/* * DPP functionality shared between hostapd and wpa_supplicant * Copyright (c) 2017, Qualcomm Atheros, Inc. * * This software may be distributed under the terms of the BSD license. * See README for more details. */ #ifndef DPP_H #define DPP_H #include <openssl/x509.h> #include "utils/list.h" #include "common/wpa_common.h" #include "crypto/sha256.h" #define DPP_HDR_LEN (4 + 2) /* OUI, OUI Type, Crypto Suite, DPP frame type */ enum dpp_public_action_frame_type { DPP_PA_AUTHENTICATION_REQ = 0, DPP_PA_AUTHENTICATION_RESP = 1, DPP_PA_AUTHENTICATION_CONF = 2, DPP_PA_PEER_DISCOVERY_REQ = 5, DPP_PA_PEER_DISCOVERY_RESP = 6, DPP_PA_PKEX_EXCHANGE_REQ = 7, DPP_PA_PKEX_EXCHANGE_RESP = 8, DPP_PA_PKEX_COMMIT_REVEAL_REQ = 9, DPP_PA_PKEX_COMMIT_REVEAL_RESP = 10, }; enum dpp_attribute_id { DPP_ATTR_STATUS = 0x1000, DPP_ATTR_I_BOOTSTRAP_KEY_HASH = 0x1001, DPP_ATTR_R_BOOTSTRAP_KEY_HASH = 0x1002, DPP_ATTR_I_PROTOCOL_KEY = 0x1003, DPP_ATTR_WRAPPED_DATA = 0x1004, DPP_ATTR_I_NONCE = 0x1005, DPP_ATTR_I_CAPABILITIES = 0x1006, DPP_ATTR_R_NONCE = 0x1007, DPP_ATTR_R_CAPABILITIES = 0x1008, DPP_ATTR_R_PROTOCOL_KEY = 0x1009, DPP_ATTR_I_AUTH_TAG = 0x100A, DPP_ATTR_R_AUTH_TAG = 0x100B, DPP_ATTR_CONFIG_OBJ = 0x100C, DPP_ATTR_CONNECTOR = 0x100D, DPP_ATTR_CONFIG_ATTR_OBJ = 0x100E, DPP_ATTR_BOOTSTRAP_KEY = 0x100F, DPP_ATTR_OWN_NET_NK_HASH = 0x1011, DPP_ATTR_FINITE_CYCLIC_GROUP = 0x1012, DPP_ATTR_ENCRYPTED_KEY = 0x1013, DPP_ATTR_ENROLLEE_NONCE = 0x1014, DPP_ATTR_CODE_IDENTIFIER = 0x1015, DPP_ATTR_TRANSACTION_ID = 0x1016, }; enum dpp_status_error { DPP_STATUS_OK = 0, DPP_STATUS_NOT_COMPATIBLE = 1, DPP_STATUS_AUTH_FAILURE = 2, DPP_STATUS_UNWRAP_FAILURE = 3, DPP_STATUS_BAD_GROUP = 4, DPP_STATUS_CONFIGURE_FAILURE = 5, DPP_STATUS_RESPONSE_PENDING = 6, }; #define DPP_CAPAB_ENROLLEE BIT(0) #define DPP_CAPAB_CONFIGURATOR BIT(1) #define DPP_CAPAB_ROLE_MASK (BIT(0) | BIT(1)) #define DPP_BOOTSTRAP_MAX_FREQ 30 #define DPP_MAX_NONCE_LEN 32 #define DPP_MAX_HASH_LEN 64 #define DPP_MAX_SHARED_SECRET_LEN 66 struct dpp_curve_params { const char *name; size_t hash_len; size_t aes_siv_key_len; size_t nonce_len; size_t prime_len; const char *jwk_crv; u16 ike_group; const char *jws_alg; }; enum dpp_bootstrap_type { DPP_BOOTSTRAP_QR_CODE, DPP_BOOTSTRAP_PKEX, }; struct dpp_bootstrap_info { struct dl_list list; unsigned int id; enum dpp_bootstrap_type type; char *uri; u8 mac_addr[ETH_ALEN]; char *info; unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ]; unsigned int num_freq; int own; EVP_PKEY *pubkey; u8 pubkey_hash[SHA256_MAC_LEN]; const struct dpp_curve_params *curve; }; struct dpp_pkex { unsigned int initiator:1; unsigned int exchange_done:1; struct dpp_bootstrap_info *own_bi; u8 own_mac[ETH_ALEN]; u8 peer_mac[ETH_ALEN]; char *identifier; char *code; EVP_PKEY *x; EVP_PKEY *y; u8 Mx[DPP_MAX_SHARED_SECRET_LEN]; u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; u8 z[DPP_MAX_HASH_LEN]; EVP_PKEY *peer_bootstrap_key; struct wpabuf *exchange_req; struct wpabuf *exchange_resp; }; struct dpp_configuration { u8 ssid[32]; size_t ssid_len; int dpp; /* whether to use DPP or legacy configuration */ /* For DPP configuration (connector) */ os_time_t netaccesskey_expiry; /* TODO: groups */ /* For legacy configuration */ char *passphrase; u8 psk[32]; }; struct dpp_authentication { void *msg_ctx; const struct dpp_curve_params *curve; struct dpp_bootstrap_info *peer_bi; struct dpp_bootstrap_info *own_bi; u8 waiting_pubkey_hash[SHA256_MAC_LEN]; int response_pending; enum dpp_status_error auth_resp_status; u8 peer_mac_addr[ETH_ALEN]; u8 i_nonce[DPP_MAX_NONCE_LEN]; u8 r_nonce[DPP_MAX_NONCE_LEN]; u8 e_nonce[DPP_MAX_NONCE_LEN]; u8 i_capab; u8 r_capab; EVP_PKEY *own_protocol_key; EVP_PKEY *peer_protocol_key; struct wpabuf *req_msg; struct wpabuf *resp_msg; unsigned int curr_freq; size_t secret_len; u8 Mx[DPP_MAX_SHARED_SECRET_LEN]; u8 Nx[DPP_MAX_SHARED_SECRET_LEN]; u8 Lx[DPP_MAX_SHARED_SECRET_LEN]; u8 k1[DPP_MAX_HASH_LEN]; u8 k2[DPP_MAX_HASH_LEN]; u8 ke[DPP_MAX_HASH_LEN]; int initiator; int configurator; int remove_on_tx_status; int auth_success; struct wpabuf *conf_req; struct dpp_configuration *conf_ap; struct dpp_configuration *conf_sta; struct dpp_configurator *conf; char *connector; /* received signedConnector */ u8 ssid[SSID_MAX_LEN]; u8 ssid_len; char passphrase[64]; u8 psk[PMK_LEN]; int psk_set; struct wpabuf *net_access_key; os_time_t net_access_key_expiry; struct wpabuf *c_sign_key; #ifdef CONFIG_TESTING_OPTIONS char *config_obj_override; char *discovery_override; char *groups_override; unsigned int ignore_netaccesskey_mismatch:1; #endif /* CONFIG_TESTING_OPTIONS */ }; struct dpp_configurator { struct dl_list list; unsigned int id; int own; EVP_PKEY *csign; char *kid; const struct dpp_curve_params *curve; }; struct dpp_introduction { u8 pmkid[PMKID_LEN]; u8 pmk[PMK_LEN_MAX]; size_t pmk_len; }; void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info); const char * dpp_bootstrap_type_txt(enum dpp_bootstrap_type type); int dpp_bootstrap_key_hash(struct dpp_bootstrap_info *bi); int dpp_parse_uri_chan_list(struct dpp_bootstrap_info *bi, const char *chan_list); int dpp_parse_uri_mac(struct dpp_bootstrap_info *bi, const char *mac); int dpp_parse_uri_info(struct dpp_bootstrap_info *bi, const char *info); struct dpp_bootstrap_info * dpp_parse_qr_code(const char *uri); char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve, const u8 *privkey, size_t privkey_len); struct dpp_authentication * dpp_auth_init(void *msg_ctx, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, int configurator); struct dpp_authentication * dpp_auth_req_rx(void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual, struct dpp_bootstrap_info *peer_bi, struct dpp_bootstrap_info *own_bi, unsigned int freq, const u8 *hdr, const u8 *attr_start, const u8 *wrapped_data, u16 wrapped_data_len); struct wpabuf * dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth, const char *json); int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr, const u8 *attr_start, size_t attr_len); int dpp_notify_new_qr_code(struct dpp_authentication *auth, struct dpp_bootstrap_info *peer_bi); void dpp_configuration_free(struct dpp_configuration *conf); void dpp_auth_deinit(struct dpp_authentication *auth); struct wpabuf * dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start, size_t attr_len); int dpp_conf_resp_rx(struct dpp_authentication *auth, const struct wpabuf *resp); struct wpabuf * dpp_alloc_msg(enum dpp_public_action_frame_type type, size_t len); const u8 * dpp_get_attr(const u8 *buf, size_t len, u16 req_id, u16 *ret_len); int dpp_check_attrs(const u8 *buf, size_t len); int dpp_key_expired(const char *timestamp, os_time_t *expiry); void dpp_configurator_free(struct dpp_configurator *conf); struct dpp_configurator * dpp_keygen_configurator(const char *curve, const u8 *privkey, size_t privkey_len); int dpp_configurator_own_config(struct dpp_authentication *auth, const char *curve); int dpp_peer_intro(struct dpp_introduction *intro, const char *own_connector, const u8 *net_access_key, size_t net_access_key_len, const u8 *csign_key, size_t csign_key_len, const u8 *peer_connector, size_t peer_connector_len, os_time_t *expiry); struct dpp_pkex * dpp_pkex_init(struct dpp_bootstrap_info *bi, const u8 *own_mac, const char *identifier, const char *code); struct dpp_pkex * dpp_pkex_rx_exchange_req(struct dpp_bootstrap_info *bi, const u8 *own_mac, const u8 *peer_mac, const char *identifier, const char *code, const u8 *buf, size_t len); struct wpabuf * dpp_pkex_rx_exchange_resp(struct dpp_pkex *pkex, const u8 *buf, size_t len); struct wpabuf * dpp_pkex_rx_commit_reveal_req(struct dpp_pkex *pkex, const u8 *hdr, const u8 *buf, size_t len); int dpp_pkex_rx_commit_reveal_resp(struct dpp_pkex *pkex, const u8 *hdr, const u8 *buf, size_t len); void dpp_pkex_free(struct dpp_pkex *pkex); #endif /* DPP_H */