2014-12-19 01:10:10 +01:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
2019-10-25 00:43:08 +02:00
|
|
|
* Copyright (C) 2013-2019 Intel Corporation. All rights reserved.
|
2014-12-19 01:10:10 +01:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <stdint.h>
|
|
|
|
#include <stdbool.h>
|
|
|
|
#include <asm/byteorder.h>
|
|
|
|
#include <linux/types.h>
|
2018-09-14 17:30:03 +02:00
|
|
|
#include "src/eapolutil.h"
|
2014-12-19 01:10:10 +01:00
|
|
|
|
2015-02-24 17:54:23 +01:00
|
|
|
struct eapol_sm;
|
2016-11-02 23:46:19 +01:00
|
|
|
struct handshake_state;
|
2017-04-29 03:53:26 +02:00
|
|
|
struct preauth_sm;
|
2017-09-22 05:06:40 +02:00
|
|
|
enum handshake_kde;
|
2018-08-09 20:13:55 +02:00
|
|
|
enum ie_rsn_akm_suite;
|
2015-02-24 17:54:23 +01:00
|
|
|
|
2018-05-01 18:01:51 +02:00
|
|
|
typedef int (*eapol_tx_packet_func_t)(uint32_t ifindex,
|
|
|
|
const uint8_t *dest, uint16_t proto,
|
|
|
|
const struct eapol_frame *ef,
|
|
|
|
bool noencrypt,
|
|
|
|
void *user_data);
|
2016-06-23 00:49:15 +02:00
|
|
|
typedef void (*eapol_rekey_offload_func_t)(uint32_t ifindex,
|
|
|
|
const uint8_t *kek,
|
|
|
|
const uint8_t *kck,
|
|
|
|
uint64_t replay_counter,
|
|
|
|
void *user_data);
|
2016-09-13 20:30:54 +02:00
|
|
|
typedef void (*eapol_sm_event_func_t)(unsigned int event,
|
|
|
|
const void *event_data,
|
|
|
|
void *user_data);
|
2017-04-29 03:53:26 +02:00
|
|
|
typedef void (*eapol_preauth_cb_t)(const uint8_t *pmk, void *user_data);
|
|
|
|
typedef void (*eapol_preauth_destroy_func_t)(void *user_data);
|
2017-09-07 23:04:45 +02:00
|
|
|
typedef void (*eapol_frame_watch_func_t)(uint16_t proto, const uint8_t *from,
|
|
|
|
const struct eapol_frame *frame,
|
2019-08-28 03:41:03 +02:00
|
|
|
bool noencrypt,
|
2017-09-07 23:04:45 +02:00
|
|
|
void *user_data);
|
2015-02-24 18:09:42 +01:00
|
|
|
|
2018-08-09 20:13:55 +02:00
|
|
|
bool eapol_calculate_mic(enum ie_rsn_akm_suite akm, const uint8_t *kck,
|
2019-01-17 21:25:28 +01:00
|
|
|
const struct eapol_key *frame, uint8_t *mic,
|
|
|
|
size_t mic_len);
|
2018-08-09 20:13:55 +02:00
|
|
|
bool eapol_verify_mic(enum ie_rsn_akm_suite akm, const uint8_t *kck,
|
2019-01-17 21:25:28 +01:00
|
|
|
const struct eapol_key *frame, size_t mic_len);
|
2014-12-28 05:37:39 +01:00
|
|
|
|
2018-08-09 20:13:55 +02:00
|
|
|
uint8_t *eapol_decrypt_key_data(enum ie_rsn_akm_suite akm, const uint8_t *kek,
|
2015-02-24 22:59:36 +01:00
|
|
|
const struct eapol_key *frame,
|
2019-01-17 21:25:28 +01:00
|
|
|
size_t *decrypted_size, size_t mic_len);
|
2015-02-14 03:37:17 +01:00
|
|
|
|
2019-01-17 21:25:28 +01:00
|
|
|
bool eapol_verify_ptk_1_of_4(const struct eapol_key *ek, size_t mic_len);
|
2015-02-23 22:39:26 +01:00
|
|
|
bool eapol_verify_ptk_2_of_4(const struct eapol_key *ek);
|
2019-04-25 21:52:46 +02:00
|
|
|
bool eapol_verify_ptk_3_of_4(const struct eapol_key *ek, bool is_wpa,
|
|
|
|
size_t mic_len);
|
2015-05-06 01:48:35 +02:00
|
|
|
bool eapol_verify_ptk_4_of_4(const struct eapol_key *ek, bool is_wpa);
|
2019-04-18 00:16:39 +02:00
|
|
|
bool eapol_verify_gtk_1_of_2(const struct eapol_key *ek, bool is_wpa,
|
|
|
|
size_t mic_len);
|
2015-05-06 05:04:21 +02:00
|
|
|
bool eapol_verify_gtk_2_of_2(const struct eapol_key *ek, bool is_wpa);
|
2015-02-13 23:08:33 +01:00
|
|
|
|
2014-12-28 05:33:46 +01:00
|
|
|
struct eapol_key *eapol_create_ptk_2_of_4(
|
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
2015-02-13 20:54:50 +01:00
|
|
|
uint64_t key_replay_counter,
|
2014-12-28 05:33:46 +01:00
|
|
|
const uint8_t snonce[],
|
|
|
|
size_t extra_len,
|
2015-05-06 01:48:35 +02:00
|
|
|
const uint8_t *extra_data,
|
2019-01-17 21:25:28 +01:00
|
|
|
bool is_wpa,
|
|
|
|
size_t mic_len);
|
2015-02-13 21:10:28 +01:00
|
|
|
|
|
|
|
struct eapol_key *eapol_create_ptk_4_of_4(
|
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
2015-05-06 01:48:35 +02:00
|
|
|
uint64_t key_replay_counter,
|
2019-01-17 21:25:28 +01:00
|
|
|
bool is_wpa,
|
|
|
|
size_t mic_len);
|
2015-05-06 01:48:35 +02:00
|
|
|
|
|
|
|
struct eapol_key *eapol_create_gtk_2_of_2(
|
|
|
|
enum eapol_protocol_version protocol,
|
|
|
|
enum eapol_key_descriptor_version version,
|
|
|
|
uint64_t key_replay_counter,
|
2019-01-17 21:25:28 +01:00
|
|
|
bool is_wpa, uint8_t wpa_key_id,
|
|
|
|
size_t mic_len);
|
2015-02-24 17:54:23 +01:00
|
|
|
|
2018-05-01 18:01:51 +02:00
|
|
|
void __eapol_rx_packet(uint32_t ifindex, const uint8_t *src, uint16_t proto,
|
|
|
|
const uint8_t *frame, size_t len, bool noencrypt);
|
|
|
|
void __eapol_tx_packet(uint32_t ifindex, const uint8_t *dst, uint16_t proto,
|
|
|
|
const struct eapol_frame *frame, bool noencrypt);
|
2015-02-24 18:10:42 +01:00
|
|
|
void __eapol_set_tx_packet_func(eapol_tx_packet_func_t func);
|
2016-09-12 17:02:04 +02:00
|
|
|
void __eapol_set_tx_user_data(void *user_data);
|
|
|
|
|
2016-06-23 00:49:15 +02:00
|
|
|
void __eapol_set_rekey_offload_func(eapol_rekey_offload_func_t func);
|
|
|
|
void __eapol_update_replay_counter(uint32_t ifindex, const uint8_t *spa,
|
|
|
|
const uint8_t *aa, uint64_t replay_counter);
|
2018-04-02 20:47:43 +02:00
|
|
|
void __eapol_set_config(struct l_settings *config);
|
2015-02-24 18:09:42 +01:00
|
|
|
|
2016-11-02 23:46:19 +01:00
|
|
|
struct eapol_sm *eapol_sm_new(struct handshake_state *hs);
|
2015-02-24 17:54:23 +01:00
|
|
|
void eapol_sm_free(struct eapol_sm *sm);
|
2015-02-24 17:55:50 +01:00
|
|
|
|
2016-08-10 23:32:45 +02:00
|
|
|
void eapol_sm_set_protocol_version(struct eapol_sm *sm,
|
|
|
|
enum eapol_protocol_version protocol_version);
|
|
|
|
|
2016-10-11 08:36:48 +02:00
|
|
|
void eapol_sm_set_use_eapol_start(struct eapol_sm *sm, bool enabled);
|
2017-08-18 14:22:55 +02:00
|
|
|
void eapol_sm_set_require_handshake(struct eapol_sm *sm, bool enabled);
|
2018-06-22 20:13:29 +02:00
|
|
|
void eapol_sm_set_listen_interval(struct eapol_sm *sm, uint16_t interval);
|
2015-03-26 04:34:05 +01:00
|
|
|
void eapol_sm_set_user_data(struct eapol_sm *sm, void *user_data);
|
2016-11-02 23:46:19 +01:00
|
|
|
|
|
|
|
void eapol_register(struct eapol_sm *sm);
|
2017-10-27 23:39:53 +02:00
|
|
|
bool eapol_start(struct eapol_sm *sm);
|
2017-04-29 03:53:26 +02:00
|
|
|
|
|
|
|
struct preauth_sm *eapol_preauth_start(const uint8_t *aa,
|
|
|
|
const struct handshake_state *hs,
|
|
|
|
eapol_preauth_cb_t cb, void *user_data,
|
|
|
|
eapol_preauth_destroy_func_t destroy);
|
|
|
|
void eapol_preauth_cancel(uint32_t ifindex);
|
2015-02-24 18:12:22 +01:00
|
|
|
|
2019-10-11 21:29:24 +02:00
|
|
|
int eapol_init(void);
|
|
|
|
void eapol_exit(void);
|