123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421 |
- /*
- * EAPOL supplicant state machines
- * Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
- *
- * This software may be distributed under the terms of the BSD license.
- * See README for more details.
- */
- #ifndef EAPOL_SUPP_SM_H
- #define EAPOL_SUPP_SM_H
- #include "common/defs.h"
- typedef enum { Unauthorized, Authorized } PortStatus;
- typedef enum { Auto, ForceUnauthorized, ForceAuthorized } PortControl;
- /**
- * struct eapol_config - Per network configuration for EAPOL state machines
- */
- struct eapol_config {
- /**
- * accept_802_1x_keys - Accept IEEE 802.1X (non-WPA) EAPOL-Key frames
- *
- * This variable should be set to 1 when using EAPOL state machines
- * with non-WPA security policy to generate dynamic WEP keys. When
- * using WPA, this should be set to 0 so that WPA state machine can
- * process the EAPOL-Key frames.
- */
- int accept_802_1x_keys;
- #define EAPOL_REQUIRE_KEY_UNICAST BIT(0)
- #define EAPOL_REQUIRE_KEY_BROADCAST BIT(1)
- /**
- * required_keys - Which EAPOL-Key packets are required
- *
- * This variable determines which EAPOL-Key packets are required before
- * marking connection authenticated. This is a bit field of
- * EAPOL_REQUIRE_KEY_UNICAST and EAPOL_REQUIRE_KEY_BROADCAST flags.
- */
- int required_keys;
- /**
- * fast_reauth - Whether fast EAP reauthentication is enabled
- */
- int fast_reauth;
- /**
- * workaround - Whether EAP workarounds are enabled
- */
- unsigned int workaround;
- /**
- * eap_disabled - Whether EAP is disabled
- */
- int eap_disabled;
- /**
- * external_sim - Use external processing for SIM/USIM operations
- */
- int external_sim;
- #define EAPOL_LOCAL_WPS_IN_USE BIT(0)
- #define EAPOL_PEER_IS_WPS20_AP BIT(1)
- /**
- * wps - Whether this connection is used for WPS
- */
- int wps;
- };
- struct eapol_sm;
- struct wpa_config_blob;
- enum eapol_supp_result {
- EAPOL_SUPP_RESULT_FAILURE,
- EAPOL_SUPP_RESULT_SUCCESS,
- EAPOL_SUPP_RESULT_EXPECTED_FAILURE
- };
- /**
- * struct eapol_ctx - Global (for all networks) EAPOL state machine context
- */
- struct eapol_ctx {
- /**
- * ctx - Pointer to arbitrary upper level context
- */
- void *ctx;
- /**
- * preauth - IEEE 802.11i/RSN pre-authentication
- *
- * This EAPOL state machine is used for IEEE 802.11i/RSN
- * pre-authentication
- */
- int preauth;
- /**
- * cb - Function to be called when EAPOL negotiation has been completed
- * @eapol: Pointer to EAPOL state machine data
- * @result: Whether the authentication was completed successfully
- * @ctx: Pointer to context data (cb_ctx)
- *
- * This optional callback function will be called when the EAPOL
- * authentication has been completed. This allows the owner of the
- * EAPOL state machine to process the key and terminate the EAPOL state
- * machine. Currently, this is used only in RSN pre-authentication.
- */
- void (*cb)(struct eapol_sm *eapol, enum eapol_supp_result result,
- void *ctx);
- /**
- * cb_ctx - Callback context for cb()
- */
- void *cb_ctx;
- /**
- * msg_ctx - Callback context for wpa_msg() calls
- */
- void *msg_ctx;
- /**
- * scard_ctx - Callback context for PC/SC scard_*() function calls
- *
- * This context can be updated with eapol_sm_register_scard_ctx().
- */
- void *scard_ctx;
- /**
- * eapol_send_ctx - Callback context for eapol_send() calls
- */
- void *eapol_send_ctx;
- /**
- * eapol_done_cb - Function to be called at successful completion
- * @ctx: Callback context (ctx)
- *
- * This function is called at the successful completion of EAPOL
- * authentication. If dynamic WEP keys are used, this is called only
- * after all the expected keys have been received.
- */
- void (*eapol_done_cb)(void *ctx);
- /**
- * eapol_send - Send EAPOL packets
- * @ctx: Callback context (eapol_send_ctx)
- * @type: EAPOL type (IEEE802_1X_TYPE_*)
- * @buf: Pointer to EAPOL payload
- * @len: Length of the EAPOL payload
- * Returns: 0 on success, -1 on failure
- */
- int (*eapol_send)(void *ctx, int type, const u8 *buf, size_t len);
- /**
- * set_wep_key - Configure WEP keys
- * @ctx: Callback context (ctx)
- * @unicast: Non-zero = unicast, 0 = multicast/broadcast key
- * @keyidx: Key index (0..3)
- * @key: WEP key
- * @keylen: Length of the WEP key
- * Returns: 0 on success, -1 on failure
- */
- int (*set_wep_key)(void *ctx, int unicast, int keyidx,
- const u8 *key, size_t keylen);
- /**
- * set_config_blob - Set or add a named configuration blob
- * @ctx: Callback context (ctx)
- * @blob: New value for the blob
- *
- * Adds a new configuration blob or replaces the current value of an
- * existing blob.
- */
- void (*set_config_blob)(void *ctx, struct wpa_config_blob *blob);
- /**
- * get_config_blob - Get a named configuration blob
- * @ctx: Callback context (ctx)
- * @name: Name of the blob
- * Returns: Pointer to blob data or %NULL if not found
- */
- const struct wpa_config_blob * (*get_config_blob)(void *ctx,
- const char *name);
- /**
- * aborted_cached - Notify that cached PMK attempt was aborted
- * @ctx: Callback context (ctx)
- */
- void (*aborted_cached)(void *ctx);
- /**
- * opensc_engine_path - Path to the OpenSSL engine for opensc
- *
- * This is an OpenSSL specific configuration option for loading OpenSC
- * engine (engine_opensc.so); if %NULL, this engine is not loaded.
- */
- const char *opensc_engine_path;
- /**
- * pkcs11_engine_path - Path to the OpenSSL engine for PKCS#11
- *
- * This is an OpenSSL specific configuration option for loading PKCS#11
- * engine (engine_pkcs11.so); if %NULL, this engine is not loaded.
- */
- const char *pkcs11_engine_path;
- /**
- * pkcs11_module_path - Path to the OpenSSL OpenSC/PKCS#11 module
- *
- * This is an OpenSSL specific configuration option for configuring
- * path to OpenSC/PKCS#11 engine (opensc-pkcs11.so); if %NULL, this
- * module is not loaded.
- */
- const char *pkcs11_module_path;
- /**
- * openssl_ciphers - OpenSSL cipher string
- *
- * This is an OpenSSL specific configuration option for configuring the
- * default ciphers. If not set, "DEFAULT:!EXP:!LOW" is used as the
- * default.
- */
- const char *openssl_ciphers;
- /**
- * wps - WPS context data
- *
- * This is only used by EAP-WSC and can be left %NULL if not available.
- */
- struct wps_context *wps;
- /**
- * eap_param_needed - Notify that EAP parameter is needed
- * @ctx: Callback context (ctx)
- * @field: Field indicator (e.g., WPA_CTRL_REQ_EAP_IDENTITY)
- * @txt: User readable text describing the required parameter
- */
- void (*eap_param_needed)(void *ctx, enum wpa_ctrl_req_type field,
- const char *txt);
- /**
- * port_cb - Set port authorized/unauthorized callback (optional)
- * @ctx: Callback context (ctx)
- * @authorized: Whether the supplicant port is now in authorized state
- */
- void (*port_cb)(void *ctx, int authorized);
- /**
- * cert_cb - Notification of a peer certificate
- * @ctx: Callback context (ctx)
- * @depth: Depth in certificate chain (0 = server)
- * @subject: Subject of the peer certificate
- * @cert_hash: SHA-256 hash of the certificate
- * @cert: Peer certificate
- */
- void (*cert_cb)(void *ctx, int depth, const char *subject,
- const char *cert_hash, const struct wpabuf *cert);
- /**
- * cert_in_cb - Include server certificates in callback
- */
- int cert_in_cb;
- /**
- * status_cb - Notification of a change in EAP status
- * @ctx: Callback context (ctx)
- * @status: Step in the process of EAP authentication
- * @parameter: Step-specific parameter, e.g., EAP method name
- */
- void (*status_cb)(void *ctx, const char *status,
- const char *parameter);
- /**
- * set_anon_id - Set or add anonymous identity
- * @ctx: eapol_ctx from eap_peer_sm_init() call
- * @id: Anonymous identity (e.g., EAP-SIM pseudonym)
- * @len: Length of anonymous identity in octets
- */
- void (*set_anon_id)(void *ctx, const u8 *id, size_t len);
- };
- struct eap_peer_config;
- struct ext_password_data;
- #ifdef IEEE8021X_EAPOL
- struct eapol_sm *eapol_sm_init(struct eapol_ctx *ctx);
- void eapol_sm_deinit(struct eapol_sm *sm);
- void eapol_sm_step(struct eapol_sm *sm);
- int eapol_sm_get_status(struct eapol_sm *sm, char *buf, size_t buflen,
- int verbose);
- int eapol_sm_get_mib(struct eapol_sm *sm, char *buf, size_t buflen);
- void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod, int authPeriod,
- int startPeriod, int maxStart);
- int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src, const u8 *buf,
- size_t len);
- void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm);
- void eapol_sm_notify_portEnabled(struct eapol_sm *sm, Boolean enabled);
- void eapol_sm_notify_portValid(struct eapol_sm *sm, Boolean valid);
- void eapol_sm_notify_eap_success(struct eapol_sm *sm, Boolean success);
- void eapol_sm_notify_eap_fail(struct eapol_sm *sm, Boolean fail);
- void eapol_sm_notify_config(struct eapol_sm *sm,
- struct eap_peer_config *config,
- const struct eapol_config *conf);
- int eapol_sm_get_key(struct eapol_sm *sm, u8 *key, size_t len);
- const u8 * eapol_sm_get_session_id(struct eapol_sm *sm, size_t *len);
- void eapol_sm_notify_logoff(struct eapol_sm *sm, Boolean logoff);
- void eapol_sm_notify_cached(struct eapol_sm *sm);
- void eapol_sm_notify_pmkid_attempt(struct eapol_sm *sm, int attempt);
- void eapol_sm_register_scard_ctx(struct eapol_sm *sm, void *ctx);
- void eapol_sm_notify_portControl(struct eapol_sm *sm, PortControl portControl);
- void eapol_sm_notify_ctrl_attached(struct eapol_sm *sm);
- void eapol_sm_notify_ctrl_response(struct eapol_sm *sm);
- void eapol_sm_request_reauth(struct eapol_sm *sm);
- void eapol_sm_notify_lower_layer_success(struct eapol_sm *sm, int in_eapol_sm);
- void eapol_sm_invalidate_cached_session(struct eapol_sm *sm);
- const char * eapol_sm_get_method_name(struct eapol_sm *sm);
- void eapol_sm_set_ext_pw_ctx(struct eapol_sm *sm,
- struct ext_password_data *ext);
- int eapol_sm_failed(struct eapol_sm *sm);
- int eapol_sm_get_eap_proxy_imsi(struct eapol_sm *sm, char *imsi, size_t *len);
- #else /* IEEE8021X_EAPOL */
- static inline struct eapol_sm *eapol_sm_init(struct eapol_ctx *ctx)
- {
- free(ctx);
- return (struct eapol_sm *) 1;
- }
- static inline void eapol_sm_deinit(struct eapol_sm *sm)
- {
- }
- static inline void eapol_sm_step(struct eapol_sm *sm)
- {
- }
- static inline int eapol_sm_get_status(struct eapol_sm *sm, char *buf,
- size_t buflen, int verbose)
- {
- return 0;
- }
- static inline int eapol_sm_get_mib(struct eapol_sm *sm, char *buf,
- size_t buflen)
- {
- return 0;
- }
- static inline void eapol_sm_configure(struct eapol_sm *sm, int heldPeriod,
- int authPeriod, int startPeriod,
- int maxStart)
- {
- }
- static inline int eapol_sm_rx_eapol(struct eapol_sm *sm, const u8 *src,
- const u8 *buf, size_t len)
- {
- return 0;
- }
- static inline void eapol_sm_notify_tx_eapol_key(struct eapol_sm *sm)
- {
- }
- static inline void eapol_sm_notify_portEnabled(struct eapol_sm *sm,
- Boolean enabled)
- {
- }
- static inline void eapol_sm_notify_portValid(struct eapol_sm *sm,
- Boolean valid)
- {
- }
- static inline void eapol_sm_notify_eap_success(struct eapol_sm *sm,
- Boolean success)
- {
- }
- static inline void eapol_sm_notify_eap_fail(struct eapol_sm *sm, Boolean fail)
- {
- }
- static inline void eapol_sm_notify_config(struct eapol_sm *sm,
- struct eap_peer_config *config,
- struct eapol_config *conf)
- {
- }
- static inline int eapol_sm_get_key(struct eapol_sm *sm, u8 *key, size_t len)
- {
- return -1;
- }
- static inline void eapol_sm_notify_logoff(struct eapol_sm *sm, Boolean logoff)
- {
- }
- static inline void eapol_sm_notify_cached(struct eapol_sm *sm)
- {
- }
- #define eapol_sm_notify_pmkid_attempt(sm, attempt) do { } while (0)
- #define eapol_sm_register_scard_ctx(sm, ctx) do { } while (0)
- static inline void eapol_sm_notify_portControl(struct eapol_sm *sm,
- PortControl portControl)
- {
- }
- static inline void eapol_sm_notify_ctrl_attached(struct eapol_sm *sm)
- {
- }
- static inline void eapol_sm_notify_ctrl_response(struct eapol_sm *sm)
- {
- }
- static inline void eapol_sm_request_reauth(struct eapol_sm *sm)
- {
- }
- static inline void eapol_sm_notify_lower_layer_success(struct eapol_sm *sm,
- int in_eapol_sm)
- {
- }
- static inline void eapol_sm_invalidate_cached_session(struct eapol_sm *sm)
- {
- }
- static inline const char * eapol_sm_get_method_name(struct eapol_sm *sm)
- {
- return NULL;
- }
- static inline void eapol_sm_set_ext_pw_ctx(struct eapol_sm *sm,
- struct ext_password_data *ext)
- {
- }
- static inline int eapol_sm_failed(struct eapol_sm *sm)
- {
- return 0;
- }
- #endif /* IEEE8021X_EAPOL */
- #endif /* EAPOL_SUPP_SM_H */
|