blob: e2d5cf488560403e704ce4e2720379213a212996 [file] [log] [blame]
rjw6c1fd8f2022-11-30 14:33:01 +08001/*****************************************************************************
2* Copyright Statement:
3* --------------------
4* This software is protected by Copyright and the information contained
5* herein is confidential. The software may not be copied and the information
6* contained herein may not be used or disclosed except with the written
7* permission of MediaTek Inc. (C) 2005
8*
9* BY OPENING THIS FILE, BUYER HEREBY UNEQUIVOCALLY ACKNOWLEDGES AND AGREES
10* THAT THE SOFTWARE/FIRMWARE AND ITS DOCUMENTATIONS ("MEDIATEK SOFTWARE")
11* RECEIVED FROM MEDIATEK AND/OR ITS REPRESENTATIVES ARE PROVIDED TO BUYER ON
12* AN "AS-IS" BASIS ONLY. MEDIATEK EXPRESSLY DISCLAIMS ANY AND ALL WARRANTIES,
13* EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF
14* MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT.
15* NEITHER DOES MEDIATEK PROVIDE ANY WARRANTY WHATSOEVER WITH RESPECT TO THE
16* SOFTWARE OF ANY THIRD PARTY WHICH MAY BE USED BY, INCORPORATED IN, OR
17* SUPPLIED WITH THE MEDIATEK SOFTWARE, AND BUYER AGREES TO LOOK ONLY TO SUCH
18* THIRD PARTY FOR ANY WARRANTY CLAIM RELATING THERETO. MEDIATEK SHALL ALSO
19* NOT BE RESPONSIBLE FOR ANY MEDIATEK SOFTWARE RELEASES MADE TO BUYER'S
20* SPECIFICATION OR TO CONFORM TO A PARTICULAR STANDARD OR OPEN FORUM.
21*
22* BUYER'S SOLE AND EXCLUSIVE REMEDY AND MEDIATEK'S ENTIRE AND CUMULATIVE
23* LIABILITY WITH RESPECT TO THE MEDIATEK SOFTWARE RELEASED HEREUNDER WILL BE,
24* AT MEDIATEK'S OPTION, TO REVISE OR REPLACE THE MEDIATEK SOFTWARE AT ISSUE,
25* OR REFUND ANY SOFTWARE LICENSE FEES OR SERVICE CHARGE PAID BY BUYER TO
26* MEDIATEK FOR SUCH MEDIATEK SOFTWARE AT ISSUE.
27*
28* THE TRANSACTION CONTEMPLATED HEREUNDER SHALL BE CONSTRUED IN ACCORDANCE
29* WITH THE LAWS OF THE STATE OF CALIFORNIA, USA, EXCLUDING ITS CONFLICT OF
30* LAWS PRINCIPLES. ANY DISPUTES, CONTROVERSIES OR CLAIMS ARISING THEREOF AND
31* RELATED THERETO SHALL BE SETTLED BY ARBITRATION IN SAN FRANCISCO, CA, UNDER
32* THE RULES OF THE INTERNATIONAL CHAMBER OF COMMERCE (ICC).
33*
34*****************************************************************************/
35
36/*******************************************************************************
37 * Filename:
38 * ---------
39 * security_keys_struct.h
40 *
41 * Project:
42 * --------
43 * MAUI
44 *
45 * Description:
46 * ------------
47 * This file is intends for structure definition about security key.
48 *
49 * Author:
50 * -------
51 * -------
52 *
53 *==============================================================================
54 * HISTORY
55 * Below this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
56 *------------------------------------------------------------------------------
57 * removed!
58 *
59 * removed!
60 * removed!
61 * removed!
62 *
63 * removed!
64 * removed!
65 * removed!
66 *
67 * removed!
68 * removed!
69 * removed!
70 *
71 * removed!
72 * removed!
73 * removed!
74 *
75 * removed!
76 * removed!
77 * removed!
78 *
79 *------------------------------------------------------------------------------
80 * Upper this line, this part is controlled by PVCS VM. DO NOT MODIFY!!
81 *==============================================================================
82 *******************************************************************************/
83
84/********************************************************************************
85* Copyright Statement:
86* --------------------
87*
88* This product has been developed using a protocol stack
89* developed by Sasken Communication Technologies Limited.
90*
91********************************************************************************/
92
93
94/*******************************************************************************
95* Copyright Statement:
96* --------------------
97* This software is protected by Copyright and the information contained
98* herein is confidential. The software may not be copied and the information
99* contained herein may not be used or disclosed except with the written
100* permission of MediaTek Inc. (C) 2002
101*
102*******************************************************************************
103 * FILENAME : security_keys_struct.h
104 * SYNOPSIS : Functions for encoding/decoding.
105 *
106 * R E V I S I O N H I S T O R Y
107 *
108 */
109#ifndef _SECURITY_KEYS_STRUCT_H
110#define _SECURITY_KEYS_STRUCT_H
111
112#include "kal_general_types.h"
113#include "security_keys_enums.h"
114#include "irat_common_enums.h"
115
116
117typedef struct {
118 kal_uint8 is_gsm_cipher_key_info_present; /* if GSM cipher key present */
119 kal_uint8 gsm_cipher_key_info[KC_LEN]; /* GSM cipher key (Kc) */
120 kal_uint8 is_gprs_cipher_key_info_present; /* if GPRS cipher key present */
121 kal_uint8 gprs_cipher_key_info[KC_LEN]; /* GPRS cipher key (Kc) */
122 kal_uint8 is_gprs_cipher_key128_info_present; /* if GPRS cipher key128 present */
123 kal_uint8 gprs_cipher_key128_info[KC128_LEN]; /* GPRS cipher key128 (Kc) */
124} key_struct;
125
126typedef struct {
127 kal_uint32 res; /* if result is of 4 bytes*/
128 kal_uint8 res_ext_len; /* if result is > 4 bytes*/
129 kal_uint8 res_extP;
130 kal_uint8 res_ext[12];
131} result_ext_struct;
132
133typedef struct {
134 result_present_enum result_type_tag;
135 union {
136 kal_uint32 sres;
137 result_ext_struct res;
138 } result_type_value;
139} result_struct;
140#endif
141
142