eapol_auth_sm.c 32 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307
  1. /*
  2. * IEEE 802.1X-2004 Authenticator - EAPOL state machine
  3. * Copyright (c) 2002-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "eloop.h"
  11. #include "state_machine.h"
  12. #include "common/eapol_common.h"
  13. #include "eap_common/eap_defs.h"
  14. #include "eap_common/eap_common.h"
  15. #include "eap_server/eap.h"
  16. #include "eapol_auth_sm.h"
  17. #include "eapol_auth_sm_i.h"
  18. #define STATE_MACHINE_DATA struct eapol_state_machine
  19. #define STATE_MACHINE_DEBUG_PREFIX "IEEE 802.1X"
  20. #define STATE_MACHINE_ADDR sm->addr
  21. static const struct eapol_callbacks eapol_cb;
  22. /* EAPOL state machines are described in IEEE Std 802.1X-2004, Chap. 8.2 */
  23. #define setPortAuthorized() \
  24. sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 1)
  25. #define setPortUnauthorized() \
  26. sm->eapol->cb.set_port_authorized(sm->eapol->conf.ctx, sm->sta, 0)
  27. /* procedures */
  28. #define txCannedFail() eapol_auth_tx_canned_eap(sm, 0)
  29. #define txCannedSuccess() eapol_auth_tx_canned_eap(sm, 1)
  30. #define txReq() eapol_auth_tx_req(sm)
  31. #define abortAuth() sm->eapol->cb.abort_auth(sm->eapol->conf.ctx, sm->sta)
  32. #define txKey() sm->eapol->cb.tx_key(sm->eapol->conf.ctx, sm->sta)
  33. #define processKey() do { } while (0)
  34. static void eapol_sm_step_run(struct eapol_state_machine *sm);
  35. static void eapol_sm_step_cb(void *eloop_ctx, void *timeout_ctx);
  36. static void eapol_auth_initialize(struct eapol_state_machine *sm);
  37. static void eapol_auth_conf_free(struct eapol_auth_config *conf);
  38. static void eapol_auth_logger(struct eapol_authenticator *eapol,
  39. const u8 *addr, eapol_logger_level level,
  40. const char *txt)
  41. {
  42. if (eapol->cb.logger == NULL)
  43. return;
  44. eapol->cb.logger(eapol->conf.ctx, addr, level, txt);
  45. }
  46. static void eapol_auth_vlogger(struct eapol_authenticator *eapol,
  47. const u8 *addr, eapol_logger_level level,
  48. const char *fmt, ...)
  49. {
  50. char *format;
  51. int maxlen;
  52. va_list ap;
  53. if (eapol->cb.logger == NULL)
  54. return;
  55. maxlen = os_strlen(fmt) + 100;
  56. format = os_malloc(maxlen);
  57. if (!format)
  58. return;
  59. va_start(ap, fmt);
  60. vsnprintf(format, maxlen, fmt, ap);
  61. va_end(ap);
  62. eapol_auth_logger(eapol, addr, level, format);
  63. os_free(format);
  64. }
  65. static void eapol_auth_tx_canned_eap(struct eapol_state_machine *sm,
  66. int success)
  67. {
  68. struct eap_hdr eap;
  69. os_memset(&eap, 0, sizeof(eap));
  70. eap.code = success ? EAP_CODE_SUCCESS : EAP_CODE_FAILURE;
  71. eap.identifier = ++sm->last_eap_id;
  72. eap.length = host_to_be16(sizeof(eap));
  73. eapol_auth_vlogger(sm->eapol, sm->addr, EAPOL_LOGGER_DEBUG,
  74. "Sending canned EAP packet %s (identifier %d)",
  75. success ? "SUCCESS" : "FAILURE", eap.identifier);
  76. sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta,
  77. IEEE802_1X_TYPE_EAP_PACKET,
  78. (u8 *) &eap, sizeof(eap));
  79. sm->dot1xAuthEapolFramesTx++;
  80. }
  81. static void eapol_auth_tx_req(struct eapol_state_machine *sm)
  82. {
  83. if (sm->eap_if->eapReqData == NULL ||
  84. wpabuf_len(sm->eap_if->eapReqData) < sizeof(struct eap_hdr)) {
  85. eapol_auth_logger(sm->eapol, sm->addr,
  86. EAPOL_LOGGER_DEBUG,
  87. "TxReq called, but there is no EAP request "
  88. "from authentication server");
  89. return;
  90. }
  91. if (sm->flags & EAPOL_SM_WAIT_START) {
  92. wpa_printf(MSG_DEBUG, "EAPOL: Drop EAPOL TX to " MACSTR
  93. " while waiting for EAPOL-Start",
  94. MAC2STR(sm->addr));
  95. return;
  96. }
  97. sm->last_eap_id = eap_get_id(sm->eap_if->eapReqData);
  98. eapol_auth_vlogger(sm->eapol, sm->addr, EAPOL_LOGGER_DEBUG,
  99. "Sending EAP Packet (identifier %d)",
  100. sm->last_eap_id);
  101. sm->eapol->cb.eapol_send(sm->eapol->conf.ctx, sm->sta,
  102. IEEE802_1X_TYPE_EAP_PACKET,
  103. wpabuf_head(sm->eap_if->eapReqData),
  104. wpabuf_len(sm->eap_if->eapReqData));
  105. sm->dot1xAuthEapolFramesTx++;
  106. if (eap_get_type(sm->eap_if->eapReqData) == EAP_TYPE_IDENTITY)
  107. sm->dot1xAuthEapolReqIdFramesTx++;
  108. else
  109. sm->dot1xAuthEapolReqFramesTx++;
  110. }
  111. /**
  112. * eapol_port_timers_tick - Port Timers state machine
  113. * @eloop_ctx: struct eapol_state_machine *
  114. * @timeout_ctx: Not used
  115. *
  116. * This statemachine is implemented as a function that will be called
  117. * once a second as a registered event loop timeout.
  118. */
  119. static void eapol_port_timers_tick(void *eloop_ctx, void *timeout_ctx)
  120. {
  121. struct eapol_state_machine *state = timeout_ctx;
  122. if (state->aWhile > 0) {
  123. state->aWhile--;
  124. if (state->aWhile == 0) {
  125. wpa_printf(MSG_DEBUG, "IEEE 802.1X: " MACSTR
  126. " - aWhile --> 0",
  127. MAC2STR(state->addr));
  128. }
  129. }
  130. if (state->quietWhile > 0) {
  131. state->quietWhile--;
  132. if (state->quietWhile == 0) {
  133. wpa_printf(MSG_DEBUG, "IEEE 802.1X: " MACSTR
  134. " - quietWhile --> 0",
  135. MAC2STR(state->addr));
  136. }
  137. }
  138. if (state->reAuthWhen > 0) {
  139. state->reAuthWhen--;
  140. if (state->reAuthWhen == 0) {
  141. wpa_printf(MSG_DEBUG, "IEEE 802.1X: " MACSTR
  142. " - reAuthWhen --> 0",
  143. MAC2STR(state->addr));
  144. }
  145. }
  146. if (state->eap_if->retransWhile > 0) {
  147. state->eap_if->retransWhile--;
  148. if (state->eap_if->retransWhile == 0) {
  149. wpa_printf(MSG_DEBUG, "IEEE 802.1X: " MACSTR
  150. " - (EAP) retransWhile --> 0",
  151. MAC2STR(state->addr));
  152. }
  153. }
  154. eapol_sm_step_run(state);
  155. eloop_register_timeout(1, 0, eapol_port_timers_tick, eloop_ctx, state);
  156. }
  157. /* Authenticator PAE state machine */
  158. SM_STATE(AUTH_PAE, INITIALIZE)
  159. {
  160. SM_ENTRY_MA(AUTH_PAE, INITIALIZE, auth_pae);
  161. sm->portMode = Auto;
  162. }
  163. SM_STATE(AUTH_PAE, DISCONNECTED)
  164. {
  165. int from_initialize = sm->auth_pae_state == AUTH_PAE_INITIALIZE;
  166. if (sm->eapolLogoff) {
  167. if (sm->auth_pae_state == AUTH_PAE_CONNECTING)
  168. sm->authEapLogoffsWhileConnecting++;
  169. else if (sm->auth_pae_state == AUTH_PAE_AUTHENTICATED)
  170. sm->authAuthEapLogoffWhileAuthenticated++;
  171. }
  172. SM_ENTRY_MA(AUTH_PAE, DISCONNECTED, auth_pae);
  173. sm->authPortStatus = Unauthorized;
  174. setPortUnauthorized();
  175. sm->reAuthCount = 0;
  176. sm->eapolLogoff = FALSE;
  177. if (!from_initialize) {
  178. sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 0,
  179. sm->flags & EAPOL_SM_PREAUTH,
  180. sm->remediation);
  181. }
  182. }
  183. SM_STATE(AUTH_PAE, RESTART)
  184. {
  185. if (sm->auth_pae_state == AUTH_PAE_AUTHENTICATED) {
  186. if (sm->reAuthenticate)
  187. sm->authAuthReauthsWhileAuthenticated++;
  188. if (sm->eapolStart)
  189. sm->authAuthEapStartsWhileAuthenticated++;
  190. if (sm->eapolLogoff)
  191. sm->authAuthEapLogoffWhileAuthenticated++;
  192. }
  193. SM_ENTRY_MA(AUTH_PAE, RESTART, auth_pae);
  194. sm->eap_if->eapRestart = TRUE;
  195. }
  196. SM_STATE(AUTH_PAE, CONNECTING)
  197. {
  198. if (sm->auth_pae_state != AUTH_PAE_CONNECTING)
  199. sm->authEntersConnecting++;
  200. SM_ENTRY_MA(AUTH_PAE, CONNECTING, auth_pae);
  201. sm->reAuthenticate = FALSE;
  202. sm->reAuthCount++;
  203. }
  204. SM_STATE(AUTH_PAE, HELD)
  205. {
  206. if (sm->auth_pae_state == AUTH_PAE_AUTHENTICATING && sm->authFail)
  207. sm->authAuthFailWhileAuthenticating++;
  208. SM_ENTRY_MA(AUTH_PAE, HELD, auth_pae);
  209. sm->authPortStatus = Unauthorized;
  210. setPortUnauthorized();
  211. sm->quietWhile = sm->quietPeriod;
  212. sm->eapolLogoff = FALSE;
  213. eapol_auth_vlogger(sm->eapol, sm->addr, EAPOL_LOGGER_WARNING,
  214. "authentication failed - EAP type: %d (%s)",
  215. sm->eap_type_authsrv,
  216. eap_server_get_name(0, sm->eap_type_authsrv));
  217. if (sm->eap_type_authsrv != sm->eap_type_supp) {
  218. eapol_auth_vlogger(sm->eapol, sm->addr, EAPOL_LOGGER_INFO,
  219. "Supplicant used different EAP type: "
  220. "%d (%s)", sm->eap_type_supp,
  221. eap_server_get_name(0, sm->eap_type_supp));
  222. }
  223. sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 0,
  224. sm->flags & EAPOL_SM_PREAUTH, sm->remediation);
  225. }
  226. SM_STATE(AUTH_PAE, AUTHENTICATED)
  227. {
  228. char *extra = "";
  229. if (sm->auth_pae_state == AUTH_PAE_AUTHENTICATING && sm->authSuccess)
  230. sm->authAuthSuccessesWhileAuthenticating++;
  231. SM_ENTRY_MA(AUTH_PAE, AUTHENTICATED, auth_pae);
  232. sm->authPortStatus = Authorized;
  233. setPortAuthorized();
  234. sm->reAuthCount = 0;
  235. if (sm->flags & EAPOL_SM_PREAUTH)
  236. extra = " (pre-authentication)";
  237. else if (sm->flags & EAPOL_SM_FROM_PMKSA_CACHE)
  238. extra = " (PMKSA cache)";
  239. eapol_auth_vlogger(sm->eapol, sm->addr, EAPOL_LOGGER_INFO,
  240. "authenticated - EAP type: %d (%s)%s",
  241. sm->eap_type_authsrv,
  242. eap_server_get_name(0, sm->eap_type_authsrv),
  243. extra);
  244. sm->eapol->cb.finished(sm->eapol->conf.ctx, sm->sta, 1,
  245. sm->flags & EAPOL_SM_PREAUTH, sm->remediation);
  246. }
  247. SM_STATE(AUTH_PAE, AUTHENTICATING)
  248. {
  249. SM_ENTRY_MA(AUTH_PAE, AUTHENTICATING, auth_pae);
  250. sm->eapolStart = FALSE;
  251. sm->authSuccess = FALSE;
  252. sm->authFail = FALSE;
  253. sm->authTimeout = FALSE;
  254. sm->authStart = TRUE;
  255. sm->keyRun = FALSE;
  256. sm->keyDone = FALSE;
  257. }
  258. SM_STATE(AUTH_PAE, ABORTING)
  259. {
  260. if (sm->auth_pae_state == AUTH_PAE_AUTHENTICATING) {
  261. if (sm->authTimeout)
  262. sm->authAuthTimeoutsWhileAuthenticating++;
  263. if (sm->eapolStart)
  264. sm->authAuthEapStartsWhileAuthenticating++;
  265. if (sm->eapolLogoff)
  266. sm->authAuthEapLogoffWhileAuthenticating++;
  267. }
  268. SM_ENTRY_MA(AUTH_PAE, ABORTING, auth_pae);
  269. sm->authAbort = TRUE;
  270. sm->keyRun = FALSE;
  271. sm->keyDone = FALSE;
  272. }
  273. SM_STATE(AUTH_PAE, FORCE_AUTH)
  274. {
  275. SM_ENTRY_MA(AUTH_PAE, FORCE_AUTH, auth_pae);
  276. sm->authPortStatus = Authorized;
  277. setPortAuthorized();
  278. sm->portMode = ForceAuthorized;
  279. sm->eapolStart = FALSE;
  280. txCannedSuccess();
  281. }
  282. SM_STATE(AUTH_PAE, FORCE_UNAUTH)
  283. {
  284. SM_ENTRY_MA(AUTH_PAE, FORCE_UNAUTH, auth_pae);
  285. sm->authPortStatus = Unauthorized;
  286. setPortUnauthorized();
  287. sm->portMode = ForceUnauthorized;
  288. sm->eapolStart = FALSE;
  289. txCannedFail();
  290. }
  291. SM_STEP(AUTH_PAE)
  292. {
  293. if ((sm->portControl == Auto && sm->portMode != sm->portControl) ||
  294. sm->initialize || !sm->eap_if->portEnabled)
  295. SM_ENTER_GLOBAL(AUTH_PAE, INITIALIZE);
  296. else if (sm->portControl == ForceAuthorized &&
  297. sm->portMode != sm->portControl &&
  298. !(sm->initialize || !sm->eap_if->portEnabled))
  299. SM_ENTER_GLOBAL(AUTH_PAE, FORCE_AUTH);
  300. else if (sm->portControl == ForceUnauthorized &&
  301. sm->portMode != sm->portControl &&
  302. !(sm->initialize || !sm->eap_if->portEnabled))
  303. SM_ENTER_GLOBAL(AUTH_PAE, FORCE_UNAUTH);
  304. else {
  305. switch (sm->auth_pae_state) {
  306. case AUTH_PAE_INITIALIZE:
  307. SM_ENTER(AUTH_PAE, DISCONNECTED);
  308. break;
  309. case AUTH_PAE_DISCONNECTED:
  310. SM_ENTER(AUTH_PAE, RESTART);
  311. break;
  312. case AUTH_PAE_RESTART:
  313. if (!sm->eap_if->eapRestart)
  314. SM_ENTER(AUTH_PAE, CONNECTING);
  315. break;
  316. case AUTH_PAE_HELD:
  317. if (sm->quietWhile == 0)
  318. SM_ENTER(AUTH_PAE, RESTART);
  319. break;
  320. case AUTH_PAE_CONNECTING:
  321. if (sm->eapolLogoff || sm->reAuthCount > sm->reAuthMax)
  322. SM_ENTER(AUTH_PAE, DISCONNECTED);
  323. else if ((sm->eap_if->eapReq &&
  324. sm->reAuthCount <= sm->reAuthMax) ||
  325. sm->eap_if->eapSuccess || sm->eap_if->eapFail)
  326. SM_ENTER(AUTH_PAE, AUTHENTICATING);
  327. break;
  328. case AUTH_PAE_AUTHENTICATED:
  329. if (sm->eapolStart || sm->reAuthenticate)
  330. SM_ENTER(AUTH_PAE, RESTART);
  331. else if (sm->eapolLogoff || !sm->portValid)
  332. SM_ENTER(AUTH_PAE, DISCONNECTED);
  333. break;
  334. case AUTH_PAE_AUTHENTICATING:
  335. if (sm->authSuccess && sm->portValid)
  336. SM_ENTER(AUTH_PAE, AUTHENTICATED);
  337. else if (sm->authFail ||
  338. (sm->keyDone && !sm->portValid))
  339. SM_ENTER(AUTH_PAE, HELD);
  340. else if (sm->eapolStart || sm->eapolLogoff ||
  341. sm->authTimeout)
  342. SM_ENTER(AUTH_PAE, ABORTING);
  343. break;
  344. case AUTH_PAE_ABORTING:
  345. if (sm->eapolLogoff && !sm->authAbort)
  346. SM_ENTER(AUTH_PAE, DISCONNECTED);
  347. else if (!sm->eapolLogoff && !sm->authAbort)
  348. SM_ENTER(AUTH_PAE, RESTART);
  349. break;
  350. case AUTH_PAE_FORCE_AUTH:
  351. if (sm->eapolStart)
  352. SM_ENTER(AUTH_PAE, FORCE_AUTH);
  353. break;
  354. case AUTH_PAE_FORCE_UNAUTH:
  355. if (sm->eapolStart)
  356. SM_ENTER(AUTH_PAE, FORCE_UNAUTH);
  357. break;
  358. }
  359. }
  360. }
  361. /* Backend Authentication state machine */
  362. SM_STATE(BE_AUTH, INITIALIZE)
  363. {
  364. SM_ENTRY_MA(BE_AUTH, INITIALIZE, be_auth);
  365. abortAuth();
  366. sm->eap_if->eapNoReq = FALSE;
  367. sm->authAbort = FALSE;
  368. }
  369. SM_STATE(BE_AUTH, REQUEST)
  370. {
  371. SM_ENTRY_MA(BE_AUTH, REQUEST, be_auth);
  372. txReq();
  373. sm->eap_if->eapReq = FALSE;
  374. sm->backendOtherRequestsToSupplicant++;
  375. /*
  376. * Clearing eapolEap here is not specified in IEEE Std 802.1X-2004, but
  377. * it looks like this would be logical thing to do there since the old
  378. * EAP response would not be valid anymore after the new EAP request
  379. * was sent out.
  380. *
  381. * A race condition has been reported, in which hostapd ended up
  382. * sending out EAP-Response/Identity as a response to the first
  383. * EAP-Request from the main EAP method. This can be avoided by
  384. * clearing eapolEap here.
  385. */
  386. sm->eapolEap = FALSE;
  387. }
  388. SM_STATE(BE_AUTH, RESPONSE)
  389. {
  390. SM_ENTRY_MA(BE_AUTH, RESPONSE, be_auth);
  391. sm->authTimeout = FALSE;
  392. sm->eapolEap = FALSE;
  393. sm->eap_if->eapNoReq = FALSE;
  394. sm->aWhile = sm->serverTimeout;
  395. sm->eap_if->eapResp = TRUE;
  396. /* sendRespToServer(); */
  397. sm->backendResponses++;
  398. }
  399. SM_STATE(BE_AUTH, SUCCESS)
  400. {
  401. SM_ENTRY_MA(BE_AUTH, SUCCESS, be_auth);
  402. txReq();
  403. sm->authSuccess = TRUE;
  404. sm->keyRun = TRUE;
  405. }
  406. SM_STATE(BE_AUTH, FAIL)
  407. {
  408. SM_ENTRY_MA(BE_AUTH, FAIL, be_auth);
  409. txReq();
  410. sm->authFail = TRUE;
  411. }
  412. SM_STATE(BE_AUTH, TIMEOUT)
  413. {
  414. SM_ENTRY_MA(BE_AUTH, TIMEOUT, be_auth);
  415. sm->authTimeout = TRUE;
  416. }
  417. SM_STATE(BE_AUTH, IDLE)
  418. {
  419. SM_ENTRY_MA(BE_AUTH, IDLE, be_auth);
  420. sm->authStart = FALSE;
  421. }
  422. SM_STATE(BE_AUTH, IGNORE)
  423. {
  424. SM_ENTRY_MA(BE_AUTH, IGNORE, be_auth);
  425. sm->eap_if->eapNoReq = FALSE;
  426. }
  427. SM_STEP(BE_AUTH)
  428. {
  429. if (sm->portControl != Auto || sm->initialize || sm->authAbort) {
  430. SM_ENTER_GLOBAL(BE_AUTH, INITIALIZE);
  431. return;
  432. }
  433. switch (sm->be_auth_state) {
  434. case BE_AUTH_INITIALIZE:
  435. SM_ENTER(BE_AUTH, IDLE);
  436. break;
  437. case BE_AUTH_REQUEST:
  438. if (sm->eapolEap)
  439. SM_ENTER(BE_AUTH, RESPONSE);
  440. else if (sm->eap_if->eapReq)
  441. SM_ENTER(BE_AUTH, REQUEST);
  442. else if (sm->eap_if->eapTimeout)
  443. SM_ENTER(BE_AUTH, TIMEOUT);
  444. break;
  445. case BE_AUTH_RESPONSE:
  446. if (sm->eap_if->eapNoReq)
  447. SM_ENTER(BE_AUTH, IGNORE);
  448. if (sm->eap_if->eapReq) {
  449. sm->backendAccessChallenges++;
  450. SM_ENTER(BE_AUTH, REQUEST);
  451. } else if (sm->aWhile == 0)
  452. SM_ENTER(BE_AUTH, TIMEOUT);
  453. else if (sm->eap_if->eapFail) {
  454. sm->backendAuthFails++;
  455. SM_ENTER(BE_AUTH, FAIL);
  456. } else if (sm->eap_if->eapSuccess) {
  457. sm->backendAuthSuccesses++;
  458. SM_ENTER(BE_AUTH, SUCCESS);
  459. }
  460. break;
  461. case BE_AUTH_SUCCESS:
  462. SM_ENTER(BE_AUTH, IDLE);
  463. break;
  464. case BE_AUTH_FAIL:
  465. SM_ENTER(BE_AUTH, IDLE);
  466. break;
  467. case BE_AUTH_TIMEOUT:
  468. SM_ENTER(BE_AUTH, IDLE);
  469. break;
  470. case BE_AUTH_IDLE:
  471. if (sm->eap_if->eapFail && sm->authStart)
  472. SM_ENTER(BE_AUTH, FAIL);
  473. else if (sm->eap_if->eapReq && sm->authStart)
  474. SM_ENTER(BE_AUTH, REQUEST);
  475. else if (sm->eap_if->eapSuccess && sm->authStart)
  476. SM_ENTER(BE_AUTH, SUCCESS);
  477. break;
  478. case BE_AUTH_IGNORE:
  479. if (sm->eapolEap)
  480. SM_ENTER(BE_AUTH, RESPONSE);
  481. else if (sm->eap_if->eapReq)
  482. SM_ENTER(BE_AUTH, REQUEST);
  483. else if (sm->eap_if->eapTimeout)
  484. SM_ENTER(BE_AUTH, TIMEOUT);
  485. break;
  486. }
  487. }
  488. /* Reauthentication Timer state machine */
  489. SM_STATE(REAUTH_TIMER, INITIALIZE)
  490. {
  491. SM_ENTRY_MA(REAUTH_TIMER, INITIALIZE, reauth_timer);
  492. sm->reAuthWhen = sm->reAuthPeriod;
  493. }
  494. SM_STATE(REAUTH_TIMER, REAUTHENTICATE)
  495. {
  496. SM_ENTRY_MA(REAUTH_TIMER, REAUTHENTICATE, reauth_timer);
  497. sm->reAuthenticate = TRUE;
  498. sm->eapol->cb.eapol_event(sm->eapol->conf.ctx, sm->sta,
  499. EAPOL_AUTH_REAUTHENTICATE);
  500. }
  501. SM_STEP(REAUTH_TIMER)
  502. {
  503. if (sm->portControl != Auto || sm->initialize ||
  504. sm->authPortStatus == Unauthorized || !sm->reAuthEnabled) {
  505. SM_ENTER_GLOBAL(REAUTH_TIMER, INITIALIZE);
  506. return;
  507. }
  508. switch (sm->reauth_timer_state) {
  509. case REAUTH_TIMER_INITIALIZE:
  510. if (sm->reAuthWhen == 0)
  511. SM_ENTER(REAUTH_TIMER, REAUTHENTICATE);
  512. break;
  513. case REAUTH_TIMER_REAUTHENTICATE:
  514. SM_ENTER(REAUTH_TIMER, INITIALIZE);
  515. break;
  516. }
  517. }
  518. /* Authenticator Key Transmit state machine */
  519. SM_STATE(AUTH_KEY_TX, NO_KEY_TRANSMIT)
  520. {
  521. SM_ENTRY_MA(AUTH_KEY_TX, NO_KEY_TRANSMIT, auth_key_tx);
  522. }
  523. SM_STATE(AUTH_KEY_TX, KEY_TRANSMIT)
  524. {
  525. SM_ENTRY_MA(AUTH_KEY_TX, KEY_TRANSMIT, auth_key_tx);
  526. txKey();
  527. sm->eap_if->eapKeyAvailable = FALSE;
  528. sm->keyDone = TRUE;
  529. }
  530. SM_STEP(AUTH_KEY_TX)
  531. {
  532. if (sm->initialize || sm->portControl != Auto) {
  533. SM_ENTER_GLOBAL(AUTH_KEY_TX, NO_KEY_TRANSMIT);
  534. return;
  535. }
  536. switch (sm->auth_key_tx_state) {
  537. case AUTH_KEY_TX_NO_KEY_TRANSMIT:
  538. if (sm->keyTxEnabled && sm->eap_if->eapKeyAvailable &&
  539. sm->keyRun && !(sm->flags & EAPOL_SM_USES_WPA))
  540. SM_ENTER(AUTH_KEY_TX, KEY_TRANSMIT);
  541. break;
  542. case AUTH_KEY_TX_KEY_TRANSMIT:
  543. if (!sm->keyTxEnabled || !sm->keyRun)
  544. SM_ENTER(AUTH_KEY_TX, NO_KEY_TRANSMIT);
  545. else if (sm->eap_if->eapKeyAvailable)
  546. SM_ENTER(AUTH_KEY_TX, KEY_TRANSMIT);
  547. break;
  548. }
  549. }
  550. /* Key Receive state machine */
  551. SM_STATE(KEY_RX, NO_KEY_RECEIVE)
  552. {
  553. SM_ENTRY_MA(KEY_RX, NO_KEY_RECEIVE, key_rx);
  554. }
  555. SM_STATE(KEY_RX, KEY_RECEIVE)
  556. {
  557. SM_ENTRY_MA(KEY_RX, KEY_RECEIVE, key_rx);
  558. processKey();
  559. sm->rxKey = FALSE;
  560. }
  561. SM_STEP(KEY_RX)
  562. {
  563. if (sm->initialize || !sm->eap_if->portEnabled) {
  564. SM_ENTER_GLOBAL(KEY_RX, NO_KEY_RECEIVE);
  565. return;
  566. }
  567. switch (sm->key_rx_state) {
  568. case KEY_RX_NO_KEY_RECEIVE:
  569. if (sm->rxKey)
  570. SM_ENTER(KEY_RX, KEY_RECEIVE);
  571. break;
  572. case KEY_RX_KEY_RECEIVE:
  573. if (sm->rxKey)
  574. SM_ENTER(KEY_RX, KEY_RECEIVE);
  575. break;
  576. }
  577. }
  578. /* Controlled Directions state machine */
  579. SM_STATE(CTRL_DIR, FORCE_BOTH)
  580. {
  581. SM_ENTRY_MA(CTRL_DIR, FORCE_BOTH, ctrl_dir);
  582. sm->operControlledDirections = Both;
  583. }
  584. SM_STATE(CTRL_DIR, IN_OR_BOTH)
  585. {
  586. SM_ENTRY_MA(CTRL_DIR, IN_OR_BOTH, ctrl_dir);
  587. sm->operControlledDirections = sm->adminControlledDirections;
  588. }
  589. SM_STEP(CTRL_DIR)
  590. {
  591. if (sm->initialize) {
  592. SM_ENTER_GLOBAL(CTRL_DIR, IN_OR_BOTH);
  593. return;
  594. }
  595. switch (sm->ctrl_dir_state) {
  596. case CTRL_DIR_FORCE_BOTH:
  597. if (sm->eap_if->portEnabled && sm->operEdge)
  598. SM_ENTER(CTRL_DIR, IN_OR_BOTH);
  599. break;
  600. case CTRL_DIR_IN_OR_BOTH:
  601. if (sm->operControlledDirections !=
  602. sm->adminControlledDirections)
  603. SM_ENTER(CTRL_DIR, IN_OR_BOTH);
  604. if (!sm->eap_if->portEnabled || !sm->operEdge)
  605. SM_ENTER(CTRL_DIR, FORCE_BOTH);
  606. break;
  607. }
  608. }
  609. struct eapol_state_machine *
  610. eapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
  611. int flags, const struct wpabuf *assoc_wps_ie,
  612. const struct wpabuf *assoc_p2p_ie, void *sta_ctx,
  613. const char *identity, const char *radius_cui)
  614. {
  615. struct eapol_state_machine *sm;
  616. struct eap_config eap_conf;
  617. if (eapol == NULL)
  618. return NULL;
  619. sm = os_zalloc(sizeof(*sm));
  620. if (sm == NULL) {
  621. wpa_printf(MSG_DEBUG, "IEEE 802.1X state machine allocation "
  622. "failed");
  623. return NULL;
  624. }
  625. sm->radius_identifier = -1;
  626. os_memcpy(sm->addr, addr, ETH_ALEN);
  627. sm->flags = flags;
  628. sm->eapol = eapol;
  629. sm->sta = sta_ctx;
  630. /* Set default values for state machine constants */
  631. sm->auth_pae_state = AUTH_PAE_INITIALIZE;
  632. sm->quietPeriod = AUTH_PAE_DEFAULT_quietPeriod;
  633. sm->reAuthMax = AUTH_PAE_DEFAULT_reAuthMax;
  634. sm->be_auth_state = BE_AUTH_INITIALIZE;
  635. sm->serverTimeout = BE_AUTH_DEFAULT_serverTimeout;
  636. sm->reauth_timer_state = REAUTH_TIMER_INITIALIZE;
  637. sm->reAuthPeriod = eapol->conf.eap_reauth_period;
  638. sm->reAuthEnabled = eapol->conf.eap_reauth_period > 0 ? TRUE : FALSE;
  639. sm->auth_key_tx_state = AUTH_KEY_TX_NO_KEY_TRANSMIT;
  640. sm->key_rx_state = KEY_RX_NO_KEY_RECEIVE;
  641. sm->ctrl_dir_state = CTRL_DIR_IN_OR_BOTH;
  642. sm->portControl = Auto;
  643. if (!eapol->conf.wpa &&
  644. (eapol->default_wep_key || eapol->conf.individual_wep_key_len > 0))
  645. sm->keyTxEnabled = TRUE;
  646. else
  647. sm->keyTxEnabled = FALSE;
  648. if (eapol->conf.wpa)
  649. sm->portValid = FALSE;
  650. else
  651. sm->portValid = TRUE;
  652. os_memset(&eap_conf, 0, sizeof(eap_conf));
  653. eap_conf.eap_server = eapol->conf.eap_server;
  654. eap_conf.ssl_ctx = eapol->conf.ssl_ctx;
  655. eap_conf.msg_ctx = eapol->conf.msg_ctx;
  656. eap_conf.eap_sim_db_priv = eapol->conf.eap_sim_db_priv;
  657. eap_conf.pac_opaque_encr_key = eapol->conf.pac_opaque_encr_key;
  658. eap_conf.eap_fast_a_id = eapol->conf.eap_fast_a_id;
  659. eap_conf.eap_fast_a_id_len = eapol->conf.eap_fast_a_id_len;
  660. eap_conf.eap_fast_a_id_info = eapol->conf.eap_fast_a_id_info;
  661. eap_conf.eap_fast_prov = eapol->conf.eap_fast_prov;
  662. eap_conf.pac_key_lifetime = eapol->conf.pac_key_lifetime;
  663. eap_conf.pac_key_refresh_time = eapol->conf.pac_key_refresh_time;
  664. eap_conf.eap_sim_aka_result_ind = eapol->conf.eap_sim_aka_result_ind;
  665. eap_conf.tnc = eapol->conf.tnc;
  666. eap_conf.wps = eapol->conf.wps;
  667. eap_conf.assoc_wps_ie = assoc_wps_ie;
  668. eap_conf.assoc_p2p_ie = assoc_p2p_ie;
  669. eap_conf.peer_addr = addr;
  670. eap_conf.fragment_size = eapol->conf.fragment_size;
  671. eap_conf.pwd_group = eapol->conf.pwd_group;
  672. eap_conf.pbc_in_m1 = eapol->conf.pbc_in_m1;
  673. eap_conf.server_id = eapol->conf.server_id;
  674. eap_conf.server_id_len = eapol->conf.server_id_len;
  675. eap_conf.erp = eapol->conf.erp;
  676. sm->eap = eap_server_sm_init(sm, &eapol_cb, &eap_conf);
  677. if (sm->eap == NULL) {
  678. eapol_auth_free(sm);
  679. return NULL;
  680. }
  681. sm->eap_if = eap_get_interface(sm->eap);
  682. eapol_auth_initialize(sm);
  683. if (identity) {
  684. sm->identity = (u8 *) os_strdup(identity);
  685. if (sm->identity)
  686. sm->identity_len = os_strlen(identity);
  687. }
  688. if (radius_cui)
  689. sm->radius_cui = wpabuf_alloc_copy(radius_cui,
  690. os_strlen(radius_cui));
  691. sm->acct_multi_session_id_lo = eapol->acct_multi_session_id_lo++;
  692. if (eapol->acct_multi_session_id_lo == 0)
  693. eapol->acct_multi_session_id_hi++;
  694. sm->acct_multi_session_id_hi = eapol->acct_multi_session_id_hi;
  695. return sm;
  696. }
  697. void eapol_auth_free(struct eapol_state_machine *sm)
  698. {
  699. if (sm == NULL)
  700. return;
  701. eloop_cancel_timeout(eapol_port_timers_tick, NULL, sm);
  702. eloop_cancel_timeout(eapol_sm_step_cb, sm, NULL);
  703. if (sm->eap)
  704. eap_server_sm_deinit(sm->eap);
  705. os_free(sm);
  706. }
  707. static int eapol_sm_sta_entry_alive(struct eapol_authenticator *eapol,
  708. const u8 *addr)
  709. {
  710. return eapol->cb.sta_entry_alive(eapol->conf.ctx, addr);
  711. }
  712. static void eapol_sm_step_run(struct eapol_state_machine *sm)
  713. {
  714. struct eapol_authenticator *eapol = sm->eapol;
  715. u8 addr[ETH_ALEN];
  716. unsigned int prev_auth_pae, prev_be_auth, prev_reauth_timer,
  717. prev_auth_key_tx, prev_key_rx, prev_ctrl_dir;
  718. int max_steps = 100;
  719. os_memcpy(addr, sm->addr, ETH_ALEN);
  720. /*
  721. * Allow EAPOL state machines to run as long as there are state
  722. * changes, but exit and return here through event loop if more than
  723. * 100 steps is needed as a precaution against infinite loops inside
  724. * eloop callback.
  725. */
  726. restart:
  727. prev_auth_pae = sm->auth_pae_state;
  728. prev_be_auth = sm->be_auth_state;
  729. prev_reauth_timer = sm->reauth_timer_state;
  730. prev_auth_key_tx = sm->auth_key_tx_state;
  731. prev_key_rx = sm->key_rx_state;
  732. prev_ctrl_dir = sm->ctrl_dir_state;
  733. SM_STEP_RUN(AUTH_PAE);
  734. if (sm->initializing || eapol_sm_sta_entry_alive(eapol, addr))
  735. SM_STEP_RUN(BE_AUTH);
  736. if (sm->initializing || eapol_sm_sta_entry_alive(eapol, addr))
  737. SM_STEP_RUN(REAUTH_TIMER);
  738. if (sm->initializing || eapol_sm_sta_entry_alive(eapol, addr))
  739. SM_STEP_RUN(AUTH_KEY_TX);
  740. if (sm->initializing || eapol_sm_sta_entry_alive(eapol, addr))
  741. SM_STEP_RUN(KEY_RX);
  742. if (sm->initializing || eapol_sm_sta_entry_alive(eapol, addr))
  743. SM_STEP_RUN(CTRL_DIR);
  744. if (prev_auth_pae != sm->auth_pae_state ||
  745. prev_be_auth != sm->be_auth_state ||
  746. prev_reauth_timer != sm->reauth_timer_state ||
  747. prev_auth_key_tx != sm->auth_key_tx_state ||
  748. prev_key_rx != sm->key_rx_state ||
  749. prev_ctrl_dir != sm->ctrl_dir_state) {
  750. if (--max_steps > 0)
  751. goto restart;
  752. /* Re-run from eloop timeout */
  753. eapol_auth_step(sm);
  754. return;
  755. }
  756. if (eapol_sm_sta_entry_alive(eapol, addr) && sm->eap) {
  757. if (eap_server_sm_step(sm->eap)) {
  758. if (--max_steps > 0)
  759. goto restart;
  760. /* Re-run from eloop timeout */
  761. eapol_auth_step(sm);
  762. return;
  763. }
  764. /* TODO: find a better location for this */
  765. if (sm->eap_if->aaaEapResp) {
  766. sm->eap_if->aaaEapResp = FALSE;
  767. if (sm->eap_if->aaaEapRespData == NULL) {
  768. wpa_printf(MSG_DEBUG, "EAPOL: aaaEapResp set, "
  769. "but no aaaEapRespData available");
  770. return;
  771. }
  772. sm->eapol->cb.aaa_send(
  773. sm->eapol->conf.ctx, sm->sta,
  774. wpabuf_head(sm->eap_if->aaaEapRespData),
  775. wpabuf_len(sm->eap_if->aaaEapRespData));
  776. }
  777. }
  778. if (eapol_sm_sta_entry_alive(eapol, addr))
  779. sm->eapol->cb.eapol_event(sm->eapol->conf.ctx, sm->sta,
  780. EAPOL_AUTH_SM_CHANGE);
  781. }
  782. static void eapol_sm_step_cb(void *eloop_ctx, void *timeout_ctx)
  783. {
  784. struct eapol_state_machine *sm = eloop_ctx;
  785. eapol_sm_step_run(sm);
  786. }
  787. /**
  788. * eapol_auth_step - Advance EAPOL state machines
  789. * @sm: EAPOL state machine
  790. *
  791. * This function is called to advance EAPOL state machines after any change
  792. * that could affect their state.
  793. */
  794. void eapol_auth_step(struct eapol_state_machine *sm)
  795. {
  796. /*
  797. * Run eapol_sm_step_run from a registered timeout to make sure that
  798. * other possible timeouts/events are processed and to avoid long
  799. * function call chains.
  800. */
  801. eloop_register_timeout(0, 0, eapol_sm_step_cb, sm, NULL);
  802. }
  803. static void eapol_auth_initialize(struct eapol_state_machine *sm)
  804. {
  805. sm->initializing = TRUE;
  806. /* Initialize the state machines by asserting initialize and then
  807. * deasserting it after one step */
  808. sm->initialize = TRUE;
  809. eapol_sm_step_run(sm);
  810. sm->initialize = FALSE;
  811. eapol_sm_step_run(sm);
  812. sm->initializing = FALSE;
  813. /* Start one second tick for port timers state machine */
  814. eloop_cancel_timeout(eapol_port_timers_tick, NULL, sm);
  815. eloop_register_timeout(1, 0, eapol_port_timers_tick, NULL, sm);
  816. }
  817. static int eapol_sm_get_eap_user(void *ctx, const u8 *identity,
  818. size_t identity_len, int phase2,
  819. struct eap_user *user)
  820. {
  821. struct eapol_state_machine *sm = ctx;
  822. int ret;
  823. ret = sm->eapol->cb.get_eap_user(sm->eapol->conf.ctx, identity,
  824. identity_len, phase2, user);
  825. if (user->remediation)
  826. sm->remediation = 1;
  827. return ret;
  828. }
  829. static const char * eapol_sm_get_eap_req_id_text(void *ctx, size_t *len)
  830. {
  831. struct eapol_state_machine *sm = ctx;
  832. *len = sm->eapol->conf.eap_req_id_text_len;
  833. return sm->eapol->conf.eap_req_id_text;
  834. }
  835. static int eapol_sm_get_erp_send_reauth_start(void *ctx)
  836. {
  837. struct eapol_state_machine *sm = ctx;
  838. return sm->eapol->conf.erp_send_reauth_start;
  839. }
  840. static const char * eapol_sm_get_erp_domain(void *ctx)
  841. {
  842. struct eapol_state_machine *sm = ctx;
  843. return sm->eapol->conf.erp_domain;
  844. }
  845. static struct eap_server_erp_key * eapol_sm_erp_get_key(void *ctx,
  846. const char *keyname)
  847. {
  848. struct eapol_state_machine *sm = ctx;
  849. return sm->eapol->cb.erp_get_key(sm->eapol->conf.ctx, keyname);
  850. }
  851. static int eapol_sm_erp_add_key(void *ctx, struct eap_server_erp_key *erp)
  852. {
  853. struct eapol_state_machine *sm = ctx;
  854. return sm->eapol->cb.erp_add_key(sm->eapol->conf.ctx, erp);
  855. }
  856. static const struct eapol_callbacks eapol_cb =
  857. {
  858. eapol_sm_get_eap_user,
  859. eapol_sm_get_eap_req_id_text,
  860. NULL,
  861. eapol_sm_get_erp_send_reauth_start,
  862. eapol_sm_get_erp_domain,
  863. eapol_sm_erp_get_key,
  864. eapol_sm_erp_add_key,
  865. };
  866. int eapol_auth_eap_pending_cb(struct eapol_state_machine *sm, void *ctx)
  867. {
  868. if (sm == NULL || ctx == NULL || ctx != sm->eap)
  869. return -1;
  870. eap_sm_pending_cb(sm->eap);
  871. eapol_auth_step(sm);
  872. return 0;
  873. }
  874. void eapol_auth_reauthenticate(struct eapol_state_machine *sm)
  875. {
  876. wpa_printf(MSG_DEBUG, "EAPOL: External reauthentication trigger for "
  877. MACSTR, MAC2STR(sm->addr));
  878. sm->reAuthenticate = TRUE;
  879. eapol_auth_step(sm);
  880. }
  881. int eapol_auth_set_conf(struct eapol_state_machine *sm, const char *param,
  882. const char *value)
  883. {
  884. wpa_printf(MSG_DEBUG, "EAPOL: External configuration operation for "
  885. MACSTR " - param=%s value=%s",
  886. MAC2STR(sm->addr), param, value);
  887. if (os_strcasecmp(param, "AdminControlledDirections") == 0) {
  888. if (os_strcmp(value, "Both") == 0)
  889. sm->adminControlledDirections = Both;
  890. else if (os_strcmp(value, "In") == 0)
  891. sm->adminControlledDirections = In;
  892. else
  893. return -1;
  894. eapol_auth_step(sm);
  895. return 0;
  896. }
  897. if (os_strcasecmp(param, "AdminControlledPortControl") == 0) {
  898. if (os_strcmp(value, "ForceAuthorized") == 0)
  899. sm->portControl = ForceAuthorized;
  900. else if (os_strcmp(value, "ForceUnauthorized") == 0)
  901. sm->portControl = ForceUnauthorized;
  902. else if (os_strcmp(value, "Auto") == 0)
  903. sm->portControl = Auto;
  904. else
  905. return -1;
  906. eapol_auth_step(sm);
  907. return 0;
  908. }
  909. if (os_strcasecmp(param, "quietPeriod") == 0) {
  910. sm->quietPeriod = atoi(value);
  911. return 0;
  912. }
  913. if (os_strcasecmp(param, "serverTimeout") == 0) {
  914. sm->serverTimeout = atoi(value);
  915. return 0;
  916. }
  917. if (os_strcasecmp(param, "reAuthPeriod") == 0) {
  918. sm->reAuthPeriod = atoi(value);
  919. return 0;
  920. }
  921. if (os_strcasecmp(param, "reAuthEnabled") == 0) {
  922. if (os_strcmp(value, "TRUE") == 0)
  923. sm->reAuthEnabled = TRUE;
  924. else if (os_strcmp(value, "FALSE") == 0)
  925. sm->reAuthEnabled = FALSE;
  926. else
  927. return -1;
  928. eapol_auth_step(sm);
  929. return 0;
  930. }
  931. if (os_strcasecmp(param, "KeyTransmissionEnabled") == 0) {
  932. if (os_strcmp(value, "TRUE") == 0)
  933. sm->keyTxEnabled = TRUE;
  934. else if (os_strcmp(value, "FALSE") == 0)
  935. sm->keyTxEnabled = FALSE;
  936. else
  937. return -1;
  938. eapol_auth_step(sm);
  939. return 0;
  940. }
  941. return -1;
  942. }
  943. static int eapol_auth_conf_clone(struct eapol_auth_config *dst,
  944. struct eapol_auth_config *src)
  945. {
  946. dst->ctx = src->ctx;
  947. dst->eap_reauth_period = src->eap_reauth_period;
  948. dst->wpa = src->wpa;
  949. dst->individual_wep_key_len = src->individual_wep_key_len;
  950. dst->eap_server = src->eap_server;
  951. dst->ssl_ctx = src->ssl_ctx;
  952. dst->msg_ctx = src->msg_ctx;
  953. dst->eap_sim_db_priv = src->eap_sim_db_priv;
  954. os_free(dst->eap_req_id_text);
  955. dst->pwd_group = src->pwd_group;
  956. dst->pbc_in_m1 = src->pbc_in_m1;
  957. dst->server_id = src->server_id;
  958. dst->server_id_len = src->server_id_len;
  959. if (src->eap_req_id_text) {
  960. dst->eap_req_id_text = os_malloc(src->eap_req_id_text_len);
  961. if (dst->eap_req_id_text == NULL)
  962. return -1;
  963. os_memcpy(dst->eap_req_id_text, src->eap_req_id_text,
  964. src->eap_req_id_text_len);
  965. dst->eap_req_id_text_len = src->eap_req_id_text_len;
  966. } else {
  967. dst->eap_req_id_text = NULL;
  968. dst->eap_req_id_text_len = 0;
  969. }
  970. if (src->pac_opaque_encr_key) {
  971. dst->pac_opaque_encr_key = os_malloc(16);
  972. if (dst->pac_opaque_encr_key == NULL)
  973. goto fail;
  974. os_memcpy(dst->pac_opaque_encr_key, src->pac_opaque_encr_key,
  975. 16);
  976. } else
  977. dst->pac_opaque_encr_key = NULL;
  978. if (src->eap_fast_a_id) {
  979. dst->eap_fast_a_id = os_malloc(src->eap_fast_a_id_len);
  980. if (dst->eap_fast_a_id == NULL)
  981. goto fail;
  982. os_memcpy(dst->eap_fast_a_id, src->eap_fast_a_id,
  983. src->eap_fast_a_id_len);
  984. dst->eap_fast_a_id_len = src->eap_fast_a_id_len;
  985. } else
  986. dst->eap_fast_a_id = NULL;
  987. if (src->eap_fast_a_id_info) {
  988. dst->eap_fast_a_id_info = os_strdup(src->eap_fast_a_id_info);
  989. if (dst->eap_fast_a_id_info == NULL)
  990. goto fail;
  991. } else
  992. dst->eap_fast_a_id_info = NULL;
  993. dst->eap_fast_prov = src->eap_fast_prov;
  994. dst->pac_key_lifetime = src->pac_key_lifetime;
  995. dst->pac_key_refresh_time = src->pac_key_refresh_time;
  996. dst->eap_sim_aka_result_ind = src->eap_sim_aka_result_ind;
  997. dst->tnc = src->tnc;
  998. dst->wps = src->wps;
  999. dst->fragment_size = src->fragment_size;
  1000. os_free(dst->erp_domain);
  1001. if (src->erp_domain) {
  1002. dst->erp_domain = os_strdup(src->erp_domain);
  1003. if (dst->erp_domain == NULL)
  1004. goto fail;
  1005. } else {
  1006. dst->erp_domain = NULL;
  1007. }
  1008. dst->erp_send_reauth_start = src->erp_send_reauth_start;
  1009. dst->erp = src->erp;
  1010. return 0;
  1011. fail:
  1012. eapol_auth_conf_free(dst);
  1013. return -1;
  1014. }
  1015. static void eapol_auth_conf_free(struct eapol_auth_config *conf)
  1016. {
  1017. os_free(conf->eap_req_id_text);
  1018. conf->eap_req_id_text = NULL;
  1019. os_free(conf->pac_opaque_encr_key);
  1020. conf->pac_opaque_encr_key = NULL;
  1021. os_free(conf->eap_fast_a_id);
  1022. conf->eap_fast_a_id = NULL;
  1023. os_free(conf->eap_fast_a_id_info);
  1024. conf->eap_fast_a_id_info = NULL;
  1025. os_free(conf->erp_domain);
  1026. conf->erp_domain = NULL;
  1027. }
  1028. struct eapol_authenticator * eapol_auth_init(struct eapol_auth_config *conf,
  1029. struct eapol_auth_cb *cb)
  1030. {
  1031. struct eapol_authenticator *eapol;
  1032. struct os_time now;
  1033. eapol = os_zalloc(sizeof(*eapol));
  1034. if (eapol == NULL)
  1035. return NULL;
  1036. if (eapol_auth_conf_clone(&eapol->conf, conf) < 0) {
  1037. os_free(eapol);
  1038. return NULL;
  1039. }
  1040. if (conf->individual_wep_key_len > 0) {
  1041. /* use key0 in individual key and key1 in broadcast key */
  1042. eapol->default_wep_key_idx = 1;
  1043. }
  1044. eapol->cb.eapol_send = cb->eapol_send;
  1045. eapol->cb.aaa_send = cb->aaa_send;
  1046. eapol->cb.finished = cb->finished;
  1047. eapol->cb.get_eap_user = cb->get_eap_user;
  1048. eapol->cb.sta_entry_alive = cb->sta_entry_alive;
  1049. eapol->cb.logger = cb->logger;
  1050. eapol->cb.set_port_authorized = cb->set_port_authorized;
  1051. eapol->cb.abort_auth = cb->abort_auth;
  1052. eapol->cb.tx_key = cb->tx_key;
  1053. eapol->cb.eapol_event = cb->eapol_event;
  1054. eapol->cb.erp_get_key = cb->erp_get_key;
  1055. eapol->cb.erp_add_key = cb->erp_add_key;
  1056. /* Acct-Multi-Session-Id should be unique over reboots. If reliable
  1057. * clock is not available, this could be replaced with reboot counter,
  1058. * etc. */
  1059. os_get_time(&now);
  1060. eapol->acct_multi_session_id_hi = now.sec;
  1061. return eapol;
  1062. }
  1063. void eapol_auth_deinit(struct eapol_authenticator *eapol)
  1064. {
  1065. if (eapol == NULL)
  1066. return;
  1067. eapol_auth_conf_free(&eapol->conf);
  1068. os_free(eapol->default_wep_key);
  1069. os_free(eapol);
  1070. }