mirror of
https://github.com/vanhoefm/fragattacks.git
synced 2024-12-02 20:28:24 -05:00
4e7f5a4a2a
This converts some of the PAE code to use a design that gets rid unnecessary warnings from sparse and allows more thorough validation of byte order operations. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
93 lines
2.5 KiB
C
93 lines
2.5 KiB
C
/*
|
|
* EAPOL definitions shared between hostapd and wpa_supplicant
|
|
* Copyright (c) 2002-2007, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*/
|
|
|
|
#ifndef EAPOL_COMMON_H
|
|
#define EAPOL_COMMON_H
|
|
|
|
/* IEEE Std 802.1X-2004 */
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma pack(push, 1)
|
|
#endif /* _MSC_VER */
|
|
|
|
struct ieee802_1x_hdr {
|
|
u8 version;
|
|
u8 type;
|
|
be16 length;
|
|
/* followed by length octets of data */
|
|
} STRUCT_PACKED;
|
|
|
|
struct ieee8023_hdr {
|
|
u8 dest[ETH_ALEN];
|
|
u8 src[ETH_ALEN];
|
|
be16 ethertype;
|
|
} STRUCT_PACKED;
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma pack(pop)
|
|
#endif /* _MSC_VER */
|
|
|
|
#ifdef CONFIG_MACSEC
|
|
#define EAPOL_VERSION 3
|
|
#else /* CONFIG_MACSEC */
|
|
#define EAPOL_VERSION 2
|
|
#endif /* CONFIG_MACSEC */
|
|
|
|
enum { IEEE802_1X_TYPE_EAP_PACKET = 0,
|
|
IEEE802_1X_TYPE_EAPOL_START = 1,
|
|
IEEE802_1X_TYPE_EAPOL_LOGOFF = 2,
|
|
IEEE802_1X_TYPE_EAPOL_KEY = 3,
|
|
IEEE802_1X_TYPE_EAPOL_ENCAPSULATED_ASF_ALERT = 4,
|
|
IEEE802_1X_TYPE_EAPOL_MKA = 5,
|
|
};
|
|
|
|
enum { EAPOL_KEY_TYPE_RC4 = 1, EAPOL_KEY_TYPE_RSN = 2,
|
|
EAPOL_KEY_TYPE_WPA = 254 };
|
|
|
|
|
|
#define IEEE8021X_REPLAY_COUNTER_LEN 8
|
|
#define IEEE8021X_KEY_SIGN_LEN 16
|
|
#define IEEE8021X_KEY_IV_LEN 16
|
|
|
|
#define IEEE8021X_KEY_INDEX_FLAG 0x80
|
|
#define IEEE8021X_KEY_INDEX_MASK 0x03
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma pack(push, 1)
|
|
#endif /* _MSC_VER */
|
|
|
|
struct ieee802_1x_eapol_key {
|
|
u8 type;
|
|
/* Note: key_length is unaligned */
|
|
u8 key_length[2];
|
|
/* does not repeat within the life of the keying material used to
|
|
* encrypt the Key field; 64-bit NTP timestamp MAY be used here */
|
|
u8 replay_counter[IEEE8021X_REPLAY_COUNTER_LEN];
|
|
u8 key_iv[IEEE8021X_KEY_IV_LEN]; /* cryptographically random number */
|
|
u8 key_index; /* key flag in the most significant bit:
|
|
* 0 = broadcast (default key),
|
|
* 1 = unicast (key mapping key); key index is in the
|
|
* 7 least significant bits */
|
|
/* HMAC-MD5 message integrity check computed with MS-MPPE-Send-Key as
|
|
* the key */
|
|
u8 key_signature[IEEE8021X_KEY_SIGN_LEN];
|
|
|
|
/* followed by key: if packet body length = 44 + key length, then the
|
|
* key field (of key_length bytes) contains the key in encrypted form;
|
|
* if packet body length = 44, key field is absent and key_length
|
|
* represents the number of least significant octets from
|
|
* MS-MPPE-Send-Key attribute to be used as the keying material;
|
|
* RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
|
|
} STRUCT_PACKED;
|
|
|
|
#ifdef _MSC_VER
|
|
#pragma pack(pop)
|
|
#endif /* _MSC_VER */
|
|
|
|
#endif /* EAPOL_COMMON_H */
|