1use crate::recorded_request_stream::RecordedRequestStream;
6use fidl_fuchsia_wlan_mlme::EapolResultCode;
7use ieee80211::MacAddr;
8use std::sync::{Arc, Mutex};
9use wlan_common::ie::rsn::cipher::{CIPHER_BIP_CMAC_128, CIPHER_CCMP_128};
10use wlan_common::ie::rsn::rsne;
11use wlan_common::{assert_variant, bss};
12use wlan_rsn::rsna::{SecAssocUpdate, UpdateSink};
13use wlan_rsn::Authenticator;
14use zerocopy::IntoBytes;
15use {
16 fidl_fuchsia_wlan_common_security as fidl_wlan_security,
17 fidl_fuchsia_wlan_fullmac as fidl_fullmac, fidl_fuchsia_wlan_mlme as fidl_mlme,
18};
19
20pub fn create_wpa2_authenticator(
22 client_mac_addr: MacAddr,
23 bss_description: &bss::BssDescription,
24 credentials: fidl_wlan_security::WpaCredentials,
25) -> Authenticator {
26 assert_eq!(bss_description.protection(), bss::Protection::Wpa2Personal);
27
28 let advertised_protection_info = get_protection_info(bss_description);
30 let supplicant_protection_info = get_protection_info(bss_description);
31
32 let nonce_rdr = wlan_rsn::nonce::NonceReader::new(&bss_description.bssid.clone().into())
33 .expect("creating nonce reader");
34 let gtk_provider =
35 wlan_rsn::GtkProvider::new(CIPHER_CCMP_128, 1, 0).expect("creating gtk provider");
36
37 let psk = match credentials {
38 fidl_wlan_security::WpaCredentials::Passphrase(passphrase) => {
39 wlan_rsn::psk::compute(passphrase.as_bytes(), &bss_description.ssid)
40 .expect("Could not compute psk")
41 }
42 fidl_wlan_security::WpaCredentials::Psk(psk) => Box::new(psk),
43 _ => panic!("Unsupported credential type"),
44 };
45
46 Authenticator::new_wpa2psk_ccmp128(
47 nonce_rdr,
48 Arc::new(Mutex::new(gtk_provider)),
49 psk,
50 client_mac_addr,
51 supplicant_protection_info,
52 bss_description.bssid.clone().into(),
53 advertised_protection_info,
54 )
55 .expect("Failed to create authenticator")
56}
57
58pub fn create_wpa3_authenticator(
60 client_mac_addr: MacAddr,
61 bss_description: &bss::BssDescription,
62 credentials: fidl_wlan_security::WpaCredentials,
63) -> Authenticator {
64 assert_eq!(bss_description.protection(), bss::Protection::Wpa3Personal);
65
66 let advertised_protection_info = get_protection_info(bss_description);
68 let supplicant_protection_info = get_protection_info(bss_description);
69
70 let password =
71 assert_variant!(credentials, fidl_wlan_security::WpaCredentials::Passphrase(p) => p);
72
73 let nonce_rdr = wlan_rsn::nonce::NonceReader::new(&bss_description.bssid.clone().into())
74 .expect("creating nonce reader");
75 let gtk_provider =
76 wlan_rsn::GtkProvider::new(CIPHER_CCMP_128, 1, 0).expect("creating gtk provider");
77 let igtk_provider =
78 wlan_rsn::IgtkProvider::new(CIPHER_BIP_CMAC_128).expect("error creating IgtkProvider");
79
80 Authenticator::new_wpa3(
81 nonce_rdr,
82 Arc::new(Mutex::new(gtk_provider)),
83 Arc::new(Mutex::new(igtk_provider)),
84 bss_description.ssid.clone(),
85 password,
86 client_mac_addr,
87 supplicant_protection_info.clone(),
88 bss_description.bssid.into(),
89 advertised_protection_info,
90 )
91 .expect("Failed to create authenticator")
92}
93
94pub async fn handle_sae_exchange(
107 authenticator: &mut Authenticator,
108 fullmac_req_stream: &mut RecordedRequestStream,
109 fullmac_ifc_proxy: &fidl_fullmac::WlanFullmacImplIfcProxy,
110) -> UpdateSink {
111 let mut update_sink = UpdateSink::new();
112
113 let supplicant_commit_frame = get_sae_frame_from_test_realm(fullmac_req_stream).await;
115 authenticator
116 .on_sae_frame_rx(&mut update_sink, supplicant_commit_frame)
117 .expect("Failed to send SAE commit frame to authenticator");
118
119 let authenticator_commit_frame = assert_variant!(
122 &update_sink[0], SecAssocUpdate::TxSaeFrame(frame) => frame.clone());
123 let authenticator_confirm_frame = assert_variant!(
124 &update_sink[1], SecAssocUpdate::TxSaeFrame(frame) => frame.clone());
125 update_sink.clear();
126
127 send_sae_frame_to_test_realm(authenticator_commit_frame, fullmac_ifc_proxy).await;
129
130 let supplicant_confirm_frame = get_sae_frame_from_test_realm(fullmac_req_stream).await;
132 authenticator
133 .on_sae_frame_rx(&mut update_sink, supplicant_confirm_frame)
134 .expect("Failed to send SAE confirm frame to authenticator");
135
136 send_sae_frame_to_test_realm(authenticator_confirm_frame, fullmac_ifc_proxy).await;
138
139 update_sink
140}
141
142pub async fn handle_fourway_eapol_handshake(
151 authenticator: &mut Authenticator,
152 frame_to_client: eapol::KeyFrameBuf,
153 bssid: [u8; 6],
154 client_sta_addr: [u8; 6],
155 fullmac_req_stream: &mut RecordedRequestStream,
156 fullmac_ifc_proxy: &fidl_fullmac::WlanFullmacImplIfcProxy,
157) -> UpdateSink {
158 let mut update_sink = UpdateSink::new();
159 let mic_size = authenticator.get_negotiated_protection().mic_size;
160
161 send_eapol_frame_to_test_realm(
162 authenticator,
163 frame_to_client,
164 bssid.clone(),
165 client_sta_addr.clone(),
166 fullmac_ifc_proxy,
167 )
168 .await;
169 let frame_to_auth_data =
170 get_eapol_frame_from_test_realm(bssid.clone(), fullmac_req_stream, fullmac_ifc_proxy).await;
171 let frame_to_auth = eapol::KeyFrameRx::parse(mic_size as usize, &frame_to_auth_data[..])
172 .expect("Could not parse EAPOL key frame");
173 authenticator
174 .on_eapol_frame(&mut update_sink, eapol::Frame::Key(frame_to_auth))
175 .expect("Could not send EAPOL frame to authenticator");
176
177 let frame_to_client = assert_variant!(update_sink.remove(0), SecAssocUpdate::TxEapolKeyFrame { frame, .. } => frame);
178 send_eapol_frame_to_test_realm(
179 authenticator,
180 frame_to_client,
181 bssid.clone(),
182 client_sta_addr.clone(),
183 fullmac_ifc_proxy,
184 )
185 .await;
186 let frame_to_auth_data =
187 get_eapol_frame_from_test_realm(bssid.clone(), fullmac_req_stream, fullmac_ifc_proxy).await;
188 let frame_to_auth = eapol::KeyFrameRx::parse(mic_size as usize, &frame_to_auth_data[..])
189 .expect("Could not parse EAPOL key frame");
190 authenticator
191 .on_eapol_frame(&mut update_sink, eapol::Frame::Key(frame_to_auth))
192 .expect("Could not send EAPOL frame to authenticator");
193
194 update_sink
195}
196
197async fn send_eapol_frame_to_test_realm(
199 authenticator: &mut Authenticator,
200 frame: eapol::KeyFrameBuf,
201 authenticator_addr: [u8; 6],
202 client_addr: [u8; 6],
203 fullmac_ifc_proxy: &fidl_fullmac::WlanFullmacImplIfcProxy,
204) {
205 fullmac_ifc_proxy
206 .eapol_ind(&fidl_fullmac::WlanFullmacImplIfcEapolIndRequest {
207 src_addr: Some(authenticator_addr),
208 dst_addr: Some(client_addr),
209 data: Some(frame.into()),
210 ..Default::default()
211 })
212 .await
213 .expect("Could not send EAPOL ind");
214 let mut update_sink = UpdateSink::new();
215 authenticator
216 .on_eapol_conf(&mut update_sink, EapolResultCode::Success)
217 .expect("Could not send EAPOL conf to authenticator");
218 assert_eq!(update_sink.len(), 0);
219}
220
221async fn get_eapol_frame_from_test_realm(
223 authenticator_addr: [u8; 6],
224 fullmac_req_stream: &mut RecordedRequestStream,
225 fullmac_ifc_proxy: &fidl_fullmac::WlanFullmacImplIfcProxy,
226) -> Vec<u8> {
227 let frame_data = assert_variant!(fullmac_req_stream.next().await,
228 fidl_fullmac::WlanFullmacImpl_Request::EapolTx { payload, responder } => {
229 responder
230 .send()
231 .expect("Failed to respond to EapolTx");
232 payload.data.unwrap()
233 });
234
235 fullmac_ifc_proxy
236 .eapol_conf(&fidl_fullmac::WlanFullmacImplIfcEapolConfRequest {
237 result_code: Some(fidl_fullmac::EapolTxResult::Success),
238 dst_addr: Some(authenticator_addr),
239 ..Default::default()
240 })
241 .await
242 .expect("Could not send EAPOL conf");
243
244 frame_data
245}
246
247fn get_protection_info(bss_description: &bss::BssDescription) -> wlan_rsn::ProtectionInfo {
248 let (_, rsne) = rsne::from_bytes(bss_description.rsne().unwrap()).expect("Could not get RSNE");
249 wlan_rsn::ProtectionInfo::Rsne(rsne)
250}
251
252async fn get_sae_frame_from_test_realm(
253 fullmac_req_stream: &mut RecordedRequestStream,
254) -> fidl_mlme::SaeFrame {
255 let fullmac_sae_frame = assert_variant!(fullmac_req_stream.next().await,
256 fidl_fullmac::WlanFullmacImpl_Request::SaeFrameTx { frame, responder } => {
257 responder
258 .send()
259 .expect("Failed to respond to SaeFrameTx");
260 frame
261 });
262
263 fidl_mlme::SaeFrame {
264 peer_sta_address: fullmac_sae_frame.peer_sta_address.unwrap(),
265 status_code: fullmac_sae_frame.status_code.unwrap(),
266 seq_num: fullmac_sae_frame.seq_num.unwrap(),
267 sae_fields: fullmac_sae_frame.sae_fields.unwrap(),
268 }
269}
270
271async fn send_sae_frame_to_test_realm(
272 frame: fidl_mlme::SaeFrame,
273 fullmac_ifc_proxy: &fidl_fullmac::WlanFullmacImplIfcProxy,
274) {
275 fullmac_ifc_proxy
276 .sae_frame_rx(&fidl_fullmac::SaeFrame {
277 peer_sta_address: Some(frame.peer_sta_address),
278 status_code: Some(frame.status_code),
279 seq_num: Some(frame.seq_num),
280 sae_fields: Some(frame.sae_fields.clone()),
281 ..Default::default()
282 })
283 .await
284 .expect("Could not send authenticator SAE commit frame");
285}