1189251Ssam/* 2189251Ssam * EAP server/peer: EAP-PAX shared routines 3189251Ssam * Copyright (c) 2005-2007, Jouni Malinen <j@w1.fi> 4189251Ssam * 5252726Srpaulo * This software may be distributed under the terms of the BSD license. 6252726Srpaulo * See README for more details. 7189251Ssam */ 8189251Ssam 9189251Ssam#ifndef EAP_PAX_COMMON_H 10189251Ssam#define EAP_PAX_COMMON_H 11189251Ssam 12189251Ssam#ifdef _MSC_VER 13189251Ssam#pragma pack(push, 1) 14189251Ssam#endif /* _MSC_VER */ 15189251Ssam 16189251Ssamstruct eap_pax_hdr { 17189251Ssam u8 op_code; 18189251Ssam u8 flags; 19189251Ssam u8 mac_id; 20189251Ssam u8 dh_group_id; 21189251Ssam u8 public_key_id; 22189251Ssam /* Followed by variable length payload and ICV */ 23189251Ssam} STRUCT_PACKED; 24189251Ssam 25189251Ssam#ifdef _MSC_VER 26189251Ssam#pragma pack(pop) 27189251Ssam#endif /* _MSC_VER */ 28189251Ssam 29189251Ssam 30189251Ssam/* op_code: */ 31189251Ssamenum { 32189251Ssam EAP_PAX_OP_STD_1 = 0x01, 33189251Ssam EAP_PAX_OP_STD_2 = 0x02, 34189251Ssam EAP_PAX_OP_STD_3 = 0x03, 35189251Ssam EAP_PAX_OP_SEC_1 = 0x11, 36189251Ssam EAP_PAX_OP_SEC_2 = 0x12, 37189251Ssam EAP_PAX_OP_SEC_3 = 0x13, 38189251Ssam EAP_PAX_OP_SEC_4 = 0x14, 39189251Ssam EAP_PAX_OP_SEC_5 = 0x15, 40189251Ssam EAP_PAX_OP_ACK = 0x21 41189251Ssam}; 42189251Ssam 43189251Ssam/* flags: */ 44189251Ssam#define EAP_PAX_FLAGS_MF 0x01 45189251Ssam#define EAP_PAX_FLAGS_CE 0x02 46189251Ssam#define EAP_PAX_FLAGS_AI 0x04 47189251Ssam 48189251Ssam/* mac_id: */ 49189251Ssam#define EAP_PAX_MAC_HMAC_SHA1_128 0x01 50189251Ssam#define EAP_PAX_HMAC_SHA256_128 0x02 51189251Ssam 52189251Ssam/* dh_group_id: */ 53189251Ssam#define EAP_PAX_DH_GROUP_NONE 0x00 54189251Ssam#define EAP_PAX_DH_GROUP_2048_MODP 0x01 55189251Ssam#define EAP_PAX_DH_GROUP_3072_MODP 0x02 56189251Ssam#define EAP_PAX_DH_GROUP_NIST_ECC_P_256 0x03 57189251Ssam 58189251Ssam/* public_key_id: */ 59189251Ssam#define EAP_PAX_PUBLIC_KEY_NONE 0x00 60189251Ssam#define EAP_PAX_PUBLIC_KEY_RSAES_OAEP 0x01 61189251Ssam#define EAP_PAX_PUBLIC_KEY_RSA_PKCS1_V1_5 0x02 62189251Ssam#define EAP_PAX_PUBLIC_KEY_EL_GAMAL_NIST_ECC 0x03 63189251Ssam 64189251Ssam/* ADE type: */ 65189251Ssam#define EAP_PAX_ADE_VENDOR_SPECIFIC 0x01 66189251Ssam#define EAP_PAX_ADE_CLIENT_CHANNEL_BINDING 0x02 67189251Ssam#define EAP_PAX_ADE_SERVER_CHANNEL_BINDING 0x03 68189251Ssam 69189251Ssam 70189251Ssam#define EAP_PAX_RAND_LEN 32 71189251Ssam#define EAP_PAX_MAC_LEN 16 72189251Ssam#define EAP_PAX_ICV_LEN 16 73189251Ssam#define EAP_PAX_AK_LEN 16 74189251Ssam#define EAP_PAX_MK_LEN 16 75189251Ssam#define EAP_PAX_CK_LEN 16 76189251Ssam#define EAP_PAX_ICK_LEN 16 77189251Ssam 78189251Ssam 79189251Ssamint eap_pax_kdf(u8 mac_id, const u8 *key, size_t key_len, 80189251Ssam const char *identifier, 81189251Ssam const u8 *entropy, size_t entropy_len, 82189251Ssam size_t output_len, u8 *output); 83189251Ssamint eap_pax_mac(u8 mac_id, const u8 *key, size_t key_len, 84189251Ssam const u8 *data1, size_t data1_len, 85189251Ssam const u8 *data2, size_t data2_len, 86189251Ssam const u8 *data3, size_t data3_len, 87189251Ssam u8 *mac); 88189251Ssamint eap_pax_initial_key_derivation(u8 mac_id, const u8 *ak, const u8 *e, 89189251Ssam u8 *mk, u8 *ck, u8 *ick); 90189251Ssam 91189251Ssam#endif /* EAP_PAX_COMMON_H */ 92