc1451b93df /epan/crypt/dot11decrypt_system.h
parentInitial commit. (diff)
downloadwireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.tar.xz
wireshark-e4ba6dbc3f1e76890b22773807ea37fe8fa2b1bc.zip
Adding upstream version 4.2.2.upstream/4.2.2
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'epan/crypt/dot11decrypt_system.h')
-rw-r--r--epan/crypt/dot11decrypt_system.h463
1 files changed, 463 insertions, 0 deletions
diff --git a/epan/crypt/dot11decrypt_system.h b/epan/crypt/dot11decrypt_system.h
new file mode 100644
index 00000000..19ecb297
--- /dev/null
+++ b/epan/crypt/dot11decrypt_system.h
@@ -0,0 +1,463 @@
+/** @file
+ *
+ * Copyright (c) 2006 CACE Technologies, Davis (California)
+ * All rights reserved.
+ *
+ * SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
+ */
+
+#ifndef _DOT11DECRYPT_SYSTEM_H
+#define _DOT11DECRYPT_SYSTEM_H
+
+/************************************************************************/
+/* Constant definitions */
+
+/* General definitions */
+#define DOT11DECRYPT_RET_SUCCESS 0
+#define DOT11DECRYPT_RET_UNSUCCESS 1
+
+#define DOT11DECRYPT_RET_NO_DATA 1
+#define DOT11DECRYPT_RET_WRONG_DATA_SIZE 2
+#define DOT11DECRYPT_RET_REQ_DATA 3
+#define DOT11DECRYPT_RET_NO_VALID_HANDSHAKE 4
+#define DOT11DECRYPT_RET_NO_DATA_ENCRYPTED 5
+
+#define DOT11DECRYPT_RET_SUCCESS_HANDSHAKE -1
+
+#define DOT11DECRYPT_MAX_KEYS_NR 64
+
+/* Decryption algorithms fields size definition (bytes) */
+#define DOT11DECRYPT_WPA_NONCE_LEN 32
+#define DOT11DECRYPT_WPA_PTK_MAX_LEN 88 /* TKIP 48, CCMP 64, GCMP-256 88 bytes */
+#define DOT11DECRYPT_WPA_MICKEY_MAX_LEN 24
+
+#define DOT11DECRYPT_WEP_128_KEY_LEN 16 /* 128 bits */
+
+/* General 802.11 constants */
+#define DOT11DECRYPT_MAC_LEN 6
+#define DOT11DECRYPT_RADIOTAP_HEADER_LEN 24
+
+#define DOT11DECRYPT_EAPOL_MAX_LEN 1024U
+
+#define DOT11DECRYPT_TK_LEN 16
+
+/* Max length of capture data */
+#define DOT11DECRYPT_MAX_CAPLEN 8192
+
+#define DOT11DECRYPT_WEP_IVLEN 3 /* 24bit */
+#define DOT11DECRYPT_WEP_KIDLEN 1 /* 1 octet */
+#define DOT11DECRYPT_WEP_ICV 4
+#define DOT11DECRYPT_WEP_HEADER DOT11DECRYPT_WEP_IVLEN + DOT11DECRYPT_WEP_KIDLEN
+#define DOT11DECRYPT_WEP_TRAILER DOT11DECRYPT_WEP_ICV
+
+/*
+ * 802.11i defines an extended IV for use with non-WEP ciphers.
+ * When the EXTIV bit is set in the key id byte an additional
+ * 4 bytes immediately follow the IV for TKIP. For CCMP the
+ * EXTIV bit is likewise set but the 8 bytes represent the
+ * CCMP header rather than IV+extended-IV.
+ */
+#define DOT11DECRYPT_RSNA_EXTIV 0x20
+#define DOT11DECRYPT_RSNA_EXTIVLEN 4 /* extended IV length */
+#define DOT11DECRYPT_TKIP_MICLEN 8 /* trailing MIC */
+
+#define DOT11DECRYPT_RSNA_HEADER DOT11DECRYPT_WEP_HEADER + DOT11DECRYPT_RSNA_EXTIVLEN
+
+#define DOT11DECRYPT_CCMP_HEADER DOT11DECRYPT_RSNA_HEADER
+#define DOT11DECRYPT_CCMP_TRAILER 8 /* IEEE 802.11-2016 12.5.3.2 CCMP MPDU format */
+#define DOT11DECRYPT_CCMP_256_TRAILER 16 /* IEEE 802.11-2016 12.5.3.2 CCMP MPDU format */
+
+#define DOT11DECRYPT_GCMP_HEADER 8 /* IEEE 802.11-206 12.5.5.2 GCMP MPDU format */
+#define DOT11DECRYPT_GCMP_TRAILER 16
+
+#define DOT11DECRYPT_TKIP_HEADER DOT11DECRYPT_RSNA_HEADER
+#define DOT11DECRYPT_TKIP_TRAILER DOT11DECRYPT_TKIP_MICLEN + DOT11DECRYPT_WEP_ICV
+
+#define DOT11DECRYPT_CRC_LEN 4
+
+/************************************************************************/
+/* File includes */
+
+#include <stdint.h>
+#include <stdbool.h>
+
+#include "dot11decrypt_user.h"
+#include "ws_symbol_export.h"
+
+/************************************************************************/
+/* Macro definitions */
+
+/************************************************************************/
+/* Type definitions */
+
+typedef struct _DOT11DECRYPT_SEC_ASSOCIATION_ID {
+ unsigned char bssid[DOT11DECRYPT_MAC_LEN];
+ unsigned char sta[DOT11DECRYPT_MAC_LEN];
+} DOT11DECRYPT_SEC_ASSOCIATION_ID, *PDOT11DECRYPT_SEC_ASSOCIATION_ID;
+
+typedef struct _DOT11DECRYPT_SEC_ASSOCIATION {
+ /* This is for reassociations. A linked list of old security
+ * associations is kept. GCS
+ */
+ struct _DOT11DECRYPT_SEC_ASSOCIATION* next;
+
+ DOT11DECRYPT_SEC_ASSOCIATION_ID saId;
+ DOT11DECRYPT_KEY_ITEM *key;
+ uint8_t handshake;
+ uint8_t validKey;
+
+ struct {
+ uint8_t key_ver; /* Key descriptor version */
+ unsigned char nonce[DOT11DECRYPT_WPA_NONCE_LEN];
+ /* used to derive PTK, ANonce stored, SNonce taken */
+ /* the 2nd packet of the 4W handshake */
+ int akm;
+ int cipher;
+ int tmp_group_cipher; /* Keep between HS msg 2 and 3 */
+ unsigned char ptk[DOT11DECRYPT_WPA_PTK_MAX_LEN]; /* session key used in decryption algorithm */
+ int ptk_len;
+ } wpa;
+
+
+} DOT11DECRYPT_SEC_ASSOCIATION, *PDOT11DECRYPT_SEC_ASSOCIATION;
+
+typedef struct _DOT11DECRYPT_CONTEXT {
+ GHashTable *sa_hash;
+ DOT11DECRYPT_KEY_ITEM keys[DOT11DECRYPT_MAX_KEYS_NR];
+ size_t keys_nr;
+ char pkt_ssid[DOT11DECRYPT_WPA_SSID_MAX_LEN];
+ size_t pkt_ssid_len;
+} DOT11DECRYPT_CONTEXT, *PDOT11DECRYPT_CONTEXT;
+
+typedef enum _DOT11DECRYPT_HS_MSG_TYPE {
+ DOT11DECRYPT_HS_MSG_TYPE_INVALID = 0,
+ DOT11DECRYPT_HS_MSG_TYPE_4WHS_1,
+ DOT11DECRYPT_HS_MSG_TYPE_4WHS_2,
+ DOT11DECRYPT_HS_MSG_TYPE_4WHS_3,
+ DOT11DECRYPT_HS_MSG_TYPE_4WHS_4,
+ DOT11DECRYPT_HS_MSG_TYPE_GHS_1,
+ DOT11DECRYPT_HS_MSG_TYPE_GHS_2
+} DOT11DECRYPT_HS_MSG_TYPE;
+
+typedef struct _DOT11DECRYPT_FTE {
+ uint8_t *mic;
+ uint8_t mic_len;
+ uint8_t *anonce;
+ uint8_t *snonce;
+ uint8_t *r0kh_id;
+ uint8_t r0kh_id_len;
+ uint8_t *r1kh_id;
+ uint8_t r1kh_id_len;
+} DOT11DECRYPT_FTE, *PDOT11DECRYPT_FTE;
+
+typedef struct _DOT11DECRYPT_EAPOL_PARSED {
+ DOT11DECRYPT_HS_MSG_TYPE msg_type;
+ uint16_t len;
+ uint8_t key_type;
+ uint8_t key_version;
+ uint16_t key_len;
+ uint8_t *key_iv;
+ uint8_t *key_data;
+ uint16_t key_data_len;
+ uint8_t group_cipher;
+ uint8_t cipher;
+ uint8_t akm;
+ uint8_t *nonce;
+ uint8_t *mic;
+ uint16_t mic_len;
+ uint8_t *gtk;
+ uint16_t gtk_len;
+
+ /* For fast bss transition akms */
+ uint8_t *mdid;
+ DOT11DECRYPT_FTE fte;
+} DOT11DECRYPT_EAPOL_PARSED, *PDOT11DECRYPT_EAPOL_PARSED;
+
+typedef struct _DOT11DECRYPT_ASSOC_PARSED
+{
+ uint8_t frame_subtype;
+ uint8_t group_cipher;
+ uint8_t cipher;
+ uint8_t akm;
+ uint8_t *mdid;
+ DOT11DECRYPT_FTE fte;
+ uint8_t* rsne_tag;
+ uint8_t* mde_tag;
+ uint8_t* fte_tag;
+ uint8_t* rde_tag;
+ uint8_t *gtk;
+ uint16_t gtk_len;
+ uint16_t gtk_subelem_key_len;
+ uint8_t bssid[DOT11DECRYPT_MAC_LEN];
+ uint8_t sa[DOT11DECRYPT_MAC_LEN];
+ uint8_t da[DOT11DECRYPT_MAC_LEN];
+} DOT11DECRYPT_ASSOC_PARSED, *PDOT11DECRYPT_ASSOC_PARSED;
+
+/************************************************************************/
+/* Function prototype declarations */
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+
+/**
+ * This will try to decrypt a 802.11 frame.
+ * @param ctx [IN] Pointer to the current context
+ * @param data [IN] Pointer to a buffer with an 802.11 frame, including MAC
+ * header and payload
+ * @param data_off [IN] Payload offset (aka the MAC header length)
+ * @param data_len [IN] Total length of the MAC header and the payload
+ * @param decrypt_data [OUT] Pointer to a buffer that will contain
+ * decrypted data. Must have room for at least DOT11DECRYPT_MAX_CAPLEN bytes.
+ * @param decrypt_len [OUT] Length of decrypted data.
+ * @param key [OUT] Pointer to a preallocated key structure containing
+ * the key used during the decryption process (if done). If this parameter
+ * is set to NULL, the key will be not returned.
+ * @return
+ * - DOT11DECRYPT_RET_SUCCESS: Decryption has been done (decrypt_data and
+ * decrypt_length will contain the packet data decrypted and the length of
+ * the new packet)
+ * - DOT11DECRYPT_RET_NO_DATA: The packet is not a data packet
+ * - DOT11DECRYPT_RET_WRONG_DATA_SIZE: The size of the packet is below the
+ * accepted minimum
+ * - DOT11DECRYPT_RET_REQ_DATA: Required data is not available and the
+ * processing must be interrupted
+ * - DOT11DECRYPT_RET_NO_DATA_ENCRYPTED: Not encrypted
+ * - DOT11DECRYPT_RET_UNSUCCESS: Generic unspecified error (decrypt_data
+ * and decrypt_length will be not modified).
+ * @note
+ * The decrypted buffer should be allocated for a size equal or greater
+ * than the packet data buffer size. Before decryption process original
+ * data is copied in the buffer pointed by decrypt_data not to modify the
+ * original packet.
+ * @note
+ * The length of decrypted data will consider the entire 802.11 frame
+ * (thus the MAC header, the frame body and the recalculated FCS -if
+ * initially present-)
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions on the same context.
+ */
+
+extern int Dot11DecryptDecryptPacket(
+ PDOT11DECRYPT_CONTEXT ctx,
+ const uint8_t *data,
+ const unsigned data_off,
+ const unsigned data_len,
+ unsigned char *decrypt_data,
+ uint32_t *decrypt_len,
+ PDOT11DECRYPT_KEY_ITEM key)
+ ;
+
+/**
+ * This will try to decrypt the encrypted keydata field of an EAPOL KEY frame.
+ * @param ctx [IN] Pointer to the current context
+ * @param eapol_parsed [IN] Extracted/Parsed pieces of eapol frame
+ * @param bssid [IN] bssid of AP
+ * @param sta [IN] sta MAC address
+ * @param decrypted_data [OUT] Pointer to a buffer that will contain
+ * decrypted data. Must have room for at least DOT11DECRYPT_EAPOL_MAX_LEN bytes.
+ * @param decrypted_len [OUT] Length of decrypted data.
+ * @param key [OUT] Pointer to a preallocated key structure containing
+ * the key used during the decryption process (if done). If this parameter
+ * is set to NULL, the key will be not returned.
+ * @return
+ * - DOT11DECRYPT_RET_SUCCESS: Decryption has been done (decrypt_data and
+ * decrypt_length will contain the packet data decrypted and the length of
+ * the new packet)
+ * - DOT11DECRYPT_RET_UNSUCCESS: Generic unspecified error (decrypt_data
+ * and decrypt_length will be not modified).
+ */
+extern int
+Dot11DecryptDecryptKeyData(PDOT11DECRYPT_CONTEXT ctx,
+ PDOT11DECRYPT_EAPOL_PARSED eapol_parsed,
+ const unsigned char bssid[DOT11DECRYPT_MAC_LEN],
+ const unsigned char sta[DOT11DECRYPT_MAC_LEN],
+ unsigned char *decrypted_data, unsigned *decrypted_len,
+ PDOT11DECRYPT_KEY_ITEM key)
+ ;
+
+/**
+ * This will try to extract keys from an EAPOL frame and add corresponding
+ * SAs to current context. eapol_parsed must contain the already parsed EAPOL
+ * key frame and for frames that contain encrypted EAPOL keydata the keydata
+ * must first be decrypted with Dot11DecryptDecryptKeyData before calling this
+ * function.
+ * @param ctx [IN] Pointer to the current context
+ * @param eapol_parsed [IN] Extracted/Parsed pieces of eapol frame
+ * @param eapol_raw [IN] Pointer to a buffer with an EAPOL frame
+ * @param tot_len [IN] Total length of the EAPOL frame
+ * @param bssid [IN] bssid of AP
+ * @param sta [IN] sta MAC address
+ * @return
+ * - DOT11DECRYPT_RET_REQ_DATA: Required data is not available and the
+ * processing must be interrupted
+ * - DOT11DECRYPT_RET_UNSUCCESS: Generic unspecified error (decrypt_data
+ * and decrypt_length will be not modified).
+ * - DOT11DECRYPT_RET_SUCCESS_HANDSHAKE: An eapol handshake packet was successfuly parsed
+ * and key information extracted.
+ * - DOT11DECRYPT_RET_NO_VALID_HANDSHAKE: The handshake is invalid or was not used
+ * for some reason. For encrypted packets decryption was still successful.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions on the same context.
+ */
+extern int Dot11DecryptScanEapolForKeys(
+ PDOT11DECRYPT_CONTEXT ctx,
+ PDOT11DECRYPT_EAPOL_PARSED eapol_parsed,
+ const uint8_t *eapol_raw,
+ const unsigned tot_len,
+ const unsigned char bssid[DOT11DECRYPT_MAC_LEN],
+ const unsigned char sta[DOT11DECRYPT_MAC_LEN])
+ ;
+
+/**
+ * This will try to extract keys from an FT (re)association frame and add
+ * corresponding SAs to current context. assoc_parsed must contain the already
+ * parsed association frame content. If the FT BSS Transition IE contains an
+ * encrypted GTK subelem and decryption is successful the decrypted GTK will
+ * be returned in decrypted_gtk.
+ * @param ctx [IN] Pointer to the current context
+ * @param assoc_parsed [IN] Extracted/Parsed pieces of association frame
+ * @param decrypted_gtk [OUT] Buffer for decrypted GTK subelem
+ * @param decrypted_len [OUT] Decrypted GTK subelem key length
+ * @param used_key [OUT] Buffer to hold the key used during the decryption process.
+ * @return
+ * - DOT11DECRYPT_RET_UNSUCCESS: Generic unspecified error (decrypted_gtk
+ * and decrypted_len will be not modified).
+ * - DOT11DECRYPT_RET_SUCCESS_HANDSHAKE: An association frame was successfuly parsed
+ * and key information extracted.
+ * - DOT11DECRYPT_RET_NO_VALID_HANDSHAKE: The association is invalid or no matching
+ * key for decryption was found.
+ */
+int
+Dot11DecryptScanFtAssocForKeys(
+ const PDOT11DECRYPT_CONTEXT ctx,
+ const PDOT11DECRYPT_ASSOC_PARSED assoc_parsed,
+ uint8_t *decrypted_gtk, size_t *decrypted_len,
+ DOT11DECRYPT_KEY_ITEM* used_key);
+
+/**
+ * This will try to extract keys from a TDLS action frame (without MAC headers)
+ * and add corresponding SAs to current context.
+ * @param ctx [IN] Pointer to the current context
+ * @param data [IN] Pointer to a buffer with a TDLS action frame
+ * @param tot_len [IN] Total length of the TDLS action frame
+ * @return
+ * - DOT11DECRYPT_RET_REQ_DATA: Required data is not available and the
+ * processing must be interrupted
+ * - DOT11DECRYPT_RET_SUCCESS_HANDSHAKE: The TDLS action frame was successfuly parsed
+ * and key information extracted.
+ * - DOT11DECRYPT_RET_NO_VALID_HANDSHAKE: No keys extracted
+ */
+extern int Dot11DecryptScanTdlsForKeys(
+ PDOT11DECRYPT_CONTEXT ctx,
+ const uint8_t *data,
+ const unsigned tot_len)
+ ;
+
+/**
+ * These are helper functions to retrieve KCK, KEK, TK portion of PTK
+ * for a certain "key"
+ * @param key [IN] Pointer to a key structure containing the key retrieved
+ * from functions Dot11DecryptDecryptPacket, Dot11DecryptKeydata
+ * @param kck [OUT] Pointer to the KCK/KEK/TK portion of PTK.
+ * @return length in bytes of KCK/KEK/TK
+ */
+int
+Dot11DecryptGetKCK(const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **kck);
+
+int
+Dot11DecryptGetKEK(const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **kek);
+
+int
+Dot11DecryptGetTK(const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **tk);
+
+int
+Dot11DecryptGetGTK(const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **gtk);
+
+/**
+ * It sets a new keys collection to use during packet processing.
+ * Any key should be well-formed, thus: it should have a defined key
+ * type and the specified length should be conforming WEP or WPA/WPA2
+ * standards. A general WEP keys could be of any length (in the range
+ * defined in DOT11DECRYPT_KEY_ITEM), if a specific WEP key is used, the
+ * length of the key will be the one specified in 802.11i-2004 (40 bits or
+ * 104 bits).
+ * For WPA/WPA2 the password (passphrase and SSID), the PSK and the PMK
+ * are in alternative, as explain in the DOT11DECRYPT_KEY_ITEM structure
+ * description.
+ * @param ctx [IN] pointer to the current context
+ * @param keys [IN] an array of keys to set.
+ * @param keys_nr [IN] the size of the keys array
+ * @return The number of keys correctly inserted in the current database.
+ * @note Before inserting new keys, the current database will be cleaned.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+extern int Dot11DecryptSetKeys(
+ PDOT11DECRYPT_CONTEXT ctx,
+ DOT11DECRYPT_KEY_ITEM keys[],
+ const size_t keys_nr)
+ ;
+
+/**
+ * Sets the "last seen" SSID. This allows us to pick up previous
+ * SSIDs and use them when "wildcard" passphrases are specified
+ * in the preferences.
+ * @param ctx [IN|OUT] pointer to a preallocated context structure
+ * @param pkt_ssid [IN] pointer to the packet's SSID
+ * @param pkt_ssid_len [IN] length of the packet's SSID
+ * @return
+ * DOT11DECRYPT_RET_SUCCESS: The key has been set.
+ * DOT11DECRYPT_RET_UNSUCCESS: The has not been set, e.g. the length was
+ * too long.
+ */
+int Dot11DecryptSetLastSSID(
+ PDOT11DECRYPT_CONTEXT ctx,
+ char *pkt_ssid,
+ size_t pkt_ssid_len)
+ ;
+
+/**
+ * Initialize a context used to manage decryption and keys collection.
+ * @param ctx [IN|OUT] pointer to a preallocated context structure
+ * @return
+ * DOT11DECRYPT_RET_SUCCESS: the context has been successfully initialized
+ * DOT11DECRYPT_RET_UNSUCCESS: the context has not been initialized
+ * @note
+ * Only a correctly initialized context can be used to manage decryption
+ * processes and keys.
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same context.
+ */
+WS_DLL_PUBLIC
+int Dot11DecryptInitContext(
+ PDOT11DECRYPT_CONTEXT ctx)
+ ;
+
+/**
+ * Clean up the specified context. After the cleanup the pointer should
+ * not be used anymore.
+ * @param ctx [IN|OUT] pointer to the current context structure
+ * @return
+ * DOT11DECRYPT_RET_SUCCESS: the context has been successfully initialized
+ * DOT11DECRYPT_RET_UNSUCCESS: the context has not been initialized
+ * @note
+ * This function is not thread-safe when used in parallel with context
+ * management functions and the packet process function on the same
+ * context.
+ */
+WS_DLL_PUBLIC
+int Dot11DecryptDestroyContext(
+ PDOT11DECRYPT_CONTEXT ctx)
+ ;
+
+#ifdef __cplusplus
+}
+#endif
+
+#endif /* _DOT11DECRYPT_SYSTEM_H */