1/*
2 * EAP server/peer: EAP-SAKE shared routines
3 * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
4 *
5 * This program is free software; you can redistribute it and/or modify
6 * it under the terms of the GNU General Public License version 2 as
7 * published by the Free Software Foundation.
8 *
9 * Alternatively, this software may be distributed under the terms of BSD
10 * license.
11 *
12 * See README and COPYING for more details.
13 */
14
15#ifndef EAP_SAKE_COMMON_H
16#define EAP_SAKE_COMMON_H
17
18#define EAP_SAKE_VERSION 2
19
20#define EAP_SAKE_SUBTYPE_CHALLENGE 1
21#define EAP_SAKE_SUBTYPE_CONFIRM 2
22#define EAP_SAKE_SUBTYPE_AUTH_REJECT 3
23#define EAP_SAKE_SUBTYPE_IDENTITY 4
24
25#define EAP_SAKE_AT_RAND_S 1
26#define EAP_SAKE_AT_RAND_P 2
27#define EAP_SAKE_AT_MIC_S 3
28#define EAP_SAKE_AT_MIC_P 4
29#define EAP_SAKE_AT_SERVERID 5
30#define EAP_SAKE_AT_PEERID 6
31#define EAP_SAKE_AT_SPI_S 7
32#define EAP_SAKE_AT_SPI_P 8
33#define EAP_SAKE_AT_ANY_ID_REQ 9
34#define EAP_SAKE_AT_PERM_ID_REQ 10
35#define EAP_SAKE_AT_ENCR_DATA 128
36#define EAP_SAKE_AT_IV 129
37#define EAP_SAKE_AT_PADDING 130
38#define EAP_SAKE_AT_NEXT_TMPID 131
39#define EAP_SAKE_AT_MSK_LIFE 132
40
41#define EAP_SAKE_RAND_LEN 16
42#define EAP_SAKE_MIC_LEN 16
43#define EAP_SAKE_ROOT_SECRET_LEN 16
44#define EAP_SAKE_SMS_LEN 16
45#define EAP_SAKE_TEK_AUTH_LEN 16
46#define EAP_SAKE_TEK_CIPHER_LEN 16
47#define EAP_SAKE_TEK_LEN (EAP_SAKE_TEK_AUTH_LEN + EAP_SAKE_TEK_CIPHER_LEN)
48
49#ifdef _MSC_VER
50#pragma pack(push, 1)
51#endif /* _MSC_VER */
52
53struct eap_sake_hdr {
54	u8 version; /* EAP_SAKE_VERSION */
55	u8 session_id;
56	u8 subtype;
57} STRUCT_PACKED;
58
59#ifdef _MSC_VER
60#pragma pack(pop)
61#endif /* _MSC_VER */
62
63
64struct eap_sake_parse_attr {
65	const u8 *rand_s;
66	const u8 *rand_p;
67	const u8 *mic_s;
68	const u8 *mic_p;
69	const u8 *serverid;
70	size_t serverid_len;
71	const u8 *peerid;
72	size_t peerid_len;
73	const u8 *spi_s;
74	size_t spi_s_len;
75	const u8 *spi_p;
76	size_t spi_p_len;
77	const u8 *any_id_req;
78	const u8 *perm_id_req;
79	const u8 *encr_data;
80	size_t encr_data_len;
81	const u8 *iv;
82	size_t iv_len;
83	const u8 *next_tmpid;
84	size_t next_tmpid_len;
85	const u8 *msk_life;
86};
87
88int eap_sake_parse_attributes(const u8 *buf, size_t len,
89			      struct eap_sake_parse_attr *attr);
90void eap_sake_derive_keys(const u8 *root_secret_a, const u8 *root_secret_b,
91			  const u8 *rand_s, const u8 *rand_p,
92			  u8 *tek, u8 *msk, u8 *emsk);
93int eap_sake_compute_mic(const u8 *tek_auth,
94			 const u8 *rand_s, const u8 *rand_p,
95			 const u8 *serverid, size_t serverid_len,
96			 const u8 *peerid, size_t peerid_len,
97			 int peer, const u8 *eap, size_t eap_len,
98			 const u8 *mic_pos, u8 *mic);
99void eap_sake_add_attr(struct wpabuf *buf, u8 type, const u8 *data,
100		       size_t len);
101
102#endif /* EAP_SAKE_COMMON_H */
103