Share a single definition of EAPOL-Key structure for WEP keys
Signed-hostap: Jouni Malinen <j@w1.fi>
This commit is contained in:
		
							parent
							
								
									47e9d50d18
								
							
						
					
					
						commit
						70a26e708c
					
				
					 4 changed files with 41 additions and 73 deletions
				
			
		|  | @ -126,7 +126,7 @@ static void ieee802_1x_tx_key_one(struct hostapd_data *hapd, | |||
| 	hdr = (struct ieee802_1x_hdr *) buf; | ||||
| 	key = (struct ieee802_1x_eapol_key *) (hdr + 1); | ||||
| 	key->type = EAPOL_KEY_TYPE_RC4; | ||||
| 	key->key_length = htons(key_len); | ||||
| 	WPA_PUT_BE16(key->key_length, key_len); | ||||
| 	wpa_get_ntp_timestamp(key->replay_counter); | ||||
| 
 | ||||
| 	if (random_get_bytes(key->key_iv, sizeof(key->key_iv))) { | ||||
|  |  | |||
|  | @ -17,38 +17,6 @@ struct hostapd_bss_config; | |||
| struct hostapd_radius_attr; | ||||
| struct radius_msg; | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(push, 1) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| /* RFC 3580, 4. RC4 EAPOL-Key Frame */ | ||||
| 
 | ||||
| struct ieee802_1x_eapol_key { | ||||
| 	u8 type; | ||||
| 	u16 key_length; | ||||
| 	u8 replay_counter[8]; /* does not repeat within the life of the keying
 | ||||
| 			       * material used to encrypt the Key field; | ||||
| 			       * 64-bit NTP timestamp MAY be used here */ | ||||
| 	u8 key_iv[16]; /* cryptographically random number */ | ||||
| 	u8 key_index; /* key flag in the most significant bit:
 | ||||
| 		       * 0 = broadcast (default key), | ||||
| 		       * 1 = unicast (key mapping key); key index is in the | ||||
| 		       * 7 least significant bits */ | ||||
| 	u8 key_signature[16]; /* HMAC-MD5 message integrity check computed with
 | ||||
| 			       * MS-MPPE-Send-Key as the key */ | ||||
| 
 | ||||
| 	/* followed by key: if packet body length = 44 + key length, then the
 | ||||
| 	 * key field (of key_length bytes) contains the key in encrypted form; | ||||
| 	 * if packet body length = 44, key field is absent and key_length | ||||
| 	 * represents the number of least significant octets from | ||||
| 	 * MS-MPPE-Send-Key attribute to be used as the keying material; | ||||
| 	 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */ | ||||
| } STRUCT_PACKED; | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(pop) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| 
 | ||||
| void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf, | ||||
| 			size_t len); | ||||
|  |  | |||
|  | @ -38,4 +38,44 @@ enum { IEEE802_1X_TYPE_EAP_PACKET = 0, | |||
| enum { EAPOL_KEY_TYPE_RC4 = 1, EAPOL_KEY_TYPE_RSN = 2, | ||||
|        EAPOL_KEY_TYPE_WPA = 254 }; | ||||
| 
 | ||||
| 
 | ||||
| #define IEEE8021X_REPLAY_COUNTER_LEN 8 | ||||
| #define IEEE8021X_KEY_SIGN_LEN 16 | ||||
| #define IEEE8021X_KEY_IV_LEN 16 | ||||
| 
 | ||||
| #define IEEE8021X_KEY_INDEX_FLAG 0x80 | ||||
| #define IEEE8021X_KEY_INDEX_MASK 0x03 | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(push, 1) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| struct ieee802_1x_eapol_key { | ||||
| 	u8 type; | ||||
| 	/* Note: key_length is unaligned */ | ||||
| 	u8 key_length[2]; | ||||
| 	/* does not repeat within the life of the keying material used to
 | ||||
| 	 * encrypt the Key field; 64-bit NTP timestamp MAY be used here */ | ||||
| 	u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; | ||||
| 	u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ | ||||
| 	u8 key_index; /* key flag in the most significant bit:
 | ||||
| 		       * 0 = broadcast (default key), | ||||
| 		       * 1 = unicast (key mapping key); key index is in the | ||||
| 		       * 7 least significant bits */ | ||||
| 	/* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
 | ||||
| 	 * the key */ | ||||
| 	u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; | ||||
| 
 | ||||
| 	/* followed by key: if packet body length = 44 + key length, then the
 | ||||
| 	 * key field (of key_length bytes) contains the key in encrypted form; | ||||
| 	 * if packet body length = 44, key field is absent and key_length | ||||
| 	 * represents the number of least significant octets from | ||||
| 	 * MS-MPPE-Send-Key attribute to be used as the keying material; | ||||
| 	 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */ | ||||
| } STRUCT_PACKED; | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(pop) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| #endif /* EAPOL_COMMON_H */ | ||||
|  |  | |||
|  | @ -139,46 +139,6 @@ struct eapol_sm { | |||
| }; | ||||
| 
 | ||||
| 
 | ||||
| #define IEEE8021X_REPLAY_COUNTER_LEN 8 | ||||
| #define IEEE8021X_KEY_SIGN_LEN 16 | ||||
| #define IEEE8021X_KEY_IV_LEN 16 | ||||
| 
 | ||||
| #define IEEE8021X_KEY_INDEX_FLAG 0x80 | ||||
| #define IEEE8021X_KEY_INDEX_MASK 0x03 | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(push, 1) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| struct ieee802_1x_eapol_key { | ||||
| 	u8 type; | ||||
| 	/* Note: key_length is unaligned */ | ||||
| 	u8 key_length[2]; | ||||
| 	/* does not repeat within the life of the keying material used to
 | ||||
| 	 * encrypt the Key field; 64-bit NTP timestamp MAY be used here */ | ||||
| 	u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN]; | ||||
| 	u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */ | ||||
| 	u8 key_index; /* key flag in the most significant bit:
 | ||||
| 		       * 0 = broadcast (default key), | ||||
| 		       * 1 = unicast (key mapping key); key index is in the | ||||
| 		       * 7 least significant bits */ | ||||
| 	/* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
 | ||||
| 	 * the key */ | ||||
| 	u8 key_signature[IEEE8021X_KEY_SIGN_LEN]; | ||||
| 
 | ||||
| 	/* followed by key: if packet body length = 44 + key length, then the
 | ||||
| 	 * key field (of key_length bytes) contains the key in encrypted form; | ||||
| 	 * if packet body length = 44, key field is absent and key_length | ||||
| 	 * represents the number of least significant octets from | ||||
| 	 * MS-MPPE-Send-Key attribute to be used as the keying material; | ||||
| 	 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */ | ||||
| } STRUCT_PACKED; | ||||
| 
 | ||||
| #ifdef _MSC_VER | ||||
| #pragma pack(pop) | ||||
| #endif /* _MSC_VER */ | ||||
| 
 | ||||
| 
 | ||||
| static void eapol_sm_txLogoff(struct eapol_sm *sm); | ||||
| static void eapol_sm_txStart(struct eapol_sm *sm); | ||||
| static void eapol_sm_processKey(struct eapol_sm *sm); | ||||
|  |  | |||
		Loading…
	
		Reference in a new issue
	
	 Jouni Malinen
						Jouni Malinen