blob: 94779bc822d1206eb909567a8ce8a4ef441851fd [file] [log] [blame]
rjw6c1fd8f2022-11-30 14:33:01 +08001/*****************************************************************************
2* Copyright Statement:
3* --------------------
4* This software is protected by Copyright and the information contained
5* herein is confidential. The software may not be copied and the information
6* contained herein may not be used or disclosed except with the written
7* permission of MediaTek Inc. (C) 2016
8*
9* BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES
10* THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS (""MEDIATEK SOFTWARE"")
11* RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON
12* AN ""AS-IS"" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES,
13* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
14* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.
15* NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE
16* SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR
17* SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH
18* THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO
19* NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S
20* SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM.
21*
22* BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE
23* LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE,
24* AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE,
25* OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO
26* MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE.
27*
28* THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE
29* WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF
30* LAWS PRINCIPLES. ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND
31* RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER
32* THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC).
33*
34*****************************************************************************/
35/*************************************************************
36*
37* This Software is the property of VIA Telecom, Inc. and may only be used pursuant to a license from VIA Telecom, Inc.
38*
39* Any unauthorized use inconsistent with the terms of such license is strictly prohibited.
40*
41* Copyright (c) 2002-2010 VIA Telecom, Inc. All rights reserved.
42*
43*************************************************************/
44/*****************************************************************************
45*
46* FILE NAME : secapi.h
47*
48* DESCRIPTION : API definition for SEC task.
49*
50* HISTORY :
51*****************************************************************************/
52#ifndef _SECAPI_H_
53#define _SECAPI_H_
54
55/*----------------------------------------------------------------------------
56 Include Files
57----------------------------------------------------------------------------*/
58#include "syscommon.h"
59#include "hlpapi.h"
60#ifdef CBP7_EHRPD
61#define EAP_AKA_PRIME 1
62#endif
63/*----------------------------------------------------------------------------
64 Global Defines and Macros
65----------------------------------------------------------------------------*/
66
67/*----------------------------------------------------------------------------
68 Mailbox IDs
69----------------------------------------------------------------------------*/
70#define SEC_CMD_MAILBOX EXE_MAILBOX_1_ID
71
72/*----------------------------------------------------------------------------
73 Command Message IDs, for SEC task, for SEC_CMD_MAILBOX, EXE_MAILBOX_1_ID
74 The messages IDs for components shall also be put in here.
75----------------------------------------------------------------------------*/
76#include "secmsg.h"
77
78#ifdef CBP7_EHRPD
79typedef struct {
80 kal_uint8 *key;
81 kal_uint8 keyLen;
82 kal_uint8 *rand;
83 kal_uint16 randLen;
84 kal_uint8 *autn;
85 kal_uint16 autnLen;
86 kal_uint8 *res;
87 kal_uint16 resLen;
88 kal_uint8 *ik;
89 kal_uint16 ikLen;
90 kal_uint8 *ck;
91 kal_uint16 ckLen;
92 kal_uint8 *auts;
93 kal_uint16 autsLen;
94#if EAP_AKA_PRIME
95 kal_uint16 kdf[1];
96 kal_uint16 bidding;
97#endif
98 ExeRspMsgT RspInfo;
99}SecAkaAuthReqMsgT;
100
101typedef struct {
102 kal_uint8 *identity;
103 kal_uint16 identityLen;
104 kal_uint8 *autn;
105 kal_uint16 autnLen;
106 kal_uint8 *ck;
107 kal_uint16 ckLen;
108 kal_uint8 *ik;
109 kal_uint16 ikLen;
110 kal_uint8 *mk;
111 kal_uint16 mkLen;
112 kal_bool bNeedCKIKDerive;
113 ExeRspMsgT RspInfo;
114}SecAkaDeriveMKReqMsgT;
115
116typedef struct {
117 kal_uint8 *identity;
118 kal_uint16 identityLen;
119 kal_uint8 *counter;
120 kal_uint16 counterLen;
121 kal_uint8 *nonces;
122 kal_uint16 noncesLen;
123 kal_uint8 *mk;
124 kal_uint16 mkLen;
125 kal_uint8 *Xkey;
126 kal_uint16 XKeyLen;
127 ExeRspMsgT RspInfo;
128}SecAkaDeriveReauthXKeyReqMsgT;
129
130#if EAP_AKA_PRIME
131typedef struct {
132 kal_uint8 *identity;
133 kal_uint16 identityLen;
134 kal_uint8 *counter;
135 kal_uint16 counterLen;
136 kal_uint8 *nonces;
137 kal_uint16 noncesLen;
138 kal_uint8 *k_re;
139 kal_uint16 k_reLen;
140 kal_uint8 *mk;
141 kal_uint16 mkLen;
142 ExeRspMsgT RspInfo;
143}SecAkaPrimeDeriveReauthMkReqMsgT;
144#endif
145
146typedef struct {
147 kal_uint8 *Key;
148 kal_uint8 *xOut;
149 kal_uint16 xOutLen;
150 ExeRspMsgT RspInfo;
151}SecAkaDeriveMskReqMsgT;
152
153typedef struct {
154 kal_uint8 *key;
155 kal_uint8 *addr1;
156 kal_uint8 *addr2;
157 kal_uint8 *mac;
158 kal_uint8 keyLen;
159 kal_uint8 addrLen1;
160 kal_uint8 addrLen2;
161 kal_uint8 macLen;
162 ExeRspMsgT RspInfo;
163} SecAkaDeriveMacReqMsgT;
164
165typedef struct {
166 kal_uint8 *msk;
167 kal_uint16 mskLen;
168 kal_uint8 *key;
169 kal_uint16 keyLen;
170 kal_uint8 *pmk;
171 kal_uint16 pmkLen;
172 ExeRspMsgT RspInfo;
173} SecAkaDerivePmkReqMsgT;
174
175typedef struct {
176 ExeRspMsgT RspInfo;
177 kal_uint8 rand[HLP_AKA_RAND_LEN];
178 kal_uint8 autn[HLP_AKA_AUTN_LEN];
179} SecAkaAuthReqTestMsgT;
180
181typedef struct {
182 ExeRspMsgT RspInfo;
183 kal_uint8 identity[HLP_MN_NAI_MAX_SIZE];
184 kal_uint8 ck[EAP_AKA_CK_LEN];
185 kal_uint8 ik[EAP_AKA_IK_LEN];
186} SecAkaDeriveMkReqTestMsgT;
187
188typedef struct {
189 ExeRspMsgT RspInfo;
190 kal_uint8 identity[HLP_MN_NAI_MAX_SIZE];
191 kal_uint8 counter[2];
192 kal_uint8 nonces[EAP_AKA_NONCE_S_LEN];
193 kal_uint8 mk[EAP_AKA_MK_LEN];
194}SecAkaDeriveReauthXKeyReqTestMsgT;
195
196typedef struct {
197 ExeRspMsgT RspInfo;
198 kal_uint8 mk[EAP_AKA_MK_LEN];
199} SecAkaDeriveMskReqTestMsgT;
200
201typedef struct {
202 ExeRspMsgT RspInfo;
203 kal_uint8 key[EAP_AKA_K_AUT_LEN];
204 kal_uint8 MsgBodyLen;
205 kal_uint8 MsgBody[100];
206 kal_uint8 ExtraMsgBodyLen;
207 kal_uint8 ExtraMsgBody[100];
208} SecAkaDeriveMacReqTestMsgT;
209
210typedef struct {
211 ExeRspMsgT RspInfo;
212 kal_uint8 key[EAP_AKA_K_AUT_LEN];
213 kal_uint8 msk[EAP_AKA_K_AUT_LEN];
214} SecAkaDerivePmkReqTestMsgT;
215
216typedef struct {
217 ExeRspMsgT RspInfo;
218 kal_bool bEncrypt; /*0 - encrypt, 1 - decrypt*/
219 kal_uint8 key[EAP_AKA_K_ENCR_LEN];
220 kal_uint8 iv[EAP_AKA_IV_LEN];
221} SecAkaAesCryptReqTestMsgT;
222
223typedef struct {
224 kal_uint8 authkey[16];
225 kal_uint8 op[16];
226} SecAkaEtsSetAuthKeyMsgT;
227#endif
228
229typedef struct {
230 kal_bool bEncrypt; /*KAL_TRUE - encrypt, KAL_FALSE - decrypt*/
231 kal_uint8 *key;
232 kal_uint8 *iv;
233 kal_uint8 *data;
234 kal_uint16 dataLen;
235 ExeRspMsgT RspInfo;
236}SecAkaAesCryptReqMsgT;
237
238/*****************************************************************************
239* End of File
240*****************************************************************************/
241#endif
242
243