blob: d1e92258d9b40c6f08b39177bbc3e0f8637dd914 [file] [log] [blame]
/** @file keyMgmtApStaCommon.h
*
* @brief This file contains common api for authenticator and supplicant.
*
* Copyright (C) 2014, Marvell International Ltd.
*
* This software file (the "File") is distributed by Marvell International
* Ltd. under the terms of the GNU General Public License Version 2, June 1991
* (the "License"). You may use, redistribute and/or modify this File in
* accordance with the terms and conditions of the License, a copy of which
* is available by writing to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
* worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
*
* THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
* IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
* ARE EXPRESSLY DISCLAIMED. The License provides additional details about
* this warranty disclaimer.
*/
/******************************************************
Change log:
03/07/2014: Initial version
******************************************************/
#ifndef KEYMGMTAPSTACOMMON_H__
#define KEYMGMTAPSTACOMMON_H__
//Authenticator related data structures, function prototypes
#include "wltypes.h"
#include "IEEE_types.h"
#include "sha1.h"
#include "keyMgmtStaTypes.h"
#include "wl_macros.h"
#include "keyMgmtApTypes.h"
#include "rc4_rom.h"
#include "keyCommonDef.h"
#include "authenticator.h"
extern t_u32 wlan_strlen(const char *str);
extern void supplicantGenerateRand(hostsa_private *priv, UINT8 *dataOut,
UINT32 length);
extern void SetEAPOLKeyDescTypeVersion(EAPOL_KeyMsg_Tx_t *pTxEapol,
BOOLEAN isWPA2, BOOLEAN isKDF,
BOOLEAN nonTKIP);
extern void ComputeEAPOL_MIC(phostsa_private priv, EAPOL_KeyMsg_t *pKeyMsg,
UINT16 data_length, UINT8 *MIC_Key,
UINT8 MIC_Key_length, UINT8 micKeyDescVersion);
extern BOOLEAN IsEAPOL_MICValid(phostsa_private priv, EAPOL_KeyMsg_t *pKeyMsg,
UINT8 *pMICKey);
extern void supplicantConstructContext(phostsa_private priv, UINT8 *pAddr1,
UINT8 *pAddr2, UINT8 *pNonce1,
UINT8 *pNonce2, UINT8 *pContext);
extern UINT16 KeyMgmtSta_PopulateEAPOLLengthMic(phostsa_private priv,
EAPOL_KeyMsg_Tx_t *pTxEapol,
UINT8 *pEAPOLMICKey,
UINT8 eapolProtocolVersion,
UINT8 forceKeyDescVersion);
extern void KeyMgmt_DerivePTK(phostsa_private priv, UINT8 *pAddr1,
UINT8 *pAddr2, UINT8 *pNonce1, UINT8 *pNonce2,
UINT8 *pPTK, UINT8 *pPMK, BOOLEAN use_kdf);
extern void KeyMgmtSta_DeriveKeys(hostsa_private *priv, UINT8 *pPMK, UINT8 *da,
UINT8 *sa, UINT8 *ANonce, UINT8 *SNonce,
UINT8 *EAPOL_MIC_Key, UINT8 *EAPOL_Encr_Key,
KeyData_t *newPWKey, BOOLEAN use_kdf);
extern void UpdateEAPOLWcbLenAndTransmit(hostsa_private *priv,
pmlan_buffer pmbuf, UINT16 frameLen);
extern void formEAPOLEthHdr(phostsa_private priv, EAPOL_KeyMsg_Tx_t *pTxEapol,
t_u8 *da, t_u8 *sa);
extern void supplicantParseWpaIe(phostsa_private priv,
IEEEtypes_WPAElement_t *pIe,
SecurityMode_t *pWpaType,
Cipher_t *pMcstCipher, Cipher_t *pUcstCipher,
AkmSuite_t *pAkmList, UINT8 akmOutMax);
extern void supplicantParseRsnIe(phostsa_private priv,
IEEEtypes_RSNElement_t *pRsnIe,
SecurityMode_t *pWpaTypeOut,
Cipher_t *pMcstCipherOut,
Cipher_t *pUcstCipherOut,
AkmSuite_t *pAkmListOut, UINT8 akmOutMax,
IEEEtypes_RSNCapability_t *pRsnCapOut,
Cipher_t *pGrpMgmtCipherOut);
#endif // KEYMGMTAPSTACOMMON_H__