⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 wpa_auth_i.h

📁 最新的Host AP 新添加了许多pcmcia 的驱动
💻 H
字号:
/* * hostapd - IEEE 802.11i-2004 / WPA Authenticator: Internal definitions * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#ifndef WPA_AUTH_I_H#define WPA_AUTH_I_H/* max(dot11RSNAConfigGroupUpdateCount,dot11RSNAConfigPairwiseUpdateCount) */#define RSNA_MAX_EAPOL_RETRIES 4struct wpa_group;struct wpa_stsl_negotiation {	struct wpa_stsl_negotiation *next;	u8 initiator[ETH_ALEN];	u8 peer[ETH_ALEN];};struct wpa_state_machine {	struct wpa_authenticator *wpa_auth;	struct wpa_group *group;	u8 addr[ETH_ALEN];	enum {		WPA_PTK_INITIALIZE, WPA_PTK_DISCONNECT, WPA_PTK_DISCONNECTED,		WPA_PTK_AUTHENTICATION, WPA_PTK_AUTHENTICATION2,		WPA_PTK_INITPMK, WPA_PTK_INITPSK, WPA_PTK_PTKSTART,		WPA_PTK_PTKCALCNEGOTIATING, WPA_PTK_PTKCALCNEGOTIATING2,		WPA_PTK_PTKINITNEGOTIATING, WPA_PTK_PTKINITDONE	} wpa_ptk_state;	enum {		WPA_PTK_GROUP_IDLE = 0,		WPA_PTK_GROUP_REKEYNEGOTIATING,		WPA_PTK_GROUP_REKEYESTABLISHED,		WPA_PTK_GROUP_KEYERROR	} wpa_ptk_group_state;	Boolean Init;	Boolean DeauthenticationRequest;	Boolean AuthenticationRequest;	Boolean ReAuthenticationRequest;	Boolean Disconnect;	int TimeoutCtr;	int GTimeoutCtr;	Boolean TimeoutEvt;	Boolean EAPOLKeyReceived;	Boolean EAPOLKeyPairwise;	Boolean EAPOLKeyRequest;	Boolean MICVerified;	Boolean GUpdateStationKeys;	u8 ANonce[WPA_NONCE_LEN];	u8 SNonce[WPA_NONCE_LEN];	u8 PMK[PMK_LEN];	struct wpa_ptk PTK;	Boolean PTK_valid;	Boolean pairwise_set;	int keycount;	Boolean Pair;	struct {		u8 counter[WPA_REPLAY_COUNTER_LEN];		Boolean valid;	} key_replay[RSNA_MAX_EAPOL_RETRIES];	Boolean PInitAKeys; /* WPA only, not in IEEE 802.11i */	Boolean PTKRequest; /* not in IEEE 802.11i state machine */	Boolean has_GTK;	Boolean PtkGroupInit; /* init request for PTK Group state machine */	u8 *last_rx_eapol_key; /* starting from IEEE 802.1X header */	size_t last_rx_eapol_key_len;	unsigned int changed:1;	unsigned int in_step_loop:1;	unsigned int pending_deinit:1;	unsigned int started:1;	unsigned int mgmt_frame_prot:1;#ifdef CONFIG_IEEE80211R	unsigned int ft_completed:1;	unsigned int pmk_r1_name_valid:1;#endif /* CONFIG_IEEE80211R */	u8 req_replay_counter[WPA_REPLAY_COUNTER_LEN];	int req_replay_counter_used;	u8 *wpa_ie;	size_t wpa_ie_len;	enum {		WPA_VERSION_NO_WPA = 0 /* WPA not used */,		WPA_VERSION_WPA = 1 /* WPA / IEEE 802.11i/D3.0 */,		WPA_VERSION_WPA2 = 2 /* WPA2 / IEEE 802.11i */	} wpa;	int pairwise; /* Pairwise cipher suite, WPA_CIPHER_* */	int wpa_key_mgmt; /* the selected WPA_KEY_MGMT_* */	struct rsn_pmksa_cache_entry *pmksa;	u32 dot11RSNAStatsTKIPLocalMICFailures;	u32 dot11RSNAStatsTKIPRemoteMICFailures;#ifdef CONFIG_IEEE80211R	u8 xxkey[PMK_LEN]; /* PSK or the second 256 bits of MSK */	size_t xxkey_len;	u8 pmk_r1_name[WPA_PMK_NAME_LEN]; /* PMKR1Name derived from FT Auth					   * Request */	u8 r0kh_id[FT_R0KH_ID_MAX_LEN]; /* R0KH-ID from FT Auth Request */	size_t r0kh_id_len;#endif /* CONFIG_IEEE80211R */};/* per group key state machine data */struct wpa_group {	struct wpa_group *next;	int vlan_id;	Boolean GInit;	int GKeyDoneStations;	Boolean GTKReKey;	int GTK_len;	int GN, GM;	Boolean GTKAuthenticator;	u8 Counter[WPA_NONCE_LEN];	enum {		WPA_GROUP_GTK_INIT = 0,		WPA_GROUP_SETKEYS, WPA_GROUP_SETKEYSDONE	} wpa_group_state;	u8 GMK[WPA_GMK_LEN];	u8 GTK[2][WPA_GTK_MAX_LEN];	u8 GNonce[WPA_NONCE_LEN];	Boolean changed;#ifdef CONFIG_IEEE80211W	u8 IGTK[2][WPA_IGTK_LEN];	int GN_igtk, GM_igtk;#endif /* CONFIG_IEEE80211W */};struct wpa_ft_pmk_cache;/* per authenticator data */struct wpa_authenticator {	struct wpa_group *group;	unsigned int dot11RSNAStatsTKIPRemoteMICFailures;	u32 dot11RSNAAuthenticationSuiteSelected;	u32 dot11RSNAPairwiseCipherSelected;	u32 dot11RSNAGroupCipherSelected;	u8 dot11RSNAPMKIDUsed[PMKID_LEN];	u32 dot11RSNAAuthenticationSuiteRequested; /* FIX: update */	u32 dot11RSNAPairwiseCipherRequested; /* FIX: update */	u32 dot11RSNAGroupCipherRequested; /* FIX: update */	unsigned int dot11RSNATKIPCounterMeasuresInvoked;	unsigned int dot11RSNA4WayHandshakeFailures;	struct wpa_stsl_negotiation *stsl_negotiations;	struct wpa_auth_config conf;	struct wpa_auth_callbacks cb;	u8 *wpa_ie;	size_t wpa_ie_len;	u8 addr[ETH_ALEN];	struct rsn_pmksa_cache *pmksa;	struct wpa_ft_pmk_cache *ft_pmk_cache;};int wpa_write_rsn_ie(struct wpa_auth_config *conf, u8 *buf, size_t len,		     const u8 *pmkid);void wpa_auth_logger(struct wpa_authenticator *wpa_auth, const u8 *addr,		     logger_level level, const char *txt);void wpa_auth_vlogger(struct wpa_authenticator *wpa_auth, const u8 *addr,		      logger_level level, const char *fmt, ...);void __wpa_send_eapol(struct wpa_authenticator *wpa_auth,		      struct wpa_state_machine *sm, int key_info,		      const u8 *key_rsc, const u8 *nonce,		      const u8 *kde, size_t kde_len,		      int keyidx, int encr, int force_version);int wpa_auth_for_each_sta(struct wpa_authenticator *wpa_auth,			  int (*cb)(struct wpa_state_machine *sm, void *ctx),			  void *cb_ctx);int wpa_auth_for_each_auth(struct wpa_authenticator *wpa_auth,			   int (*cb)(struct wpa_authenticator *a, void *ctx),			   void *cb_ctx);#ifdef CONFIG_PEERKEYint wpa_stsl_remove(struct wpa_authenticator *wpa_auth,		    struct wpa_stsl_negotiation *neg);void wpa_smk_error(struct wpa_authenticator *wpa_auth,		   struct wpa_state_machine *sm, struct wpa_eapol_key *key);void wpa_smk_m1(struct wpa_authenticator *wpa_auth,		struct wpa_state_machine *sm, struct wpa_eapol_key *key);void wpa_smk_m3(struct wpa_authenticator *wpa_auth,		struct wpa_state_machine *sm, struct wpa_eapol_key *key);#endif /* CONFIG_PEERKEY */#ifdef CONFIG_IEEE80211Rint wpa_write_mdie(struct wpa_auth_config *conf, u8 *buf, size_t len);int wpa_auth_derive_ptk_ft(struct wpa_state_machine *sm, const u8 *pmk,			   struct wpa_ptk *ptk);struct wpa_ft_pmk_cache * wpa_ft_pmk_cache_init(void);void wpa_ft_pmk_cache_deinit(struct wpa_ft_pmk_cache *cache);#endif /* CONFIG_IEEE80211R */#endif /* WPA_AUTH_I_H */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -