ieee802_1x_cp.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. /*
  2. * IEEE 802.1X-2010 Controlled Port of PAE state machine - CP state machine
  3. * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "common/defs.h"
  12. #include "common/ieee802_1x_defs.h"
  13. #include "utils/state_machine.h"
  14. #include "ieee802_1x_kay.h"
  15. #include "ieee802_1x_secy_ops.h"
  16. #include "pae/ieee802_1x_cp.h"
  17. #define STATE_MACHINE_DATA struct ieee802_1x_cp_sm
  18. #define STATE_MACHINE_DEBUG_PREFIX "CP"
  19. static u64 default_cs_id = CS_ID_GCM_AES_128;
  20. /* The variable defined in clause 12 in IEEE Std 802.1X-2010 */
  21. enum connect_type { PENDING, UNAUTHENTICATED, AUTHENTICATED, SECURE };
  22. struct ieee802_1x_cp_sm {
  23. enum cp_states {
  24. CP_BEGIN, CP_INIT, CP_CHANGE, CP_ALLOWED, CP_AUTHENTICATED,
  25. CP_SECURED, CP_RECEIVE, CP_RECEIVING, CP_READY, CP_TRANSMIT,
  26. CP_TRANSMITTING, CP_ABANDON, CP_RETIRE
  27. } CP_state;
  28. Boolean changed;
  29. /* CP -> Client */
  30. Boolean port_valid;
  31. /* Logon -> CP */
  32. enum connect_type connect;
  33. u8 *authorization_data;
  34. /* KaY -> CP */
  35. Boolean chgd_server; /* clear by CP */
  36. Boolean elected_self;
  37. u8 *authorization_data1;
  38. enum confidentiality_offset cipher_offset;
  39. u64 cipher_suite;
  40. Boolean new_sak; /* clear by CP */
  41. struct ieee802_1x_mka_ki distributed_ki;
  42. u8 distributed_an;
  43. Boolean using_receive_sas;
  44. Boolean all_receiving;
  45. Boolean server_transmitting;
  46. Boolean using_transmit_sa;
  47. /* CP -> KaY */
  48. struct ieee802_1x_mka_ki *lki;
  49. u8 lan;
  50. Boolean ltx;
  51. Boolean lrx;
  52. struct ieee802_1x_mka_ki *oki;
  53. u8 oan;
  54. Boolean otx;
  55. Boolean orx;
  56. /* CP -> SecY */
  57. Boolean protect_frames;
  58. enum validate_frames validate_frames;
  59. Boolean replay_protect;
  60. u32 replay_window;
  61. u64 current_cipher_suite;
  62. enum confidentiality_offset confidentiality_offset;
  63. Boolean controlled_port_enabled;
  64. /* SecY -> CP */
  65. Boolean port_enabled; /* SecY->CP */
  66. /* private */
  67. u32 transmit_when;
  68. u32 transmit_delay;
  69. u32 retire_when;
  70. u32 retire_delay;
  71. /* not defined IEEE Std 802.1X-2010 */
  72. struct ieee802_1x_kay *kay;
  73. };
  74. static void ieee802_1x_cp_retire_when_timeout(void *eloop_ctx,
  75. void *timeout_ctx);
  76. static void ieee802_1x_cp_transmit_when_timeout(void *eloop_ctx,
  77. void *timeout_ctx);
  78. static int changed_cipher(struct ieee802_1x_cp_sm *sm)
  79. {
  80. return sm->confidentiality_offset != sm->cipher_offset ||
  81. sm->current_cipher_suite != sm->cipher_suite;
  82. }
  83. static int changed_connect(struct ieee802_1x_cp_sm *sm)
  84. {
  85. return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm);
  86. }
  87. SM_STATE(CP, INIT)
  88. {
  89. SM_ENTRY(CP, INIT);
  90. sm->controlled_port_enabled = FALSE;
  91. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  92. sm->port_valid = FALSE;
  93. os_free(sm->lki);
  94. sm->lki = NULL;
  95. sm->ltx = FALSE;
  96. sm->lrx = FALSE;
  97. os_free(sm->oki);
  98. sm->oki = NULL;
  99. sm->otx = FALSE;
  100. sm->orx = FALSE;
  101. sm->port_enabled = TRUE;
  102. sm->chgd_server = FALSE;
  103. }
  104. SM_STATE(CP, CHANGE)
  105. {
  106. SM_ENTRY(CP, CHANGE);
  107. sm->port_valid = FALSE;
  108. sm->controlled_port_enabled = FALSE;
  109. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  110. if (sm->lki)
  111. ieee802_1x_kay_delete_sas(sm->kay, sm->lki);
  112. if (sm->oki)
  113. ieee802_1x_kay_delete_sas(sm->kay, sm->oki);
  114. }
  115. SM_STATE(CP, ALLOWED)
  116. {
  117. SM_ENTRY(CP, ALLOWED);
  118. sm->protect_frames = FALSE;
  119. sm->replay_protect = FALSE;
  120. sm->validate_frames = Checked;
  121. sm->port_valid = FALSE;
  122. sm->controlled_port_enabled = TRUE;
  123. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  124. secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
  125. secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
  126. secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
  127. secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
  128. }
  129. SM_STATE(CP, AUTHENTICATED)
  130. {
  131. SM_ENTRY(CP, AUTHENTICATED);
  132. sm->protect_frames = FALSE;
  133. sm->replay_protect = FALSE;
  134. sm->validate_frames = Checked;
  135. sm->port_valid = FALSE;
  136. sm->controlled_port_enabled = TRUE;
  137. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  138. secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
  139. secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
  140. secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
  141. secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
  142. }
  143. SM_STATE(CP, SECURED)
  144. {
  145. SM_ENTRY(CP, SECURED);
  146. sm->chgd_server = FALSE;
  147. sm->protect_frames = sm->kay->macsec_protect;
  148. sm->replay_protect = sm->kay->macsec_replay_protect;
  149. sm->validate_frames = sm->kay->macsec_validate;
  150. /* NOTE: now no other than default cipher suite (AES-GCM-128) */
  151. sm->current_cipher_suite = sm->cipher_suite;
  152. secy_cp_control_current_cipher_suite(sm->kay, sm->current_cipher_suite);
  153. sm->confidentiality_offset = sm->cipher_offset;
  154. sm->port_valid = TRUE;
  155. secy_cp_control_confidentiality_offset(sm->kay,
  156. sm->confidentiality_offset);
  157. secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
  158. secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
  159. secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
  160. secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
  161. }
  162. SM_STATE(CP, RECEIVE)
  163. {
  164. SM_ENTRY(CP, RECEIVE);
  165. /* RECEIVE state machine not keep with Figure 12-2 in
  166. * IEEE Std 802.1X-2010 */
  167. sm->oki = sm->lki;
  168. sm->oan = sm->lan;
  169. sm->otx = sm->ltx;
  170. sm->orx = sm->lrx;
  171. ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
  172. sm->otx, sm->orx);
  173. sm->lki = os_malloc(sizeof(*sm->lki));
  174. if (!sm->lki) {
  175. wpa_printf(MSG_ERROR, "CP-%s: Out of memory", __func__);
  176. return;
  177. }
  178. os_memcpy(sm->lki, &sm->distributed_ki, sizeof(*sm->lki));
  179. sm->lan = sm->distributed_an;
  180. sm->ltx = FALSE;
  181. sm->lrx = FALSE;
  182. ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
  183. sm->ltx, sm->lrx);
  184. ieee802_1x_kay_create_sas(sm->kay, sm->lki);
  185. ieee802_1x_kay_enable_rx_sas(sm->kay, sm->lki);
  186. sm->new_sak = FALSE;
  187. sm->all_receiving = FALSE;
  188. }
  189. SM_STATE(CP, RECEIVING)
  190. {
  191. SM_ENTRY(CP, RECEIVING);
  192. sm->lrx = TRUE;
  193. ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
  194. sm->ltx, sm->lrx);
  195. sm->transmit_when = sm->transmit_delay;
  196. eloop_cancel_timeout(ieee802_1x_cp_transmit_when_timeout, sm, NULL);
  197. eloop_register_timeout(sm->transmit_when / 1000, 0,
  198. ieee802_1x_cp_transmit_when_timeout, sm, NULL);
  199. /* the electedSelf have been set before CP entering to RECEIVING
  200. * but the CP will transmit from RECEIVING to READY under
  201. * the !electedSelf when KaY is not key server */
  202. ieee802_1x_cp_sm_step(sm);
  203. sm->using_receive_sas = FALSE;
  204. sm->server_transmitting = FALSE;
  205. }
  206. SM_STATE(CP, READY)
  207. {
  208. SM_ENTRY(CP, READY);
  209. ieee802_1x_kay_enable_new_info(sm->kay);
  210. }
  211. SM_STATE(CP, TRANSMIT)
  212. {
  213. SM_ENTRY(CP, TRANSMIT);
  214. sm->controlled_port_enabled = TRUE;
  215. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  216. sm->ltx = TRUE;
  217. ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
  218. sm->ltx, sm->lrx);
  219. ieee802_1x_kay_enable_tx_sas(sm->kay, sm->lki);
  220. sm->all_receiving = FALSE;
  221. sm->server_transmitting = FALSE;
  222. }
  223. SM_STATE(CP, TRANSMITTING)
  224. {
  225. SM_ENTRY(CP, TRANSMITTING);
  226. sm->retire_when = sm->orx ? sm->retire_delay : 0;
  227. sm->otx = FALSE;
  228. ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
  229. sm->otx, sm->orx);
  230. ieee802_1x_kay_enable_new_info(sm->kay);
  231. eloop_cancel_timeout(ieee802_1x_cp_retire_when_timeout, sm, NULL);
  232. eloop_register_timeout(sm->retire_when / 1000, 0,
  233. ieee802_1x_cp_retire_when_timeout, sm, NULL);
  234. sm->using_transmit_sa = FALSE;
  235. }
  236. SM_STATE(CP, ABANDON)
  237. {
  238. SM_ENTRY(CP, ABANDON);
  239. sm->lrx = FALSE;
  240. ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
  241. sm->ltx, sm->lrx);
  242. ieee802_1x_kay_delete_sas(sm->kay, sm->lki);
  243. os_free(sm->lki);
  244. sm->lki = NULL;
  245. ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
  246. sm->ltx, sm->lrx);
  247. sm->new_sak = FALSE;
  248. }
  249. SM_STATE(CP, RETIRE)
  250. {
  251. SM_ENTRY(CP, RETIRE);
  252. /* RETIRE state machine not keep with Figure 12-2 in
  253. * IEEE Std 802.1X-2010 */
  254. os_free(sm->oki);
  255. sm->oki = NULL;
  256. sm->orx = FALSE;
  257. sm->otx = FALSE;
  258. ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
  259. sm->otx, sm->orx);
  260. }
  261. /**
  262. * CP state machine handler entry
  263. */
  264. SM_STEP(CP)
  265. {
  266. if (!sm->port_enabled)
  267. SM_ENTER(CP, INIT);
  268. switch (sm->CP_state) {
  269. case CP_BEGIN:
  270. SM_ENTER(CP, INIT);
  271. break;
  272. case CP_INIT:
  273. SM_ENTER(CP, CHANGE);
  274. break;
  275. case CP_CHANGE:
  276. if (sm->connect == UNAUTHENTICATED)
  277. SM_ENTER(CP, ALLOWED);
  278. else if (sm->connect == AUTHENTICATED)
  279. SM_ENTER(CP, AUTHENTICATED);
  280. else if (sm->connect == SECURE)
  281. SM_ENTER(CP, SECURED);
  282. break;
  283. case CP_ALLOWED:
  284. if (sm->connect != UNAUTHENTICATED)
  285. SM_ENTER(CP, CHANGE);
  286. break;
  287. case CP_AUTHENTICATED:
  288. if (sm->connect != AUTHENTICATED)
  289. SM_ENTER(CP, CHANGE);
  290. break;
  291. case CP_SECURED:
  292. if (changed_connect(sm))
  293. SM_ENTER(CP, CHANGE);
  294. else if (sm->new_sak)
  295. SM_ENTER(CP, RECEIVE);
  296. break;
  297. case CP_RECEIVE:
  298. if (sm->using_receive_sas)
  299. SM_ENTER(CP, RECEIVING);
  300. break;
  301. case CP_RECEIVING:
  302. if (sm->new_sak || changed_connect(sm))
  303. SM_ENTER(CP, ABANDON);
  304. if (!sm->elected_self)
  305. SM_ENTER(CP, READY);
  306. if (sm->elected_self &&
  307. (sm->all_receiving || !sm->transmit_when))
  308. SM_ENTER(CP, TRANSMIT);
  309. break;
  310. case CP_TRANSMIT:
  311. if (sm->using_transmit_sa)
  312. SM_ENTER(CP, TRANSMITTING);
  313. break;
  314. case CP_TRANSMITTING:
  315. if (!sm->retire_when || changed_connect(sm))
  316. SM_ENTER(CP, RETIRE);
  317. break;
  318. case CP_RETIRE:
  319. if (changed_connect(sm))
  320. SM_ENTER(CP, CHANGE);
  321. else if (sm->new_sak)
  322. SM_ENTER(CP, RECEIVE);
  323. break;
  324. case CP_READY:
  325. if (sm->new_sak || changed_connect(sm))
  326. SM_ENTER(CP, RECEIVE);
  327. if (sm->server_transmitting)
  328. SM_ENTER(CP, TRANSMIT);
  329. break;
  330. case CP_ABANDON:
  331. if (changed_connect(sm))
  332. SM_ENTER(CP, RETIRE);
  333. else if (sm->new_sak)
  334. SM_ENTER(CP, RECEIVE);
  335. break;
  336. default:
  337. wpa_printf(MSG_ERROR, "CP: the state machine is not defined");
  338. break;
  339. }
  340. }
  341. /**
  342. * ieee802_1x_cp_sm_init -
  343. */
  344. struct ieee802_1x_cp_sm * ieee802_1x_cp_sm_init(struct ieee802_1x_kay *kay)
  345. {
  346. struct ieee802_1x_cp_sm *sm;
  347. sm = os_zalloc(sizeof(*sm));
  348. if (sm == NULL) {
  349. wpa_printf(MSG_ERROR, "CP-%s: out of memory", __func__);
  350. return NULL;
  351. }
  352. sm->kay = kay;
  353. sm->port_valid = FALSE;
  354. sm->chgd_server = FALSE;
  355. sm->protect_frames = kay->macsec_protect;
  356. sm->validate_frames = kay->macsec_validate;
  357. sm->replay_protect = kay->macsec_replay_protect;
  358. sm->replay_window = kay->macsec_replay_window;
  359. sm->controlled_port_enabled = FALSE;
  360. sm->lki = NULL;
  361. sm->lrx = FALSE;
  362. sm->ltx = FALSE;
  363. sm->oki = NULL;
  364. sm->orx = FALSE;
  365. sm->otx = FALSE;
  366. sm->current_cipher_suite = default_cs_id;
  367. sm->cipher_suite = default_cs_id;
  368. sm->cipher_offset = CONFIDENTIALITY_OFFSET_0;
  369. sm->confidentiality_offset = sm->cipher_offset;
  370. sm->transmit_delay = MKA_LIFE_TIME;
  371. sm->retire_delay = MKA_SAK_RETIRE_TIME;
  372. sm->CP_state = CP_BEGIN;
  373. sm->changed = FALSE;
  374. sm->authorization_data = NULL;
  375. wpa_printf(MSG_DEBUG, "CP: state machine created");
  376. secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
  377. secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
  378. secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
  379. secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
  380. secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
  381. secy_cp_control_confidentiality_offset(sm->kay,
  382. sm->confidentiality_offset);
  383. SM_ENTER(CP, INIT);
  384. SM_STEP_RUN(CP);
  385. return sm;
  386. }
  387. static void ieee802_1x_cp_step_run(struct ieee802_1x_cp_sm *sm)
  388. {
  389. enum cp_states prev_state;
  390. int i;
  391. for (i = 0; i < 100; i++) {
  392. prev_state = sm->CP_state;
  393. SM_STEP_RUN(CP);
  394. if (prev_state == sm->CP_state)
  395. break;
  396. }
  397. }
  398. static void ieee802_1x_cp_step_cb(void *eloop_ctx, void *timeout_ctx)
  399. {
  400. struct ieee802_1x_cp_sm *sm = eloop_ctx;
  401. ieee802_1x_cp_step_run(sm);
  402. }
  403. /**
  404. * ieee802_1x_cp_sm_deinit -
  405. */
  406. void ieee802_1x_cp_sm_deinit(struct ieee802_1x_cp_sm *sm)
  407. {
  408. wpa_printf(MSG_DEBUG, "CP: state machine removed");
  409. if (!sm)
  410. return;
  411. eloop_cancel_timeout(ieee802_1x_cp_retire_when_timeout, sm, NULL);
  412. eloop_cancel_timeout(ieee802_1x_cp_transmit_when_timeout, sm, NULL);
  413. eloop_cancel_timeout(ieee802_1x_cp_step_cb, sm, NULL);
  414. os_free(sm->lki);
  415. os_free(sm->oki);
  416. os_free(sm->authorization_data);
  417. os_free(sm);
  418. }
  419. /**
  420. * ieee802_1x_cp_connect_pending
  421. */
  422. void ieee802_1x_cp_connect_pending(void *cp_ctx)
  423. {
  424. struct ieee802_1x_cp_sm *sm = cp_ctx;
  425. sm->connect = PENDING;
  426. }
  427. /**
  428. * ieee802_1x_cp_connect_unauthenticated
  429. */
  430. void ieee802_1x_cp_connect_unauthenticated(void *cp_ctx)
  431. {
  432. struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx;
  433. sm->connect = UNAUTHENTICATED;
  434. }
  435. /**
  436. * ieee802_1x_cp_connect_authenticated
  437. */
  438. void ieee802_1x_cp_connect_authenticated(void *cp_ctx)
  439. {
  440. struct ieee802_1x_cp_sm *sm = cp_ctx;
  441. sm->connect = AUTHENTICATED;
  442. }
  443. /**
  444. * ieee802_1x_cp_connect_secure
  445. */
  446. void ieee802_1x_cp_connect_secure(void *cp_ctx)
  447. {
  448. struct ieee802_1x_cp_sm *sm = cp_ctx;
  449. sm->connect = SECURE;
  450. }
  451. /**
  452. * ieee802_1x_cp_set_chgdserver -
  453. */
  454. void ieee802_1x_cp_signal_chgdserver(void *cp_ctx)
  455. {
  456. struct ieee802_1x_cp_sm *sm = cp_ctx;
  457. sm->chgd_server = TRUE;
  458. }
  459. /**
  460. * ieee802_1x_cp_set_electedself -
  461. */
  462. void ieee802_1x_cp_set_electedself(void *cp_ctx, Boolean status)
  463. {
  464. struct ieee802_1x_cp_sm *sm = cp_ctx;
  465. sm->elected_self = status;
  466. }
  467. /**
  468. * ieee802_1x_cp_set_authorizationdata -
  469. */
  470. void ieee802_1x_cp_set_authorizationdata(void *cp_ctx, u8 *pdata, int len)
  471. {
  472. struct ieee802_1x_cp_sm *sm = cp_ctx;
  473. os_free(sm->authorization_data);
  474. sm->authorization_data = os_zalloc(len);
  475. if (sm->authorization_data)
  476. os_memcpy(sm->authorization_data, pdata, len);
  477. }
  478. /**
  479. * ieee802_1x_cp_set_ciphersuite -
  480. */
  481. void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs)
  482. {
  483. struct ieee802_1x_cp_sm *sm = cp_ctx;
  484. sm->cipher_suite = cs;
  485. }
  486. /**
  487. * ieee802_1x_cp_set_offset -
  488. */
  489. void ieee802_1x_cp_set_offset(void *cp_ctx, enum confidentiality_offset offset)
  490. {
  491. struct ieee802_1x_cp_sm *sm = cp_ctx;
  492. sm->cipher_offset = offset;
  493. }
  494. /**
  495. * ieee802_1x_cp_signal_newsak -
  496. */
  497. void ieee802_1x_cp_signal_newsak(void *cp_ctx)
  498. {
  499. struct ieee802_1x_cp_sm *sm = cp_ctx;
  500. sm->new_sak = TRUE;
  501. }
  502. /**
  503. * ieee802_1x_cp_set_distributedki -
  504. */
  505. void ieee802_1x_cp_set_distributedki(void *cp_ctx,
  506. const struct ieee802_1x_mka_ki *dki)
  507. {
  508. struct ieee802_1x_cp_sm *sm = cp_ctx;
  509. os_memcpy(&sm->distributed_ki, dki, sizeof(struct ieee802_1x_mka_ki));
  510. }
  511. /**
  512. * ieee802_1x_cp_set_distributedan -
  513. */
  514. void ieee802_1x_cp_set_distributedan(void *cp_ctx, u8 an)
  515. {
  516. struct ieee802_1x_cp_sm *sm = cp_ctx;
  517. sm->distributed_an = an;
  518. }
  519. /**
  520. * ieee802_1x_cp_set_usingreceivesas -
  521. */
  522. void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, Boolean status)
  523. {
  524. struct ieee802_1x_cp_sm *sm = cp_ctx;
  525. sm->using_receive_sas = status;
  526. }
  527. /**
  528. * ieee802_1x_cp_set_allreceiving -
  529. */
  530. void ieee802_1x_cp_set_allreceiving(void *cp_ctx, Boolean status)
  531. {
  532. struct ieee802_1x_cp_sm *sm = cp_ctx;
  533. sm->all_receiving = status;
  534. }
  535. /**
  536. * ieee802_1x_cp_set_servertransmitting -
  537. */
  538. void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, Boolean status)
  539. {
  540. struct ieee802_1x_cp_sm *sm = cp_ctx;
  541. sm->server_transmitting = status;
  542. }
  543. /**
  544. * ieee802_1x_cp_set_usingtransmitsas -
  545. */
  546. void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, Boolean status)
  547. {
  548. struct ieee802_1x_cp_sm *sm = cp_ctx;
  549. sm->using_transmit_sa = status;
  550. }
  551. /**
  552. * ieee802_1x_cp_sm_step - Advance EAPOL state machines
  553. * @sm: EAPOL state machine
  554. *
  555. * This function is called to advance CP state machines after any change
  556. * that could affect their state.
  557. */
  558. void ieee802_1x_cp_sm_step(void *cp_ctx)
  559. {
  560. /*
  561. * Run ieee802_1x_cp_step_run from a registered timeout
  562. * to make sure that other possible timeouts/events are processed
  563. * and to avoid long function call chains.
  564. */
  565. struct ieee802_1x_cp_sm *sm = cp_ctx;
  566. eloop_cancel_timeout(ieee802_1x_cp_step_cb, sm, NULL);
  567. eloop_register_timeout(0, 0, ieee802_1x_cp_step_cb, sm, NULL);
  568. }
  569. static void ieee802_1x_cp_retire_when_timeout(void *eloop_ctx,
  570. void *timeout_ctx)
  571. {
  572. struct ieee802_1x_cp_sm *sm = eloop_ctx;
  573. sm->retire_when = 0;
  574. ieee802_1x_cp_step_run(sm);
  575. }
  576. static void
  577. ieee802_1x_cp_transmit_when_timeout(void *eloop_ctx, void *timeout_ctx)
  578. {
  579. struct ieee802_1x_cp_sm *sm = eloop_ctx;
  580. sm->transmit_when = 0;
  581. ieee802_1x_cp_step_run(sm);
  582. }