eapol/eapol_framework/eapol_common/include/eapol_key_state.h
branchRCL_3
changeset 46 c74b3d9f6b9e
parent 45 bad0cc58d154
equal deleted inserted replaced
45:bad0cc58d154 46:c74b3d9f6b9e
    14 * Description:  EAP and WLAN authentication protocols.
    14 * Description:  EAP and WLAN authentication protocols.
    15 *
    15 *
    16 */
    16 */
    17 
    17 
    18 /*
    18 /*
    19 * %version: %
    19 * %version: 14.1.5 %
    20 */
    20 */
    21 
    21 
    22 #if !defined(_EAPOL_KEY_STATE_H_)
    22 #if !defined(_EAPOL_KEY_STATE_H_)
    23 #define _EAPOL_KEY_STATE_H_
    23 #define _EAPOL_KEY_STATE_H_
    24 
    24 
   287 
   287 
   288 	/// This flag activates group key update test (true) or not (false).
   288 	/// This flag activates group key update test (true) or not (false).
   289 	/// The configuration option is EAPOL_key_state_TEST_group_key_update.
   289 	/// The configuration option is EAPOL_key_state_TEST_group_key_update.
   290 	bool m_server_TEST_group_key_update;
   290 	bool m_server_TEST_group_key_update;
   291 
   291 
       
   292 #if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
   292 	bool m_is_associated;
   293 	bool m_is_associated;
       
   294 #endif //#if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
   293 
   295 
   294 	// - - - - - - - - - - - - - - - - - - - - - - - -
   296 	// - - - - - - - - - - - - - - - - - - - - - - - -
   295 
   297 
   296 	enum eapol_key_state_constants_e
   298 	enum eapol_key_state_constants_e
   297 	{
   299 	{
   436 
   438 
   437 
   439 
   438 EAP_KEY_TEST_PRIVATE_FUNCTION
   440 EAP_KEY_TEST_PRIVATE_FUNCTION
   439 
   441 
   440 
   442 
   441 	eap_status_e derive_WPXM_WPXK1_WPXK2();
   443 	EAP_FUNC_IMPORT eap_status_e derive_WPXM_WPXK1_WPXK2();
   442 
   444 
   443 	eap_status_e derive_WPXM_PTK(const u32_t WPXM_WPXC);
   445 	EAP_FUNC_IMPORT eap_status_e derive_WPXM_PTK(const u32_t WPXM_WPXC);
   444 
   446 
   445 	EAP_FUNC_IMPORT eap_status_e verify_field_is_zero(
   447 	EAP_FUNC_IMPORT eap_status_e verify_field_is_zero(
   446 		const u8_t * const field,
   448 		const u8_t * const field,
   447 		const u32_t field_length);
   449 		const u32_t field_length);
   448 
   450 
   815 		const eap_variable_data_c * const supplicant_RSNA_IE,
   817 		const eap_variable_data_c * const supplicant_RSNA_IE,
   816 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_pairwise_cipher,
   818 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_pairwise_cipher,
   817 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_group_cipher,
   819 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_group_cipher,
   818 		const eap_variable_data_c * const pre_shared_key);
   820 		const eap_variable_data_c * const pre_shared_key);
   819 
   821 
       
   822 #if defined(USE_EAPOL_KEY_STATE) && defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   823 
   820 	EAP_FUNC_IMPORT eap_status_e initialize(
   824 	EAP_FUNC_IMPORT eap_status_e initialize(
   821 		const eap_am_network_id_c * const receive_network_id,
   825 		const eap_am_network_id_c * const receive_network_id,
   822 		const eapol_key_authentication_type_e authentication_type);
   826 		const eapol_key_authentication_type_e authentication_type);
   823 
   827 
       
   828 #endif //#if defined(USE_EAPOL_KEY_STATE) && defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   829 
   824 	EAP_FUNC_IMPORT eapol_key_state_c *copy(const eap_am_network_id_c * const receive_network_id);
   830 	EAP_FUNC_IMPORT eapol_key_state_c *copy(const eap_am_network_id_c * const receive_network_id);
   825 
   831 
   826 	EAP_FUNC_IMPORT bool get_is_encryption_on();
   832 	EAP_FUNC_IMPORT bool get_is_encryption_on();
   827 
   833 
       
   834 
       
   835 #if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   836 
   828 	EAP_FUNC_IMPORT bool get_is_associated();
   837 	EAP_FUNC_IMPORT bool get_is_associated();
   829 
   838 
       
   839 #endif //#if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   840 
       
   841 
       
   842 	//
   830 	EAP_FUNC_IMPORT eap_status_e started_eap_authentication();
   843 	EAP_FUNC_IMPORT eap_status_e started_eap_authentication();
   831 
   844 
   832 	/**
   845 	/**
   833 	 * This function checks whether cached PMKSA have correct cipher suite.
   846 	 * This function checks whether cached PMKSA have correct cipher suite.
   834 	 */
   847 	 */