Fix an issue where the random number generator's random event injector
[dragonfly.git] / contrib / hostapd-0.5.8 / eap_sake_common.h
blobac6e8199d66bf6f514f5f3401a0e7dc69e8e0975
1 /*
2 * EAP server/peer: EAP-SAKE shared routines
3 * Copyright (c) 2006, Jouni Malinen <j@w1.fi>
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
12 * See README and COPYING for more details.
15 #ifndef EAP_SAKE_COMMON_H
16 #define EAP_SAKE_COMMON_H
18 #define EAP_SAKE_VERSION 2
20 #define EAP_SAKE_SUBTYPE_CHALLENGE 1
21 #define EAP_SAKE_SUBTYPE_CONFIRM 2
22 #define EAP_SAKE_SUBTYPE_AUTH_REJECT 3
23 #define EAP_SAKE_SUBTYPE_IDENTITY 4
25 #define EAP_SAKE_AT_RAND_S 1
26 #define EAP_SAKE_AT_RAND_P 2
27 #define EAP_SAKE_AT_MIC_S 3
28 #define EAP_SAKE_AT_MIC_P 4
29 #define EAP_SAKE_AT_SERVERID 5
30 #define EAP_SAKE_AT_PEERID 6
31 #define EAP_SAKE_AT_SPI_S 7
32 #define EAP_SAKE_AT_SPI_P 8
33 #define EAP_SAKE_AT_ANY_ID_REQ 9
34 #define EAP_SAKE_AT_PERM_ID_REQ 10
35 #define EAP_SAKE_AT_ENCR_DATA 128
36 #define EAP_SAKE_AT_IV 129
37 #define EAP_SAKE_AT_PADDING 130
38 #define EAP_SAKE_AT_NEXT_TMPID 131
39 #define EAP_SAKE_AT_MSK_LIFE 132
41 #define EAP_SAKE_RAND_LEN 16
42 #define EAP_SAKE_MIC_LEN 16
43 #define EAP_SAKE_ROOT_SECRET_LEN 16
44 #define EAP_SAKE_SMS_LEN 16
45 #define EAP_SAKE_TEK_AUTH_LEN 16
46 #define EAP_SAKE_TEK_CIPHER_LEN 16
47 #define EAP_SAKE_TEK_LEN (EAP_SAKE_TEK_AUTH_LEN + EAP_SAKE_TEK_CIPHER_LEN)
49 #ifdef _MSC_VER
50 #pragma pack(push, 1)
51 #endif /* _MSC_VER */
53 struct eap_sake_hdr {
54 u8 code;
55 u8 identifier;
56 u16 length;
57 u8 type; /* EAP_TYPE_SAKE */
58 u8 version; /* EAP_SAKE_VERSION */
59 u8 session_id;
60 u8 subtype;
61 } STRUCT_PACKED;
63 #ifdef _MSC_VER
64 #pragma pack(pop)
65 #endif /* _MSC_VER */
68 struct eap_sake_parse_attr {
69 const u8 *rand_s;
70 const u8 *rand_p;
71 const u8 *mic_s;
72 const u8 *mic_p;
73 const u8 *serverid;
74 size_t serverid_len;
75 const u8 *peerid;
76 size_t peerid_len;
77 const u8 *spi_s;
78 size_t spi_s_len;
79 const u8 *spi_p;
80 size_t spi_p_len;
81 const u8 *any_id_req;
82 const u8 *perm_id_req;
83 const u8 *encr_data;
84 size_t encr_data_len;
85 const u8 *iv;
86 size_t iv_len;
87 const u8 *next_tmpid;
88 size_t next_tmpid_len;
89 const u8 *msk_life;
92 int eap_sake_parse_attributes(const u8 *buf, size_t len,
93 struct eap_sake_parse_attr *attr);
94 void eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b,
95 const u8 *rand_s, const u8 *rand_p,
96 u8 *tek, u8 *msk, u8 *emsk);
97 int eap_sake_compute_mic(const u8 *tek_auth,
98 const u8 *rand_s, const u8 *rand_p,
99 const u8 *serverid, size_t serverid_len,
100 const u8 *peerid, size_t peerid_len,
101 int peer, const u8 *eap, size_t eap_len,
102 const u8 *mic_pos, u8 *mic);
104 #endif /* EAP_SAKE_COMMON_H */