123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730 |
- /*
- * IEEE 802.1X-2010 Controlled Port of PAE state machine - CP state machine
- * Copyright (c) 2013-2014, Qualcomm Atheros, Inc.
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
- #include "utils/includes.h"
- #include "utils/common.h"
- #include "utils/eloop.h"
- #include "common/defs.h"
- #include "common/ieee802_1x_defs.h"
- #include "utils/state_machine.h"
- #include "ieee802_1x_kay.h"
- #include "ieee802_1x_secy_ops.h"
- #include "pae/ieee802_1x_cp.h"
- #define STATE_MACHINE_DATA struct ieee802_1x_cp_sm
- #define STATE_MACHINE_DEBUG_PREFIX "CP"
- static u64 default_cs_id = CS_ID_GCM_AES_128;
- /* The variable defined in clause 12 in IEEE Std 802.1X-2010 */
- enum connect_type { PENDING, UNAUTHENTICATED, AUTHENTICATED, SECURE };
- struct ieee802_1x_cp_sm {
- enum cp_states {
- CP_BEGIN, CP_INIT, CP_CHANGE, CP_ALLOWED, CP_AUTHENTICATED,
- CP_SECURED, CP_RECEIVE, CP_RECEIVING, CP_READY, CP_TRANSMIT,
- CP_TRANSMITTING, CP_ABANDON, CP_RETIRE
- } CP_state;
- Boolean changed;
- /* CP -> Client */
- Boolean port_valid;
- /* Logon -> CP */
- enum connect_type connect;
- u8 *authorization_data;
- /* KaY -> CP */
- Boolean chgd_server; /* clear by CP */
- Boolean elected_self;
- u8 *authorization_data1;
- enum confidentiality_offset cipher_offset;
- u64 cipher_suite;
- Boolean new_sak; /* clear by CP */
- struct ieee802_1x_mka_ki distributed_ki;
- u8 distributed_an;
- Boolean using_receive_sas;
- Boolean all_receiving;
- Boolean server_transmitting;
- Boolean using_transmit_sa;
- /* CP -> KaY */
- struct ieee802_1x_mka_ki *lki;
- u8 lan;
- Boolean ltx;
- Boolean lrx;
- struct ieee802_1x_mka_ki *oki;
- u8 oan;
- Boolean otx;
- Boolean orx;
- /* CP -> SecY */
- Boolean protect_frames;
- enum validate_frames validate_frames;
- Boolean replay_protect;
- u32 replay_window;
- u64 current_cipher_suite;
- enum confidentiality_offset confidentiality_offset;
- Boolean controlled_port_enabled;
- /* SecY -> CP */
- Boolean port_enabled; /* SecY->CP */
- /* private */
- u32 transmit_when;
- u32 transmit_delay;
- u32 retire_when;
- u32 retire_delay;
- /* not defined IEEE Std 802.1X-2010 */
- struct ieee802_1x_kay *kay;
- };
- static void ieee802_1x_cp_retire_when_timeout(void *eloop_ctx,
- void *timeout_ctx);
- static void ieee802_1x_cp_transmit_when_timeout(void *eloop_ctx,
- void *timeout_ctx);
- static int changed_cipher(struct ieee802_1x_cp_sm *sm)
- {
- return sm->confidentiality_offset != sm->cipher_offset ||
- sm->current_cipher_suite != sm->cipher_suite;
- }
- static int changed_connect(struct ieee802_1x_cp_sm *sm)
- {
- return sm->connect != SECURE || sm->chgd_server || changed_cipher(sm);
- }
- SM_STATE(CP, INIT)
- {
- SM_ENTRY(CP, INIT);
- sm->controlled_port_enabled = FALSE;
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- sm->port_valid = FALSE;
- os_free(sm->lki);
- sm->lki = NULL;
- sm->ltx = FALSE;
- sm->lrx = FALSE;
- os_free(sm->oki);
- sm->oki = NULL;
- sm->otx = FALSE;
- sm->orx = FALSE;
- sm->port_enabled = TRUE;
- sm->chgd_server = FALSE;
- }
- SM_STATE(CP, CHANGE)
- {
- SM_ENTRY(CP, CHANGE);
- sm->port_valid = FALSE;
- sm->controlled_port_enabled = FALSE;
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- if (sm->lki)
- ieee802_1x_kay_delete_sas(sm->kay, sm->lki);
- if (sm->oki)
- ieee802_1x_kay_delete_sas(sm->kay, sm->oki);
- }
- SM_STATE(CP, ALLOWED)
- {
- SM_ENTRY(CP, ALLOWED);
- sm->protect_frames = FALSE;
- sm->replay_protect = FALSE;
- sm->validate_frames = Checked;
- sm->port_valid = FALSE;
- sm->controlled_port_enabled = TRUE;
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
- secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
- secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
- secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
- }
- SM_STATE(CP, AUTHENTICATED)
- {
- SM_ENTRY(CP, AUTHENTICATED);
- sm->protect_frames = FALSE;
- sm->replay_protect = FALSE;
- sm->validate_frames = Checked;
- sm->port_valid = FALSE;
- sm->controlled_port_enabled = TRUE;
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
- secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
- secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
- secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
- }
- SM_STATE(CP, SECURED)
- {
- SM_ENTRY(CP, SECURED);
- sm->chgd_server = FALSE;
- sm->protect_frames = sm->kay->macsec_protect;
- sm->replay_protect = sm->kay->macsec_replay_protect;
- sm->validate_frames = sm->kay->macsec_validate;
- /* NOTE: now no other than default cipher suite (AES-GCM-128) */
- sm->current_cipher_suite = sm->cipher_suite;
- secy_cp_control_current_cipher_suite(sm->kay, sm->current_cipher_suite);
- sm->confidentiality_offset = sm->cipher_offset;
- sm->port_valid = TRUE;
- secy_cp_control_confidentiality_offset(sm->kay,
- sm->confidentiality_offset);
- secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
- secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
- secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
- secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
- }
- SM_STATE(CP, RECEIVE)
- {
- SM_ENTRY(CP, RECEIVE);
- /* RECEIVE state machine not keep with Figure 12-2 in
- * IEEE Std 802.1X-2010 */
- sm->oki = sm->lki;
- sm->oan = sm->lan;
- sm->otx = sm->ltx;
- sm->orx = sm->lrx;
- ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
- sm->otx, sm->orx);
- sm->lki = os_malloc(sizeof(*sm->lki));
- if (!sm->lki) {
- wpa_printf(MSG_ERROR, "CP-%s: Out of memory", __func__);
- return;
- }
- os_memcpy(sm->lki, &sm->distributed_ki, sizeof(*sm->lki));
- sm->lan = sm->distributed_an;
- sm->ltx = FALSE;
- sm->lrx = FALSE;
- ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
- sm->ltx, sm->lrx);
- ieee802_1x_kay_create_sas(sm->kay, sm->lki);
- ieee802_1x_kay_enable_rx_sas(sm->kay, sm->lki);
- sm->new_sak = FALSE;
- sm->all_receiving = FALSE;
- }
- SM_STATE(CP, RECEIVING)
- {
- SM_ENTRY(CP, RECEIVING);
- sm->lrx = TRUE;
- ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
- sm->ltx, sm->lrx);
- sm->transmit_when = sm->transmit_delay;
- eloop_cancel_timeout(ieee802_1x_cp_transmit_when_timeout, sm, NULL);
- eloop_register_timeout(sm->transmit_when / 1000, 0,
- ieee802_1x_cp_transmit_when_timeout, sm, NULL);
- /* the electedSelf have been set before CP entering to RECEIVING
- * but the CP will transmit from RECEIVING to READY under
- * the !electedSelf when KaY is not key server */
- ieee802_1x_cp_sm_step(sm);
- sm->using_receive_sas = FALSE;
- sm->server_transmitting = FALSE;
- }
- SM_STATE(CP, READY)
- {
- SM_ENTRY(CP, READY);
- ieee802_1x_kay_enable_new_info(sm->kay);
- }
- SM_STATE(CP, TRANSMIT)
- {
- SM_ENTRY(CP, TRANSMIT);
- sm->controlled_port_enabled = TRUE;
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- sm->ltx = TRUE;
- ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
- sm->ltx, sm->lrx);
- ieee802_1x_kay_enable_tx_sas(sm->kay, sm->lki);
- sm->all_receiving = FALSE;
- sm->server_transmitting = FALSE;
- }
- SM_STATE(CP, TRANSMITTING)
- {
- SM_ENTRY(CP, TRANSMITTING);
- sm->retire_when = sm->orx ? sm->retire_delay : 0;
- sm->otx = FALSE;
- ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
- sm->otx, sm->orx);
- ieee802_1x_kay_enable_new_info(sm->kay);
- eloop_cancel_timeout(ieee802_1x_cp_retire_when_timeout, sm, NULL);
- eloop_register_timeout(sm->retire_when / 1000, 0,
- ieee802_1x_cp_retire_when_timeout, sm, NULL);
- sm->using_transmit_sa = FALSE;
- }
- SM_STATE(CP, ABANDON)
- {
- SM_ENTRY(CP, ABANDON);
- sm->lrx = FALSE;
- ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
- sm->ltx, sm->lrx);
- ieee802_1x_kay_delete_sas(sm->kay, sm->lki);
- os_free(sm->lki);
- sm->lki = NULL;
- ieee802_1x_kay_set_latest_sa_attr(sm->kay, sm->lki, sm->lan,
- sm->ltx, sm->lrx);
- sm->new_sak = FALSE;
- }
- SM_STATE(CP, RETIRE)
- {
- SM_ENTRY(CP, RETIRE);
- /* RETIRE state machine not keep with Figure 12-2 in
- * IEEE Std 802.1X-2010 */
- os_free(sm->oki);
- sm->oki = NULL;
- sm->orx = FALSE;
- sm->otx = FALSE;
- ieee802_1x_kay_set_old_sa_attr(sm->kay, sm->oki, sm->oan,
- sm->otx, sm->orx);
- }
- /**
- * CP state machine handler entry
- */
- SM_STEP(CP)
- {
- if (!sm->port_enabled)
- SM_ENTER(CP, INIT);
- switch (sm->CP_state) {
- case CP_BEGIN:
- SM_ENTER(CP, INIT);
- break;
- case CP_INIT:
- SM_ENTER(CP, CHANGE);
- break;
- case CP_CHANGE:
- if (sm->connect == UNAUTHENTICATED)
- SM_ENTER(CP, ALLOWED);
- else if (sm->connect == AUTHENTICATED)
- SM_ENTER(CP, AUTHENTICATED);
- else if (sm->connect == SECURE)
- SM_ENTER(CP, SECURED);
- break;
- case CP_ALLOWED:
- if (sm->connect != UNAUTHENTICATED)
- SM_ENTER(CP, CHANGE);
- break;
- case CP_AUTHENTICATED:
- if (sm->connect != AUTHENTICATED)
- SM_ENTER(CP, CHANGE);
- break;
- case CP_SECURED:
- if (changed_connect(sm))
- SM_ENTER(CP, CHANGE);
- else if (sm->new_sak)
- SM_ENTER(CP, RECEIVE);
- break;
- case CP_RECEIVE:
- if (sm->using_receive_sas)
- SM_ENTER(CP, RECEIVING);
- break;
- case CP_RECEIVING:
- if (sm->new_sak || changed_connect(sm))
- SM_ENTER(CP, ABANDON);
- if (!sm->elected_self)
- SM_ENTER(CP, READY);
- if (sm->elected_self &&
- (sm->all_receiving || !sm->transmit_when))
- SM_ENTER(CP, TRANSMIT);
- break;
- case CP_TRANSMIT:
- if (sm->using_transmit_sa)
- SM_ENTER(CP, TRANSMITTING);
- break;
- case CP_TRANSMITTING:
- if (!sm->retire_when || changed_connect(sm))
- SM_ENTER(CP, RETIRE);
- break;
- case CP_RETIRE:
- if (changed_connect(sm))
- SM_ENTER(CP, CHANGE);
- else if (sm->new_sak)
- SM_ENTER(CP, RECEIVE);
- break;
- case CP_READY:
- if (sm->new_sak || changed_connect(sm))
- SM_ENTER(CP, RECEIVE);
- if (sm->server_transmitting)
- SM_ENTER(CP, TRANSMIT);
- break;
- case CP_ABANDON:
- if (changed_connect(sm))
- SM_ENTER(CP, RETIRE);
- else if (sm->new_sak)
- SM_ENTER(CP, RECEIVE);
- break;
- default:
- wpa_printf(MSG_ERROR, "CP: the state machine is not defined");
- break;
- }
- }
- /**
- * ieee802_1x_cp_sm_init -
- */
- struct ieee802_1x_cp_sm * ieee802_1x_cp_sm_init(struct ieee802_1x_kay *kay)
- {
- struct ieee802_1x_cp_sm *sm;
- sm = os_zalloc(sizeof(*sm));
- if (sm == NULL) {
- wpa_printf(MSG_ERROR, "CP-%s: out of memory", __func__);
- return NULL;
- }
- sm->kay = kay;
- sm->port_valid = FALSE;
- sm->chgd_server = FALSE;
- sm->protect_frames = kay->macsec_protect;
- sm->validate_frames = kay->macsec_validate;
- sm->replay_protect = kay->macsec_replay_protect;
- sm->replay_window = kay->macsec_replay_window;
- sm->controlled_port_enabled = FALSE;
- sm->lki = NULL;
- sm->lrx = FALSE;
- sm->ltx = FALSE;
- sm->oki = NULL;
- sm->orx = FALSE;
- sm->otx = FALSE;
- sm->current_cipher_suite = default_cs_id;
- sm->cipher_suite = default_cs_id;
- sm->cipher_offset = CONFIDENTIALITY_OFFSET_0;
- sm->confidentiality_offset = sm->cipher_offset;
- sm->transmit_delay = MKA_LIFE_TIME;
- sm->retire_delay = MKA_SAK_RETIRE_TIME;
- sm->CP_state = CP_BEGIN;
- sm->changed = FALSE;
- sm->authorization_data = NULL;
- wpa_printf(MSG_DEBUG, "CP: state machine created");
- secy_cp_control_protect_frames(sm->kay, sm->protect_frames);
- secy_cp_control_encrypt(sm->kay, sm->kay->macsec_encrypt);
- secy_cp_control_validate_frames(sm->kay, sm->validate_frames);
- secy_cp_control_replay(sm->kay, sm->replay_protect, sm->replay_window);
- secy_cp_control_enable_port(sm->kay, sm->controlled_port_enabled);
- secy_cp_control_confidentiality_offset(sm->kay,
- sm->confidentiality_offset);
- SM_ENTER(CP, INIT);
- SM_STEP_RUN(CP);
- return sm;
- }
- static void ieee802_1x_cp_step_run(struct ieee802_1x_cp_sm *sm)
- {
- enum cp_states prev_state;
- int i;
- for (i = 0; i < 100; i++) {
- prev_state = sm->CP_state;
- SM_STEP_RUN(CP);
- if (prev_state == sm->CP_state)
- break;
- }
- }
- static void ieee802_1x_cp_step_cb(void *eloop_ctx, void *timeout_ctx)
- {
- struct ieee802_1x_cp_sm *sm = eloop_ctx;
- ieee802_1x_cp_step_run(sm);
- }
- /**
- * ieee802_1x_cp_sm_deinit -
- */
- void ieee802_1x_cp_sm_deinit(struct ieee802_1x_cp_sm *sm)
- {
- wpa_printf(MSG_DEBUG, "CP: state machine removed");
- if (!sm)
- return;
- eloop_cancel_timeout(ieee802_1x_cp_retire_when_timeout, sm, NULL);
- eloop_cancel_timeout(ieee802_1x_cp_transmit_when_timeout, sm, NULL);
- eloop_cancel_timeout(ieee802_1x_cp_step_cb, sm, NULL);
- os_free(sm->lki);
- os_free(sm->oki);
- os_free(sm->authorization_data);
- os_free(sm);
- }
- /**
- * ieee802_1x_cp_connect_pending
- */
- void ieee802_1x_cp_connect_pending(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->connect = PENDING;
- }
- /**
- * ieee802_1x_cp_connect_unauthenticated
- */
- void ieee802_1x_cp_connect_unauthenticated(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = (struct ieee802_1x_cp_sm *)cp_ctx;
- sm->connect = UNAUTHENTICATED;
- }
- /**
- * ieee802_1x_cp_connect_authenticated
- */
- void ieee802_1x_cp_connect_authenticated(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->connect = AUTHENTICATED;
- }
- /**
- * ieee802_1x_cp_connect_secure
- */
- void ieee802_1x_cp_connect_secure(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->connect = SECURE;
- }
- /**
- * ieee802_1x_cp_set_chgdserver -
- */
- void ieee802_1x_cp_signal_chgdserver(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->chgd_server = TRUE;
- }
- /**
- * ieee802_1x_cp_set_electedself -
- */
- void ieee802_1x_cp_set_electedself(void *cp_ctx, Boolean status)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->elected_self = status;
- }
- /**
- * ieee802_1x_cp_set_authorizationdata -
- */
- void ieee802_1x_cp_set_authorizationdata(void *cp_ctx, u8 *pdata, int len)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- os_free(sm->authorization_data);
- sm->authorization_data = os_zalloc(len);
- if (sm->authorization_data)
- os_memcpy(sm->authorization_data, pdata, len);
- }
- /**
- * ieee802_1x_cp_set_ciphersuite -
- */
- void ieee802_1x_cp_set_ciphersuite(void *cp_ctx, u64 cs)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->cipher_suite = cs;
- }
- /**
- * ieee802_1x_cp_set_offset -
- */
- void ieee802_1x_cp_set_offset(void *cp_ctx, enum confidentiality_offset offset)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->cipher_offset = offset;
- }
- /**
- * ieee802_1x_cp_signal_newsak -
- */
- void ieee802_1x_cp_signal_newsak(void *cp_ctx)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->new_sak = TRUE;
- }
- /**
- * ieee802_1x_cp_set_distributedki -
- */
- void ieee802_1x_cp_set_distributedki(void *cp_ctx,
- const struct ieee802_1x_mka_ki *dki)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- os_memcpy(&sm->distributed_ki, dki, sizeof(struct ieee802_1x_mka_ki));
- }
- /**
- * ieee802_1x_cp_set_distributedan -
- */
- void ieee802_1x_cp_set_distributedan(void *cp_ctx, u8 an)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->distributed_an = an;
- }
- /**
- * ieee802_1x_cp_set_usingreceivesas -
- */
- void ieee802_1x_cp_set_usingreceivesas(void *cp_ctx, Boolean status)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->using_receive_sas = status;
- }
- /**
- * ieee802_1x_cp_set_allreceiving -
- */
- void ieee802_1x_cp_set_allreceiving(void *cp_ctx, Boolean status)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->all_receiving = status;
- }
- /**
- * ieee802_1x_cp_set_servertransmitting -
- */
- void ieee802_1x_cp_set_servertransmitting(void *cp_ctx, Boolean status)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->server_transmitting = status;
- }
- /**
- * ieee802_1x_cp_set_usingtransmitsas -
- */
- void ieee802_1x_cp_set_usingtransmitas(void *cp_ctx, Boolean status)
- {
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- sm->using_transmit_sa = status;
- }
- /**
- * ieee802_1x_cp_sm_step - Advance EAPOL state machines
- * @sm: EAPOL state machine
- *
- * This function is called to advance CP state machines after any change
- * that could affect their state.
- */
- void ieee802_1x_cp_sm_step(void *cp_ctx)
- {
- /*
- * Run ieee802_1x_cp_step_run from a registered timeout
- * to make sure that other possible timeouts/events are processed
- * and to avoid long function call chains.
- */
- struct ieee802_1x_cp_sm *sm = cp_ctx;
- eloop_cancel_timeout(ieee802_1x_cp_step_cb, sm, NULL);
- eloop_register_timeout(0, 0, ieee802_1x_cp_step_cb, sm, NULL);
- }
- static void ieee802_1x_cp_retire_when_timeout(void *eloop_ctx,
- void *timeout_ctx)
- {
- struct ieee802_1x_cp_sm *sm = eloop_ctx;
- sm->retire_when = 0;
- ieee802_1x_cp_step_run(sm);
- }
- static void
- ieee802_1x_cp_transmit_when_timeout(void *eloop_ctx, void *timeout_ctx)
- {
- struct ieee802_1x_cp_sm *sm = eloop_ctx;
- sm->transmit_when = 0;
- ieee802_1x_cp_step_run(sm);
- }
|