2008-02-28 02:34:43 +01:00
|
|
|
/*
|
|
|
|
* hostapd / EAP Full Authenticator state machine (RFC 4137)
|
2014-11-29 20:28:24 +01:00
|
|
|
* Copyright (c) 2004-2014, Jouni Malinen <j@w1.fi>
|
2008-02-28 02:34:43 +01:00
|
|
|
*
|
2012-02-11 15:46:35 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-28 02:34:43 +01:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef EAP_H
|
|
|
|
#define EAP_H
|
|
|
|
|
2009-11-29 16:51:55 +01:00
|
|
|
#include "common/defs.h"
|
2014-11-29 20:28:24 +01:00
|
|
|
#include "utils/list.h"
|
2008-02-28 02:34:43 +01:00
|
|
|
#include "eap_common/eap_defs.h"
|
|
|
|
#include "eap_server/eap_methods.h"
|
|
|
|
#include "wpabuf.h"
|
|
|
|
|
|
|
|
struct eap_sm;
|
|
|
|
|
|
|
|
#define EAP_TTLS_AUTH_PAP 1
|
|
|
|
#define EAP_TTLS_AUTH_CHAP 2
|
|
|
|
#define EAP_TTLS_AUTH_MSCHAP 4
|
|
|
|
#define EAP_TTLS_AUTH_MSCHAPV2 8
|
|
|
|
|
|
|
|
struct eap_user {
|
|
|
|
struct {
|
|
|
|
int vendor;
|
|
|
|
u32 method;
|
|
|
|
} methods[EAP_MAX_METHODS];
|
|
|
|
u8 *password;
|
|
|
|
size_t password_len;
|
|
|
|
int password_hash; /* whether password is hashed with
|
|
|
|
* nt_password_hash() */
|
2018-05-25 20:40:04 +02:00
|
|
|
u8 *salt;
|
|
|
|
size_t salt_len;
|
2008-02-28 02:34:43 +01:00
|
|
|
int phase2;
|
|
|
|
int force_version;
|
2012-11-21 16:04:21 +01:00
|
|
|
unsigned int remediation:1;
|
2014-03-29 18:31:56 +01:00
|
|
|
unsigned int macacl:1;
|
2008-02-28 02:34:43 +01:00
|
|
|
int ttls_auth; /* bitfield of
|
|
|
|
* EAP_TTLS_AUTH_{PAP,CHAP,MSCHAP,MSCHAPV2} */
|
2014-03-07 22:19:52 +01:00
|
|
|
struct hostapd_radius_attr *accept_attr;
|
2018-04-25 23:57:44 +02:00
|
|
|
u32 t_c_timestamp;
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct eap_eapol_interface {
|
|
|
|
/* Lower layer to full authenticator variables */
|
|
|
|
Boolean eapResp; /* shared with EAPOL Backend Authentication */
|
|
|
|
struct wpabuf *eapRespData;
|
|
|
|
Boolean portEnabled;
|
|
|
|
int retransWhile;
|
|
|
|
Boolean eapRestart; /* shared with EAPOL Authenticator PAE */
|
|
|
|
int eapSRTT;
|
|
|
|
int eapRTTVAR;
|
|
|
|
|
|
|
|
/* Full authenticator to lower layer variables */
|
|
|
|
Boolean eapReq; /* shared with EAPOL Backend Authentication */
|
|
|
|
Boolean eapNoReq; /* shared with EAPOL Backend Authentication */
|
|
|
|
Boolean eapSuccess;
|
|
|
|
Boolean eapFail;
|
|
|
|
Boolean eapTimeout;
|
|
|
|
struct wpabuf *eapReqData;
|
|
|
|
u8 *eapKeyData;
|
|
|
|
size_t eapKeyDataLen;
|
2014-11-29 22:46:45 +01:00
|
|
|
u8 *eapSessionId;
|
|
|
|
size_t eapSessionIdLen;
|
2008-02-28 02:34:43 +01:00
|
|
|
Boolean eapKeyAvailable; /* called keyAvailable in IEEE 802.1X-2004 */
|
|
|
|
|
|
|
|
/* AAA interface to full authenticator variables */
|
|
|
|
Boolean aaaEapReq;
|
|
|
|
Boolean aaaEapNoReq;
|
|
|
|
Boolean aaaSuccess;
|
|
|
|
Boolean aaaFail;
|
|
|
|
struct wpabuf *aaaEapReqData;
|
|
|
|
u8 *aaaEapKeyData;
|
|
|
|
size_t aaaEapKeyDataLen;
|
|
|
|
Boolean aaaEapKeyAvailable;
|
|
|
|
int aaaMethodTimeout;
|
|
|
|
|
|
|
|
/* Full authenticator to AAA interface variables */
|
|
|
|
Boolean aaaEapResp;
|
|
|
|
struct wpabuf *aaaEapRespData;
|
|
|
|
/* aaaIdentity -> eap_get_identity() */
|
|
|
|
Boolean aaaTimeout;
|
|
|
|
};
|
|
|
|
|
2014-11-29 20:28:24 +01:00
|
|
|
struct eap_server_erp_key {
|
|
|
|
struct dl_list list;
|
|
|
|
size_t rRK_len;
|
|
|
|
size_t rIK_len;
|
|
|
|
u8 rRK[ERP_MAX_KEY_LEN];
|
|
|
|
u8 rIK[ERP_MAX_KEY_LEN];
|
|
|
|
u32 recv_seq;
|
|
|
|
u8 cryptosuite;
|
|
|
|
char keyname_nai[];
|
|
|
|
};
|
|
|
|
|
2008-02-28 02:34:43 +01:00
|
|
|
struct eapol_callbacks {
|
|
|
|
int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
|
|
|
|
int phase2, struct eap_user *user);
|
|
|
|
const char * (*get_eap_req_id_text)(void *ctx, size_t *len);
|
2014-02-28 13:41:42 +01:00
|
|
|
void (*log_msg)(void *ctx, const char *msg);
|
2014-11-29 19:33:09 +01:00
|
|
|
int (*get_erp_send_reauth_start)(void *ctx);
|
|
|
|
const char * (*get_erp_domain)(void *ctx);
|
2014-11-29 20:28:24 +01:00
|
|
|
struct eap_server_erp_key * (*erp_get_key)(void *ctx,
|
|
|
|
const char *keyname);
|
|
|
|
int (*erp_add_key)(void *ctx, struct eap_server_erp_key *erp);
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
struct eap_config {
|
|
|
|
void *ssl_ctx;
|
2010-04-07 10:13:14 +02:00
|
|
|
void *msg_ctx;
|
2008-02-28 02:34:43 +01:00
|
|
|
void *eap_sim_db_priv;
|
|
|
|
Boolean backend_auth;
|
|
|
|
int eap_server;
|
2010-09-15 09:51:40 +02:00
|
|
|
u16 pwd_group;
|
2008-02-28 02:34:43 +01:00
|
|
|
u8 *pac_opaque_encr_key;
|
2008-10-19 08:55:59 +02:00
|
|
|
u8 *eap_fast_a_id;
|
|
|
|
size_t eap_fast_a_id_len;
|
|
|
|
char *eap_fast_a_id_info;
|
2008-10-08 15:55:23 +02:00
|
|
|
int eap_fast_prov;
|
2008-10-08 16:25:47 +02:00
|
|
|
int pac_key_lifetime;
|
|
|
|
int pac_key_refresh_time;
|
2008-02-28 02:34:43 +01:00
|
|
|
int eap_sim_aka_result_ind;
|
2008-03-09 09:42:53 +01:00
|
|
|
int tnc;
|
2008-11-23 18:34:26 +01:00
|
|
|
struct wps_context *wps;
|
2008-11-29 11:11:56 +01:00
|
|
|
const struct wpabuf *assoc_wps_ie;
|
2010-07-18 23:30:25 +02:00
|
|
|
const struct wpabuf *assoc_p2p_ie;
|
2009-09-07 21:09:13 +02:00
|
|
|
const u8 *peer_addr;
|
2010-07-19 04:28:53 +02:00
|
|
|
int fragment_size;
|
2011-05-17 18:53:02 +02:00
|
|
|
|
|
|
|
int pbc_in_m1;
|
2013-07-06 17:17:15 +02:00
|
|
|
|
|
|
|
const u8 *server_id;
|
|
|
|
size_t server_id_len;
|
2014-11-29 20:28:24 +01:00
|
|
|
int erp;
|
2015-08-23 20:26:39 +02:00
|
|
|
unsigned int tls_session_lifetime;
|
2017-09-16 23:11:37 +02:00
|
|
|
unsigned int tls_flags;
|
2014-03-01 23:43:59 +01:00
|
|
|
|
|
|
|
#ifdef CONFIG_TESTING_OPTIONS
|
|
|
|
u32 tls_test_flags;
|
|
|
|
#endif /* CONFIG_TESTING_OPTIONS */
|
2008-02-28 02:34:43 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
struct eap_sm * eap_server_sm_init(void *eapol_ctx,
|
2015-04-24 09:19:53 +02:00
|
|
|
const struct eapol_callbacks *eapol_cb,
|
2008-02-28 02:34:43 +01:00
|
|
|
struct eap_config *eap_conf);
|
|
|
|
void eap_server_sm_deinit(struct eap_sm *sm);
|
|
|
|
int eap_server_sm_step(struct eap_sm *sm);
|
|
|
|
void eap_sm_notify_cached(struct eap_sm *sm);
|
|
|
|
void eap_sm_pending_cb(struct eap_sm *sm);
|
|
|
|
int eap_sm_method_pending(struct eap_sm *sm);
|
|
|
|
const u8 * eap_get_identity(struct eap_sm *sm, size_t *len);
|
2018-10-07 15:49:26 +02:00
|
|
|
const char * eap_get_serial_num(struct eap_sm *sm);
|
2018-12-14 14:56:16 +01:00
|
|
|
const char * eap_get_method(struct eap_sm *sm);
|
|
|
|
const char * eap_get_imsi(struct eap_sm *sm);
|
2008-02-28 02:34:43 +01:00
|
|
|
struct eap_eapol_interface * eap_get_interface(struct eap_sm *sm);
|
2010-11-07 15:25:35 +01:00
|
|
|
void eap_server_clear_identity(struct eap_sm *sm);
|
2015-03-29 21:49:16 +02:00
|
|
|
void eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source,
|
|
|
|
const u8 *username, size_t username_len,
|
|
|
|
const u8 *challenge, const u8 *response);
|
2015-09-04 23:04:21 +02:00
|
|
|
void eap_erp_update_identity(struct eap_sm *sm, const u8 *eap, size_t len);
|
2019-03-03 01:52:22 +01:00
|
|
|
void eap_user_free(struct eap_user *user);
|
2008-02-28 02:34:43 +01:00
|
|
|
|
|
|
|
#endif /* EAP_H */
|