Wireshark 4.5.0
The Wireshark network protocol analyzer
|
#include <stdint.h>
#include <stdbool.h>
#include "dot11decrypt_user.h"
#include "ws_symbol_export.h"
Go to the source code of this file.
Classes | |
struct | _DOT11DECRYPT_SEC_ASSOCIATION_ID |
struct | _DOT11DECRYPT_SEC_ASSOCIATION |
struct | _DOT11DECRYPT_CONTEXT |
struct | _DOT11DECRYPT_FTE |
struct | _DOT11DECRYPT_EAPOL_PARSED |
struct | _DOT11DECRYPT_ASSOC_PARSED |
Typedefs | |
typedef struct _DOT11DECRYPT_SEC_ASSOCIATION_ID | DOT11DECRYPT_SEC_ASSOCIATION_ID |
typedef struct _DOT11DECRYPT_SEC_ASSOCIATION_ID * | PDOT11DECRYPT_SEC_ASSOCIATION_ID |
typedef struct _DOT11DECRYPT_SEC_ASSOCIATION | DOT11DECRYPT_SEC_ASSOCIATION |
typedef struct _DOT11DECRYPT_SEC_ASSOCIATION * | PDOT11DECRYPT_SEC_ASSOCIATION |
typedef struct _DOT11DECRYPT_CONTEXT | DOT11DECRYPT_CONTEXT |
typedef struct _DOT11DECRYPT_CONTEXT * | PDOT11DECRYPT_CONTEXT |
typedef enum _DOT11DECRYPT_HS_MSG_TYPE | DOT11DECRYPT_HS_MSG_TYPE |
typedef struct _DOT11DECRYPT_FTE | DOT11DECRYPT_FTE |
typedef struct _DOT11DECRYPT_FTE * | PDOT11DECRYPT_FTE |
typedef struct _DOT11DECRYPT_EAPOL_PARSED | DOT11DECRYPT_EAPOL_PARSED |
typedef struct _DOT11DECRYPT_EAPOL_PARSED * | PDOT11DECRYPT_EAPOL_PARSED |
typedef struct _DOT11DECRYPT_ASSOC_PARSED | DOT11DECRYPT_ASSOC_PARSED |
typedef struct _DOT11DECRYPT_ASSOC_PARSED * | PDOT11DECRYPT_ASSOC_PARSED |
Functions | |
int | Dot11DecryptDecryptPacket (PDOT11DECRYPT_CONTEXT ctx, const uint8_t *data, const unsigned data_off, const unsigned data_len, unsigned char *decrypt_data, uint32_t *decrypt_len, PDOT11DECRYPT_KEY_ITEM key) |
int | Dot11DecryptDecryptKeyData (PDOT11DECRYPT_CONTEXT ctx, PDOT11DECRYPT_EAPOL_PARSED eapol_parsed, const unsigned char bssid[DOT11DECRYPT_MAC_LEN], const unsigned char sta[DOT11DECRYPT_MAC_LEN], unsigned char *decrypted_data, unsigned *decrypted_len, PDOT11DECRYPT_KEY_ITEM key) |
int | Dot11DecryptScanEapolForKeys (PDOT11DECRYPT_CONTEXT ctx, PDOT11DECRYPT_EAPOL_PARSED eapol_parsed, const uint8_t *eapol_raw, const unsigned tot_len, const unsigned char bssid[DOT11DECRYPT_MAC_LEN], const unsigned char sta[DOT11DECRYPT_MAC_LEN]) |
int | Dot11DecryptScanFtAssocForKeys (const PDOT11DECRYPT_CONTEXT ctx, const PDOT11DECRYPT_ASSOC_PARSED assoc_parsed, uint8_t *decrypted_gtk, size_t *decrypted_len, DOT11DECRYPT_KEY_ITEM *used_key) |
int | Dot11DecryptScanTdlsForKeys (PDOT11DECRYPT_CONTEXT ctx, const uint8_t *data, const unsigned tot_len) |
int | Dot11DecryptGetKCK (const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **kck) |
int | Dot11DecryptGetKEK (const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **kek) |
int | Dot11DecryptGetTK (const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **tk) |
int | Dot11DecryptGetGTK (const PDOT11DECRYPT_KEY_ITEM key, const uint8_t **gtk) |
int | Dot11DecryptSetKeys (PDOT11DECRYPT_CONTEXT ctx, DOT11DECRYPT_KEY_ITEM keys[], const size_t keys_nr) |
int | Dot11DecryptSetLastSSID (PDOT11DECRYPT_CONTEXT ctx, char *pkt_ssid, size_t pkt_ssid_len) |
WS_DLL_PUBLIC int | Dot11DecryptInitContext (PDOT11DECRYPT_CONTEXT ctx) |
WS_DLL_PUBLIC int | Dot11DecryptDestroyContext (PDOT11DECRYPT_CONTEXT ctx) |
Copyright (c) 2006 CACE Technologies, Davis (California) All rights reserved.
SPDX-License-Identifier: (BSD-3-Clause OR GPL-2.0-only)
|
extern |
This will try to decrypt the encrypted keydata field of an EAPOL KEY frame.
ctx | [IN] Pointer to the current context |
eapol_parsed | [IN] Extracted/Parsed pieces of eapol frame |
bssid | [IN] bssid of AP |
sta | [IN] sta MAC address |
decrypted_data | [OUT] Pointer to a buffer that will contain decrypted data. Must have room for at least DOT11DECRYPT_EAPOL_MAX_LEN bytes. |
decrypted_len | [OUT] Length of decrypted data. |
key | [OUT] Pointer to a preallocated key structure containing the key used during the decryption process (if done). If this parameter is set to NULL, the key will be not returned. |
|
extern |
This will try to decrypt a 802.11 frame.
ctx | [IN] Pointer to the current context |
data | [IN] Pointer to a buffer with an 802.11 frame, including MAC header and payload |
data_off | [IN] Payload offset (aka the MAC header length) |
data_len | [IN] Total length of the MAC header and the payload |
decrypt_data | [OUT] Pointer to a buffer that will contain decrypted data. Must have room for at least DOT11DECRYPT_MAX_CAPLEN bytes. |
decrypt_len | [OUT] Length of decrypted data. |
key | [OUT] Pointer to a preallocated key structure containing the key used during the decryption process (if done). If this parameter is set to NULL, the key will be not returned. |
WS_DLL_PUBLIC int Dot11DecryptDestroyContext | ( | PDOT11DECRYPT_CONTEXT | ctx | ) |
Clean up the specified context. After the cleanup the pointer should not be used anymore.
ctx | [IN|OUT] pointer to the current context structure |
int Dot11DecryptGetKCK | ( | const PDOT11DECRYPT_KEY_ITEM | key, |
const uint8_t ** | kck | ||
) |
These are helper functions to retrieve KCK, KEK, TK portion of PTK for a certain "key"
key | [IN] Pointer to a key structure containing the key retrieved from functions Dot11DecryptDecryptPacket, Dot11DecryptKeydata |
kck | [OUT] Pointer to the KCK/KEK/TK portion of PTK. |
WS_DLL_PUBLIC int Dot11DecryptInitContext | ( | PDOT11DECRYPT_CONTEXT | ctx | ) |
Initialize a context used to manage decryption and keys collection.
ctx | [IN|OUT] pointer to a preallocated context structure |
|
extern |
This will try to extract keys from an EAPOL frame and add corresponding SAs to current context. eapol_parsed must contain the already parsed EAPOL key frame and for frames that contain encrypted EAPOL keydata the keydata must first be decrypted with Dot11DecryptDecryptKeyData before calling this function.
ctx | [IN] Pointer to the current context |
eapol_parsed | [IN] Extracted/Parsed pieces of eapol frame |
eapol_raw | [IN] Pointer to a buffer with an EAPOL frame |
tot_len | [IN] Total length of the EAPOL frame |
bssid | [IN] bssid of AP |
sta | [IN] sta MAC address |
int Dot11DecryptScanFtAssocForKeys | ( | const PDOT11DECRYPT_CONTEXT | ctx, |
const PDOT11DECRYPT_ASSOC_PARSED | assoc_parsed, | ||
uint8_t * | decrypted_gtk, | ||
size_t * | decrypted_len, | ||
DOT11DECRYPT_KEY_ITEM * | used_key | ||
) |
This will try to extract keys from an FT (re)association frame and add corresponding SAs to current context. assoc_parsed must contain the already parsed association frame content. If the FT BSS Transition IE contains an encrypted GTK subelem and decryption is successful the decrypted GTK will be returned in decrypted_gtk.
ctx | [IN] Pointer to the current context |
assoc_parsed | [IN] Extracted/Parsed pieces of association frame |
decrypted_gtk | [OUT] Buffer for decrypted GTK subelem |
decrypted_len | [OUT] Decrypted GTK subelem key length |
used_key | [OUT] Buffer to hold the key used during the decryption process. |
|
extern |
This will try to extract keys from a TDLS action frame (without MAC headers) and add corresponding SAs to current context.
ctx | [IN] Pointer to the current context |
data | [IN] Pointer to a buffer with a TDLS action frame |
tot_len | [IN] Total length of the TDLS action frame |
|
extern |
It sets a new keys collection to use during packet processing. Any key should be well-formed, thus: it should have a defined key type and the specified length should be conforming WEP or WPA/WPA2 standards. A general WEP keys could be of any length (in the range defined in DOT11DECRYPT_KEY_ITEM), if a specific WEP key is used, the length of the key will be the one specified in 802.11i-2004 (40 bits or 104 bits). For WPA/WPA2 the password (passphrase and SSID), the PSK and the PMK are in alternative, as explain in the DOT11DECRYPT_KEY_ITEM structure description.
ctx | [IN] pointer to the current context |
keys | [IN] an array of keys to set. |
keys_nr | [IN] the size of the keys array |
int Dot11DecryptSetLastSSID | ( | PDOT11DECRYPT_CONTEXT | ctx, |
char * | pkt_ssid, | ||
size_t | pkt_ssid_len | ||
) |
Sets the "last seen" SSID. This allows us to pick up previous SSIDs and use them when "wildcard" passphrases are specified in the preferences.
ctx | [IN|OUT] pointer to a preallocated context structure |
pkt_ssid | [IN] pointer to the packet's SSID |
pkt_ssid_len | [IN] length of the packet's SSID |