mirror of
https://github.com/espressif/esp-idf.git
synced 2024-10-05 20:47:46 -04:00
da07b2b4a7
Under WPA3-Personal, SAE authentication is used to derive PMK which is more secure and immune to offline dictionary attacks. 1. Add modules to generate SAE commit/confirm for the handshake 2. Add modules that build and parse SAE data in Auth frames 3. Add WPA3 association and key mgmt definitions 4. Invert y-bit while solving for ECC co-ordinate - Once an X co-ordinate is obtained, solving for Y co-ordinate using an elliptical curve equation results in 2 possible values, Y and (P - Y), where p is the prime number. The co-ordinates are used for deriving keys in SAE handshake. As par the 802.11 spec if LSB of X is same as LSB of Y then Y is chosen, (P - Y) otherwise. This is not what is implemented, so fix this behavior to obtain the correct Y co-ordinate.
239 lines
8.1 KiB
C
239 lines
8.1 KiB
C
// Copyright 2019 Espressif Systems (Shanghai) PTE LTD
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
#ifndef _ESP_WIFI_DRIVER_H_
|
|
#define _ESP_WIFI_DRIVER_H_
|
|
|
|
#include "esp_err.h"
|
|
#include "esp_wifi.h"
|
|
|
|
#if CONFIG_NEWLIB_NANO_FORMAT
|
|
#define TASK_STACK_SIZE_ADD 0
|
|
#else
|
|
#define TASK_STACK_SIZE_ADD 512
|
|
#endif
|
|
|
|
#define WPA2_TASK_STACK_SIZE (6144 + TASK_STACK_SIZE_ADD)
|
|
#define WPS_TASK_STACK_SIZE (12288 + TASK_STACK_SIZE_ADD)
|
|
|
|
enum {
|
|
WIFI_WPA_ALG_NONE = 0,
|
|
WIFI_WPA_ALG_WEP40 = 1,
|
|
WIFI_WPA_ALG_TKIP = 2,
|
|
WIFI_WPA_ALG_CCMP = 3,
|
|
WIFI_WPA_ALG_WAPI = 4,
|
|
WIFI_WPA_ALG_WEP104 = 5,
|
|
WIFI_WPA_ALG_WEP,
|
|
WIFI_WPA_ALG_IGTK,
|
|
WIFI_WPA_ALG_PMK,
|
|
WIFI_WPA_ALG_GCMP
|
|
};
|
|
|
|
enum {
|
|
WIFI_APPIE_PROBEREQ = 0,
|
|
WIFI_APPIE_ASSOC_REQ,
|
|
WIFI_APPIE_ASSOC_RESP,
|
|
WIFI_APPIE_WPA,
|
|
WIFI_APPIE_RSN,
|
|
WIFI_APPIE_WPS_PR,
|
|
WIFI_APPIE_WPS_AR,
|
|
WIFI_APPIE_MESH_QUICK,
|
|
WIFI_APPIE_FREQ_ERROR,
|
|
WIFI_APPIE_ESP_MANUFACTOR,
|
|
WIFI_APPIE_COUNTRY,
|
|
WIFI_APPIE_MAX,
|
|
};
|
|
|
|
enum {
|
|
NONE_AUTH = 0x01,
|
|
WPA_AUTH_UNSPEC = 0x02,
|
|
WPA_AUTH_PSK = 0x03,
|
|
WPA2_AUTH_ENT = 0x04,
|
|
WPA2_AUTH_PSK = 0x05,
|
|
WPA_AUTH_CCKM = 0x06,
|
|
WPA2_AUTH_CCKM = 0x07,
|
|
WPA2_AUTH_PSK_SHA256= 0x08,
|
|
WPA3_AUTH_PSK = 0x09,
|
|
WPA2_AUTH_INVALID = 0x0a,
|
|
};
|
|
|
|
typedef enum {
|
|
WPA2_ENT_EAP_STATE_NOT_START,
|
|
WPA2_ENT_EAP_STATE_IN_PROGRESS,
|
|
WPA2_ENT_EAP_STATE_SUCCESS,
|
|
WPA2_ENT_EAP_STATE_FAIL,
|
|
} wpa2_ent_eap_state_t;
|
|
|
|
struct wifi_appie {
|
|
uint16_t ie_len;
|
|
uint8_t ie_data[];
|
|
};
|
|
|
|
struct wifi_ssid {
|
|
int len;
|
|
uint8_t ssid[32];
|
|
};
|
|
|
|
struct wps_scan_ie {
|
|
uint8_t *bssid;
|
|
uint8_t chan;
|
|
uint16_t capinfo;
|
|
uint8_t *ssid;
|
|
uint8_t *wpa;
|
|
uint8_t *rsn;
|
|
uint8_t *wps;
|
|
};
|
|
|
|
typedef struct {
|
|
int proto;
|
|
int pairwise_cipher;
|
|
int group_cipher;
|
|
int key_mgmt;
|
|
int capabilities;
|
|
size_t num_pmkid;
|
|
const u8 *pmkid;
|
|
int mgmt_group_cipher;
|
|
} wifi_wpa_ie_t;
|
|
|
|
struct wpa_funcs {
|
|
bool (*wpa_sta_init)(void);
|
|
bool (*wpa_sta_deinit)(void);
|
|
void (*wpa_sta_connect)(uint8_t *bssid);
|
|
int (*wpa_sta_rx_eapol)(u8 *src_addr, u8 *buf, u32 len);
|
|
bool (*wpa_sta_in_4way_handshake)(void);
|
|
void *(*wpa_ap_init)(void);
|
|
bool (*wpa_ap_deinit)(void *data);
|
|
bool (*wpa_ap_join)(void **sm, u8 *bssid, u8 *wpa_ie, u8 wpa_ie_len);
|
|
bool (*wpa_ap_remove)(void *sm);
|
|
uint8_t *(*wpa_ap_get_wpa_ie)(uint8_t *len);
|
|
bool (*wpa_ap_rx_eapol)(void *hapd_data, void *sm, u8 *data, size_t data_len);
|
|
char *(*wpa_config_parse_string)(const char *value, size_t *len);
|
|
int (*wpa_parse_wpa_ie)(const u8 *wpa_ie, size_t wpa_ie_len, wifi_wpa_ie_t *data);
|
|
int (*wpa_config_bss)(u8 *bssid);
|
|
int (*wpa_michael_mic_failure)(u16 is_unicast);
|
|
#ifdef CONFIG_WPA3_SAE
|
|
u8 *(*wpa3_build_sae_msg)(u8 *bssid, u32 type, u32 *len);
|
|
int (*wpa3_parse_sae_msg)(u8 *buf, u32 len, u32 type);
|
|
#endif
|
|
};
|
|
|
|
struct wpa2_funcs {
|
|
int (*wpa2_sm_rx_eapol)(u8 *src_addr, u8 *buf, u32 len, u8 *bssid);
|
|
int (*wpa2_start)(void);
|
|
u8 (*wpa2_get_state)(void);
|
|
int (*wpa2_init)(void);
|
|
void (*wpa2_deinit)(void);
|
|
};
|
|
|
|
struct wps_funcs {
|
|
bool (*wps_parse_scan_result)(struct wps_scan_ie *scan);
|
|
int (*wifi_station_wps_start)(void);
|
|
int (*wps_sm_rx_eapol)(u8 *src_addr, u8 *buf, u32 len);
|
|
int (*wps_start_pending)(void);
|
|
};
|
|
|
|
typedef esp_err_t (*wifi_wpa2_fn_t)(void *);
|
|
typedef struct {
|
|
wifi_wpa2_fn_t fn;
|
|
void *param;
|
|
} wifi_wpa2_param_t;
|
|
|
|
#define IS_WPS_REGISTRAR(type) (((type)>WPS_TYPE_MAX)?(((type)<WPS_TYPE_MAX)?true:false):false)
|
|
#define IS_WPS_ENROLLEE(type) (((type)>WPS_TYPE_DISABLE)?(((type)<WPS_TYPE_MAX)?true:false):false)
|
|
|
|
typedef enum wps_status {
|
|
WPS_STATUS_DISABLE = 0,
|
|
WPS_STATUS_SCANNING,
|
|
WPS_STATUS_PENDING,
|
|
WPS_STATUS_SUCCESS,
|
|
WPS_STATUS_MAX,
|
|
} WPS_STATUS_t;
|
|
|
|
#define WIFI_TXCB_EAPOL_ID 3
|
|
typedef void(*wifi_tx_cb_t)(void *);
|
|
typedef int (*wifi_ipc_fn_t)(void *);
|
|
typedef struct {
|
|
wifi_ipc_fn_t fn;
|
|
void *arg;
|
|
uint32_t arg_size;
|
|
} wifi_ipc_config_t;
|
|
|
|
#define WPA_IGTK_LEN 16
|
|
typedef struct {
|
|
uint8_t keyid[2];
|
|
uint8_t pn[6];
|
|
uint8_t igtk[WPA_IGTK_LEN];
|
|
} wifi_wpa_igtk_t;
|
|
|
|
uint8_t *esp_wifi_ap_get_prof_pmk_internal(void);
|
|
struct wifi_ssid *esp_wifi_ap_get_prof_ap_ssid_internal(void);
|
|
uint8_t esp_wifi_ap_get_prof_authmode_internal(void);
|
|
uint8_t esp_wifi_sta_get_prof_authmode_internal(void);
|
|
uint8_t *esp_wifi_ap_get_prof_password_internal(void);
|
|
struct wifi_ssid *esp_wifi_sta_get_prof_ssid_internal(void);
|
|
uint8_t esp_wifi_sta_get_reset_param_internal(void);
|
|
uint8_t esp_wifi_sta_get_pairwise_cipher_internal(void);
|
|
uint8_t esp_wifi_sta_get_group_cipher_internal(void);
|
|
bool esp_wifi_sta_prof_is_wpa_internal(void);
|
|
int esp_wifi_get_macaddr_internal(uint8_t if_index, uint8_t *macaddr);
|
|
int esp_wifi_set_appie_internal(uint8_t type, uint8_t *ie, uint16_t len, uint8_t flag);
|
|
int esp_wifi_unset_appie_internal(uint8_t type);
|
|
struct wifi_appie *esp_wifi_get_appie_internal(uint8_t type);
|
|
void *esp_wifi_get_hostap_private_internal(void); //1
|
|
uint8_t *esp_wifi_sta_get_prof_password_internal(void);
|
|
void esp_wifi_deauthenticate_internal(u8 reason_code);
|
|
bool esp_wifi_sta_is_running_internal(void);
|
|
bool esp_wifi_auth_done_internal(void);
|
|
int esp_wifi_set_ap_key_internal(int alg, const u8 *addr, int idx, u8 *key, size_t key_len);
|
|
int esp_wifi_set_sta_key_internal(int alg, u8 *addr, int key_idx, int set_tx,
|
|
u8 *seq, size_t seq_len, u8 *key, size_t key_len, int key_entry_valid);
|
|
int esp_wifi_get_sta_key_internal(uint8_t *ifx, int *alg, u8 *addr, int *key_idx,
|
|
u8 *key, size_t key_len, int key_entry_valid);
|
|
bool esp_wifi_wpa_ptk_init_done_internal(uint8_t *mac);
|
|
uint8_t esp_wifi_sta_set_reset_param_internal(uint8_t reset_flag);
|
|
uint8_t esp_wifi_get_sta_gtk_index_internal(void);
|
|
void esp_wifi_set_sta_gtk_index_internal(u8 valid, u8 index);
|
|
int esp_wifi_register_tx_cb_internal(wifi_tx_cb_t fn, u8 id);
|
|
int esp_wifi_register_wpa_cb_internal(struct wpa_funcs *cb);
|
|
int esp_wifi_unregister_wpa_cb_internal(void);
|
|
int esp_wifi_get_assoc_bssid_internal(uint8_t *bssid);
|
|
bool esp_wifi_sta_is_ap_notify_completed_rsne_internal(void);
|
|
int esp_wifi_ap_deauth_internal(uint8_t *mac, uint32_t reason);
|
|
int esp_wifi_ipc_internal(wifi_ipc_config_t *cfg, bool sync);
|
|
int esp_wifi_register_wpa2_cb_internal(struct wpa2_funcs *cb);
|
|
int esp_wifi_unregister_wpa2_cb_internal(void);
|
|
bool esp_wifi_sta_prof_is_wpa2_internal(void);
|
|
bool esp_wifi_sta_prof_is_wpa3_internal(void);
|
|
esp_err_t esp_wifi_sta_wpa2_ent_disable_internal(wifi_wpa2_param_t *param);
|
|
esp_err_t esp_wifi_sta_wpa2_ent_enable_internal(wifi_wpa2_param_t *param);
|
|
esp_err_t esp_wifi_set_wpa2_ent_state_internal(wpa2_ent_eap_state_t state);
|
|
int esp_wifi_get_wps_type_internal(void);
|
|
int esp_wifi_set_wps_type_internal(uint32_t type);
|
|
int esp_wifi_get_wps_status_internal(void);
|
|
int esp_wifi_set_wps_status_internal(uint32_t status);
|
|
int esp_wifi_disarm_sta_connection_timer_internal(void);
|
|
bool esp_wifi_get_sniffer_internal(void);
|
|
int esp_wifi_set_wps_cb_internal(struct wps_funcs *wps_cb);
|
|
bool esp_wifi_enable_sta_privacy_internal(void);
|
|
uint8_t esp_wifi_get_user_init_flag_internal(void);
|
|
esp_err_t esp_wifi_internal_supplicant_header_md5_check(const char *md5);
|
|
int esp_wifi_sta_update_ap_info_internal(void);
|
|
uint8_t *esp_wifi_sta_get_ap_info_prof_pmk_internal(void);
|
|
esp_err_t esp_wifi_set_wps_start_flag_internal(bool start);
|
|
uint16_t esp_wifi_sta_pmf_enabled(void);
|
|
wifi_cipher_type_t esp_wifi_sta_get_mgmt_group_cipher(void);
|
|
int esp_wifi_set_igtk_internal(uint8_t if_index, const wifi_wpa_igtk_t *igtk);
|
|
|
|
#endif /* _ESP_WIFI_DRIVER_H_ */
|