From 61addbb1e20e382581c3bee165b8c253adb69d84 Mon Sep 17 00:00:00 2001 From: schodet Date: Fri, 29 Aug 2008 14:52:33 +0000 Subject: * cp2 -> cp: - renamed. git-svn-id: svn+ssh://pessac/svn/cesar/trunk@2798 017c9cb6-072f-447c-8318-d5b54f68fe89 --- cesar/cp2/sta/action/key.h | 101 --------------------------------------------- 1 file changed, 101 deletions(-) delete mode 100644 cesar/cp2/sta/action/key.h (limited to 'cesar/cp2/sta/action/key.h') diff --git a/cesar/cp2/sta/action/key.h b/cesar/cp2/sta/action/key.h deleted file mode 100644 index 45d3e81afc..0000000000 --- a/cesar/cp2/sta/action/key.h +++ /dev/null @@ -1,101 +0,0 @@ -#ifndef cp2_sta_action_key_h -#define cp2_sta_action_key_h -/* Cesar project {{{ - * - * Copyright (C) 2008 Spidcom - * - * <<>> - * - * }}} */ -/** - * \file cp2/sta/action/key.h - * \brief STA action, key exchange messages. - * \ingroup cp2_sta_action - * - * Key exchanges - * ============= - * - * This part handle key exchange messages. As theses messages are used for - * many unrelated protocol, theses functions will only handle generic - * verifications and will then forward the message to the right recipient. - */ - -BEGIN_DECLS - -/** - * Process a CM_SET_KEY.REQ, 11.5.4. - * \param ctx control plane context - * \param mme received MME handle - * - * This message is used in several protocols. First check that this message - * is legitimate, then depending of the protocol, trigger the corresponding - * event. - * - * Used to: - * - from STA to STA: - * - NMK provisioning using DAK (PID=2): - * - set TEK, DAK encrypted (not handled): used to start the protocol - * - set NMK, DAK encrypted (not handled) - * - NMK provisioning using UKE (PID=3): - * - set NMK, TEK encrypted (not handled) - * - from CCo to STA: - * - set NEK (PID=1), done periodically by the CCo - * - from HLE to STA: - * - set NMK (not handled) - */ -void -cp_sta_action_process_cm_set_key_req (cp_t *ctx, cp_mme_rx_t *mme); - -/** - * Process a CM_SET_KEY.CNF, 11.5.5. - * \param ctx control plane context - * \param mme received MME handle - * - * Response from a preceding CM_SET_KEY.REQ. First check that this message is - * legitimate and that it correspond to a sent request, then trigger the - * corresponding event. - * - * This message can be forwarded to the CCo module. - */ -void -cp_sta_action_process_cm_set_key_cnf (cp_t *ctx, cp_mme_rx_t *mme); - -/** - * Process a CM_GET_KEY.REQ, 11.5.6. - * \param ctx control plane context - * \param mme received MME handle - * - * This message is used in several protocols. First check that this message - * is legitimate, then depending of the protocol, trigger the corresponding - * event. - * - * This message can be forwarded to the CCo module. - * - * Used to: - * - from STA to STA: - * - NMK provisioning using UKE (PID=3): - * - get HASH KEY, unencrypted unicast (not handled): used to derive the - * TEK - * - from STA to CCo: - * - get NEK, NMK encrypted (PID=0) - * - from HLE to STA: - * - get NMK (not handled) - */ -void -cp_sta_action_process_cm_get_key_req (cp_t *ctx, cp_mme_rx_t *mme); - -/** - * Process a CM_GET_KEY.CNF, 11.5.7. - * \param ctx control plane context - * \param mme received MME handle - * - * Response from a preceding CM_GET_KEY.REQ. First check that this message is - * legitimate and that it correspond to a sent request, then trigger the - * corresponding event. - */ -void -cp_sta_action_process_cm_get_key_cnf (cp_t *ctx, cp_mme_rx_t *mme); - -END_DECLS - -#endif /* cp2_sta_action_key_h */ -- cgit v1.2.3