/** @file keyMgmtAp_rom.h
|
*
|
* @brief This file contains define for key management
|
*
|
* Copyright (C) 2014-2017, Marvell International Ltd.
|
*
|
* This software file (the "File") is distributed by Marvell International
|
* Ltd. under the terms of the GNU General Public License Version 2, June 1991
|
* (the "License"). You may use, redistribute and/or modify this File in
|
* accordance with the terms and conditions of the License, a copy of which
|
* is available by writing to the Free Software Foundation, Inc.,
|
* 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA or on the
|
* worldwide web at http://www.gnu.org/licenses/old-licenses/gpl-2.0.txt.
|
*
|
* THE FILE IS DISTRIBUTED AS-IS, WITHOUT WARRANTY OF ANY KIND, AND THE
|
* IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE
|
* ARE EXPRESSLY DISCLAIMED. The License provides additional details about
|
* this warranty disclaimer.
|
*/
|
|
/******************************************************
|
Change log:
|
03/07/2014: Initial version
|
******************************************************/
|
#ifndef KEYMGMTAP_ROM_H__
|
#define KEYMGMTAP_ROM_H__
|
//Authenticator related data structures, function prototypes
|
|
#include "wltypes.h"
|
#include "IEEE_types.h"
|
#include "sha1.h"
|
#include "keyMgmtStaTypes.h"
|
#include "wl_macros.h"
|
#include "keyMgmtApTypes.h"
|
#include "rc4_rom.h"
|
|
#include "keyCommonDef.h"
|
#include "authenticator.h"
|
#include "keyMgmtApStaCommon.h"
|
|
/* This flags if the Secure flag in EAPOL key frame must be set */
|
#define SECURE_HANDSHAKE_FLAG 0x0080
|
/* Whether the EAPOL frame is for pairwise or group Key */
|
#define PAIRWISE_KEY_MSG 0x0800
|
/* Flags when WPA2 is enabled, not used for WPA */
|
#define WPA2_HANDSHAKE 0x8000
|
|
extern void GenerateGTK_internal(hostsa_private *priv, KeyData_t *grpKeyData,
|
UINT8 *nonce, UINT8 *StaMacAddr);
|
|
extern void PopulateKeyMsg(hostsa_private *priv,
|
EAPOL_KeyMsg_Tx_t *tx_eapol_ptr, Cipher_t *Cipher,
|
UINT16 Type, UINT32 replay_cnt[2], UINT8 *Nonce);
|
|
extern void prepareKDE(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *tx_eapol_ptr,
|
KeyData_t *grKey, Cipher_t *cipher);
|
|
extern BOOLEAN Encrypt_keyData(hostsa_private *priv,
|
EAPOL_KeyMsg_Tx_t *tx_eapol_ptr,
|
UINT8 *EAPOL_Encr_Key, Cipher_t *cipher);
|
|
extern void ROM_InitGTK(hostsa_private *priv, KeyData_t *grpKeyData,
|
UINT8 *nonce, UINT8 *StaMacAddr);
|
|
extern void KeyData_AddGTK(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *pTxEAPOL,
|
KeyData_t *grKey, Cipher_t *cipher);
|
|
extern BOOLEAN KeyData_AddKey(hostsa_private *priv, EAPOL_KeyMsg_Tx_t *pTxEAPOL,
|
SecurityMode_t *pSecType,
|
KeyData_t *grKey, Cipher_t *cipher);
|
|
extern BOOLEAN KeyData_CopyWPAWP2(hostsa_private *priv,
|
EAPOL_KeyMsg_Tx_t *pTxEAPOL, void *pIe);
|
|
extern BOOLEAN KeyData_UpdateKeyMaterial(hostsa_private *priv,
|
EAPOL_KeyMsg_Tx_t *pTxEAPOL,
|
SecurityMode_t *pSecType, void *pWPA,
|
void *pWPA2);
|
extern void KeyMgmtAp_DerivePTK(hostsa_private *priv, UINT8 *pPMK, t_u8 *da,
|
t_u8 *sa, UINT8 *ANonce, UINT8 *SNonce,
|
UINT8 *EAPOL_MIC_Key, UINT8 *EAPOL_Encr_Key,
|
KeyData_t *newPWKey, BOOLEAN use_kdf);
|
|
#endif //_KEYMGMTAP_ROM_H_
|