82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson * Copyright 2009 Sun Microsystems, Inc. All rights reserved.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Use is subject to license terms.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Copyright (c) 2001 Atsushi Onoe
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Copyright (c) 2002-2005 Sam Leffler, Errno Consulting
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * All rights reserved.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Redistribution and use in source and binary forms, with or without
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * modification, are permitted provided that the following conditions
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * are met:
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 1. Redistributions of source code must retain the above copyright
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * notice, this list of conditions and the following disclaimer.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 2. Redistributions in binary form must reproduce the above copyright
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * notice, this list of conditions and the following disclaimer in the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * documentation and/or other materials provided with the distribution.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 3. The name of the author may not be used to endorse or promote products
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * derived from this software without specific prior written permission.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Alternatively, this software may be distributed under the terms of the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * GNU General Public License ("GPL") version 2 as published by the Free
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Software Foundation.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 802.11 protocol crypto-related definitions.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcextern "C" {
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * Max size of optional information elements. We artificially
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * constrain this; it's limited only by the max frame size (and
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf * the max parameter size of the wireless extensions).
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_DISASSOC 2 /* disassociate station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_DEAUTH 3 /* deauthenticate station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_AUTHORIZE 4 /* authorize station */
fb91fd8a302dfb13e250bbefb6a3970c2edc3ae3zf#define IEEE80211_MLME_UNAUTHORIZE 5 /* unauthorize station */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * NB: these values are ordered carefully; there are lots of
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * of implications in any reordering.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Maxmium length of key in bytes
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * WEP key length present in the 802.11 standard is 40-bit.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Many implementations also support 104-bit WEP keys.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * 802.11i standardize TKIP/CCMP use 128-bit key
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_MICBUF_SIZE (8+8) /* space for both tx+rx keys */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/* Key Flags */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_GROUP /* key used for WPA group operation */ \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_SWCRYPT 0x10 /* host-based encrypt/decrypt */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_SWMIC 0x20 /* host-based enmic/demic */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#define IEEE80211_KEY_COMMON /* common flags passed in by apps */ \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (IEEE80211_KEY_XMIT | IEEE80211_KEY_RECV | IEEE80211_KEY_GROUP)
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 802.11i defines an extended IV for use with non-WEP ciphers.
a399b7655a1d835aa8606c2b29e4e777baac8635zf * When the EXTIV bit is set in the key id byte an additional
a399b7655a1d835aa8606c2b29e4e777baac8635zf * 4 bytes immediately follow the IV for TKIP. For CCMP the
a399b7655a1d835aa8606c2b29e4e777baac8635zf * EXTIV bit is likewise set but the 8 bytes represent the
a399b7655a1d835aa8606c2b29e4e777baac8635zf * CCMP header rather than IV+extended-IV.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc (sizeof (struct ieee80211_frame) + \
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc/* Maximum number of keys */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Template for a supported cipher. Ciphers register with the
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * crypto code.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_attach - Initialize cipher. The return value is set to wk_private
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_detach - Destruct a cipher.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_setkey - Validate key contents
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_encap - Encrypt the 802.11 MAC payload
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_decap - Decrypt the 802.11 MAC payload
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_enmic - Add MIC
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * ic_demic - Check and remove MIC
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint32_t ic_trailer; /* size of privacy trailer (bytes) */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_decap)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_enmic)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc int32_t (*ic_demic)(struct ieee80211_key *, mblk_t *, int);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcextern const struct ieee80211_cipher ieee80211_cipher_none;
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc uint8_t wk_key[IEEE80211_KEYBUF_SIZE+IEEE80211_MICBUF_SIZE];
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix wk_rxkeyix; /* optional h/w rx key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Crypto state kept in each ieee80211com.
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc ieee80211_keyix cs_def_txkey; /* default/group tx key index */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc const struct ieee80211_key *,
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc * Key update synchronization methods.
239e91abc172c1397b1e94869c5d0e8ab67bfc22hx const struct ieee80211_cipher *);
239e91abc172c1397b1e94869c5d0e8ab67bfc22hx const struct ieee80211_cipher *);
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxcvoid ieee80211_crypto_resetkey(struct ieee80211com *, struct ieee80211_key *,
82a2fc4751cef28c0bdc327d02012bf8796083b9James Carlson#endif /* _KERNEL */
0ba2cbe97e0678a691742f98d2532caed0a2c4aaxc#endif /* _SYS_NET80211_CRYPTO_H */