1*c1d255d3SCy Schubert /*
2*c1d255d3SCy Schubert * SAE-PK password/modifier generator
3*c1d255d3SCy Schubert * Copyright (c) 2020, The Linux Foundation
4*c1d255d3SCy Schubert *
5*c1d255d3SCy Schubert * This software may be distributed under the terms of the BSD license.
6*c1d255d3SCy Schubert * See README for more details.
7*c1d255d3SCy Schubert */
8*c1d255d3SCy Schubert
9*c1d255d3SCy Schubert #include "utils/includes.h"
10*c1d255d3SCy Schubert
11*c1d255d3SCy Schubert #include "utils/common.h"
12*c1d255d3SCy Schubert #include "utils/base64.h"
13*c1d255d3SCy Schubert #include "crypto/crypto.h"
14*c1d255d3SCy Schubert #include "common/sae.h"
15*c1d255d3SCy Schubert
16*c1d255d3SCy Schubert
main(int argc,char * argv[])17*c1d255d3SCy Schubert int main(int argc, char *argv[])
18*c1d255d3SCy Schubert {
19*c1d255d3SCy Schubert char *der = NULL;
20*c1d255d3SCy Schubert size_t der_len;
21*c1d255d3SCy Schubert struct crypto_ec_key *key = NULL;
22*c1d255d3SCy Schubert struct wpabuf *pub = NULL;
23*c1d255d3SCy Schubert u8 *data = NULL, *m;
24*c1d255d3SCy Schubert size_t data_len;
25*c1d255d3SCy Schubert char *b64 = NULL, *pw = NULL, *pos, *src;
26*c1d255d3SCy Schubert int sec, j;
27*c1d255d3SCy Schubert int ret = -1;
28*c1d255d3SCy Schubert u8 hash[SAE_MAX_HASH_LEN];
29*c1d255d3SCy Schubert char hash_hex[2 * SAE_MAX_HASH_LEN + 1];
30*c1d255d3SCy Schubert u8 pw_base_bin[SAE_MAX_HASH_LEN];
31*c1d255d3SCy Schubert u8 *dst;
32*c1d255d3SCy Schubert int group;
33*c1d255d3SCy Schubert size_t hash_len;
34*c1d255d3SCy Schubert unsigned long long i, expected;
35*c1d255d3SCy Schubert char m_hex[2 * SAE_PK_M_LEN + 1];
36*c1d255d3SCy Schubert u32 sec_1b, val20;
37*c1d255d3SCy Schubert
38*c1d255d3SCy Schubert wpa_debug_level = MSG_INFO;
39*c1d255d3SCy Schubert if (os_program_init() < 0)
40*c1d255d3SCy Schubert goto fail;
41*c1d255d3SCy Schubert
42*c1d255d3SCy Schubert if (argc != 4) {
43*c1d255d3SCy Schubert fprintf(stderr,
44*c1d255d3SCy Schubert "usage: sae_pk_gen <DER ECPrivateKey file> <Sec:3|5> <SSID>\n");
45*c1d255d3SCy Schubert goto fail;
46*c1d255d3SCy Schubert }
47*c1d255d3SCy Schubert
48*c1d255d3SCy Schubert sec = atoi(argv[2]);
49*c1d255d3SCy Schubert if (sec != 3 && sec != 5) {
50*c1d255d3SCy Schubert fprintf(stderr,
51*c1d255d3SCy Schubert "Invalid Sec value (allowed values: 3 and 5)\n");
52*c1d255d3SCy Schubert goto fail;
53*c1d255d3SCy Schubert }
54*c1d255d3SCy Schubert sec_1b = sec == 3;
55*c1d255d3SCy Schubert expected = 1;
56*c1d255d3SCy Schubert for (j = 0; j < sec; j++)
57*c1d255d3SCy Schubert expected *= 256;
58*c1d255d3SCy Schubert
59*c1d255d3SCy Schubert der = os_readfile(argv[1], &der_len);
60*c1d255d3SCy Schubert if (!der) {
61*c1d255d3SCy Schubert fprintf(stderr, "Could not read %s: %s\n",
62*c1d255d3SCy Schubert argv[1], strerror(errno));
63*c1d255d3SCy Schubert goto fail;
64*c1d255d3SCy Schubert }
65*c1d255d3SCy Schubert
66*c1d255d3SCy Schubert key = crypto_ec_key_parse_priv((u8 *) der, der_len);
67*c1d255d3SCy Schubert if (!key) {
68*c1d255d3SCy Schubert fprintf(stderr, "Could not parse ECPrivateKey\n");
69*c1d255d3SCy Schubert goto fail;
70*c1d255d3SCy Schubert }
71*c1d255d3SCy Schubert
72*c1d255d3SCy Schubert pub = crypto_ec_key_get_subject_public_key(key);
73*c1d255d3SCy Schubert if (!pub) {
74*c1d255d3SCy Schubert fprintf(stderr, "Failed to build SubjectPublicKey\n");
75*c1d255d3SCy Schubert goto fail;
76*c1d255d3SCy Schubert }
77*c1d255d3SCy Schubert
78*c1d255d3SCy Schubert group = crypto_ec_key_group(key);
79*c1d255d3SCy Schubert switch (group) {
80*c1d255d3SCy Schubert case 19:
81*c1d255d3SCy Schubert hash_len = 32;
82*c1d255d3SCy Schubert break;
83*c1d255d3SCy Schubert case 20:
84*c1d255d3SCy Schubert hash_len = 48;
85*c1d255d3SCy Schubert break;
86*c1d255d3SCy Schubert case 21:
87*c1d255d3SCy Schubert hash_len = 64;
88*c1d255d3SCy Schubert break;
89*c1d255d3SCy Schubert default:
90*c1d255d3SCy Schubert fprintf(stderr, "Unsupported private key group\n");
91*c1d255d3SCy Schubert goto fail;
92*c1d255d3SCy Schubert }
93*c1d255d3SCy Schubert
94*c1d255d3SCy Schubert data_len = os_strlen(argv[3]) + SAE_PK_M_LEN + wpabuf_len(pub);
95*c1d255d3SCy Schubert data = os_malloc(data_len);
96*c1d255d3SCy Schubert if (!data) {
97*c1d255d3SCy Schubert fprintf(stderr, "No memory for data buffer\n");
98*c1d255d3SCy Schubert goto fail;
99*c1d255d3SCy Schubert }
100*c1d255d3SCy Schubert os_memcpy(data, argv[3], os_strlen(argv[3]));
101*c1d255d3SCy Schubert m = data + os_strlen(argv[3]);
102*c1d255d3SCy Schubert if (os_get_random(m, SAE_PK_M_LEN) < 0) {
103*c1d255d3SCy Schubert fprintf(stderr, "Could not generate random Modifier M\n");
104*c1d255d3SCy Schubert goto fail;
105*c1d255d3SCy Schubert }
106*c1d255d3SCy Schubert os_memcpy(m + SAE_PK_M_LEN, wpabuf_head(pub), wpabuf_len(pub));
107*c1d255d3SCy Schubert
108*c1d255d3SCy Schubert fprintf(stderr, "Searching for a suitable Modifier M value\n");
109*c1d255d3SCy Schubert for (i = 0;; i++) {
110*c1d255d3SCy Schubert if (sae_hash(hash_len, data, data_len, hash) < 0) {
111*c1d255d3SCy Schubert fprintf(stderr, "Hash failed\n");
112*c1d255d3SCy Schubert goto fail;
113*c1d255d3SCy Schubert }
114*c1d255d3SCy Schubert if (hash[0] == 0 && hash[1] == 0) {
115*c1d255d3SCy Schubert if ((hash[2] & 0xf0) == 0)
116*c1d255d3SCy Schubert fprintf(stderr, "\r%3.2f%%",
117*c1d255d3SCy Schubert 100.0 * (double) i / (double) expected);
118*c1d255d3SCy Schubert for (j = 2; j < sec; j++) {
119*c1d255d3SCy Schubert if (hash[j])
120*c1d255d3SCy Schubert break;
121*c1d255d3SCy Schubert }
122*c1d255d3SCy Schubert if (j == sec)
123*c1d255d3SCy Schubert break;
124*c1d255d3SCy Schubert }
125*c1d255d3SCy Schubert inc_byte_array(m, SAE_PK_M_LEN);
126*c1d255d3SCy Schubert }
127*c1d255d3SCy Schubert
128*c1d255d3SCy Schubert if (wpa_snprintf_hex(m_hex, sizeof(m_hex), m, SAE_PK_M_LEN) < 0 ||
129*c1d255d3SCy Schubert wpa_snprintf_hex(hash_hex, sizeof(hash_hex), hash, hash_len) < 0)
130*c1d255d3SCy Schubert goto fail;
131*c1d255d3SCy Schubert fprintf(stderr, "\nFound a valid hash in %llu iterations: %s\n",
132*c1d255d3SCy Schubert i + 1, hash_hex);
133*c1d255d3SCy Schubert
134*c1d255d3SCy Schubert b64 = base64_encode(der, der_len, NULL);
135*c1d255d3SCy Schubert if (!b64)
136*c1d255d3SCy Schubert goto fail;
137*c1d255d3SCy Schubert src = pos = b64;
138*c1d255d3SCy Schubert while (*src) {
139*c1d255d3SCy Schubert if (*src != '\n')
140*c1d255d3SCy Schubert *pos++ = *src;
141*c1d255d3SCy Schubert src++;
142*c1d255d3SCy Schubert }
143*c1d255d3SCy Schubert *pos = '\0';
144*c1d255d3SCy Schubert
145*c1d255d3SCy Schubert /* Skip 8*Sec bits and add Sec_1b as the every 20th bit starting with
146*c1d255d3SCy Schubert * one. */
147*c1d255d3SCy Schubert os_memset(pw_base_bin, 0, sizeof(pw_base_bin));
148*c1d255d3SCy Schubert dst = pw_base_bin;
149*c1d255d3SCy Schubert for (j = 0; j < 8 * (int) hash_len / 20; j++) {
150*c1d255d3SCy Schubert val20 = sae_pk_get_be19(hash + sec);
151*c1d255d3SCy Schubert val20 |= sec_1b << 19;
152*c1d255d3SCy Schubert sae_pk_buf_shift_left_19(hash + sec, hash_len - sec);
153*c1d255d3SCy Schubert
154*c1d255d3SCy Schubert if (j & 1) {
155*c1d255d3SCy Schubert *dst |= (val20 >> 16) & 0x0f;
156*c1d255d3SCy Schubert dst++;
157*c1d255d3SCy Schubert *dst++ = (val20 >> 8) & 0xff;
158*c1d255d3SCy Schubert *dst++ = val20 & 0xff;
159*c1d255d3SCy Schubert } else {
160*c1d255d3SCy Schubert *dst++ = (val20 >> 12) & 0xff;
161*c1d255d3SCy Schubert *dst++ = (val20 >> 4) & 0xff;
162*c1d255d3SCy Schubert *dst = (val20 << 4) & 0xf0;
163*c1d255d3SCy Schubert }
164*c1d255d3SCy Schubert }
165*c1d255d3SCy Schubert if (wpa_snprintf_hex(hash_hex, sizeof(hash_hex),
166*c1d255d3SCy Schubert pw_base_bin, hash_len - sec) >= 0)
167*c1d255d3SCy Schubert fprintf(stderr, "PasswordBase binary data for base32: %s",
168*c1d255d3SCy Schubert hash_hex);
169*c1d255d3SCy Schubert
170*c1d255d3SCy Schubert pw = sae_pk_base32_encode(pw_base_bin, 20 * 3 - 5);
171*c1d255d3SCy Schubert if (!pw)
172*c1d255d3SCy Schubert goto fail;
173*c1d255d3SCy Schubert
174*c1d255d3SCy Schubert printf("# SAE-PK password/M/private key for Sec=%d.\n", sec);
175*c1d255d3SCy Schubert printf("sae_password=%s|pk=%s:%s\n", pw, m_hex, b64);
176*c1d255d3SCy Schubert printf("# Longer passwords can be used for improved security at the cost of usability:\n");
177*c1d255d3SCy Schubert for (j = 4; j <= ((int) hash_len * 8 + 5 - 8 * sec) / 19; j++) {
178*c1d255d3SCy Schubert os_free(pw);
179*c1d255d3SCy Schubert pw = sae_pk_base32_encode(pw_base_bin, 20 * j - 5);
180*c1d255d3SCy Schubert if (pw)
181*c1d255d3SCy Schubert printf("# %s\n", pw);
182*c1d255d3SCy Schubert }
183*c1d255d3SCy Schubert
184*c1d255d3SCy Schubert ret = 0;
185*c1d255d3SCy Schubert fail:
186*c1d255d3SCy Schubert os_free(der);
187*c1d255d3SCy Schubert wpabuf_free(pub);
188*c1d255d3SCy Schubert crypto_ec_key_deinit(key);
189*c1d255d3SCy Schubert os_free(data);
190*c1d255d3SCy Schubert os_free(b64);
191*c1d255d3SCy Schubert os_free(pw);
192*c1d255d3SCy Schubert
193*c1d255d3SCy Schubert os_program_deinit();
194*c1d255d3SCy Schubert
195*c1d255d3SCy Schubert return ret;
196*c1d255d3SCy Schubert }
197