Merge branch 'timers-for-linus-migration' of git://git.kernel.org/pub/scm/linux/kerne...
[linux-2.6] / drivers / staging / rt2860 / leap.h
1 /*
2  *************************************************************************
3  * Ralink Tech Inc.
4  * 5F., No.36, Taiyuan St., Jhubei City,
5  * Hsinchu County 302,
6  * Taiwan, R.O.C.
7  *
8  * (c) Copyright 2002-2007, Ralink Technology, Inc.
9  *
10  * This program is free software; you can redistribute it and/or modify  *
11  * it under the terms of the GNU General Public License as published by  *
12  * the Free Software Foundation; either version 2 of the License, or     *
13  * (at your option) any later version.                                   *
14  *                                                                       *
15  * This program is distributed in the hope that it will be useful,       *
16  * but WITHOUT ANY WARRANTY; without even the implied warranty of        *
17  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the         *
18  * GNU General Public License for more details.                          *
19  *                                                                       *
20  * You should have received a copy of the GNU General Public License     *
21  * along with this program; if not, write to the                         *
22  * Free Software Foundation, Inc.,                                       *
23  * 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA.             *
24  *                                                                       *
25  *************************************************************************
26
27         Module Name:
28         leap.h
29
30         Abstract:
31
32         Revision History:
33         Who                     When                    What
34         --------        ----------              ----------------------------------------------
35         Name            Date                    Modification logs
36 */
37 #ifndef __LEAP_H__
38 #define __LEAP_H__
39
40 // Messages for Associate state machine
41 #define LEAP_MACHINE_BASE                   30
42
43 #define LEAP_MSG_REQUEST_IDENTITY           31
44 #define LEAP_MSG_REQUEST_LEAP               32
45 #define LEAP_MSG_SUCCESS                    33
46 #define LEAP_MSG_FAILED                     34
47 #define LEAP_MSG_RESPONSE_LEAP              35
48 #define LEAP_MSG_EAPOLKEY                   36
49 #define LEAP_MSG_UNKNOWN                    37
50 #define LEAP_MSG                            38
51 //! assoc state-machine states
52 #define LEAP_IDLE                           0
53 #define LEAP_WAIT_IDENTITY_REQUEST          1
54 #define LEAP_WAIT_CHANLLENGE_REQUEST        2
55 #define LEAP_WAIT_SUCCESS                   3
56 #define LEAP_WAIT_CHANLLENGE_RESPONSE       4
57 #define LEAP_WAIT_EAPOLKEY                  5
58
59 #define LEAP_REASON_INVALID_AUTH                    0x01
60 #define LEAP_REASON_AUTH_TIMEOUT                    0x02
61 #define LEAP_REASON_CHALLENGE_FROM_AP_FAILED        0x03
62 #define LEAP_REASON_CHALLENGE_TO_AP_FAILED          0x04
63
64 #define CISCO_AuthModeLEAP                          0x80
65 #define CISCO_AuthModeLEAPNone                      0x00
66 #define LEAP_AUTH_TIMEOUT                           30000
67 #define LEAP_CHALLENGE_RESPONSE_LENGTH              24
68 #define LEAP_CHALLENGE_REQUEST_LENGTH               8
69
70 typedef struct _LEAP_EAPOL_HEADER_ {
71     UCHAR       Version;
72     UCHAR       Type;
73     UCHAR       Length[2];
74 } LEAP_EAPOL_HEADER, *PLEAP_EAPOL_HEADER;
75
76 typedef struct _LEAP_EAPOL_PACKET_ {
77     UCHAR       Code;
78     UCHAR       Identifier;
79     UCHAR       Length[2];
80     UCHAR       Type;
81 } LEAP_EAPOL_PACKET, *PLEAP_EAPOL_PACKET;
82
83 typedef struct _LEAP_EAP_CONTENTS_ {
84     UCHAR       Version;
85     UCHAR       Reserved;
86     UCHAR       Length;
87 } LEAP_EAP_CONTENTS, *PLEAP_EAP_CONTENTS;
88
89 /*** EAPOL key ***/
90 typedef struct _EAPOL_KEY_HEADER_ {
91     UCHAR       Type;
92     UCHAR       Length[2];
93     UCHAR       Counter[8];
94     UCHAR       IV[16];
95     UCHAR       Index;
96     UCHAR       Signature[16];
97 } EAPOL_KEY_HEADER, *PEAPOL_KEY_HEADER;
98
99 BOOLEAN LeapMsgTypeSubst(
100     IN  UCHAR   EAPType,
101     OUT ULONG   *MsgType);
102
103 VOID LeapMachinePerformAction(
104     IN PRTMP_ADAPTER    pAd,
105     IN STATE_MACHINE    *S,
106     IN MLME_QUEUE_ELEM  *Elem);
107
108 VOID LeapMacHeaderInit(
109     IN  PRTMP_ADAPTER       pAd,
110     IN  OUT PHEADER_802_11  pHdr80211,
111     IN  UCHAR               wep,
112     IN  PUCHAR              pAddr3);
113
114 VOID LeapStartAction(
115     IN PRTMP_ADAPTER    pAd,
116     IN MLME_QUEUE_ELEM  *Elem);
117
118 VOID LeapIdentityAction(
119     IN PRTMP_ADAPTER    pAd,
120     IN MLME_QUEUE_ELEM  *Elem);
121
122 VOID LeapPeerChallengeAction(
123     IN PRTMP_ADAPTER    pAd,
124     IN MLME_QUEUE_ELEM  *Elem);
125
126 VOID HashPwd(
127     IN  PUCHAR  pwd,
128     IN  INT     pwdlen,
129     OUT PUCHAR  hash);
130
131 VOID PeerChallengeResponse(
132     IN  PUCHAR  szChallenge,
133     IN  PUCHAR  smbPasswd,
134     OUT PUCHAR  szResponse);
135
136 VOID ParityKey(
137     OUT PUCHAR  szOut,
138     IN  PUCHAR  szIn);
139
140 VOID DesKey(
141     OUT ULONG   k[16][2],
142     IN  PUCHAR  key,
143     IN  INT     decrypt);
144
145 VOID Des(
146     IN  ULONG   ks[16][2],
147     OUT UCHAR   block[8]);
148
149 VOID DesEncrypt(
150     IN  PUCHAR  szClear,
151     IN  PUCHAR  szKey,
152     OUT PUCHAR  szOut);
153
154 VOID LeapNetworkChallengeAction(
155     IN PRTMP_ADAPTER    pAd,
156     IN MLME_QUEUE_ELEM  *Elem);
157
158 VOID LeapNetworkChallengeResponse(
159     IN PRTMP_ADAPTER    pAd,
160     IN MLME_QUEUE_ELEM  *Elem);
161
162 VOID HashpwdHash(
163     IN  PUCHAR  hash,
164     IN  PUCHAR  hashhash);
165
166 VOID ProcessSessionKey(
167     OUT PUCHAR  SessionKey,
168     IN  PUCHAR  hash2,
169     IN  PUCHAR  ChallengeToRadius,
170     IN  PUCHAR  ChallengeResponseFromRadius,
171     IN  PUCHAR  ChallengeFromRadius,
172     IN  PUCHAR  ChallengeResponseToRadius);
173
174 VOID LeapEapolKeyAction(
175     IN PRTMP_ADAPTER    pAd,
176     IN MLME_QUEUE_ELEM  *Elem);
177
178 VOID RogueApTableInit(
179     IN ROGUEAP_TABLE    *Tab);
180
181 ULONG RogueApTableSearch(
182     IN ROGUEAP_TABLE    *Tab,
183     IN PUCHAR           pAddr);
184
185 VOID RogueApEntrySet(
186     IN  PRTMP_ADAPTER   pAd,
187     OUT ROGUEAP_ENTRY   *pRogueAp,
188     IN PUCHAR           pAddr,
189     IN UCHAR            FaileCode);
190
191 ULONG RogueApTableSetEntry(
192     IN  PRTMP_ADAPTER   pAd,
193     OUT ROGUEAP_TABLE  *Tab,
194     IN PUCHAR           pAddr,
195     IN UCHAR            FaileCode);
196
197 VOID RogueApTableDeleteEntry(
198     IN OUT ROGUEAP_TABLE *Tab,
199     IN PUCHAR          pAddr);
200
201 VOID LeapAuthTimeout(
202     IN PVOID SystemSpecific1,
203     IN PVOID FunctionContext,
204     IN PVOID SystemSpecific2,
205     IN PVOID SystemSpecific3);
206
207 VOID LeapSendRogueAPReport(
208     IN  PRTMP_ADAPTER   pAd);
209
210 BOOLEAN CCKMAssocRspSanity(
211     IN PRTMP_ADAPTER    pAd,
212     IN VOID             *Msg,
213     IN ULONG            MsgLen);
214
215 #endif  // __LEAP_H__