| /* |
| * Copyright (c) 2005-2009 Brocade Communications Systems, Inc. |
| * All rights reserved |
| * www.brocade.com |
| * |
| * Linux driver for Brocade Fibre Channel Host Bus Adapter. |
| * |
| * This program is free software; you can redistribute it and/or modify it |
| * under the terms of the GNU General Public License (GPL) Version 2 as |
| * published by the Free Software Foundation |
| * |
| * This program is distributed in the hope that it will be useful, but |
| * WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
| * General Public License for more details. |
| */ |
| #ifndef __BFA_DEFS_AUTH_H__ |
| #define __BFA_DEFS_AUTH_H__ |
| |
| #include <defs/bfa_defs_types.h> |
| |
| #define PUBLIC_KEY 15409 |
| #define PRIVATE_KEY 19009 |
| #define KEY_LEN 32399 |
| #define BFA_AUTH_SECRET_STRING_LEN 256 |
| #define BFA_AUTH_FAIL_TIMEOUT 0xFF |
| |
| /** |
| * Authentication status |
| */ |
| enum bfa_auth_status { |
| BFA_AUTH_STATUS_NONE = 0, /* no authentication */ |
| BFA_AUTH_UNINIT = 1, /* state - uninit */ |
| BFA_AUTH_NEG_SEND = 2, /* state - negotiate send */ |
| BFA_AUTH_CHAL_WAIT = 3, /* state - challenge wait */ |
| BFA_AUTH_NEG_RETRY = 4, /* state - negotiate retry */ |
| BFA_AUTH_REPLY_SEND = 5, /* state - reply send */ |
| BFA_AUTH_STATUS_WAIT = 6, /* state - status wait */ |
| BFA_AUTH_SUCCESS = 7, /* state - success */ |
| BFA_AUTH_FAILED = 8, /* state - failed */ |
| BFA_AUTH_STATUS_UNKNOWN = 9, /* authentication status unknown */ |
| }; |
| |
| struct auth_proto_stats_s { |
| u32 auth_rjts; |
| u32 auth_negs; |
| u32 auth_dones; |
| |
| u32 dhchap_challenges; |
| u32 dhchap_replies; |
| u32 dhchap_successes; |
| }; |
| |
| /** |
| * Authentication related statistics |
| */ |
| struct bfa_auth_stats_s { |
| u32 auth_failures; /* authentication failures */ |
| u32 auth_successes; /* authentication successes*/ |
| struct auth_proto_stats_s auth_rx_stats; /* Rx protocol stats */ |
| struct auth_proto_stats_s auth_tx_stats; /* Tx protocol stats */ |
| }; |
| |
| /** |
| * Authentication hash function algorithms |
| */ |
| enum bfa_auth_algo { |
| BFA_AUTH_ALGO_MD5 = 1, /* Message-Digest algorithm 5 */ |
| BFA_AUTH_ALGO_SHA1 = 2, /* Secure Hash Algorithm 1 */ |
| BFA_AUTH_ALGO_MS = 3, /* MD5, then SHA-1 */ |
| BFA_AUTH_ALGO_SM = 4, /* SHA-1, then MD5 */ |
| }; |
| |
| /** |
| * DH Groups |
| * |
| * Current value could be combination of one or more of the following values |
| */ |
| enum bfa_auth_group { |
| BFA_AUTH_GROUP_DHNULL = 0, /* DH NULL (value == 0) */ |
| BFA_AUTH_GROUP_DH768 = 1, /* DH group 768 (value == 1) */ |
| BFA_AUTH_GROUP_DH1024 = 2, /* DH group 1024 (value == 2) */ |
| BFA_AUTH_GROUP_DH1280 = 4, /* DH group 1280 (value == 3) */ |
| BFA_AUTH_GROUP_DH1536 = 8, /* DH group 1536 (value == 4) */ |
| |
| BFA_AUTH_GROUP_ALL = 256 /* Use default DH group order |
| * 0, 1, 2, 3, 4 */ |
| }; |
| |
| /** |
| * Authentication secret sources |
| */ |
| enum bfa_auth_secretsource { |
| BFA_AUTH_SECSRC_LOCAL = 1, /* locally configured */ |
| BFA_AUTH_SECSRC_RADIUS = 2, /* use radius server */ |
| BFA_AUTH_SECSRC_TACACS = 3, /* TACACS server */ |
| }; |
| |
| /** |
| * Authentication attributes |
| */ |
| struct bfa_auth_attr_s { |
| enum bfa_auth_status status; |
| enum bfa_auth_algo algo; |
| enum bfa_auth_group dh_grp; |
| u16 rjt_code; |
| u16 rjt_code_exp; |
| u8 secret_set; |
| u8 resv[7]; |
| }; |
| |
| #endif /* __BFA_DEFS_AUTH_H__ */ |