blob: bf67ac38bc5b32ced7d3f111cfc695fe94a6daf9 [file] [log] [blame]
/** @file keyMgmtAp_rom.h
*
* @brief This file contains define for key management
*
* Copyright (C) 2014, Marvell International Ltd.
*
* This software file (the "File") is distributed by Marvell International
* Ltd. under the terms of the GNU General Public License Version 2, June 1991
* (the "License"). You may use, redistribute and/or modify this File in
* accordance with the terms and conditions of the License, a copy of which
* is available by writing to the Free Software Foundation, Inc.,
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
* worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
*
* THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
* IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
* ARE EXPRESSLY DISCLAIMED. The License provides additional details about
* this warranty disclaimer.
*/
/******************************************************
Change log:
03/07/2014: Initial version
******************************************************/
#ifndef KEYMGMTAP_ROM_H__
#define KEYMGMTAP_ROM_H__
//Authenticator related data structures, function prototypes
#include "wltypes.h"
#include "IEEE_types.h"
#include "sha1.h"
#include "keyMgmtStaTypes.h"
#include "wl_macros.h"
#include "keyMgmtApTypes.h"
#include "rc4_rom.h"
#include "keyCommonDef.h"
#include "authenticator.h"
#include "keyMgmtApStaCommon.h"
/* This flags if the Secure flag in EAPOL key frame must be set */
#define SECURE_HANDSHAKE_FLAG 0x0080
/* Whether the EAPOL frame is for pairwise or group Key */
#define PAIRWISE_KEY_MSG 0x0800
/* Flags when WPA2 is enabled, not used for WPA */
#define WPA2_HANDSHAKE 0x8000
extern void GenerateGTK_internal(hostsa_private *priv, KeyData_t *grpKeyData,
UINT8 *nonce, UINT8 *StaMacAddr);
extern void PopulateKeyMsg(hostsa_private *priv,
EAPOL_KeyMsg_Tx_t *tx_eapol_ptr, Cipher_t *Cipher,
UINT16 Type, UINT32 replay_cnt[2], UINT8 *Nonce);
extern void prepareKDE(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *tx_eapol_ptr,
KeyData_t *grKey, Cipher_t *cipher);
extern BOOLEAN Encrypt_keyData(hostsa_private *priv,
EAPOL_KeyMsg_Tx_t *tx_eapol_ptr,
UINT8 *EAPOL_Encr_Key, Cipher_t *cipher);
extern void ROM_InitGTK(hostsa_private *priv, KeyData_t *grpKeyData,
UINT8 *nonce, UINT8 *StaMacAddr);
extern void KeyData_AddGTK(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *pTxEAPOL,
KeyData_t *grKey, Cipher_t *cipher);
extern BOOLEAN KeyData_AddKey(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *pTxEAPOL,
SecurityMode_t *pSecType,
KeyData_t *grKey, Cipher_t *cipher);
extern BOOLEAN KeyData_CopyWPAWP2(hostsa_private *priv,
EAPOL_KeyMsg_Tx_t *pTxEAPOL, void *pIe);
extern BOOLEAN KeyData_UpdateKeyMaterial(hostsa_private *priv,
EAPOL_KeyMsg_Tx_t *pTxEAPOL,
SecurityMode_t *pSecType, void *pWPA,
void *pWPA2);
extern void KeyMgmtAp_DerivePTK(hostsa_private *priv, UINT8 *pPMK, t_u8 *da,
t_u8 *sa, UINT8 *ANonce, UINT8 *SNonce,
UINT8 *EAPOL_MIC_Key, UINT8 *EAPOL_Encr_Key,
KeyData_t *newPWKey, BOOLEAN use_kdf);
#endif // _KEYMGMTAP_ROM_H_