/* * DPP functionality shared between hostapd and wpa_supplicant * Copyright (c) 2017, Qualcomm Atheros, Inc. * Copyright (c) 2018-2020, The Linux Foundation * Copyright (c) 2021-2022, Qualcomm Innovation Center, Inc. * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #ifndef DPP_H #define DPP_H #ifdef CONFIG_DPP #include "utils/list.h" #include "common/wpa_common.h" #include "crypto/sha256.h" #include "crypto/crypto.h" struct hostapd_ip_addr; struct dpp_global; struct json_token; struct dpp_reconfig_id; #ifdef CONFIG_TESTING_OPTIONS #define DPP_VERSION (dpp_version_override) extern int dpp_version_override; #else /* CONFIG_TESTING_OPTIONS */ #ifdef CONFIG_DPP3 #define DPP_VERSION 3 #elif defined(CONFIG_DPP2) #define DPP_VERSION 2 #else #define DPP_VERSION 1 #endif #endif /* CONFIG_TESTING_OPTIONS */ #define DPP_HDR_LEN (4 + 2) /* OUI, OUI Type, Crypto Suite, DPP frame type */ #define DPP_TCP_PORT 8908 enum dpp_public_action_frame_type { DPP_PA_AUTHENTICATION_REQ = 0, DPP_PA_AUTHENTICATION_RESP = 1, DPP_PA_AUTHENTICATION_CONF = 2, DPP_PA_PEER_DISCOVERY_REQ = 5, DPP_PA_PEER_DISCOVERY_RESP = 6, DPP_PA_PKEX_V1_EXCHANGE_REQ = 7, DPP_PA_PKEX_EXCHANGE_RESP = 8, DPP_PA_PKEX_COMMIT_REVEAL_REQ = 9, DPP_PA_PKEX_COMMIT_REVEAL_RESP = 10, DPP_PA_CONFIGURATION_RESULT = 11, DPP_PA_CONNECTION_STATUS_RESULT = 12, DPP_PA_PRESENCE_ANNOUNCEMENT = 13, DPP_PA_RECONFIG_ANNOUNCEMENT = 14, DPP_PA_RECONFIG_AUTH_REQ = 15, DPP_PA_RECONFIG_AUTH_RESP = 16, DPP_PA_RECONFIG_AUTH_CONF = 17, DPP_PA_PKEX_EXCHANGE_REQ = 18, DPP_PA_PB_PRESENCE_ANNOUNCEMENT = 19, DPP_PA_PB_PRESENCE_ANNOUNCEMENT_RESP = 20, DPP_PA_PRIV_PEER_INTRO_QUERY = 21, DPP_PA_PRIV_PEER_INTRO_NOTIFY = 22, DPP_PA_PRIV_PEER_INTRO_UPDATE = 23, }; enum dpp_attribute_id { DPP_ATTR_STATUS = 0x1000, DPP_ATTR_I_BOOTSTRAP_KEY_HASH = 0x1001, DPP_ATTR_R_BOOTSTRAP_KEY_HASH = 0x1002, DPP_ATTR_I_PROTOCOL_KEY = 0x1003, DPP_ATTR_WRAPPED_DATA = 0x1004, DPP_ATTR_I_NONCE = 0x1005, DPP_ATTR_I_CAPABILITIES = 0x1006, DPP_ATTR_R_NONCE = 0x1007, DPP_ATTR_R_CAPABILITIES = 0x1008, DPP_ATTR_R_PROTOCOL_KEY = 0x1009, DPP_ATTR_I_AUTH_TAG = 0x100A, DPP_ATTR_R_AUTH_TAG = 0x100B, DPP_ATTR_CONFIG_OBJ = 0x100C, DPP_ATTR_CONNECTOR = 0x100D, DPP_ATTR_CONFIG_ATTR_OBJ = 0x100E, DPP_ATTR_BOOTSTRAP_KEY = 0x100F, DPP_ATTR_OWN_NET_NK_HASH = 0x1011, DPP_ATTR_FINITE_CYCLIC_GROUP = 0x1012, DPP_ATTR_ENCRYPTED_KEY = 0x1013, DPP_ATTR_ENROLLEE_NONCE = 0x1014, DPP_ATTR_CODE_IDENTIFIER = 0x1015, DPP_ATTR_TRANSACTION_ID = 0x1016, DPP_ATTR_BOOTSTRAP_INFO = 0x1017, DPP_ATTR_CHANNEL = 0x1018, DPP_ATTR_PROTOCOL_VERSION = 0x1019, DPP_ATTR_ENVELOPED_DATA = 0x101A, DPP_ATTR_SEND_CONN_STATUS = 0x101B, DPP_ATTR_CONN_STATUS = 0x101C, DPP_ATTR_RECONFIG_FLAGS = 0x101D, DPP_ATTR_C_SIGN_KEY_HASH = 0x101E, DPP_ATTR_CSR_ATTR_REQ = 0x101F, DPP_ATTR_A_NONCE = 0x1020, DPP_ATTR_E_PRIME_ID = 0x1021, DPP_ATTR_CONFIGURATOR_NONCE = 0x1022, }; enum dpp_status_error { DPP_STATUS_OK = 0, DPP_STATUS_NOT_COMPATIBLE = 1, DPP_STATUS_AUTH_FAILURE = 2, DPP_STATUS_UNWRAP_FAILURE = 3, DPP_STATUS_BAD_GROUP = 4, DPP_STATUS_CONFIGURE_FAILURE = 5, DPP_STATUS_RESPONSE_PENDING = 6, DPP_STATUS_INVALID_CONNECTOR = 7, DPP_STATUS_NO_MATCH = 8, DPP_STATUS_CONFIG_REJECTED = 9, DPP_STATUS_NO_AP = 10, DPP_STATUS_CONFIGURE_PENDING = 11, DPP_STATUS_CSR_NEEDED = 12, DPP_STATUS_CSR_BAD = 13, DPP_STATUS_NEW_KEY_NEEDED = 14, }; /* DPP Reconfig Flags object - connectorKey values */ enum dpp_connector_key { DPP_CONFIG_REUSEKEY = 0, DPP_CONFIG_REPLACEKEY = 1, }; #define DPP_CAPAB_ENROLLEE BIT(0) #define DPP_CAPAB_CONFIGURATOR BIT(1) #define DPP_CAPAB_ROLE_MASK (BIT(0) | BIT(1)) #define DPP_BOOTSTRAP_MAX_FREQ 30 #define DPP_MAX_NONCE_LEN 32 #define DPP_MAX_HASH_LEN 64 #define DPP_MAX_SHARED_SECRET_LEN 66 #define DPP_CP_LEN 64 struct dpp_curve_params { const char *name; size_t hash_len; size_t aes_siv_key_len; size_t nonce_len; size_t prime_len; const char *jwk_crv; u16 ike_group; const char *jws_alg; }; enum dpp_bootstrap_type { DPP_BOOTSTRAP_QR_CODE, DPP_BOOTSTRAP_PKEX, DPP_BOOTSTRAP_NFC_URI, }; enum dpp_bootstrap_supported_curves { DPP_BOOTSTRAP_CURVE_P_256 = 0, DPP_BOOTSTRAP_CURVE_P_384 = 1, DPP_BOOTSTRAP_CURVE_P_521 = 2, DPP_BOOTSTRAP_CURVE_BP_256 = 3, DPP_BOOTSTRAP_CURVE_BP_384 = 4, DPP_BOOTSTRAP_CURVE_BP_512 = 5, }; struct dpp_bootstrap_info { struct dl_list list; unsigned int id; enum dpp_bootstrap_type type; char *uri; u8 mac_addr[ETH_ALEN]; char *chan; char *info; struct hostapd_ip_addr *host; unsigned int port; char *pk; unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ]; unsigned int num_freq; bool channels_listed; u8 version; u8 supported_curves; /* enum dpp_bootstrap_supported_curves bitmap */ int own; struct crypto_ec_key *pubkey; u8 pubkey_hash[SHA256_MAC_LEN]; u8 pubkey_hash_chirp[SHA256_MAC_LEN]; const struct dpp_curve_params *curve; unsigned int pkex_t; /* number of failures before dpp_pkex * instantiation */ int nfc_negotiated; /* whether this has been used in NFC negotiated * connection handover */ char *configurator_params; u8 peer_pubkey_hash[SHA256_MAC_LEN]; /* for enforcing a specific * peer bootstrapping key with * PKEX */ }; #define PKEX_COUNTER_T_LIMIT 5 enum dpp_pkex_ver { PKEX_VER_AUTO, PKEX_VER_ONLY_1, PKEX_VER_ONLY_2, }; struct dpp_pkex { void *msg_ctx; unsigned int initiator:1; unsigned int exchange_done:1; unsigned int failed:1; unsigned int v2:1; unsigned int forced_ver:1; struct dpp_bootstrap_info *own_bi; u8 own_mac[ETH_ALEN]; u8 peer_mac[ETH_ALEN]; char *identifier; char *code; size_t code_len; struct crypto_ec_key *x; struct crypto_ec_key *y; u8 Mx[DPP_MAX_SHARED_SECRET_LEN]; u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; u8 z[DPP_MAX_HASH_LEN]; struct crypto_ec_key *peer_bootstrap_key; struct wpabuf *exchange_req; struct wpabuf *exchange_resp; unsigned int t; /* number of failures on code use */ unsigned int exch_req_wait_time; unsigned int exch_req_tries; unsigned int freq; u8 peer_version; struct wpabuf *enc_key; }; enum dpp_akm { DPP_AKM_UNKNOWN, DPP_AKM_DPP, DPP_AKM_PSK, DPP_AKM_SAE, DPP_AKM_PSK_SAE, DPP_AKM_SAE_DPP, DPP_AKM_PSK_SAE_DPP, DPP_AKM_DOT1X, }; enum dpp_netrole { DPP_NETROLE_STA, DPP_NETROLE_AP, DPP_NETROLE_CONFIGURATOR, }; struct dpp_configuration { u8 ssid[32]; size_t ssid_len; int ssid_charset; enum dpp_akm akm; enum dpp_netrole netrole; /* For DPP configuration (connector) */ os_time_t netaccesskey_expiry; /* TODO: groups */ char *group_id; /* For legacy configuration */ char *passphrase; u8 psk[32]; int psk_set; char *csrattrs; char *extra_name; char *extra_value; }; struct dpp_asymmetric_key { struct dpp_asymmetric_key *next; struct crypto_ec_key *csign; struct crypto_ec_key *pp_key; char *config_template; char *connector_template; }; #define DPP_MAX_CONF_OBJ 10 #define DPP_MAX_CHANNELS 32 struct dpp_authentication { struct dpp_global *global; void *msg_ctx; u8 peer_version; const struct dpp_curve_params *curve; const struct dpp_curve_params *new_curve; struct dpp_bootstrap_info *peer_bi; struct dpp_bootstrap_info *own_bi; struct dpp_bootstrap_info *tmp_own_bi; struct dpp_bootstrap_info *tmp_peer_bi; u8 waiting_pubkey_hash[SHA256_MAC_LEN]; int response_pending; int reconfig; enum dpp_connector_key reconfig_connector_key; enum dpp_status_error auth_resp_status; enum dpp_status_error conf_resp_status; enum dpp_status_error force_conf_resp_status; enum dpp_status_error conn_result_status; u8 peer_mac_addr[ETH_ALEN]; u8 i_nonce[DPP_MAX_NONCE_LEN]; u8 r_nonce[DPP_MAX_NONCE_LEN]; u8 e_nonce[DPP_MAX_NONCE_LEN]; u8 c_nonce[DPP_MAX_NONCE_LEN]; u8 i_capab; u8 r_capab; enum dpp_netrole e_netrole; struct crypto_ec_key *own_protocol_key; struct crypto_ec_key *peer_protocol_key; struct crypto_ec_key *reconfig_old_protocol_key; struct wpabuf *req_msg; struct wpabuf *resp_msg; struct wpabuf *reconfig_req_msg; struct wpabuf *reconfig_resp_msg; /* Intersection of possible frequencies for initiating DPP * Authentication exchange */ unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ]; unsigned int num_freq, freq_idx; unsigned int curr_freq; unsigned int neg_freq; unsigned int num_freq_iters; size_t secret_len; u8 Mx[DPP_MAX_SHARED_SECRET_LEN]; size_t Mx_len; u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; size_t Nx_len; u8 Lx[DPP_MAX_SHARED_SECRET_LEN]; size_t Lx_len; u8 k1[DPP_MAX_HASH_LEN]; u8 k2[DPP_MAX_HASH_LEN]; u8 ke[DPP_MAX_HASH_LEN]; u8 bk[DPP_MAX_HASH_LEN]; int initiator; int waiting_auth_resp; int waiting_auth_conf; int auth_req_ack; unsigned int auth_resp_tries; u8 allowed_roles; int configurator; int remove_on_tx_status; int connect_on_tx_status; int waiting_conf_result; int waiting_conn_status_result; int tx_conn_status_result_started; int auth_success; bool reconfig_success; struct wpabuf *conf_req; const struct wpabuf *conf_resp; /* owned by GAS server */ struct wpabuf *conf_resp_tcp; struct dpp_configuration *conf_ap; struct dpp_configuration *conf2_ap; struct dpp_configuration *conf_sta; struct dpp_configuration *conf2_sta; int provision_configurator; struct dpp_configurator *conf; struct dpp_config_obj { char *connector; /* received signedConnector */ u8 ssid[SSID_MAX_LEN]; u8 ssid_len; int ssid_charset; char passphrase[64]; u8 psk[PMK_LEN]; int psk_set; enum dpp_akm akm; struct wpabuf *c_sign_key; struct wpabuf *certbag; struct wpabuf *certs; struct wpabuf *cacert; char *server_name; struct wpabuf *pp_key; } conf_obj[DPP_MAX_CONF_OBJ]; unsigned int num_conf_obj; struct dpp_asymmetric_key *conf_key_pkg; struct wpabuf *net_access_key; os_time_t net_access_key_expiry; int send_conn_status; int conn_status_requested; int akm_use_selector; int configurator_set; u8 transaction_id; u8 *csrattrs; size_t csrattrs_len; bool waiting_csr; struct wpabuf *csr; struct wpabuf *priv_key; /* DER-encoded private key used for csr */ bool waiting_cert; char *trusted_eap_server_name; struct wpabuf *cacert; struct wpabuf *certbag; bool waiting_new_key; bool new_key_received; void *config_resp_ctx; void *gas_server_ctx; bool use_config_query; bool waiting_config; char *e_name; char *e_mud_url; int *e_band_support; #ifdef CONFIG_TESTING_OPTIONS char *config_obj_override; char *discovery_override; char *groups_override; unsigned int ignore_netaccesskey_mismatch:1; #endif /* CONFIG_TESTING_OPTIONS */ unsigned short band_list[DPP_MAX_CHANNELS]; int band_list_size; }; struct dpp_configurator { struct dl_list list; unsigned int id; int own; struct crypto_ec_key *csign; u8 kid_hash[SHA256_MAC_LEN]; char *kid; const struct dpp_curve_params *curve; const struct dpp_curve_params *net_access_key_curve; char *connector; /* own Connector for reconfiguration */ struct crypto_ec_key *connector_key; struct crypto_ec_key *pp_key; }; struct dpp_introduction { u8 pmkid[PMKID_LEN]; u8 pmk[PMK_LEN_MAX]; size_t pmk_len; int peer_version; struct crypto_ec_key *peer_key; enum hpke_kem_id kem_id; enum hpke_kdf_id kdf_id; enum hpke_aead_id aead_id; }; struct dpp_relay_config { const struct hostapd_ip_addr *ipaddr; const u8 *pkhash; void *msg_ctx; void *cb_ctx; void (*tx)(void *ctx, const u8 *addr, unsigned int freq, const u8 *msg, size_t len); void (*gas_resp_tx)(void *ctx, const u8 *addr, u8 dialog_token, int prot, struct wpabuf *buf); }; struct dpp_controller_config { const char *configurator_params; int tcp_port; u8 allowed_roles; int qr_mutual; enum dpp_netrole netrole; void *msg_ctx; void *cb_ctx; int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth); bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth); }; #define DPP_PB_INFO_COUNT 2 struct dpp_pb_info { u8 hash[SHA256_MAC_LEN]; struct os_reltime rx_time; }; #ifdef CONFIG_TESTING_OPTIONS enum dpp_test_behavior { DPP_TEST_DISABLED = 0, DPP_TEST_AFTER_WRAPPED_DATA_AUTH_REQ = 1, DPP_TEST_AFTER_WRAPPED_DATA_AUTH_RESP = 2, DPP_TEST_AFTER_WRAPPED_DATA_AUTH_CONF = 3, DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_REQ = 4, DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_RESP = 5, DPP_TEST_AFTER_WRAPPED_DATA_CONF_REQ = 6, DPP_TEST_AFTER_WRAPPED_DATA_CONF_RESP = 7, DPP_TEST_ZERO_I_CAPAB = 8, DPP_TEST_ZERO_R_CAPAB = 9, DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 10, DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 11, DPP_TEST_NO_I_PROTO_KEY_AUTH_REQ = 12, DPP_TEST_NO_I_NONCE_AUTH_REQ = 13, DPP_TEST_NO_I_CAPAB_AUTH_REQ = 14, DPP_TEST_NO_WRAPPED_DATA_AUTH_REQ = 15, DPP_TEST_NO_STATUS_AUTH_RESP = 16, DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 17, DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 18, DPP_TEST_NO_R_PROTO_KEY_AUTH_RESP = 19, DPP_TEST_NO_R_NONCE_AUTH_RESP = 20, DPP_TEST_NO_I_NONCE_AUTH_RESP = 21, DPP_TEST_NO_R_CAPAB_AUTH_RESP = 22, DPP_TEST_NO_R_AUTH_AUTH_RESP = 23, DPP_TEST_NO_WRAPPED_DATA_AUTH_RESP = 24, DPP_TEST_NO_STATUS_AUTH_CONF = 25, DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 26, DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 27, DPP_TEST_NO_I_AUTH_AUTH_CONF = 28, DPP_TEST_NO_WRAPPED_DATA_AUTH_CONF = 29, DPP_TEST_I_NONCE_MISMATCH_AUTH_RESP = 30, DPP_TEST_INCOMPATIBLE_R_CAPAB_AUTH_RESP = 31, DPP_TEST_R_AUTH_MISMATCH_AUTH_RESP = 32, DPP_TEST_I_AUTH_MISMATCH_AUTH_CONF = 33, DPP_TEST_NO_FINITE_CYCLIC_GROUP_PKEX_EXCHANGE_REQ = 34, DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 35, DPP_TEST_NO_STATUS_PKEX_EXCHANGE_RESP = 36, DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 37, DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_REQ = 38, DPP_TEST_NO_I_AUTH_TAG_PKEX_CR_REQ = 39, DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_REQ = 40, DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_RESP = 41, DPP_TEST_NO_R_AUTH_TAG_PKEX_CR_RESP = 42, DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_RESP = 43, DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 44, DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 45, DPP_TEST_INVALID_STATUS_PKEX_EXCHANGE_RESP = 46, DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_REQ = 47, DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_RESP = 48, DPP_TEST_I_AUTH_TAG_MISMATCH_PKEX_CR_REQ = 49, DPP_TEST_R_AUTH_TAG_MISMATCH_PKEX_CR_RESP = 50, DPP_TEST_NO_E_NONCE_CONF_REQ = 51, DPP_TEST_NO_CONFIG_ATTR_OBJ_CONF_REQ = 52, DPP_TEST_NO_WRAPPED_DATA_CONF_REQ = 53, DPP_TEST_NO_E_NONCE_CONF_RESP = 54, DPP_TEST_NO_CONFIG_OBJ_CONF_RESP = 55, DPP_TEST_NO_STATUS_CONF_RESP = 56, DPP_TEST_NO_WRAPPED_DATA_CONF_RESP = 57, DPP_TEST_INVALID_STATUS_CONF_RESP = 58, DPP_TEST_E_NONCE_MISMATCH_CONF_RESP = 59, DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_REQ = 60, DPP_TEST_NO_CONNECTOR_PEER_DISC_REQ = 61, DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_RESP = 62, DPP_TEST_NO_STATUS_PEER_DISC_RESP = 63, DPP_TEST_NO_CONNECTOR_PEER_DISC_RESP = 64, DPP_TEST_AUTH_RESP_IN_PLACE_OF_CONF = 65, DPP_TEST_INVALID_I_PROTO_KEY_AUTH_REQ = 66, DPP_TEST_INVALID_R_PROTO_KEY_AUTH_RESP = 67, DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 68, DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 69, DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 70, DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 71, DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 72, DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 73, DPP_TEST_INVALID_STATUS_AUTH_RESP = 74, DPP_TEST_INVALID_STATUS_AUTH_CONF = 75, DPP_TEST_INVALID_CONFIG_ATTR_OBJ_CONF_REQ = 76, DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_RESP = 77, DPP_TEST_INVALID_STATUS_PEER_DISC_RESP = 78, DPP_TEST_INVALID_CONNECTOR_PEER_DISC_RESP = 79, DPP_TEST_INVALID_CONNECTOR_PEER_DISC_REQ = 80, DPP_TEST_INVALID_I_NONCE_AUTH_REQ = 81, DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_REQ = 82, DPP_TEST_INVALID_E_NONCE_CONF_REQ = 83, DPP_TEST_STOP_AT_PKEX_EXCHANGE_RESP = 84, DPP_TEST_STOP_AT_PKEX_CR_REQ = 85, DPP_TEST_STOP_AT_PKEX_CR_RESP = 86, DPP_TEST_STOP_AT_AUTH_REQ = 87, DPP_TEST_STOP_AT_AUTH_RESP = 88, DPP_TEST_STOP_AT_AUTH_CONF = 89, DPP_TEST_STOP_AT_CONF_REQ = 90, DPP_TEST_REJECT_CONFIG = 91, DPP_TEST_NO_PROTOCOL_VERSION_PEER_DISC_REQ = 92, DPP_TEST_NO_PROTOCOL_VERSION_PEER_DISC_RESP = 93, DPP_TEST_INVALID_PROTOCOL_VERSION_PEER_DISC_REQ = 94, DPP_TEST_INVALID_PROTOCOL_VERSION_PEER_DISC_RESP = 95, DPP_TEST_INVALID_PROTOCOL_VERSION_RECONFIG_AUTH_REQ = 96, DPP_TEST_NO_PROTOCOL_VERSION_RECONFIG_AUTH_REQ = 97, DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_PB_REQ = 98, DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_PB_RESP = 99, DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_PB_RESP = 100, }; extern enum dpp_test_behavior dpp_test; extern u8 dpp_pkex_own_mac_override[ETH_ALEN]; extern u8 dpp_pkex_peer_mac_override[ETH_ALEN]; extern u8 dpp_pkex_ephemeral_key_override[600]; extern size_t dpp_pkex_ephemeral_key_override_len; extern u8 dpp_protocol_key_override[600]; extern size_t dpp_protocol_key_override_len; extern u8 dpp_nonce_override[DPP_MAX_NONCE_LEN]; extern size_t dpp_nonce_override_len; #endif /* CONFIG_TESTING_OPTIONS */ void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info); const char * dpp_bootstrap_type_txt(enum dpp_bootstrap_type type); int dpp_parse_uri_chan_list(struct dpp_bootstrap_info *bi, const char *chan_list); int dpp_parse_uri_mac(struct dpp_bootstrap_info *bi, const char *mac); int dpp_parse_uri_info(struct dpp_bootstrap_info *bi, const char *info); int dpp_nfc_update_bi(struct dpp_bootstrap_info *own_bi, struct dpp_bootstrap_info *peer_bi); const char * dpp_netrole_str(enum dpp_netrole netrole); struct dpp_authentication * dpp_alloc_auth(struct dpp_global *dpp, void *msg_ctx); struct hostapd_hw_modes; struct dpp_authentication * dpp_auth_init(struct dpp_global *dpp, void *msg_ctx, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, u8 dpp_allowed_roles, unsigned int neg_freq, struct hostapd_hw_modes *own_modes, u16 num_modes); struct dpp_authentication * dpp_auth_req_rx(struct dpp_global *dpp, void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, unsigned int freq, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct wpabuf * dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, const char *json); struct wpabuf * dpp_build_conf_req_helper(struct dpp_authentication *auth, const char *name, enum dpp_netrole netrole, const char *mud_url, int *opclasses, const char *extra_name, const char *extra_value); int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); int dpp_notify_new_qr_code(struct dpp_authentication *auth, struct dpp_bootstrap_info *peer_bi); void dpp_controller_pkex_add(struct dpp_global *dpp, struct dpp_bootstrap_info *bi, const char *code, const char *identifier); bool dpp_controller_is_own_pkex_req(struct dpp_global *dpp, const u8 *buf, size_t len); struct dpp_configuration * dpp_configuration_alloc(const char *type); int dpp_akm_psk(enum dpp_akm akm); int dpp_akm_sae(enum dpp_akm akm); int dpp_akm_legacy(enum dpp_akm akm); int dpp_akm_dpp(enum dpp_akm akm); int dpp_akm_ver2(enum dpp_akm akm); int dpp_configuration_valid(const struct dpp_configuration *conf); void dpp_configuration_free(struct dpp_configuration *conf); int dpp_set_configurator(struct dpp_authentication *auth, const char *cmd); void dpp_auth_deinit(struct dpp_authentication *auth); struct wpabuf * dpp_build_conf_resp(struct dpp_authentication *auth, const u8 *e_nonce, u16 e_nonce_len, enum dpp_netrole netrole, bool cert_req); struct wpabuf * dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len); int dpp_conf_resp_rx(struct dpp_authentication *auth, const struct wpabuf *resp); enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth, enum dpp_status_error status); enum dpp_status_error dpp_conn_status_result_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len, u8 *ssid, size_t *ssid_len, char **channel_list); struct wpabuf * dpp_build_conn_status_result(struct dpp_authentication *auth, enum dpp_status_error result, const u8 *ssid, size_t ssid_len, const char *channel_list); struct wpabuf * dpp_alloc_msg(enum dpp_public_action_frame_type type, size_t len); const u8 * dpp_get_attr(const u8 *buf, size_t len, u16 req_id, u16 *ret_len); int dpp_check_attrs(const u8 *buf, size_t len); int dpp_key_expired(const char *timestamp, os_time_t *expiry); const char * dpp_akm_str(enum dpp_akm akm); const char * dpp_akm_selector_str(enum dpp_akm akm); int dpp_configurator_get_key(const struct dpp_configurator *conf, char *buf, size_t buflen); void dpp_configurator_free(struct dpp_configurator *conf); int dpp_configurator_own_config(struct dpp_authentication *auth, const char *curve, int ap); enum dpp_status_error dpp_peer_intro(struct dpp_introduction *intro, const char *own_connector, const u8 *net_access_key, size_t net_access_key_len, const u8 *csign_key, size_t csign_key_len, const u8 *peer_connector, size_t peer_connector_len, os_time_t *expiry, u8 *peer_key_hash); void dpp_peer_intro_deinit(struct dpp_introduction *intro); int dpp_get_connector_version(const char *connector); struct dpp_pkex * dpp_pkex_init(void *msg_ctx, struct dpp_bootstrap_info *bi, const u8 *own_mac, const char *identifier, const char *code, size_t code_len, bool v2); struct dpp_pkex * dpp_pkex_rx_exchange_req(void *msg_ctx, struct dpp_bootstrap_info *bi, const u8 *own_mac, const u8 *peer_mac, const char *identifier, const char *code, size_t code_len, const u8 *buf, size_t len, bool v2); struct wpabuf * dpp_pkex_rx_exchange_resp(struct dpp_pkex *pkex, const u8 *peer_mac, const u8 *buf, size_t len); struct wpabuf * dpp_pkex_rx_commit_reveal_req(struct dpp_pkex *pkex, const u8 *hdr, const u8 *buf, size_t len); int dpp_pkex_rx_commit_reveal_resp(struct dpp_pkex *pkex, const u8 *hdr, const u8 *buf, size_t len); void dpp_pkex_free(struct dpp_pkex *pkex); char * dpp_corrupt_connector_signature(const char *connector); struct dpp_pfs { struct crypto_ecdh *ecdh; const struct dpp_curve_params *curve; struct wpabuf *ie; struct wpabuf *secret; }; struct dpp_pfs * dpp_pfs_init(const u8 *net_access_key, size_t net_access_key_len); int dpp_pfs_process(struct dpp_pfs *pfs, const u8 *peer_ie, size_t peer_ie_len); void dpp_pfs_free(struct dpp_pfs *pfs); struct crypto_ec_key * dpp_set_keypair(const struct dpp_curve_params **curve, const u8 *privkey, size_t privkey_len); int dpp_hpke_suite(int iana_group, enum hpke_kem_id *kem_id, enum hpke_kdf_id *kdf_id, enum hpke_aead_id *aead_id); struct wpabuf * dpp_build_csr(struct dpp_authentication *auth, const char *name); int dpp_validate_csr(struct dpp_authentication *auth, const struct wpabuf *csr); struct dpp_bootstrap_info * dpp_add_qr_code(struct dpp_global *dpp, const char *uri); struct dpp_bootstrap_info * dpp_add_nfc_uri(struct dpp_global *dpp, const char *uri); int dpp_bootstrap_gen(struct dpp_global *dpp, const char *cmd); struct dpp_bootstrap_info * dpp_bootstrap_get_id(struct dpp_global *dpp, unsigned int id); int dpp_bootstrap_remove(struct dpp_global *dpp, const char *id); struct dpp_bootstrap_info * dpp_pkex_finish(struct dpp_global *dpp, struct dpp_pkex *pkex, const u8 *peer, unsigned int freq); const char * dpp_bootstrap_get_uri(struct dpp_global *dpp, unsigned int id); int dpp_bootstrap_info(struct dpp_global *dpp, int id, char *reply, int reply_size); int dpp_bootstrap_set(struct dpp_global *dpp, int id, const char *params); void dpp_bootstrap_find_pair(struct dpp_global *dpp, const u8 *i_bootstrap, const u8 *r_bootstrap, struct dpp_bootstrap_info **own_bi, struct dpp_bootstrap_info **peer_bi); struct dpp_bootstrap_info * dpp_bootstrap_find_chirp(struct dpp_global *dpp, const u8 *hash); int dpp_configurator_add(struct dpp_global *dpp, const char *cmd); int dpp_configurator_set(struct dpp_global *dpp, const char *cmd); int dpp_configurator_remove(struct dpp_global *dpp, const char *id); int dpp_configurator_get_key_id(struct dpp_global *dpp, unsigned int id, char *buf, size_t buflen); int dpp_configurator_from_backup(struct dpp_global *dpp, struct dpp_asymmetric_key *key); struct dpp_configurator * dpp_configurator_find_kid(struct dpp_global *dpp, const u8 *kid); int dpp_relay_add_controller(struct dpp_global *dpp, struct dpp_relay_config *config); void dpp_relay_remove_controller(struct dpp_global *dpp, const struct hostapd_ip_addr *addr); int dpp_relay_listen(struct dpp_global *dpp, int port, struct dpp_relay_config *config); void dpp_relay_stop_listen(struct dpp_global *dpp); int dpp_relay_rx_action(struct dpp_global *dpp, const u8 *src, const u8 *hdr, const u8 *buf, size_t len, unsigned int freq, const u8 *i_bootstrap, const u8 *r_bootstrap, void *cb_ctx); int dpp_relay_rx_gas_req(struct dpp_global *dpp, const u8 *src, const u8 *data, size_t data_len); bool dpp_relay_controller_available(struct dpp_global *dpp); int dpp_controller_start(struct dpp_global *dpp, struct dpp_controller_config *config); int dpp_controller_set_params(struct dpp_global *dpp, const char *configurator_params); void dpp_controller_stop(struct dpp_global *dpp); void dpp_controller_stop_for_ctx(struct dpp_global *dpp, void *cb_ctx); struct dpp_authentication * dpp_controller_get_auth(struct dpp_global *dpp, unsigned int id); void dpp_controller_new_qr_code(struct dpp_global *dpp, struct dpp_bootstrap_info *bi); int dpp_tcp_pkex_init(struct dpp_global *dpp, struct dpp_pkex *pkex, const struct hostapd_ip_addr *addr, int port, void *msg_ctx, void *cb_ctx, int (*pkex_done)(void *ctx, void *conn, struct dpp_bootstrap_info *bi)); int dpp_tcp_init(struct dpp_global *dpp, struct dpp_authentication *auth, const struct hostapd_ip_addr *addr, int port, const char *name, enum dpp_netrole netrole, const char *mud_url, const char *extra_conf_req_name, const char *extra_conf_req_value, void *msg_ctx, void *cb_ctx, int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth), bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth)); int dpp_tcp_auth(struct dpp_global *dpp, void *_conn, struct dpp_authentication *auth, const char *name, enum dpp_netrole netrole, const char *mud_url, const char *extra_conf_req_name, const char *extra_conf_req_value, int (*process_conf_obj)(void *ctx, struct dpp_authentication *auth), bool (*tcp_msg_sent)(void *ctx, struct dpp_authentication *auth)); bool dpp_tcp_conn_status_requested(struct dpp_global *dpp); void dpp_tcp_send_conn_status(struct dpp_global *dpp, enum dpp_status_error result, const u8 *ssid, size_t ssid_len, const char *channel_list); struct wpabuf * dpp_build_presence_announcement(struct dpp_bootstrap_info *bi); void dpp_notify_chirp_received(void *msg_ctx, int id, const u8 *src, unsigned int freq, const u8 *hash); struct wpabuf * dpp_build_pb_announcement(struct dpp_bootstrap_info *bi); struct wpabuf * dpp_build_pb_announcement_resp(struct dpp_bootstrap_info *bi, const u8 *e_hash, const u8 *c_nonce, size_t c_nonce_len); struct dpp_global_config { void *cb_ctx; void (*remove_bi)(void *ctx, struct dpp_bootstrap_info *bi); }; struct dpp_global * dpp_global_init(struct dpp_global_config *config); void dpp_global_clear(struct dpp_global *dpp); void dpp_global_deinit(struct dpp_global *dpp); void dpp_notify_auth_success(struct dpp_authentication *auth, int initiator); /* dpp_reconfig.c */ struct wpabuf * dpp_build_reconfig_announcement(const u8 *csign_key, size_t csign_key_len, const u8 *net_access_key, size_t net_access_key_len, struct dpp_reconfig_id *id); struct dpp_authentication * dpp_reconfig_init(struct dpp_global *dpp, void *msg_ctx, struct dpp_configurator *conf, unsigned int freq, u16 group, const u8 *a_nonce_attr, size_t a_nonce_len, const u8 *e_id_attr, size_t e_id_len); struct dpp_authentication * dpp_reconfig_auth_req_rx(struct dpp_global *dpp, void *msg_ctx, const char *own_connector, const u8 *net_access_key, size_t net_access_key_len, const u8 *csign_key, size_t csign_key_len, unsigned int freq, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct wpabuf * dpp_reconfig_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); int dpp_reconfig_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct dpp_reconfig_id * dpp_gen_reconfig_id(const u8 *csign_key, size_t csign_key_len, const u8 *pp_key, size_t pp_key_len); int dpp_update_reconfig_id(struct dpp_reconfig_id *id); void dpp_free_reconfig_id(struct dpp_reconfig_id *id); int dpp_get_pubkey_hash(struct crypto_ec_key *key, u8 *hash); #endif /* CONFIG_DPP */ #endif /* DPP_H */