Home | History | Annotate | Download | only in eap_server
      1 /*
      2  * hostapd / EAP Authenticator state machine internal structures (RFC 4137)
      3  * Copyright (c) 2004-2007, Jouni Malinen <j (at) w1.fi>
      4  *
      5  * This program is free software; you can redistribute it and/or modify
      6  * it under the terms of the GNU General Public License version 2 as
      7  * published by the Free Software Foundation.
      8  *
      9  * Alternatively, this software may be distributed under the terms of BSD
     10  * license.
     11  *
     12  * See README and COPYING for more details.
     13  */
     14 
     15 #ifndef EAP_I_H
     16 #define EAP_I_H
     17 
     18 #include "wpabuf.h"
     19 #include "eap_server/eap.h"
     20 #include "eap_common/eap_common.h"
     21 
     22 /* RFC 4137 - EAP Standalone Authenticator */
     23 
     24 /**
     25  * struct eap_method - EAP method interface
     26  * This structure defines the EAP method interface. Each method will need to
     27  * register its own EAP type, EAP name, and set of function pointers for method
     28  * specific operations. This interface is based on section 5.4 of RFC 4137.
     29  */
     30 struct eap_method {
     31 	int vendor;
     32 	EapType method;
     33 	const char *name;
     34 
     35 	void * (*init)(struct eap_sm *sm);
     36 	void * (*initPickUp)(struct eap_sm *sm);
     37 	void (*reset)(struct eap_sm *sm, void *priv);
     38 
     39 	struct wpabuf * (*buildReq)(struct eap_sm *sm, void *priv, u8 id);
     40 	int (*getTimeout)(struct eap_sm *sm, void *priv);
     41 	Boolean (*check)(struct eap_sm *sm, void *priv,
     42 			 struct wpabuf *respData);
     43 	void (*process)(struct eap_sm *sm, void *priv,
     44 			struct wpabuf *respData);
     45 	Boolean (*isDone)(struct eap_sm *sm, void *priv);
     46 	u8 * (*getKey)(struct eap_sm *sm, void *priv, size_t *len);
     47 	/* isSuccess is not specified in draft-ietf-eap-statemachine-05.txt,
     48 	 * but it is useful in implementing Policy.getDecision() */
     49 	Boolean (*isSuccess)(struct eap_sm *sm, void *priv);
     50 
     51 	/**
     52 	 * free - Free EAP method data
     53 	 * @method: Pointer to the method data registered with
     54 	 * eap_server_method_register().
     55 	 *
     56 	 * This function will be called when the EAP method is being
     57 	 * unregistered. If the EAP method allocated resources during
     58 	 * registration (e.g., allocated struct eap_method), they should be
     59 	 * freed in this function. No other method functions will be called
     60 	 * after this call. If this function is not defined (i.e., function
     61 	 * pointer is %NULL), a default handler is used to release the method
     62 	 * data with free(method). This is suitable for most cases.
     63 	 */
     64 	void (*free)(struct eap_method *method);
     65 
     66 #define EAP_SERVER_METHOD_INTERFACE_VERSION 1
     67 	/**
     68 	 * version - Version of the EAP server method interface
     69 	 *
     70 	 * The EAP server method implementation should set this variable to
     71 	 * EAP_SERVER_METHOD_INTERFACE_VERSION. This is used to verify that the
     72 	 * EAP method is using supported API version when using dynamically
     73 	 * loadable EAP methods.
     74 	 */
     75 	int version;
     76 
     77 	/**
     78 	 * next - Pointer to the next EAP method
     79 	 *
     80 	 * This variable is used internally in the EAP method registration code
     81 	 * to create a linked list of registered EAP methods.
     82 	 */
     83 	struct eap_method *next;
     84 
     85 	/**
     86 	 * get_emsk - Get EAP method specific keying extended material (EMSK)
     87 	 * @sm: Pointer to EAP state machine allocated with eap_sm_init()
     88 	 * @priv: Pointer to private EAP method data from eap_method::init()
     89 	 * @len: Pointer to a variable to store EMSK length
     90 	 * Returns: EMSK or %NULL if not available
     91 	 *
     92 	 * This function can be used to get the extended keying material from
     93 	 * the EAP method. The key may already be stored in the method-specific
     94 	 * private data or this function may derive the key.
     95 	 */
     96 	u8 * (*get_emsk)(struct eap_sm *sm, void *priv, size_t *len);
     97 };
     98 
     99 /**
    100  * struct eap_sm - EAP server state machine data
    101  */
    102 struct eap_sm {
    103 	enum {
    104 		EAP_DISABLED, EAP_INITIALIZE, EAP_IDLE, EAP_RECEIVED,
    105 		EAP_INTEGRITY_CHECK, EAP_METHOD_RESPONSE, EAP_METHOD_REQUEST,
    106 		EAP_PROPOSE_METHOD, EAP_SELECT_ACTION, EAP_SEND_REQUEST,
    107 		EAP_DISCARD, EAP_NAK, EAP_RETRANSMIT, EAP_SUCCESS, EAP_FAILURE,
    108 		EAP_TIMEOUT_FAILURE, EAP_PICK_UP_METHOD,
    109 		EAP_INITIALIZE_PASSTHROUGH, EAP_IDLE2, EAP_RETRANSMIT2,
    110 		EAP_RECEIVED2, EAP_DISCARD2, EAP_SEND_REQUEST2,
    111 		EAP_AAA_REQUEST, EAP_AAA_RESPONSE, EAP_AAA_IDLE,
    112 		EAP_TIMEOUT_FAILURE2, EAP_FAILURE2, EAP_SUCCESS2
    113 	} EAP_state;
    114 
    115 	/* Constants */
    116 	int MaxRetrans;
    117 
    118 	struct eap_eapol_interface eap_if;
    119 
    120 	/* Full authenticator state machine local variables */
    121 
    122 	/* Long-term (maintained betwen packets) */
    123 	EapType currentMethod;
    124 	int currentId;
    125 	enum {
    126 		METHOD_PROPOSED, METHOD_CONTINUE, METHOD_END
    127 	} methodState;
    128 	int retransCount;
    129 	struct wpabuf *lastReqData;
    130 	int methodTimeout;
    131 
    132 	/* Short-term (not maintained between packets) */
    133 	Boolean rxResp;
    134 	int respId;
    135 	EapType respMethod;
    136 	int respVendor;
    137 	u32 respVendorMethod;
    138 	Boolean ignore;
    139 	enum {
    140 		DECISION_SUCCESS, DECISION_FAILURE, DECISION_CONTINUE,
    141 		DECISION_PASSTHROUGH
    142 	} decision;
    143 
    144 	/* Miscellaneous variables */
    145 	const struct eap_method *m; /* selected EAP method */
    146 	/* not defined in RFC 4137 */
    147 	Boolean changed;
    148 	void *eapol_ctx, *msg_ctx;
    149 	struct eapol_callbacks *eapol_cb;
    150 	void *eap_method_priv;
    151 	u8 *identity;
    152 	size_t identity_len;
    153 	/* Whether Phase 2 method should validate identity match */
    154 	int require_identity_match;
    155 	int lastId; /* Identifier used in the last EAP-Packet */
    156 	struct eap_user *user;
    157 	int user_eap_method_index;
    158 	int init_phase2;
    159 	void *ssl_ctx;
    160 	void *eap_sim_db_priv;
    161 	Boolean backend_auth;
    162 	Boolean update_user;
    163 	int eap_server;
    164 
    165 	int num_rounds;
    166 	enum {
    167 		METHOD_PENDING_NONE, METHOD_PENDING_WAIT, METHOD_PENDING_CONT
    168 	} method_pending;
    169 
    170 	u8 *auth_challenge;
    171 	u8 *peer_challenge;
    172 
    173 	u8 *pac_opaque_encr_key;
    174 	u8 *eap_fast_a_id;
    175 	size_t eap_fast_a_id_len;
    176 	char *eap_fast_a_id_info;
    177 	enum {
    178 		NO_PROV, ANON_PROV, AUTH_PROV, BOTH_PROV
    179 	} eap_fast_prov;
    180 	int pac_key_lifetime;
    181 	int pac_key_refresh_time;
    182 	int eap_sim_aka_result_ind;
    183 	int tnc;
    184 	struct wps_context *wps;
    185 	struct wpabuf *assoc_wps_ie;
    186 
    187 	Boolean start_reauth;
    188 };
    189 
    190 int eap_user_get(struct eap_sm *sm, const u8 *identity, size_t identity_len,
    191 		 int phase2);
    192 void eap_sm_process_nak(struct eap_sm *sm, const u8 *nak_list, size_t len);
    193 
    194 #endif /* EAP_I_H */
    195