summaryrefslogtreecommitdiff
path: root/cesar/cp2/sta/action/key.h
diff options
context:
space:
mode:
Diffstat (limited to 'cesar/cp2/sta/action/key.h')
-rw-r--r--cesar/cp2/sta/action/key.h101
1 files changed, 0 insertions, 101 deletions
diff --git a/cesar/cp2/sta/action/key.h b/cesar/cp2/sta/action/key.h
deleted file mode 100644
index 45d3e81afc..0000000000
--- a/cesar/cp2/sta/action/key.h
+++ /dev/null
@@ -1,101 +0,0 @@
-#ifndef cp2_sta_action_key_h
-#define cp2_sta_action_key_h
-/* Cesar project {{{
- *
- * Copyright (C) 2008 Spidcom
- *
- * <<<Licence>>>
- *
- * }}} */
-/**
- * \file cp2/sta/action/key.h
- * \brief STA action, key exchange messages.
- * \ingroup cp2_sta_action
- *
- * Key exchanges
- * =============
- *
- * This part handle key exchange messages. As theses messages are used for
- * many unrelated protocol, theses functions will only handle generic
- * verifications and will then forward the message to the right recipient.
- */
-
-BEGIN_DECLS
-
-/**
- * Process a CM_SET_KEY.REQ, 11.5.4.
- * \param ctx control plane context
- * \param mme received MME handle
- *
- * This message is used in several protocols. First check that this message
- * is legitimate, then depending of the protocol, trigger the corresponding
- * event.
- *
- * Used to:
- * - from STA to STA:
- * - NMK provisioning using DAK (PID=2):
- * - set TEK, DAK encrypted (not handled): used to start the protocol
- * - set NMK, DAK encrypted (not handled)
- * - NMK provisioning using UKE (PID=3):
- * - set NMK, TEK encrypted (not handled)
- * - from CCo to STA:
- * - set NEK (PID=1), done periodically by the CCo
- * - from HLE to STA:
- * - set NMK (not handled)
- */
-void
-cp_sta_action_process_cm_set_key_req (cp_t *ctx, cp_mme_rx_t *mme);
-
-/**
- * Process a CM_SET_KEY.CNF, 11.5.5.
- * \param ctx control plane context
- * \param mme received MME handle
- *
- * Response from a preceding CM_SET_KEY.REQ. First check that this message is
- * legitimate and that it correspond to a sent request, then trigger the
- * corresponding event.
- *
- * This message can be forwarded to the CCo module.
- */
-void
-cp_sta_action_process_cm_set_key_cnf (cp_t *ctx, cp_mme_rx_t *mme);
-
-/**
- * Process a CM_GET_KEY.REQ, 11.5.6.
- * \param ctx control plane context
- * \param mme received MME handle
- *
- * This message is used in several protocols. First check that this message
- * is legitimate, then depending of the protocol, trigger the corresponding
- * event.
- *
- * This message can be forwarded to the CCo module.
- *
- * Used to:
- * - from STA to STA:
- * - NMK provisioning using UKE (PID=3):
- * - get HASH KEY, unencrypted unicast (not handled): used to derive the
- * TEK
- * - from STA to CCo:
- * - get NEK, NMK encrypted (PID=0)
- * - from HLE to STA:
- * - get NMK (not handled)
- */
-void
-cp_sta_action_process_cm_get_key_req (cp_t *ctx, cp_mme_rx_t *mme);
-
-/**
- * Process a CM_GET_KEY.CNF, 11.5.7.
- * \param ctx control plane context
- * \param mme received MME handle
- *
- * Response from a preceding CM_GET_KEY.REQ. First check that this message is
- * legitimate and that it correspond to a sent request, then trigger the
- * corresponding event.
- */
-void
-cp_sta_action_process_cm_get_key_cnf (cp_t *ctx, cp_mme_rx_t *mme);
-
-END_DECLS
-
-#endif /* cp2_sta_action_key_h */