2017-08-01 14:29:16 +00:00
|
|
|
// Hardware crypto support Copyright 2017 Espressif Systems (Shanghai) PTE LTD
|
2016-11-24 12:41:44 +00:00
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
2016-11-11 02:38:57 +00:00
|
|
|
#ifndef ESP_WPA2_H
|
|
|
|
#define ESP_WPA2_H
|
|
|
|
|
|
|
|
#include "esp_err.h"
|
2017-08-01 14:29:16 +00:00
|
|
|
#include "esp_wifi_crypto_types.h"
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
#ifdef __cplusplus
|
|
|
|
extern "C" {
|
|
|
|
#endif
|
|
|
|
|
2017-08-01 14:29:16 +00:00
|
|
|
extern const wpa2_crypto_funcs_t g_wifi_default_wpa2_crypto_funcs;
|
|
|
|
|
|
|
|
typedef struct {
|
|
|
|
const wpa2_crypto_funcs_t *crypto_funcs;
|
|
|
|
}esp_wpa2_config_t;
|
|
|
|
|
|
|
|
#define WPA2_CONFIG_INIT_DEFAULT() { \
|
|
|
|
.crypto_funcs = &g_wifi_default_wpa2_crypto_funcs \
|
|
|
|
}
|
|
|
|
|
2016-11-11 02:38:57 +00:00
|
|
|
/**
|
2016-11-23 07:29:01 +00:00
|
|
|
* @brief Enable wpa2 enterprise authentication.
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @attention 1. wpa2 enterprise authentication can only be used when ESP32 station is enabled.
|
|
|
|
* @attention 2. wpa2 enterprise authentication can only support TLS, PEAP-MSCHAPv2 and TTLS-MSCHAPv2 method.
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed.
|
|
|
|
* - ESP_ERR_WIFI_NO_MEM: fail(internal memory malloc fail)
|
2016-11-23 07:29:01 +00:00
|
|
|
*/
|
2017-08-01 14:29:16 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_enable(const esp_wpa2_config_t *config);
|
2016-11-23 07:29:01 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Disable wpa2 enterprise authentication.
|
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @attention 1. wpa2 enterprise authentication can only be used when ESP32 station is enabled.
|
|
|
|
* @attention 2. wpa2 enterprise authentication can only support TLS, PEAP-MSCHAPv2 and TTLS-MSCHAPv2 method.
|
2016-11-23 07:29:01 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed.
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_disable(void);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
2017-01-10 09:50:32 +00:00
|
|
|
/**
|
|
|
|
* @brief Set identity for PEAP/TTLS method.
|
|
|
|
*
|
|
|
|
* @attention The API only passes the parameter identity to the global pointer variable in wpa2 enterprise module.
|
|
|
|
*
|
|
|
|
* @param identity: point to address where stores the identity;
|
|
|
|
* @param len: length of identity, limited to 1~127
|
|
|
|
*
|
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
|
|
|
* - ESP_ERR_WIFI_ARG: fail(len <= 0 or len >= 128)
|
|
|
|
* - ESP_ERR_WIFI_NO_MEM: fail(internal memory malloc fail)
|
|
|
|
*/
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_identity(const unsigned char *identity, int len);
|
2017-01-10 09:50:32 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Clear identity for PEAP/TTLS method.
|
|
|
|
*/
|
|
|
|
void esp_wifi_sta_wpa2_ent_clear_identity(void);
|
|
|
|
|
2016-11-11 02:38:57 +00:00
|
|
|
/**
|
|
|
|
* @brief Set username for PEAP/TTLS method.
|
|
|
|
*
|
2016-11-25 03:03:33 +00:00
|
|
|
* @attention The API only passes the parameter username to the global pointer variable in wpa2 enterprise module.
|
|
|
|
*
|
2016-11-11 02:38:57 +00:00
|
|
|
* @param username: point to address where stores the username;
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param len: length of username, limited to 1~127
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
|
|
|
* - ESP_ERR_WIFI_ARG: fail(len <= 0 or len >= 128)
|
|
|
|
* - ESP_ERR_WIFI_NO_MEM: fail(internal memory malloc fail)
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_username(const unsigned char *username, int len);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
2016-11-23 07:29:01 +00:00
|
|
|
/**
|
|
|
|
* @brief Clear username for PEAP/TTLS method.
|
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
void esp_wifi_sta_wpa2_ent_clear_username(void);
|
2016-11-23 07:29:01 +00:00
|
|
|
|
2016-11-11 02:38:57 +00:00
|
|
|
/**
|
|
|
|
* @brief Set password for PEAP/TTLS method..
|
|
|
|
*
|
2016-11-25 03:03:33 +00:00
|
|
|
* @attention The API only passes the parameter password to the global pointer variable in wpa2 enterprise module.
|
|
|
|
*
|
2016-11-11 02:38:57 +00:00
|
|
|
* @param password: point to address where stores the password;
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param len: length of password(len > 0)
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
|
|
|
* - ESP_ERR_WIFI_ARG: fail(len <= 0)
|
|
|
|
* - ESP_ERR_WIFI_NO_MEM: fail(internal memory malloc fail)
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_password(const unsigned char *password, int len);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
2016-11-23 07:29:01 +00:00
|
|
|
* @brief Clear password for PEAP/TTLS method..
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
void esp_wifi_sta_wpa2_ent_clear_password(void);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
2016-11-25 03:03:33 +00:00
|
|
|
* @brief Set new password for MSCHAPv2 method..
|
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @attention 1. The API only passes the parameter password to the global pointer variable in wpa2 enterprise module.
|
|
|
|
* @attention 2. The new password is used to substitute the old password when eap-mschapv2 failure request message with error code ERROR_PASSWD_EXPIRED is received.
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2016-11-23 07:29:01 +00:00
|
|
|
* @param password: point to address where stores the password;
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param len: length of password
|
2016-11-11 02:38:57 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
|
|
|
* - ESP_ERR_WIFI_ARG: fail(len <= 0)
|
|
|
|
* - ESP_ERR_WIFI_NO_MEM: fail(internal memory malloc fail)
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2016-11-23 07:29:01 +00:00
|
|
|
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_new_password(const unsigned char *password, int len);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
2016-11-25 03:03:33 +00:00
|
|
|
* @brief Clear new password for MSCHAPv2 method..
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
void esp_wifi_sta_wpa2_ent_clear_new_password(void);
|
2016-11-23 07:29:01 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Set CA certificate for PEAP/TTLS method.
|
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @attention 1. The API only passes the parameter ca_cert to the global pointer variable in wpa2 enterprise module.
|
|
|
|
* @attention 2. The ca_cert should be zero terminated.
|
2016-11-25 03:03:33 +00:00
|
|
|
*
|
2016-11-23 07:29:01 +00:00
|
|
|
* @param ca_cert: point to address where stores the CA certificate;
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param len: length of ca_cert
|
2016-11-23 07:29:01 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
2016-11-23 07:29:01 +00:00
|
|
|
*/
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_ca_cert(const unsigned char *ca_cert, int len);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Clear CA certificate for PEAP/TTLS method.
|
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
void esp_wifi_sta_wpa2_ent_clear_ca_cert(void);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Set client certificate and key.
|
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @attention 1. The API only passes the parameter client_cert, private_key and private_key_passwd to the global pointer variable in wpa2 enterprise module.
|
|
|
|
* @attention 2. The client_cert, private_key and private_key_passwd should be zero terminated.
|
2016-11-25 03:03:33 +00:00
|
|
|
*
|
2016-11-11 02:38:57 +00:00
|
|
|
* @param client_cert: point to address where stores the client certificate;
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param client_cert_len: length of client certificate;
|
|
|
|
* @param private_key: point to address where stores the private key;
|
|
|
|
* @param private_key_len: length of private key, limited to 1~2048;
|
|
|
|
* @param private_key_password: point to address where stores the private key password;
|
|
|
|
* @param private_key_password_len: length of private key password;
|
|
|
|
*
|
|
|
|
* @return
|
|
|
|
* - ESP_ERR_WIFI_OK: succeed
|
2016-11-11 02:38:57 +00:00
|
|
|
*/
|
2017-10-13 01:47:19 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_cert_key(const unsigned char *client_cert, int client_cert_len, const unsigned char *private_key, int private_key_len, const unsigned char *private_key_passwd, int private_key_passwd_len);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Clear client certificate and key.
|
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
void esp_wifi_sta_wpa2_ent_clear_cert_key(void);
|
2016-11-11 02:38:57 +00:00
|
|
|
|
2016-11-23 07:29:01 +00:00
|
|
|
/**
|
|
|
|
* @brief Set wpa2 enterprise certs time check(disable or not).
|
|
|
|
*
|
|
|
|
* @param true: disable wpa2 enterprise certs time check
|
2017-01-10 09:50:32 +00:00
|
|
|
* @param false: enable wpa2 enterprise certs time check
|
2016-11-23 07:29:01 +00:00
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_OK: succeed
|
2016-11-23 07:29:01 +00:00
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_set_disable_time_check(bool disable);
|
2016-11-23 07:29:01 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* @brief Get wpa2 enterprise certs time check(disable or not).
|
|
|
|
*
|
|
|
|
* @param disable: store disable value
|
|
|
|
*
|
2017-01-10 09:50:32 +00:00
|
|
|
* @return
|
|
|
|
* - ESP_OK: succeed
|
2016-11-23 07:29:01 +00:00
|
|
|
*/
|
2016-11-25 10:08:21 +00:00
|
|
|
esp_err_t esp_wifi_sta_wpa2_ent_get_disable_time_check(bool *disable);
|
2016-11-23 07:29:01 +00:00
|
|
|
|
2016-11-11 02:38:57 +00:00
|
|
|
#ifdef __cplusplus
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
#endif
|