eapol/eapol_framework/eapol_common/include/eapol_key_state.h
branchRCL_3
changeset 18 bad0cc58d154
parent 9 aa67149e0134
child 19 c74b3d9f6b9e
equal deleted inserted replaced
17:30e048a7b597 18:bad0cc58d154
    14 * Description:  EAP and WLAN authentication protocols.
    14 * Description:  EAP and WLAN authentication protocols.
    15 *
    15 *
    16 */
    16 */
    17 
    17 
    18 /*
    18 /*
    19 * %version: 14.1.5 %
    19 * %version: %
    20 */
    20 */
    21 
    21 
    22 #if !defined(_EAPOL_KEY_STATE_H_)
    22 #if !defined(_EAPOL_KEY_STATE_H_)
    23 #define _EAPOL_KEY_STATE_H_
    23 #define _EAPOL_KEY_STATE_H_
    24 
    24 
   287 
   287 
   288 	/// This flag activates group key update test (true) or not (false).
   288 	/// This flag activates group key update test (true) or not (false).
   289 	/// The configuration option is EAPOL_key_state_TEST_group_key_update.
   289 	/// The configuration option is EAPOL_key_state_TEST_group_key_update.
   290 	bool m_server_TEST_group_key_update;
   290 	bool m_server_TEST_group_key_update;
   291 
   291 
   292 #if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   293 	bool m_is_associated;
   292 	bool m_is_associated;
   294 #endif //#if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   295 
   293 
   296 	// - - - - - - - - - - - - - - - - - - - - - - - -
   294 	// - - - - - - - - - - - - - - - - - - - - - - - -
   297 
   295 
   298 	enum eapol_key_state_constants_e
   296 	enum eapol_key_state_constants_e
   299 	{
   297 	{
   438 
   436 
   439 
   437 
   440 EAP_KEY_TEST_PRIVATE_FUNCTION
   438 EAP_KEY_TEST_PRIVATE_FUNCTION
   441 
   439 
   442 
   440 
   443 	EAP_FUNC_IMPORT eap_status_e derive_WPXM_WPXK1_WPXK2();
   441 	eap_status_e derive_WPXM_WPXK1_WPXK2();
   444 
   442 
   445 	EAP_FUNC_IMPORT eap_status_e derive_WPXM_PTK(const u32_t WPXM_WPXC);
   443 	eap_status_e derive_WPXM_PTK(const u32_t WPXM_WPXC);
   446 
   444 
   447 	EAP_FUNC_IMPORT eap_status_e verify_field_is_zero(
   445 	EAP_FUNC_IMPORT eap_status_e verify_field_is_zero(
   448 		const u8_t * const field,
   446 		const u8_t * const field,
   449 		const u32_t field_length);
   447 		const u32_t field_length);
   450 
   448 
   817 		const eap_variable_data_c * const supplicant_RSNA_IE,
   815 		const eap_variable_data_c * const supplicant_RSNA_IE,
   818 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_pairwise_cipher,
   816 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_pairwise_cipher,
   819 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_group_cipher,
   817 		const eapol_RSNA_key_header_c::eapol_RSNA_cipher_e eapol_group_cipher,
   820 		const eap_variable_data_c * const pre_shared_key);
   818 		const eap_variable_data_c * const pre_shared_key);
   821 
   819 
   822 #if defined(USE_EAPOL_KEY_STATE) && defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   823 
       
   824 	EAP_FUNC_IMPORT eap_status_e initialize(
   820 	EAP_FUNC_IMPORT eap_status_e initialize(
   825 		const eap_am_network_id_c * const receive_network_id,
   821 		const eap_am_network_id_c * const receive_network_id,
   826 		const eapol_key_authentication_type_e authentication_type);
   822 		const eapol_key_authentication_type_e authentication_type);
   827 
   823 
   828 #endif //#if defined(USE_EAPOL_KEY_STATE) && defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   829 
       
   830 	EAP_FUNC_IMPORT eapol_key_state_c *copy(const eap_am_network_id_c * const receive_network_id);
   824 	EAP_FUNC_IMPORT eapol_key_state_c *copy(const eap_am_network_id_c * const receive_network_id);
   831 
   825 
   832 	EAP_FUNC_IMPORT bool get_is_encryption_on();
   826 	EAP_FUNC_IMPORT bool get_is_encryption_on();
   833 
   827 
   834 
       
   835 #if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   836 
       
   837 	EAP_FUNC_IMPORT bool get_is_associated();
   828 	EAP_FUNC_IMPORT bool get_is_associated();
   838 
   829 
   839 #endif //#if defined(USE_EAPOL_KEY_STATE_OPTIMIZED_4_WAY_HANDSHAKE)
       
   840 
       
   841 
       
   842 	//
       
   843 	EAP_FUNC_IMPORT eap_status_e started_eap_authentication();
   830 	EAP_FUNC_IMPORT eap_status_e started_eap_authentication();
   844 
   831 
   845 	/**
   832 	/**
   846 	 * This function checks whether cached PMKSA have correct cipher suite.
   833 	 * This function checks whether cached PMKSA have correct cipher suite.
   847 	 */
   834 	 */