eap_sake_common.h revision 845e0124d42b67ef926fbae32a7f61d2e5109ebd
1/* 2 * EAP server/peer: EAP-SAKE shared routines 3 * Copyright (c) 2006, Jouni Malinen <j@w1.fi> 4 * 5 * This program is free software; you can redistribute it and/or modify 6 * it under the terms of the GNU General Public License version 2 as 7 * published by the Free Software Foundation. 8 * 9 * Alternatively, this software may be distributed under the terms of BSD 10 * license. 11 * 12 * See README and COPYING for more details. 13 */ 14 15#ifndef EAP_SAKE_COMMON_H 16#define EAP_SAKE_COMMON_H 17 18#define EAP_SAKE_VERSION 2 19 20#define EAP_SAKE_SUBTYPE_CHALLENGE 1 21#define EAP_SAKE_SUBTYPE_CONFIRM 2 22#define EAP_SAKE_SUBTYPE_AUTH_REJECT 3 23#define EAP_SAKE_SUBTYPE_IDENTITY 4 24 25#define EAP_SAKE_AT_RAND_S 1 26#define EAP_SAKE_AT_RAND_P 2 27#define EAP_SAKE_AT_MIC_S 3 28#define EAP_SAKE_AT_MIC_P 4 29#define EAP_SAKE_AT_SERVERID 5 30#define EAP_SAKE_AT_PEERID 6 31#define EAP_SAKE_AT_SPI_S 7 32#define EAP_SAKE_AT_SPI_P 8 33#define EAP_SAKE_AT_ANY_ID_REQ 9 34#define EAP_SAKE_AT_PERM_ID_REQ 10 35#define EAP_SAKE_AT_ENCR_DATA 128 36#define EAP_SAKE_AT_IV 129 37#define EAP_SAKE_AT_PADDING 130 38#define EAP_SAKE_AT_NEXT_TMPID 131 39#define EAP_SAKE_AT_MSK_LIFE 132 40 41#define EAP_SAKE_RAND_LEN 16 42#define EAP_SAKE_MIC_LEN 16 43#define EAP_SAKE_ROOT_SECRET_LEN 16 44#define EAP_SAKE_SMS_LEN 16 45#define EAP_SAKE_TEK_AUTH_LEN 16 46#define EAP_SAKE_TEK_CIPHER_LEN 16 47#define EAP_SAKE_TEK_LEN (EAP_SAKE_TEK_AUTH_LEN + EAP_SAKE_TEK_CIPHER_LEN) 48 49#ifdef _MSC_VER 50#pragma pack(push, 1) 51#endif /* _MSC_VER */ 52 53struct eap_sake_hdr { 54 u8 code; 55 u8 identifier; 56 u16 length; 57 u8 type; /* EAP_TYPE_SAKE */ 58 u8 version; /* EAP_SAKE_VERSION */ 59 u8 session_id; 60 u8 subtype; 61} STRUCT_PACKED; 62 63#ifdef _MSC_VER 64#pragma pack(pop) 65#endif /* _MSC_VER */ 66 67 68struct eap_sake_parse_attr { 69 const u8 *rand_s; 70 const u8 *rand_p; 71 const u8 *mic_s; 72 const u8 *mic_p; 73 const u8 *serverid; 74 size_t serverid_len; 75 const u8 *peerid; 76 size_t peerid_len; 77 const u8 *spi_s; 78 size_t spi_s_len; 79 const u8 *spi_p; 80 size_t spi_p_len; 81 const u8 *any_id_req; 82 const u8 *perm_id_req; 83 const u8 *encr_data; 84 size_t encr_data_len; 85 const u8 *iv; 86 size_t iv_len; 87 const u8 *next_tmpid; 88 size_t next_tmpid_len; 89 const u8 *msk_life; 90}; 91 92int eap_sake_parse_attributes(const u8 *buf, size_t len, 93 struct eap_sake_parse_attr *attr); 94void eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b, 95 const u8 *rand_s, const u8 *rand_p, 96 u8 *tek, u8 *msk, u8 *emsk); 97int eap_sake_compute_mic(const u8 *tek_auth, 98 const u8 *rand_s, const u8 *rand_p, 99 const u8 *serverid, size_t serverid_len, 100 const u8 *peerid, size_t peerid_len, 101 int peer, const u8 *eap, size_t eap_len, 102 const u8 *mic_pos, u8 *mic); 103 104#endif /* EAP_SAKE_COMMON_H */ 105