wpa_auth.h 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430
  1. /*
  2. * hostapd - IEEE 802.11i-2004 / WPA Authenticator
  3. * Copyright (c) 2004-2017, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef WPA_AUTH_H
  9. #define WPA_AUTH_H
  10. #include "common/defs.h"
  11. #include "common/eapol_common.h"
  12. #include "common/wpa_common.h"
  13. #include "common/ieee802_11_defs.h"
  14. #define MAX_OWN_IE_OVERRIDE 256
  15. #ifdef _MSC_VER
  16. #pragma pack(push, 1)
  17. #endif /* _MSC_VER */
  18. /* IEEE Std 802.11r-2008, 11A.10.3 - Remote request/response frame definition
  19. */
  20. struct ft_rrb_frame {
  21. u8 frame_type; /* RSN_REMOTE_FRAME_TYPE_FT_RRB */
  22. u8 packet_type; /* FT_PACKET_REQUEST/FT_PACKET_RESPONSE */
  23. le16 action_length; /* little endian length of action_frame */
  24. u8 ap_address[ETH_ALEN];
  25. /*
  26. * Followed by action_length bytes of FT Action frame (from Category
  27. * field to the end of Action Frame body.
  28. */
  29. } STRUCT_PACKED;
  30. #define RSN_REMOTE_FRAME_TYPE_FT_RRB 1
  31. #define FT_PACKET_REQUEST 0
  32. #define FT_PACKET_RESPONSE 1
  33. /* Vendor-specific types for R0KH-R1KH protocol; not defined in 802.11r. These
  34. * use OUI Extended EtherType as the encapsulating format. */
  35. #define FT_PACKET_R0KH_R1KH_PULL 0x01
  36. #define FT_PACKET_R0KH_R1KH_RESP 0x02
  37. #define FT_PACKET_R0KH_R1KH_PUSH 0x03
  38. #define FT_PACKET_R0KH_R1KH_SEQ_REQ 0x04
  39. #define FT_PACKET_R0KH_R1KH_SEQ_RESP 0x05
  40. /* packet layout
  41. * IEEE 802 extended OUI ethertype frame header
  42. * u16 authlen (little endian)
  43. * multiple of struct ft_rrb_tlv (authenticated only, length = authlen)
  44. * multiple of struct ft_rrb_tlv (AES-SIV encrypted, AES-SIV needs an extra
  45. * blocksize length)
  46. *
  47. * AES-SIV AAD;
  48. * source MAC address (6)
  49. * authenticated-only TLVs (authlen)
  50. * subtype (1; FT_PACKET_*)
  51. */
  52. #define FT_RRB_NONCE_LEN 16
  53. #define FT_RRB_LAST_EMPTY 0 /* placeholder or padding */
  54. #define FT_RRB_SEQ 1 /* struct ft_rrb_seq */
  55. #define FT_RRB_NONCE 2 /* size FT_RRB_NONCE_LEN */
  56. #define FT_RRB_TIMESTAMP 3 /* le32 unix seconds */
  57. #define FT_RRB_R0KH_ID 4 /* FT_R0KH_ID_MAX_LEN */
  58. #define FT_RRB_R1KH_ID 5 /* FT_R1KH_ID_LEN */
  59. #define FT_RRB_S1KH_ID 6 /* ETH_ALEN */
  60. #define FT_RRB_PMK_R0_NAME 7 /* WPA_PMK_NAME_LEN */
  61. #define FT_RRB_PMK_R0 8 /* PMK_LEN */
  62. #define FT_RRB_PMK_R1_NAME 9 /* WPA_PMK_NAME_LEN */
  63. #define FT_RRB_PMK_R1 10 /* PMK_LEN */
  64. #define FT_RRB_PAIRWISE 11 /* le16 */
  65. struct ft_rrb_tlv {
  66. le16 type;
  67. le16 len;
  68. /* followed by data of length len */
  69. } STRUCT_PACKED;
  70. struct ft_rrb_seq {
  71. le32 dom;
  72. le32 seq;
  73. le32 ts;
  74. } STRUCT_PACKED;
  75. /* session TLVs:
  76. * required: PMK_R1, PMK_R1_NAME, PAIRWISE
  77. *
  78. * pull frame TLVs:
  79. * auth:
  80. * required: SEQ, NONCE, R0KH_ID, R1KH_ID
  81. * encrypted:
  82. * required: PMK_R0_NAME, S1KH_ID
  83. *
  84. * response frame TLVs:
  85. * auth:
  86. * required: SEQ, NONCE, R0KH_ID, R1KH_ID
  87. * encrypted:
  88. * required: S1KH_ID
  89. * optional: session TLVs
  90. *
  91. * push frame TLVs:
  92. * auth:
  93. * required: SEQ, R0KH_ID, R1KH_ID
  94. * encrypted:
  95. * required: S1KH_ID, PMK_R0_NAME, session TLVs
  96. *
  97. * sequence number request frame TLVs:
  98. * auth:
  99. * required: R0KH_ID, R1KH_ID, NONCE
  100. *
  101. * sequence number response frame TLVs:
  102. * auth:
  103. * required: SEQ, NONCE, R0KH_ID, R1KH_ID
  104. */
  105. #ifdef _MSC_VER
  106. #pragma pack(pop)
  107. #endif /* _MSC_VER */
  108. /* per STA state machine data */
  109. struct wpa_authenticator;
  110. struct wpa_state_machine;
  111. struct rsn_pmksa_cache_entry;
  112. struct eapol_state_machine;
  113. struct ft_remote_seq;
  114. struct ft_remote_r0kh {
  115. struct ft_remote_r0kh *next;
  116. u8 addr[ETH_ALEN];
  117. u8 id[FT_R0KH_ID_MAX_LEN];
  118. size_t id_len;
  119. u8 key[32];
  120. struct ft_remote_seq *seq;
  121. };
  122. struct ft_remote_r1kh {
  123. struct ft_remote_r1kh *next;
  124. u8 addr[ETH_ALEN];
  125. u8 id[FT_R1KH_ID_LEN];
  126. u8 key[32];
  127. struct ft_remote_seq *seq;
  128. };
  129. struct wpa_auth_config {
  130. int wpa;
  131. int wpa_key_mgmt;
  132. int wpa_pairwise;
  133. int wpa_group;
  134. int wpa_group_rekey;
  135. int wpa_strict_rekey;
  136. int wpa_gmk_rekey;
  137. int wpa_ptk_rekey;
  138. u32 wpa_group_update_count;
  139. u32 wpa_pairwise_update_count;
  140. int rsn_pairwise;
  141. int rsn_preauth;
  142. int eapol_version;
  143. int wmm_enabled;
  144. int wmm_uapsd;
  145. int disable_pmksa_caching;
  146. int okc;
  147. int tx_status;
  148. #ifdef CONFIG_IEEE80211W
  149. enum mfp_options ieee80211w;
  150. int group_mgmt_cipher;
  151. #endif /* CONFIG_IEEE80211W */
  152. #ifdef CONFIG_IEEE80211R_AP
  153. u8 ssid[SSID_MAX_LEN];
  154. size_t ssid_len;
  155. u8 mobility_domain[MOBILITY_DOMAIN_ID_LEN];
  156. u8 r0_key_holder[FT_R0KH_ID_MAX_LEN];
  157. size_t r0_key_holder_len;
  158. u8 r1_key_holder[FT_R1KH_ID_LEN];
  159. u32 r0_key_lifetime;
  160. int rkh_pos_timeout;
  161. int rkh_neg_timeout;
  162. int rkh_pull_timeout; /* ms */
  163. int rkh_pull_retries;
  164. u32 reassociation_deadline;
  165. struct ft_remote_r0kh **r0kh_list;
  166. struct ft_remote_r1kh **r1kh_list;
  167. int pmk_r1_push;
  168. int ft_over_ds;
  169. int ft_psk_generate_local;
  170. #endif /* CONFIG_IEEE80211R_AP */
  171. int disable_gtk;
  172. int ap_mlme;
  173. #ifdef CONFIG_TESTING_OPTIONS
  174. double corrupt_gtk_rekey_mic_probability;
  175. u8 own_ie_override[MAX_OWN_IE_OVERRIDE];
  176. size_t own_ie_override_len;
  177. #endif /* CONFIG_TESTING_OPTIONS */
  178. #ifdef CONFIG_P2P
  179. u8 ip_addr_go[4];
  180. u8 ip_addr_mask[4];
  181. u8 ip_addr_start[4];
  182. u8 ip_addr_end[4];
  183. #endif /* CONFIG_P2P */
  184. #ifdef CONFIG_FILS
  185. unsigned int fils_cache_id_set:1;
  186. u8 fils_cache_id[FILS_CACHE_ID_LEN];
  187. #endif /* CONFIG_FILS */
  188. };
  189. typedef enum {
  190. LOGGER_DEBUG, LOGGER_INFO, LOGGER_WARNING
  191. } logger_level;
  192. typedef enum {
  193. WPA_EAPOL_portEnabled, WPA_EAPOL_portValid, WPA_EAPOL_authorized,
  194. WPA_EAPOL_portControl_Auto, WPA_EAPOL_keyRun, WPA_EAPOL_keyAvailable,
  195. WPA_EAPOL_keyDone, WPA_EAPOL_inc_EapolFramesTx
  196. } wpa_eapol_variable;
  197. struct wpa_auth_callbacks {
  198. void (*logger)(void *ctx, const u8 *addr, logger_level level,
  199. const char *txt);
  200. void (*disconnect)(void *ctx, const u8 *addr, u16 reason);
  201. int (*mic_failure_report)(void *ctx, const u8 *addr);
  202. void (*psk_failure_report)(void *ctx, const u8 *addr);
  203. void (*set_eapol)(void *ctx, const u8 *addr, wpa_eapol_variable var,
  204. int value);
  205. int (*get_eapol)(void *ctx, const u8 *addr, wpa_eapol_variable var);
  206. const u8 * (*get_psk)(void *ctx, const u8 *addr, const u8 *p2p_dev_addr,
  207. const u8 *prev_psk, size_t *psk_len);
  208. int (*get_msk)(void *ctx, const u8 *addr, u8 *msk, size_t *len);
  209. int (*set_key)(void *ctx, int vlan_id, enum wpa_alg alg,
  210. const u8 *addr, int idx, u8 *key, size_t key_len);
  211. int (*get_seqnum)(void *ctx, const u8 *addr, int idx, u8 *seq);
  212. int (*send_eapol)(void *ctx, const u8 *addr, const u8 *data,
  213. size_t data_len, int encrypt);
  214. int (*for_each_sta)(void *ctx, int (*cb)(struct wpa_state_machine *sm,
  215. void *ctx), void *cb_ctx);
  216. int (*for_each_auth)(void *ctx, int (*cb)(struct wpa_authenticator *a,
  217. void *ctx), void *cb_ctx);
  218. int (*send_ether)(void *ctx, const u8 *dst, u16 proto, const u8 *data,
  219. size_t data_len);
  220. int (*send_oui)(void *ctx, const u8 *dst, u8 oui_suffix, const u8 *data,
  221. size_t data_len);
  222. #ifdef CONFIG_IEEE80211R_AP
  223. struct wpa_state_machine * (*add_sta)(void *ctx, const u8 *sta_addr);
  224. int (*send_ft_action)(void *ctx, const u8 *dst,
  225. const u8 *data, size_t data_len);
  226. int (*add_tspec)(void *ctx, const u8 *sta_addr, u8 *tspec_ie,
  227. size_t tspec_ielen);
  228. #endif /* CONFIG_IEEE80211R_AP */
  229. #ifdef CONFIG_MESH
  230. int (*start_ampe)(void *ctx, const u8 *sta_addr);
  231. #endif /* CONFIG_MESH */
  232. };
  233. struct wpa_authenticator * wpa_init(const u8 *addr,
  234. struct wpa_auth_config *conf,
  235. const struct wpa_auth_callbacks *cb,
  236. void *cb_ctx);
  237. int wpa_init_keys(struct wpa_authenticator *wpa_auth);
  238. void wpa_deinit(struct wpa_authenticator *wpa_auth);
  239. int wpa_reconfig(struct wpa_authenticator *wpa_auth,
  240. struct wpa_auth_config *conf);
  241. enum {
  242. WPA_IE_OK, WPA_INVALID_IE, WPA_INVALID_GROUP, WPA_INVALID_PAIRWISE,
  243. WPA_INVALID_AKMP, WPA_NOT_ENABLED, WPA_ALLOC_FAIL,
  244. WPA_MGMT_FRAME_PROTECTION_VIOLATION, WPA_INVALID_MGMT_GROUP_CIPHER,
  245. WPA_INVALID_MDIE, WPA_INVALID_PROTO, WPA_INVALID_PMKID
  246. };
  247. int wpa_validate_wpa_ie(struct wpa_authenticator *wpa_auth,
  248. struct wpa_state_machine *sm,
  249. const u8 *wpa_ie, size_t wpa_ie_len,
  250. const u8 *mdie, size_t mdie_len,
  251. const u8 *owe_dh, size_t owe_dh_len);
  252. int wpa_validate_osen(struct wpa_authenticator *wpa_auth,
  253. struct wpa_state_machine *sm,
  254. const u8 *osen_ie, size_t osen_ie_len);
  255. int wpa_auth_uses_mfp(struct wpa_state_machine *sm);
  256. struct wpa_state_machine *
  257. wpa_auth_sta_init(struct wpa_authenticator *wpa_auth, const u8 *addr,
  258. const u8 *p2p_dev_addr);
  259. int wpa_auth_sta_associated(struct wpa_authenticator *wpa_auth,
  260. struct wpa_state_machine *sm);
  261. void wpa_auth_sta_no_wpa(struct wpa_state_machine *sm);
  262. void wpa_auth_sta_deinit(struct wpa_state_machine *sm);
  263. void wpa_receive(struct wpa_authenticator *wpa_auth,
  264. struct wpa_state_machine *sm,
  265. u8 *data, size_t data_len);
  266. enum wpa_event {
  267. WPA_AUTH, WPA_ASSOC, WPA_DISASSOC, WPA_DEAUTH, WPA_REAUTH,
  268. WPA_REAUTH_EAPOL, WPA_ASSOC_FT, WPA_ASSOC_FILS, WPA_DRV_STA_REMOVED
  269. };
  270. void wpa_remove_ptk(struct wpa_state_machine *sm);
  271. int wpa_auth_sm_event(struct wpa_state_machine *sm, enum wpa_event event);
  272. void wpa_auth_sm_notify(struct wpa_state_machine *sm);
  273. void wpa_gtk_rekey(struct wpa_authenticator *wpa_auth);
  274. int wpa_get_mib(struct wpa_authenticator *wpa_auth, char *buf, size_t buflen);
  275. int wpa_get_mib_sta(struct wpa_state_machine *sm, char *buf, size_t buflen);
  276. void wpa_auth_countermeasures_start(struct wpa_authenticator *wpa_auth);
  277. int wpa_auth_pairwise_set(struct wpa_state_machine *sm);
  278. int wpa_auth_get_pairwise(struct wpa_state_machine *sm);
  279. int wpa_auth_sta_key_mgmt(struct wpa_state_machine *sm);
  280. int wpa_auth_sta_wpa_version(struct wpa_state_machine *sm);
  281. int wpa_auth_sta_ft_tk_already_set(struct wpa_state_machine *sm);
  282. int wpa_auth_sta_fils_tk_already_set(struct wpa_state_machine *sm);
  283. int wpa_auth_sta_clear_pmksa(struct wpa_state_machine *sm,
  284. struct rsn_pmksa_cache_entry *entry);
  285. struct rsn_pmksa_cache_entry *
  286. wpa_auth_sta_get_pmksa(struct wpa_state_machine *sm);
  287. void wpa_auth_sta_local_mic_failure_report(struct wpa_state_machine *sm);
  288. const u8 * wpa_auth_get_wpa_ie(struct wpa_authenticator *wpa_auth,
  289. size_t *len);
  290. int wpa_auth_pmksa_add(struct wpa_state_machine *sm, const u8 *pmk,
  291. unsigned int pmk_len,
  292. int session_timeout, struct eapol_state_machine *eapol);
  293. int wpa_auth_pmksa_add_preauth(struct wpa_authenticator *wpa_auth,
  294. const u8 *pmk, size_t len, const u8 *sta_addr,
  295. int session_timeout,
  296. struct eapol_state_machine *eapol);
  297. int wpa_auth_pmksa_add_sae(struct wpa_authenticator *wpa_auth, const u8 *addr,
  298. const u8 *pmk, const u8 *pmkid);
  299. int wpa_auth_pmksa_add2(struct wpa_authenticator *wpa_auth, const u8 *addr,
  300. const u8 *pmk, size_t pmk_len, const u8 *pmkid,
  301. int session_timeout, int akmp);
  302. void wpa_auth_pmksa_remove(struct wpa_authenticator *wpa_auth,
  303. const u8 *sta_addr);
  304. int wpa_auth_pmksa_list(struct wpa_authenticator *wpa_auth, char *buf,
  305. size_t len);
  306. void wpa_auth_pmksa_flush(struct wpa_authenticator *wpa_auth);
  307. int wpa_auth_pmksa_list_mesh(struct wpa_authenticator *wpa_auth, const u8 *addr,
  308. char *buf, size_t len);
  309. struct rsn_pmksa_cache_entry *
  310. wpa_auth_pmksa_create_entry(const u8 *aa, const u8 *spa, const u8 *pmk,
  311. const u8 *pmkid, int expiration);
  312. int wpa_auth_pmksa_add_entry(struct wpa_authenticator *wpa_auth,
  313. struct rsn_pmksa_cache_entry *entry);
  314. struct rsn_pmksa_cache_entry *
  315. wpa_auth_pmksa_get(struct wpa_authenticator *wpa_auth, const u8 *sta_addr,
  316. const u8 *pmkid);
  317. struct rsn_pmksa_cache_entry *
  318. wpa_auth_pmksa_get_fils_cache_id(struct wpa_authenticator *wpa_auth,
  319. const u8 *sta_addr, const u8 *pmkid);
  320. void wpa_auth_pmksa_set_to_sm(struct rsn_pmksa_cache_entry *pmksa,
  321. struct wpa_state_machine *sm,
  322. struct wpa_authenticator *wpa_auth,
  323. u8 *pmkid, u8 *pmk);
  324. int wpa_auth_sta_set_vlan(struct wpa_state_machine *sm, int vlan_id);
  325. void wpa_auth_eapol_key_tx_status(struct wpa_authenticator *wpa_auth,
  326. struct wpa_state_machine *sm, int ack);
  327. #ifdef CONFIG_IEEE80211R_AP
  328. u8 * wpa_sm_write_assoc_resp_ies(struct wpa_state_machine *sm, u8 *pos,
  329. size_t max_len, int auth_alg,
  330. const u8 *req_ies, size_t req_ies_len);
  331. void wpa_ft_process_auth(struct wpa_state_machine *sm, const u8 *bssid,
  332. u16 auth_transaction, const u8 *ies, size_t ies_len,
  333. void (*cb)(void *ctx, const u8 *dst, const u8 *bssid,
  334. u16 auth_transaction, u16 resp,
  335. const u8 *ies, size_t ies_len),
  336. void *ctx);
  337. u16 wpa_ft_validate_reassoc(struct wpa_state_machine *sm, const u8 *ies,
  338. size_t ies_len);
  339. int wpa_ft_action_rx(struct wpa_state_machine *sm, const u8 *data, size_t len);
  340. int wpa_ft_rrb_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr,
  341. const u8 *data, size_t data_len);
  342. void wpa_ft_rrb_oui_rx(struct wpa_authenticator *wpa_auth, const u8 *src_addr,
  343. const u8 *dst_addr, u8 oui_suffix, const u8 *data,
  344. size_t data_len);
  345. void wpa_ft_push_pmk_r1(struct wpa_authenticator *wpa_auth, const u8 *addr);
  346. void wpa_ft_deinit(struct wpa_authenticator *wpa_auth);
  347. void wpa_ft_sta_deinit(struct wpa_state_machine *sm);
  348. #endif /* CONFIG_IEEE80211R_AP */
  349. void wpa_wnmsleep_rekey_gtk(struct wpa_state_machine *sm);
  350. void wpa_set_wnmsleep(struct wpa_state_machine *sm, int flag);
  351. int wpa_wnmsleep_gtk_subelem(struct wpa_state_machine *sm, u8 *pos);
  352. int wpa_wnmsleep_igtk_subelem(struct wpa_state_machine *sm, u8 *pos);
  353. int wpa_auth_uses_sae(struct wpa_state_machine *sm);
  354. int wpa_auth_uses_ft_sae(struct wpa_state_machine *sm);
  355. int wpa_auth_get_ip_addr(struct wpa_state_machine *sm, u8 *addr);
  356. struct radius_das_attrs;
  357. int wpa_auth_radius_das_disconnect_pmksa(struct wpa_authenticator *wpa_auth,
  358. struct radius_das_attrs *attr);
  359. void wpa_auth_reconfig_group_keys(struct wpa_authenticator *wpa_auth);
  360. int wpa_auth_ensure_group(struct wpa_authenticator *wpa_auth, int vlan_id);
  361. int wpa_auth_release_group(struct wpa_authenticator *wpa_auth, int vlan_id);
  362. int fils_auth_pmk_to_ptk(struct wpa_state_machine *sm, const u8 *pmk,
  363. size_t pmk_len, const u8 *snonce, const u8 *anonce,
  364. const u8 *dhss, size_t dhss_len,
  365. struct wpabuf *g_sta, struct wpabuf *g_ap);
  366. int fils_decrypt_assoc(struct wpa_state_machine *sm, const u8 *fils_session,
  367. const struct ieee80211_mgmt *mgmt, size_t frame_len,
  368. u8 *pos, size_t left);
  369. int fils_encrypt_assoc(struct wpa_state_machine *sm, u8 *buf,
  370. size_t current_len, size_t max_len,
  371. const struct wpabuf *hlp);
  372. int fils_set_tk(struct wpa_state_machine *sm);
  373. u8 * hostapd_eid_assoc_fils_session(struct wpa_state_machine *sm, u8 *eid,
  374. const u8 *fils_session,
  375. struct wpabuf *fils_hlp_resp);
  376. const u8 * wpa_fils_validate_fils_session(struct wpa_state_machine *sm,
  377. const u8 *ies, size_t ies_len,
  378. const u8 *fils_session);
  379. int wpa_fils_validate_key_confirm(struct wpa_state_machine *sm, const u8 *ies,
  380. size_t ies_len);
  381. int wpa_auth_write_fte(struct wpa_authenticator *wpa_auth, u8 *buf, size_t len);
  382. void wpa_auth_get_fils_aead_params(struct wpa_state_machine *sm,
  383. u8 *fils_anonce, u8 *fils_snonce,
  384. u8 *fils_kek, size_t *fils_kek_len);
  385. u8 * wpa_auth_write_assoc_resp_owe(struct wpa_state_machine *sm,
  386. u8 *pos, size_t max_len,
  387. const u8 *req_ies, size_t req_ies_len);
  388. #endif /* WPA_AUTH_H */