9be19d0b9c
This extends the SAE implementation in both infrastructure and mesh BSS cases to allow an optional Password Identifier to be used. This uses the mechanism added in P802.11REVmd/D1.0. The Password Identifier is configured in a wpa_supplicant network profile as a new string parameter sae_password_id. In hostapd configuration, the existing sae_password parameter has been extended to allow the password identifier (and also a peer MAC address) to be set. In addition, multiple sae_password entries can now be provided to hostapd to allow multiple per-peer and per-identifier passwords to be set. Signed-off-by: Jouni Malinen <jouni@codeaurora.org>
78 lines
2.5 KiB
C
78 lines
2.5 KiB
C
/*
|
|
* Simultaneous authentication of equals
|
|
* Copyright (c) 2012-2013, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#ifndef SAE_H
|
|
#define SAE_H
|
|
|
|
#define SAE_KCK_LEN 32
|
|
#define SAE_PMK_LEN 32
|
|
#define SAE_PMKID_LEN 16
|
|
#define SAE_KEYSEED_KEY_LEN 32
|
|
#define SAE_MAX_PRIME_LEN 512
|
|
#define SAE_MAX_ECC_PRIME_LEN 66
|
|
#define SAE_COMMIT_MAX_LEN (2 + 3 * SAE_MAX_PRIME_LEN)
|
|
#define SAE_CONFIRM_MAX_LEN (2 + SAE_MAX_PRIME_LEN)
|
|
|
|
/* Special value returned by sae_parse_commit() */
|
|
#define SAE_SILENTLY_DISCARD 65535
|
|
|
|
struct sae_temporary_data {
|
|
u8 kck[SAE_KCK_LEN];
|
|
struct crypto_bignum *own_commit_scalar;
|
|
struct crypto_bignum *own_commit_element_ffc;
|
|
struct crypto_ec_point *own_commit_element_ecc;
|
|
struct crypto_bignum *peer_commit_element_ffc;
|
|
struct crypto_ec_point *peer_commit_element_ecc;
|
|
struct crypto_ec_point *pwe_ecc;
|
|
struct crypto_bignum *pwe_ffc;
|
|
struct crypto_bignum *sae_rand;
|
|
struct crypto_ec *ec;
|
|
int prime_len;
|
|
const struct dh_group *dh;
|
|
const struct crypto_bignum *prime;
|
|
const struct crypto_bignum *order;
|
|
struct crypto_bignum *prime_buf;
|
|
struct crypto_bignum *order_buf;
|
|
struct wpabuf *anti_clogging_token;
|
|
char *pw_id;
|
|
};
|
|
|
|
enum sae_state {
|
|
SAE_NOTHING, SAE_COMMITTED, SAE_CONFIRMED, SAE_ACCEPTED
|
|
};
|
|
|
|
struct sae_data {
|
|
enum sae_state state;
|
|
u16 send_confirm;
|
|
u8 pmk[SAE_PMK_LEN];
|
|
u8 pmkid[SAE_PMKID_LEN];
|
|
struct crypto_bignum *peer_commit_scalar;
|
|
int group;
|
|
unsigned int sync; /* protocol instance variable: Sync */
|
|
u16 rc; /* protocol instance variable: Rc (received send-confirm) */
|
|
struct sae_temporary_data *tmp;
|
|
};
|
|
|
|
int sae_set_group(struct sae_data *sae, int group);
|
|
void sae_clear_temp_data(struct sae_data *sae);
|
|
void sae_clear_data(struct sae_data *sae);
|
|
|
|
int sae_prepare_commit(const u8 *addr1, const u8 *addr2,
|
|
const u8 *password, size_t password_len,
|
|
const char *identifier, struct sae_data *sae);
|
|
int sae_process_commit(struct sae_data *sae);
|
|
void sae_write_commit(struct sae_data *sae, struct wpabuf *buf,
|
|
const struct wpabuf *token, const char *identifier);
|
|
u16 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len,
|
|
const u8 **token, size_t *token_len, int *allowed_groups);
|
|
void sae_write_confirm(struct sae_data *sae, struct wpabuf *buf);
|
|
int sae_check_confirm(struct sae_data *sae, const u8 *data, size_t len);
|
|
u16 sae_group_allowed(struct sae_data *sae, int *allowed_groups, u16 group);
|
|
const char * sae_state_txt(enum sae_state state);
|
|
|
|
#endif /* SAE_H */
|