123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172 |
- /*
- * EAP server/peer: EAP-PSK shared routines
- * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
- #ifndef EAP_PSK_COMMON_H
- #define EAP_PSK_COMMON_H
- #define EAP_PSK_RAND_LEN 16
- #define EAP_PSK_MAC_LEN 16
- #define EAP_PSK_TEK_LEN 16
- #define EAP_PSK_PSK_LEN 16
- #define EAP_PSK_AK_LEN 16
- #define EAP_PSK_KDK_LEN 16
- #define EAP_PSK_R_FLAG_CONT 1
- #define EAP_PSK_R_FLAG_DONE_SUCCESS 2
- #define EAP_PSK_R_FLAG_DONE_FAILURE 3
- #define EAP_PSK_E_FLAG 0x20
- #define EAP_PSK_FLAGS_GET_T(flags) (((flags) & 0xc0) >> 6)
- #define EAP_PSK_FLAGS_SET_T(t) ((u8) (t) << 6)
- #ifdef _MSC_VER
- #pragma pack(push, 1)
- #endif /* _MSC_VER */
- /* EAP-PSK First Message (AS -> Supplicant) */
- struct eap_psk_hdr_1 {
- u8 flags;
- u8 rand_s[EAP_PSK_RAND_LEN];
- /* Followed by variable length ID_S */
- } STRUCT_PACKED;
- /* EAP-PSK Second Message (Supplicant -> AS) */
- struct eap_psk_hdr_2 {
- u8 flags;
- u8 rand_s[EAP_PSK_RAND_LEN];
- u8 rand_p[EAP_PSK_RAND_LEN];
- u8 mac_p[EAP_PSK_MAC_LEN];
- /* Followed by variable length ID_P */
- } STRUCT_PACKED;
- /* EAP-PSK Third Message (AS -> Supplicant) */
- struct eap_psk_hdr_3 {
- u8 flags;
- u8 rand_s[EAP_PSK_RAND_LEN];
- u8 mac_s[EAP_PSK_MAC_LEN];
- /* Followed by variable length PCHANNEL */
- } STRUCT_PACKED;
- /* EAP-PSK Fourth Message (Supplicant -> AS) */
- struct eap_psk_hdr_4 {
- u8 flags;
- u8 rand_s[EAP_PSK_RAND_LEN];
- /* Followed by variable length PCHANNEL */
- } STRUCT_PACKED;
- #ifdef _MSC_VER
- #pragma pack(pop)
- #endif /* _MSC_VER */
- int __must_check eap_psk_key_setup(const u8 *psk, u8 *ak, u8 *kdk);
- int __must_check eap_psk_derive_keys(const u8 *kdk, const u8 *rand_p, u8 *tek,
- u8 *msk, u8 *emsk);
- #endif /* EAP_PSK_COMMON_H */
|