diff options
author | Gerald Combs <gerald@wireshark.org> | 2006-12-28 17:22:12 +0000 |
---|---|---|
committer | Gerald Combs <gerald@wireshark.org> | 2006-12-28 17:22:12 +0000 |
commit | bd282b4114be8c7060fbc3873a04b80ec18317b8 (patch) | |
tree | ef14ce379885a746930a9839b20bebb530b35d04 /epan/crypt | |
parent | 60180815a6a70d264fdf4f6ff9f49eeb1a7c6742 (diff) |
Move the contents of airpdcap to epan/crypt. Try to fix the current
distcheck failure. Move the nmake build targets for airpdcap from
epan/dissectors to epan. This will probably break the Windows build.
svn path=/trunk/; revision=20231
Diffstat (limited to 'epan/crypt')
-rw-r--r-- | epan/crypt/Makefile.am | 44 | ||||
-rw-r--r-- | epan/crypt/Makefile.common | 49 | ||||
-rw-r--r-- | epan/crypt/Makefile.nmake | 58 | ||||
-rw-r--r-- | epan/crypt/airpdcap.c | 1333 | ||||
-rw-r--r-- | epan/crypt/airpdcap_ccmp.c | 245 | ||||
-rw-r--r-- | epan/crypt/airpdcap_ccmp.h | 0 | ||||
-rw-r--r-- | epan/crypt/airpdcap_debug.c | 21 | ||||
-rw-r--r-- | epan/crypt/airpdcap_debug.h | 70 | ||||
-rw-r--r-- | epan/crypt/airpdcap_int.h | 113 | ||||
-rw-r--r-- | epan/crypt/airpdcap_interop.h | 64 | ||||
-rw-r--r-- | epan/crypt/airpdcap_md5.c | 450 | ||||
-rw-r--r-- | epan/crypt/airpdcap_md5.h | 0 | ||||
-rw-r--r-- | epan/crypt/airpdcap_rijndael.c | 1080 | ||||
-rw-r--r-- | epan/crypt/airpdcap_rijndael.h | 68 | ||||
-rw-r--r-- | epan/crypt/airpdcap_sha1.c | 343 | ||||
-rw-r--r-- | epan/crypt/airpdcap_sha1.h | 28 | ||||
-rw-r--r-- | epan/crypt/airpdcap_system.h | 350 | ||||
-rw-r--r-- | epan/crypt/airpdcap_tkip.c | 250 | ||||
-rw-r--r-- | epan/crypt/airpdcap_tkip.h | 0 | ||||
-rw-r--r-- | epan/crypt/airpdcap_user.h | 167 | ||||
-rw-r--r-- | epan/crypt/airpdcap_wep.c | 67 | ||||
-rw-r--r-- | epan/crypt/airpdcap_wep.h | 78 | ||||
-rw-r--r-- | epan/crypt/airpdcap_ws.h | 7 |
23 files changed, 4885 insertions, 0 deletions
diff --git a/epan/crypt/Makefile.am b/epan/crypt/Makefile.am new file mode 100644 index 0000000000..fc50901c83 --- /dev/null +++ b/epan/crypt/Makefile.am @@ -0,0 +1,44 @@ +# Makefile.am +# Automake file for the airpdcap for Wireshark +# +# $Id$ +# +# Wireshark - Network traffic analyzer +# By Gerald Combs <gerald@xxxxxxxxxxxxx> +# Copyright 1998 Gerald Combs +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version 2 +# of the License, or (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + +include Makefile.common + +noinst_LIBRARIES = \ + libairpdcap.a + +DISTCLEANFILES = \ + libairpdcap.a + +CLEANFILES = \ + libairpdcap.a \ + *~ + +MAINTAINERCLEANFILES = \ + Makefile.in + +libairpdcap_a_SOURCES = \ + $(LIBAIRPDCAP_SRC) \ + $(LIBAIRPDCAP_INCLUDES) + +EXTRA_DIST = \ + Makefile.nmake diff --git a/epan/crypt/Makefile.common b/epan/crypt/Makefile.common new file mode 100644 index 0000000000..bcf3d28c9e --- /dev/null +++ b/epan/crypt/Makefile.common @@ -0,0 +1,49 @@ +# Makefile.common +# Contains the stuff from Makefile.am and Makefile.nmake that is +# a) common to both files and +# b) portable between both files +# +# $Id: Makefile.common,v 1.1 2006/12/18 18:09:51 davides Exp $ +# +# Wireshark - Network traffic analyzer +# By Gerald Combs <gerald@wireshark.org> +# Copyright 1998 Gerald Combs +# +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version 2 +# of the License, or (at your option) any later version. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. + +LIBAIRPDCAP_SRC = \ + airpdcap.c \ + airpdcap_ccmp.c \ + airpdcap_debug.c \ + airpdcap_md5.c \ + airpdcap_rijndael.c \ + airpdcap_sha1.c \ + airpdcap_tkip.c \ + airpdcap_wep.c + +LIBAIRPDCAP_INCLUDES = \ + airpdcap_ccmp.h \ + airpdcap_debug.h \ + airpdcap_interop.h \ + airpdcap_int.h \ + airpdcap_md5.h \ + airpdcap_rijndael.h \ + airpdcap_sha1.h \ + airpdcap_system.h \ + airpdcap_tkip.h \ + airpdcap_user.h \ + airpdcap_wep.h \ + airpdcap_ws.h \ + wep-wpadefs.h diff --git a/epan/crypt/Makefile.nmake b/epan/crypt/Makefile.nmake new file mode 100644 index 0000000000..e2f5f4bd54 --- /dev/null +++ b/epan/crypt/Makefile.nmake @@ -0,0 +1,58 @@ +## Makefile for building codecs.lib with Microsoft C and nmake +## Use: $(MAKE) /$(MAKEFLAGS) -f makefile.nmake +# +# $Id$ + +include ..\config.nmake + +############### no need to modify below this line ######### + +CFLAGS=-DHAVE_CONFIG_H $(GLIB_CFLAGS) -D_U_="" $(LOCAL_CFLAGS) + +.c.obj:: + $(CC) $(CFLAGS) -Fd.\ -c $< + +AIRPDCAP_OBJECTS= \ + airpdcap.obj \ + airpdcap_debug.obj \ + airpdcap_ccmp.obj \ + airpdcap_md5.obj \ + airpdcap_rijndael.obj \ + airpdcap_sha1.obj \ + airpdcap_tkip.obj \ + airpdcap_wep.obj \ + + +airpdcap.lib: $(AIRPDCAP_OBJECTS) + link /lib /out:airpdcap.lib $(AIRPDCAP_OBJECTS) + +airpdcap.obj: airpdcap.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap.c -o $@ + +airpdcap_debug.obj: airpdcap_debug.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_debug.c -o $@ + +airpdcap_ccmp.obj: airpdcap_ccmp.c airpdcap_ccmp.h + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_ccmp.c -o $@ + +airpdcap_md5.obj: airpdcap_md5.c airpdcap_md5.h + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_md5.c -o $@ + +airpdcap_rijndael.obj: airpdcap_rijndael.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_rijndael.c -o $@ + +airpdcap_sha1.obj: airpdcap_sha1.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_sha1.c -o $@ + +airpdcap_tkip.obj: airpdcap_tkip.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_tkip.c -o $@ + +airpdcap_wep.obj: airpdcap_wep.c + $(CC) $(CFLAGS) -Fd.\ -c airpdcap_wep.c -o $@ + +clean: + rm -f $(AIRPDCAP_OBJECTS) airpdcap.lib *.pdb + +distclean: clean + +maintainer-clean: distclean diff --git a/epan/crypt/airpdcap.c b/epan/crypt/airpdcap.c new file mode 100644 index 0000000000..ce220ac472 --- /dev/null +++ b/epan/crypt/airpdcap.c @@ -0,0 +1,1333 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_system.h" +#include "airpdcap_int.h" + +#include "airpdcap_wep.h" +#include "airpdcap_sha1.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Constant definitions */ +/* */ +#define AIRPDCAP_SHA_DIGEST_LEN 20 + +/* EAPOL definitions */ +/** + * Length of the EAPOL-Key key confirmation key (KCK) used to calculate + * MIC over EAPOL frame and validate an EAPOL packet (128 bits) + */ +#define AIRPDCAP_WPA_KCK_LEN 16 +/** + *Offset of the Key MIC in the EAPOL packet body + */ +#define AIRPDCAP_WPA_MICKEY_OFFSET 77 +/** + * Maximum length of the EAPOL packet (it depends on the maximum MAC + * frame size) + */ +#define AIRPDCAP_WPA_MAX_EAPOL_LEN 4095 +/** + * EAPOL Key Descriptor Version 1, used for all EAPOL-Key frames to and + * from a STA when neither the group nor pairwise ciphers are CCMP for + * Key Descriptor 1. + * @note + * Defined in 802.11i-2004, page 78 + */ +#define AIRPDCAP_WPA_KEY_VER_CCMP 1 +/** + * EAPOL Key Descriptor Version 2, used for all EAPOL-Key frames to and + * from a STA when either the pairwise or the group cipher is AES-CCMP + * for Key Descriptor 2. + * /note + * Defined in 802.11i-2004, page 78 + */ +#define AIRPDCAP_WPA_KEY_VER_AES_CCMP 2 +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Macro definitions */ +/* */ +extern const UINT32 crc32_table[256]; +#define CRC(crc, ch) (crc = (crc >> 8) ^ crc32_table[(crc ^ (ch)) & 0xff]) + +#define AIRPDCAP_GET_TK(ptk) (ptk + 32) +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function prototype declarations */ +/* */ +#ifdef __cplusplus +extern "C" { +#endif + +/** + * It is a step of the PBKDF2 (specifically the PKCS #5 v2.0) defined in + * the RFC 2898 to derive a key (used as PMK in WPA) + * @param password [IN] pointer to a password (sequence of between 8 and + * 63 ASCII encoded characters) + * @param ssid [IN] pointer to the SSID string encoded in max 32 ASCII + * encoded characters + * @param iterations [IN] times to hash the password (4096 for WPA) + * @param count [IN] ??? + * @param output [OUT] pointer to a preallocated buffer of + * AIRPDCAP_SHA_DIGEST_LEN characters that will contain a part of the key + */ +INT AirPDcapRsnaPwd2PskStep( + const CHAR *password, + const CHAR *ssid, + const size_t ssidLength, + const INT iterations, + const INT count, + UCHAR *output) + ; + +/** + * It calculates the passphrase-to-PSK mapping reccomanded for use with + * RSNAs. This implementation uses the PBKDF2 method defined in the RFC + * 2898. + * @param password [IN] pointer to a password (sequence of between 8 and + * 63 ASCII encoded characters) + * @param ssid [IN] pointer to the SSID string encoded in max 32 ASCII + * encoded characters + * @param output [OUT] calculated PSK (to use as PMK in WPA) + * @note + * Described in 802.11i-2004, page 165 + */ +INT AirPDcapRsnaPwd2Psk( + const CHAR *password, + const CHAR *ssid, + const size_t ssidLength, + UCHAR *output) + ; + +INT AirPDcapRsnaMng( + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + AIRPDCAP_SEC_ASSOCIATION *sa, + INT offset, + UINT8 fcsPresent) + ; + +INT AirPDcapWepMng( + PAIRPDCAP_CONTEXT ctx, + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + AIRPDCAP_SEC_ASSOCIATION *sa, + INT offset, + UINT8 fcsPresent) + ; + +INT AirPDcapRsna4WHandshake( + PAIRPDCAP_CONTEXT ctx, + const UCHAR *data, + AIRPDCAP_SEC_ASSOCIATION *sa, + PAIRPDCAP_KEY_ITEM key, + INT offset) + ; +/** + * It checks whether the specified key is corrected or not. + * @note + * For a standard WEP key the length will be changed to the standard + * length, and the type changed in a generic WEP key. + * @param key [IN] pointer to the key to validate + * @return + * - TRUE: the key contains valid fields and values + * - FALSE: the key has some invalid field or value + */ +INT AirPDcapValidateKey( + PAIRPDCAP_KEY_ITEM key) + ; + +INT AirPDcapRsnaMicCheck( + UCHAR *eapol, + const USHORT eapol_len, + const UCHAR KCK[AIRPDCAP_WPA_KCK_LEN], + const USHORT key_ver) + ; + +/** + * @param ctx [IN] pointer to the current context + * @param id [IN] id of the association (composed by BSSID and MAC of + * the station) + * @return + * - index of the Security Association structure if found + * - -1, if the specified addresses pair BSSID-STA MAC has not been found + */ +INT AirPDcapGetSa( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_SEC_ASSOCIATION_ID *id) + ; + +INT AirPDcapFreeSa( + PAIRPDCAP_CONTEXT ctx, + INT index) /* index of the structure to free */ + ; + +INT AirPDcapStoreSa( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_SEC_ASSOCIATION_ID *id) + ; + +UCHAR * AirPDcapGetStaAddress( + PAIRPDCAP_MAC_FRAME frame) + ; + +UCHAR * AirPDcapGetBssidAddress( + PAIRPDCAP_MAC_FRAME frame) + ; + +void AirPDcapRsnaPrfX( + AIRPDCAP_SEC_ASSOCIATION *sa, + const UCHAR pmk[32], + const UCHAR snonce[32], + const INT x, /* for TKIP 512, for CCMP 384 */ + UCHAR *ptk) + ; + +INT AirPDcapAlgCrc32( + UCHAR *buf, + size_t nr, + ULONG *cval) + ; + +#ifdef __cplusplus +} +#endif +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Exported function definitions */ +/* */ +#ifdef __cplusplus +extern "C" { +#endif + +INT AirPDcapPacketProcess( + PAIRPDCAP_CONTEXT ctx, + const UCHAR *data, + const size_t len, + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + UINT8 fcsPresent, + UINT8 radioTapPresent, + UINT8 mngHandshake, + UINT8 mngDecrypt) +{ + size_t mac_header_len; + UCHAR *address; + AIRPDCAP_SEC_ASSOCIATION_ID id; + INT index; + PAIRPDCAP_SEC_ASSOCIATION sa; + INT offset; + UINT16 bodyLength; + +#ifdef _DEBUG + CHAR msgbuf[255]; +#endif + + AIRPDCAP_DEBUG_TRACE_START("AirPDcapPacketProcess"); + + if (ctx==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "NULL context", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapPacketProcess"); + return AIRPDCAP_RET_UNSUCCESS; + } + if (data==NULL || len==0) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "NULL data or length=0", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapPacketProcess"); + return AIRPDCAP_RET_UNSUCCESS; + } + + if (radioTapPresent) + offset=AIRPDCAP_RADIOTAP_HEADER_LEN; + else + offset=0; + + /* check if the packet is of data type */ + /* TODO consider packets send on an ad-hoc net (QoS) */ + if (AIRPDCAP_TYPE(data[offset])!=AIRPDCAP_TYPE_DATA) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "not data packet", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_DATA; + } + + /* check correct packet size, to avoid wrong elaboration of encryption algorithms */ + mac_header_len=AIRPDCAP_HEADER_LEN(data[offset+1]); + if (len < (UINT)(mac_header_len+AIRPDCAP_CRYPTED_DATA_MINLEN)) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "minimum length violated", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_WRONG_DATA_SIZE; + } + + /* get BSSID */ + if ( (address=AirPDcapGetBssidAddress((PAIRPDCAP_MAC_FRAME)(data+offset))) != NULL) { + memcpy(id.bssid, address, AIRPDCAP_MAC_LEN); +#ifdef _DEBUG + sprintf(msgbuf, "BSSID: %2X.%2X.%2X.%2X.%2X.%2X\t", id.bssid[0],id.bssid[1],id.bssid[2],id.bssid[3],id.bssid[4],id.bssid[5]); +#endif + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", msgbuf, AIRPDCAP_DEBUG_LEVEL_3); + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "BSSID not found", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_REQ_DATA; + } + + /* get STA address */ + if ( (address=AirPDcapGetStaAddress((PAIRPDCAP_MAC_FRAME)(data+offset))) != NULL) { + memcpy(id.sta, address, AIRPDCAP_MAC_LEN); +#ifdef _DEBUG + sprintf(msgbuf, "ST_MAC: %2X.%2X.%2X.%2X.%2X.%2X\t", id.sta[0],id.sta[1],id.sta[2],id.sta[3],id.sta[4],id.sta[5]); +#endif + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", msgbuf, AIRPDCAP_DEBUG_LEVEL_3); + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "SA not found", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_REQ_DATA; + } + + /* search for a cached Security Association for current BSSID and station MAC */ + if ((index=AirPDcapGetSa(ctx, &id))==-1) { + /* create a new Security Association */ + if ((index=AirPDcapStoreSa(ctx, &id))==-1) { + return AIRPDCAP_RET_UNSUCCESS; + } + } + + /* get the Security Association structure */ + sa=&ctx->sa[index]; + + /* cache offset in the packet data (to scan encryption data) */ + offset+=AIRPDCAP_HEADER_LEN(data[offset+1]); + + /* check if data is encrypted (use the WEP bit in the Frame Control field) */ + if (AIRPDCAP_WEP(data[1])==0) + { + if (mngHandshake) { + /* data is sent in cleartext, check if is an authentication message or end the process */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Unencrypted data", AIRPDCAP_DEBUG_LEVEL_3); + + /* check if the packet as an LLC header and the packet is 802.1X authentication (IEEE 802.1X-2004, pg. 24) */ + if (data[offset]==0xAA && /* DSAP=SNAP */ + data[offset+1]==0xAA && /* SSAP=SNAP */ + data[offset+2]==0x03 && /* Control field=Unnumbered frame */ + data[offset+3]==0x00 && /* Org. code=encaps. Ethernet */ + data[offset+4]==0x00 && + data[offset+5]==0x00 && + data[offset+6]==0x88 && /* Type: 802.1X authentication */ + data[offset+7]==0x8E) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Authentication: EAPOL packet", AIRPDCAP_DEBUG_LEVEL_3); + + /* skip LLC header */ + offset+=8; + + /* check the version of the EAPOL protocol used (IEEE 802.1X-2004, pg. 24) */ + /* TODO EAPOL protocol version to check? */ + /*if (data[offset]!=2) { + AIRPDCAP_DEBUG_PRINT_LINE("EAPOL protocol version not recognized", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_VALID_HANDSHAKE; + }*/ + + /* check if the packet is a EAPOL-Key (0x03) (IEEE 802.1X-2004, pg. 25) */ + if (data[offset+1]!=3) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Not EAPOL-Key", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_VALID_HANDSHAKE; + } + + /* get and check the body length (IEEE 802.1X-2004, pg. 25) */ + bodyLength=ntohs(*(UINT16 *)(data+offset+2)); + if (((len-offset-4)!=bodyLength && !fcsPresent) || ((len-offset-8)!=bodyLength && fcsPresent)) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "EAPOL body not valid (wrong length)", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_VALID_HANDSHAKE; + } + + /* skip EAPOL MPDU and go to the first byte of the body */ + offset+=4; + + /* check if the key descriptor type is valid (IEEE 802.1X-2004, pg. 27) */ + if (/*data[offset]!=0x1 &&*/ /* RC4 Key Descriptor Type (deprecated) */ + data[offset]!=0x2 && /* IEEE 802.11 Key Descriptor Type */ + data[offset]!=0xFE) /* TODO what's this value??? */ + { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Not valid key descriptor type", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_VALID_HANDSHAKE; + } + + /* start with descriptor body */ + offset+=1; + + /* manage the 4-way handshake to define the key */ + return AirPDcapRsna4WHandshake(ctx, data, sa, key, offset); + } else { + /* cleartext message, not authentication */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "No authentication data", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_DATA_ENCRYPTED; + } + } + } else { + if (mngDecrypt) { + + if (decrypt_data==NULL) + return AIRPDCAP_RET_UNSUCCESS; + + /* create new header and data to modify */ + *decrypt_len=len; + memcpy(decrypt_data, data, *decrypt_len); + + /* encrypted data */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "Encrypted data", AIRPDCAP_DEBUG_LEVEL_3); + + if (fcsPresent) + /* remove from next computation FCS */ + *decrypt_len-=4; + + /* check the Extension IV to distinguish between WEP encryption and WPA encryption */ + /* refer to IEEE 802.11i-2004, 8.2.1.2, pag.35 for WEP, */ + /* IEEE 802.11i-2004, 8.3.2.2, pag. 45 for TKIP, */ + /* IEEE 802.11i-2004, 8.3.3.2, pag. 57 for CCMP */ + if (AIRPDCAP_EXTIV(data[offset+3])==0) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "WEP encryption", AIRPDCAP_DEBUG_LEVEL_3); + return AirPDcapWepMng(ctx, decrypt_data, decrypt_len, key, sa, offset, fcsPresent); + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapPacketProcess", "TKIP or CCMP encryption", AIRPDCAP_DEBUG_LEVEL_3); + return AirPDcapRsnaMng(decrypt_data, decrypt_len, key, sa, offset, fcsPresent); + } + } + } + + return AIRPDCAP_RET_UNSUCCESS; +} + +INT AirPDcapSetKeys( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_KEY_ITEM keys[], + const size_t keys_nr) +{ + INT i; + INT success; + AIRPDCAP_DEBUG_TRACE_START("AirPDcapSetKeys"); + + if (ctx==NULL || keys==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "NULL context or NULL keys array", AIRPDCAP_DEBUG_LEVEL_3); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys"); + return 0; + } + + if (keys_nr>AIRPDCAP_MAX_KEYS_NR) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Keys number greater than maximum", AIRPDCAP_DEBUG_LEVEL_3); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys"); + return 0; + } + + /* clean keys collection before setting new ones */ + AirPDcapCleanKeys(ctx); + + /* check and insert keys */ + for (i=0, success=0; i<(INT)keys_nr; i++) { + if (AirPDcapValidateKey(keys+i)==TRUE) { + if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WPA-PWD key", AIRPDCAP_DEBUG_LEVEL_4); + AirPDcapRsnaPwd2Psk(keys[i].KeyData.Wpa.UserPwd.Passphrase, keys[i].KeyData.Wpa.UserPwd.Ssid, keys[i].KeyData.Wpa.UserPwd.SsidLen, keys[i].KeyData.Wpa.Psk); + } +#ifdef _DEBUG + else if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WPA-PMK key", AIRPDCAP_DEBUG_LEVEL_4); + } else if (keys[i].KeyType==AIRPDCAP_KEY_TYPE_WEP) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a WEP key", AIRPDCAP_DEBUG_LEVEL_4); + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapSetKeys", "Set a key", AIRPDCAP_DEBUG_LEVEL_4); + } +#endif + + ctx->keys[success].KeyType=keys[i].KeyType; + memcpy(&ctx->keys[success].KeyData, &keys[i].KeyData, sizeof(keys[i].KeyData)); + + success++; + } + } + + ctx->keys_nr=success; + + AIRPDCAP_DEBUG_TRACE_END("AirPDcapSetKeys"); + return success; +} + +INT AirPDcapCleanKeys( + PAIRPDCAP_CONTEXT ctx) +{ + INT i; + AIRPDCAP_DEBUG_TRACE_START("AirPDcapCleanKeys"); + + if (ctx==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapCleanKeys", "NULL context", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapCleanKeys"); + return 0; + } + + for (i=0; i<AIRPDCAP_MAX_KEYS_NR; i++) { + memset(&ctx->keys[i], 0, sizeof(AIRPDCAP_KEY_ITEM)); + } + + ctx->keys_nr=0; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapCleanKeys", "Keys collection cleaned!", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapCleanKeys"); + + return i; +} + +INT AirPDcapGetKeys( + const PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_KEY_ITEM keys[], + const size_t keys_nr) +{ + UINT i; + UINT j; + AIRPDCAP_DEBUG_TRACE_START("AirPDcapGetKeys"); + + if (ctx==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "NULL context", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys"); + return 0; + } else if (keys==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "NULL keys array", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys"); + return (INT)ctx->keys_nr; + } else { + for (i=0, j=0; i<ctx->keys_nr && i<keys_nr && i<AIRPDCAP_MAX_KEYS_NR; i++) { + keys[j].KeyType=ctx->keys[i].KeyType; + memcpy(&keys[j].KeyData, &ctx->keys[i].KeyData, sizeof(keys[j].KeyData)); + j++; + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapGetKeys", "Got a key", AIRPDCAP_DEBUG_LEVEL_5); + } + + AIRPDCAP_DEBUG_TRACE_END("AirPDcapGetKeys"); + return j; + } +} + +INT AirPDcapInitContext( + PAIRPDCAP_CONTEXT ctx) +{ + AIRPDCAP_DEBUG_TRACE_START("AirPDcapInitContext"); + + if (ctx==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapInitContext", "NULL context", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapInitContext"); + return AIRPDCAP_RET_UNSUCCESS; + } + + AirPDcapCleanKeys(ctx); + + ctx->first_free_index=0; + ctx->index=-1; + ctx->last_stored_index=-1; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapInitContext", "Context initialized!", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapInitContext"); + return AIRPDCAP_RET_SUCCESS; +} + +INT AirPDcapDestroyContext( + PAIRPDCAP_CONTEXT ctx) +{ + AIRPDCAP_DEBUG_TRACE_START("AirPDcapDestroyContext"); + + if (ctx==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapDestroyContext", "NULL context", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapDestroyContext"); + return AIRPDCAP_RET_UNSUCCESS; + } + + AirPDcapCleanKeys(ctx); + + ctx->first_free_index=0; + ctx->index=-1; + ctx->last_stored_index=-1; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapDestroyContext", "Context destroyed!", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_END("AirPDcapDestroyContext"); + return AIRPDCAP_RET_SUCCESS; +} + +#ifdef __cplusplus +} +#endif +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function definitions */ +/* */ +#ifdef __cplusplus +extern "C" { +#endif + +INT AirPDcapRsnaMng( + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + AIRPDCAP_SEC_ASSOCIATION *sa, + INT offset, + UINT8 fcsPresent) +{ + INT ret_value; + ULONG crc; + + if (sa->key==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "No key associated", AIRPDCAP_DEBUG_LEVEL_3); + return AIRPDCAP_RET_REQ_DATA; + } + if (sa->validKey==FALSE) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "Key not yet valid", AIRPDCAP_DEBUG_LEVEL_3); + return AIRPDCAP_RET_UNSUCCESS; + } + if (sa->wpa.key_ver==1) { + /* CCMP -> HMAC-MD5 is the EAPOL-Key MIC, RC4 is the EAPOL-Key encryption algorithm */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "TKIP", AIRPDCAP_DEBUG_LEVEL_3); + + ret_value=AirPDcapTkipDecrypt(decrypt_data+offset, *decrypt_len-offset, decrypt_data+AIRPDCAP_TA_OFFSET, AIRPDCAP_GET_TK(sa->wpa.ptk)); + if (ret_value) + return ret_value; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "TKIP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3); + /* remove MIC (8bytes) and ICV (4bytes) from the end of packet */ + *decrypt_len-=12; + } else { + /* AES-CCMP -> HMAC-SHA1-128 is the EAPOL-Key MIC, AES wep_key wrap is the EAPOL-Key encryption algorithm */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "CCMP", AIRPDCAP_DEBUG_LEVEL_3); + + ret_value=AirPDcapCcmpDecrypt(decrypt_data, (INT)*decrypt_len, AIRPDCAP_GET_TK(sa->wpa.ptk)); + if (ret_value) + return ret_value; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsnaMng", "CCMP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3); + /* remove MIC (8bytes) from the end of packet */ + *decrypt_len-=8; + } + + /* remove protection bit */ + decrypt_data[1]&=0xBF; + + /* remove TKIP/CCMP header */ + offset=AIRPDCAP_HEADER_LEN(decrypt_data[1]); + *decrypt_len-=8; + memcpy(decrypt_data+offset, decrypt_data+offset+8, *decrypt_len-offset); + + if (fcsPresent) { + /* calculate FCS */ + AirPDcapAlgCrc32(decrypt_data, *decrypt_len, &crc); + *(unsigned long*)(decrypt_data+*decrypt_len)=crc; + + /* add FCS in packet */ + *decrypt_len+=4; + } + + if (key!=NULL) { + memcpy(key, sa->key, sizeof(AIRPDCAP_KEY_ITEM)); + + if (sa->wpa.key_ver==AIRPDCAP_WPA_KEY_VER_CCMP) + key->KeyType=AIRPDCAP_KEY_TYPE_TKIP; + else if (sa->wpa.key_ver==AIRPDCAP_WPA_KEY_VER_AES_CCMP) + key->KeyType=AIRPDCAP_KEY_TYPE_CCMP; + } + + return AIRPDCAP_RET_SUCCESS; +} + +INT AirPDcapWepMng( + PAIRPDCAP_CONTEXT ctx, + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + AIRPDCAP_SEC_ASSOCIATION *sa, + INT offset, + UINT8 fcsPresent) +{ + UCHAR wep_key[AIRPDCAP_WEP_KEY_MAXLEN+AIRPDCAP_WEP_IVLEN]; + size_t keylen; + INT ret_value=1; + ULONG crc; + INT key_index; + AIRPDCAP_KEY_ITEM *tmp_key; + UINT8 useCache=FALSE; + + if (sa->key!=NULL) + useCache=TRUE; + + for (key_index=0; key_index<(INT)ctx->keys_nr; key_index++) { + /* use the cached one, or try all keys */ + if (!useCache) { + tmp_key=&ctx->keys[key_index]; + } else { + if (sa->key!=NULL && sa->key->KeyType==AIRPDCAP_KEY_TYPE_WEP) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Try cached WEP key...", AIRPDCAP_DEBUG_LEVEL_3); + tmp_key=sa->key; + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Cached key is not valid, try another WEP key...", AIRPDCAP_DEBUG_LEVEL_3); + tmp_key=&ctx->keys[key_index]; + } + } + + /* obviously, try only WEP keys... */ + if (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WEP) + { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "Try WEP key...", AIRPDCAP_DEBUG_LEVEL_3); + + memset(wep_key, 0, sizeof(wep_key)); + + /* Costruct the WEP seed: copy the IV in first 3 bytes and then the WEP key (refer to 802-11i-2004, 8.2.1.4.3, pag. 36) */ + memcpy(wep_key, decrypt_data+AIRPDCAP_HEADER_LEN(decrypt_data[1]), AIRPDCAP_WEP_IVLEN); + keylen=tmp_key->KeyData.Wep.WepKeyLen; + memcpy(wep_key+AIRPDCAP_WEP_IVLEN, tmp_key->KeyData.Wep.WepKey, keylen); + + ret_value=AirPDcapWepDecrypt(wep_key, + keylen+AIRPDCAP_WEP_IVLEN, + decrypt_data + (AIRPDCAP_HEADER_LEN(decrypt_data[1])+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN), + *decrypt_len-(AIRPDCAP_HEADER_LEN(decrypt_data[1])+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN+AIRPDCAP_CRC_LEN)); + + } + + if (!ret_value && tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WEP) { + /* the tried key is the correct one, cached in the Security Association */ + + sa->key=tmp_key; + + if (key!=NULL) { + memcpy(key, &sa->key, sizeof(AIRPDCAP_KEY_ITEM)); + key->KeyType=AIRPDCAP_KEY_TYPE_WEP; + } + + break; + } else { + /* the cached key was not valid, try other keys */ + + if (useCache==TRUE) { + useCache=FALSE; + key_index--; + } + } + } + + if (ret_value) + return ret_value; + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapWepMng", "WEP DECRYPTED!!!", AIRPDCAP_DEBUG_LEVEL_3); + + /* remove ICV (4bytes) from the end of packet */ + *decrypt_len-=4; + + /* remove protection bit */ + decrypt_data[1]&=0xBF; + + /* remove IC header */ + offset=AIRPDCAP_HEADER_LEN(decrypt_data[1]); + *decrypt_len-=4; + memcpy(decrypt_data+offset, decrypt_data+offset+AIRPDCAP_WEP_IVLEN+AIRPDCAP_WEP_KIDLEN, *decrypt_len-offset); + + if (fcsPresent) { + /* calculate FCS and append it at the end of the decrypted packet */ + AirPDcapAlgCrc32(decrypt_data, *decrypt_len, &crc); + *(unsigned long*)(decrypt_data+*decrypt_len)=crc; + + /* add FCS in packet */ + *decrypt_len += 4; + } + + return AIRPDCAP_RET_SUCCESS; +} + +/* Refer to IEEE 802.11i-2004, 8.5.3, pag. 85 */ +INT AirPDcapRsna4WHandshake( + PAIRPDCAP_CONTEXT ctx, + const UCHAR *data, + AIRPDCAP_SEC_ASSOCIATION *sa, + PAIRPDCAP_KEY_ITEM key, + INT offset) +{ + AIRPDCAP_KEY_ITEM *tmp_key; + INT key_index; + INT ret_value=1; + UCHAR useCache=FALSE; + UCHAR eapol[AIRPDCAP_EAPOL_MAX_LEN]; + USHORT eapol_len; + + if (sa->key!=NULL) + useCache=TRUE; + + /* a 4-way handshake packet use a Pairwise key type (IEEE 802.11i-2004, pg. 79) */ + if (AIRPDCAP_EAP_KEY(data[offset+1])!=1) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Group/STAKey message (not used)", AIRPDCAP_DEBUG_LEVEL_5); + return AIRPDCAP_RET_NO_VALID_HANDSHAKE; + } + + /* TODO timeouts? reauthentication? */ + + /* TODO consider key-index */ + + /* TODO considera Deauthentications */ + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake...", AIRPDCAP_DEBUG_LEVEL_5); + + /* manage 4-way handshake packets; this step completes the 802.1X authentication process (IEEE 802.11i-2004, pag. 85) */ + + /* message 1: Authenticator->Supplicant (Sec=0, Mic=0, Ack=1, Inst=0, Key=1(pairwise), KeyRSC=0, Nonce=ANonce, MIC=0) */ + if (AIRPDCAP_EAP_INST(data[offset+1])==0 && + AIRPDCAP_EAP_ACK(data[offset+1])==1 && + AIRPDCAP_EAP_MIC(data[offset])==0) + { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 1", AIRPDCAP_DEBUG_LEVEL_3); + + /* On reception of Message 1, the Supplicant determines whether the Key Replay Counter field value has been */ + /* used before with the current PMKSA. If the Key Replay Counter field value is less than or equal to the current */ + /* local value, the Supplicant discards the message. */ + /* -> not checked, the Authenticator will be send another Message 1 (hopefully!) */ + + /* save ANonce (from authenticator) to derive the PTK with the SNonce (from the 2 message) */ + memcpy(sa->wpa.nonce, data+offset+12, 32); + + /* get the Key Descriptor Version (to select algorithm used in decryption -CCMP or TKIP-) */ + sa->wpa.key_ver=AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1]); + + sa->handshake=1; + + return AIRPDCAP_RET_SUCCESS_HANDSHAKE; + } + + /* message 2|4: Supplicant->Authenticator (Sec=0|1, Mic=1, Ack=0, Inst=0, Key=1(pairwise), KeyRSC=0, Nonce=SNonce|0, MIC=MIC(KCK,EAPOL)) */ + if (AIRPDCAP_EAP_INST(data[offset+1])==0 && + AIRPDCAP_EAP_ACK(data[offset+1])==0 && + AIRPDCAP_EAP_MIC(data[offset])==1) + { + if (AIRPDCAP_EAP_SEC(data[offset])==0) { + + /* PATCH: some implementations set secure bit to 0 also in the 4th message */ + /* to recognize which message is this check if wep_key data lenght is 0 */ + /* in the 4th message */ + if (*(UINT16 *)(data+offset+92)!=0) { + /* message 2 */ + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 2", AIRPDCAP_DEBUG_LEVEL_3); + + /* On reception of Message 2, the Authenticator checks that the key replay counter corresponds to the */ + /* outstanding Message 1. If not, it silently discards the message. */ + /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, */ + /* the Authenticator silently discards Message 2. */ + /* -> not checked; the Supplicant will send another message 2 (hopefully!) */ + + /* now you can derive the PTK */ + for (key_index=0; key_index<(INT)ctx->keys_nr || sa->key!=NULL; key_index++) { + /* use the cached one, or try all keys */ + if (!useCache) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Try WPA key...", AIRPDCAP_DEBUG_LEVEL_3); + tmp_key=&ctx->keys[key_index]; + } else { + /* there is a cached key in the security association, if it's a WPA key try it... */ + if (sa->key!=NULL && + sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD || + sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK || + sa->key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Try cached WPA key...", AIRPDCAP_DEBUG_LEVEL_3); + tmp_key=sa->key; + } else { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "Cached key is of a wrong type, try WPA key...", AIRPDCAP_DEBUG_LEVEL_3); + tmp_key=&ctx->keys[key_index]; + } + } + + /* obviously, try only WPA keys... */ + if (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD || + tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK || + tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK) + { + /* derive the PTK from the BSSID, STA MAC, PMK, SNonce, ANonce */ + AirPDcapRsnaPrfX(sa, /* authenticator nonce, bssid, station mac */ + tmp_key->KeyData.Wpa.Pmk, /* PMK */ + data+offset+12, /* supplicant nonce */ + 512, + sa->wpa.ptk); + + /* verify the MIC (compare the MIC in the packet included in this message with a MIC calculated with the PTK) */ + eapol_len=(USHORT)(ntohs(*(UINT16 *)(data+offset-3))+4); + memcpy(eapol, &data[offset-5], (eapol_len<AIRPDCAP_EAPOL_MAX_LEN?eapol_len:AIRPDCAP_EAPOL_MAX_LEN)); + ret_value=AirPDcapRsnaMicCheck(eapol, /* eapol frame (header also) */ + eapol_len, /* eapol frame length */ + sa->wpa.ptk, /* Key Confirmation Key */ + AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])); /* EAPOL-Key description version */ + + /* If the MIC is valid, the Authenticator checks that the RSN information element bit-wise matches */ + /* that from the (Re)Association Request message. */ + /* i) TODO If these are not exactly the same, the Authenticator uses MLME-DEAUTHENTICATE.request */ + /* primitive to terminate the association. */ + /* ii) If they do match bit-wise, the Authenticator constructs Message 3. */ + } + + if (!ret_value && + (tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PWD || + tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PSK || + tmp_key->KeyType==AIRPDCAP_KEY_TYPE_WPA_PMK)) + { + /* the temporary key is the correct one, cached in the Security Association */ + + sa->key=tmp_key; + + if (key!=NULL) { + memcpy(key, &tmp_key, sizeof(AIRPDCAP_KEY_ITEM)); + if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_CCMP) + key->KeyType=AIRPDCAP_KEY_TYPE_TKIP; + else if (AIRPDCAP_EAP_KEY_DESCR_VER(data[offset+1])==AIRPDCAP_WPA_KEY_VER_AES_CCMP) + key->KeyType=AIRPDCAP_KEY_TYPE_CCMP; + } + + break; + } else { + /* the cached key was not valid, try other keys */ + + if (useCache==TRUE) { + useCache=FALSE; + key_index--; + } + } + } + + if (ret_value) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "handshake step failed", AIRPDCAP_DEBUG_LEVEL_3); + return ret_value; + } + + sa->handshake=2; + + return AIRPDCAP_RET_SUCCESS_HANDSHAKE; + } else { + /* message 4 */ + + /* TODO "Note that when the 4-Way Handshake is first used Message 4 is sent in the clear." */ + + /* TODO check MIC and Replay Counter */ + /* On reception of Message 4, the Authenticator verifies that the Key Replay Counter field value is one */ + /* that it used on this 4-Way Handshake; if it is not, it silently discards the message. */ + /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, the */ + /* Authenticator silently discards Message 4. */ + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 4 (patched)", AIRPDCAP_DEBUG_LEVEL_3); + + sa->handshake=4; + + sa->validKey=TRUE; + + return AIRPDCAP_RET_SUCCESS_HANDSHAKE; + } + /* END OF PATCH */ + /* */ + } else { + /* message 4 */ + + /* TODO "Note that when the 4-Way Handshake is first used Message 4 is sent in the clear." */ + + /* TODO check MIC and Replay Counter */ + /* On reception of Message 4, the Authenticator verifies that the Key Replay Counter field value is one */ + /* that it used on this 4-Way Handshake; if it is not, it silently discards the message. */ + /* If the calculated MIC does not match the MIC that the Supplicant included in the EAPOL-Key frame, the */ + /* Authenticator silently discards Message 4. */ + + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 4", AIRPDCAP_DEBUG_LEVEL_3); + + sa->handshake=4; + + sa->validKey=TRUE; + + return AIRPDCAP_RET_SUCCESS_HANDSHAKE; + } + } + + /* message 3: Authenticator->Supplicant (Sec=1, Mic=1, Ack=1, Inst=0/1, Key=1(pairwise), KeyRSC=???, Nonce=ANonce, MIC=1) */ + if (AIRPDCAP_EAP_ACK(data[offset+1])==1 && + AIRPDCAP_EAP_MIC(data[offset])==1) + { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapRsna4WHandshake", "4-way handshake message 3", AIRPDCAP_DEBUG_LEVEL_3); + + /* On reception of Message 3, the Supplicant silently discards the message if the Key Replay Counter field */ + /* value has already been used or if the ANonce value in Message 3 differs from the ANonce value in Message 1. */ + /* -> not checked, the Authenticator will send another message 3 (hopefully!) */ + + /* TODO check page 88 (RNS) */ + + return AIRPDCAP_RET_SUCCESS_HANDSHAKE; + } + + return AIRPDCAP_RET_UNSUCCESS; +} + +INT AirPDcapRsnaMicCheck( + UCHAR *eapol, + const USHORT eapol_len, + const UCHAR KCK[AIRPDCAP_WPA_KCK_LEN], + const USHORT key_ver) +{ + UCHAR mic[AIRPDCAP_WPA_MICKEY_LEN]; + UCHAR c_mic[20]; /* MIC 16 byte, the HMAC-SHA1 use a buffer of 20 bytes */ + + /* copy the MIC from the EAPOL packet */ + memcpy(mic, eapol+AIRPDCAP_WPA_MICKEY_OFFSET+4, AIRPDCAP_WPA_MICKEY_LEN); + + /* set to 0 the MIC in the EAPOL packet (to calculate the MIC) */ + memset(eapol+AIRPDCAP_WPA_MICKEY_OFFSET+4, 0, AIRPDCAP_WPA_MICKEY_LEN); + + if (key_ver==AIRPDCAP_WPA_KEY_VER_CCMP) { + /* use HMAC-MD5 for the EAPOL-Key MIC */ + AirPDcapAlgHmacMd5((UCHAR *)KCK, AIRPDCAP_WPA_KCK_LEN, eapol, eapol_len, c_mic); + } else if (key_ver==AIRPDCAP_WPA_KEY_VER_AES_CCMP) { + /* use HMAC-SHA1-128 for the EAPOL-Key MIC */ + AirPDcapAlgHmacSha1(KCK, AIRPDCAP_WPA_KCK_LEN, eapol, eapol_len, c_mic); + } else + /* key descriptor version not recognized */ + return AIRPDCAP_RET_UNSUCCESS; + + /* compare calculated MIC with the Key MIC and return result (0 means success) */ + return memcmp(mic, c_mic, AIRPDCAP_WPA_MICKEY_LEN); +} + +INT AirPDcapValidateKey( + PAIRPDCAP_KEY_ITEM key) +{ + size_t len; + UCHAR ret=TRUE; + AIRPDCAP_DEBUG_TRACE_START("AirPDcapValidateKey"); + + if (key==NULL) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "NULL key", AIRPDCAP_DEBUG_LEVEL_5); + AIRPDCAP_DEBUG_TRACE_START("AirPDcapValidateKey"); + return FALSE; + } + + switch (key->KeyType) { +case AIRPDCAP_KEY_TYPE_WEP: + /* check key size limits */ + len=key->KeyData.Wep.WepKeyLen; + if (len<AIRPDCAP_WEP_KEY_MINLEN || len>AIRPDCAP_WEP_KEY_MAXLEN) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WEP key: key length not accepted", AIRPDCAP_DEBUG_LEVEL_5); + ret=FALSE; + } + break; + +case AIRPDCAP_KEY_TYPE_WEP_40: + /* set the standard length and use a generic WEP key type */ + key->KeyData.Wep.WepKeyLen=AIRPDCAP_WEP_40_KEY_LEN; + key->KeyType=AIRPDCAP_KEY_TYPE_WEP; + break; + +case AIRPDCAP_KEY_TYPE_WEP_104: + /* set the standard length and use a generic WEP key type */ + key->KeyData.Wep.WepKeyLen=AIRPDCAP_WEP_104_KEY_LEN; + key->KeyType=AIRPDCAP_KEY_TYPE_WEP; + break; + +case AIRPDCAP_KEY_TYPE_WPA_PWD: + /* check passphrase and SSID size limits */ + len=strlen(key->KeyData.Wpa.UserPwd.Passphrase); + if (len<AIRPDCAP_WPA_PASSPHRASE_MIN_LEN || len>AIRPDCAP_WPA_PASSPHRASE_MAX_LEN) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WPA-PWD key: passphrase length not accepted", AIRPDCAP_DEBUG_LEVEL_5); + ret=FALSE; + } + + len=key->KeyData.Wpa.UserPwd.SsidLen; + if (len<AIRPDCAP_WPA_SSID_MIN_LEN || len>AIRPDCAP_WPA_SSID_MAX_LEN) { + AIRPDCAP_DEBUG_PRINT_LINE("AirPDcapValidateKey", "WPA-PWD key: ssid length not accepted", AIRPDCAP_DEBUG_LEVEL_5); + ret=FALSE; + } + + break; + +case AIRPDCAP_KEY_TYPE_WPA_PSK: + break; + +case AIRPDCAP_KEY_TYPE_WPA_PMK: + break; + +default: + ret=FALSE; + } + + AIRPDCAP_DEBUG_TRACE_END("AirPDcapValidateKey"); + return ret; +} + +INT AirPDcapGetSa( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_SEC_ASSOCIATION_ID *id) +{ + INT index; + + if (ctx->last_stored_index!=-1) { + /* at least one association was stored */ + /* search for the association from last_stored_index to 0 (most recent added) */ + for (index=ctx->last_stored_index; index>=0; index--) { + if (ctx->sa[index].used) { + if (memcmp(id, &(ctx->sa[index].saId), sizeof(AIRPDCAP_SEC_ASSOCIATION_ID))==0) { + ctx->index=index; + return index; + } + } + } + } + + return -1; +} + +INT AirPDcapFreeSa( + PAIRPDCAP_CONTEXT ctx, + INT index) /* index of the structure to free */ +{ + /* set the structure as free (the reset will be done in AIRPDCAP_store_sta_info) */ + ctx->sa[index].used=0; + + /* set the first_free_index to avoid free blocks in the middle */ + if (index<ctx->first_free_index) + ctx->first_free_index=index; + + /* decrement the last_stored_index if this was the last stored block */ + if (index==ctx->last_stored_index) + ctx->last_stored_index--; + + /* if the list is empty, set the index */ + if (ctx->last_stored_index==-1) + ctx->index=-1; + + return ctx->index; +} + +INT AirPDcapStoreSa( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_SEC_ASSOCIATION_ID *id) +{ + INT last_free; + + if (ctx->sa[ctx->first_free_index].used) { + /* last addition was in the middle of the array (and the first_free_index was just incremented by 1) */ + /* search for a free space from the first_free_index to AIRPDCAP_STA_INFOS_NR (to avoid free blocks in */ + /* the middle) */ + for (last_free=ctx->first_free_index; last_free<AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR; last_free++) + if (!ctx->sa[last_free].used) + break; + + if (last_free>=AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR) { + /* there is no empty space available. FAILURE */ + return -1; + } + + /* store first free space index */ + ctx->first_free_index=last_free; + } + + /* use this info */ + ctx->index=ctx->first_free_index; + + /* reset the info structure */ + memset(ctx->sa+ctx->index, 0, sizeof(AIRPDCAP_SEC_ASSOCIATION)); + + ctx->sa[ctx->index].used=1; + + /* set the info structure */ + memcpy(&(ctx->sa[ctx->index].saId), id, sizeof(AIRPDCAP_SEC_ASSOCIATION_ID)); + + /* increment by 1 the first_free_index (heuristic) */ + ctx->first_free_index++; + + /* set the last_stored_index if the added index is greater the the last_stored_index */ + if (ctx->index > ctx->last_stored_index) + ctx->last_stored_index=ctx->index; + + return ctx->index; +} + +UCHAR * AirPDcapGetStaAddress( + PAIRPDCAP_MAC_FRAME frame) +{ + if (AIRPDCAP_TO_DS(frame->fc[1])==0) { + if (AIRPDCAP_FROM_DS(frame->fc[1])==0) + return NULL; + else + return frame->addr1; + } else { + if (AIRPDCAP_FROM_DS(frame->fc[1])==0) + return frame->addr2; + else + return NULL; + } +} + +UCHAR * AirPDcapGetBssidAddress( + PAIRPDCAP_MAC_FRAME frame) +{ + if (AIRPDCAP_TO_DS(frame->fc[1])==0) { + if (AIRPDCAP_FROM_DS(frame->fc[1])==0) + return frame->addr3; + else + return frame->addr2; + } else { + if (AIRPDCAP_FROM_DS(frame->fc[1])==0) + return frame->addr1; + else + return NULL; + } +} + +/* Function used to derive the PTK. Refer to IEEE 802.11I-2004, pag. 74 */ +void AirPDcapRsnaPrfX( + AIRPDCAP_SEC_ASSOCIATION *sa, + const UCHAR pmk[32], + const UCHAR snonce[32], + const INT x, /* for TKIP 512, for CCMP 384 */ + UCHAR *ptk) +{ + UINT8 i; + UCHAR R[100]; + INT offset=sizeof("Pairwise key expansion"); + + memset(R, 0, 100); + + memcpy(R, "Pairwise key expansion", offset); + + /* Min(AA, SPA) || Max(AA, SPA) */ + if (memcmp(sa->saId.sta, sa->saId.bssid, AIRPDCAP_MAC_LEN) < 0) + { + memcpy(R + offset, sa->saId.sta, AIRPDCAP_MAC_LEN); + memcpy(R + offset+AIRPDCAP_MAC_LEN, sa->saId.bssid, AIRPDCAP_MAC_LEN); + } + else + { + memcpy(R + offset, sa->saId.bssid, AIRPDCAP_MAC_LEN); + memcpy(R + offset+AIRPDCAP_MAC_LEN, sa->saId.sta, AIRPDCAP_MAC_LEN); + } + + offset+=AIRPDCAP_MAC_LEN*2; + + /* Min(ANonce,SNonce) || Max(ANonce,SNonce) */ + if( memcmp(snonce, sa->wpa.nonce, 32) < 0 ) + { + memcpy(R + offset, snonce, 32); + memcpy(R + offset + 32, sa->wpa.nonce, 32); + } + else + { + memcpy(R + offset, sa->wpa.nonce, 32); + memcpy(R + offset + 32, snonce, 32); + } + + offset+=32*2; + + for(i = 0; i < (x+159)/160; i++) + { + R[offset] = i; + AirPDcapAlgHmacSha1(pmk, 32, R, 100, ptk + i * 20); + } +} + +INT AirPDcapRsnaPwd2PskStep( + const CHAR *password, + const CHAR *ssid, + const size_t ssidLength, + const INT iterations, + const INT count, + UCHAR *output) +{ + UCHAR digest[36], digest1[AIRPDCAP_SHA_DIGEST_LEN]; + INT i, j; + + /* U1 = PRF(P, S || INT(i)) */ + memcpy(digest, ssid, ssidLength); + digest[ssidLength] = (UCHAR)((count>>24) & 0xff); + digest[ssidLength+1] = (UCHAR)((count>>16) & 0xff); + digest[ssidLength+2] = (UCHAR)((count>>8) & 0xff); + digest[ssidLength+3] = (UCHAR)(count & 0xff); + AirPDcapAlgHmacSha1((UCHAR *)password, strlen(password), digest, ssidLength+4, digest1); + + /* output = U1 */ + memcpy(output, digest1, AIRPDCAP_SHA_DIGEST_LEN); + for (i = 1; i < iterations; i++) { + /* Un = PRF(P, Un-1) */ + AirPDcapAlgHmacSha1((UCHAR *)password, strlen(password), digest1, AIRPDCAP_SHA_DIGEST_LEN, digest); + + memcpy(digest1, digest, AIRPDCAP_SHA_DIGEST_LEN); + /* output = output xor Un */ + for (j = 0; j < AIRPDCAP_SHA_DIGEST_LEN; j++) { + output[j] ^= digest[j]; + } + } + + return AIRPDCAP_RET_SUCCESS; +} + +INT AirPDcapRsnaPwd2Psk( + const CHAR *password, + const CHAR *ssid, + const size_t ssidLength, + UCHAR *output) +{ + UCHAR m_output[AIRPDCAP_WPA_PSK_LEN]; + + memset(m_output, 0, AIRPDCAP_WPA_PSK_LEN); + + memset(m_output, 0, 40); + + AirPDcapRsnaPwd2PskStep(password, ssid, ssidLength, 4096, 1, m_output); + AirPDcapRsnaPwd2PskStep(password, ssid, ssidLength, 4096, 2, &m_output[AIRPDCAP_SHA_DIGEST_LEN]); + + memcpy(output, m_output, AIRPDCAP_WPA_PSK_LEN); + + return 0; +} + +/***************************************************************************/ +/* The following code come from freeBSD and implements the AUTODIN II */ +/* polynomial used by 802.11. */ +/* It can be used to calculate multicast address hash indices. */ +/* It assumes that the low order bits will be transmitted first, */ +/* and consequently the low byte should be sent first when */ +/* the crc computation is finished. The crc should be complemented */ +/* before transmission. */ +/* The variable corresponding to the macro argument "crc" should */ +/* be an unsigned long and should be preset to all ones for Ethernet */ +/* use. An error-free packet will leave 0xDEBB20E3 in the crc. */ +/***************************************************************************/ +INT AirPDcapAlgCrc32( + UCHAR *buf, + size_t nr, + ULONG *cval) +{ + ULONG crc32_total = 0 ; + ULONG crc = ~(ULONG)0; + UCHAR *p ; + size_t len; + + len = 0 ; + crc32_total = ~crc32_total ; + + for(len += nr, p = buf; nr--; ++p) + { + CRC(crc, *p) ; + CRC(crc32_total, *p) ; + } + + *cval = ~crc ; + crc32_total = ~crc32_total ; + + return 0; +} + +#ifdef __cplusplus +} +#endif +/* */ +/******************************************************************************/ diff --git a/epan/crypt/airpdcap_ccmp.c b/epan/crypt/airpdcap_ccmp.c new file mode 100644 index 0000000000..5dfa85a8f6 --- /dev/null +++ b/epan/crypt/airpdcap_ccmp.c @@ -0,0 +1,245 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_system.h" +#include "airpdcap_int.h" + +#include "airpdcap_rijndael.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/* Note: this code were copied from FreeBSD source code, RELENG 6, */ +/* sys/net80211/ieee80211_crypto_ccmp.c */ + +/******************************************************************************/ +/* Internal definitions */ +/* */ +#define AES_BLOCK_LEN 16 + +/* Note: copied from net80211/ieee80211.h */ +#define AIRPDCAP_FC1_DIR_MASK 0x03 +#define AIRPDCAP_FC1_DIR_DSTODS 0x03 /* AP ->AP */ +#define AIRPDCAP_FC0_SUBTYPE_QOS 0x80 +#define AIRPDCAP_FC0_TYPE_DATA 0x08 +#define AIRPDCAP_FC0_TYPE_MASK 0x0c +#define AIRPDCAP_SEQ_FRAG_MASK 0x000f +#define AIRPDCAP_QOS_HAS_SEQ(wh) \ + (((wh)->fc[0] & \ + (AIRPDCAP_FC0_TYPE_MASK | AIRPDCAP_FC0_SUBTYPE_QOS)) == \ + (AIRPDCAP_FC0_TYPE_DATA | AIRPDCAP_FC0_SUBTYPE_QOS)) +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal macros */ +/* */ +#define CCMP_DECRYPT(_i, _b, _b0, _pos, _a, _len) { \ + /* Decrypt, with counter */ \ + _b0[14] = (UINT8)((_i >> 8) & 0xff); \ + _b0[15] = (UINT8)(_i & 0xff); \ + rijndael_encrypt(&key, _b0, _b); \ + xor_block(_pos, _b, _len); \ + /* Authentication */ \ + xor_block(_a, _pos, _len); \ + rijndael_encrypt(&key, _a, _a); \ +} + +#define AIRPDCAP_ADDR_COPY(dst,src) memcpy(dst,src,AIRPDCAP_MAC_LEN) +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function prototypes declarations */ +/* */ +static void ccmp_init_blocks( + rijndael_ctx *ctx, + PAIRPDCAP_MAC_FRAME wh, + UINT64 pn, + size_t dlen, + UINT8 b0[AES_BLOCK_LEN], + UINT8 aad[2 * AES_BLOCK_LEN], + UINT8 a[AES_BLOCK_LEN], + UINT8 b[AES_BLOCK_LEN]) + ; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Function definitions */ +/* */ +static __inline UINT64 READ_6( + UINT8 b0, + UINT8 b1, + UINT8 b2, + UINT8 b3, + UINT8 b4, + UINT8 b5) +{ + UINT32 iv32 = (b0 << 0) | (b1 << 8) | (b2 << 16) | (b3 << 24); + UINT16 iv16 = (UINT16)((b4 << 0) | (b5 << 8)); + return (((UINT64)iv16) << 32) | iv32; +} + +static void ccmp_init_blocks( + rijndael_ctx *ctx, + PAIRPDCAP_MAC_FRAME wh, + UINT64 pn, + size_t dlen, + UINT8 b0[AES_BLOCK_LEN], + UINT8 aad[2 * AES_BLOCK_LEN], + UINT8 a[AES_BLOCK_LEN], + UINT8 b[AES_BLOCK_LEN]) +{ +#define IS_4ADDRESS(wh) \ + ((wh->fc[1] & AIRPDCAP_FC1_DIR_MASK) == AIRPDCAP_FC1_DIR_DSTODS) +#define IS_QOS_DATA(wh) AIRPDCAP_QOS_HAS_SEQ(wh) + + memset(aad, 0, 2*AES_BLOCK_LEN); + + /* CCM Initial Block: + * Flag (Include authentication header, M=3 (8-octet MIC), + * L=1 (2-octet Dlen)) + * Nonce: 0x00 | A2 | PN + * Dlen */ + b0[0] = 0x59; + /* NB: b0[1] set below */ + AIRPDCAP_ADDR_COPY(b0 + 2, wh->addr2); + b0[8] = (UINT8)(pn >> 40); + b0[9] = (UINT8)(pn >> 32); + b0[10] = (UINT8)(pn >> 24); + b0[11] = (UINT8)(pn >> 16); + b0[12] = (UINT8)(pn >> 8); + b0[13] = (UINT8)(pn >> 0); + b0[14] = (UINT8)((UINT8)(dlen >> 8) & 0xff); + b0[15] = (UINT8)(dlen & 0xff); + + /* AAD: + * FC with bits 4..6 and 11..13 masked to zero; 14 is always one + * A1 | A2 | A3 + * SC with bits 4..15 (seq#) masked to zero + * A4 (if present) + * QC (if present) + */ + aad[0] = 0; /* AAD length >> 8 */ + /* NB: aad[1] set below */ + aad[2] = (UINT8)(wh->fc[0] & 0x8f); /* XXX magic #s */ + aad[3] = (UINT8)(wh->fc[1] & 0xc7); /* XXX magic #s */ + /* NB: we know 3 addresses are contiguous */ + memcpy(aad + 4, wh->addr1, 3 * AIRPDCAP_MAC_LEN); + aad[22] = (UINT8)(wh->seq[0] & AIRPDCAP_SEQ_FRAG_MASK); + aad[23] = 0; /* all bits masked */ + /* + * Construct variable-length portion of AAD based + * on whether this is a 4-address frame/QOS frame. + * We always zero-pad to 32 bytes before running it + * through the cipher. + * + * We also fill in the priority bits of the CCM + * initial block as we know whether or not we have + * a QOS frame. + */ + if (IS_4ADDRESS(wh)) { + AIRPDCAP_ADDR_COPY(aad + 24, + ((PAIRPDCAP_MAC_FRAME_ADDR4)wh)->addr4); + if (IS_QOS_DATA(wh)) { + PAIRPDCAP_MAC_FRAME_ADDR4_QOS qwh4 = + (PAIRPDCAP_MAC_FRAME_ADDR4_QOS) wh; + aad[30] = (UINT8)(qwh4->qos[0] & 0x0f);/* just priority bits */ + aad[31] = 0; + b0[1] = aad[30]; + aad[1] = 22 + AIRPDCAP_MAC_LEN + 2; + } else { + *(UINT16 *)&aad[30] = 0; + b0[1] = 0; + aad[1] = 22 + AIRPDCAP_MAC_LEN; + } + } else { + if (IS_QOS_DATA(wh)) { + PAIRPDCAP_MAC_FRAME_QOS qwh = + (PAIRPDCAP_MAC_FRAME_QOS) wh; + aad[24] = (UINT8)(qwh->qos[0] & 0x0f); /* just priority bits */ + aad[25] = 0; + b0[1] = aad[24]; + aad[1] = 22 + 2; + } else { + *(UINT16 *)&aad[24] = 0; + b0[1] = 0; + aad[1] = 22; + } + *(UINT16 *)&aad[26] = 0; + *(UINT16 *)&aad[28] = 0; + } + + /* Start with the first block and AAD */ + rijndael_encrypt(ctx, b0, a); + xor_block(a, aad, AES_BLOCK_LEN); + rijndael_encrypt(ctx, a, a); + xor_block(a, &aad[AES_BLOCK_LEN], AES_BLOCK_LEN); + rijndael_encrypt(ctx, a, a); + b0[0] &= 0x07; + b0[14] = b0[15] = 0; + rijndael_encrypt(ctx, b0, b); + + //XOR( m + len - 8, b, 8 ); +#undef IS_QOS_DATA +#undef IS_4ADDRESS +} + +INT AirPDcapCcmpDecrypt( + UINT8 *m, + INT len, + UCHAR TK1[16]) +{ + PAIRPDCAP_MAC_FRAME wh; + UINT8 aad[2 * AES_BLOCK_LEN]; + UINT8 b0[AES_BLOCK_LEN], b[AES_BLOCK_LEN], a[AES_BLOCK_LEN]; + UINT8 mic[AES_BLOCK_LEN]; + size_t data_len; + UINT i; + UINT8 *pos; + UINT space; + INT z=AIRPDCAP_HEADER_LEN(m[1]); + rijndael_ctx key; + UCHAR PN[6]; + UINT64 tPN; + UINT8 *ivp=m+z; + + tPN = READ_6(ivp[0], ivp[1], ivp[4], ivp[5], ivp[6], ivp[7]); + memcpy(PN, &tPN, 6); + + /* freebsd */ + rijndael_set_key(&key, TK1, 128); + wh = (PAIRPDCAP_MAC_FRAME )m; + data_len = len - (z + AIRPDCAP_CCMP_HEADER+AIRPDCAP_CCMP_TRAILER); + ccmp_init_blocks(&key, wh, *(UINT64 *)PN, data_len, b0, aad, a, b); + memcpy(mic, m+len-AIRPDCAP_CCMP_TRAILER, AIRPDCAP_CCMP_TRAILER); + xor_block(mic, b, AIRPDCAP_CCMP_TRAILER); + + i = 1; + pos = (UINT8 *)m + z + AIRPDCAP_CCMP_HEADER; + space = len - (z + AIRPDCAP_CCMP_HEADER); + + if (space > data_len) + space = (UINT)data_len; + while (space >= AES_BLOCK_LEN) { + CCMP_DECRYPT(i, b, b0, pos, a, AES_BLOCK_LEN); + pos += AES_BLOCK_LEN, space -= AES_BLOCK_LEN; + data_len -= AES_BLOCK_LEN; + i++; + } + + if (space != 0) /* short last block */ + CCMP_DECRYPT(i, b, b0, pos, a, space); + + /* MIC Key ?= MIC */ + if (memcmp(mic, a, AIRPDCAP_CCMP_TRAILER) == 0) { + return 0; + } + + /* TODO replay check (IEEE 802.11i-2004, pg. 62) */ + /* TODO PN must be incremental (IEEE 802.11i-2004, pg. 62) */ + + return 1; +} diff --git a/epan/crypt/airpdcap_ccmp.h b/epan/crypt/airpdcap_ccmp.h new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/epan/crypt/airpdcap_ccmp.h diff --git a/epan/crypt/airpdcap_debug.c b/epan/crypt/airpdcap_debug.c new file mode 100644 index 0000000000..6b6125ef5c --- /dev/null +++ b/epan/crypt/airpdcap_debug.c @@ -0,0 +1,21 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +#ifdef _DEBUG + +#ifdef __cplusplus +extern "C" { +#endif + void print_debug_line(CHAR *function, CHAR *msg, INT level) { + if (level<=AIRPDCAP_DEBUG_USED_LEVEL) + printf("dbg(%d)|(%s) %s\n", level, function, msg); + } +#ifdef __cplusplus +} +#endif + +#endif diff --git a/epan/crypt/airpdcap_debug.h b/epan/crypt/airpdcap_debug.h new file mode 100644 index 0000000000..c41caaeef7 --- /dev/null +++ b/epan/crypt/airpdcap_debug.h @@ -0,0 +1,70 @@ +#ifndef _AIRPDCAP_DEBUG_H +#define _AIRPDCAP_DEBUG_H + +#include "airpdcap_interop.h" + +void print_debug_line(CHAR *function, CHAR *msg, INT level); + +#ifdef _DEBUG +#ifdef __FUNCTION__ +#define AIRPDCAP_DEBUG_PRINT_LINE(notdefined, msg, level) print_debug_line(__FUNCTION__, msg, level); +#else +#define AIRPDCAP_DEBUG_PRINT_LINE(function, msg, level) print_debug_line(function, msg, level); +#endif +#else +#ifdef __FUNCTION__ +#define AIRPDCAP_DEBUG_PRINT_LINE(notdefined, msg, level) +#else +#define AIRPDCAP_DEBUG_PRINT_LINE(function, msg, level) +#endif +#endif + +/******************************************************************************/ +/* Debug section: internal function to print debug information */ +/* */ +#ifdef _DEBUG +#include "stdio.h" +#include <time.h> + +/* Debug level definition */ +#define AIRPDCAP_DEBUG_LEVEL_1 1 +#define AIRPDCAP_DEBUG_LEVEL_2 2 +#define AIRPDCAP_DEBUG_LEVEL_3 3 +#define AIRPDCAP_DEBUG_LEVEL_4 4 +#define AIRPDCAP_DEBUG_LEVEL_5 5 + +#define AIRPDCAP_DEBUG_USED_LEVEL AIRPDCAP_DEBUG_LEVEL_3 + +#ifdef _TRACE +#ifdef __FUNCTION__ +#define AIRPDCAP_DEBUG_TRACE_START(notdefined) print_debug_line(__FUNCTION__, "Start!", AIRPDCAP_DEBUG_USED_LEVEL); +#define AIRPDCAP_DEBUG_TRACE_END(notdefined) print_debug_line(__FUNCTION__, "End!", AIRPDCAP_DEBUG_USED_LEVEL); +#else +#define AIRPDCAP_DEBUG_TRACE_START(function) print_debug_line(function, "Start!", AIRPDCAP_DEBUG_USED_LEVEL); +#define AIRPDCAP_DEBUG_TRACE_END(function) print_debug_line(function, "End!", AIRPDCAP_DEBUG_USED_LEVEL); +#endif +#else +#ifdef __FUNCTION__ +#define AIRPDCAP_DEBUG_TRACE_START(notdefined) +#define AIRPDCAP_DEBUG_TRACE_END(notdefined) +#else +#define AIRPDCAP_DEBUG_TRACE_START(function) +#define AIRPDCAP_DEBUG_TRACE_END(function) +#endif +#endif + +#else /* !defined _DEBUG */ + +#define AIRPDCAP_DEBUG_LEVEL_1 +#define AIRPDCAP_DEBUG_LEVEL_2 +#define AIRPDCAP_DEBUG_LEVEL_3 +#define AIRPDCAP_DEBUG_LEVEL_4 +#define AIRPDCAP_DEBUG_LEVEL_5 + +#define AIRPDCAP_DEBUG_TRACE_START(function) +#define AIRPDCAP_DEBUG_TRACE_END(function) + +#endif /* ?defined _DEBUG */ + + +#endif /* ?defined _AIRPDCAP_DEBUG_H */ diff --git a/epan/crypt/airpdcap_int.h b/epan/crypt/airpdcap_int.h new file mode 100644 index 0000000000..6424be6731 --- /dev/null +++ b/epan/crypt/airpdcap_int.h @@ -0,0 +1,113 @@ +#ifndef _AIRPDCAP_INT_H +#define _AIRPDCAP_INT_H + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Definitions */ +/* */ +/* IEEE 802.11 packet type values */ +#define AIRPDCAP_TYPE_MANAGEMENT 0 +#define AIRPDCAP_TYPE_CONTROL 1 +#define AIRPDCAP_TYPE_DATA 2 + +/* Min length of encrypted data (TKIP=25bytes, CCMP=21bytes) */ +#define AIRPDCAP_CRYPTED_DATA_MINLEN 21 + +#define AIRPDCAP_TA_OFFSET 10 + +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Macro definitions */ +/* */ +/* Macro to get MAC header length (if ToDS and FromDS are set, there is the address 4) */ +#define AIRPDCAP_HEADER_LEN(FrameControl_1) (UINT8)((FrameControl_1 & 0x3)==3 ? 30 : 24) + +/* Macro to get various bits of a 802.11 control frame */ +#define AIRPDCAP_TYPE(FrameControl_0) (UINT8)((FrameControl_0 >> 2) & 0x3) +#define AIRPDCAP_SUBTYPE(FrameControl_0) (UINT8)((FrameControl_0 >> 4) & 0xF) +#define AIRPDCAP_TO_DS(FrameControl_1) (UINT8)(FrameControl_1 & 0x1) +#define AIRPDCAP_FROM_DS(FrameControl_1) (UINT8)((FrameControl_1 >> 1) & 0x1) +#define AIRPDCAP_WEP(FrameControl_1) (UINT8)((FrameControl_1 >> 6) & 0x1) +/*! +/brief +it gets the Key ID from the Initialization Vector (last byte) +*/ +#define AIRPDCAP_EXTIV(KeyID) ((KeyID >> 5) & 0x1) + +/* Macro to get various bits of an EAPOL frame */ +#define AIRPDCAP_EAP_KEY_DESCR_VER(KeyInfo_1) ((UCHAR)(KeyInfo_1 & 0x3)) +#define AIRPDCAP_EAP_KEY(KeyInfo_1) ((KeyInfo_1 >> 3) & 0x1) +#define AIRPDCAP_EAP_INST(KeyInfo_1) ((KeyInfo_1 >> 6) & 0x1) +#define AIRPDCAP_EAP_ACK(KeyInfo_1) ((KeyInfo_1 >> 7) & 0x1) +#define AIRPDCAP_EAP_MIC(KeyInfo_0) (KeyInfo_0 & 0x1) +#define AIRPDCAP_EAP_SEC(KeyInfo_0) ((KeyInfo_0 >> 1) & 0x1) + +/* Note: copied from net80211/ieee80211_airpdcap_tkip.c */ +#define S_SWAP(a,b) { UINT8 t = S[a]; S[a] = S[b]; S[b] = t; } +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Structure definitions */ +/* */ +#pragma pack(push) +#pragma pack(1) + +/* Definition of IEEE 802.11 frame (without the address 4) */ +typedef struct _AIRPDCAP_MAC_FRAME { + UCHAR fc[2]; + UCHAR dur[2]; + UCHAR addr1[AIRPDCAP_MAC_LEN]; + UCHAR addr2[AIRPDCAP_MAC_LEN]; + UCHAR addr3[AIRPDCAP_MAC_LEN]; + UCHAR seq[2]; +} AIRPDCAP_MAC_FRAME, *PAIRPDCAP_MAC_FRAME; + +/* Definition of IEEE 802.11 frame (with the address 4) */ +typedef struct _AIRPDCAP_MAC_FRAME_ADDR4 { + UCHAR fc[2]; + UCHAR dur[2]; + UCHAR addr1[AIRPDCAP_MAC_LEN]; + UCHAR addr2[AIRPDCAP_MAC_LEN]; + UCHAR addr3[AIRPDCAP_MAC_LEN]; + UCHAR seq[2]; + UCHAR addr4[AIRPDCAP_MAC_LEN]; +} AIRPDCAP_MAC_FRAME_ADDR4, *PAIRPDCAP_MAC_FRAME_ADDR4; + +/* Definition of IEEE 802.11 frame (without the address 4, with QOS) */ +typedef struct _AIRPDCAP_MAC_FRAME_QOS { + UCHAR fc[2]; + UCHAR dur[2]; + UCHAR addr1[AIRPDCAP_MAC_LEN]; + UCHAR addr2[AIRPDCAP_MAC_LEN]; + UCHAR addr3[AIRPDCAP_MAC_LEN]; + UCHAR seq[2]; + UCHAR qos[2]; +} AIRPDCAP_MAC_FRAME_QOS, *PAIRPDCAP_MAC_FRAME_QOS; + +/* Definition of IEEE 802.11 frame (with the address 4 and QOS) */ +typedef struct _AIRPDCAP_MAC_FRAME_ADDR4_QOS { + UCHAR fc[2]; + UCHAR dur[2]; + UCHAR addr1[AIRPDCAP_MAC_LEN]; + UCHAR addr2[AIRPDCAP_MAC_LEN]; + UCHAR addr3[AIRPDCAP_MAC_LEN]; + UCHAR seq[2]; + UCHAR addr4[AIRPDCAP_MAC_LEN]; + UCHAR qos[2]; +} AIRPDCAP_MAC_FRAME_ADDR4_QOS, *PAIRPDCAP_MAC_FRAME_ADDR4_QOS; + +#pragma pack(pop) +/* */ +/******************************************************************************/ + +#endif diff --git a/epan/crypt/airpdcap_interop.h b/epan/crypt/airpdcap_interop.h new file mode 100644 index 0000000000..e398bf21bf --- /dev/null +++ b/epan/crypt/airpdcap_interop.h @@ -0,0 +1,64 @@ +#ifndef _AIRPDCAP_INTEROP_H +#define _AIRPDCAP_INTEROP_H + +/** + * Cast data types commonly used in Windows (e.g. UINT16) to theirf + * GLib equivalents. + */ + +#include <glib.h> +#include <string.h> + +#ifndef INT +typedef gint INT; +#endif + +#ifndef UINT +typedef guint UINT; +#endif + +#ifndef UINT8 +typedef guint8 UINT8; +#endif + +#ifndef UINT16 +typedef guint16 UINT16; +#endif + +#ifndef UINT32 +typedef guint32 UINT32; +#endif + +#ifndef UINT64 +typedef guint64 UINT64; +#endif + +#ifndef USHORT +typedef gushort USHORT; +#endif + +#ifndef ULONG +typedef gulong ULONG; +#endif + +#ifndef ULONGLONG +typedef guint64 ULONGLONG; +#endif + +#ifndef CHAR +typedef gchar CHAR; +#endif + +#ifndef UCHAR +typedef guchar UCHAR; +#endif + +#ifndef size_t +typedef gsize size_t; +#endif + +#ifndef ntohs +#define ntohs(value) g_ntohs(value) +#endif + +#endif /* _AIRPDCAP_INTEROP_H */ diff --git a/epan/crypt/airpdcap_md5.c b/epan/crypt/airpdcap_md5.c new file mode 100644 index 0000000000..aa7a6727ac --- /dev/null +++ b/epan/crypt/airpdcap_md5.c @@ -0,0 +1,450 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_system.h" +#include "airpdcap_int.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* NOTE: All the code listed here has been taken from IETF RFC 1321 (MD5 */ +/* functions) and IETF RFC 2104 (HMAC_MD5 function). Refer to that */ +/* standard for any further information. */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal definitions */ +/* */ +#define S11 7 +#define S12 12 +#define S13 17 +#define S14 22 +#define S21 5 +#define S22 9 +#define S23 14 +#define S24 20 +#define S31 4 +#define S32 11 +#define S33 16 +#define S34 23 +#define S41 6 +#define S42 10 +#define S43 15 +#define S44 21 +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal macros */ +/* */ +/* F, G, H and I are basic MD5 functions. +*/ +#define F(x, y, z) (((x) & (y)) | ((~x) & (z))) +#define G(x, y, z) (((x) & (z)) | ((y) & (~z))) +#define H(x, y, z) ((x) ^ (y) ^ (z)) +#define I(x, y, z) ((y) ^ ((x) | (~z))) + +/* ROTATE_LEFT rotates x left n bits. +*/ +#define ROTATE_LEFT(x, n) (((x) << (n)) | ((x) >> (32-(n)))) + +/* FF, GG, HH, and II transformations for rounds 1, 2, 3, and 4. +Rotation is separate from addition to prevent recomputation. +*/ +#define FF(a, b, c, d, x, s, ac) { \ + (a) += F ((b), (c), (d)) + (x) + (ULONG)(ac); \ + (a) = ROTATE_LEFT ((a), (s)); \ + (a) += (b); \ + } +#define GG(a, b, c, d, x, s, ac) { \ + (a) += G ((b), (c), (d)) + (x) + (ULONG)(ac); \ + (a) = ROTATE_LEFT ((a), (s)); \ + (a) += (b); \ + } +#define HH(a, b, c, d, x, s, ac) { \ + (a) += H ((b), (c), (d)) + (x) + (ULONG)(ac); \ + (a) = ROTATE_LEFT ((a), (s)); \ + (a) += (b); \ + } +#define II(a, b, c, d, x, s, ac) { \ + (a) += I ((b), (c), (d)) + (x) + (ULONG)(ac); \ + (a) = ROTATE_LEFT ((a), (s)); \ + (a) += (b); \ + } +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal type definitions */ +/* */ +/* MD5 context. */ +typedef struct { + ULONG state[4]; /* state (ABCD) */ + ULONG count[2]; /* number of bits, modulo 2^64 (lsb first) */ + UCHAR buffer[64]; /* input buffer */ +} MD5_CTX; + + +static UCHAR PADDING[64] = { + 0x80, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, + 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 +}; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function prototypes declarations */ +/* */ +void MD5Final( + UCHAR digest[16], + MD5_CTX *context) + ; +void MD5Update( + MD5_CTX *context, + UCHAR *input, + UINT inputLen) + ; +void MD5Init( + MD5_CTX *context) + ; +static void MD5_memset( + UCHAR *output, + INT value, + UINT len) + ; +static void MD5_memcpy( + UCHAR *output, + UCHAR *input, + UINT len) + ; +static void Decode( + ULONG *output, + UCHAR *input, + UINT len) + ; +static void Encode( + UCHAR *output, + ULONG *input, + UINT len) + ; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Function definitions */ +/* */ +/* Encodes input (ULONG) into output (UCHAR). Assumes len is +a multiple of 4. +*/ +static void Encode( + UCHAR *output, + ULONG *input, + UINT len) +{ + UINT i, j; + + for (i = 0, j = 0; j < len; i++, j += 4) { + output[j] = (UCHAR)(input[i] & 0xff); + output[j+1] = (UCHAR)((input[i] >> 8) & 0xff); + output[j+2] = (UCHAR)((input[i] >> 16) & 0xff); + output[j+3] = (UCHAR)((input[i] >> 24) & 0xff); + } +} + +/* Decodes input (UCHAR) into output (ULONG). Assumes len is +a multiple of 4. +*/ +static void Decode( + ULONG *output, + UCHAR *input, + UINT len) +{ + UINT i, j; + + for (i = 0, j = 0; j < len; i++, j += 4) + output[i] = ((ULONG)input[j]) | (((ULONG)input[j+1]) << 8) | + (((ULONG)input[j+2]) << 16) | (((ULONG)input[j+3]) << 24); +} + +/* Note: Replace "for loop" with standard memcpy if possible. +*/ + +static void MD5_memcpy( + UCHAR *output, + UCHAR *input, + UINT len) +{ + UINT i; + + for (i = 0; i < len; i++) + output[i] = input[i]; +} + +/* Note: Replace "for loop" with standard memset if possible. +*/ +static void MD5_memset( + UCHAR *output, + INT value, + UINT len) +{ + UINT i; + + for (i = 0; i < len; i++) + ((CHAR *)output)[i] = (CHAR)value; +} + +/* MD5 basic transformation. Transforms state based on block. +*/ +static void MD5Transform( + ULONG state[4], + UCHAR block[64]) +{ + ULONG a = state[0], b = state[1], c = state[2], d = state[3], x[16]; + + Decode (x, block, 64); + + /* Round 1 */ + FF (a, b, c, d, x[ 0], S11, 0xd76aa478); /* 1 */ + FF (d, a, b, c, x[ 1], S12, 0xe8c7b756); /* 2 */ + FF (c, d, a, b, x[ 2], S13, 0x242070db); /* 3 */ + FF (b, c, d, a, x[ 3], S14, 0xc1bdceee); /* 4 */ + FF (a, b, c, d, x[ 4], S11, 0xf57c0faf); /* 5 */ + FF (d, a, b, c, x[ 5], S12, 0x4787c62a); /* 6 */ + FF (c, d, a, b, x[ 6], S13, 0xa8304613); /* 7 */ + FF (b, c, d, a, x[ 7], S14, 0xfd469501); /* 8 */ + FF (a, b, c, d, x[ 8], S11, 0x698098d8); /* 9 */ + FF (d, a, b, c, x[ 9], S12, 0x8b44f7af); /* 10 */ + FF (c, d, a, b, x[10], S13, 0xffff5bb1); /* 11 */ + FF (b, c, d, a, x[11], S14, 0x895cd7be); /* 12 */ + FF (a, b, c, d, x[12], S11, 0x6b901122); /* 13 */ + FF (d, a, b, c, x[13], S12, 0xfd987193); /* 14 */ + FF (c, d, a, b, x[14], S13, 0xa679438e); /* 15 */ + FF (b, c, d, a, x[15], S14, 0x49b40821); /* 16 */ + + /* Round 2 */ + GG (a, b, c, d, x[ 1], S21, 0xf61e2562); /* 17 */ + GG (d, a, b, c, x[ 6], S22, 0xc040b340); /* 18 */ + GG (c, d, a, b, x[11], S23, 0x265e5a51); /* 19 */ + GG (b, c, d, a, x[ 0], S24, 0xe9b6c7aa); /* 20 */ + GG (a, b, c, d, x[ 5], S21, 0xd62f105d); /* 21 */ + GG (d, a, b, c, x[10], S22, 0x2441453); /* 22 */ + GG (c, d, a, b, x[15], S23, 0xd8a1e681); /* 23 */ + GG (b, c, d, a, x[ 4], S24, 0xe7d3fbc8); /* 24 */ + GG (a, b, c, d, x[ 9], S21, 0x21e1cde6); /* 25 */ + GG (d, a, b, c, x[14], S22, 0xc33707d6); /* 26 */ + GG (c, d, a, b, x[ 3], S23, 0xf4d50d87); /* 27 */ + GG (b, c, d, a, x[ 8], S24, 0x455a14ed); /* 28 */ + GG (a, b, c, d, x[13], S21, 0xa9e3e905); /* 29 */ + GG (d, a, b, c, x[ 2], S22, 0xfcefa3f8); /* 30 */ + GG (c, d, a, b, x[ 7], S23, 0x676f02d9); /* 31 */ + GG (b, c, d, a, x[12], S24, 0x8d2a4c8a); /* 32 */ + + /* Round 3 */ + HH (a, b, c, d, x[ 5], S31, 0xfffa3942); /* 33 */ + HH (d, a, b, c, x[ 8], S32, 0x8771f681); /* 34 */ + HH (c, d, a, b, x[11], S33, 0x6d9d6122); /* 35 */ + HH (b, c, d, a, x[14], S34, 0xfde5380c); /* 36 */ + HH (a, b, c, d, x[ 1], S31, 0xa4beea44); /* 37 */ + HH (d, a, b, c, x[ 4], S32, 0x4bdecfa9); /* 38 */ + HH (c, d, a, b, x[ 7], S33, 0xf6bb4b60); /* 39 */ + HH (b, c, d, a, x[10], S34, 0xbebfbc70); /* 40 */ + HH (a, b, c, d, x[13], S31, 0x289b7ec6); /* 41 */ + HH (d, a, b, c, x[ 0], S32, 0xeaa127fa); /* 42 */ + HH (c, d, a, b, x[ 3], S33, 0xd4ef3085); /* 43 */ + HH (b, c, d, a, x[ 6], S34, 0x4881d05); /* 44 */ + HH (a, b, c, d, x[ 9], S31, 0xd9d4d039); /* 45 */ + HH (d, a, b, c, x[12], S32, 0xe6db99e5); /* 46 */ + HH (c, d, a, b, x[15], S33, 0x1fa27cf8); /* 47 */ + HH (b, c, d, a, x[ 2], S34, 0xc4ac5665); /* 48 */ + + /* Round 4 */ + II (a, b, c, d, x[ 0], S41, 0xf4292244); /* 49 */ + II (d, a, b, c, x[ 7], S42, 0x432aff97); /* 50 */ + II (c, d, a, b, x[14], S43, 0xab9423a7); /* 51 */ + II (b, c, d, a, x[ 5], S44, 0xfc93a039); /* 52 */ + II (a, b, c, d, x[12], S41, 0x655b59c3); /* 53 */ + II (d, a, b, c, x[ 3], S42, 0x8f0ccc92); /* 54 */ + II (c, d, a, b, x[10], S43, 0xffeff47d); /* 55 */ + II (b, c, d, a, x[ 1], S44, 0x85845dd1); /* 56 */ + II (a, b, c, d, x[ 8], S41, 0x6fa87e4f); /* 57 */ + II (d, a, b, c, x[15], S42, 0xfe2ce6e0); /* 58 */ + II (c, d, a, b, x[ 6], S43, 0xa3014314); /* 59 */ + II (b, c, d, a, x[13], S44, 0x4e0811a1); /* 60 */ + II (a, b, c, d, x[ 4], S41, 0xf7537e82); /* 61 */ + II (d, a, b, c, x[11], S42, 0xbd3af235); /* 62 */ + II (c, d, a, b, x[ 2], S43, 0x2ad7d2bb); /* 63 */ + II (b, c, d, a, x[ 9], S44, 0xeb86d391); /* 64 */ + + state[0] += a; + state[1] += b; + state[2] += c; + state[3] += d; + + /* Zeroize sensitive information. + */ + MD5_memset ((UCHAR *)x, 0, sizeof (x)); +} + +/* MD5 initialization. Begins an MD5 operation, writing a new context. +*/ +void MD5Init( + MD5_CTX *context) +{ + memset(context, 0, sizeof(context)); + + context->count[0] = context->count[1] = 0; + /* Load magic initialization constants. + */ + context->state[0] = 0x67452301; + context->state[1] = 0xefcdab89; + context->state[2] = 0x98badcfe; + context->state[3] = 0x10325476; +} + +/* MD5 block update operation. Continues an MD5 message-digest +operation, processing another message block, and updating the +context. +*/ +void MD5Update( + MD5_CTX *context, + UCHAR *input, + UINT inputLen) +{ + UINT i, index, partLen; + + /* Compute number of bytes mod 64 */ + index = (UINT)((context->count[0] >> 3) & 0x3F); + + /* Update number of bits */ + if ((context->count[0] += ((ULONG)inputLen << 3)) + < ((ULONG)inputLen << 3)) + context->count[1]++; + context->count[1] += ((ULONG)inputLen >> 29); + + partLen = 64 - index; + + /* Transform as many times as possible. + */ + if (inputLen >= partLen) { + MD5_memcpy + ((UCHAR *)&context->buffer[index], (UCHAR *)input, partLen); + MD5Transform (context->state, context->buffer); + + for (i = partLen; i + 63 < inputLen; i += 64) + MD5Transform (context->state, &input[i]); + + index = 0; + } + else + i = 0; + + /* Buffer remaining input */ + MD5_memcpy + ((UCHAR *)&context->buffer[index], (UCHAR *)&input[i], + inputLen-i); +} + +/* MD5 finalization. Ends an MD5 message-digest operation, writing the +the message digest and zeroizing the context. +*/ +void MD5Final( + UCHAR digest[16], + MD5_CTX *context) +{ + UCHAR bits[8]; + UINT index, padLen; + + /* Save number of bits */ + Encode (bits, context->count, 8); + + /* Pad out to 56 mod 64. + */ + index = (UINT)((context->count[0] >> 3) & 0x3f); + padLen = (index < 56) ? (56 - index) : (120 - index); + MD5Update (context, PADDING, padLen); + + /* Append length (before padding) */ + MD5Update (context, bits, 8); + + /* Store state in digest */ + Encode (digest, context->state, 16); + + /* Zeroize sensitive information. + */ + MD5_memset ((UCHAR *)context, 0, sizeof (*context)); +} + +void AirPDcapAlgHmacMd5( + UCHAR *key, /* pointer to authentication key */ + INT key_len, /* length of authentication key */ + const UCHAR *text, /* pointer to data stream */ + const INT text_len, /* length of data stream */ + UCHAR *digest) /* caller digest to be filled in */ +{ + MD5_CTX context; + UCHAR k_ipad[65]; /* inner padding - + * key XORd with ipad + */ + UCHAR k_opad[65]; /* outer padding - + * key XORd with opad + */ + UCHAR tk[16]; + INT i; + /* if key is longer than 64 bytes reset it to key=MD5(key) */ + if (key_len > 64) { + + MD5_CTX tctx; + + MD5Init(&tctx); + MD5Update(&tctx, key, key_len); + MD5Final(tk, &tctx); + + key = tk; + key_len = 16; + } + + /* + * the HMAC_MD5 transform looks like: + * + * MD5(K XOR opad, MD5(K XOR ipad, text)) + * + * where K is an n byte key + * ipad is the byte 0x36 repeated 64 times + * opad is the byte 0x5c repeated 64 times + * and text is the data being protected + */ + + /* start out by storing key in pads */ + memset( k_ipad, 0, sizeof k_ipad); + memset( k_opad, 0, sizeof k_opad); + memcpy( k_ipad, key, key_len); + memcpy( k_opad, key, key_len); + + /* XOR key with ipad and opad values */ + for (i=0; i<64; i++) { + k_ipad[i] ^= 0x36; + k_opad[i] ^= 0x5c; + } + /* + * perform inner MD5 + */ + MD5Init(&context); /* init context for 1st + * pass */ + MD5Update(&context, k_ipad, 64); /* start with inner pad */ + MD5Update(&context, (UCHAR *)text, text_len); /* then text of datagram */ + MD5Final(digest, &context); /* finish up 1st pass */ + /* + * perform outer MD5 + */ + MD5Init(&context); /* init context for 2nd + * pass */ + MD5Update(&context, k_opad, 64); /* start with outer pad */ + MD5Update(&context, digest, 16); /* then results of 1st + * hash */ + MD5Final(digest, &context); /* finish up 2nd pass */ +} +/* */ +/******************************************************************************/ diff --git a/epan/crypt/airpdcap_md5.h b/epan/crypt/airpdcap_md5.h new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/epan/crypt/airpdcap_md5.h diff --git a/epan/crypt/airpdcap_rijndael.c b/epan/crypt/airpdcap_rijndael.c new file mode 100644 index 0000000000..c024a2da35 --- /dev/null +++ b/epan/crypt/airpdcap_rijndael.c @@ -0,0 +1,1080 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_rijndael.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/* Note: this code were copied from FreeBSD source code, RELENG 6, */ +/* sys/crypto/rijndael/rijndael-alg-fst.c */ + +/******************************************************************************/ +/* Internal definitions */ +/* */ +#define FULL_UNROLL +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal macros */ +/* */ +#define SWAP(x) (_lrotl(x, 8) & 0x00ff00ff | _lrotr(x, 8) & 0xff00ff00) + +#define GETU32(pt) (((UINT32)(pt)[0] << 24) ^ ((UINT32)(pt)[1] << 16) ^ ((UINT32)(pt)[2] << 8) ^ ((UINT32)(pt)[3])) + +#define PUTU32(ct, st) { (ct)[0] = (UINT8)((st) >> 24); (ct)[1] = (UINT8)((st) >> 16); (ct)[2] = (UINT8)((st) >> 8); (ct)[3] = (UINT8)(st); } +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function prototypes declarations */ +/* */ +INT rijndaelKeySetupEnc( + UINT32 rk[/*4*(Nr + 1)*/], + const UINT8 cipherKey[], + INT keyBits) + ; + +INT rijndaelKeySetupDec( + UINT32 rk[/*4*(Nr + 1)*/], + const UINT8 cipherKey[], + INT keyBits) + ; + +void rijndaelEncrypt( + const UINT32 rk[/*4*(Nr + 1)*/], + INT Nr, + const UINT8 pt[16], + UINT8 ct[16]) + ; + +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Global variables */ +/* */ +static const UINT32 Te0[256] = { + 0xc66363a5U, 0xf87c7c84U, 0xee777799U, 0xf67b7b8dU, + 0xfff2f20dU, 0xd66b6bbdU, 0xde6f6fb1U, 0x91c5c554U, + 0x60303050U, 0x02010103U, 0xce6767a9U, 0x562b2b7dU, + 0xe7fefe19U, 0xb5d7d762U, 0x4dababe6U, 0xec76769aU, + 0x8fcaca45U, 0x1f82829dU, 0x89c9c940U, 0xfa7d7d87U, + 0xeffafa15U, 0xb25959ebU, 0x8e4747c9U, 0xfbf0f00bU, + 0x41adadecU, 0xb3d4d467U, 0x5fa2a2fdU, 0x45afafeaU, + 0x239c9cbfU, 0x53a4a4f7U, 0xe4727296U, 0x9bc0c05bU, + 0x75b7b7c2U, 0xe1fdfd1cU, 0x3d9393aeU, 0x4c26266aU, + 0x6c36365aU, 0x7e3f3f41U, 0xf5f7f702U, 0x83cccc4fU, + 0x6834345cU, 0x51a5a5f4U, 0xd1e5e534U, 0xf9f1f108U, + 0xe2717193U, 0xabd8d873U, 0x62313153U, 0x2a15153fU, + 0x0804040cU, 0x95c7c752U, 0x46232365U, 0x9dc3c35eU, + 0x30181828U, 0x379696a1U, 0x0a05050fU, 0x2f9a9ab5U, + 0x0e070709U, 0x24121236U, 0x1b80809bU, 0xdfe2e23dU, + 0xcdebeb26U, 0x4e272769U, 0x7fb2b2cdU, 0xea75759fU, + 0x1209091bU, 0x1d83839eU, 0x582c2c74U, 0x341a1a2eU, + 0x361b1b2dU, 0xdc6e6eb2U, 0xb45a5aeeU, 0x5ba0a0fbU, + 0xa45252f6U, 0x763b3b4dU, 0xb7d6d661U, 0x7db3b3ceU, + 0x5229297bU, 0xdde3e33eU, 0x5e2f2f71U, 0x13848497U, + 0xa65353f5U, 0xb9d1d168U, 0x00000000U, 0xc1eded2cU, + 0x40202060U, 0xe3fcfc1fU, 0x79b1b1c8U, 0xb65b5bedU, + 0xd46a6abeU, 0x8dcbcb46U, 0x67bebed9U, 0x7239394bU, + 0x944a4adeU, 0x984c4cd4U, 0xb05858e8U, 0x85cfcf4aU, + 0xbbd0d06bU, 0xc5efef2aU, 0x4faaaae5U, 0xedfbfb16U, + 0x864343c5U, 0x9a4d4dd7U, 0x66333355U, 0x11858594U, + 0x8a4545cfU, 0xe9f9f910U, 0x04020206U, 0xfe7f7f81U, + 0xa05050f0U, 0x783c3c44U, 0x259f9fbaU, 0x4ba8a8e3U, + 0xa25151f3U, 0x5da3a3feU, 0x804040c0U, 0x058f8f8aU, + 0x3f9292adU, 0x219d9dbcU, 0x70383848U, 0xf1f5f504U, + 0x63bcbcdfU, 0x77b6b6c1U, 0xafdada75U, 0x42212163U, + 0x20101030U, 0xe5ffff1aU, 0xfdf3f30eU, 0xbfd2d26dU, + 0x81cdcd4cU, 0x180c0c14U, 0x26131335U, 0xc3ecec2fU, + 0xbe5f5fe1U, 0x359797a2U, 0x884444ccU, 0x2e171739U, + 0x93c4c457U, 0x55a7a7f2U, 0xfc7e7e82U, 0x7a3d3d47U, + 0xc86464acU, 0xba5d5de7U, 0x3219192bU, 0xe6737395U, + 0xc06060a0U, 0x19818198U, 0x9e4f4fd1U, 0xa3dcdc7fU, + 0x44222266U, 0x542a2a7eU, 0x3b9090abU, 0x0b888883U, + 0x8c4646caU, 0xc7eeee29U, 0x6bb8b8d3U, 0x2814143cU, + 0xa7dede79U, 0xbc5e5ee2U, 0x160b0b1dU, 0xaddbdb76U, + 0xdbe0e03bU, 0x64323256U, 0x743a3a4eU, 0x140a0a1eU, + 0x924949dbU, 0x0c06060aU, 0x4824246cU, 0xb85c5ce4U, + 0x9fc2c25dU, 0xbdd3d36eU, 0x43acacefU, 0xc46262a6U, + 0x399191a8U, 0x319595a4U, 0xd3e4e437U, 0xf279798bU, + 0xd5e7e732U, 0x8bc8c843U, 0x6e373759U, 0xda6d6db7U, + 0x018d8d8cU, 0xb1d5d564U, 0x9c4e4ed2U, 0x49a9a9e0U, + 0xd86c6cb4U, 0xac5656faU, 0xf3f4f407U, 0xcfeaea25U, + 0xca6565afU, 0xf47a7a8eU, 0x47aeaee9U, 0x10080818U, + 0x6fbabad5U, 0xf0787888U, 0x4a25256fU, 0x5c2e2e72U, + 0x381c1c24U, 0x57a6a6f1U, 0x73b4b4c7U, 0x97c6c651U, + 0xcbe8e823U, 0xa1dddd7cU, 0xe874749cU, 0x3e1f1f21U, + 0x964b4bddU, 0x61bdbddcU, 0x0d8b8b86U, 0x0f8a8a85U, + 0xe0707090U, 0x7c3e3e42U, 0x71b5b5c4U, 0xcc6666aaU, + 0x904848d8U, 0x06030305U, 0xf7f6f601U, 0x1c0e0e12U, + 0xc26161a3U, 0x6a35355fU, 0xae5757f9U, 0x69b9b9d0U, + 0x17868691U, 0x99c1c158U, 0x3a1d1d27U, 0x279e9eb9U, + 0xd9e1e138U, 0xebf8f813U, 0x2b9898b3U, 0x22111133U, + 0xd26969bbU, 0xa9d9d970U, 0x078e8e89U, 0x339494a7U, + 0x2d9b9bb6U, 0x3c1e1e22U, 0x15878792U, 0xc9e9e920U, + 0x87cece49U, 0xaa5555ffU, 0x50282878U, 0xa5dfdf7aU, + 0x038c8c8fU, 0x59a1a1f8U, 0x09898980U, 0x1a0d0d17U, + 0x65bfbfdaU, 0xd7e6e631U, 0x844242c6U, 0xd06868b8U, + 0x824141c3U, 0x299999b0U, 0x5a2d2d77U, 0x1e0f0f11U, + 0x7bb0b0cbU, 0xa85454fcU, 0x6dbbbbd6U, 0x2c16163aU, +}; + +static const UINT32 Te1[256] = { + 0xa5c66363U, 0x84f87c7cU, 0x99ee7777U, 0x8df67b7bU, + 0x0dfff2f2U, 0xbdd66b6bU, 0xb1de6f6fU, 0x5491c5c5U, + 0x50603030U, 0x03020101U, 0xa9ce6767U, 0x7d562b2bU, + 0x19e7fefeU, 0x62b5d7d7U, 0xe64dababU, 0x9aec7676U, + 0x458fcacaU, 0x9d1f8282U, 0x4089c9c9U, 0x87fa7d7dU, + 0x15effafaU, 0xebb25959U, 0xc98e4747U, 0x0bfbf0f0U, + 0xec41adadU, 0x67b3d4d4U, 0xfd5fa2a2U, 0xea45afafU, + 0xbf239c9cU, 0xf753a4a4U, 0x96e47272U, 0x5b9bc0c0U, + 0xc275b7b7U, 0x1ce1fdfdU, 0xae3d9393U, 0x6a4c2626U, + 0x5a6c3636U, 0x417e3f3fU, 0x02f5f7f7U, 0x4f83ccccU, + 0x5c683434U, 0xf451a5a5U, 0x34d1e5e5U, 0x08f9f1f1U, + 0x93e27171U, 0x73abd8d8U, 0x53623131U, 0x3f2a1515U, + 0x0c080404U, 0x5295c7c7U, 0x65462323U, 0x5e9dc3c3U, + 0x28301818U, 0xa1379696U, 0x0f0a0505U, 0xb52f9a9aU, + 0x090e0707U, 0x36241212U, 0x9b1b8080U, 0x3ddfe2e2U, + 0x26cdebebU, 0x694e2727U, 0xcd7fb2b2U, 0x9fea7575U, + 0x1b120909U, 0x9e1d8383U, 0x74582c2cU, 0x2e341a1aU, + 0x2d361b1bU, 0xb2dc6e6eU, 0xeeb45a5aU, 0xfb5ba0a0U, + 0xf6a45252U, 0x4d763b3bU, 0x61b7d6d6U, 0xce7db3b3U, + 0x7b522929U, 0x3edde3e3U, 0x715e2f2fU, 0x97138484U, + 0xf5a65353U, 0x68b9d1d1U, 0x00000000U, 0x2cc1ededU, + 0x60402020U, 0x1fe3fcfcU, 0xc879b1b1U, 0xedb65b5bU, + 0xbed46a6aU, 0x468dcbcbU, 0xd967bebeU, 0x4b723939U, + 0xde944a4aU, 0xd4984c4cU, 0xe8b05858U, 0x4a85cfcfU, + 0x6bbbd0d0U, 0x2ac5efefU, 0xe54faaaaU, 0x16edfbfbU, + 0xc5864343U, 0xd79a4d4dU, 0x55663333U, 0x94118585U, + 0xcf8a4545U, 0x10e9f9f9U, 0x06040202U, 0x81fe7f7fU, + 0xf0a05050U, 0x44783c3cU, 0xba259f9fU, 0xe34ba8a8U, + 0xf3a25151U, 0xfe5da3a3U, 0xc0804040U, 0x8a058f8fU, + 0xad3f9292U, 0xbc219d9dU, 0x48703838U, 0x04f1f5f5U, + 0xdf63bcbcU, 0xc177b6b6U, 0x75afdadaU, 0x63422121U, + 0x30201010U, 0x1ae5ffffU, 0x0efdf3f3U, 0x6dbfd2d2U, + 0x4c81cdcdU, 0x14180c0cU, 0x35261313U, 0x2fc3ececU, + 0xe1be5f5fU, 0xa2359797U, 0xcc884444U, 0x392e1717U, + 0x5793c4c4U, 0xf255a7a7U, 0x82fc7e7eU, 0x477a3d3dU, + 0xacc86464U, 0xe7ba5d5dU, 0x2b321919U, 0x95e67373U, + 0xa0c06060U, 0x98198181U, 0xd19e4f4fU, 0x7fa3dcdcU, + 0x66442222U, 0x7e542a2aU, 0xab3b9090U, 0x830b8888U, + 0xca8c4646U, 0x29c7eeeeU, 0xd36bb8b8U, 0x3c281414U, + 0x79a7dedeU, 0xe2bc5e5eU, 0x1d160b0bU, 0x76addbdbU, + 0x3bdbe0e0U, 0x56643232U, 0x4e743a3aU, 0x1e140a0aU, + 0xdb924949U, 0x0a0c0606U, 0x6c482424U, 0xe4b85c5cU, + 0x5d9fc2c2U, 0x6ebdd3d3U, 0xef43acacU, 0xa6c46262U, + 0xa8399191U, 0xa4319595U, 0x37d3e4e4U, 0x8bf27979U, + 0x32d5e7e7U, 0x438bc8c8U, 0x596e3737U, 0xb7da6d6dU, + 0x8c018d8dU, 0x64b1d5d5U, 0xd29c4e4eU, 0xe049a9a9U, + 0xb4d86c6cU, 0xfaac5656U, 0x07f3f4f4U, 0x25cfeaeaU, + 0xafca6565U, 0x8ef47a7aU, 0xe947aeaeU, 0x18100808U, + 0xd56fbabaU, 0x88f07878U, 0x6f4a2525U, 0x725c2e2eU, + 0x24381c1cU, 0xf157a6a6U, 0xc773b4b4U, 0x5197c6c6U, + 0x23cbe8e8U, 0x7ca1ddddU, 0x9ce87474U, 0x213e1f1fU, + 0xdd964b4bU, 0xdc61bdbdU, 0x860d8b8bU, 0x850f8a8aU, + 0x90e07070U, 0x427c3e3eU, 0xc471b5b5U, 0xaacc6666U, + 0xd8904848U, 0x05060303U, 0x01f7f6f6U, 0x121c0e0eU, + 0xa3c26161U, 0x5f6a3535U, 0xf9ae5757U, 0xd069b9b9U, + 0x91178686U, 0x5899c1c1U, 0x273a1d1dU, 0xb9279e9eU, + 0x38d9e1e1U, 0x13ebf8f8U, 0xb32b9898U, 0x33221111U, + 0xbbd26969U, 0x70a9d9d9U, 0x89078e8eU, 0xa7339494U, + 0xb62d9b9bU, 0x223c1e1eU, 0x92158787U, 0x20c9e9e9U, + 0x4987ceceU, 0xffaa5555U, 0x78502828U, 0x7aa5dfdfU, + 0x8f038c8cU, 0xf859a1a1U, 0x80098989U, 0x171a0d0dU, + 0xda65bfbfU, 0x31d7e6e6U, 0xc6844242U, 0xb8d06868U, + 0xc3824141U, 0xb0299999U, 0x775a2d2dU, 0x111e0f0fU, + 0xcb7bb0b0U, 0xfca85454U, 0xd66dbbbbU, 0x3a2c1616U, +}; + +static const UINT32 Te2[256] = { + 0x63a5c663U, 0x7c84f87cU, 0x7799ee77U, 0x7b8df67bU, + 0xf20dfff2U, 0x6bbdd66bU, 0x6fb1de6fU, 0xc55491c5U, + 0x30506030U, 0x01030201U, 0x67a9ce67U, 0x2b7d562bU, + 0xfe19e7feU, 0xd762b5d7U, 0xabe64dabU, 0x769aec76U, + 0xca458fcaU, 0x829d1f82U, 0xc94089c9U, 0x7d87fa7dU, + 0xfa15effaU, 0x59ebb259U, 0x47c98e47U, 0xf00bfbf0U, + 0xadec41adU, 0xd467b3d4U, 0xa2fd5fa2U, 0xafea45afU, + 0x9cbf239cU, 0xa4f753a4U, 0x7296e472U, 0xc05b9bc0U, + 0xb7c275b7U, 0xfd1ce1fdU, 0x93ae3d93U, 0x266a4c26U, + 0x365a6c36U, 0x3f417e3fU, 0xf702f5f7U, 0xcc4f83ccU, + 0x345c6834U, 0xa5f451a5U, 0xe534d1e5U, 0xf108f9f1U, + 0x7193e271U, 0xd873abd8U, 0x31536231U, 0x153f2a15U, + 0x040c0804U, 0xc75295c7U, 0x23654623U, 0xc35e9dc3U, + 0x18283018U, 0x96a13796U, 0x050f0a05U, 0x9ab52f9aU, + 0x07090e07U, 0x12362412U, 0x809b1b80U, 0xe23ddfe2U, + 0xeb26cdebU, 0x27694e27U, 0xb2cd7fb2U, 0x759fea75U, + 0x091b1209U, 0x839e1d83U, 0x2c74582cU, 0x1a2e341aU, + 0x1b2d361bU, 0x6eb2dc6eU, 0x5aeeb45aU, 0xa0fb5ba0U, + 0x52f6a452U, 0x3b4d763bU, 0xd661b7d6U, 0xb3ce7db3U, + 0x297b5229U, 0xe33edde3U, 0x2f715e2fU, 0x84971384U, + 0x53f5a653U, 0xd168b9d1U, 0x00000000U, 0xed2cc1edU, + 0x20604020U, 0xfc1fe3fcU, 0xb1c879b1U, 0x5bedb65bU, + 0x6abed46aU, 0xcb468dcbU, 0xbed967beU, 0x394b7239U, + 0x4ade944aU, 0x4cd4984cU, 0x58e8b058U, 0xcf4a85cfU, + 0xd06bbbd0U, 0xef2ac5efU, 0xaae54faaU, 0xfb16edfbU, + 0x43c58643U, 0x4dd79a4dU, 0x33556633U, 0x85941185U, + 0x45cf8a45U, 0xf910e9f9U, 0x02060402U, 0x7f81fe7fU, + 0x50f0a050U, 0x3c44783cU, 0x9fba259fU, 0xa8e34ba8U, + 0x51f3a251U, 0xa3fe5da3U, 0x40c08040U, 0x8f8a058fU, + 0x92ad3f92U, 0x9dbc219dU, 0x38487038U, 0xf504f1f5U, + 0xbcdf63bcU, 0xb6c177b6U, 0xda75afdaU, 0x21634221U, + 0x10302010U, 0xff1ae5ffU, 0xf30efdf3U, 0xd26dbfd2U, + 0xcd4c81cdU, 0x0c14180cU, 0x13352613U, 0xec2fc3ecU, + 0x5fe1be5fU, 0x97a23597U, 0x44cc8844U, 0x17392e17U, + 0xc45793c4U, 0xa7f255a7U, 0x7e82fc7eU, 0x3d477a3dU, + 0x64acc864U, 0x5de7ba5dU, 0x192b3219U, 0x7395e673U, + 0x60a0c060U, 0x81981981U, 0x4fd19e4fU, 0xdc7fa3dcU, + 0x22664422U, 0x2a7e542aU, 0x90ab3b90U, 0x88830b88U, + 0x46ca8c46U, 0xee29c7eeU, 0xb8d36bb8U, 0x143c2814U, + 0xde79a7deU, 0x5ee2bc5eU, 0x0b1d160bU, 0xdb76addbU, + 0xe03bdbe0U, 0x32566432U, 0x3a4e743aU, 0x0a1e140aU, + 0x49db9249U, 0x060a0c06U, 0x246c4824U, 0x5ce4b85cU, + 0xc25d9fc2U, 0xd36ebdd3U, 0xacef43acU, 0x62a6c462U, + 0x91a83991U, 0x95a43195U, 0xe437d3e4U, 0x798bf279U, + 0xe732d5e7U, 0xc8438bc8U, 0x37596e37U, 0x6db7da6dU, + 0x8d8c018dU, 0xd564b1d5U, 0x4ed29c4eU, 0xa9e049a9U, + 0x6cb4d86cU, 0x56faac56U, 0xf407f3f4U, 0xea25cfeaU, + 0x65afca65U, 0x7a8ef47aU, 0xaee947aeU, 0x08181008U, + 0xbad56fbaU, 0x7888f078U, 0x256f4a25U, 0x2e725c2eU, + 0x1c24381cU, 0xa6f157a6U, 0xb4c773b4U, 0xc65197c6U, + 0xe823cbe8U, 0xdd7ca1ddU, 0x749ce874U, 0x1f213e1fU, + 0x4bdd964bU, 0xbddc61bdU, 0x8b860d8bU, 0x8a850f8aU, + 0x7090e070U, 0x3e427c3eU, 0xb5c471b5U, 0x66aacc66U, + 0x48d89048U, 0x03050603U, 0xf601f7f6U, 0x0e121c0eU, + 0x61a3c261U, 0x355f6a35U, 0x57f9ae57U, 0xb9d069b9U, + 0x86911786U, 0xc15899c1U, 0x1d273a1dU, 0x9eb9279eU, + 0xe138d9e1U, 0xf813ebf8U, 0x98b32b98U, 0x11332211U, + 0x69bbd269U, 0xd970a9d9U, 0x8e89078eU, 0x94a73394U, + 0x9bb62d9bU, 0x1e223c1eU, 0x87921587U, 0xe920c9e9U, + 0xce4987ceU, 0x55ffaa55U, 0x28785028U, 0xdf7aa5dfU, + 0x8c8f038cU, 0xa1f859a1U, 0x89800989U, 0x0d171a0dU, + 0xbfda65bfU, 0xe631d7e6U, 0x42c68442U, 0x68b8d068U, + 0x41c38241U, 0x99b02999U, 0x2d775a2dU, 0x0f111e0fU, + 0xb0cb7bb0U, 0x54fca854U, 0xbbd66dbbU, 0x163a2c16U, +}; + +static const UINT32 Te3[256] = { + 0x6363a5c6U, 0x7c7c84f8U, 0x777799eeU, 0x7b7b8df6U, + 0xf2f20dffU, 0x6b6bbdd6U, 0x6f6fb1deU, 0xc5c55491U, + 0x30305060U, 0x01010302U, 0x6767a9ceU, 0x2b2b7d56U, + 0xfefe19e7U, 0xd7d762b5U, 0xababe64dU, 0x76769aecU, + 0xcaca458fU, 0x82829d1fU, 0xc9c94089U, 0x7d7d87faU, + 0xfafa15efU, 0x5959ebb2U, 0x4747c98eU, 0xf0f00bfbU, + 0xadadec41U, 0xd4d467b3U, 0xa2a2fd5fU, 0xafafea45U, + 0x9c9cbf23U, 0xa4a4f753U, 0x727296e4U, 0xc0c05b9bU, + 0xb7b7c275U, 0xfdfd1ce1U, 0x9393ae3dU, 0x26266a4cU, + 0x36365a6cU, 0x3f3f417eU, 0xf7f702f5U, 0xcccc4f83U, + 0x34345c68U, 0xa5a5f451U, 0xe5e534d1U, 0xf1f108f9U, + 0x717193e2U, 0xd8d873abU, 0x31315362U, 0x15153f2aU, + 0x04040c08U, 0xc7c75295U, 0x23236546U, 0xc3c35e9dU, + 0x18182830U, 0x9696a137U, 0x05050f0aU, 0x9a9ab52fU, + 0x0707090eU, 0x12123624U, 0x80809b1bU, 0xe2e23ddfU, + 0xebeb26cdU, 0x2727694eU, 0xb2b2cd7fU, 0x75759feaU, + 0x09091b12U, 0x83839e1dU, 0x2c2c7458U, 0x1a1a2e34U, + 0x1b1b2d36U, 0x6e6eb2dcU, 0x5a5aeeb4U, 0xa0a0fb5bU, + 0x5252f6a4U, 0x3b3b4d76U, 0xd6d661b7U, 0xb3b3ce7dU, + 0x29297b52U, 0xe3e33eddU, 0x2f2f715eU, 0x84849713U, + 0x5353f5a6U, 0xd1d168b9U, 0x00000000U, 0xeded2cc1U, + 0x20206040U, 0xfcfc1fe3U, 0xb1b1c879U, 0x5b5bedb6U, + 0x6a6abed4U, 0xcbcb468dU, 0xbebed967U, 0x39394b72U, + 0x4a4ade94U, 0x4c4cd498U, 0x5858e8b0U, 0xcfcf4a85U, + 0xd0d06bbbU, 0xefef2ac5U, 0xaaaae54fU, 0xfbfb16edU, + 0x4343c586U, 0x4d4dd79aU, 0x33335566U, 0x85859411U, + 0x4545cf8aU, 0xf9f910e9U, 0x02020604U, 0x7f7f81feU, + 0x5050f0a0U, 0x3c3c4478U, 0x9f9fba25U, 0xa8a8e34bU, + 0x5151f3a2U, 0xa3a3fe5dU, 0x4040c080U, 0x8f8f8a05U, + 0x9292ad3fU, 0x9d9dbc21U, 0x38384870U, 0xf5f504f1U, + 0xbcbcdf63U, 0xb6b6c177U, 0xdada75afU, 0x21216342U, + 0x10103020U, 0xffff1ae5U, 0xf3f30efdU, 0xd2d26dbfU, + 0xcdcd4c81U, 0x0c0c1418U, 0x13133526U, 0xecec2fc3U, + 0x5f5fe1beU, 0x9797a235U, 0x4444cc88U, 0x1717392eU, + 0xc4c45793U, 0xa7a7f255U, 0x7e7e82fcU, 0x3d3d477aU, + 0x6464acc8U, 0x5d5de7baU, 0x19192b32U, 0x737395e6U, + 0x6060a0c0U, 0x81819819U, 0x4f4fd19eU, 0xdcdc7fa3U, + 0x22226644U, 0x2a2a7e54U, 0x9090ab3bU, 0x8888830bU, + 0x4646ca8cU, 0xeeee29c7U, 0xb8b8d36bU, 0x14143c28U, + 0xdede79a7U, 0x5e5ee2bcU, 0x0b0b1d16U, 0xdbdb76adU, + 0xe0e03bdbU, 0x32325664U, 0x3a3a4e74U, 0x0a0a1e14U, + 0x4949db92U, 0x06060a0cU, 0x24246c48U, 0x5c5ce4b8U, + 0xc2c25d9fU, 0xd3d36ebdU, 0xacacef43U, 0x6262a6c4U, + 0x9191a839U, 0x9595a431U, 0xe4e437d3U, 0x79798bf2U, + 0xe7e732d5U, 0xc8c8438bU, 0x3737596eU, 0x6d6db7daU, + 0x8d8d8c01U, 0xd5d564b1U, 0x4e4ed29cU, 0xa9a9e049U, + 0x6c6cb4d8U, 0x5656faacU, 0xf4f407f3U, 0xeaea25cfU, + 0x6565afcaU, 0x7a7a8ef4U, 0xaeaee947U, 0x08081810U, + 0xbabad56fU, 0x787888f0U, 0x25256f4aU, 0x2e2e725cU, + 0x1c1c2438U, 0xa6a6f157U, 0xb4b4c773U, 0xc6c65197U, + 0xe8e823cbU, 0xdddd7ca1U, 0x74749ce8U, 0x1f1f213eU, + 0x4b4bdd96U, 0xbdbddc61U, 0x8b8b860dU, 0x8a8a850fU, + 0x707090e0U, 0x3e3e427cU, 0xb5b5c471U, 0x6666aaccU, + 0x4848d890U, 0x03030506U, 0xf6f601f7U, 0x0e0e121cU, + 0x6161a3c2U, 0x35355f6aU, 0x5757f9aeU, 0xb9b9d069U, + 0x86869117U, 0xc1c15899U, 0x1d1d273aU, 0x9e9eb927U, + 0xe1e138d9U, 0xf8f813ebU, 0x9898b32bU, 0x11113322U, + 0x6969bbd2U, 0xd9d970a9U, 0x8e8e8907U, 0x9494a733U, + 0x9b9bb62dU, 0x1e1e223cU, 0x87879215U, 0xe9e920c9U, + 0xcece4987U, 0x5555ffaaU, 0x28287850U, 0xdfdf7aa5U, + 0x8c8c8f03U, 0xa1a1f859U, 0x89898009U, 0x0d0d171aU, + 0xbfbfda65U, 0xe6e631d7U, 0x4242c684U, 0x6868b8d0U, + 0x4141c382U, 0x9999b029U, 0x2d2d775aU, 0x0f0f111eU, + 0xb0b0cb7bU, 0x5454fca8U, 0xbbbbd66dU, 0x16163a2cU, +}; + +static const UINT32 Te4[256] = { + 0x63636363U, 0x7c7c7c7cU, 0x77777777U, 0x7b7b7b7bU, + 0xf2f2f2f2U, 0x6b6b6b6bU, 0x6f6f6f6fU, 0xc5c5c5c5U, + 0x30303030U, 0x01010101U, 0x67676767U, 0x2b2b2b2bU, + 0xfefefefeU, 0xd7d7d7d7U, 0xababababU, 0x76767676U, + 0xcacacacaU, 0x82828282U, 0xc9c9c9c9U, 0x7d7d7d7dU, + 0xfafafafaU, 0x59595959U, 0x47474747U, 0xf0f0f0f0U, + 0xadadadadU, 0xd4d4d4d4U, 0xa2a2a2a2U, 0xafafafafU, + 0x9c9c9c9cU, 0xa4a4a4a4U, 0x72727272U, 0xc0c0c0c0U, + 0xb7b7b7b7U, 0xfdfdfdfdU, 0x93939393U, 0x26262626U, + 0x36363636U, 0x3f3f3f3fU, 0xf7f7f7f7U, 0xccccccccU, + 0x34343434U, 0xa5a5a5a5U, 0xe5e5e5e5U, 0xf1f1f1f1U, + 0x71717171U, 0xd8d8d8d8U, 0x31313131U, 0x15151515U, + 0x04040404U, 0xc7c7c7c7U, 0x23232323U, 0xc3c3c3c3U, + 0x18181818U, 0x96969696U, 0x05050505U, 0x9a9a9a9aU, + 0x07070707U, 0x12121212U, 0x80808080U, 0xe2e2e2e2U, + 0xebebebebU, 0x27272727U, 0xb2b2b2b2U, 0x75757575U, + 0x09090909U, 0x83838383U, 0x2c2c2c2cU, 0x1a1a1a1aU, + 0x1b1b1b1bU, 0x6e6e6e6eU, 0x5a5a5a5aU, 0xa0a0a0a0U, + 0x52525252U, 0x3b3b3b3bU, 0xd6d6d6d6U, 0xb3b3b3b3U, + 0x29292929U, 0xe3e3e3e3U, 0x2f2f2f2fU, 0x84848484U, + 0x53535353U, 0xd1d1d1d1U, 0x00000000U, 0xededededU, + 0x20202020U, 0xfcfcfcfcU, 0xb1b1b1b1U, 0x5b5b5b5bU, + 0x6a6a6a6aU, 0xcbcbcbcbU, 0xbebebebeU, 0x39393939U, + 0x4a4a4a4aU, 0x4c4c4c4cU, 0x58585858U, 0xcfcfcfcfU, + 0xd0d0d0d0U, 0xefefefefU, 0xaaaaaaaaU, 0xfbfbfbfbU, + 0x43434343U, 0x4d4d4d4dU, 0x33333333U, 0x85858585U, + 0x45454545U, 0xf9f9f9f9U, 0x02020202U, 0x7f7f7f7fU, + 0x50505050U, 0x3c3c3c3cU, 0x9f9f9f9fU, 0xa8a8a8a8U, + 0x51515151U, 0xa3a3a3a3U, 0x40404040U, 0x8f8f8f8fU, + 0x92929292U, 0x9d9d9d9dU, 0x38383838U, 0xf5f5f5f5U, + 0xbcbcbcbcU, 0xb6b6b6b6U, 0xdadadadaU, 0x21212121U, + 0x10101010U, 0xffffffffU, 0xf3f3f3f3U, 0xd2d2d2d2U, + 0xcdcdcdcdU, 0x0c0c0c0cU, 0x13131313U, 0xececececU, + 0x5f5f5f5fU, 0x97979797U, 0x44444444U, 0x17171717U, + 0xc4c4c4c4U, 0xa7a7a7a7U, 0x7e7e7e7eU, 0x3d3d3d3dU, + 0x64646464U, 0x5d5d5d5dU, 0x19191919U, 0x73737373U, + 0x60606060U, 0x81818181U, 0x4f4f4f4fU, 0xdcdcdcdcU, + 0x22222222U, 0x2a2a2a2aU, 0x90909090U, 0x88888888U, + 0x46464646U, 0xeeeeeeeeU, 0xb8b8b8b8U, 0x14141414U, + 0xdedededeU, 0x5e5e5e5eU, 0x0b0b0b0bU, 0xdbdbdbdbU, + 0xe0e0e0e0U, 0x32323232U, 0x3a3a3a3aU, 0x0a0a0a0aU, + 0x49494949U, 0x06060606U, 0x24242424U, 0x5c5c5c5cU, + 0xc2c2c2c2U, 0xd3d3d3d3U, 0xacacacacU, 0x62626262U, + 0x91919191U, 0x95959595U, 0xe4e4e4e4U, 0x79797979U, + 0xe7e7e7e7U, 0xc8c8c8c8U, 0x37373737U, 0x6d6d6d6dU, + 0x8d8d8d8dU, 0xd5d5d5d5U, 0x4e4e4e4eU, 0xa9a9a9a9U, + 0x6c6c6c6cU, 0x56565656U, 0xf4f4f4f4U, 0xeaeaeaeaU, + 0x65656565U, 0x7a7a7a7aU, 0xaeaeaeaeU, 0x08080808U, + 0xbabababaU, 0x78787878U, 0x25252525U, 0x2e2e2e2eU, + 0x1c1c1c1cU, 0xa6a6a6a6U, 0xb4b4b4b4U, 0xc6c6c6c6U, + 0xe8e8e8e8U, 0xddddddddU, 0x74747474U, 0x1f1f1f1fU, + 0x4b4b4b4bU, 0xbdbdbdbdU, 0x8b8b8b8bU, 0x8a8a8a8aU, + 0x70707070U, 0x3e3e3e3eU, 0xb5b5b5b5U, 0x66666666U, + 0x48484848U, 0x03030303U, 0xf6f6f6f6U, 0x0e0e0e0eU, + 0x61616161U, 0x35353535U, 0x57575757U, 0xb9b9b9b9U, + 0x86868686U, 0xc1c1c1c1U, 0x1d1d1d1dU, 0x9e9e9e9eU, + 0xe1e1e1e1U, 0xf8f8f8f8U, 0x98989898U, 0x11111111U, + 0x69696969U, 0xd9d9d9d9U, 0x8e8e8e8eU, 0x94949494U, + 0x9b9b9b9bU, 0x1e1e1e1eU, 0x87878787U, 0xe9e9e9e9U, + 0xcecececeU, 0x55555555U, 0x28282828U, 0xdfdfdfdfU, + 0x8c8c8c8cU, 0xa1a1a1a1U, 0x89898989U, 0x0d0d0d0dU, + 0xbfbfbfbfU, 0xe6e6e6e6U, 0x42424242U, 0x68686868U, + 0x41414141U, 0x99999999U, 0x2d2d2d2dU, 0x0f0f0f0fU, + 0xb0b0b0b0U, 0x54545454U, 0xbbbbbbbbU, 0x16161616U, +}; + +static const UINT32 Td0[256] = { + 0x51f4a750U, 0x7e416553U, 0x1a17a4c3U, 0x3a275e96U, + 0x3bab6bcbU, 0x1f9d45f1U, 0xacfa58abU, 0x4be30393U, + 0x2030fa55U, 0xad766df6U, 0x88cc7691U, 0xf5024c25U, + 0x4fe5d7fcU, 0xc52acbd7U, 0x26354480U, 0xb562a38fU, + 0xdeb15a49U, 0x25ba1b67U, 0x45ea0e98U, 0x5dfec0e1U, + 0xc32f7502U, 0x814cf012U, 0x8d4697a3U, 0x6bd3f9c6U, + 0x038f5fe7U, 0x15929c95U, 0xbf6d7aebU, 0x955259daU, + 0xd4be832dU, 0x587421d3U, 0x49e06929U, 0x8ec9c844U, + 0x75c2896aU, 0xf48e7978U, 0x99583e6bU, 0x27b971ddU, + 0xbee14fb6U, 0xf088ad17U, 0xc920ac66U, 0x7dce3ab4U, + 0x63df4a18U, 0xe51a3182U, 0x97513360U, 0x62537f45U, + 0xb16477e0U, 0xbb6bae84U, 0xfe81a01cU, 0xf9082b94U, + 0x70486858U, 0x8f45fd19U, 0x94de6c87U, 0x527bf8b7U, + 0xab73d323U, 0x724b02e2U, 0xe31f8f57U, 0x6655ab2aU, + 0xb2eb2807U, 0x2fb5c203U, 0x86c57b9aU, 0xd33708a5U, + 0x302887f2U, 0x23bfa5b2U, 0x02036abaU, 0xed16825cU, + 0x8acf1c2bU, 0xa779b492U, 0xf307f2f0U, 0x4e69e2a1U, + 0x65daf4cdU, 0x0605bed5U, 0xd134621fU, 0xc4a6fe8aU, + 0x342e539dU, 0xa2f355a0U, 0x058ae132U, 0xa4f6eb75U, + 0x0b83ec39U, 0x4060efaaU, 0x5e719f06U, 0xbd6e1051U, + 0x3e218af9U, 0x96dd063dU, 0xdd3e05aeU, 0x4de6bd46U, + 0x91548db5U, 0x71c45d05U, 0x0406d46fU, 0x605015ffU, + 0x1998fb24U, 0xd6bde997U, 0x894043ccU, 0x67d99e77U, + 0xb0e842bdU, 0x07898b88U, 0xe7195b38U, 0x79c8eedbU, + 0xa17c0a47U, 0x7c420fe9U, 0xf8841ec9U, 0x00000000U, + 0x09808683U, 0x322bed48U, 0x1e1170acU, 0x6c5a724eU, + 0xfd0efffbU, 0x0f853856U, 0x3daed51eU, 0x362d3927U, + 0x0a0fd964U, 0x685ca621U, 0x9b5b54d1U, 0x24362e3aU, + 0x0c0a67b1U, 0x9357e70fU, 0xb4ee96d2U, 0x1b9b919eU, + 0x80c0c54fU, 0x61dc20a2U, 0x5a774b69U, 0x1c121a16U, + 0xe293ba0aU, 0xc0a02ae5U, 0x3c22e043U, 0x121b171dU, + 0x0e090d0bU, 0xf28bc7adU, 0x2db6a8b9U, 0x141ea9c8U, + 0x57f11985U, 0xaf75074cU, 0xee99ddbbU, 0xa37f60fdU, + 0xf701269fU, 0x5c72f5bcU, 0x44663bc5U, 0x5bfb7e34U, + 0x8b432976U, 0xcb23c6dcU, 0xb6edfc68U, 0xb8e4f163U, + 0xd731dccaU, 0x42638510U, 0x13972240U, 0x84c61120U, + 0x854a247dU, 0xd2bb3df8U, 0xaef93211U, 0xc729a16dU, + 0x1d9e2f4bU, 0xdcb230f3U, 0x0d8652ecU, 0x77c1e3d0U, + 0x2bb3166cU, 0xa970b999U, 0x119448faU, 0x47e96422U, + 0xa8fc8cc4U, 0xa0f03f1aU, 0x567d2cd8U, 0x223390efU, + 0x87494ec7U, 0xd938d1c1U, 0x8ccaa2feU, 0x98d40b36U, + 0xa6f581cfU, 0xa57ade28U, 0xdab78e26U, 0x3fadbfa4U, + 0x2c3a9de4U, 0x5078920dU, 0x6a5fcc9bU, 0x547e4662U, + 0xf68d13c2U, 0x90d8b8e8U, 0x2e39f75eU, 0x82c3aff5U, + 0x9f5d80beU, 0x69d0937cU, 0x6fd52da9U, 0xcf2512b3U, + 0xc8ac993bU, 0x10187da7U, 0xe89c636eU, 0xdb3bbb7bU, + 0xcd267809U, 0x6e5918f4U, 0xec9ab701U, 0x834f9aa8U, + 0xe6956e65U, 0xaaffe67eU, 0x21bccf08U, 0xef15e8e6U, + 0xbae79bd9U, 0x4a6f36ceU, 0xea9f09d4U, 0x29b07cd6U, + 0x31a4b2afU, 0x2a3f2331U, 0xc6a59430U, 0x35a266c0U, + 0x744ebc37U, 0xfc82caa6U, 0xe090d0b0U, 0x33a7d815U, + 0xf104984aU, 0x41ecdaf7U, 0x7fcd500eU, 0x1791f62fU, + 0x764dd68dU, 0x43efb04dU, 0xccaa4d54U, 0xe49604dfU, + 0x9ed1b5e3U, 0x4c6a881bU, 0xc12c1fb8U, 0x4665517fU, + 0x9d5eea04U, 0x018c355dU, 0xfa877473U, 0xfb0b412eU, + 0xb3671d5aU, 0x92dbd252U, 0xe9105633U, 0x6dd64713U, + 0x9ad7618cU, 0x37a10c7aU, 0x59f8148eU, 0xeb133c89U, + 0xcea927eeU, 0xb761c935U, 0xe11ce5edU, 0x7a47b13cU, + 0x9cd2df59U, 0x55f2733fU, 0x1814ce79U, 0x73c737bfU, + 0x53f7cdeaU, 0x5ffdaa5bU, 0xdf3d6f14U, 0x7844db86U, + 0xcaaff381U, 0xb968c43eU, 0x3824342cU, 0xc2a3405fU, + 0x161dc372U, 0xbce2250cU, 0x283c498bU, 0xff0d9541U, + 0x39a80171U, 0x080cb3deU, 0xd8b4e49cU, 0x6456c190U, + 0x7bcb8461U, 0xd532b670U, 0x486c5c74U, 0xd0b85742U, +}; + +static const UINT32 Td1[256] = { + 0x5051f4a7U, 0x537e4165U, 0xc31a17a4U, 0x963a275eU, + 0xcb3bab6bU, 0xf11f9d45U, 0xabacfa58U, 0x934be303U, + 0x552030faU, 0xf6ad766dU, 0x9188cc76U, 0x25f5024cU, + 0xfc4fe5d7U, 0xd7c52acbU, 0x80263544U, 0x8fb562a3U, + 0x49deb15aU, 0x6725ba1bU, 0x9845ea0eU, 0xe15dfec0U, + 0x02c32f75U, 0x12814cf0U, 0xa38d4697U, 0xc66bd3f9U, + 0xe7038f5fU, 0x9515929cU, 0xebbf6d7aU, 0xda955259U, + 0x2dd4be83U, 0xd3587421U, 0x2949e069U, 0x448ec9c8U, + 0x6a75c289U, 0x78f48e79U, 0x6b99583eU, 0xdd27b971U, + 0xb6bee14fU, 0x17f088adU, 0x66c920acU, 0xb47dce3aU, + 0x1863df4aU, 0x82e51a31U, 0x60975133U, 0x4562537fU, + 0xe0b16477U, 0x84bb6baeU, 0x1cfe81a0U, 0x94f9082bU, + 0x58704868U, 0x198f45fdU, 0x8794de6cU, 0xb7527bf8U, + 0x23ab73d3U, 0xe2724b02U, 0x57e31f8fU, 0x2a6655abU, + 0x07b2eb28U, 0x032fb5c2U, 0x9a86c57bU, 0xa5d33708U, + 0xf2302887U, 0xb223bfa5U, 0xba02036aU, 0x5ced1682U, + 0x2b8acf1cU, 0x92a779b4U, 0xf0f307f2U, 0xa14e69e2U, + 0xcd65daf4U, 0xd50605beU, 0x1fd13462U, 0x8ac4a6feU, + 0x9d342e53U, 0xa0a2f355U, 0x32058ae1U, 0x75a4f6ebU, + 0x390b83ecU, 0xaa4060efU, 0x065e719fU, 0x51bd6e10U, + 0xf93e218aU, 0x3d96dd06U, 0xaedd3e05U, 0x464de6bdU, + 0xb591548dU, 0x0571c45dU, 0x6f0406d4U, 0xff605015U, + 0x241998fbU, 0x97d6bde9U, 0xcc894043U, 0x7767d99eU, + 0xbdb0e842U, 0x8807898bU, 0x38e7195bU, 0xdb79c8eeU, + 0x47a17c0aU, 0xe97c420fU, 0xc9f8841eU, 0x00000000U, + 0x83098086U, 0x48322bedU, 0xac1e1170U, 0x4e6c5a72U, + 0xfbfd0effU, 0x560f8538U, 0x1e3daed5U, 0x27362d39U, + 0x640a0fd9U, 0x21685ca6U, 0xd19b5b54U, 0x3a24362eU, + 0xb10c0a67U, 0x0f9357e7U, 0xd2b4ee96U, 0x9e1b9b91U, + 0x4f80c0c5U, 0xa261dc20U, 0x695a774bU, 0x161c121aU, + 0x0ae293baU, 0xe5c0a02aU, 0x433c22e0U, 0x1d121b17U, + 0x0b0e090dU, 0xadf28bc7U, 0xb92db6a8U, 0xc8141ea9U, + 0x8557f119U, 0x4caf7507U, 0xbbee99ddU, 0xfda37f60U, + 0x9ff70126U, 0xbc5c72f5U, 0xc544663bU, 0x345bfb7eU, + 0x768b4329U, 0xdccb23c6U, 0x68b6edfcU, 0x63b8e4f1U, + 0xcad731dcU, 0x10426385U, 0x40139722U, 0x2084c611U, + 0x7d854a24U, 0xf8d2bb3dU, 0x11aef932U, 0x6dc729a1U, + 0x4b1d9e2fU, 0xf3dcb230U, 0xec0d8652U, 0xd077c1e3U, + 0x6c2bb316U, 0x99a970b9U, 0xfa119448U, 0x2247e964U, + 0xc4a8fc8cU, 0x1aa0f03fU, 0xd8567d2cU, 0xef223390U, + 0xc787494eU, 0xc1d938d1U, 0xfe8ccaa2U, 0x3698d40bU, + 0xcfa6f581U, 0x28a57adeU, 0x26dab78eU, 0xa43fadbfU, + 0xe42c3a9dU, 0x0d507892U, 0x9b6a5fccU, 0x62547e46U, + 0xc2f68d13U, 0xe890d8b8U, 0x5e2e39f7U, 0xf582c3afU, + 0xbe9f5d80U, 0x7c69d093U, 0xa96fd52dU, 0xb3cf2512U, + 0x3bc8ac99U, 0xa710187dU, 0x6ee89c63U, 0x7bdb3bbbU, + 0x09cd2678U, 0xf46e5918U, 0x01ec9ab7U, 0xa8834f9aU, + 0x65e6956eU, 0x7eaaffe6U, 0x0821bccfU, 0xe6ef15e8U, + 0xd9bae79bU, 0xce4a6f36U, 0xd4ea9f09U, 0xd629b07cU, + 0xaf31a4b2U, 0x312a3f23U, 0x30c6a594U, 0xc035a266U, + 0x37744ebcU, 0xa6fc82caU, 0xb0e090d0U, 0x1533a7d8U, + 0x4af10498U, 0xf741ecdaU, 0x0e7fcd50U, 0x2f1791f6U, + 0x8d764dd6U, 0x4d43efb0U, 0x54ccaa4dU, 0xdfe49604U, + 0xe39ed1b5U, 0x1b4c6a88U, 0xb8c12c1fU, 0x7f466551U, + 0x049d5eeaU, 0x5d018c35U, 0x73fa8774U, 0x2efb0b41U, + 0x5ab3671dU, 0x5292dbd2U, 0x33e91056U, 0x136dd647U, + 0x8c9ad761U, 0x7a37a10cU, 0x8e59f814U, 0x89eb133cU, + 0xeecea927U, 0x35b761c9U, 0xede11ce5U, 0x3c7a47b1U, + 0x599cd2dfU, 0x3f55f273U, 0x791814ceU, 0xbf73c737U, + 0xea53f7cdU, 0x5b5ffdaaU, 0x14df3d6fU, 0x867844dbU, + 0x81caaff3U, 0x3eb968c4U, 0x2c382434U, 0x5fc2a340U, + 0x72161dc3U, 0x0cbce225U, 0x8b283c49U, 0x41ff0d95U, + 0x7139a801U, 0xde080cb3U, 0x9cd8b4e4U, 0x906456c1U, + 0x617bcb84U, 0x70d532b6U, 0x74486c5cU, 0x42d0b857U, +}; + +static const UINT32 Td2[256] = { + 0xa75051f4U, 0x65537e41U, 0xa4c31a17U, 0x5e963a27U, + 0x6bcb3babU, 0x45f11f9dU, 0x58abacfaU, 0x03934be3U, + 0xfa552030U, 0x6df6ad76U, 0x769188ccU, 0x4c25f502U, + 0xd7fc4fe5U, 0xcbd7c52aU, 0x44802635U, 0xa38fb562U, + 0x5a49deb1U, 0x1b6725baU, 0x0e9845eaU, 0xc0e15dfeU, + 0x7502c32fU, 0xf012814cU, 0x97a38d46U, 0xf9c66bd3U, + 0x5fe7038fU, 0x9c951592U, 0x7aebbf6dU, 0x59da9552U, + 0x832dd4beU, 0x21d35874U, 0x692949e0U, 0xc8448ec9U, + 0x896a75c2U, 0x7978f48eU, 0x3e6b9958U, 0x71dd27b9U, + 0x4fb6bee1U, 0xad17f088U, 0xac66c920U, 0x3ab47dceU, + 0x4a1863dfU, 0x3182e51aU, 0x33609751U, 0x7f456253U, + 0x77e0b164U, 0xae84bb6bU, 0xa01cfe81U, 0x2b94f908U, + 0x68587048U, 0xfd198f45U, 0x6c8794deU, 0xf8b7527bU, + 0xd323ab73U, 0x02e2724bU, 0x8f57e31fU, 0xab2a6655U, + 0x2807b2ebU, 0xc2032fb5U, 0x7b9a86c5U, 0x08a5d337U, + 0x87f23028U, 0xa5b223bfU, 0x6aba0203U, 0x825ced16U, + 0x1c2b8acfU, 0xb492a779U, 0xf2f0f307U, 0xe2a14e69U, + 0xf4cd65daU, 0xbed50605U, 0x621fd134U, 0xfe8ac4a6U, + 0x539d342eU, 0x55a0a2f3U, 0xe132058aU, 0xeb75a4f6U, + 0xec390b83U, 0xefaa4060U, 0x9f065e71U, 0x1051bd6eU, + + 0x8af93e21U, 0x063d96ddU, 0x05aedd3eU, 0xbd464de6U, + 0x8db59154U, 0x5d0571c4U, 0xd46f0406U, 0x15ff6050U, + 0xfb241998U, 0xe997d6bdU, 0x43cc8940U, 0x9e7767d9U, + 0x42bdb0e8U, 0x8b880789U, 0x5b38e719U, 0xeedb79c8U, + 0x0a47a17cU, 0x0fe97c42U, 0x1ec9f884U, 0x00000000U, + 0x86830980U, 0xed48322bU, 0x70ac1e11U, 0x724e6c5aU, + 0xfffbfd0eU, 0x38560f85U, 0xd51e3daeU, 0x3927362dU, + 0xd9640a0fU, 0xa621685cU, 0x54d19b5bU, 0x2e3a2436U, + 0x67b10c0aU, 0xe70f9357U, 0x96d2b4eeU, 0x919e1b9bU, + 0xc54f80c0U, 0x20a261dcU, 0x4b695a77U, 0x1a161c12U, + 0xba0ae293U, 0x2ae5c0a0U, 0xe0433c22U, 0x171d121bU, + 0x0d0b0e09U, 0xc7adf28bU, 0xa8b92db6U, 0xa9c8141eU, + 0x198557f1U, 0x074caf75U, 0xddbbee99U, 0x60fda37fU, + 0x269ff701U, 0xf5bc5c72U, 0x3bc54466U, 0x7e345bfbU, + 0x29768b43U, 0xc6dccb23U, 0xfc68b6edU, 0xf163b8e4U, + 0xdccad731U, 0x85104263U, 0x22401397U, 0x112084c6U, + 0x247d854aU, 0x3df8d2bbU, 0x3211aef9U, 0xa16dc729U, + 0x2f4b1d9eU, 0x30f3dcb2U, 0x52ec0d86U, 0xe3d077c1U, + 0x166c2bb3U, 0xb999a970U, 0x48fa1194U, 0x642247e9U, + 0x8cc4a8fcU, 0x3f1aa0f0U, 0x2cd8567dU, 0x90ef2233U, + 0x4ec78749U, 0xd1c1d938U, 0xa2fe8ccaU, 0x0b3698d4U, + 0x81cfa6f5U, 0xde28a57aU, 0x8e26dab7U, 0xbfa43fadU, + 0x9de42c3aU, 0x920d5078U, 0xcc9b6a5fU, 0x4662547eU, + 0x13c2f68dU, 0xb8e890d8U, 0xf75e2e39U, 0xaff582c3U, + 0x80be9f5dU, 0x937c69d0U, 0x2da96fd5U, 0x12b3cf25U, + 0x993bc8acU, 0x7da71018U, 0x636ee89cU, 0xbb7bdb3bU, + 0x7809cd26U, 0x18f46e59U, 0xb701ec9aU, 0x9aa8834fU, + 0x6e65e695U, 0xe67eaaffU, 0xcf0821bcU, 0xe8e6ef15U, + 0x9bd9bae7U, 0x36ce4a6fU, 0x09d4ea9fU, 0x7cd629b0U, + 0xb2af31a4U, 0x23312a3fU, 0x9430c6a5U, 0x66c035a2U, + 0xbc37744eU, 0xcaa6fc82U, 0xd0b0e090U, 0xd81533a7U, + 0x984af104U, 0xdaf741ecU, 0x500e7fcdU, 0xf62f1791U, + 0xd68d764dU, 0xb04d43efU, 0x4d54ccaaU, 0x04dfe496U, + 0xb5e39ed1U, 0x881b4c6aU, 0x1fb8c12cU, 0x517f4665U, + 0xea049d5eU, 0x355d018cU, 0x7473fa87U, 0x412efb0bU, + 0x1d5ab367U, 0xd25292dbU, 0x5633e910U, 0x47136dd6U, + 0x618c9ad7U, 0x0c7a37a1U, 0x148e59f8U, 0x3c89eb13U, + 0x27eecea9U, 0xc935b761U, 0xe5ede11cU, 0xb13c7a47U, + 0xdf599cd2U, 0x733f55f2U, 0xce791814U, 0x37bf73c7U, + 0xcdea53f7U, 0xaa5b5ffdU, 0x6f14df3dU, 0xdb867844U, + 0xf381caafU, 0xc43eb968U, 0x342c3824U, 0x405fc2a3U, + 0xc372161dU, 0x250cbce2U, 0x498b283cU, 0x9541ff0dU, + 0x017139a8U, 0xb3de080cU, 0xe49cd8b4U, 0xc1906456U, + 0x84617bcbU, 0xb670d532U, 0x5c74486cU, 0x5742d0b8U, +}; + +static const UINT32 Td3[256] = { + 0xf4a75051U, 0x4165537eU, 0x17a4c31aU, 0x275e963aU, + 0xab6bcb3bU, 0x9d45f11fU, 0xfa58abacU, 0xe303934bU, + 0x30fa5520U, 0x766df6adU, 0xcc769188U, 0x024c25f5U, + 0xe5d7fc4fU, 0x2acbd7c5U, 0x35448026U, 0x62a38fb5U, + 0xb15a49deU, 0xba1b6725U, 0xea0e9845U, 0xfec0e15dU, + 0x2f7502c3U, 0x4cf01281U, 0x4697a38dU, 0xd3f9c66bU, + 0x8f5fe703U, 0x929c9515U, 0x6d7aebbfU, 0x5259da95U, + 0xbe832dd4U, 0x7421d358U, 0xe0692949U, 0xc9c8448eU, + 0xc2896a75U, 0x8e7978f4U, 0x583e6b99U, 0xb971dd27U, + 0xe14fb6beU, 0x88ad17f0U, 0x20ac66c9U, 0xce3ab47dU, + 0xdf4a1863U, 0x1a3182e5U, 0x51336097U, 0x537f4562U, + 0x6477e0b1U, 0x6bae84bbU, 0x81a01cfeU, 0x082b94f9U, + 0x48685870U, 0x45fd198fU, 0xde6c8794U, 0x7bf8b752U, + 0x73d323abU, 0x4b02e272U, 0x1f8f57e3U, 0x55ab2a66U, + 0xeb2807b2U, 0xb5c2032fU, 0xc57b9a86U, 0x3708a5d3U, + 0x2887f230U, 0xbfa5b223U, 0x036aba02U, 0x16825cedU, + 0xcf1c2b8aU, 0x79b492a7U, 0x07f2f0f3U, 0x69e2a14eU, + 0xdaf4cd65U, 0x05bed506U, 0x34621fd1U, 0xa6fe8ac4U, + 0x2e539d34U, 0xf355a0a2U, 0x8ae13205U, 0xf6eb75a4U, + 0x83ec390bU, 0x60efaa40U, 0x719f065eU, 0x6e1051bdU, + 0x218af93eU, 0xdd063d96U, 0x3e05aeddU, 0xe6bd464dU, + 0x548db591U, 0xc45d0571U, 0x06d46f04U, 0x5015ff60U, + 0x98fb2419U, 0xbde997d6U, 0x4043cc89U, 0xd99e7767U, + 0xe842bdb0U, 0x898b8807U, 0x195b38e7U, 0xc8eedb79U, + 0x7c0a47a1U, 0x420fe97cU, 0x841ec9f8U, 0x00000000U, + 0x80868309U, 0x2bed4832U, 0x1170ac1eU, 0x5a724e6cU, + 0x0efffbfdU, 0x8538560fU, 0xaed51e3dU, 0x2d392736U, + 0x0fd9640aU, 0x5ca62168U, 0x5b54d19bU, 0x362e3a24U, + 0x0a67b10cU, 0x57e70f93U, 0xee96d2b4U, 0x9b919e1bU, + 0xc0c54f80U, 0xdc20a261U, 0x774b695aU, 0x121a161cU, + 0x93ba0ae2U, 0xa02ae5c0U, 0x22e0433cU, 0x1b171d12U, + 0x090d0b0eU, 0x8bc7adf2U, 0xb6a8b92dU, 0x1ea9c814U, + 0xf1198557U, 0x75074cafU, 0x99ddbbeeU, 0x7f60fda3U, + 0x01269ff7U, 0x72f5bc5cU, 0x663bc544U, 0xfb7e345bU, + 0x4329768bU, 0x23c6dccbU, 0xedfc68b6U, 0xe4f163b8U, + 0x31dccad7U, 0x63851042U, 0x97224013U, 0xc6112084U, + 0x4a247d85U, 0xbb3df8d2U, 0xf93211aeU, 0x29a16dc7U, + 0x9e2f4b1dU, 0xb230f3dcU, 0x8652ec0dU, 0xc1e3d077U, + 0xb3166c2bU, 0x70b999a9U, 0x9448fa11U, 0xe9642247U, + 0xfc8cc4a8U, 0xf03f1aa0U, 0x7d2cd856U, 0x3390ef22U, + 0x494ec787U, 0x38d1c1d9U, 0xcaa2fe8cU, 0xd40b3698U, + 0xf581cfa6U, 0x7ade28a5U, 0xb78e26daU, 0xadbfa43fU, + 0x3a9de42cU, 0x78920d50U, 0x5fcc9b6aU, 0x7e466254U, + 0x8d13c2f6U, 0xd8b8e890U, 0x39f75e2eU, 0xc3aff582U, + 0x5d80be9fU, 0xd0937c69U, 0xd52da96fU, 0x2512b3cfU, + 0xac993bc8U, 0x187da710U, 0x9c636ee8U, 0x3bbb7bdbU, + 0x267809cdU, 0x5918f46eU, 0x9ab701ecU, 0x4f9aa883U, + 0x956e65e6U, 0xffe67eaaU, 0xbccf0821U, 0x15e8e6efU, + 0xe79bd9baU, 0x6f36ce4aU, 0x9f09d4eaU, 0xb07cd629U, + 0xa4b2af31U, 0x3f23312aU, 0xa59430c6U, 0xa266c035U, + 0x4ebc3774U, 0x82caa6fcU, 0x90d0b0e0U, 0xa7d81533U, + 0x04984af1U, 0xecdaf741U, 0xcd500e7fU, 0x91f62f17U, + 0x4dd68d76U, 0xefb04d43U, 0xaa4d54ccU, 0x9604dfe4U, + 0xd1b5e39eU, 0x6a881b4cU, 0x2c1fb8c1U, 0x65517f46U, + 0x5eea049dU, 0x8c355d01U, 0x877473faU, 0x0b412efbU, + 0x671d5ab3U, 0xdbd25292U, 0x105633e9U, 0xd647136dU, + 0xd7618c9aU, 0xa10c7a37U, 0xf8148e59U, 0x133c89ebU, + 0xa927eeceU, 0x61c935b7U, 0x1ce5ede1U, 0x47b13c7aU, + 0xd2df599cU, 0xf2733f55U, 0x14ce7918U, 0xc737bf73U, + 0xf7cdea53U, 0xfdaa5b5fU, 0x3d6f14dfU, 0x44db8678U, + 0xaff381caU, 0x68c43eb9U, 0x24342c38U, 0xa3405fc2U, + 0x1dc37216U, 0xe2250cbcU, 0x3c498b28U, 0x0d9541ffU, + 0xa8017139U, 0x0cb3de08U, 0xb4e49cd8U, 0x56c19064U, + 0xcb84617bU, 0x32b670d5U, 0x6c5c7448U, 0xb85742d0U, +}; + +static const UINT32 Td4[256] = { + 0x52525252U, 0x09090909U, 0x6a6a6a6aU, 0xd5d5d5d5U, + 0x30303030U, 0x36363636U, 0xa5a5a5a5U, 0x38383838U, + 0xbfbfbfbfU, 0x40404040U, 0xa3a3a3a3U, 0x9e9e9e9eU, + 0x81818181U, 0xf3f3f3f3U, 0xd7d7d7d7U, 0xfbfbfbfbU, + 0x7c7c7c7cU, 0xe3e3e3e3U, 0x39393939U, 0x82828282U, + 0x9b9b9b9bU, 0x2f2f2f2fU, 0xffffffffU, 0x87878787U, + 0x34343434U, 0x8e8e8e8eU, 0x43434343U, 0x44444444U, + 0xc4c4c4c4U, 0xdedededeU, 0xe9e9e9e9U, 0xcbcbcbcbU, + 0x54545454U, 0x7b7b7b7bU, 0x94949494U, 0x32323232U, + 0xa6a6a6a6U, 0xc2c2c2c2U, 0x23232323U, 0x3d3d3d3dU, + 0xeeeeeeeeU, 0x4c4c4c4cU, 0x95959595U, 0x0b0b0b0bU, + 0x42424242U, 0xfafafafaU, 0xc3c3c3c3U, 0x4e4e4e4eU, + 0x08080808U, 0x2e2e2e2eU, 0xa1a1a1a1U, 0x66666666U, + 0x28282828U, 0xd9d9d9d9U, 0x24242424U, 0xb2b2b2b2U, + 0x76767676U, 0x5b5b5b5bU, 0xa2a2a2a2U, 0x49494949U, + 0x6d6d6d6dU, 0x8b8b8b8bU, 0xd1d1d1d1U, 0x25252525U, + 0x72727272U, 0xf8f8f8f8U, 0xf6f6f6f6U, 0x64646464U, + 0x86868686U, 0x68686868U, 0x98989898U, 0x16161616U, + 0xd4d4d4d4U, 0xa4a4a4a4U, 0x5c5c5c5cU, 0xccccccccU, + 0x5d5d5d5dU, 0x65656565U, 0xb6b6b6b6U, 0x92929292U, + 0x6c6c6c6cU, 0x70707070U, 0x48484848U, 0x50505050U, + 0xfdfdfdfdU, 0xededededU, 0xb9b9b9b9U, 0xdadadadaU, + 0x5e5e5e5eU, 0x15151515U, 0x46464646U, 0x57575757U, + 0xa7a7a7a7U, 0x8d8d8d8dU, 0x9d9d9d9dU, 0x84848484U, + 0x90909090U, 0xd8d8d8d8U, 0xababababU, 0x00000000U, + 0x8c8c8c8cU, 0xbcbcbcbcU, 0xd3d3d3d3U, 0x0a0a0a0aU, + 0xf7f7f7f7U, 0xe4e4e4e4U, 0x58585858U, 0x05050505U, + 0xb8b8b8b8U, 0xb3b3b3b3U, 0x45454545U, 0x06060606U, + 0xd0d0d0d0U, 0x2c2c2c2cU, 0x1e1e1e1eU, 0x8f8f8f8fU, + 0xcacacacaU, 0x3f3f3f3fU, 0x0f0f0f0fU, 0x02020202U, + 0xc1c1c1c1U, 0xafafafafU, 0xbdbdbdbdU, 0x03030303U, + 0x01010101U, 0x13131313U, 0x8a8a8a8aU, 0x6b6b6b6bU, + 0x3a3a3a3aU, 0x91919191U, 0x11111111U, 0x41414141U, + 0x4f4f4f4fU, 0x67676767U, 0xdcdcdcdcU, 0xeaeaeaeaU, + 0x97979797U, 0xf2f2f2f2U, 0xcfcfcfcfU, 0xcecececeU, + 0xf0f0f0f0U, 0xb4b4b4b4U, 0xe6e6e6e6U, 0x73737373U, + 0x96969696U, 0xacacacacU, 0x74747474U, 0x22222222U, + 0xe7e7e7e7U, 0xadadadadU, 0x35353535U, 0x85858585U, + 0xe2e2e2e2U, 0xf9f9f9f9U, 0x37373737U, 0xe8e8e8e8U, + 0x1c1c1c1cU, 0x75757575U, 0xdfdfdfdfU, 0x6e6e6e6eU, + 0x47474747U, 0xf1f1f1f1U, 0x1a1a1a1aU, 0x71717171U, + 0x1d1d1d1dU, 0x29292929U, 0xc5c5c5c5U, 0x89898989U, + 0x6f6f6f6fU, 0xb7b7b7b7U, 0x62626262U, 0x0e0e0e0eU, + 0xaaaaaaaaU, 0x18181818U, 0xbebebebeU, 0x1b1b1b1bU, + 0xfcfcfcfcU, 0x56565656U, 0x3e3e3e3eU, 0x4b4b4b4bU, + 0xc6c6c6c6U, 0xd2d2d2d2U, 0x79797979U, 0x20202020U, + 0x9a9a9a9aU, 0xdbdbdbdbU, 0xc0c0c0c0U, 0xfefefefeU, + 0x78787878U, 0xcdcdcdcdU, 0x5a5a5a5aU, 0xf4f4f4f4U, + 0x1f1f1f1fU, 0xddddddddU, 0xa8a8a8a8U, 0x33333333U, + 0x88888888U, 0x07070707U, 0xc7c7c7c7U, 0x31313131U, + 0xb1b1b1b1U, 0x12121212U, 0x10101010U, 0x59595959U, + 0x27272727U, 0x80808080U, 0xececececU, 0x5f5f5f5fU, + 0x60606060U, 0x51515151U, 0x7f7f7f7fU, 0xa9a9a9a9U, + 0x19191919U, 0xb5b5b5b5U, 0x4a4a4a4aU, 0x0d0d0d0dU, + 0x2d2d2d2dU, 0xe5e5e5e5U, 0x7a7a7a7aU, 0x9f9f9f9fU, + 0x93939393U, 0xc9c9c9c9U, 0x9c9c9c9cU, 0xefefefefU, + 0xa0a0a0a0U, 0xe0e0e0e0U, 0x3b3b3b3bU, 0x4d4d4d4dU, + 0xaeaeaeaeU, 0x2a2a2a2aU, 0xf5f5f5f5U, 0xb0b0b0b0U, + 0xc8c8c8c8U, 0xebebebebU, 0xbbbbbbbbU, 0x3c3c3c3cU, + 0x83838383U, 0x53535353U, 0x99999999U, 0x61616161U, + 0x17171717U, 0x2b2b2b2bU, 0x04040404U, 0x7e7e7e7eU, + 0xbabababaU, 0x77777777U, 0xd6d6d6d6U, 0x26262626U, + 0xe1e1e1e1U, 0x69696969U, 0x14141414U, 0x63636363U, + 0x55555555U, 0x21212121U, 0x0c0c0c0cU, 0x7d7d7d7dU, +}; + +static const UINT32 rcon[] = { + 0x01000000, 0x02000000, 0x04000000, 0x08000000, + 0x10000000, 0x20000000, 0x40000000, 0x80000000, + 0x1B000000, 0x36000000, /* for 128-bit blocks, Rijndael never uses more than 10 rcon values */ +}; +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Fuction definitions */ +/* */ +INT rijndaelKeySetupEnc( + UINT32 rk[/*4*(Nr + 1)*/], + const UINT8 cipherKey[], + INT keyBits) +{ + INT i = 0; + UINT32 temp; + + if (!(keyBits == 128 || keyBits == 192 || keyBits == 256)) + return -1; + + rk[0] = GETU32(cipherKey ); + rk[1] = GETU32(cipherKey + 4); + rk[2] = GETU32(cipherKey + 8); + rk[3] = GETU32(cipherKey + 12); + if (keyBits == 128) { + for (;;) { + temp = rk[3]; + rk[4] = rk[0] ^ + (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ + (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ + (Te4[(temp ) & 0xff] & 0x0000ff00) ^ + (Te4[(temp >> 24) ] & 0x000000ff) ^ + rcon[i]; + rk[5] = rk[1] ^ rk[4]; + rk[6] = rk[2] ^ rk[5]; + rk[7] = rk[3] ^ rk[6]; + if (++i == 10) { + return 10; + } + rk += 4; + } + } + rk[4] = GETU32(cipherKey + 16); + rk[5] = GETU32(cipherKey + 20); + if (keyBits == 192) { + for (;;) { + temp = rk[ 5]; + rk[ 6] = rk[ 0] ^ + (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ + (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ + (Te4[(temp ) & 0xff] & 0x0000ff00) ^ + (Te4[(temp >> 24) ] & 0x000000ff) ^ + rcon[i]; + rk[ 7] = rk[ 1] ^ rk[ 6]; + rk[ 8] = rk[ 2] ^ rk[ 7]; + rk[ 9] = rk[ 3] ^ rk[ 8]; + if (++i == 8) { + return 12; + } + rk[10] = rk[ 4] ^ rk[ 9]; + rk[11] = rk[ 5] ^ rk[10]; + rk += 6; + } + } + rk[6] = GETU32(cipherKey + 24); + rk[7] = GETU32(cipherKey + 28); + if (keyBits == 256) { + for (;;) { + temp = rk[ 7]; + rk[ 8] = rk[ 0] ^ + (Te4[(temp >> 16) & 0xff] & 0xff000000) ^ + (Te4[(temp >> 8) & 0xff] & 0x00ff0000) ^ + (Te4[(temp ) & 0xff] & 0x0000ff00) ^ + (Te4[(temp >> 24) ] & 0x000000ff) ^ + rcon[i]; + rk[ 9] = rk[ 1] ^ rk[ 8]; + rk[10] = rk[ 2] ^ rk[ 9]; + rk[11] = rk[ 3] ^ rk[10]; + if (++i == 7) { + return 14; + } + temp = rk[11]; + rk[12] = rk[ 4] ^ + (Te4[(temp >> 24) ] & 0xff000000) ^ + (Te4[(temp >> 16) & 0xff] & 0x00ff0000) ^ + (Te4[(temp >> 8) & 0xff] & 0x0000ff00) ^ + (Te4[(temp ) & 0xff] & 0x000000ff); + rk[13] = rk[ 5] ^ rk[12]; + rk[14] = rk[ 6] ^ rk[13]; + rk[15] = rk[ 7] ^ rk[14]; + + rk += 8; + } + } + return 0; +} + +INT rijndaelKeySetupDec( + UINT32 rk[/*4*(Nr + 1)*/], + const UINT8 cipherKey[], + INT keyBits) +{ + INT Nr, i, j; + UINT32 temp; + + /* expand the cipher key: */ + Nr = rijndaelKeySetupEnc(rk, cipherKey, keyBits); + /* invert the order of the round keys: */ + for (i = 0, j = 4*Nr; i < j; i += 4, j -= 4) { + temp = rk[i ]; rk[i ] = rk[j ]; rk[j ] = temp; + temp = rk[i + 1]; rk[i + 1] = rk[j + 1]; rk[j + 1] = temp; + temp = rk[i + 2]; rk[i + 2] = rk[j + 2]; rk[j + 2] = temp; + temp = rk[i + 3]; rk[i + 3] = rk[j + 3]; rk[j + 3] = temp; + } + /* apply the inverse MixColumn transform to all round keys but the first and the last: */ + for (i = 1; i < Nr; i++) { + rk += 4; + rk[0] = + Td0[Te4[(rk[0] >> 24) ] & 0xff] ^ + Td1[Te4[(rk[0] >> 16) & 0xff] & 0xff] ^ + Td2[Te4[(rk[0] >> 8) & 0xff] & 0xff] ^ + Td3[Te4[(rk[0] ) & 0xff] & 0xff]; + rk[1] = + Td0[Te4[(rk[1] >> 24) ] & 0xff] ^ + Td1[Te4[(rk[1] >> 16) & 0xff] & 0xff] ^ + Td2[Te4[(rk[1] >> 8) & 0xff] & 0xff] ^ + Td3[Te4[(rk[1] ) & 0xff] & 0xff]; + rk[2] = + Td0[Te4[(rk[2] >> 24) ] & 0xff] ^ + Td1[Te4[(rk[2] >> 16) & 0xff] & 0xff] ^ + Td2[Te4[(rk[2] >> 8) & 0xff] & 0xff] ^ + Td3[Te4[(rk[2] ) & 0xff] & 0xff]; + rk[3] = + Td0[Te4[(rk[3] >> 24) ] & 0xff] ^ + Td1[Te4[(rk[3] >> 16) & 0xff] & 0xff] ^ + Td2[Te4[(rk[3] >> 8) & 0xff] & 0xff] ^ + Td3[Te4[(rk[3] ) & 0xff] & 0xff]; + } + return Nr; +} + +void rijndael_set_key( + rijndael_ctx *ctx, + const UCHAR *key, + INT bits) +{ + + ctx->Nr = rijndaelKeySetupEnc(ctx->ek, key, bits); + rijndaelKeySetupDec(ctx->dk, key, bits); +} + +void rijndaelEncrypt( + const UINT32 rk[/*4*(Nr + 1)*/], + INT Nr, + const UINT8 pt[16], + UINT8 ct[16]) +{ + UINT32 s0, s1, s2, s3, t0, t1, t2, t3; +#ifndef FULL_UNROLL + INT r; +#endif /* ?FULL_UNROLL */ + + /* + * map byte array block to cipher state + * and add initial round key: + */ + s0 = GETU32(pt ) ^ rk[0]; + s1 = GETU32(pt + 4) ^ rk[1]; + s2 = GETU32(pt + 8) ^ rk[2]; + s3 = GETU32(pt + 12) ^ rk[3]; +#ifdef FULL_UNROLL + /* round 1: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[ 4]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[ 5]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[ 6]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[ 7]; + /* round 2: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[ 8]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[ 9]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[10]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[11]; + /* round 3: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[12]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[13]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[14]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[15]; + /* round 4: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[16]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[17]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[18]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[19]; + /* round 5: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[20]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[21]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[22]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[23]; + /* round 6: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[24]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[25]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[26]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[27]; + /* round 7: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[28]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[29]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[30]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[31]; + /* round 8: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[32]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[33]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[34]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[35]; + /* round 9: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[36]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[37]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[38]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[39]; + if (Nr > 10) { + /* round 10: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[40]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[41]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[42]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[43]; + /* round 11: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[44]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[45]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[46]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[47]; + if (Nr > 12) { + /* round 12: */ + s0 = Te0[t0 >> 24] ^ Te1[(t1 >> 16) & 0xff] ^ Te2[(t2 >> 8) & 0xff] ^ Te3[t3 & 0xff] ^ rk[48]; + s1 = Te0[t1 >> 24] ^ Te1[(t2 >> 16) & 0xff] ^ Te2[(t3 >> 8) & 0xff] ^ Te3[t0 & 0xff] ^ rk[49]; + s2 = Te0[t2 >> 24] ^ Te1[(t3 >> 16) & 0xff] ^ Te2[(t0 >> 8) & 0xff] ^ Te3[t1 & 0xff] ^ rk[50]; + s3 = Te0[t3 >> 24] ^ Te1[(t0 >> 16) & 0xff] ^ Te2[(t1 >> 8) & 0xff] ^ Te3[t2 & 0xff] ^ rk[51]; + /* round 13: */ + t0 = Te0[s0 >> 24] ^ Te1[(s1 >> 16) & 0xff] ^ Te2[(s2 >> 8) & 0xff] ^ Te3[s3 & 0xff] ^ rk[52]; + t1 = Te0[s1 >> 24] ^ Te1[(s2 >> 16) & 0xff] ^ Te2[(s3 >> 8) & 0xff] ^ Te3[s0 & 0xff] ^ rk[53]; + t2 = Te0[s2 >> 24] ^ Te1[(s3 >> 16) & 0xff] ^ Te2[(s0 >> 8) & 0xff] ^ Te3[s1 & 0xff] ^ rk[54]; + t3 = Te0[s3 >> 24] ^ Te1[(s0 >> 16) & 0xff] ^ Te2[(s1 >> 8) & 0xff] ^ Te3[s2 & 0xff] ^ rk[55]; + } + } + rk += Nr << 2; +#else /* !FULL_UNROLL */ + /* + * Nr - 1 full rounds: + */ + r = Nr >> 1; + for (;;) { + t0 = + Te0[(s0 >> 24) ] ^ + Te1[(s1 >> 16) & 0xff] ^ + Te2[(s2 >> 8) & 0xff] ^ + Te3[(s3 ) & 0xff] ^ + rk[4]; + t1 = + Te0[(s1 >> 24) ] ^ + Te1[(s2 >> 16) & 0xff] ^ + Te2[(s3 >> 8) & 0xff] ^ + Te3[(s0 ) & 0xff] ^ + rk[5]; + t2 = + Te0[(s2 >> 24) ] ^ + Te1[(s3 >> 16) & 0xff] ^ + Te2[(s0 >> 8) & 0xff] ^ + Te3[(s1 ) & 0xff] ^ + rk[6]; + t3 = + Te0[(s3 >> 24) ] ^ + Te1[(s0 >> 16) & 0xff] ^ + Te2[(s1 >> 8) & 0xff] ^ + Te3[(s2 ) & 0xff] ^ + rk[7]; + + rk += 8; + if (--r == 0) { + break; + } + + s0 = + Te0[(t0 >> 24) ] ^ + Te1[(t1 >> 16) & 0xff] ^ + Te2[(t2 >> 8) & 0xff] ^ + Te3[(t3 ) & 0xff] ^ + rk[0]; + s1 = + Te0[(t1 >> 24) ] ^ + Te1[(t2 >> 16) & 0xff] ^ + Te2[(t3 >> 8) & 0xff] ^ + Te3[(t0 ) & 0xff] ^ + rk[1]; + s2 = + Te0[(t2 >> 24) ] ^ + Te1[(t3 >> 16) & 0xff] ^ + Te2[(t0 >> 8) & 0xff] ^ + Te3[(t1 ) & 0xff] ^ + rk[2]; + s3 = + Te0[(t3 >> 24) ] ^ + Te1[(t0 >> 16) & 0xff] ^ + Te2[(t1 >> 8) & 0xff] ^ + Te3[(t2 ) & 0xff] ^ + rk[3]; + } +#endif /* ?FULL_UNROLL */ + /* + * apply last round and + * map cipher state to byte array block: + */ + s0 = + (Te4[(t0 >> 24) ] & 0xff000000) ^ + (Te4[(t1 >> 16) & 0xff] & 0x00ff0000) ^ + (Te4[(t2 >> 8) & 0xff] & 0x0000ff00) ^ + (Te4[(t3 ) & 0xff] & 0x000000ff) ^ + rk[0]; + PUTU32(ct , s0); + s1 = + (Te4[(t1 >> 24) ] & 0xff000000) ^ + (Te4[(t2 >> 16) & 0xff] & 0x00ff0000) ^ + (Te4[(t3 >> 8) & 0xff] & 0x0000ff00) ^ + (Te4[(t0 ) & 0xff] & 0x000000ff) ^ + rk[1]; + PUTU32(ct + 4, s1); + s2 = + (Te4[(t2 >> 24) ] & 0xff000000) ^ + (Te4[(t3 >> 16) & 0xff] & 0x00ff0000) ^ + (Te4[(t0 >> 8) & 0xff] & 0x0000ff00) ^ + (Te4[(t1 ) & 0xff] & 0x000000ff) ^ + rk[2]; + PUTU32(ct + 8, s2); + s3 = + (Te4[(t3 >> 24) ] & 0xff000000) ^ + (Te4[(t0 >> 16) & 0xff] & 0x00ff0000) ^ + (Te4[(t1 >> 8) & 0xff] & 0x0000ff00) ^ + (Te4[(t2 ) & 0xff] & 0x000000ff) ^ + rk[3]; + PUTU32(ct + 12, s3); +} + +void rijndael_encrypt( + const rijndael_ctx *ctx, + const UCHAR *src, + UCHAR *dst) +{ + + rijndaelEncrypt(ctx->ek, ctx->Nr, src, dst); +} +/* */ +/******************************************************************************/ diff --git a/epan/crypt/airpdcap_rijndael.h b/epan/crypt/airpdcap_rijndael.h new file mode 100644 index 0000000000..b113c84643 --- /dev/null +++ b/epan/crypt/airpdcap_rijndael.h @@ -0,0 +1,68 @@ +#ifndef _AIRPDCAP_RIJNDAEL +#define _AIRPDCAP_RIJNDAEL + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Definitions */ +/* */ +/* Note: copied AirPDcap/rijndael/rijndael.h */ +#define RIJNDAEL_MAXKC (256/32) +#define RIJNDAEL_MAXKB (256/8) +#define RIJNDAEL_MAXNR 14 +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +/* Note: copied AirPDcap/rijndael/rijndael.h */ +typedef struct s_rijndael_ctx { + INT decrypt; + INT Nr; /* key-length-dependent number of rounds */ + UINT32 ek[4 * (RIJNDAEL_MAXNR + 1)]; /* encrypt key schedule */ + UINT32 dk[4 * (RIJNDAEL_MAXNR + 1)]; /* decrypt key schedule */ +} rijndael_ctx; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* External function prototypes declarations */ +/* */ +void rijndael_encrypt( + const rijndael_ctx *ctx, + const UCHAR *src, + UCHAR *dst) + ; + + +void rijndael_set_key( + rijndael_ctx *ctx, + const UCHAR *key, + INT bits) + ; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* External function definition */ +/* */ +static __inline void xor_block( + UINT8 *b, + const UINT8 *a, + size_t len) +{ + INT i; + for (i = 0; i < (INT)len; i++) + b[i] ^= a[i]; +} +/* */ +/******************************************************************************/ + +#endif diff --git a/epan/crypt/airpdcap_sha1.c b/epan/crypt/airpdcap_sha1.c new file mode 100644 index 0000000000..b49fe0d0a8 --- /dev/null +++ b/epan/crypt/airpdcap_sha1.c @@ -0,0 +1,343 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_sha1.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal definitions */ +/* */ +/* Definition used in HMAC-SHA1 algorithm */ +/* Note: copied from FreeBSD source code, RELENG 6, sys/opencrypto/cryptodev.h*/ +#define HMAC_IPAD_VAL 0x36 +#define HMAC_OPAD_VAL 0x5C + +/* HMAC values */ +#define SHA1_HMAC_BLOCK_LEN (64/8) +#define SHA2_512_HMAC_BLOCK_LEN (128/8) + +/* Maximum HMAC block length */ +#define HMAC_MAX_BLOCK_LEN SHA2_512_HMAC_BLOCK_LEN +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.h, 41 */ +typedef struct _SHA1_CONTEXT { + union { + UCHAR b8[20]; + UINT b32[5]; + } h; + union { + UCHAR b8[8]; + ULONGLONG b64[1]; + } c; + union { + UCHAR b8[64]; + UINT b32[16]; + } m; + size_t count; +} SHA1_CONTEXT; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal macros */ +/* */ +/* Shortcuts used in HMAC-SHA1 */ +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c */ +#define H(n) (ctxt->h.b32[(n)]) +#define COUNT (ctxt->count) +#define BCOUNT (ctxt->c.b64[0] / 8) +#define W(n) (ctxt->m.b32[(n)]) + +static UINT32 _K[] = { 0x5a827999, 0x6ed9eba1, 0x8f1bbcdc, 0xca62c1d6 }; +#define K(t) _K[(t) / 20] + +#define F0(b, c, d) (((b) & (c)) | ((~(b)) & (d))) +#define F1(b, c, d) (((b) ^ (c)) ^ (d)) +#define F2(b, c, d) (((b) & (c)) | ((b) & (d)) | ((c) & (d))) +#define F3(b, c, d) (((b) ^ (c)) ^ (d)) + +#define S(n, x) (((x) << (n)) | ((x) >> (32 - n))) + +#define PUTPAD(x) { \ + ctxt->m.b8[(COUNT % 64)] = (x); \ + COUNT++; \ + COUNT %= 64; \ + if (COUNT % 64 == 0) \ + sha1_step(ctxt); \ +} +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Function prototypes used internally */ +/* */ +void sha1_init( + SHA1_CONTEXT *ctxt) + ; +void sha1_result( + SHA1_CONTEXT *ctxt, + UCHAR *digest0) + ; +void sha1_pad( + SHA1_CONTEXT *ctxt) + ; + +static void sha1_step( + SHA1_CONTEXT *ctxt) + ; + +/* */ +/******************************************************************************/ + +/* TODO: check for little-endian, big-endian */ + +/******************************************************************************/ +/* Function definitions */ +/* */ +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 176 */ +void sha1_init( + SHA1_CONTEXT *ctxt) +{ + memset(ctxt, 0, sizeof(SHA1_CONTEXT)); + H(0) = 0x67452301; + H(1) = 0xefcdab89; + H(2) = 0x98badcfe; + H(3) = 0x10325476; + H(4) = 0xc3d2e1f0; +} + +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 223 */ +void sha1_loop( + SHA1_CONTEXT *ctxt, + const UCHAR *input, + size_t len) +{ + size_t gaplen; + size_t gapstart; + size_t off; + size_t copysiz; + off = 0; + + while (off < len) { + gapstart = COUNT % 64; + gaplen = 64 - gapstart; + + copysiz = (gaplen < len - off) ? gaplen : len - off; + memcpy(&ctxt->m.b8[gapstart], input+off, copysiz); + COUNT += (UCHAR)copysiz; + COUNT %= 64; + ctxt->c.b64[0] += copysiz * 8; + if (COUNT % 64 == 0) + sha1_step(ctxt); + off += copysiz; + } +} + +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 91 */ +static void sha1_step( + SHA1_CONTEXT *ctxt) +{ + UINT32 a, b, c, d, e; + size_t t, s; + UINT32 tmp; + + SHA1_CONTEXT tctxt; + memcpy(&tctxt.m.b8[0], &ctxt->m.b8[0], 64); + ctxt->m.b8[0] = tctxt.m.b8[3]; ctxt->m.b8[1] = tctxt.m.b8[2]; + ctxt->m.b8[2] = tctxt.m.b8[1]; ctxt->m.b8[3] = tctxt.m.b8[0]; + ctxt->m.b8[4] = tctxt.m.b8[7]; ctxt->m.b8[5] = tctxt.m.b8[6]; + ctxt->m.b8[6] = tctxt.m.b8[5]; ctxt->m.b8[7] = tctxt.m.b8[4]; + ctxt->m.b8[8] = tctxt.m.b8[11]; ctxt->m.b8[9] = tctxt.m.b8[10]; + ctxt->m.b8[10] = tctxt.m.b8[9]; ctxt->m.b8[11] = tctxt.m.b8[8]; + ctxt->m.b8[12] = tctxt.m.b8[15]; ctxt->m.b8[13] = tctxt.m.b8[14]; + ctxt->m.b8[14] = tctxt.m.b8[13]; ctxt->m.b8[15] = tctxt.m.b8[12]; + ctxt->m.b8[16] = tctxt.m.b8[19]; ctxt->m.b8[17] = tctxt.m.b8[18]; + ctxt->m.b8[18] = tctxt.m.b8[17]; ctxt->m.b8[19] = tctxt.m.b8[16]; + ctxt->m.b8[20] = tctxt.m.b8[23]; ctxt->m.b8[21] = tctxt.m.b8[22]; + ctxt->m.b8[22] = tctxt.m.b8[21]; ctxt->m.b8[23] = tctxt.m.b8[20]; + ctxt->m.b8[24] = tctxt.m.b8[27]; ctxt->m.b8[25] = tctxt.m.b8[26]; + ctxt->m.b8[26] = tctxt.m.b8[25]; ctxt->m.b8[27] = tctxt.m.b8[24]; + ctxt->m.b8[28] = tctxt.m.b8[31]; ctxt->m.b8[29] = tctxt.m.b8[30]; + ctxt->m.b8[30] = tctxt.m.b8[29]; ctxt->m.b8[31] = tctxt.m.b8[28]; + ctxt->m.b8[32] = tctxt.m.b8[35]; ctxt->m.b8[33] = tctxt.m.b8[34]; + ctxt->m.b8[34] = tctxt.m.b8[33]; ctxt->m.b8[35] = tctxt.m.b8[32]; + ctxt->m.b8[36] = tctxt.m.b8[39]; ctxt->m.b8[37] = tctxt.m.b8[38]; + ctxt->m.b8[38] = tctxt.m.b8[37]; ctxt->m.b8[39] = tctxt.m.b8[36]; + ctxt->m.b8[40] = tctxt.m.b8[43]; ctxt->m.b8[41] = tctxt.m.b8[42]; + ctxt->m.b8[42] = tctxt.m.b8[41]; ctxt->m.b8[43] = tctxt.m.b8[40]; + ctxt->m.b8[44] = tctxt.m.b8[47]; ctxt->m.b8[45] = tctxt.m.b8[46]; + ctxt->m.b8[46] = tctxt.m.b8[45]; ctxt->m.b8[47] = tctxt.m.b8[44]; + ctxt->m.b8[48] = tctxt.m.b8[51]; ctxt->m.b8[49] = tctxt.m.b8[50]; + ctxt->m.b8[50] = tctxt.m.b8[49]; ctxt->m.b8[51] = tctxt.m.b8[48]; + ctxt->m.b8[52] = tctxt.m.b8[55]; ctxt->m.b8[53] = tctxt.m.b8[54]; + ctxt->m.b8[54] = tctxt.m.b8[53]; ctxt->m.b8[55] = tctxt.m.b8[52]; + ctxt->m.b8[56] = tctxt.m.b8[59]; ctxt->m.b8[57] = tctxt.m.b8[58]; + ctxt->m.b8[58] = tctxt.m.b8[57]; ctxt->m.b8[59] = tctxt.m.b8[56]; + ctxt->m.b8[60] = tctxt.m.b8[63]; ctxt->m.b8[61] = tctxt.m.b8[62]; + ctxt->m.b8[62] = tctxt.m.b8[61]; ctxt->m.b8[63] = tctxt.m.b8[60]; + + a = H(0); b = H(1); c = H(2); d = H(3); e = H(4); + + for (t = 0; t < 20; t++) { + s = t & 0x0f; + if (t >= 16) { + W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s)); + } + tmp = S(5, a) + F0(b, c, d) + e + W(s) + K(t); + e = d; d = c; c = S(30, b); b = a; a = tmp; + } + for (t = 20; t < 40; t++) { + s = t & 0x0f; + W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s)); + tmp = S(5, a) + F1(b, c, d) + e + W(s) + K(t); + e = d; d = c; c = S(30, b); b = a; a = tmp; + } + for (t = 40; t < 60; t++) { + s = t & 0x0f; + W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s)); + tmp = S(5, a) + F2(b, c, d) + e + W(s) + K(t); + e = d; d = c; c = S(30, b); b = a; a = tmp; + } + for (t = 60; t < 80; t++) { + s = t & 0x0f; + W(s) = S(1, W((s+13) & 0x0f) ^ W((s+8) & 0x0f) ^ W((s+2) & 0x0f) ^ W(s)); + tmp = S(5, a) + F3(b, c, d) + e + W(s) + K(t); + e = d; d = c; c = S(30, b); b = a; a = tmp; + } + + H(0) = H(0) + a; + H(1) = H(1) + b; + H(2) = H(2) + c; + H(3) = H(3) + d; + H(4) = H(4) + e; + + memset(&ctxt->m.b8[0], 0, 64); +} + +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 188 */ +void sha1_pad( + SHA1_CONTEXT *ctxt) +{ + size_t padlen; /*pad length in bytes*/ + size_t padstart; + + PUTPAD(0x80); + + padstart = COUNT % 64; + padlen = 64 - padstart; + if (padlen < 8) { + memset(&ctxt->m.b8[padstart], 0, padlen); + COUNT += padlen; + COUNT %= 64; + sha1_step(ctxt); + padstart = COUNT % 64; /* should be 0 */ + padlen = 64 - padstart; /* should be 64 */ + } + memset(&ctxt->m.b8[padstart], 0, padlen - 8); + COUNT += (padlen - 8); + COUNT %= 64; + + PUTPAD(ctxt->c.b8[7]); PUTPAD(ctxt->c.b8[6]); + PUTPAD(ctxt->c.b8[5]); PUTPAD(ctxt->c.b8[4]); + PUTPAD(ctxt->c.b8[3]); PUTPAD(ctxt->c.b8[2]); + PUTPAD(ctxt->c.b8[1]); PUTPAD(ctxt->c.b8[0]); +} + +/* Note: copied from FreeBSD source code, RELENG 6, sys/crypto/sha1.c, 251 */ +void sha1_result( + SHA1_CONTEXT *ctxt, + UCHAR *digest0) +{ + UINT8 *digest; + + digest = (UINT8 *)digest0; + sha1_pad(ctxt); + + digest[0] = ctxt->h.b8[3]; digest[1] = ctxt->h.b8[2]; + digest[2] = ctxt->h.b8[1]; digest[3] = ctxt->h.b8[0]; + digest[4] = ctxt->h.b8[7]; digest[5] = ctxt->h.b8[6]; + digest[6] = ctxt->h.b8[5]; digest[7] = ctxt->h.b8[4]; + digest[8] = ctxt->h.b8[11]; digest[9] = ctxt->h.b8[10]; + digest[10] = ctxt->h.b8[9]; digest[11] = ctxt->h.b8[8]; + digest[12] = ctxt->h.b8[15]; digest[13] = ctxt->h.b8[14]; + digest[14] = ctxt->h.b8[13]; digest[15] = ctxt->h.b8[12]; + digest[16] = ctxt->h.b8[19]; digest[17] = ctxt->h.b8[18]; + digest[18] = ctxt->h.b8[17]; digest[19] = ctxt->h.b8[16]; +} + +void AirPDcapAlgHmacSha1( + const UCHAR *key_len, + const size_t keylen, + UCHAR *buffer, + const size_t digest_len, + UCHAR digest[20]) +{ + //INT i; + //SHA1_CONTEXT ictx; + //SHA1_CONTEXT octx; + //UCHAR tmpkey[64]; + //UCHAR tmp[HMAC_MAX_BLOCK_LEN]; + + //memset(tmpkey, 0, sizeof(tmpkey)); + //memset(tmp, 0, sizeof(tmp)); + + //memcpy(tmpkey, key_len, keylen); + + //for(i = 0; i<keylen; i++) + // tmpkey[i] ^= HMAC_IPAD_VAL; + + //sha1_init(&ictx); + //sha1_loop(&ictx, tmpkey, keylen); + //sha1_loop(&ictx, tmp, HMAC_MAX_BLOCK_LEN-keylen); + + //for(i = 0; i<keylen; i++) + // tmpkey[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL); + + //sha1_init(&octx); + //sha1_loop(&octx, tmpkey, keylen); + //sha1_loop(&octx, tmp, HMAC_MAX_BLOCK_LEN-keylen); + + //for(i = 0; i<keylen; i++) + // tmpkey[i] ^= HMAC_OPAD_VAL; + + //sha1_loop(&ictx, buffer, digest_len); + //sha1_result(&ictx, digest); + //sha1_loop(&octx, digest, 20); + //sha1_result(&octx, digest); + + INT i; + SHA1_CONTEXT ictx, octx; + UCHAR tmpkey[64]; + UCHAR tmp[20]; + + memset(tmpkey, 0, sizeof(tmpkey)); + memcpy(tmpkey, key_len, keylen); + + for(i = 0; i<64; i++) + tmpkey[i] ^= HMAC_IPAD_VAL; + + sha1_init(&ictx); + sha1_loop(&ictx, tmpkey, 64); + + for(i = 0; i<64; i++) + tmpkey[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL); + + sha1_init(&octx); + sha1_loop(&octx, tmpkey, 64); + + sha1_loop(&ictx, buffer, digest_len); + sha1_result(&ictx, tmp); + sha1_loop(&octx, tmp, 20); + sha1_result(&octx, digest); + +} +/* */ +/******************************************************************************/ diff --git a/epan/crypt/airpdcap_sha1.h b/epan/crypt/airpdcap_sha1.h new file mode 100644 index 0000000000..87ebfb643d --- /dev/null +++ b/epan/crypt/airpdcap_sha1.h @@ -0,0 +1,28 @@ +#ifndef _AIRPDCAP_SHA1 +#define _AIRPDCAP_SHA1 + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Definitions */ +/* */ +/* Maximum HMAC block length */ +#define HMAC_MAX_BLOCK_LEN SHA2_512_HMAC_BLOCK_LEN +#define HMAC_IPAD_VAL 0x36 +#define HMAC_OPAD_VAL 0x5C +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* External function prototypes declarations */ +/* */ +/* */ +/******************************************************************************/ + +#endif diff --git a/epan/crypt/airpdcap_system.h b/epan/crypt/airpdcap_system.h new file mode 100644 index 0000000000..4c8d42bc59 --- /dev/null +++ b/epan/crypt/airpdcap_system.h @@ -0,0 +1,350 @@ +#ifndef _AIRPDCAP_SYSTEM_H +#define _AIRPDCAP_SYSTEM_H + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +#include "airpdcap_user.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Constant definitions */ +/* */ +/* General definitions */ +#ifndef TRUE +#define TRUE 1 +#endif +#ifndef FALSE +#define FALSE 0 +#endif + +#define AIRPDCAP_RET_SUCCESS 0 +#define AIRPDCAP_RET_UNSUCCESS 1 + +#define AIRPDCAP_RET_NO_DATA 1 +#define AIRPDCAP_RET_WRONG_DATA_SIZE 2 +#define AIRPDCAP_RET_REQ_DATA 3 +#define AIRPDCAP_RET_NO_VALID_HANDSHAKE 4 +#define AIRPDCAP_RET_NO_DATA_ENCRYPTED 5 + +#define AIRPDCAP_RET_SUCCESS_HANDSHAKE -1 + +#define AIRPDCAP_MAX_KEYS_NR 64 +#define AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR 256 + +/* Decryption algorithms fields size definition (bytes) */ +#define AIRPDCAP_WPA_NONCE_LEN 32 +#define AIRPDCAP_WPA_PTK_LEN 64 /* TKIP uses 48 bytes, CCMP uses 64 bytes */ +#define AIRPDCAP_WPA_MICKEY_LEN 16 + +#define AIRPDCAP_WEP_128_KEY_LEN 16 /* 128 bits */ + +/* General 802.11 constants */ +#define AIRPDCAP_MAC_LEN 6 +#define AIRPDCAP_RADIOTAP_HEADER_LEN 24 + +#define AIRPDCAP_EAPOL_MAX_LEN 1024 + +#define AIRPDCAP_TK_LEN 16 + +/* Max length of capture data */ +#define AIRPDCAP_MAX_CAPLEN 8192 + +#define AIRPDCAP_WEP_IVLEN 3 /* 24bit */ +#define AIRPDCAP_WEP_KIDLEN 1 /* 1 octet */ +#define AIRPDCAP_WEP_ICV 4 +#define AIRPDCAP_WEP_HEADER AIRPDCAP_WEP_IVLEN + AIRPDCAP_WEP_KIDLEN +#define AIRPDCAP_WEP_TRAILER AIRPDCAP_WEP_ICV + +/* +* 802.11i defines an extended IV for use with non-WEP ciphers. +* When the EXTIV bit is set in the key id byte an additional +* 4 bytes immediately follow the IV for TKIP. For CCMP the +* EXTIV bit is likewise set but the 8 bytes represent the +* CCMP header rather than IV+extended-IV. +*/ +#define AIRPDCAP_RSNA_EXTIV 0x20 +#define AIRPDCAP_RSNA_EXTIVLEN 4 /* extended IV length */ +#define AIRPDCAP_RSNA_MICLEN 8 /* trailing MIC */ + +#define AIRPDCAP_RSNA_HEADER AIRPDCAP_WEP_HEADER + AIRPDCAP_RSNA_EXTIVLEN + +#define AIRPDCAP_CCMP_HEADER AIRPDCAP_RSNA_HEADER +#define AIRPDCAP_CCMP_TRAILER AIRPDCAP_RSNA_MICLEN + +#define AIRPDCAP_TKIP_HEADER AIRPDCAP_RSNA_HEADER +#define AIRPDCAP_TKIP_TRAILER AIRPDCAP_RSNA_MICLEN + AIRPDCAP_WEP_ICV + +#define AIRPDCAP_CRC_LEN 4 +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Macro definitions */ +/* */ +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +typedef struct _AIRPDCAP_SEC_ASSOCIATION_ID { + UCHAR bssid[AIRPDCAP_MAC_LEN]; + UCHAR sta[AIRPDCAP_MAC_LEN]; +} AIRPDCAP_SEC_ASSOCIATION_ID, *PAIRPDCAP_SEC_ASSOCIATION_ID; + +typedef struct _AIRPDCAP_SEC_ASSOCIATION { + /*! + This flag define whether this item is used or not. Accepted values are TRUE and FALSE + */ + UINT8 used; + AIRPDCAP_SEC_ASSOCIATION_ID saId; + AIRPDCAP_KEY_ITEM *key; + UINT8 handshake; + UINT8 validKey; + + struct { + UINT8 key_ver; /* Key descriptor version */ + UINT64 pn; /* only used with CCMP AES -if needed replay check- */ + UCHAR nonce[AIRPDCAP_WPA_NONCE_LEN]; + /* used to derive PTK, ANonce stored, SNonce taken */ + /* the 2nd packet of the 4W handshake */ + + UCHAR ptk[AIRPDCAP_WPA_PTK_LEN]; /* session key used in decryption algorithm */ + } wpa; +} AIRPDCAP_SEC_ASSOCIATION, *PAIRPDCAP_SEC_ASSOCIATION; + +typedef struct _AIRPDCAP_CONTEXT { + AIRPDCAP_SEC_ASSOCIATION sa[AIRPDCAP_MAX_SEC_ASSOCIATIONS_NR]; + size_t sa_nr; + AIRPDCAP_KEY_ITEM keys[AIRPDCAP_MAX_KEYS_NR]; + size_t keys_nr; + + INT index; + INT first_free_index; + INT last_stored_index; +} AIRPDCAP_CONTEXT, *PAIRPDCAP_CONTEXT; +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Function prototype declarations */ +/* */ +#ifdef __cplusplus +extern "C" { +#endif + +/** + * It processes a packet and if necessary it tries to decrypt + * encrypted data. + * The packet received in input should be an 802.11 frame (composed by the + * MAC header, the frame body and the FCS -if specified-). If the data will + * be decrypted the FCS will be recomputed. The packet received could start + * with a RadioTap header. + * @param ctx [IN] pointer to the current context + * @param data [IN] pointer to a buffer with packet data + * @param len [IN] packet data length; this should be the capture packet + * length (to avoid errors in processing) + * @param decrypt_data [OUT] pointer to a buffer that will contain + * decrypted data + * @param decrypt_len [OUT] length of decrypted data + * @param key [OUT] pointer to a preallocated key structure containing + * the key used during the decryption process (if done). If this parameter + * is set to NULL, the key will be not returned. + * @param fcsPresent [IN] flag that specifies if the FCS is present in + * the packet or not (0 when the FCS is not present, 1 when it is). + * @param radioTapPresent [IN] flag that specifies if a RadioTap header + * is present or not (0 when the header is no present, 1 when it is). + * @param mngHandshake [IN] if TRUE this function will manage the 4-way + * handshake for WPA/WPA2 + * @param mngDecrypt [IN] if TRUE this function will manage the WEP or + * WPA/WPA2 decryption + * @return + * - AIRPDCAP_RET_SUCCESS: decryption has been done (decrypt_data and + * decrypt_length will contain the packet data decrypted and the lenght of + * the new packet) + * - AIRPDCAP_RET_SUCCESS_HANDSHAKE: a step of the 4-way handshake for + * WPA key has been successfully done + * - AIRPDCAP_RET_NO_DATA: the packet is not a data packet + * - AIRPDCAP_RET_WRONG_DATA_SIZE: the size of the packet is below the + * accepted minimum + * - AIRPDCAP_RET_REQ_DATA: required data is not available and the + * processing must be interrupted + * - AIRPDCAP_RET_NO_VALID_HANDSHAKE: the authentication is not for WPA or RSNA + * - AIRPDCAP_RET_NO_DATA_ENCRYPTED: no encrypted data + * - AIRPDCAP_RET_UNSUCCESS: no decryption has been done (decrypt_data + * and decrypt_length will be not modified). + * Some other errors could be: + * data not correct + * data not encrypted + * key handshake, not encryption + * decryption not successful + * key handshake not correct + * replay check not successful + * @note + * The decrypted buffer should be allocated for a size equal or greater + * than the packet data buffer size. Before decryption process original + * data is copied in the buffer pointed by decrypt_data not to modify the + * original packet. + * @note + * The length of decrypted data will consider the entire 802.11 frame + * (thus the MAC header, the frame body and the recalculated FCS -if + * initially present-) + * @note + * This function is not thread-safe when used in parallel with context + * management functions on the same context. + */ +extern INT AirPDcapPacketProcess( + PAIRPDCAP_CONTEXT ctx, + const UCHAR *data, + const size_t len, + UCHAR *decrypt_data, + size_t *decrypt_len, + PAIRPDCAP_KEY_ITEM key, + UINT8 fcsPresent, + UINT8 radioTapPresent, + UINT8 mngHandshake, + UINT8 mngDecrypt) + ; + +/** + * It sets a new keys collection to use during packet processing. + * Any key should be well-formed, thus: it should have a defined key + * type and the specified length should be conforming WEP or WPA/WPA2 + * standards. A general WEP keys could be of any length (in the range + * defined in AIRPDCAP_KEY_ITEM), if a specific WEP key is used, the + * length of the key will be the one specified in 802.11i-2004 (40 bits or + * 104 bits). + * For WPA/WPA2 the password (passphrase and SSID), the PSK and the PMK + * are in alternative, as explain in the AIRPDCAP_KEY_ITEM structure + * description. + * @param ctx [IN] pointer to the current context + * @param keys [IN] an array of keys to set. + * @param keys_nr [IN] the size of the keys array + * @return The number of keys correctly inserted in the current database. + * @note Before inserting new keys, the current database will be cleaned. + * @note + * This function is not thread-safe when used in parallel with context + * management functions and the packet process function on the same + * context. + */ +extern INT AirPDcapSetKeys( + PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_KEY_ITEM keys[], + const size_t keys_nr) + ; + +/** + * Remove all keys from the active database + * @param ctx [IN] pointer to the current context + * @return The number of keys correctly removed. + * + * @note + * This function is not thread-safe when used in parallel with context + * management functions and the packet process function on the same + * context. + */ +INT AirPDcapCleanKeys( + PAIRPDCAP_CONTEXT ctx) + ; + +/** + * It gets the keys collection fom the specified context. + * @param ctx [IN] pointer to the current context + * @param key [IN] a preallocated array of keys to be returned + * @param keys_nr [IN] the number of keys to return (the key array must + * be able to contain at least keys_nr keys) + * @return The number of keys returned + * @note + * Any key could be modified, as stated in the AIRPDCAP_KEY_ITEM description. + * @note + * This function is not thread-safe when used in parallel with context + * management functions and the packet process function on the same + * context. + */ +INT AirPDcapGetKeys( + const PAIRPDCAP_CONTEXT ctx, + AIRPDCAP_KEY_ITEM keys[], + const size_t keys_nr) + ; +/** + * Initialize a context used to manage decryption and keys collection. + * @param ctx [IN|OUT] pointer to a preallocated context structure + * @return + * AIRPDCAP_RET_SUCCESS: the context has been successfully initialized + * AIRPDCAP_RET_UNSUCCESS: the context has not been initialized + * @note + * Only a correctly initialized context can be used to manage decryption + * processes and keys. + * @note + * This function is not thread-safe when used in parallel with context + * management functions and the packet process function on the same context. + */ +INT AirPDcapInitContext( + PAIRPDCAP_CONTEXT ctx) + ; + +/** + * Clean up the specified context. After the cleanup the pointer should + * not be used anymore. + * @param ctx [IN|OUT] pointer to the current context structure + * @return + * AIRPDCAP_RET_SUCCESS: the context has been successfully initialized + * AIRPDCAP_RET_UNSUCCESS: the context has not been initialized + * @note + * This function is not thread-safe when used in parallel with context + * management functions and the packet process function on the same + * context. + */ +INT AirPDcapDestroyContext( + PAIRPDCAP_CONTEXT ctx) + ; + + +extern INT AirPDcapWepDecrypt( + const UCHAR *seed, + const size_t seed_len, /* max AIRPDCAP_KEYBUF_SIZE */ + UCHAR *cypher_text, + const size_t data_len) + ; +extern INT AirPDcapCcmpDecrypt( + UINT8 *m, + INT len, + UCHAR TK1[16]) + ; +extern INT AirPDcapTkipDecrypt( + UCHAR *tkip_mpdu, + size_t mpdu_len, + UCHAR TA[AIRPDCAP_MAC_LEN], + UCHAR TK[AIRPDCAP_TK_LEN]) + ; +extern void AirPDcapAlgHmacMd5( + UCHAR *key, /* pointer to authentication key */ + INT key_len, /* length of authentication key */ + const UCHAR *text, /* pointer to data stream */ + const INT text_len, /* length of data stream */ + UCHAR *digest) /* caller digest to be filled in */ + ; +extern void AirPDcapAlgHmacSha1( + const UCHAR *key_len, + const size_t keylen, + UCHAR *buffer, + const size_t digest_len, + UCHAR digest[20]) + ; + + +#ifdef __cplusplus +} +#endif +/* */ +/* */ +/******************************************************************************/ + +#endif /* _AIRPDCAP_SYSTEM_H */ diff --git a/epan/crypt/airpdcap_tkip.c b/epan/crypt/airpdcap_tkip.c new file mode 100644 index 0000000000..886540e6c9 --- /dev/null +++ b/epan/crypt/airpdcap_tkip.c @@ -0,0 +1,250 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_system.h" +#include "airpdcap_int.h" + +#include "airpdcap_wep.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal definitions */ +/* */ +#define PHASE1_LOOP_COUNT 8 + +#define AIRPDCAP_TTAK_LEN 6 +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Internal function prototypes declarations */ +/* */ +void AirPDcapTkipMixingPhase1( + UINT16 *TTAK, + const UINT8 *TK, + const UINT8 *TA, + UINT32 TSC) + ; + +static void AirPDcapTkipMixingPhase2( + UINT8 *wep_seed, + const UINT8 *TK, + UINT16 *PPK, + UINT16 TSC16) + ; + +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Global variables */ +/* */ +/* Note: copied from FreeBSD source code, RELENG 6, */ +/* sys/net80211/ieee80211_crypto_tkip.c, 471 */ +static const UINT16 Sbox[256] = { + 0xC6A5, 0xF884, 0xEE99, 0xF68D, 0xFF0D, 0xD6BD, 0xDEB1, 0x9154, + 0x6050, 0x0203, 0xCEA9, 0x567D, 0xE719, 0xB562, 0x4DE6, 0xEC9A, + 0x8F45, 0x1F9D, 0x8940, 0xFA87, 0xEF15, 0xB2EB, 0x8EC9, 0xFB0B, + 0x41EC, 0xB367, 0x5FFD, 0x45EA, 0x23BF, 0x53F7, 0xE496, 0x9B5B, + 0x75C2, 0xE11C, 0x3DAE, 0x4C6A, 0x6C5A, 0x7E41, 0xF502, 0x834F, + 0x685C, 0x51F4, 0xD134, 0xF908, 0xE293, 0xAB73, 0x6253, 0x2A3F, + 0x080C, 0x9552, 0x4665, 0x9D5E, 0x3028, 0x37A1, 0x0A0F, 0x2FB5, + 0x0E09, 0x2436, 0x1B9B, 0xDF3D, 0xCD26, 0x4E69, 0x7FCD, 0xEA9F, + 0x121B, 0x1D9E, 0x5874, 0x342E, 0x362D, 0xDCB2, 0xB4EE, 0x5BFB, + 0xA4F6, 0x764D, 0xB761, 0x7DCE, 0x527B, 0xDD3E, 0x5E71, 0x1397, + 0xA6F5, 0xB968, 0x0000, 0xC12C, 0x4060, 0xE31F, 0x79C8, 0xB6ED, + 0xD4BE, 0x8D46, 0x67D9, 0x724B, 0x94DE, 0x98D4, 0xB0E8, 0x854A, + 0xBB6B, 0xC52A, 0x4FE5, 0xED16, 0x86C5, 0x9AD7, 0x6655, 0x1194, + 0x8ACF, 0xE910, 0x0406, 0xFE81, 0xA0F0, 0x7844, 0x25BA, 0x4BE3, + 0xA2F3, 0x5DFE, 0x80C0, 0x058A, 0x3FAD, 0x21BC, 0x7048, 0xF104, + 0x63DF, 0x77C1, 0xAF75, 0x4263, 0x2030, 0xE51A, 0xFD0E, 0xBF6D, + 0x814C, 0x1814, 0x2635, 0xC32F, 0xBEE1, 0x35A2, 0x88CC, 0x2E39, + 0x9357, 0x55F2, 0xFC82, 0x7A47, 0xC8AC, 0xBAE7, 0x322B, 0xE695, + 0xC0A0, 0x1998, 0x9ED1, 0xA37F, 0x4466, 0x547E, 0x3BAB, 0x0B83, + 0x8CCA, 0xC729, 0x6BD3, 0x283C, 0xA779, 0xBCE2, 0x161D, 0xAD76, + 0xDB3B, 0x6456, 0x744E, 0x141E, 0x92DB, 0x0C0A, 0x486C, 0xB8E4, + 0x9F5D, 0xBD6E, 0x43EF, 0xC4A6, 0x39A8, 0x31A4, 0xD337, 0xF28B, + 0xD532, 0x8B43, 0x6E59, 0xDAB7, 0x018C, 0xB164, 0x9CD2, 0x49E0, + 0xD8B4, 0xACFA, 0xF307, 0xCF25, 0xCAAF, 0xF48E, 0x47E9, 0x1018, + 0x6FD5, 0xF088, 0x4A6F, 0x5C72, 0x3824, 0x57F1, 0x73C7, 0x9751, + 0xCB23, 0xA17C, 0xE89C, 0x3E21, 0x96DD, 0x61DC, 0x0D86, 0x0F85, + 0xE090, 0x7C42, 0x71C4, 0xCCAA, 0x90D8, 0x0605, 0xF701, 0x1C12, + 0xC2A3, 0x6A5F, 0xAEF9, 0x69D0, 0x1791, 0x9958, 0x3A27, 0x27B9, + 0xD938, 0xEB13, 0x2BB3, 0x2233, 0xD2BB, 0xA970, 0x0789, 0x33A7, + 0x2DB6, 0x3C22, 0x1592, 0xC920, 0x8749, 0xAAFF, 0x5078, 0xA57A, + 0x038F, 0x59F8, 0x0980, 0x1A17, 0x65DA, 0xD731, 0x84C6, 0xD0B8, + 0x82C3, 0x29B0, 0x5A77, 0x1E11, 0x7BCB, 0xA8FC, 0x6DD6, 0x2C3A, +}; +/* */ +/******************************************************************************/ + +/* TODO: check for little-endian, big-endian */ + +/******************************************************************************/ +/* Function definitions */ +/* */ +/* Note: any functions were copied from FreeBSD source code, RELENG 6, */ +/* sys/net80211/ieee80211_crypto_tkip.c */ +static __inline UINT16 RotR1( + UINT16 val) +{ + return (UINT16)((val >> 1) | (val << 15)); +} + +static __inline UINT8 Lo8( + UINT16 val) +{ + return (UINT8)(val & 0xff); +} + +static __inline UINT8 Hi8( + UINT16 val) +{ + return (UINT8)(val >> 8); +} + +static __inline UINT16 Lo16( + UINT32 val) +{ + return (UINT16)(val & 0xffff); +} + +static __inline UINT16 Hi16( + UINT32 val) +{ + return (UINT16)(val >> 16); +} + +static __inline UINT16 Mk16( + UINT8 hi, + UINT8 lo) +{ + return (UINT16)(lo | (((UINT16) hi) << 8)); +} + +static __inline UINT16 Mk16_le(const UINT16 *v) +{ + return (UINT16)*v; +} + +static __inline UINT16 _S_( + UINT16 v) +{ + UINT16 t = Sbox[Hi8(v)]; + return (UINT16)(Sbox[Lo8(v)] ^ ((t << 8) | (t >> 8))); +} + +static __inline UINT64 READ_6( + UINT8 b0, + UINT8 b1, + UINT8 b2, + UINT8 b3, + UINT8 b4, + UINT8 b5) +{ + UINT32 iv32 = (b0 << 0) | (b1 << 8) | (b2 << 16) | (b3 << 24); + UINT16 iv16 = (UINT16)((b4 << 0) | (b5 << 8)); + return (((UINT64)iv16) << 32) | iv32; +} + +void AirPDcapTkipMixingPhase1( + UINT16 *TTAK, + const UINT8 *TK, + const UINT8 *TA, + UINT32 TSC) +{ + UINT16 i, j; + + /* Initialize the 80-bit TTAK from TSC (TSC) and TA[0..5] */ + TTAK[0] = Lo16(TSC); + TTAK[1] = Hi16(TSC); + TTAK[2] = Mk16(TA[1], TA[0]); + TTAK[3] = Mk16(TA[3], TA[2]); + TTAK[4] = Mk16(TA[5], TA[4]); + + for (i = 0; i < PHASE1_LOOP_COUNT; i++) { + j = (UINT16)(2 * (i & 1)); + TTAK[0] = (UINT16)(TTAK[0] + _S_((UINT16)(TTAK[4] ^ Mk16(TK[1 + j], TK[0 + j])))); + TTAK[1] = (UINT16)(TTAK[1] + _S_((UINT16)(TTAK[0] ^ Mk16(TK[5 + j], TK[4 + j])))); + TTAK[2] = (UINT16)(TTAK[2] + _S_((UINT16)(TTAK[1] ^ Mk16(TK[9 + j], TK[8 + j])))); + TTAK[3] = (UINT16)(TTAK[3] + _S_((UINT16)(TTAK[2] ^ Mk16(TK[13 + j], TK[12 + j])))); + TTAK[4] = (UINT16)(TTAK[4] + _S_((UINT16)(TTAK[3] ^ Mk16(TK[1 + j], TK[0 + j]))) + i); + } +} + +static void AirPDcapTkipMixingPhase2( + UINT8 *wep_seed, + const UINT8 *TK, + UINT16 *TTAK, + UINT16 TSC16) +{ + INT i; + TTAK[5] = (UINT16)(TTAK[4] + TSC16); + + /* Step 2 - 96-bit bijective mixing using S-box */ + TTAK[0] = (UINT16)(TTAK[0] + _S_((UINT16)(TTAK[5] ^ Mk16_le((const UINT16 *) &TK[0])))); + TTAK[1] = (UINT16)(TTAK[1] + _S_((UINT16)(TTAK[0] ^ Mk16_le((const UINT16 *) &TK[2])))); + TTAK[2] = (UINT16)(TTAK[2] + _S_((UINT16)(TTAK[1] ^ Mk16_le((const UINT16 *) &TK[4])))); + TTAK[3] = (UINT16)(TTAK[3] + _S_((UINT16)(TTAK[2] ^ Mk16_le((const UINT16 *) &TK[6])))); + TTAK[4] = (UINT16)(TTAK[4] + _S_((UINT16)(TTAK[3] ^ Mk16_le((const UINT16 *) &TK[8])))); + TTAK[5] = (UINT16)(TTAK[5] + _S_((UINT16)(TTAK[4] ^ Mk16_le((const UINT16 *) &TK[10])))); + + TTAK[0] = (UINT16)(TTAK[0] + RotR1((UINT16)(TTAK[5] ^ Mk16_le((const UINT16 *) &TK[12])))); + TTAK[1] = (UINT16)(TTAK[1] + RotR1((UINT16)(TTAK[0] ^ Mk16_le((const UINT16 *) &TK[14])))); + TTAK[2] = (UINT16)(TTAK[2] + RotR1(TTAK[1])); + TTAK[3] = (UINT16)(TTAK[3] + RotR1(TTAK[2])); + TTAK[4] = (UINT16)(TTAK[4] + RotR1(TTAK[3])); + TTAK[5] = (UINT16)(TTAK[5] + RotR1(TTAK[4])); + + /* Step 3 - bring in last of TK bits, assign 24-bit WEP IV value + * wep_seed[0..2] is transmitted as WEP IV */ + wep_seed[0] = Hi8(TSC16); + wep_seed[1] = (UINT8)((Hi8(TSC16) | 0x20) & 0x7F); + wep_seed[2] = Lo8(TSC16); + wep_seed[3] = Lo8((UINT16)((TTAK[5] ^ Mk16_le((const UINT16 *) &TK[0])) >> 1)); + + for (i = 0; i < 6; i++) + { + wep_seed[4 + ( 2 * i)] = Lo8( TTAK[i] ); + wep_seed[5 + ( 2 * i)] = Hi8( TTAK[i] ); + } +} + +/* Note: taken from FreeBSD source code, RELENG 6, */ +/* sys/net80211/ieee80211_crypto_tkip.c, 936 */ +INT AirPDcapTkipDecrypt( + UCHAR *tkip_mpdu, + size_t mpdu_len, + UCHAR TA[AIRPDCAP_MAC_LEN], + UCHAR TK[AIRPDCAP_TK_LEN]) +{ + UINT32 TSC; + UINT16 TSC16; + UINT8 *IV; + UINT16 TTAK[AIRPDCAP_TTAK_LEN]; + UINT8 wep_seed[AIRPDCAP_WEP_128_KEY_LEN]; + + IV = tkip_mpdu; + + TSC16 = (UINT16)READ_6(IV[2], IV[0], IV[4], IV[5], IV[6], IV[7]); + + TSC = (UINT32)TSC16 >> 16; + + AirPDcapTkipMixingPhase1(TTAK, TK, TA, TSC); + + AirPDcapTkipMixingPhase2(wep_seed, TK, TTAK, TSC16); + + return AirPDcapWepDecrypt( + wep_seed, + AIRPDCAP_WEP_128_KEY_LEN, + tkip_mpdu + AIRPDCAP_TKIP_HEADER, + mpdu_len-(AIRPDCAP_TKIP_HEADER+AIRPDCAP_WEP_ICV)); /* MPDU - TKIP_HEADER - MIC */ + + /* TODO check (IEEE 802.11i-2004, pg. 44) */ + +} +/* */ +/******************************************************************************/ diff --git a/epan/crypt/airpdcap_tkip.h b/epan/crypt/airpdcap_tkip.h new file mode 100644 index 0000000000..e69de29bb2 --- /dev/null +++ b/epan/crypt/airpdcap_tkip.h diff --git a/epan/crypt/airpdcap_user.h b/epan/crypt/airpdcap_user.h new file mode 100644 index 0000000000..b637ea90b8 --- /dev/null +++ b/epan/crypt/airpdcap_user.h @@ -0,0 +1,167 @@ +#ifndef _AIRPDCAP_USER_H +#define _AIRPDCAP_USER_H + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Constant definitions */ +/* */ +/* Decryption key types */ +#define AIRPDCAP_KEY_TYPE_WEP 0 +#define AIRPDCAP_KEY_TYPE_WEP_40 1 +#define AIRPDCAP_KEY_TYPE_WEP_104 2 +#define AIRPDCAP_KEY_TYPE_WPA_PWD 3 +#define AIRPDCAP_KEY_TYPE_WPA_PSK 4 +#define AIRPDCAP_KEY_TYPE_WPA_PMK 5 +#define AIRPDCAP_KEY_TYPE_TKIP 6 +#define AIRPDCAP_KEY_TYPE_CCMP 7 + +/* Decryption algorithms fields size definition (bytes) */ +#define AIRPDCAP_WEP_KEY_MINLEN 1 +#define AIRPDCAP_WEP_KEY_MAXLEN 32 +#define AIRPDCAP_WEP_40_KEY_LEN 5 +#define AIRPDCAP_WEP_104_KEY_LEN 13 + +#define AIRPDCAP_WPA_PASSPHRASE_MIN_LEN 8 +#define AIRPDCAP_WPA_PASSPHRASE_MAX_LEN 63 /* null-terminated string, the actual length of the storage is 64 */ +#define AIRPDCAP_WPA_SSID_MIN_LEN 0 +#define AIRPDCAP_WPA_SSID_MAX_LEN 32 +#define AIRPDCAP_WPA_PSK_LEN 64 +#define AIRPDCAP_WPA_PMK_LEN 32 +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Macro definitions */ +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +/** + * Struct to store info about a specific decryption key. + */ +typedef struct { + GString *key; + GString *ssid; + guint bits; + guint type; +} decryption_key_t; + +/** + * Key item used during the decryption process. + */ +typedef struct _AIRPDCAP_KEY_ITEM { + /** + * Type of key. The type will remain unchanged during the + * processing, even if some fields could be changed (e.g., WPA + * fields). + * @note + * You can use constants AIRPDCAP_KEY_TYPE_xxx to indicate the + * key type. + */ + UINT8 KeyType; + + /** + * Key data. + * This field can be used for the following decryptographic + * algorithms: WEP-40, with a key of 40 bits (10 hex-digits); + * WEP-104, with a key of 104 bits (or 26 hex-digits); WPA or + * WPA2. + * @note + * For WPA/WPA2, the PMK is calculated from the PSK, and the PSK + * is calculated from the passphrase-SSID pair. You can enter one + * of these 3 values and subsequent fields will be automatically + * calculated. + * @note + * For WPA and WPA2 this implementation will use standards as + * defined in 802.11i (2004) and 802.1X (2004). + */ + union AIRPDCAP_KEY_ITEMDATA { + struct AIRPDCAP_KEY_ITEMDATA_WEP { + /** + * The binary value of the WEP key. + * @note + * It is accepted a key of lenght between + * AIRPDCAP_WEP_KEY_MINLEN and + * AIRPDCAP_WEP_KEY_MAXLEN. A WEP key + * standard-compliante should be either 40 bits + * (10 hex-digits, 5 bytes) for WEP-40 or 104 bits + * (26 hex-digits, 13 bytes) for WEP-104. + */ + UCHAR WepKey[AIRPDCAP_WEP_KEY_MAXLEN]; + /** + * The length of the WEP key. Acceptable range + * is [AIRPDCAP_WEP_KEY_MINLEN;AIRPDCAP_WEP_KEY_MAXLEN]. + */ + size_t WepKeyLen; + } Wep; + + /** + * WPA/WPA2 key data. Note that the decryption process + * will use the PMK (equal to PSK), that is calculated + * from passphrase-SSID pair. You can define one of these + * three fields and necessary fields will be automatically + * calculated. + */ + union AIRPDCAP_KEY_ITEMDATA_WPA { + struct AIRPDCAP_KEY_ITEMDATA_PWD { + /** + * The string (null-terminated) value of + * the passphrase. + */ + CHAR Passphrase[AIRPDCAP_WPA_PASSPHRASE_MAX_LEN+1]; + /** + * The value of the SSID (up to + * AIRPDCAP_WPA_SSID_MAX_LEN octets). + * @note + * A zero-length SSID indicates broadcast. + */ + CHAR Ssid[AIRPDCAP_WPA_SSID_MAX_LEN]; + /** + *The length of the SSID + */ + size_t SsidLen; + } UserPwd; + + UCHAR Psk[AIRPDCAP_WPA_PSK_LEN]; + + UCHAR Pmk[AIRPDCAP_WPA_PMK_LEN]; + } Wpa; + } KeyData; +} AIRPDCAP_KEY_ITEM, *PAIRPDCAP_KEY_ITEM; + +/** + * Collection of keys to use to decrypt packets + */ +typedef struct _AIRPDCAP_KEYS_COLLECTION { + /** + * Number of stored keys + */ + size_t nKeys; + + /** + * Array of nKeys keys + */ + AIRPDCAP_KEY_ITEM Keys[256]; +} AIRPDCAP_KEYS_COLLECTION, *PAIRPDCAP_KEYS_COLLECTION; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Function prototype declarations */ +/* */ +/* */ +/* */ +/******************************************************************************/ + +#endif /* _AIRPDCAP_USER_H */ diff --git a/epan/crypt/airpdcap_wep.c b/epan/crypt/airpdcap_wep.c new file mode 100644 index 0000000000..1501d61155 --- /dev/null +++ b/epan/crypt/airpdcap_wep.c @@ -0,0 +1,67 @@ +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_system.h" +#include "airpdcap_int.h" + +#include "airpdcap_wep.h" + +#include "airpdcap_debug.h" +/* */ +/******************************************************************************/ + +extern const UINT32 crc32_table[256]; + +/* Note: copied from FreeBSD source code, RELENG 6, */ +/* sys/net80211/ieee80211_crypto_wep.c, 391 */ +INT AirPDcapWepDecrypt( + const UCHAR *seed, + const size_t seed_len, + UCHAR *cypher_text, + const size_t data_len) +{ + UINT32 i, j, k, crc; + UINT8 S[256]; + UINT8 icv[4]; + size_t buflen; + + /* Generate key stream (RC4 Pseude-Random Number Generator) */ + for (i = 0; i < 256; i++) + S[i] = (UINT8)i; + for (j = i = 0; i < 256; i++) { + j = (j + S[i] + seed[i % seed_len]) & 0xff; + S_SWAP(i, j); + } + + /* Apply RC4 to data and compute CRC32 over decrypted data */ + crc = ~(UINT32)0; + buflen = data_len; + + for (i = j = k = 0; k < buflen; k++) { + i = (i + 1) & 0xff; + j = (j + S[i]) & 0xff; + S_SWAP(i, j); + *cypher_text ^= S[(S[i] + S[j]) & 0xff]; + crc = crc32_table[(crc ^ *cypher_text) & 0xff] ^ (crc >> 8); + cypher_text++; + } + + crc = ~crc; + + /* Encrypt little-endian CRC32 and verify that it matches with the received ICV */ + icv[0] = (UINT8)crc; + icv[1] = (UINT8)(crc >> 8); + icv[2] = (UINT8)(crc >> 16); + icv[3] = (UINT8)(crc >> 24); + for (k = 0; k < 4; k++) { + i = (i + 1) & 0xff; + j = (j + S[i]) & 0xff; + S_SWAP(i, j); + if ((icv[k] ^ S[(S[i] + S[j]) & 0xff]) != *cypher_text++) { + /* ICV mismatch - drop frame */ + return AIRPDCAP_RET_UNSUCCESS; + } + } + + return AIRPDCAP_RET_SUCCESS; +} diff --git a/epan/crypt/airpdcap_wep.h b/epan/crypt/airpdcap_wep.h new file mode 100644 index 0000000000..a7885c18f6 --- /dev/null +++ b/epan/crypt/airpdcap_wep.h @@ -0,0 +1,78 @@ +#ifndef _AIRPDCAP_WEP +#define _AIRPDCAP_WEP + +/******************************************************************************/ +/* File includes */ +/* */ +#include "airpdcap_interop.h" +/* */ +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* Type definitions */ +/* */ +/* Note: copied from net80211/ieee80211_cripto_wep.c of FreeBSD source */ +static const UINT32 crc32_table[256] = { + 0x00000000L, 0x77073096L, 0xee0e612cL, 0x990951baL, 0x076dc419L, + 0x706af48fL, 0xe963a535L, 0x9e6495a3L, 0x0edb8832L, 0x79dcb8a4L, + 0xe0d5e91eL, 0x97d2d988L, 0x09b64c2bL, 0x7eb17cbdL, 0xe7b82d07L, + 0x90bf1d91L, 0x1db71064L, 0x6ab020f2L, 0xf3b97148L, 0x84be41deL, + 0x1adad47dL, 0x6ddde4ebL, 0xf4d4b551L, 0x83d385c7L, 0x136c9856L, + 0x646ba8c0L, 0xfd62f97aL, 0x8a65c9ecL, 0x14015c4fL, 0x63066cd9L, + 0xfa0f3d63L, 0x8d080df5L, 0x3b6e20c8L, 0x4c69105eL, 0xd56041e4L, + 0xa2677172L, 0x3c03e4d1L, 0x4b04d447L, 0xd20d85fdL, 0xa50ab56bL, + 0x35b5a8faL, 0x42b2986cL, 0xdbbbc9d6L, 0xacbcf940L, 0x32d86ce3L, + 0x45df5c75L, 0xdcd60dcfL, 0xabd13d59L, 0x26d930acL, 0x51de003aL, + 0xc8d75180L, 0xbfd06116L, 0x21b4f4b5L, 0x56b3c423L, 0xcfba9599L, + 0xb8bda50fL, 0x2802b89eL, 0x5f058808L, 0xc60cd9b2L, 0xb10be924L, + 0x2f6f7c87L, 0x58684c11L, 0xc1611dabL, 0xb6662d3dL, 0x76dc4190L, + 0x01db7106L, 0x98d220bcL, 0xefd5102aL, 0x71b18589L, 0x06b6b51fL, + 0x9fbfe4a5L, 0xe8b8d433L, 0x7807c9a2L, 0x0f00f934L, 0x9609a88eL, + 0xe10e9818L, 0x7f6a0dbbL, 0x086d3d2dL, 0x91646c97L, 0xe6635c01L, + 0x6b6b51f4L, 0x1c6c6162L, 0x856530d8L, 0xf262004eL, 0x6c0695edL, + 0x1b01a57bL, 0x8208f4c1L, 0xf50fc457L, 0x65b0d9c6L, 0x12b7e950L, + 0x8bbeb8eaL, 0xfcb9887cL, 0x62dd1ddfL, 0x15da2d49L, 0x8cd37cf3L, + 0xfbd44c65L, 0x4db26158L, 0x3ab551ceL, 0xa3bc0074L, 0xd4bb30e2L, + 0x4adfa541L, 0x3dd895d7L, 0xa4d1c46dL, 0xd3d6f4fbL, 0x4369e96aL, + 0x346ed9fcL, 0xad678846L, 0xda60b8d0L, 0x44042d73L, 0x33031de5L, + 0xaa0a4c5fL, 0xdd0d7cc9L, 0x5005713cL, 0x270241aaL, 0xbe0b1010L, + 0xc90c2086L, 0x5768b525L, 0x206f85b3L, 0xb966d409L, 0xce61e49fL, + 0x5edef90eL, 0x29d9c998L, 0xb0d09822L, 0xc7d7a8b4L, 0x59b33d17L, + 0x2eb40d81L, 0xb7bd5c3bL, 0xc0ba6cadL, 0xedb88320L, 0x9abfb3b6L, + 0x03b6e20cL, 0x74b1d29aL, 0xead54739L, 0x9dd277afL, 0x04db2615L, + 0x73dc1683L, 0xe3630b12L, 0x94643b84L, 0x0d6d6a3eL, 0x7a6a5aa8L, + 0xe40ecf0bL, 0x9309ff9dL, 0x0a00ae27L, 0x7d079eb1L, 0xf00f9344L, + 0x8708a3d2L, 0x1e01f268L, 0x6906c2feL, 0xf762575dL, 0x806567cbL, + 0x196c3671L, 0x6e6b06e7L, 0xfed41b76L, 0x89d32be0L, 0x10da7a5aL, + 0x67dd4accL, 0xf9b9df6fL, 0x8ebeeff9L, 0x17b7be43L, 0x60b08ed5L, + 0xd6d6a3e8L, 0xa1d1937eL, 0x38d8c2c4L, 0x4fdff252L, 0xd1bb67f1L, + 0xa6bc5767L, 0x3fb506ddL, 0x48b2364bL, 0xd80d2bdaL, 0xaf0a1b4cL, + 0x36034af6L, 0x41047a60L, 0xdf60efc3L, 0xa867df55L, 0x316e8eefL, + 0x4669be79L, 0xcb61b38cL, 0xbc66831aL, 0x256fd2a0L, 0x5268e236L, + 0xcc0c7795L, 0xbb0b4703L, 0x220216b9L, 0x5505262fL, 0xc5ba3bbeL, + 0xb2bd0b28L, 0x2bb45a92L, 0x5cb36a04L, 0xc2d7ffa7L, 0xb5d0cf31L, + 0x2cd99e8bL, 0x5bdeae1dL, 0x9b64c2b0L, 0xec63f226L, 0x756aa39cL, + 0x026d930aL, 0x9c0906a9L, 0xeb0e363fL, 0x72076785L, 0x05005713L, + 0x95bf4a82L, 0xe2b87a14L, 0x7bb12baeL, 0x0cb61b38L, 0x92d28e9bL, + 0xe5d5be0dL, 0x7cdcefb7L, 0x0bdbdf21L, 0x86d3d2d4L, 0xf1d4e242L, + 0x68ddb3f8L, 0x1fda836eL, 0x81be16cdL, 0xf6b9265bL, 0x6fb077e1L, + 0x18b74777L, 0x88085ae6L, 0xff0f6a70L, 0x66063bcaL, 0x11010b5cL, + 0x8f659effL, 0xf862ae69L, 0x616bffd3L, 0x166ccf45L, 0xa00ae278L, + 0xd70dd2eeL, 0x4e048354L, 0x3903b3c2L, 0xa7672661L, 0xd06016f7L, + 0x4969474dL, 0x3e6e77dbL, 0xaed16a4aL, 0xd9d65adcL, 0x40df0b66L, + 0x37d83bf0L, 0xa9bcae53L, 0xdebb9ec5L, 0x47b2cf7fL, 0x30b5ffe9L, + 0xbdbdf21cL, 0xcabac28aL, 0x53b39330L, 0x24b4a3a6L, 0xbad03605L, + 0xcdd70693L, 0x54de5729L, 0x23d967bfL, 0xb3667a2eL, 0xc4614ab8L, + 0x5d681b02L, 0x2a6f2b94L, 0xb40bbe37L, 0xc30c8ea1L, 0x5a05df1bL, + 0x2d02ef8dL}; +/* */ +/******************************************************************************/ + +/******************************************************************************/ +/* External function prototypes declarations */ +/* */ +/* */ +/******************************************************************************/ + +#endif /* _AIRPDCAP_WEP */ diff --git a/epan/crypt/airpdcap_ws.h b/epan/crypt/airpdcap_ws.h new file mode 100644 index 0000000000..6eec4d0ff6 --- /dev/null +++ b/epan/crypt/airpdcap_ws.h @@ -0,0 +1,7 @@ +#ifndef _AIRPDCAP_WS_H +#define _AIRPDCAP_WS_H + +#include "airpdcap_system.h" +WS_VAR_IMPORT AIRPDCAP_CONTEXT airpdcap_ctx; + +#endif /* _AIRPDCAP_WS_H */ |