bbf94a0958
Drivers that trigger roaming need to know the lifetime and reauth threshold time of configured PMKSA so that they can trigger full authentication to avoid unnecessary disconnection. To support this, send dot11RSNAConfigPMKLifetime and dot11RSNAConfigPMKReauthThreshold values configured in wpa_supplicant to the driver while configuring a PMKSA. Signed-off-by: Veerendranath Jakkam <vjakkam@codeaurora.org>
372 lines
8.8 KiB
C
372 lines
8.8 KiB
C
/*
|
|
* WPA Supplicant - test code for pre-authentication
|
|
* Copyright (c) 2003-2007, Jouni Malinen <j@w1.fi>
|
|
*
|
|
* This software may be distributed under the terms of the BSD license.
|
|
* See README for more details.
|
|
*
|
|
* IEEE 802.1X Supplicant test code (to be used in place of wpa_supplicant.c.
|
|
* Not used in production version.
|
|
*/
|
|
|
|
#include "includes.h"
|
|
#include <assert.h>
|
|
|
|
#include "common.h"
|
|
#include "config.h"
|
|
#include "eapol_supp/eapol_supp_sm.h"
|
|
#include "eloop.h"
|
|
#include "rsn_supp/wpa.h"
|
|
#include "eap_peer/eap.h"
|
|
#include "wpa_supplicant_i.h"
|
|
#include "l2_packet/l2_packet.h"
|
|
#include "ctrl_iface.h"
|
|
#include "pcsc_funcs.h"
|
|
#include "rsn_supp/preauth.h"
|
|
#include "rsn_supp/pmksa_cache.h"
|
|
#include "drivers/driver.h"
|
|
|
|
|
|
const struct wpa_driver_ops *const wpa_drivers[] = { NULL };
|
|
|
|
|
|
struct preauth_test_data {
|
|
int auth_timed_out;
|
|
};
|
|
|
|
|
|
static void _wpa_supplicant_deauthenticate(void *wpa_s, u16 reason_code)
|
|
{
|
|
wpa_supplicant_deauthenticate(wpa_s, reason_code);
|
|
}
|
|
|
|
|
|
static void _wpa_supplicant_reconnect(void *wpa_s)
|
|
{
|
|
wpa_supplicant_reconnect(wpa_s);
|
|
}
|
|
|
|
|
|
static u8 * wpa_alloc_eapol(const struct wpa_supplicant *wpa_s, u8 type,
|
|
const void *data, u16 data_len,
|
|
size_t *msg_len, void **data_pos)
|
|
{
|
|
struct ieee802_1x_hdr *hdr;
|
|
|
|
*msg_len = sizeof(*hdr) + data_len;
|
|
hdr = os_malloc(*msg_len);
|
|
if (hdr == NULL)
|
|
return NULL;
|
|
|
|
hdr->version = wpa_s->conf->eapol_version;
|
|
hdr->type = type;
|
|
hdr->length = htons(data_len);
|
|
|
|
if (data)
|
|
os_memcpy(hdr + 1, data, data_len);
|
|
else
|
|
os_memset(hdr + 1, 0, data_len);
|
|
|
|
if (data_pos)
|
|
*data_pos = hdr + 1;
|
|
|
|
return (u8 *) hdr;
|
|
}
|
|
|
|
|
|
static u8 * _wpa_alloc_eapol(void *wpa_s, u8 type,
|
|
const void *data, u16 data_len,
|
|
size_t *msg_len, void **data_pos)
|
|
{
|
|
return wpa_alloc_eapol(wpa_s, type, data, data_len, msg_len, data_pos);
|
|
}
|
|
|
|
|
|
static void _wpa_supplicant_set_state(void *ctx, enum wpa_states state)
|
|
{
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
wpa_s->wpa_state = state;
|
|
}
|
|
|
|
|
|
static enum wpa_states _wpa_supplicant_get_state(void *ctx)
|
|
{
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
return wpa_s->wpa_state;
|
|
}
|
|
|
|
|
|
static int wpa_ether_send(void *wpa_s, const u8 *dest, u16 proto,
|
|
const u8 *buf, size_t len)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static void * wpa_supplicant_get_network_ctx(void *wpa_s)
|
|
{
|
|
return wpa_supplicant_get_ssid(wpa_s);
|
|
}
|
|
|
|
|
|
static void _wpa_supplicant_cancel_auth_timeout(void *wpa_s)
|
|
{
|
|
wpa_supplicant_cancel_auth_timeout(wpa_s);
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_get_beacon_ie(void *wpa_s)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_get_bssid(void *wpa_s, u8 *bssid)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_set_key(void *wpa_s, enum wpa_alg alg,
|
|
const u8 *addr, int key_idx, int set_tx,
|
|
const u8 *seq, size_t seq_len,
|
|
const u8 *key, size_t key_len,
|
|
enum key_flag key_flag)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_mlme_setprotection(void *wpa_s, const u8 *addr,
|
|
int protection_type,
|
|
int key_type)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_add_pmkid(void *wpa_s, void *network_ctx,
|
|
const u8 *bssid, const u8 *pmkid,
|
|
const u8 *fils_cache_id,
|
|
const u8 *pmk, size_t pmk_len,
|
|
u32 pmk_lifetime, u8 pmk_reauth_threshold)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static int wpa_supplicant_remove_pmkid(void *wpa_s, void *network_ctx,
|
|
const u8 *bssid, const u8 *pmkid,
|
|
const u8 *fils_cache_id)
|
|
{
|
|
printf("%s - not implemented\n", __func__);
|
|
return -1;
|
|
}
|
|
|
|
|
|
static void wpa_supplicant_set_config_blob(void *ctx,
|
|
struct wpa_config_blob *blob)
|
|
{
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
wpa_config_set_blob(wpa_s->conf, blob);
|
|
}
|
|
|
|
|
|
static const struct wpa_config_blob *
|
|
wpa_supplicant_get_config_blob(void *ctx, const char *name)
|
|
{
|
|
struct wpa_supplicant *wpa_s = ctx;
|
|
return wpa_config_get_blob(wpa_s->conf, name);
|
|
}
|
|
|
|
|
|
static void test_eapol_clean(struct wpa_supplicant *wpa_s)
|
|
{
|
|
rsn_preauth_deinit(wpa_s->wpa);
|
|
pmksa_candidate_free(wpa_s->wpa);
|
|
wpa_sm_deinit(wpa_s->wpa);
|
|
scard_deinit(wpa_s->scard);
|
|
if (wpa_s->ctrl_iface) {
|
|
wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface);
|
|
wpa_s->ctrl_iface = NULL;
|
|
}
|
|
wpa_config_free(wpa_s->conf);
|
|
}
|
|
|
|
|
|
static void eapol_test_timeout(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
struct preauth_test_data *p = eloop_ctx;
|
|
printf("EAPOL test timed out\n");
|
|
p->auth_timed_out = 1;
|
|
eloop_terminate();
|
|
}
|
|
|
|
|
|
static void eapol_test_poll(void *eloop_ctx, void *timeout_ctx)
|
|
{
|
|
struct wpa_supplicant *wpa_s = eloop_ctx;
|
|
if (!rsn_preauth_in_progress(wpa_s->wpa))
|
|
eloop_terminate();
|
|
else {
|
|
eloop_register_timeout(0, 100000, eapol_test_poll, eloop_ctx,
|
|
timeout_ctx);
|
|
}
|
|
}
|
|
|
|
|
|
static struct wpa_driver_ops dummy_driver;
|
|
|
|
|
|
static void wpa_init_conf(struct wpa_supplicant *wpa_s, const char *ifname)
|
|
{
|
|
struct l2_packet_data *l2;
|
|
struct wpa_sm_ctx *ctx;
|
|
|
|
os_memset(&dummy_driver, 0, sizeof(dummy_driver));
|
|
wpa_s->driver = &dummy_driver;
|
|
|
|
ctx = os_zalloc(sizeof(*ctx));
|
|
assert(ctx != NULL);
|
|
|
|
ctx->ctx = wpa_s;
|
|
ctx->msg_ctx = wpa_s;
|
|
ctx->set_state = _wpa_supplicant_set_state;
|
|
ctx->get_state = _wpa_supplicant_get_state;
|
|
ctx->deauthenticate = _wpa_supplicant_deauthenticate;
|
|
ctx->set_key = wpa_supplicant_set_key;
|
|
ctx->get_network_ctx = wpa_supplicant_get_network_ctx;
|
|
ctx->get_bssid = wpa_supplicant_get_bssid;
|
|
ctx->ether_send = wpa_ether_send;
|
|
ctx->get_beacon_ie = wpa_supplicant_get_beacon_ie;
|
|
ctx->alloc_eapol = _wpa_alloc_eapol;
|
|
ctx->cancel_auth_timeout = _wpa_supplicant_cancel_auth_timeout;
|
|
ctx->add_pmkid = wpa_supplicant_add_pmkid;
|
|
ctx->remove_pmkid = wpa_supplicant_remove_pmkid;
|
|
ctx->set_config_blob = wpa_supplicant_set_config_blob;
|
|
ctx->get_config_blob = wpa_supplicant_get_config_blob;
|
|
ctx->mlme_setprotection = wpa_supplicant_mlme_setprotection;
|
|
ctx->reconnect = _wpa_supplicant_reconnect;
|
|
|
|
wpa_s->wpa = wpa_sm_init(ctx);
|
|
assert(wpa_s->wpa != NULL);
|
|
wpa_sm_set_param(wpa_s->wpa, WPA_PARAM_PROTO, WPA_PROTO_RSN);
|
|
|
|
os_strlcpy(wpa_s->ifname, ifname, sizeof(wpa_s->ifname));
|
|
wpa_sm_set_ifname(wpa_s->wpa, wpa_s->ifname, NULL);
|
|
|
|
l2 = l2_packet_init(wpa_s->ifname, NULL, ETH_P_RSN_PREAUTH, NULL,
|
|
NULL, 0);
|
|
assert(l2 != NULL);
|
|
if (l2_packet_get_own_addr(l2, wpa_s->own_addr)) {
|
|
wpa_printf(MSG_WARNING, "Failed to get own L2 address\n");
|
|
exit(-1);
|
|
}
|
|
l2_packet_deinit(l2);
|
|
wpa_sm_set_own_addr(wpa_s->wpa, wpa_s->own_addr);
|
|
}
|
|
|
|
|
|
static void eapol_test_terminate(int sig, void *signal_ctx)
|
|
{
|
|
struct wpa_supplicant *wpa_s = signal_ctx;
|
|
wpa_msg(wpa_s, MSG_INFO, "Signal %d received - terminating", sig);
|
|
eloop_terminate();
|
|
}
|
|
|
|
|
|
int main(int argc, char *argv[])
|
|
{
|
|
struct wpa_supplicant wpa_s;
|
|
int ret = 1;
|
|
u8 bssid[ETH_ALEN];
|
|
struct preauth_test_data preauth_test;
|
|
|
|
if (os_program_init())
|
|
return -1;
|
|
|
|
os_memset(&preauth_test, 0, sizeof(preauth_test));
|
|
|
|
wpa_debug_level = 0;
|
|
wpa_debug_show_keys = 1;
|
|
|
|
if (argc != 4) {
|
|
printf("usage: preauth_test <conf> <target MAC address> "
|
|
"<ifname>\n");
|
|
return -1;
|
|
}
|
|
|
|
if (hwaddr_aton(argv[2], bssid)) {
|
|
printf("Failed to parse target address '%s'.\n", argv[2]);
|
|
return -1;
|
|
}
|
|
|
|
if (eap_register_methods()) {
|
|
wpa_printf(MSG_ERROR, "Failed to register EAP methods");
|
|
return -1;
|
|
}
|
|
|
|
if (eloop_init()) {
|
|
wpa_printf(MSG_ERROR, "Failed to initialize event loop");
|
|
return -1;
|
|
}
|
|
|
|
os_memset(&wpa_s, 0, sizeof(wpa_s));
|
|
wpa_s.conf = wpa_config_read(argv[1], NULL);
|
|
if (wpa_s.conf == NULL) {
|
|
printf("Failed to parse configuration file '%s'.\n", argv[1]);
|
|
return -1;
|
|
}
|
|
if (wpa_s.conf->ssid == NULL) {
|
|
printf("No networks defined.\n");
|
|
return -1;
|
|
}
|
|
|
|
wpa_init_conf(&wpa_s, argv[3]);
|
|
wpa_s.ctrl_iface = wpa_supplicant_ctrl_iface_init(&wpa_s);
|
|
if (wpa_s.ctrl_iface == NULL) {
|
|
printf("Failed to initialize control interface '%s'.\n"
|
|
"You may have another preauth_test process already "
|
|
"running or the file was\n"
|
|
"left by an unclean termination of preauth_test in "
|
|
"which case you will need\n"
|
|
"to manually remove this file before starting "
|
|
"preauth_test again.\n",
|
|
wpa_s.conf->ctrl_interface);
|
|
return -1;
|
|
}
|
|
if (wpa_supplicant_scard_init(&wpa_s, wpa_s.conf->ssid))
|
|
return -1;
|
|
|
|
if (rsn_preauth_init(wpa_s.wpa, bssid, &wpa_s.conf->ssid->eap))
|
|
return -1;
|
|
|
|
eloop_register_timeout(30, 0, eapol_test_timeout, &preauth_test, NULL);
|
|
eloop_register_timeout(0, 100000, eapol_test_poll, &wpa_s, NULL);
|
|
eloop_register_signal_terminate(eapol_test_terminate, &wpa_s);
|
|
eloop_register_signal_reconfig(eapol_test_terminate, &wpa_s);
|
|
eloop_run();
|
|
|
|
if (preauth_test.auth_timed_out)
|
|
ret = -2;
|
|
else {
|
|
ret = pmksa_cache_set_current(wpa_s.wpa, NULL, bssid, NULL, 0,
|
|
NULL, 0) ? 0 : -3;
|
|
}
|
|
|
|
test_eapol_clean(&wpa_s);
|
|
|
|
eap_peer_unregister_methods();
|
|
|
|
eloop_destroy();
|
|
|
|
os_program_deinit();
|
|
|
|
return ret;
|
|
}
|