Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 1 | /* |
| 2 | * WPA Supplicant - PeerKey for Direct Link Setup (DLS) |
| 3 | * Copyright (c) 2006-2008, Jouni Malinen <j@w1.fi> |
| 4 | * |
Dmitry Shmidt | c5ec7f5 | 2012-03-06 16:33:24 -0800 | [diff] [blame^] | 5 | * This software may be distributed under the terms of the BSD license. |
| 6 | * See README for more details. |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 7 | */ |
| 8 | |
| 9 | #ifndef PEERKEY_H |
| 10 | #define PEERKEY_H |
| 11 | |
| 12 | #define PEERKEY_MAX_IE_LEN 80 |
| 13 | struct wpa_peerkey { |
| 14 | struct wpa_peerkey *next; |
| 15 | int initiator; /* whether this end was initator for SMK handshake */ |
| 16 | u8 addr[ETH_ALEN]; /* other end MAC address */ |
| 17 | u8 inonce[WPA_NONCE_LEN]; /* Initiator Nonce */ |
| 18 | u8 pnonce[WPA_NONCE_LEN]; /* Peer Nonce */ |
| 19 | u8 rsnie_i[PEERKEY_MAX_IE_LEN]; /* Initiator RSN IE */ |
| 20 | size_t rsnie_i_len; |
| 21 | u8 rsnie_p[PEERKEY_MAX_IE_LEN]; /* Peer RSN IE */ |
| 22 | size_t rsnie_p_len; |
| 23 | u8 smk[PMK_LEN]; |
| 24 | int smk_complete; |
| 25 | u8 smkid[PMKID_LEN]; |
| 26 | u32 lifetime; |
| 27 | os_time_t expiration; |
| 28 | int cipher; /* Selected cipher (WPA_CIPHER_*) */ |
| 29 | u8 replay_counter[WPA_REPLAY_COUNTER_LEN]; |
| 30 | int replay_counter_set; |
| 31 | int use_sha256; /* whether AKMP indicate SHA256-based derivations */ |
| 32 | |
| 33 | struct wpa_ptk stk, tstk; |
| 34 | int stk_set, tstk_set; |
| 35 | }; |
| 36 | |
| 37 | |
| 38 | #ifdef CONFIG_PEERKEY |
| 39 | |
| 40 | int peerkey_verify_eapol_key_mic(struct wpa_sm *sm, |
| 41 | struct wpa_peerkey *peerkey, |
| 42 | struct wpa_eapol_key *key, u16 ver, |
| 43 | const u8 *buf, size_t len); |
| 44 | void peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, |
| 45 | struct wpa_eapol_key *key, u16 key_info, u16 ver); |
| 46 | void peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, |
| 47 | struct wpa_eapol_key *key, size_t extra_len, |
| 48 | u16 key_info, u16 ver); |
| 49 | void peerkey_deinit(struct wpa_sm *sm); |
| 50 | |
| 51 | #else /* CONFIG_PEERKEY */ |
| 52 | |
| 53 | static inline int |
| 54 | peerkey_verify_eapol_key_mic(struct wpa_sm *sm, |
| 55 | struct wpa_peerkey *peerkey, |
| 56 | struct wpa_eapol_key *key, u16 ver, |
| 57 | const u8 *buf, size_t len) |
| 58 | { |
| 59 | return -1; |
| 60 | } |
| 61 | |
| 62 | static inline void |
| 63 | peerkey_rx_eapol_4way(struct wpa_sm *sm, struct wpa_peerkey *peerkey, |
| 64 | struct wpa_eapol_key *key, u16 key_info, u16 ver) |
| 65 | { |
| 66 | } |
| 67 | |
| 68 | static inline void |
| 69 | peerkey_rx_eapol_smk(struct wpa_sm *sm, const u8 *src_addr, |
| 70 | struct wpa_eapol_key *key, size_t extra_len, |
| 71 | u16 key_info, u16 ver) |
| 72 | { |
| 73 | } |
| 74 | |
| 75 | static inline void peerkey_deinit(struct wpa_sm *sm) |
| 76 | { |
| 77 | } |
| 78 | |
| 79 | #endif /* CONFIG_PEERKEY */ |
| 80 | |
| 81 | #endif /* PEERKEY_H */ |