123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596 |
- /*
- * EAP server/peer: EAP-SAKE shared routines
- * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
- #ifndef EAP_SAKE_COMMON_H
- #define EAP_SAKE_COMMON_H
- #define EAP_SAKE_VERSION 2
- #define EAP_SAKE_SUBTYPE_CHALLENGE 1
- #define EAP_SAKE_SUBTYPE_CONFIRM 2
- #define EAP_SAKE_SUBTYPE_AUTH_REJECT 3
- #define EAP_SAKE_SUBTYPE_IDENTITY 4
- #define EAP_SAKE_AT_RAND_S 1
- #define EAP_SAKE_AT_RAND_P 2
- #define EAP_SAKE_AT_MIC_S 3
- #define EAP_SAKE_AT_MIC_P 4
- #define EAP_SAKE_AT_SERVERID 5
- #define EAP_SAKE_AT_PEERID 6
- #define EAP_SAKE_AT_SPI_S 7
- #define EAP_SAKE_AT_SPI_P 8
- #define EAP_SAKE_AT_ANY_ID_REQ 9
- #define EAP_SAKE_AT_PERM_ID_REQ 10
- #define EAP_SAKE_AT_ENCR_DATA 128
- #define EAP_SAKE_AT_IV 129
- #define EAP_SAKE_AT_PADDING 130
- #define EAP_SAKE_AT_NEXT_TMPID 131
- #define EAP_SAKE_AT_MSK_LIFE 132
- #define EAP_SAKE_RAND_LEN 16
- #define EAP_SAKE_MIC_LEN 16
- #define EAP_SAKE_ROOT_SECRET_LEN 16
- #define EAP_SAKE_SMS_LEN 16
- #define EAP_SAKE_TEK_AUTH_LEN 16
- #define EAP_SAKE_TEK_CIPHER_LEN 16
- #define EAP_SAKE_TEK_LEN (EAP_SAKE_TEK_AUTH_LEN + EAP_SAKE_TEK_CIPHER_LEN)
- #ifdef _MSC_VER
- #pragma pack(push, 1)
- #endif /* _MSC_VER */
- struct eap_sake_hdr {
- u8 version; /* EAP_SAKE_VERSION */
- u8 session_id;
- u8 subtype;
- } STRUCT_PACKED;
- #ifdef _MSC_VER
- #pragma pack(pop)
- #endif /* _MSC_VER */
- struct eap_sake_parse_attr {
- const u8 *rand_s;
- const u8 *rand_p;
- const u8 *mic_s;
- const u8 *mic_p;
- const u8 *serverid;
- size_t serverid_len;
- const u8 *peerid;
- size_t peerid_len;
- const u8 *spi_s;
- size_t spi_s_len;
- const u8 *spi_p;
- size_t spi_p_len;
- const u8 *any_id_req;
- const u8 *perm_id_req;
- const u8 *encr_data;
- size_t encr_data_len;
- const u8 *iv;
- size_t iv_len;
- const u8 *next_tmpid;
- size_t next_tmpid_len;
- const u8 *msk_life;
- };
- int eap_sake_parse_attributes(const u8 *buf, size_t len,
- struct eap_sake_parse_attr *attr);
- void eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b,
- const u8 *rand_s, const u8 *rand_p,
- u8 *tek, u8 *msk, u8 *emsk);
- int eap_sake_compute_mic(const u8 *tek_auth,
- const u8 *rand_s, const u8 *rand_p,
- const u8 *serverid, size_t serverid_len,
- const u8 *peerid, size_t peerid_len,
- int peer, const u8 *eap, size_t eap_len,
- const u8 *mic_pos, u8 *mic);
- void eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data,
- size_t len);
- #endif /* EAP_SAKE_COMMON_H */
|