rjw | 6c1fd8f | 2022-11-30 14:33:01 +0800 | [diff] [blame] | 1 | /***************************************************************************** |
| 2 | * Copyright Statement: |
| 3 | * -------------------- |
| 4 | * This software is protected by Copyright and the information contained |
| 5 | * herein is confidential. The software may not be copied and the information |
| 6 | * contained herein may not be used or disclosed except with the written |
| 7 | * permission of MediaTek Inc. (C) 2016 |
| 8 | * |
| 9 | * BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES |
| 10 | * THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS (""MEDIATEK SOFTWARE"") |
| 11 | * RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON |
| 12 | * AN ""AS-IS"" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES, |
| 13 | * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF |
| 14 | * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. |
| 15 | * NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE |
| 16 | * SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR |
| 17 | * SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH |
| 18 | * THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO |
| 19 | * NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S |
| 20 | * SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM. |
| 21 | * |
| 22 | * BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE |
| 23 | * LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE, |
| 24 | * AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE, |
| 25 | * OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO |
| 26 | * MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE. |
| 27 | * |
| 28 | * THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE |
| 29 | * WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF |
| 30 | * LAWS PRINCIPLES. ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND |
| 31 | * RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER |
| 32 | * THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC). |
| 33 | * |
| 34 | *****************************************************************************/ |
| 35 | /************************************************************* |
| 36 | * |
| 37 | * This Software is the property of VIA Telecom, Inc. and may only be used pursuant to a license from VIA Telecom, Inc. |
| 38 | * |
| 39 | * Any unauthorized use inconsistent with the terms of such license is strictly prohibited. |
| 40 | * |
| 41 | * Copyright (c) 2002-2010 VIA Telecom, Inc. All rights reserved. |
| 42 | * |
| 43 | *************************************************************/ |
| 44 | /***************************************************************************** |
| 45 | * |
| 46 | * FILE NAME : secapi.h |
| 47 | * |
| 48 | * DESCRIPTION : API definition for SEC task. |
| 49 | * |
| 50 | * HISTORY : |
| 51 | *****************************************************************************/ |
| 52 | #ifndef _SECAPI_H_ |
| 53 | #define _SECAPI_H_ |
| 54 | |
| 55 | /*---------------------------------------------------------------------------- |
| 56 | Include Files |
| 57 | ----------------------------------------------------------------------------*/ |
| 58 | #include "syscommon.h" |
| 59 | #include "hlpapi.h" |
| 60 | #ifdef CBP7_EHRPD |
| 61 | #define EAP_AKA_PRIME 1 |
| 62 | #endif |
| 63 | /*---------------------------------------------------------------------------- |
| 64 | Global Defines and Macros |
| 65 | ----------------------------------------------------------------------------*/ |
| 66 | |
| 67 | /*---------------------------------------------------------------------------- |
| 68 | Mailbox IDs |
| 69 | ----------------------------------------------------------------------------*/ |
| 70 | #define SEC_CMD_MAILBOX EXE_MAILBOX_1_ID |
| 71 | |
| 72 | /*---------------------------------------------------------------------------- |
| 73 | Command Message IDs, for SEC task, for SEC_CMD_MAILBOX, EXE_MAILBOX_1_ID |
| 74 | The messages IDs for components shall also be put in here. |
| 75 | ----------------------------------------------------------------------------*/ |
| 76 | #include "secmsg.h" |
| 77 | |
| 78 | #ifdef CBP7_EHRPD |
| 79 | typedef struct { |
| 80 | kal_uint8 *key; |
| 81 | kal_uint8 keyLen; |
| 82 | kal_uint8 *rand; |
| 83 | kal_uint16 randLen; |
| 84 | kal_uint8 *autn; |
| 85 | kal_uint16 autnLen; |
| 86 | kal_uint8 *res; |
| 87 | kal_uint16 resLen; |
| 88 | kal_uint8 *ik; |
| 89 | kal_uint16 ikLen; |
| 90 | kal_uint8 *ck; |
| 91 | kal_uint16 ckLen; |
| 92 | kal_uint8 *auts; |
| 93 | kal_uint16 autsLen; |
| 94 | #if EAP_AKA_PRIME |
| 95 | kal_uint16 kdf[1]; |
| 96 | kal_uint16 bidding; |
| 97 | #endif |
| 98 | ExeRspMsgT RspInfo; |
| 99 | }SecAkaAuthReqMsgT; |
| 100 | |
| 101 | typedef struct { |
| 102 | kal_uint8 *identity; |
| 103 | kal_uint16 identityLen; |
| 104 | kal_uint8 *autn; |
| 105 | kal_uint16 autnLen; |
| 106 | kal_uint8 *ck; |
| 107 | kal_uint16 ckLen; |
| 108 | kal_uint8 *ik; |
| 109 | kal_uint16 ikLen; |
| 110 | kal_uint8 *mk; |
| 111 | kal_uint16 mkLen; |
| 112 | kal_bool bNeedCKIKDerive; |
| 113 | ExeRspMsgT RspInfo; |
| 114 | }SecAkaDeriveMKReqMsgT; |
| 115 | |
| 116 | typedef struct { |
| 117 | kal_uint8 *identity; |
| 118 | kal_uint16 identityLen; |
| 119 | kal_uint8 *counter; |
| 120 | kal_uint16 counterLen; |
| 121 | kal_uint8 *nonces; |
| 122 | kal_uint16 noncesLen; |
| 123 | kal_uint8 *mk; |
| 124 | kal_uint16 mkLen; |
| 125 | kal_uint8 *Xkey; |
| 126 | kal_uint16 XKeyLen; |
| 127 | ExeRspMsgT RspInfo; |
| 128 | }SecAkaDeriveReauthXKeyReqMsgT; |
| 129 | |
| 130 | #if EAP_AKA_PRIME |
| 131 | typedef struct { |
| 132 | kal_uint8 *identity; |
| 133 | kal_uint16 identityLen; |
| 134 | kal_uint8 *counter; |
| 135 | kal_uint16 counterLen; |
| 136 | kal_uint8 *nonces; |
| 137 | kal_uint16 noncesLen; |
| 138 | kal_uint8 *k_re; |
| 139 | kal_uint16 k_reLen; |
| 140 | kal_uint8 *mk; |
| 141 | kal_uint16 mkLen; |
| 142 | ExeRspMsgT RspInfo; |
| 143 | }SecAkaPrimeDeriveReauthMkReqMsgT; |
| 144 | #endif |
| 145 | |
| 146 | typedef struct { |
| 147 | kal_uint8 *Key; |
| 148 | kal_uint8 *xOut; |
| 149 | kal_uint16 xOutLen; |
| 150 | ExeRspMsgT RspInfo; |
| 151 | }SecAkaDeriveMskReqMsgT; |
| 152 | |
| 153 | typedef struct { |
| 154 | kal_uint8 *key; |
| 155 | kal_uint8 *addr1; |
| 156 | kal_uint8 *addr2; |
| 157 | kal_uint8 *mac; |
| 158 | kal_uint8 keyLen; |
| 159 | kal_uint8 addrLen1; |
| 160 | kal_uint8 addrLen2; |
| 161 | kal_uint8 macLen; |
| 162 | ExeRspMsgT RspInfo; |
| 163 | } SecAkaDeriveMacReqMsgT; |
| 164 | |
| 165 | typedef struct { |
| 166 | kal_uint8 *msk; |
| 167 | kal_uint16 mskLen; |
| 168 | kal_uint8 *key; |
| 169 | kal_uint16 keyLen; |
| 170 | kal_uint8 *pmk; |
| 171 | kal_uint16 pmkLen; |
| 172 | ExeRspMsgT RspInfo; |
| 173 | } SecAkaDerivePmkReqMsgT; |
| 174 | |
| 175 | typedef struct { |
| 176 | ExeRspMsgT RspInfo; |
| 177 | kal_uint8 rand[HLP_AKA_RAND_LEN]; |
| 178 | kal_uint8 autn[HLP_AKA_AUTN_LEN]; |
| 179 | } SecAkaAuthReqTestMsgT; |
| 180 | |
| 181 | typedef struct { |
| 182 | ExeRspMsgT RspInfo; |
| 183 | kal_uint8 identity[HLP_MN_NAI_MAX_SIZE]; |
| 184 | kal_uint8 ck[EAP_AKA_CK_LEN]; |
| 185 | kal_uint8 ik[EAP_AKA_IK_LEN]; |
| 186 | } SecAkaDeriveMkReqTestMsgT; |
| 187 | |
| 188 | typedef struct { |
| 189 | ExeRspMsgT RspInfo; |
| 190 | kal_uint8 identity[HLP_MN_NAI_MAX_SIZE]; |
| 191 | kal_uint8 counter[2]; |
| 192 | kal_uint8 nonces[EAP_AKA_NONCE_S_LEN]; |
| 193 | kal_uint8 mk[EAP_AKA_MK_LEN]; |
| 194 | }SecAkaDeriveReauthXKeyReqTestMsgT; |
| 195 | |
| 196 | typedef struct { |
| 197 | ExeRspMsgT RspInfo; |
| 198 | kal_uint8 mk[EAP_AKA_MK_LEN]; |
| 199 | } SecAkaDeriveMskReqTestMsgT; |
| 200 | |
| 201 | typedef struct { |
| 202 | ExeRspMsgT RspInfo; |
| 203 | kal_uint8 key[EAP_AKA_K_AUT_LEN]; |
| 204 | kal_uint8 MsgBodyLen; |
| 205 | kal_uint8 MsgBody[100]; |
| 206 | kal_uint8 ExtraMsgBodyLen; |
| 207 | kal_uint8 ExtraMsgBody[100]; |
| 208 | } SecAkaDeriveMacReqTestMsgT; |
| 209 | |
| 210 | typedef struct { |
| 211 | ExeRspMsgT RspInfo; |
| 212 | kal_uint8 key[EAP_AKA_K_AUT_LEN]; |
| 213 | kal_uint8 msk[EAP_AKA_K_AUT_LEN]; |
| 214 | } SecAkaDerivePmkReqTestMsgT; |
| 215 | |
| 216 | typedef struct { |
| 217 | ExeRspMsgT RspInfo; |
| 218 | kal_bool bEncrypt; /*0 - encrypt, 1 - decrypt*/ |
| 219 | kal_uint8 key[EAP_AKA_K_ENCR_LEN]; |
| 220 | kal_uint8 iv[EAP_AKA_IV_LEN]; |
| 221 | } SecAkaAesCryptReqTestMsgT; |
| 222 | |
| 223 | typedef struct { |
| 224 | kal_uint8 authkey[16]; |
| 225 | kal_uint8 op[16]; |
| 226 | } SecAkaEtsSetAuthKeyMsgT; |
| 227 | #endif |
| 228 | |
| 229 | typedef struct { |
| 230 | kal_bool bEncrypt; /*KAL_TRUE - encrypt, KAL_FALSE - decrypt*/ |
| 231 | kal_uint8 *key; |
| 232 | kal_uint8 *iv; |
| 233 | kal_uint8 *data; |
| 234 | kal_uint16 dataLen; |
| 235 | ExeRspMsgT RspInfo; |
| 236 | }SecAkaAesCryptReqMsgT; |
| 237 | |
| 238 | /***************************************************************************** |
| 239 | * End of File |
| 240 | *****************************************************************************/ |
| 241 | #endif |
| 242 | |
| 243 | |