]> git.proxmox.com Git - mirror_edk2.git/blob - MdePkg/Include/Protocol/Supplicant.h
MdePkg: Replace BSD License with BSD+Patent License
[mirror_edk2.git] / MdePkg / Include / Protocol / Supplicant.h
1 /** @file
2 This file defines the EFI Supplicant Protocol.
3
4 Copyright (c) 2016 - 2017, Intel Corporation. All rights reserved.<BR>
5 SPDX-License-Identifier: BSD-2-Clause-Patent
6
7 @par Revision Reference:
8 This Protocol is introduced in UEFI Specification 2.6
9
10 **/
11
12 #ifndef __EFI_SUPPLICANT_PROTOCOL_H__
13 #define __EFI_SUPPLICANT_PROTOCOL_H__
14
15 #include <Protocol/WiFi2.h>
16
17 ///
18 /// The EFI Supplicant Service Binding Protocol is used to locate EFI
19 /// Supplicant Protocol drivers to create and destroy child of the driver to
20 /// communicate with other host using Supplicant protocol.
21 ///
22 #define EFI_SUPPLICANT_SERVICE_BINDING_PROTOCOL_GUID \
23 { \
24 0x45bcd98e, 0x59ad, 0x4174, { 0x95, 0x46, 0x34, 0x4a, 0x7, 0x48, 0x58, 0x98 } \
25 }
26
27 ///
28 /// The EFI Supplicant protocol provides services to process authentication and
29 /// data encryption/decryption for security management.
30 ///
31 #define EFI_SUPPLICANT_PROTOCOL_GUID \
32 { \
33 0x54fcc43e, 0xaa89, 0x4333, { 0x9a, 0x85, 0xcd, 0xea, 0x24, 0x5, 0x1e, 0x9e } \
34 }
35
36 typedef struct _EFI_SUPPLICANT_PROTOCOL EFI_SUPPLICANT_PROTOCOL;
37
38 ///
39 /// EFI_SUPPLICANT_CRYPT_MODE
40 ///
41 typedef enum {
42 //
43 // Encrypt data provided in the fragment buffers.
44 //
45 EfiSupplicantEncrypt,
46 //
47 // Decrypt data provided in the fragment buffers.
48 //
49 EfiSupplicantDecrypt,
50 } EFI_SUPPLICANT_CRYPT_MODE;
51
52 ///
53 /// EFI_SUPPLICANT_DATA_TYPE
54 ///
55 typedef enum {
56 //
57 // Session Configuration
58 //
59
60 //
61 // Current authentication type in use. The corresponding Data is of type
62 // EFI_80211_AKM_SUITE_SELECTOR.
63 //
64 EfiSupplicant80211AKMSuite,
65 //
66 // Group data encryption type in use. The corresponding Data is of type
67 // EFI_SUPPLICANT_CIPHER_SUITE_SELECTOR.
68 //
69 EfiSupplicant80211GroupDataCipherSuite,
70 //
71 // Pairwise encryption type in use. The corresponding Data is of type
72 // EFI_80211_CIPHER_SUITE_SELECTOR.
73 //
74 EfiSupplicant80211PairwiseCipherSuite,
75 //
76 // PSK password. The corresponding Data is a NULL-terminated ASCII string.
77 //
78 EfiSupplicant80211PskPassword,
79 //
80 // Target SSID name. The corresponding Data is of type EFI_80211_SSID.
81 //
82 EfiSupplicant80211TargetSSIDName,
83 //
84 // Station MAC address. The corresponding Data is of type
85 // EFI_80211_MAC_ADDRESS.
86 //
87 EfiSupplicant80211StationMac,
88 //
89 // Target SSID MAC address. The corresponding Data is 6 bytes MAC address.
90 //
91 EfiSupplicant80211TargetSSIDMac,
92
93 //
94 // Session Information
95 //
96
97 //
98 // 802.11 PTK. The corresponding Data is of type EFI_SUPPLICANT_KEY.
99 //
100 EfiSupplicant80211PTK,
101 //
102 // 802.11 GTK. The corresponding Data is of type EFI_SUPPLICANT_GTK_LIST.
103 //
104 EfiSupplicant80211GTK,
105 //
106 // Supplicant state. The corresponding Data is
107 // EFI_EAPOL_SUPPLICANT_PAE_STATE.
108 //
109 EfiSupplicantState,
110 //
111 // 802.11 link state. The corresponding Data is EFI_80211_LINK_STATE.
112 //
113 EfiSupplicant80211LinkState,
114 //
115 // Flag indicates key is refreshed. The corresponding Data is
116 // EFI_SUPPLICANT_KEY_REFRESH.
117 //
118 EfiSupplicantKeyRefresh,
119
120 //
121 // Session Configuration
122 //
123
124 //
125 // Supported authentication types. The corresponding Data is of type
126 // EFI_80211_AKM_SUITE_SELECTOR.
127 //
128 EfiSupplicant80211SupportedAKMSuites,
129 //
130 // Supported software encryption types provided by supplicant driver. The
131 // corresponding Data is of type EFI_80211_CIPHER_SUITE_SELECTOR.
132 //
133 EfiSupplicant80211SupportedSoftwareCipherSuites,
134 //
135 // Supported hardware encryption types provided by wireless UNDI driver. The
136 // corresponding Data is of type EFI_80211_CIPHER_SUITE_SELECTOR.
137 //
138 EfiSupplicant80211SupportedHardwareCipherSuites,
139
140 //
141 // Session Information
142 //
143
144 //
145 // 802.11 Integrity GTK. The corresponding Data is of type
146 // EFI_SUPPLICANT_GTK_LIST.
147 //
148 EfiSupplicant80211IGTK,
149 //
150 // 802.11 PMK. The corresponding Data is 32 bytes pairwise master key.
151 //
152 EfiSupplicant80211PMK,
153 EfiSupplicantDataTypeMaximum
154 } EFI_SUPPLICANT_DATA_TYPE;
155
156 ///
157 /// EFI_80211_LINK_STATE
158 ///
159 typedef enum {
160 //
161 // Indicates initial start state, unauthenticated, unassociated.
162 //
163 Ieee80211UnauthenticatedUnassociated,
164 //
165 // Indicates authenticated, unassociated.
166 //
167 Ieee80211AuthenticatedUnassociated,
168 //
169 // Indicates authenticated and associated, but pending RSN authentication.
170 //
171 Ieee80211PendingRSNAuthentication,
172 //
173 // Indicates authenticated and associated.
174 //
175 Ieee80211AuthenticatedAssociated
176 } EFI_80211_LINK_STATE;
177
178 ///
179 /// EFI_SUPPLICANT_KEY_TYPE (IEEE Std 802.11 Section 6.3.19.1.2)
180 ///
181 typedef enum {
182 Group,
183 Pairwise,
184 PeerKey,
185 IGTK
186 } EFI_SUPPLICANT_KEY_TYPE;
187
188 ///
189 /// EFI_SUPPLICANT_KEY_DIRECTION (IEEE Std 802.11 Section 6.3.19.1.2)
190 ///
191 typedef enum {
192 //
193 // Indicates that the keys are being installed for the receive direction.
194 //
195 Receive,
196 //
197 // Indicates that the keys are being installed for the transmit direction.
198 //
199 Transmit,
200 //
201 // Indicates that the keys are being installed for both the receive and
202 // transmit directions.
203 //
204 Both
205 } EFI_SUPPLICANT_KEY_DIRECTION;
206
207 ///
208 /// EFI_SUPPLICANT_KEY_REFRESH
209 ///
210 typedef struct {
211 //
212 // If TRUE, indicates GTK is just refreshed after a successful call to
213 // EFI_SUPPLICANT_PROTOCOL.BuildResponsePacket().
214 //
215 BOOLEAN GTKRefresh;
216 } EFI_SUPPLICANT_KEY_REFRESH;
217
218 #define EFI_MAX_KEY_LEN 64
219
220 ///
221 /// EFI_SUPPLICANT_KEY
222 ///
223 typedef struct {
224 //
225 // The key value.
226 //
227 UINT8 Key[EFI_MAX_KEY_LEN];
228 //
229 // Length in bytes of the Key. Should be up to EFI_MAX_KEY_LEN.
230 //
231 UINT8 KeyLen;
232 //
233 // The key identifier.
234 //
235 UINT8 KeyId;
236 //
237 // Defines whether this key is a group key, pairwise key, PeerKey, or
238 // Integrity Group.
239 //
240 EFI_SUPPLICANT_KEY_TYPE KeyType;
241 //
242 // The value is set according to the KeyType.
243 //
244 EFI_80211_MAC_ADDRESS Addr;
245 //
246 // The Receive Sequence Count value.
247 //
248 UINT8 Rsc[8];
249 //
250 // Length in bytes of the Rsc. Should be up to 8.
251 //
252 UINT8 RscLen;
253 //
254 // Indicates whether the key is configured by the Authenticator or
255 // Supplicant. The value true indicates Authenticator.
256 //
257 BOOLEAN IsAuthenticator;
258 //
259 // The cipher suite required for this association.
260 //
261 EFI_80211_SUITE_SELECTOR CipherSuite;
262 //
263 // Indicates the direction for which the keys are to be installed.
264 //
265 EFI_SUPPLICANT_KEY_DIRECTION Direction;
266 } EFI_SUPPLICANT_KEY;
267
268 ///
269 /// EFI_SUPPLICANT_GTK_LIST
270 ///
271 typedef struct {
272 //
273 // Indicates the number of GTKs that are contained in GTKList.
274 //
275 UINT8 GTKCount;
276 //
277 // A variable-length array of GTKs of type EFI_SUPPLICANT_KEY. The number of
278 // entries is specified by GTKCount.
279 //
280 EFI_SUPPLICANT_KEY GTKList[1];
281 } EFI_SUPPLICANT_GTK_LIST;
282
283 ///
284 /// EFI_SUPPLICANT_FRAGMENT_DATA
285 ///
286 typedef struct {
287 //
288 // Length of data buffer in the fragment.
289 //
290 UINT32 FragmentLength;
291 //
292 // Pointer to the data buffer in the fragment.
293 //
294 VOID *FragmentBuffer;
295 } EFI_SUPPLICANT_FRAGMENT_DATA;
296
297 /**
298 BuildResponsePacket() is called during STA and AP authentication is in
299 progress. Supplicant derives the PTK or session keys depend on type of
300 authentication is being employed.
301
302 @param[in] This Pointer to the EFI_SUPPLICANT_PROTOCOL
303 instance.
304 @param[in] RequestBuffer Pointer to the most recently received EAPOL
305 packet. NULL means the supplicant need
306 initiate the EAP authentication session and
307 send EAPOL-Start message.
308 @param[in] RequestBufferSize
309 Packet size in bytes for the most recently
310 received EAPOL packet. 0 is only valid when
311 RequestBuffer is NULL.
312 @param[out] Buffer Pointer to the buffer to hold the built
313 packet.
314 @param[in, out] BufferSize Pointer to the buffer size in bytes. On
315 input, it is the buffer size provided by the
316 caller. On output, it is the buffer size in
317 fact needed to contain the packet.
318
319 @retval EFI_SUCCESS The required EAPOL packet is built
320 successfully.
321 @retval EFI_INVALID_PARAMETER One or more of the following conditions is
322 TRUE:
323 RequestBuffer is NULL, but RequestSize is
324 NOT 0.
325 RequestBufferSize is 0.
326 Buffer is NULL, but RequestBuffer is NOT 0.
327 BufferSize is NULL.
328 @retval EFI_BUFFER_TOO_SMALL BufferSize is too small to hold the response
329 packet.
330 @retval EFI_NOT_READY Current EAPOL session state is NOT ready to
331 build ResponsePacket.
332
333 **/
334 typedef
335 EFI_STATUS
336 (EFIAPI *EFI_SUPPLICANT_BUILD_RESPONSE_PACKET) (
337 IN EFI_SUPPLICANT_PROTOCOL *This,
338 IN UINT8 *RequestBuffer, OPTIONAL
339 IN UINTN RequestBufferSize, OPTIONAL
340 OUT UINT8 *Buffer,
341 IN OUT UINTN *BufferSize
342 );
343
344 /**
345 ProcessPacket() is called to Supplicant driver to encrypt or decrypt the data
346 depending type of authentication type.
347
348 @param[in] This Pointer to the EFI_SUPPLICANT_PROTOCOL
349 instance.
350 @param[in, out] FragmentTable Pointer to a list of fragment. The caller
351 will take responsible to handle the original
352 FragmentTable while it may be reallocated in
353 Supplicant driver.
354 @param[in] FragmentCount Number of fragment.
355 @param[in] CryptMode Crypt mode.
356
357 @retval EFI_SUCCESS The operation completed successfully.
358 @retval EFI_INVALID_PARAMETER One or more of the following conditions is
359 TRUE:
360 FragmentTable is NULL.
361 FragmentCount is NULL.
362 CryptMode is invalid.
363 @retval EFI_NOT_READY Current supplicant state is NOT Authenticated.
364 @retval EFI_ABORTED Something wrong decryption the message.
365 @retval EFI_UNSUPPORTED This API is not supported.
366
367 **/
368 typedef
369 EFI_STATUS
370 (EFIAPI *EFI_SUPPLICANT_PROCESS_PACKET) (
371 IN EFI_SUPPLICANT_PROTOCOL *This,
372 IN OUT EFI_SUPPLICANT_FRAGMENT_DATA **FragmentTable,
373 IN UINT32 *FragmentCount,
374 IN EFI_SUPPLICANT_CRYPT_MODE CryptMode
375 );
376
377 /**
378 Set Supplicant configuration data.
379
380 @param[in] This Pointer to the EFI_SUPPLICANT_PROTOCOL
381 instance.
382 @param[in] DataType The type of data.
383 @param[in] Data Pointer to the buffer to hold the data.
384 @param[in] DataSize Pointer to the buffer size in bytes.
385
386 @retval EFI_SUCCESS The Supplicant configuration data is set
387 successfully.
388 @retval EFI_INVALID_PARAMETER One or more of the following conditions is
389 TRUE:
390 Data is NULL.
391 DataSize is 0.
392 @retval EFI_UNSUPPORTED The DataType is unsupported.
393 @retval EFI_OUT_OF_RESOURCES Required system resources could not be allocated.
394
395 **/
396 typedef
397 EFI_STATUS
398 (EFIAPI *EFI_SUPPLICANT_SET_DATA) (
399 IN EFI_SUPPLICANT_PROTOCOL *This,
400 IN EFI_SUPPLICANT_DATA_TYPE DataType,
401 IN VOID *Data,
402 IN UINTN DataSize
403 );
404
405 /**
406 Get Supplicant configuration data.
407
408 @param[in] This Pointer to the EFI_SUPPLICANT_PROTOCOL
409 instance.
410 @param[in] DataType The type of data.
411 @param[out] Data Pointer to the buffer to hold the data.
412 Ignored if DataSize is 0.
413 @param[in, out] DataSize Pointer to the buffer size in bytes. On
414 input, it is the buffer size provided by the
415 caller. On output, it is the buffer size in
416 fact needed to contain the packet.
417
418 @retval EFI_SUCCESS The Supplicant configuration data is got
419 successfully.
420 @retval EFI_INVALID_PARAMETER One or more of the following conditions is
421 TRUE:
422 This is NULL.
423 DataSize is NULL.
424 Data is NULL if *DataSize is not zero.
425 @retval EFI_UNSUPPORTED The DataType is unsupported.
426 @retval EFI_NOT_FOUND The Supplicant configuration data is not
427 found.
428 @retval EFI_BUFFER_TOO_SMALL The size of Data is too small for the
429 specified configuration data and the required
430 size is returned in DataSize.
431
432 **/
433 typedef
434 EFI_STATUS
435 (EFIAPI *EFI_SUPPLICANT_GET_DATA) (
436 IN EFI_SUPPLICANT_PROTOCOL *This,
437 IN EFI_SUPPLICANT_DATA_TYPE DataType,
438 OUT UINT8 *Data, OPTIONAL
439 IN OUT UINTN *DataSize
440 );
441
442 ///
443 /// The EFI_SUPPLICANT_PROTOCOL is designed to provide unified place for WIFI
444 /// and EAP security management. Both PSK authentication and 802.1X EAP
445 /// authentication can be managed via this protocol and driver or application
446 /// as a consumer can only focus on about packet transmitting or receiving.
447 ///
448 struct _EFI_SUPPLICANT_PROTOCOL {
449 EFI_SUPPLICANT_BUILD_RESPONSE_PACKET BuildResponsePacket;
450 EFI_SUPPLICANT_PROCESS_PACKET ProcessPacket;
451 EFI_SUPPLICANT_SET_DATA SetData;
452 EFI_SUPPLICANT_GET_DATA GetData;
453 };
454
455 extern EFI_GUID gEfiSupplicantServiceBindingProtocolGuid;
456 extern EFI_GUID gEfiSupplicantProtocolGuid;
457
458 #endif