/* * * Wireless daemon for Linux * * Copyright (C) 2013-2014 Intel Corporation. All rights reserved. * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA * */ #include #include enum crypto_cipher { CRYPTO_CIPHER_WEP40 = 0x000fac01, CRYPTO_CIPHER_WEP104 = 0x000fac05, CRYPTO_CIPHER_TKIP = 0x000fac02, CRYPTO_CIPHER_CCMP = 0x000fac04, CRYPTO_CIPHER_BIP = 0x000fac06, }; enum crypto_akm { CRYPTO_AKM_8021X = 0x000fac01, CRYPTO_AKM_PSK = 0x000fac02, CRYPTO_AKM_FT_OVER_8021X = 0x000fac03, CRYPTO_AKM_FT_USING_PSK = 0x000fac04, CRYPTO_AKM_8021X_SHA256 = 0x000fac05, CRYPTO_AKM_PSK_SHA256 = 0x000fac06, CRYPTO_AKM_TDLS = 0x000fac07, CRYPTO_AKM_SAE_SHA256 = 0x000fac08, CRYPTO_AKM_FT_OVER_SAE_SHA256 = 0x000fac09, }; /* Min & Max reported by crypto_cipher_key_len when ignoring WEP */ #define CRYPTO_MIN_GTK_LEN 16 #define CRYPTO_MAX_GTK_LEN 32 #define CRYPTO_MIN_IGTK_LEN 16 #define CRYPTO_MAX_IGTK_LEN 32 struct crypto_ptk { uint8_t kck[16]; uint8_t kek[16]; uint8_t tk[0]; } __attribute__ ((packed)); extern const unsigned char crypto_dh5_prime[]; extern size_t crypto_dh5_prime_size; extern const unsigned char crypto_dh5_generator[]; extern size_t crypto_dh5_generator_size; bool hmac_md5(const void *key, size_t key_len, const void *data, size_t data_len, void *output, size_t size); bool hmac_sha1(const void *key, size_t key_len, const void *data, size_t data_len, void *output, size_t size); bool hmac_sha256(const void *key, size_t key_len, const void *data, size_t data_len, void *output, size_t size); bool cmac_aes(const void *key, size_t key_len, const void *data, size_t data_len, void *output, size_t size); bool aes_unwrap(const uint8_t *kek, const uint8_t *in, size_t len, uint8_t *out); bool aes_wrap(const uint8_t *kek, const uint8_t *in, size_t len, uint8_t *out); bool arc4_skip(const uint8_t *key, size_t key_len, size_t skip, const uint8_t *in, size_t len, uint8_t *out); int crypto_cipher_key_len(enum crypto_cipher cipher); int crypto_cipher_tk_bits(enum crypto_cipher cipher); int crypto_psk_from_passphrase(const char *passphrase, const unsigned char *ssid, size_t ssid_len, unsigned char *out_psk); bool kdf_sha256(const void *key, size_t key_len, const void *prefix, size_t prefix_len, const void *data, size_t data_len, void *output, size_t size); bool prf_sha1(const void *key, size_t key_len, const void *prefix, size_t prefix_len, const void *data, size_t data_len, void *output, size_t size); bool crypto_derive_pairwise_ptk(const uint8_t *pmk, const uint8_t *addr1, const uint8_t *addr2, const uint8_t *nonce1, const uint8_t *nonce2, struct crypto_ptk *out_ptk, size_t ptk_len, bool use_sha256); bool crypto_derive_pmk_r0(const uint8_t *xxkey, const uint8_t *ssid, size_t ssid_len, uint16_t mdid, const uint8_t *r0khid, size_t r0kh_len, const uint8_t *s0khid, uint8_t *out_pmk_r0, uint8_t *out_pmk_r0_name); bool crypto_derive_pmk_r1(const uint8_t *pmk_r0, const uint8_t *r1khid, const uint8_t *s1khid, const uint8_t *pmk_r0_name, uint8_t *out_pmk_r1, uint8_t *out_pmk_r1_name); bool crypto_derive_ft_ptk(const uint8_t *pmk_r1, const uint8_t *pmk_r1_name, const uint8_t *addr1, const uint8_t *addr2, const uint8_t *nonce1, const uint8_t *nonce2, struct crypto_ptk *out_ptk, size_t ptk_len, uint8_t *out_ptk_name); bool crypto_derive_pmkid(const uint8_t *pmk, const uint8_t *addr1, const uint8_t *addr2, uint8_t *out_pmkid, bool use_sha256);