xref: /dflybsd-src/contrib/wpa_supplicant/src/eap_common/eap_gpsk_common.h (revision bcf9aa4feb4a2fdf8ceac276d271a57f4b27e13d)
16d49e1aeSJan Lentfer /*
26d49e1aeSJan Lentfer  * EAP server/peer: EAP-GPSK shared routines
36d49e1aeSJan Lentfer  * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
46d49e1aeSJan Lentfer  *
5*3ff40c12SJohn Marino  * This software may be distributed under the terms of the BSD license.
6*3ff40c12SJohn Marino  * See README for more details.
76d49e1aeSJan Lentfer  */
86d49e1aeSJan Lentfer 
96d49e1aeSJan Lentfer #ifndef EAP_GPSK_COMMON_H
106d49e1aeSJan Lentfer #define EAP_GPSK_COMMON_H
116d49e1aeSJan Lentfer 
126d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_GPSK_1 1
136d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_GPSK_2 2
146d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_GPSK_3 3
156d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_GPSK_4 4
166d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_FAIL 5
176d49e1aeSJan Lentfer #define EAP_GPSK_OPCODE_PROTECTED_FAIL 6
186d49e1aeSJan Lentfer 
196d49e1aeSJan Lentfer /* Failure-Code in GPSK-Fail and GPSK-Protected-Fail */
206d49e1aeSJan Lentfer #define EAP_GPSK_FAIL_PSK_NOT_FOUND 0x00000001
216d49e1aeSJan Lentfer #define EAP_GPSK_FAIL_AUTHENTICATION_FAILURE 0x00000002
226d49e1aeSJan Lentfer #define EAP_GPSK_FAIL_AUTHORIZATION_FAILURE 0x00000003
236d49e1aeSJan Lentfer 
246d49e1aeSJan Lentfer #define EAP_GPSK_RAND_LEN 32
256d49e1aeSJan Lentfer #define EAP_GPSK_MAX_SK_LEN 32
266d49e1aeSJan Lentfer #define EAP_GPSK_MAX_PK_LEN 32
276d49e1aeSJan Lentfer #define EAP_GPSK_MAX_MIC_LEN 32
286d49e1aeSJan Lentfer 
296d49e1aeSJan Lentfer #define EAP_GPSK_VENDOR_IETF		0x00000000
306d49e1aeSJan Lentfer #define EAP_GPSK_CIPHER_RESERVED	0x000000
316d49e1aeSJan Lentfer #define EAP_GPSK_CIPHER_AES		0x000001
326d49e1aeSJan Lentfer #define EAP_GPSK_CIPHER_SHA256		0x000002
336d49e1aeSJan Lentfer 
346d49e1aeSJan Lentfer 
356d49e1aeSJan Lentfer #ifdef _MSC_VER
366d49e1aeSJan Lentfer #pragma pack(push, 1)
376d49e1aeSJan Lentfer #endif /* _MSC_VER */
386d49e1aeSJan Lentfer 
396d49e1aeSJan Lentfer struct eap_gpsk_csuite {
406d49e1aeSJan Lentfer 	u8 vendor[4];
416d49e1aeSJan Lentfer 	u8 specifier[2];
426d49e1aeSJan Lentfer } STRUCT_PACKED;
436d49e1aeSJan Lentfer 
446d49e1aeSJan Lentfer #ifdef _MSC_VER
456d49e1aeSJan Lentfer #pragma pack(pop)
466d49e1aeSJan Lentfer #endif /* _MSC_VER */
476d49e1aeSJan Lentfer 
486d49e1aeSJan Lentfer int eap_gpsk_supported_ciphersuite(int vendor, int specifier);
496d49e1aeSJan Lentfer int eap_gpsk_derive_keys(const u8 *psk, size_t psk_len, int vendor,
506d49e1aeSJan Lentfer 			 int specifier,
516d49e1aeSJan Lentfer 			 const u8 *rand_client, const u8 *rand_server,
526d49e1aeSJan Lentfer 			 const u8 *id_client, size_t id_client_len,
536d49e1aeSJan Lentfer 			 const u8 *id_server, size_t id_server_len,
546d49e1aeSJan Lentfer 			 u8 *msk, u8 *emsk, u8 *sk, size_t *sk_len,
556d49e1aeSJan Lentfer 			 u8 *pk, size_t *pk_len);
56*3ff40c12SJohn Marino int eap_gpsk_derive_session_id(const u8 *psk, size_t psk_len, int vendor,
57*3ff40c12SJohn Marino 			       int specifier,
58*3ff40c12SJohn Marino 			       const u8 *rand_peer, const u8 *rand_server,
59*3ff40c12SJohn Marino 			       const u8 *id_peer, size_t id_peer_len,
60*3ff40c12SJohn Marino 			       const u8 *id_server, size_t id_server_len,
61*3ff40c12SJohn Marino 			       u8 method_type, u8 *sid, size_t *sid_len);
626d49e1aeSJan Lentfer size_t eap_gpsk_mic_len(int vendor, int specifier);
636d49e1aeSJan Lentfer int eap_gpsk_compute_mic(const u8 *sk, size_t sk_len, int vendor,
646d49e1aeSJan Lentfer 			 int specifier, const u8 *data, size_t len, u8 *mic);
656d49e1aeSJan Lentfer 
666d49e1aeSJan Lentfer #endif /* EAP_GPSK_COMMON_H */
67