]> CyberLeo.Net >> Repos - FreeBSD/FreeBSD.git/blob - contrib/wpa/src/common/dpp.h
Update hostapd/wpa_supplicant to 2.8 to fix multiple vulnerabilities.
[FreeBSD/FreeBSD.git] / contrib / wpa / src / common / dpp.h
1 /*
2  * DPP functionality shared between hostapd and wpa_supplicant
3  * Copyright (c) 2017, Qualcomm Atheros, Inc.
4  * Copyright (c) 2018-2019, The Linux Foundation
5  *
6  * This software may be distributed under the terms of the BSD license.
7  * See README for more details.
8  */
9
10 #ifndef DPP_H
11 #define DPP_H
12
13 #ifdef CONFIG_DPP
14 #include <openssl/x509.h>
15
16 #include "utils/list.h"
17 #include "common/wpa_common.h"
18 #include "crypto/sha256.h"
19
20 struct crypto_ecdh;
21 struct dpp_global;
22
23 #define DPP_HDR_LEN (4 + 2) /* OUI, OUI Type, Crypto Suite, DPP frame type */
24
25 enum dpp_public_action_frame_type {
26         DPP_PA_AUTHENTICATION_REQ = 0,
27         DPP_PA_AUTHENTICATION_RESP = 1,
28         DPP_PA_AUTHENTICATION_CONF = 2,
29         DPP_PA_PEER_DISCOVERY_REQ = 5,
30         DPP_PA_PEER_DISCOVERY_RESP = 6,
31         DPP_PA_PKEX_EXCHANGE_REQ = 7,
32         DPP_PA_PKEX_EXCHANGE_RESP = 8,
33         DPP_PA_PKEX_COMMIT_REVEAL_REQ = 9,
34         DPP_PA_PKEX_COMMIT_REVEAL_RESP = 10,
35         DPP_PA_CONFIGURATION_RESULT = 11,
36 };
37
38 enum dpp_attribute_id {
39         DPP_ATTR_STATUS = 0x1000,
40         DPP_ATTR_I_BOOTSTRAP_KEY_HASH = 0x1001,
41         DPP_ATTR_R_BOOTSTRAP_KEY_HASH = 0x1002,
42         DPP_ATTR_I_PROTOCOL_KEY = 0x1003,
43         DPP_ATTR_WRAPPED_DATA = 0x1004,
44         DPP_ATTR_I_NONCE = 0x1005,
45         DPP_ATTR_I_CAPABILITIES = 0x1006,
46         DPP_ATTR_R_NONCE = 0x1007,
47         DPP_ATTR_R_CAPABILITIES = 0x1008,
48         DPP_ATTR_R_PROTOCOL_KEY = 0x1009,
49         DPP_ATTR_I_AUTH_TAG = 0x100A,
50         DPP_ATTR_R_AUTH_TAG = 0x100B,
51         DPP_ATTR_CONFIG_OBJ = 0x100C,
52         DPP_ATTR_CONNECTOR = 0x100D,
53         DPP_ATTR_CONFIG_ATTR_OBJ = 0x100E,
54         DPP_ATTR_BOOTSTRAP_KEY = 0x100F,
55         DPP_ATTR_OWN_NET_NK_HASH = 0x1011,
56         DPP_ATTR_FINITE_CYCLIC_GROUP = 0x1012,
57         DPP_ATTR_ENCRYPTED_KEY = 0x1013,
58         DPP_ATTR_ENROLLEE_NONCE = 0x1014,
59         DPP_ATTR_CODE_IDENTIFIER = 0x1015,
60         DPP_ATTR_TRANSACTION_ID = 0x1016,
61         DPP_ATTR_BOOTSTRAP_INFO = 0x1017,
62         DPP_ATTR_CHANNEL = 0x1018,
63         DPP_ATTR_PROTOCOL_VERSION = 0x1019,
64         DPP_ATTR_ENVELOPED_DATA = 0x101A,
65 };
66
67 enum dpp_status_error {
68         DPP_STATUS_OK = 0,
69         DPP_STATUS_NOT_COMPATIBLE = 1,
70         DPP_STATUS_AUTH_FAILURE = 2,
71         DPP_STATUS_UNWRAP_FAILURE = 3,
72         DPP_STATUS_BAD_GROUP = 4,
73         DPP_STATUS_CONFIGURE_FAILURE = 5,
74         DPP_STATUS_RESPONSE_PENDING = 6,
75         DPP_STATUS_INVALID_CONNECTOR = 7,
76         DPP_STATUS_NO_MATCH = 8,
77         DPP_STATUS_CONFIG_REJECTED = 9,
78 };
79
80 #define DPP_CAPAB_ENROLLEE BIT(0)
81 #define DPP_CAPAB_CONFIGURATOR BIT(1)
82 #define DPP_CAPAB_ROLE_MASK (BIT(0) | BIT(1))
83
84 #define DPP_BOOTSTRAP_MAX_FREQ 30
85 #define DPP_MAX_NONCE_LEN 32
86 #define DPP_MAX_HASH_LEN 64
87 #define DPP_MAX_SHARED_SECRET_LEN 66
88
89 struct dpp_curve_params {
90         const char *name;
91         size_t hash_len;
92         size_t aes_siv_key_len;
93         size_t nonce_len;
94         size_t prime_len;
95         const char *jwk_crv;
96         u16 ike_group;
97         const char *jws_alg;
98 };
99
100 enum dpp_bootstrap_type {
101         DPP_BOOTSTRAP_QR_CODE,
102         DPP_BOOTSTRAP_PKEX,
103 };
104
105 struct dpp_bootstrap_info {
106         struct dl_list list;
107         unsigned int id;
108         enum dpp_bootstrap_type type;
109         char *uri;
110         u8 mac_addr[ETH_ALEN];
111         char *info;
112         unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ];
113         unsigned int num_freq;
114         int own;
115         EVP_PKEY *pubkey;
116         u8 pubkey_hash[SHA256_MAC_LEN];
117         const struct dpp_curve_params *curve;
118         unsigned int pkex_t; /* number of failures before dpp_pkex
119                               * instantiation */
120 };
121
122 #define PKEX_COUNTER_T_LIMIT 5
123
124 struct dpp_pkex {
125         void *msg_ctx;
126         unsigned int initiator:1;
127         unsigned int exchange_done:1;
128         unsigned int failed:1;
129         struct dpp_bootstrap_info *own_bi;
130         u8 own_mac[ETH_ALEN];
131         u8 peer_mac[ETH_ALEN];
132         char *identifier;
133         char *code;
134         EVP_PKEY *x;
135         EVP_PKEY *y;
136         u8 Mx[DPP_MAX_SHARED_SECRET_LEN];
137         u8 Nx[DPP_MAX_SHARED_SECRET_LEN];
138         u8 z[DPP_MAX_HASH_LEN];
139         EVP_PKEY *peer_bootstrap_key;
140         struct wpabuf *exchange_req;
141         struct wpabuf *exchange_resp;
142         unsigned int t; /* number of failures on code use */
143         unsigned int exch_req_wait_time;
144         unsigned int exch_req_tries;
145         unsigned int freq;
146 };
147
148 enum dpp_akm {
149         DPP_AKM_UNKNOWN,
150         DPP_AKM_DPP,
151         DPP_AKM_PSK,
152         DPP_AKM_SAE,
153         DPP_AKM_PSK_SAE,
154         DPP_AKM_SAE_DPP,
155         DPP_AKM_PSK_SAE_DPP,
156 };
157
158 struct dpp_configuration {
159         u8 ssid[32];
160         size_t ssid_len;
161         enum dpp_akm akm;
162
163         /* For DPP configuration (connector) */
164         os_time_t netaccesskey_expiry;
165
166         /* TODO: groups */
167         char *group_id;
168
169         /* For legacy configuration */
170         char *passphrase;
171         u8 psk[32];
172         int psk_set;
173 };
174
175 struct dpp_authentication {
176         void *msg_ctx;
177         u8 peer_version;
178         const struct dpp_curve_params *curve;
179         struct dpp_bootstrap_info *peer_bi;
180         struct dpp_bootstrap_info *own_bi;
181         struct dpp_bootstrap_info *tmp_own_bi;
182         u8 waiting_pubkey_hash[SHA256_MAC_LEN];
183         int response_pending;
184         enum dpp_status_error auth_resp_status;
185         enum dpp_status_error conf_resp_status;
186         u8 peer_mac_addr[ETH_ALEN];
187         u8 i_nonce[DPP_MAX_NONCE_LEN];
188         u8 r_nonce[DPP_MAX_NONCE_LEN];
189         u8 e_nonce[DPP_MAX_NONCE_LEN];
190         u8 i_capab;
191         u8 r_capab;
192         EVP_PKEY *own_protocol_key;
193         EVP_PKEY *peer_protocol_key;
194         struct wpabuf *req_msg;
195         struct wpabuf *resp_msg;
196         /* Intersection of possible frequencies for initiating DPP
197          * Authentication exchange */
198         unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ];
199         unsigned int num_freq, freq_idx;
200         unsigned int curr_freq;
201         unsigned int neg_freq;
202         unsigned int num_freq_iters;
203         size_t secret_len;
204         u8 Mx[DPP_MAX_SHARED_SECRET_LEN];
205         size_t Mx_len;
206         u8 Nx[DPP_MAX_SHARED_SECRET_LEN];
207         size_t Nx_len;
208         u8 Lx[DPP_MAX_SHARED_SECRET_LEN];
209         size_t Lx_len;
210         u8 k1[DPP_MAX_HASH_LEN];
211         u8 k2[DPP_MAX_HASH_LEN];
212         u8 ke[DPP_MAX_HASH_LEN];
213         int initiator;
214         int waiting_auth_resp;
215         int waiting_auth_conf;
216         int auth_req_ack;
217         unsigned int auth_resp_tries;
218         u8 allowed_roles;
219         int configurator;
220         int remove_on_tx_status;
221         int connect_on_tx_status;
222         int waiting_conf_result;
223         int auth_success;
224         struct wpabuf *conf_req;
225         const struct wpabuf *conf_resp; /* owned by GAS server */
226         struct dpp_configuration *conf_ap;
227         struct dpp_configuration *conf_sta;
228         struct dpp_configurator *conf;
229         char *connector; /* received signedConnector */
230         u8 ssid[SSID_MAX_LEN];
231         u8 ssid_len;
232         char passphrase[64];
233         u8 psk[PMK_LEN];
234         int psk_set;
235         enum dpp_akm akm;
236         struct wpabuf *net_access_key;
237         os_time_t net_access_key_expiry;
238         struct wpabuf *c_sign_key;
239 #ifdef CONFIG_TESTING_OPTIONS
240         char *config_obj_override;
241         char *discovery_override;
242         char *groups_override;
243         unsigned int ignore_netaccesskey_mismatch:1;
244 #endif /* CONFIG_TESTING_OPTIONS */
245 };
246
247 struct dpp_configurator {
248         struct dl_list list;
249         unsigned int id;
250         int own;
251         EVP_PKEY *csign;
252         char *kid;
253         const struct dpp_curve_params *curve;
254 };
255
256 struct dpp_introduction {
257         u8 pmkid[PMKID_LEN];
258         u8 pmk[PMK_LEN_MAX];
259         size_t pmk_len;
260 };
261
262 #ifdef CONFIG_TESTING_OPTIONS
263 enum dpp_test_behavior {
264         DPP_TEST_DISABLED = 0,
265         DPP_TEST_AFTER_WRAPPED_DATA_AUTH_REQ = 1,
266         DPP_TEST_AFTER_WRAPPED_DATA_AUTH_RESP = 2,
267         DPP_TEST_AFTER_WRAPPED_DATA_AUTH_CONF = 3,
268         DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_REQ = 4,
269         DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_RESP = 5,
270         DPP_TEST_AFTER_WRAPPED_DATA_CONF_REQ = 6,
271         DPP_TEST_AFTER_WRAPPED_DATA_CONF_RESP = 7,
272         DPP_TEST_ZERO_I_CAPAB = 8,
273         DPP_TEST_ZERO_R_CAPAB = 9,
274         DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 10,
275         DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 11,
276         DPP_TEST_NO_I_PROTO_KEY_AUTH_REQ = 12,
277         DPP_TEST_NO_I_NONCE_AUTH_REQ = 13,
278         DPP_TEST_NO_I_CAPAB_AUTH_REQ = 14,
279         DPP_TEST_NO_WRAPPED_DATA_AUTH_REQ = 15,
280         DPP_TEST_NO_STATUS_AUTH_RESP = 16,
281         DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 17,
282         DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 18,
283         DPP_TEST_NO_R_PROTO_KEY_AUTH_RESP = 19,
284         DPP_TEST_NO_R_NONCE_AUTH_RESP = 20,
285         DPP_TEST_NO_I_NONCE_AUTH_RESP = 21,
286         DPP_TEST_NO_R_CAPAB_AUTH_RESP = 22,
287         DPP_TEST_NO_R_AUTH_AUTH_RESP = 23,
288         DPP_TEST_NO_WRAPPED_DATA_AUTH_RESP = 24,
289         DPP_TEST_NO_STATUS_AUTH_CONF = 25,
290         DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 26,
291         DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 27,
292         DPP_TEST_NO_I_AUTH_AUTH_CONF = 28,
293         DPP_TEST_NO_WRAPPED_DATA_AUTH_CONF = 29,
294         DPP_TEST_I_NONCE_MISMATCH_AUTH_RESP = 30,
295         DPP_TEST_INCOMPATIBLE_R_CAPAB_AUTH_RESP = 31,
296         DPP_TEST_R_AUTH_MISMATCH_AUTH_RESP = 32,
297         DPP_TEST_I_AUTH_MISMATCH_AUTH_CONF = 33,
298         DPP_TEST_NO_FINITE_CYCLIC_GROUP_PKEX_EXCHANGE_REQ = 34,
299         DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 35,
300         DPP_TEST_NO_STATUS_PKEX_EXCHANGE_RESP = 36,
301         DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 37,
302         DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_REQ = 38,
303         DPP_TEST_NO_I_AUTH_TAG_PKEX_CR_REQ = 39,
304         DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_REQ = 40,
305         DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_RESP = 41,
306         DPP_TEST_NO_R_AUTH_TAG_PKEX_CR_RESP = 42,
307         DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_RESP = 43,
308         DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 44,
309         DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 45,
310         DPP_TEST_INVALID_STATUS_PKEX_EXCHANGE_RESP = 46,
311         DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_REQ = 47,
312         DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_RESP = 48,
313         DPP_TEST_I_AUTH_TAG_MISMATCH_PKEX_CR_REQ = 49,
314         DPP_TEST_R_AUTH_TAG_MISMATCH_PKEX_CR_RESP = 50,
315         DPP_TEST_NO_E_NONCE_CONF_REQ = 51,
316         DPP_TEST_NO_CONFIG_ATTR_OBJ_CONF_REQ = 52,
317         DPP_TEST_NO_WRAPPED_DATA_CONF_REQ = 53,
318         DPP_TEST_NO_E_NONCE_CONF_RESP = 54,
319         DPP_TEST_NO_CONFIG_OBJ_CONF_RESP = 55,
320         DPP_TEST_NO_STATUS_CONF_RESP = 56,
321         DPP_TEST_NO_WRAPPED_DATA_CONF_RESP = 57,
322         DPP_TEST_INVALID_STATUS_CONF_RESP = 58,
323         DPP_TEST_E_NONCE_MISMATCH_CONF_RESP = 59,
324         DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_REQ = 60,
325         DPP_TEST_NO_CONNECTOR_PEER_DISC_REQ = 61,
326         DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_RESP = 62,
327         DPP_TEST_NO_STATUS_PEER_DISC_RESP = 63,
328         DPP_TEST_NO_CONNECTOR_PEER_DISC_RESP = 64,
329         DPP_TEST_AUTH_RESP_IN_PLACE_OF_CONF = 65,
330         DPP_TEST_INVALID_I_PROTO_KEY_AUTH_REQ = 66,
331         DPP_TEST_INVALID_R_PROTO_KEY_AUTH_RESP = 67,
332         DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 68,
333         DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 69,
334         DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 70,
335         DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 71,
336         DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 72,
337         DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 73,
338         DPP_TEST_INVALID_STATUS_AUTH_RESP = 74,
339         DPP_TEST_INVALID_STATUS_AUTH_CONF = 75,
340         DPP_TEST_INVALID_CONFIG_ATTR_OBJ_CONF_REQ = 76,
341         DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_RESP = 77,
342         DPP_TEST_INVALID_STATUS_PEER_DISC_RESP = 78,
343         DPP_TEST_INVALID_CONNECTOR_PEER_DISC_RESP = 79,
344         DPP_TEST_INVALID_CONNECTOR_PEER_DISC_REQ = 80,
345         DPP_TEST_INVALID_I_NONCE_AUTH_REQ = 81,
346         DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_REQ = 82,
347         DPP_TEST_INVALID_E_NONCE_CONF_REQ = 83,
348         DPP_TEST_STOP_AT_PKEX_EXCHANGE_RESP = 84,
349         DPP_TEST_STOP_AT_PKEX_CR_REQ = 85,
350         DPP_TEST_STOP_AT_PKEX_CR_RESP = 86,
351         DPP_TEST_STOP_AT_AUTH_REQ = 87,
352         DPP_TEST_STOP_AT_AUTH_RESP = 88,
353         DPP_TEST_STOP_AT_AUTH_CONF = 89,
354         DPP_TEST_STOP_AT_CONF_REQ = 90,
355         DPP_TEST_REJECT_CONFIG = 91,
356 };
357
358 extern enum dpp_test_behavior dpp_test;
359 extern u8 dpp_pkex_own_mac_override[ETH_ALEN];
360 extern u8 dpp_pkex_peer_mac_override[ETH_ALEN];
361 extern u8 dpp_pkex_ephemeral_key_override[600];
362 extern size_t dpp_pkex_ephemeral_key_override_len;
363 extern u8 dpp_protocol_key_override[600];
364 extern size_t dpp_protocol_key_override_len;
365 extern u8 dpp_nonce_override[DPP_MAX_NONCE_LEN];
366 extern size_t dpp_nonce_override_len;
367 #endif /* CONFIG_TESTING_OPTIONS */
368
369 void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info);
370 const char * dpp_bootstrap_type_txt(enum dpp_bootstrap_type type);
371 int dpp_bootstrap_key_hash(struct dpp_bootstrap_info *bi);
372 int dpp_parse_uri_chan_list(struct dpp_bootstrap_info *bi,
373                             const char *chan_list);
374 int dpp_parse_uri_mac(struct dpp_bootstrap_info *bi, const char *mac);
375 int dpp_parse_uri_info(struct dpp_bootstrap_info *bi, const char *info);
376 struct dpp_bootstrap_info * dpp_parse_qr_code(const char *uri);
377 char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve,
378                   const u8 *privkey, size_t privkey_len);
379 struct hostapd_hw_modes;
380 struct dpp_authentication * dpp_auth_init(void *msg_ctx,
381                                           struct dpp_bootstrap_info *peer_bi,
382                                           struct dpp_bootstrap_info *own_bi,
383                                           u8 dpp_allowed_roles,
384                                           unsigned int neg_freq,
385                                           struct hostapd_hw_modes *own_modes,
386                                           u16 num_modes);
387 struct dpp_authentication *
388 dpp_auth_req_rx(void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual,
389                 struct dpp_bootstrap_info *peer_bi,
390                 struct dpp_bootstrap_info *own_bi,
391                 unsigned int freq, const u8 *hdr, const u8 *attr_start,
392                 size_t attr_len);
393 struct wpabuf *
394 dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
395                  const u8 *attr_start, size_t attr_len);
396 struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
397                                    const char *json);
398 int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
399                      const u8 *attr_start, size_t attr_len);
400 int dpp_notify_new_qr_code(struct dpp_authentication *auth,
401                            struct dpp_bootstrap_info *peer_bi);
402 struct dpp_configuration * dpp_configuration_alloc(const char *type);
403 int dpp_akm_psk(enum dpp_akm akm);
404 int dpp_akm_sae(enum dpp_akm akm);
405 int dpp_akm_legacy(enum dpp_akm akm);
406 int dpp_akm_dpp(enum dpp_akm akm);
407 int dpp_akm_ver2(enum dpp_akm akm);
408 int dpp_configuration_valid(const struct dpp_configuration *conf);
409 void dpp_configuration_free(struct dpp_configuration *conf);
410 int dpp_set_configurator(struct dpp_global *dpp, void *msg_ctx,
411                          struct dpp_authentication *auth,
412                          const char *cmd);
413 void dpp_auth_deinit(struct dpp_authentication *auth);
414 struct wpabuf *
415 dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start,
416                 size_t attr_len);
417 int dpp_conf_resp_rx(struct dpp_authentication *auth,
418                      const struct wpabuf *resp);
419 enum dpp_status_error dpp_conf_result_rx(struct dpp_authentication *auth,
420                                          const u8 *hdr,
421                                          const u8 *attr_start, size_t attr_len);
422 struct wpabuf * dpp_build_conf_result(struct dpp_authentication *auth,
423                                       enum dpp_status_error status);
424 struct wpabuf * dpp_alloc_msg(enum dpp_public_action_frame_type type,
425                               size_t len);
426 const u8 * dpp_get_attr(const u8 *buf, size_t len, u16 req_id, u16 *ret_len);
427 int dpp_check_attrs(const u8 *buf, size_t len);
428 int dpp_key_expired(const char *timestamp, os_time_t *expiry);
429 const char * dpp_akm_str(enum dpp_akm akm);
430 int dpp_configurator_get_key(const struct dpp_configurator *conf, char *buf,
431                              size_t buflen);
432 void dpp_configurator_free(struct dpp_configurator *conf);
433 struct dpp_configurator *
434 dpp_keygen_configurator(const char *curve, const u8 *privkey,
435                         size_t privkey_len);
436 int dpp_configurator_own_config(struct dpp_authentication *auth,
437                                 const char *curve, int ap);
438 enum dpp_status_error
439 dpp_peer_intro(struct dpp_introduction *intro, const char *own_connector,
440                const u8 *net_access_key, size_t net_access_key_len,
441                const u8 *csign_key, size_t csign_key_len,
442                const u8 *peer_connector, size_t peer_connector_len,
443                os_time_t *expiry);
444 struct dpp_pkex * dpp_pkex_init(void *msg_ctx, struct dpp_bootstrap_info *bi,
445                                 const u8 *own_mac,
446                                 const char *identifier,
447                                 const char *code);
448 struct dpp_pkex * dpp_pkex_rx_exchange_req(void *msg_ctx,
449                                            struct dpp_bootstrap_info *bi,
450                                            const u8 *own_mac,
451                                            const u8 *peer_mac,
452                                            const char *identifier,
453                                            const char *code,
454                                            const u8 *buf, size_t len);
455 struct wpabuf * dpp_pkex_rx_exchange_resp(struct dpp_pkex *pkex,
456                                           const u8 *peer_mac,
457                                           const u8 *buf, size_t len);
458 struct wpabuf * dpp_pkex_rx_commit_reveal_req(struct dpp_pkex *pkex,
459                                               const u8 *hdr,
460                                               const u8 *buf, size_t len);
461 int dpp_pkex_rx_commit_reveal_resp(struct dpp_pkex *pkex, const u8 *hdr,
462                                    const u8 *buf, size_t len);
463 void dpp_pkex_free(struct dpp_pkex *pkex);
464
465 char * dpp_corrupt_connector_signature(const char *connector);
466
467
468 struct dpp_pfs {
469         struct crypto_ecdh *ecdh;
470         const struct dpp_curve_params *curve;
471         struct wpabuf *ie;
472         struct wpabuf *secret;
473 };
474
475 struct dpp_pfs * dpp_pfs_init(const u8 *net_access_key,
476                               size_t net_access_key_len);
477 int dpp_pfs_process(struct dpp_pfs *pfs, const u8 *peer_ie, size_t peer_ie_len);
478 void dpp_pfs_free(struct dpp_pfs *pfs);
479
480 struct dpp_bootstrap_info * dpp_add_qr_code(struct dpp_global *dpp,
481                                             const char *uri);
482 int dpp_bootstrap_gen(struct dpp_global *dpp, const char *cmd);
483 struct dpp_bootstrap_info *
484 dpp_bootstrap_get_id(struct dpp_global *dpp, unsigned int id);
485 int dpp_bootstrap_remove(struct dpp_global *dpp, const char *id);
486 struct dpp_bootstrap_info *
487 dpp_pkex_finish(struct dpp_global *dpp, struct dpp_pkex *pkex, const u8 *peer,
488                 unsigned int freq);
489 const char * dpp_bootstrap_get_uri(struct dpp_global *dpp, unsigned int id);
490 int dpp_bootstrap_info(struct dpp_global *dpp, int id,
491                        char *reply, int reply_size);
492 void dpp_bootstrap_find_pair(struct dpp_global *dpp, const u8 *i_bootstrap,
493                              const u8 *r_bootstrap,
494                              struct dpp_bootstrap_info **own_bi,
495                              struct dpp_bootstrap_info **peer_bi);
496 int dpp_configurator_add(struct dpp_global *dpp, const char *cmd);
497 int dpp_configurator_remove(struct dpp_global *dpp, const char *id);
498 int dpp_configurator_get_key_id(struct dpp_global *dpp, unsigned int id,
499                                 char *buf, size_t buflen);
500 struct dpp_global * dpp_global_init(void);
501 void dpp_global_clear(struct dpp_global *dpp);
502 void dpp_global_deinit(struct dpp_global *dpp);
503
504 #endif /* CONFIG_DPP */
505 #endif /* DPP_H */