[Feature]Upload Modem source code

Change-Id: Id4294f30faced84d3e6fd6d5e61e1111bf287a37
diff --git a/mcu/interface/protocol/as_c2k/common/secapi.h b/mcu/interface/protocol/as_c2k/common/secapi.h
new file mode 100644
index 0000000..94779bc
--- /dev/null
+++ b/mcu/interface/protocol/as_c2k/common/secapi.h
@@ -0,0 +1,243 @@
+/*****************************************************************************
+*  Copyright Statement:
+*  --------------------
+*  This software is protected by Copyright and the information contained
+*  herein is confidential. The software may not be copied and the information
+*  contained herein may not be used or disclosed except with the written
+*  permission of MediaTek Inc. (C) 2016
+*
+*  BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES
+*  THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS (""MEDIATEK SOFTWARE"")
+*  RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON
+*  AN ""AS-IS"" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES,
+*  EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
+*  MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.
+*  NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE
+*  SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR
+*  SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH
+*  THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO
+*  NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S
+*  SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM.
+*
+*  BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE
+*  LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE,
+*  AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE,
+*  OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO
+*  MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE.
+*
+*  THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE
+*  WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF
+*  LAWS PRINCIPLES.  ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND
+*  RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER
+*  THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC).
+*
+*****************************************************************************/
+/*************************************************************
+*
+* This Software is the property of VIA Telecom, Inc. and may only be used pursuant to a license from VIA Telecom, Inc.  
+* 
+* Any unauthorized use inconsistent with the terms of such license is strictly prohibited.
+* 
+* Copyright (c) 2002-2010 VIA Telecom, Inc.  All rights reserved.
+*
+*************************************************************/
+/*****************************************************************************
+* 
+* FILE NAME   : secapi.h
+*
+* DESCRIPTION : API definition for SEC  task.
+*
+* HISTORY     :
+*****************************************************************************/
+#ifndef _SECAPI_H_
+#define _SECAPI_H_
+
+/*----------------------------------------------------------------------------
+ Include Files
+----------------------------------------------------------------------------*/
+#include "syscommon.h"
+#include "hlpapi.h"
+#ifdef CBP7_EHRPD
+#define EAP_AKA_PRIME 1
+#endif
+/*----------------------------------------------------------------------------
+ Global Defines and Macros
+----------------------------------------------------------------------------*/
+
+/*----------------------------------------------------------------------------
+ Mailbox IDs
+----------------------------------------------------------------------------*/
+#define SEC_CMD_MAILBOX         EXE_MAILBOX_1_ID
+
+/*----------------------------------------------------------------------------
+     Command Message IDs, for SEC task, for SEC_CMD_MAILBOX, EXE_MAILBOX_1_ID
+     The messages IDs for components shall also be put in here.     
+----------------------------------------------------------------------------*/
+#include "secmsg.h"
+
+#ifdef CBP7_EHRPD
+typedef struct {
+   kal_uint8 *key;
+   kal_uint8 keyLen;
+   kal_uint8 *rand;
+   kal_uint16 randLen;
+   kal_uint8 *autn;
+   kal_uint16 autnLen;
+   kal_uint8 *res;
+   kal_uint16 resLen;
+   kal_uint8 *ik;
+   kal_uint16 ikLen;
+   kal_uint8 *ck;
+   kal_uint16 ckLen;
+   kal_uint8 *auts;
+   kal_uint16 autsLen;
+#if EAP_AKA_PRIME
+   kal_uint16 kdf[1];
+   kal_uint16 bidding;
+#endif
+  ExeRspMsgT RspInfo;
+}SecAkaAuthReqMsgT;
+
+typedef struct {
+   kal_uint8 *identity;
+   kal_uint16 identityLen;
+   kal_uint8 *autn;
+   kal_uint16 autnLen;
+   kal_uint8 *ck;
+   kal_uint16 ckLen;
+   kal_uint8 *ik;
+   kal_uint16 ikLen; 
+   kal_uint8 *mk;
+   kal_uint16 mkLen;
+   kal_bool bNeedCKIKDerive;
+   ExeRspMsgT RspInfo;
+}SecAkaDeriveMKReqMsgT;
+
+typedef struct {
+   kal_uint8 *identity;
+   kal_uint16 identityLen;
+   kal_uint8 *counter;
+   kal_uint16 counterLen;
+   kal_uint8 *nonces;
+   kal_uint16 noncesLen; 
+   kal_uint8 *mk;
+   kal_uint16 mkLen;
+   kal_uint8 *Xkey;
+   kal_uint16 XKeyLen;
+   ExeRspMsgT RspInfo;
+}SecAkaDeriveReauthXKeyReqMsgT;
+
+#if EAP_AKA_PRIME
+typedef struct {
+   kal_uint8 *identity;
+   kal_uint16 identityLen;
+   kal_uint8 *counter;
+   kal_uint16 counterLen;
+   kal_uint8 *nonces;
+   kal_uint16 noncesLen; 
+   kal_uint8 *k_re;
+   kal_uint16 k_reLen;
+   kal_uint8 *mk;
+   kal_uint16 mkLen;
+   ExeRspMsgT RspInfo;
+}SecAkaPrimeDeriveReauthMkReqMsgT;
+#endif
+
+typedef struct {
+   kal_uint8 *Key;
+   kal_uint8 *xOut;
+   kal_uint16 xOutLen;
+   ExeRspMsgT RspInfo;
+}SecAkaDeriveMskReqMsgT;
+
+typedef struct {
+   kal_uint8 *key;
+   kal_uint8 *addr1;
+   kal_uint8 *addr2;
+   kal_uint8 *mac;
+   kal_uint8 keyLen; 
+   kal_uint8 addrLen1;
+   kal_uint8 addrLen2;
+   kal_uint8 macLen;
+   ExeRspMsgT RspInfo;
+} SecAkaDeriveMacReqMsgT;
+
+typedef struct {
+   kal_uint8  *msk;
+   kal_uint16 mskLen;
+   kal_uint8 *key;
+   kal_uint16 keyLen;
+   kal_uint8 *pmk;
+   kal_uint16 pmkLen;
+   ExeRspMsgT RspInfo;
+} SecAkaDerivePmkReqMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 rand[HLP_AKA_RAND_LEN];
+   kal_uint8 autn[HLP_AKA_AUTN_LEN];
+} SecAkaAuthReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 identity[HLP_MN_NAI_MAX_SIZE];
+   kal_uint8 ck[EAP_AKA_CK_LEN];
+   kal_uint8 ik[EAP_AKA_IK_LEN];
+} SecAkaDeriveMkReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 identity[HLP_MN_NAI_MAX_SIZE];
+   kal_uint8 counter[2];
+   kal_uint8 nonces[EAP_AKA_NONCE_S_LEN];
+   kal_uint8 mk[EAP_AKA_MK_LEN];
+}SecAkaDeriveReauthXKeyReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 mk[EAP_AKA_MK_LEN]; 
+} SecAkaDeriveMskReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 key[EAP_AKA_K_AUT_LEN];
+   kal_uint8 MsgBodyLen;
+   kal_uint8 MsgBody[100];
+   kal_uint8 ExtraMsgBodyLen;
+   kal_uint8 ExtraMsgBody[100];
+} SecAkaDeriveMacReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_uint8 key[EAP_AKA_K_AUT_LEN];
+   kal_uint8  msk[EAP_AKA_K_AUT_LEN];
+} SecAkaDerivePmkReqTestMsgT;
+
+typedef struct {
+   ExeRspMsgT RspInfo;
+   kal_bool  bEncrypt;   /*0 - encrypt, 1 - decrypt*/
+   kal_uint8 key[EAP_AKA_K_ENCR_LEN]; 
+   kal_uint8 iv[EAP_AKA_IV_LEN]; 
+} SecAkaAesCryptReqTestMsgT;
+
+typedef struct {
+   kal_uint8 authkey[16];
+   kal_uint8 op[16];
+} SecAkaEtsSetAuthKeyMsgT;
+#endif
+
+typedef struct {
+   kal_bool  bEncrypt;   /*KAL_TRUE - encrypt, KAL_FALSE - decrypt*/
+   kal_uint8 *key; 
+   kal_uint8 *iv; 
+   kal_uint8 *data; 
+   kal_uint16 dataLen;
+   ExeRspMsgT RspInfo;
+}SecAkaAesCryptReqMsgT;
+
+/*****************************************************************************
+* End of File
+*****************************************************************************/
+#endif 
+
+