dpp.h 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432
  1. /*
  2. * DPP functionality shared between hostapd and wpa_supplicant
  3. * Copyright (c) 2017, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef DPP_H
  9. #define DPP_H
  10. #include <openssl/x509.h>
  11. #include "utils/list.h"
  12. #include "common/wpa_common.h"
  13. #include "crypto/sha256.h"
  14. #define DPP_HDR_LEN (4 + 2) /* OUI, OUI Type, Crypto Suite, DPP frame type */
  15. enum dpp_public_action_frame_type {
  16. DPP_PA_AUTHENTICATION_REQ = 0,
  17. DPP_PA_AUTHENTICATION_RESP = 1,
  18. DPP_PA_AUTHENTICATION_CONF = 2,
  19. DPP_PA_PEER_DISCOVERY_REQ = 5,
  20. DPP_PA_PEER_DISCOVERY_RESP = 6,
  21. DPP_PA_PKEX_EXCHANGE_REQ = 7,
  22. DPP_PA_PKEX_EXCHANGE_RESP = 8,
  23. DPP_PA_PKEX_COMMIT_REVEAL_REQ = 9,
  24. DPP_PA_PKEX_COMMIT_REVEAL_RESP = 10,
  25. };
  26. enum dpp_attribute_id {
  27. DPP_ATTR_STATUS = 0x1000,
  28. DPP_ATTR_I_BOOTSTRAP_KEY_HASH = 0x1001,
  29. DPP_ATTR_R_BOOTSTRAP_KEY_HASH = 0x1002,
  30. DPP_ATTR_I_PROTOCOL_KEY = 0x1003,
  31. DPP_ATTR_WRAPPED_DATA = 0x1004,
  32. DPP_ATTR_I_NONCE = 0x1005,
  33. DPP_ATTR_I_CAPABILITIES = 0x1006,
  34. DPP_ATTR_R_NONCE = 0x1007,
  35. DPP_ATTR_R_CAPABILITIES = 0x1008,
  36. DPP_ATTR_R_PROTOCOL_KEY = 0x1009,
  37. DPP_ATTR_I_AUTH_TAG = 0x100A,
  38. DPP_ATTR_R_AUTH_TAG = 0x100B,
  39. DPP_ATTR_CONFIG_OBJ = 0x100C,
  40. DPP_ATTR_CONNECTOR = 0x100D,
  41. DPP_ATTR_CONFIG_ATTR_OBJ = 0x100E,
  42. DPP_ATTR_BOOTSTRAP_KEY = 0x100F,
  43. DPP_ATTR_OWN_NET_NK_HASH = 0x1011,
  44. DPP_ATTR_FINITE_CYCLIC_GROUP = 0x1012,
  45. DPP_ATTR_ENCRYPTED_KEY = 0x1013,
  46. DPP_ATTR_ENROLLEE_NONCE = 0x1014,
  47. DPP_ATTR_CODE_IDENTIFIER = 0x1015,
  48. DPP_ATTR_TRANSACTION_ID = 0x1016,
  49. DPP_ATTR_BOOTSTRAP_INFO = 0x1017,
  50. DPP_ATTR_CHANNEL = 0x1018,
  51. };
  52. enum dpp_status_error {
  53. DPP_STATUS_OK = 0,
  54. DPP_STATUS_NOT_COMPATIBLE = 1,
  55. DPP_STATUS_AUTH_FAILURE = 2,
  56. DPP_STATUS_UNWRAP_FAILURE = 3,
  57. DPP_STATUS_BAD_GROUP = 4,
  58. DPP_STATUS_CONFIGURE_FAILURE = 5,
  59. DPP_STATUS_RESPONSE_PENDING = 6,
  60. DPP_STATUS_INVALID_CONNECTOR = 7,
  61. DPP_STATUS_NO_MATCH = 8,
  62. };
  63. #define DPP_CAPAB_ENROLLEE BIT(0)
  64. #define DPP_CAPAB_CONFIGURATOR BIT(1)
  65. #define DPP_CAPAB_ROLE_MASK (BIT(0) | BIT(1))
  66. #define DPP_BOOTSTRAP_MAX_FREQ 30
  67. #define DPP_MAX_NONCE_LEN 32
  68. #define DPP_MAX_HASH_LEN 64
  69. #define DPP_MAX_SHARED_SECRET_LEN 66
  70. struct dpp_curve_params {
  71. const char *name;
  72. size_t hash_len;
  73. size_t aes_siv_key_len;
  74. size_t nonce_len;
  75. size_t prime_len;
  76. const char *jwk_crv;
  77. u16 ike_group;
  78. const char *jws_alg;
  79. };
  80. enum dpp_bootstrap_type {
  81. DPP_BOOTSTRAP_QR_CODE,
  82. DPP_BOOTSTRAP_PKEX,
  83. };
  84. struct dpp_bootstrap_info {
  85. struct dl_list list;
  86. unsigned int id;
  87. enum dpp_bootstrap_type type;
  88. char *uri;
  89. u8 mac_addr[ETH_ALEN];
  90. char *info;
  91. unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ];
  92. unsigned int num_freq;
  93. int own;
  94. EVP_PKEY *pubkey;
  95. u8 pubkey_hash[SHA256_MAC_LEN];
  96. const struct dpp_curve_params *curve;
  97. unsigned int pkex_t; /* number of failures before dpp_pkex
  98. * instantiation */
  99. };
  100. #define PKEX_COUNTER_T_LIMIT 5
  101. struct dpp_pkex {
  102. void *msg_ctx;
  103. unsigned int initiator:1;
  104. unsigned int exchange_done:1;
  105. unsigned int failed:1;
  106. struct dpp_bootstrap_info *own_bi;
  107. u8 own_mac[ETH_ALEN];
  108. u8 peer_mac[ETH_ALEN];
  109. char *identifier;
  110. char *code;
  111. EVP_PKEY *x;
  112. EVP_PKEY *y;
  113. u8 Mx[DPP_MAX_SHARED_SECRET_LEN];
  114. u8 Nx[DPP_MAX_SHARED_SECRET_LEN];
  115. u8 z[DPP_MAX_HASH_LEN];
  116. EVP_PKEY *peer_bootstrap_key;
  117. struct wpabuf *exchange_req;
  118. struct wpabuf *exchange_resp;
  119. unsigned int t; /* number of failures on code use */
  120. unsigned int exch_req_wait_time;
  121. unsigned int exch_req_tries;
  122. unsigned int freq;
  123. };
  124. enum dpp_akm {
  125. DPP_AKM_UNKNOWN,
  126. DPP_AKM_DPP,
  127. DPP_AKM_PSK,
  128. DPP_AKM_SAE,
  129. DPP_AKM_PSK_SAE
  130. };
  131. struct dpp_configuration {
  132. u8 ssid[32];
  133. size_t ssid_len;
  134. enum dpp_akm akm;
  135. /* For DPP configuration (connector) */
  136. os_time_t netaccesskey_expiry;
  137. /* TODO: groups */
  138. /* For legacy configuration */
  139. char *passphrase;
  140. u8 psk[32];
  141. };
  142. struct dpp_authentication {
  143. void *msg_ctx;
  144. const struct dpp_curve_params *curve;
  145. struct dpp_bootstrap_info *peer_bi;
  146. struct dpp_bootstrap_info *own_bi;
  147. struct dpp_bootstrap_info *tmp_own_bi;
  148. u8 waiting_pubkey_hash[SHA256_MAC_LEN];
  149. int response_pending;
  150. enum dpp_status_error auth_resp_status;
  151. u8 peer_mac_addr[ETH_ALEN];
  152. u8 i_nonce[DPP_MAX_NONCE_LEN];
  153. u8 r_nonce[DPP_MAX_NONCE_LEN];
  154. u8 e_nonce[DPP_MAX_NONCE_LEN];
  155. u8 i_capab;
  156. u8 r_capab;
  157. EVP_PKEY *own_protocol_key;
  158. EVP_PKEY *peer_protocol_key;
  159. struct wpabuf *req_msg;
  160. struct wpabuf *resp_msg;
  161. /* Intersection of possible frequencies for initiating DPP
  162. * Authentication exchange */
  163. unsigned int freq[DPP_BOOTSTRAP_MAX_FREQ];
  164. unsigned int num_freq, freq_idx;
  165. unsigned int curr_freq;
  166. unsigned int neg_freq;
  167. unsigned int num_freq_iters;
  168. size_t secret_len;
  169. u8 Mx[DPP_MAX_SHARED_SECRET_LEN];
  170. size_t Mx_len;
  171. u8 Nx[DPP_MAX_SHARED_SECRET_LEN];
  172. size_t Nx_len;
  173. u8 Lx[DPP_MAX_SHARED_SECRET_LEN];
  174. size_t Lx_len;
  175. u8 k1[DPP_MAX_HASH_LEN];
  176. u8 k2[DPP_MAX_HASH_LEN];
  177. u8 ke[DPP_MAX_HASH_LEN];
  178. int initiator;
  179. int waiting_auth_resp;
  180. int waiting_auth_conf;
  181. int auth_req_ack;
  182. unsigned int auth_resp_tries;
  183. u8 allowed_roles;
  184. int configurator;
  185. int remove_on_tx_status;
  186. int auth_success;
  187. struct wpabuf *conf_req;
  188. const struct wpabuf *conf_resp; /* owned by GAS server */
  189. struct dpp_configuration *conf_ap;
  190. struct dpp_configuration *conf_sta;
  191. struct dpp_configurator *conf;
  192. char *connector; /* received signedConnector */
  193. u8 ssid[SSID_MAX_LEN];
  194. u8 ssid_len;
  195. char passphrase[64];
  196. u8 psk[PMK_LEN];
  197. int psk_set;
  198. enum dpp_akm akm;
  199. struct wpabuf *net_access_key;
  200. os_time_t net_access_key_expiry;
  201. struct wpabuf *c_sign_key;
  202. #ifdef CONFIG_TESTING_OPTIONS
  203. char *config_obj_override;
  204. char *discovery_override;
  205. char *groups_override;
  206. unsigned int ignore_netaccesskey_mismatch:1;
  207. #endif /* CONFIG_TESTING_OPTIONS */
  208. };
  209. struct dpp_configurator {
  210. struct dl_list list;
  211. unsigned int id;
  212. int own;
  213. EVP_PKEY *csign;
  214. char *kid;
  215. const struct dpp_curve_params *curve;
  216. };
  217. struct dpp_introduction {
  218. u8 pmkid[PMKID_LEN];
  219. u8 pmk[PMK_LEN_MAX];
  220. size_t pmk_len;
  221. };
  222. #ifdef CONFIG_TESTING_OPTIONS
  223. enum dpp_test_behavior {
  224. DPP_TEST_DISABLED = 0,
  225. DPP_TEST_AFTER_WRAPPED_DATA_AUTH_REQ = 1,
  226. DPP_TEST_AFTER_WRAPPED_DATA_AUTH_RESP = 2,
  227. DPP_TEST_AFTER_WRAPPED_DATA_AUTH_CONF = 3,
  228. DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_REQ = 4,
  229. DPP_TEST_AFTER_WRAPPED_DATA_PKEX_CR_RESP = 5,
  230. DPP_TEST_AFTER_WRAPPED_DATA_CONF_REQ = 6,
  231. DPP_TEST_AFTER_WRAPPED_DATA_CONF_RESP = 7,
  232. DPP_TEST_ZERO_I_CAPAB = 8,
  233. DPP_TEST_ZERO_R_CAPAB = 9,
  234. DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 10,
  235. DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 11,
  236. DPP_TEST_NO_I_PROTO_KEY_AUTH_REQ = 12,
  237. DPP_TEST_NO_I_NONCE_AUTH_REQ = 13,
  238. DPP_TEST_NO_I_CAPAB_AUTH_REQ = 14,
  239. DPP_TEST_NO_WRAPPED_DATA_AUTH_REQ = 15,
  240. DPP_TEST_NO_STATUS_AUTH_RESP = 16,
  241. DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 17,
  242. DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 18,
  243. DPP_TEST_NO_R_PROTO_KEY_AUTH_RESP = 19,
  244. DPP_TEST_NO_R_NONCE_AUTH_RESP = 20,
  245. DPP_TEST_NO_I_NONCE_AUTH_RESP = 21,
  246. DPP_TEST_NO_R_CAPAB_AUTH_RESP = 22,
  247. DPP_TEST_NO_R_AUTH_AUTH_RESP = 23,
  248. DPP_TEST_NO_WRAPPED_DATA_AUTH_RESP = 24,
  249. DPP_TEST_NO_STATUS_AUTH_CONF = 25,
  250. DPP_TEST_NO_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 26,
  251. DPP_TEST_NO_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 27,
  252. DPP_TEST_NO_I_AUTH_AUTH_CONF = 28,
  253. DPP_TEST_NO_WRAPPED_DATA_AUTH_CONF = 29,
  254. DPP_TEST_I_NONCE_MISMATCH_AUTH_RESP = 30,
  255. DPP_TEST_INCOMPATIBLE_R_CAPAB_AUTH_RESP = 31,
  256. DPP_TEST_R_AUTH_MISMATCH_AUTH_RESP = 32,
  257. DPP_TEST_I_AUTH_MISMATCH_AUTH_CONF = 33,
  258. DPP_TEST_NO_FINITE_CYCLIC_GROUP_PKEX_EXCHANGE_REQ = 34,
  259. DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 35,
  260. DPP_TEST_NO_STATUS_PKEX_EXCHANGE_RESP = 36,
  261. DPP_TEST_NO_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 37,
  262. DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_REQ = 38,
  263. DPP_TEST_NO_I_AUTH_TAG_PKEX_CR_REQ = 39,
  264. DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_REQ = 40,
  265. DPP_TEST_NO_BOOTSTRAP_KEY_PKEX_CR_RESP = 41,
  266. DPP_TEST_NO_R_AUTH_TAG_PKEX_CR_RESP = 42,
  267. DPP_TEST_NO_WRAPPED_DATA_PKEX_CR_RESP = 43,
  268. DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_REQ = 44,
  269. DPP_TEST_INVALID_ENCRYPTED_KEY_PKEX_EXCHANGE_RESP = 45,
  270. DPP_TEST_INVALID_STATUS_PKEX_EXCHANGE_RESP = 46,
  271. DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_REQ = 47,
  272. DPP_TEST_INVALID_BOOTSTRAP_KEY_PKEX_CR_RESP = 48,
  273. DPP_TEST_I_AUTH_TAG_MISMATCH_PKEX_CR_REQ = 49,
  274. DPP_TEST_R_AUTH_TAG_MISMATCH_PKEX_CR_RESP = 50,
  275. DPP_TEST_NO_E_NONCE_CONF_REQ = 51,
  276. DPP_TEST_NO_CONFIG_ATTR_OBJ_CONF_REQ = 52,
  277. DPP_TEST_NO_WRAPPED_DATA_CONF_REQ = 53,
  278. DPP_TEST_NO_E_NONCE_CONF_RESP = 54,
  279. DPP_TEST_NO_CONFIG_OBJ_CONF_RESP = 55,
  280. DPP_TEST_NO_STATUS_CONF_RESP = 56,
  281. DPP_TEST_NO_WRAPPED_DATA_CONF_RESP = 57,
  282. DPP_TEST_INVALID_STATUS_CONF_RESP = 58,
  283. DPP_TEST_E_NONCE_MISMATCH_CONF_RESP = 59,
  284. DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_REQ = 60,
  285. DPP_TEST_NO_CONNECTOR_PEER_DISC_REQ = 61,
  286. DPP_TEST_NO_TRANSACTION_ID_PEER_DISC_RESP = 62,
  287. DPP_TEST_NO_STATUS_PEER_DISC_RESP = 63,
  288. DPP_TEST_NO_CONNECTOR_PEER_DISC_RESP = 64,
  289. DPP_TEST_AUTH_RESP_IN_PLACE_OF_CONF = 65,
  290. DPP_TEST_INVALID_I_PROTO_KEY_AUTH_REQ = 66,
  291. DPP_TEST_INVALID_R_PROTO_KEY_AUTH_RESP = 67,
  292. DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_REQ = 68,
  293. DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_REQ = 69,
  294. DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_RESP = 70,
  295. DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_RESP = 71,
  296. DPP_TEST_INVALID_R_BOOTSTRAP_KEY_HASH_AUTH_CONF = 72,
  297. DPP_TEST_INVALID_I_BOOTSTRAP_KEY_HASH_AUTH_CONF = 73,
  298. DPP_TEST_INVALID_STATUS_AUTH_RESP = 74,
  299. DPP_TEST_INVALID_STATUS_AUTH_CONF = 75,
  300. DPP_TEST_INVALID_CONFIG_ATTR_OBJ_CONF_REQ = 76,
  301. DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_RESP = 77,
  302. DPP_TEST_INVALID_STATUS_PEER_DISC_RESP = 78,
  303. DPP_TEST_INVALID_CONNECTOR_PEER_DISC_RESP = 79,
  304. DPP_TEST_INVALID_CONNECTOR_PEER_DISC_REQ = 80,
  305. DPP_TEST_INVALID_I_NONCE_AUTH_REQ = 81,
  306. DPP_TEST_INVALID_TRANSACTION_ID_PEER_DISC_REQ = 82,
  307. DPP_TEST_INVALID_E_NONCE_CONF_REQ = 83,
  308. DPP_TEST_STOP_AT_PKEX_EXCHANGE_RESP = 84,
  309. DPP_TEST_STOP_AT_PKEX_CR_REQ = 85,
  310. DPP_TEST_STOP_AT_PKEX_CR_RESP = 86,
  311. DPP_TEST_STOP_AT_AUTH_REQ = 87,
  312. DPP_TEST_STOP_AT_AUTH_RESP = 88,
  313. DPP_TEST_STOP_AT_AUTH_CONF = 89,
  314. DPP_TEST_STOP_AT_CONF_REQ = 90,
  315. };
  316. extern enum dpp_test_behavior dpp_test;
  317. extern u8 dpp_pkex_own_mac_override[ETH_ALEN];
  318. extern u8 dpp_pkex_peer_mac_override[ETH_ALEN];
  319. extern u8 dpp_pkex_ephemeral_key_override[600];
  320. extern size_t dpp_pkex_ephemeral_key_override_len;
  321. extern u8 dpp_protocol_key_override[600];
  322. extern size_t dpp_protocol_key_override_len;
  323. extern u8 dpp_nonce_override[DPP_MAX_NONCE_LEN];
  324. extern size_t dpp_nonce_override_len;
  325. #endif /* CONFIG_TESTING_OPTIONS */
  326. void dpp_bootstrap_info_free(struct dpp_bootstrap_info *info);
  327. const char * dpp_bootstrap_type_txt(enum dpp_bootstrap_type type);
  328. int dpp_bootstrap_key_hash(struct dpp_bootstrap_info *bi);
  329. int dpp_parse_uri_chan_list(struct dpp_bootstrap_info *bi,
  330. const char *chan_list);
  331. int dpp_parse_uri_mac(struct dpp_bootstrap_info *bi, const char *mac);
  332. int dpp_parse_uri_info(struct dpp_bootstrap_info *bi, const char *info);
  333. struct dpp_bootstrap_info * dpp_parse_qr_code(const char *uri);
  334. char * dpp_keygen(struct dpp_bootstrap_info *bi, const char *curve,
  335. const u8 *privkey, size_t privkey_len);
  336. struct hostapd_hw_modes;
  337. struct dpp_authentication * dpp_auth_init(void *msg_ctx,
  338. struct dpp_bootstrap_info *peer_bi,
  339. struct dpp_bootstrap_info *own_bi,
  340. u8 dpp_allowed_roles,
  341. unsigned int neg_freq,
  342. struct hostapd_hw_modes *own_modes,
  343. u16 num_modes);
  344. struct dpp_authentication *
  345. dpp_auth_req_rx(void *msg_ctx, u8 dpp_allowed_roles, int qr_mutual,
  346. struct dpp_bootstrap_info *peer_bi,
  347. struct dpp_bootstrap_info *own_bi,
  348. unsigned int freq, const u8 *hdr, const u8 *attr_start,
  349. size_t attr_len);
  350. struct wpabuf *
  351. dpp_auth_resp_rx(struct dpp_authentication *auth, const u8 *hdr,
  352. const u8 *attr_start, size_t attr_len);
  353. struct wpabuf * dpp_build_conf_req(struct dpp_authentication *auth,
  354. const char *json);
  355. int dpp_auth_conf_rx(struct dpp_authentication *auth, const u8 *hdr,
  356. const u8 *attr_start, size_t attr_len);
  357. int dpp_notify_new_qr_code(struct dpp_authentication *auth,
  358. struct dpp_bootstrap_info *peer_bi);
  359. void dpp_configuration_free(struct dpp_configuration *conf);
  360. void dpp_auth_deinit(struct dpp_authentication *auth);
  361. struct wpabuf *
  362. dpp_conf_req_rx(struct dpp_authentication *auth, const u8 *attr_start,
  363. size_t attr_len);
  364. int dpp_conf_resp_rx(struct dpp_authentication *auth,
  365. const struct wpabuf *resp);
  366. struct wpabuf * dpp_alloc_msg(enum dpp_public_action_frame_type type,
  367. size_t len);
  368. const u8 * dpp_get_attr(const u8 *buf, size_t len, u16 req_id, u16 *ret_len);
  369. int dpp_check_attrs(const u8 *buf, size_t len);
  370. int dpp_key_expired(const char *timestamp, os_time_t *expiry);
  371. const char * dpp_akm_str(enum dpp_akm akm);
  372. void dpp_configurator_free(struct dpp_configurator *conf);
  373. struct dpp_configurator *
  374. dpp_keygen_configurator(const char *curve, const u8 *privkey,
  375. size_t privkey_len);
  376. int dpp_configurator_own_config(struct dpp_authentication *auth,
  377. const char *curve, int ap);
  378. enum dpp_status_error
  379. dpp_peer_intro(struct dpp_introduction *intro, const char *own_connector,
  380. const u8 *net_access_key, size_t net_access_key_len,
  381. const u8 *csign_key, size_t csign_key_len,
  382. const u8 *peer_connector, size_t peer_connector_len,
  383. os_time_t *expiry);
  384. struct dpp_pkex * dpp_pkex_init(void *msg_ctx, struct dpp_bootstrap_info *bi,
  385. const u8 *own_mac,
  386. const char *identifier,
  387. const char *code);
  388. struct dpp_pkex * dpp_pkex_rx_exchange_req(void *msg_ctx,
  389. struct dpp_bootstrap_info *bi,
  390. const u8 *own_mac,
  391. const u8 *peer_mac,
  392. const char *identifier,
  393. const char *code,
  394. const u8 *buf, size_t len);
  395. struct wpabuf * dpp_pkex_rx_exchange_resp(struct dpp_pkex *pkex,
  396. const u8 *peer_mac,
  397. const u8 *buf, size_t len);
  398. struct wpabuf * dpp_pkex_rx_commit_reveal_req(struct dpp_pkex *pkex,
  399. const u8 *hdr,
  400. const u8 *buf, size_t len);
  401. int dpp_pkex_rx_commit_reveal_resp(struct dpp_pkex *pkex, const u8 *hdr,
  402. const u8 *buf, size_t len);
  403. void dpp_pkex_free(struct dpp_pkex *pkex);
  404. char * dpp_corrupt_connector_signature(const char *connector);
  405. #endif /* DPP_H */