Current Path : /compat/linux/proc/68247/cwd/usr/src/contrib/wpa/src/eap_common/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //compat/linux/proc/68247/cwd/usr/src/contrib/wpa/src/eap_common/eap_sake_common.h |
/* * EAP server/peer: EAP-SAKE shared routines * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */ #ifndef EAP_SAKE_COMMON_H #define EAP_SAKE_COMMON_H #define EAP_SAKE_VERSION 2 #define EAP_SAKE_SUBTYPE_CHALLENGE 1 #define EAP_SAKE_SUBTYPE_CONFIRM 2 #define EAP_SAKE_SUBTYPE_AUTH_REJECT 3 #define EAP_SAKE_SUBTYPE_IDENTITY 4 #define EAP_SAKE_AT_RAND_S 1 #define EAP_SAKE_AT_RAND_P 2 #define EAP_SAKE_AT_MIC_S 3 #define EAP_SAKE_AT_MIC_P 4 #define EAP_SAKE_AT_SERVERID 5 #define EAP_SAKE_AT_PEERID 6 #define EAP_SAKE_AT_SPI_S 7 #define EAP_SAKE_AT_SPI_P 8 #define EAP_SAKE_AT_ANY_ID_REQ 9 #define EAP_SAKE_AT_PERM_ID_REQ 10 #define EAP_SAKE_AT_ENCR_DATA 128 #define EAP_SAKE_AT_IV 129 #define EAP_SAKE_AT_PADDING 130 #define EAP_SAKE_AT_NEXT_TMPID 131 #define EAP_SAKE_AT_MSK_LIFE 132 #define EAP_SAKE_RAND_LEN 16 #define EAP_SAKE_MIC_LEN 16 #define EAP_SAKE_ROOT_SECRET_LEN 16 #define EAP_SAKE_SMS_LEN 16 #define EAP_SAKE_TEK_AUTH_LEN 16 #define EAP_SAKE_TEK_CIPHER_LEN 16 #define EAP_SAKE_TEK_LEN (EAP_SAKE_TEK_AUTH_LEN + EAP_SAKE_TEK_CIPHER_LEN) #ifdef _MSC_VER #pragma pack(push, 1) #endif /* _MSC_VER */ struct eap_sake_hdr { u8 version; /* EAP_SAKE_VERSION */ u8 session_id; u8 subtype; } STRUCT_PACKED; #ifdef _MSC_VER #pragma pack(pop) #endif /* _MSC_VER */ struct eap_sake_parse_attr { const u8 *rand_s; const u8 *rand_p; const u8 *mic_s; const u8 *mic_p; const u8 *serverid; size_t serverid_len; const u8 *peerid; size_t peerid_len; const u8 *spi_s; size_t spi_s_len; const u8 *spi_p; size_t spi_p_len; const u8 *any_id_req; const u8 *perm_id_req; const u8 *encr_data; size_t encr_data_len; const u8 *iv; size_t iv_len; const u8 *next_tmpid; size_t next_tmpid_len; const u8 *msk_life; }; int eap_sake_parse_attributes(const u8 *buf, size_t len, struct eap_sake_parse_attr *attr); void eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, const u8 *rand_s, const u8 *rand_p, u8 *tek, u8 *msk, u8 *emsk); int eap_sake_compute_mic(const u8 *tek_auth, const u8 *rand_s, const u8 *rand_p, const u8 *serverid, size_t serverid_len, const u8 *peerid, size_t peerid_len, int peer, const u8 *eap, size_t eap_len, const u8 *mic_pos, u8 *mic); void eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data, size_t len); #endif /* EAP_SAKE_COMMON_H */