pmksa_cache_auth.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730
  1. /*
  2. * hostapd - PMKSA cache for IEEE 802.11i RSN
  3. * Copyright (c) 2004-2008, 2012-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/eloop.h"
  11. #include "eapol_auth/eapol_auth_sm.h"
  12. #include "eapol_auth/eapol_auth_sm_i.h"
  13. #include "radius/radius_das.h"
  14. #include "sta_info.h"
  15. #include "ap_config.h"
  16. #include "pmksa_cache_auth.h"
  17. static const int pmksa_cache_max_entries = 1024;
  18. static const int dot11RSNAConfigPMKLifetime = 43200;
  19. struct rsn_pmksa_cache {
  20. #define PMKID_HASH_SIZE 128
  21. #define PMKID_HASH(pmkid) (unsigned int) ((pmkid)[0] & 0x7f)
  22. struct rsn_pmksa_cache_entry *pmkid[PMKID_HASH_SIZE];
  23. struct rsn_pmksa_cache_entry *pmksa;
  24. int pmksa_count;
  25. void (*free_cb)(struct rsn_pmksa_cache_entry *entry, void *ctx);
  26. void *ctx;
  27. };
  28. static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa);
  29. static void _pmksa_cache_free_entry(struct rsn_pmksa_cache_entry *entry)
  30. {
  31. os_free(entry->vlan_desc);
  32. os_free(entry->identity);
  33. wpabuf_free(entry->cui);
  34. #ifndef CONFIG_NO_RADIUS
  35. radius_free_class(&entry->radius_class);
  36. #endif /* CONFIG_NO_RADIUS */
  37. bin_clear_free(entry, sizeof(*entry));
  38. }
  39. void pmksa_cache_free_entry(struct rsn_pmksa_cache *pmksa,
  40. struct rsn_pmksa_cache_entry *entry)
  41. {
  42. struct rsn_pmksa_cache_entry *pos, *prev;
  43. unsigned int hash;
  44. pmksa->pmksa_count--;
  45. pmksa->free_cb(entry, pmksa->ctx);
  46. /* unlink from hash list */
  47. hash = PMKID_HASH(entry->pmkid);
  48. pos = pmksa->pmkid[hash];
  49. prev = NULL;
  50. while (pos) {
  51. if (pos == entry) {
  52. if (prev != NULL)
  53. prev->hnext = entry->hnext;
  54. else
  55. pmksa->pmkid[hash] = entry->hnext;
  56. break;
  57. }
  58. prev = pos;
  59. pos = pos->hnext;
  60. }
  61. /* unlink from entry list */
  62. pos = pmksa->pmksa;
  63. prev = NULL;
  64. while (pos) {
  65. if (pos == entry) {
  66. if (prev != NULL)
  67. prev->next = entry->next;
  68. else
  69. pmksa->pmksa = entry->next;
  70. break;
  71. }
  72. prev = pos;
  73. pos = pos->next;
  74. }
  75. _pmksa_cache_free_entry(entry);
  76. }
  77. /**
  78. * pmksa_cache_auth_flush - Flush all PMKSA cache entries
  79. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  80. */
  81. void pmksa_cache_auth_flush(struct rsn_pmksa_cache *pmksa)
  82. {
  83. while (pmksa->pmksa) {
  84. wpa_printf(MSG_DEBUG, "RSN: Flush PMKSA cache entry for "
  85. MACSTR, MAC2STR(pmksa->pmksa->spa));
  86. pmksa_cache_free_entry(pmksa, pmksa->pmksa);
  87. }
  88. }
  89. static void pmksa_cache_expire(void *eloop_ctx, void *timeout_ctx)
  90. {
  91. struct rsn_pmksa_cache *pmksa = eloop_ctx;
  92. struct os_reltime now;
  93. os_get_reltime(&now);
  94. while (pmksa->pmksa && pmksa->pmksa->expiration <= now.sec) {
  95. wpa_printf(MSG_DEBUG, "RSN: expired PMKSA cache entry for "
  96. MACSTR, MAC2STR(pmksa->pmksa->spa));
  97. pmksa_cache_free_entry(pmksa, pmksa->pmksa);
  98. }
  99. pmksa_cache_set_expiration(pmksa);
  100. }
  101. static void pmksa_cache_set_expiration(struct rsn_pmksa_cache *pmksa)
  102. {
  103. int sec;
  104. struct os_reltime now;
  105. eloop_cancel_timeout(pmksa_cache_expire, pmksa, NULL);
  106. if (pmksa->pmksa == NULL)
  107. return;
  108. os_get_reltime(&now);
  109. sec = pmksa->pmksa->expiration - now.sec;
  110. if (sec < 0)
  111. sec = 0;
  112. eloop_register_timeout(sec + 1, 0, pmksa_cache_expire, pmksa, NULL);
  113. }
  114. static void pmksa_cache_from_eapol_data(struct rsn_pmksa_cache_entry *entry,
  115. struct eapol_state_machine *eapol)
  116. {
  117. struct vlan_description *vlan_desc;
  118. if (eapol == NULL)
  119. return;
  120. if (eapol->identity) {
  121. entry->identity = os_malloc(eapol->identity_len);
  122. if (entry->identity) {
  123. entry->identity_len = eapol->identity_len;
  124. os_memcpy(entry->identity, eapol->identity,
  125. eapol->identity_len);
  126. }
  127. }
  128. if (eapol->radius_cui)
  129. entry->cui = wpabuf_dup(eapol->radius_cui);
  130. #ifndef CONFIG_NO_RADIUS
  131. radius_copy_class(&entry->radius_class, &eapol->radius_class);
  132. #endif /* CONFIG_NO_RADIUS */
  133. entry->eap_type_authsrv = eapol->eap_type_authsrv;
  134. vlan_desc = ((struct sta_info *) eapol->sta)->vlan_desc;
  135. if (vlan_desc && vlan_desc->notempty) {
  136. entry->vlan_desc = os_zalloc(sizeof(struct vlan_description));
  137. if (entry->vlan_desc)
  138. *entry->vlan_desc = *vlan_desc;
  139. } else {
  140. entry->vlan_desc = NULL;
  141. }
  142. entry->acct_multi_session_id = eapol->acct_multi_session_id;
  143. }
  144. void pmksa_cache_to_eapol_data(struct hostapd_data *hapd,
  145. struct rsn_pmksa_cache_entry *entry,
  146. struct eapol_state_machine *eapol)
  147. {
  148. if (entry == NULL || eapol == NULL)
  149. return;
  150. if (entry->identity) {
  151. os_free(eapol->identity);
  152. eapol->identity = os_malloc(entry->identity_len);
  153. if (eapol->identity) {
  154. eapol->identity_len = entry->identity_len;
  155. os_memcpy(eapol->identity, entry->identity,
  156. entry->identity_len);
  157. }
  158. wpa_hexdump_ascii(MSG_DEBUG, "STA identity from PMKSA",
  159. eapol->identity, eapol->identity_len);
  160. }
  161. if (entry->cui) {
  162. wpabuf_free(eapol->radius_cui);
  163. eapol->radius_cui = wpabuf_dup(entry->cui);
  164. }
  165. #ifndef CONFIG_NO_RADIUS
  166. radius_free_class(&eapol->radius_class);
  167. radius_copy_class(&eapol->radius_class, &entry->radius_class);
  168. #endif /* CONFIG_NO_RADIUS */
  169. if (eapol->radius_class.attr) {
  170. wpa_printf(MSG_DEBUG, "Copied %lu Class attribute(s) from "
  171. "PMKSA", (unsigned long) eapol->radius_class.count);
  172. }
  173. eapol->eap_type_authsrv = entry->eap_type_authsrv;
  174. #ifndef CONFIG_NO_VLAN
  175. ap_sta_set_vlan(hapd, eapol->sta, entry->vlan_desc);
  176. #endif /* CONFIG_NO_VLAN */
  177. eapol->acct_multi_session_id = entry->acct_multi_session_id;
  178. }
  179. static void pmksa_cache_link_entry(struct rsn_pmksa_cache *pmksa,
  180. struct rsn_pmksa_cache_entry *entry)
  181. {
  182. struct rsn_pmksa_cache_entry *pos, *prev;
  183. int hash;
  184. /* Add the new entry; order by expiration time */
  185. pos = pmksa->pmksa;
  186. prev = NULL;
  187. while (pos) {
  188. if (pos->expiration > entry->expiration)
  189. break;
  190. prev = pos;
  191. pos = pos->next;
  192. }
  193. if (prev == NULL) {
  194. entry->next = pmksa->pmksa;
  195. pmksa->pmksa = entry;
  196. } else {
  197. entry->next = prev->next;
  198. prev->next = entry;
  199. }
  200. hash = PMKID_HASH(entry->pmkid);
  201. entry->hnext = pmksa->pmkid[hash];
  202. pmksa->pmkid[hash] = entry;
  203. pmksa->pmksa_count++;
  204. if (prev == NULL)
  205. pmksa_cache_set_expiration(pmksa);
  206. wpa_printf(MSG_DEBUG, "RSN: added PMKSA cache entry for " MACSTR,
  207. MAC2STR(entry->spa));
  208. wpa_hexdump(MSG_DEBUG, "RSN: added PMKID", entry->pmkid, PMKID_LEN);
  209. }
  210. /**
  211. * pmksa_cache_auth_add - Add a PMKSA cache entry
  212. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  213. * @pmk: The new pairwise master key
  214. * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
  215. * @pmkid: Calculated PMKID
  216. * @kck: Key confirmation key or %NULL if not yet derived
  217. * @kck_len: KCK length in bytes
  218. * @aa: Authenticator address
  219. * @spa: Supplicant address
  220. * @session_timeout: Session timeout
  221. * @eapol: Pointer to EAPOL state machine data
  222. * @akmp: WPA_KEY_MGMT_* used in key derivation
  223. * Returns: Pointer to the added PMKSA cache entry or %NULL on error
  224. *
  225. * This function create a PMKSA entry for a new PMK and adds it to the PMKSA
  226. * cache. If an old entry is already in the cache for the same Supplicant,
  227. * this entry will be replaced with the new entry. PMKID will be calculated
  228. * based on the PMK.
  229. */
  230. struct rsn_pmksa_cache_entry *
  231. pmksa_cache_auth_add(struct rsn_pmksa_cache *pmksa,
  232. const u8 *pmk, size_t pmk_len, const u8 *pmkid,
  233. const u8 *kck, size_t kck_len,
  234. const u8 *aa, const u8 *spa, int session_timeout,
  235. struct eapol_state_machine *eapol, int akmp)
  236. {
  237. struct rsn_pmksa_cache_entry *entry;
  238. entry = pmksa_cache_auth_create_entry(pmk, pmk_len, pmkid, kck, kck_len,
  239. aa, spa, session_timeout, eapol,
  240. akmp);
  241. if (pmksa_cache_auth_add_entry(pmksa, entry) < 0)
  242. return NULL;
  243. return entry;
  244. }
  245. /**
  246. * pmksa_cache_auth_create_entry - Create a PMKSA cache entry
  247. * @pmk: The new pairwise master key
  248. * @pmk_len: PMK length in bytes, usually PMK_LEN (32)
  249. * @pmkid: Calculated PMKID
  250. * @kck: Key confirmation key or %NULL if not yet derived
  251. * @kck_len: KCK length in bytes
  252. * @aa: Authenticator address
  253. * @spa: Supplicant address
  254. * @session_timeout: Session timeout
  255. * @eapol: Pointer to EAPOL state machine data
  256. * @akmp: WPA_KEY_MGMT_* used in key derivation
  257. * Returns: Pointer to the added PMKSA cache entry or %NULL on error
  258. *
  259. * This function creates a PMKSA entry.
  260. */
  261. struct rsn_pmksa_cache_entry *
  262. pmksa_cache_auth_create_entry(const u8 *pmk, size_t pmk_len, const u8 *pmkid,
  263. const u8 *kck, size_t kck_len, const u8 *aa,
  264. const u8 *spa, int session_timeout,
  265. struct eapol_state_machine *eapol, int akmp)
  266. {
  267. struct rsn_pmksa_cache_entry *entry;
  268. struct os_reltime now;
  269. if (pmk_len > PMK_LEN_MAX)
  270. return NULL;
  271. if (wpa_key_mgmt_suite_b(akmp) && !kck)
  272. return NULL;
  273. entry = os_zalloc(sizeof(*entry));
  274. if (entry == NULL)
  275. return NULL;
  276. os_memcpy(entry->pmk, pmk, pmk_len);
  277. entry->pmk_len = pmk_len;
  278. if (pmkid)
  279. os_memcpy(entry->pmkid, pmkid, PMKID_LEN);
  280. else if (akmp == WPA_KEY_MGMT_IEEE8021X_SUITE_B_192)
  281. rsn_pmkid_suite_b_192(kck, kck_len, aa, spa, entry->pmkid);
  282. else if (wpa_key_mgmt_suite_b(akmp))
  283. rsn_pmkid_suite_b(kck, kck_len, aa, spa, entry->pmkid);
  284. else
  285. rsn_pmkid(pmk, pmk_len, aa, spa, entry->pmkid,
  286. wpa_key_mgmt_sha256(akmp));
  287. os_get_reltime(&now);
  288. entry->expiration = now.sec;
  289. if (session_timeout > 0)
  290. entry->expiration += session_timeout;
  291. else
  292. entry->expiration += dot11RSNAConfigPMKLifetime;
  293. entry->akmp = akmp;
  294. os_memcpy(entry->spa, spa, ETH_ALEN);
  295. pmksa_cache_from_eapol_data(entry, eapol);
  296. return entry;
  297. }
  298. /**
  299. * pmksa_cache_auth_add_entry - Add a PMKSA cache entry
  300. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  301. * @entry: Pointer to PMKSA cache entry
  302. *
  303. * This function adds PMKSA cache entry to the PMKSA cache. If an old entry is
  304. * already in the cache for the same Supplicant, this entry will be replaced
  305. * with the new entry. PMKID will be calculated based on the PMK.
  306. */
  307. int pmksa_cache_auth_add_entry(struct rsn_pmksa_cache *pmksa,
  308. struct rsn_pmksa_cache_entry *entry)
  309. {
  310. struct rsn_pmksa_cache_entry *pos;
  311. if (entry == NULL)
  312. return -1;
  313. /* Replace an old entry for the same STA (if found) with the new entry
  314. */
  315. pos = pmksa_cache_auth_get(pmksa, entry->spa, NULL);
  316. if (pos)
  317. pmksa_cache_free_entry(pmksa, pos);
  318. if (pmksa->pmksa_count >= pmksa_cache_max_entries && pmksa->pmksa) {
  319. /* Remove the oldest entry to make room for the new entry */
  320. wpa_printf(MSG_DEBUG, "RSN: removed the oldest PMKSA cache "
  321. "entry (for " MACSTR ") to make room for new one",
  322. MAC2STR(pmksa->pmksa->spa));
  323. pmksa_cache_free_entry(pmksa, pmksa->pmksa);
  324. }
  325. pmksa_cache_link_entry(pmksa, entry);
  326. return 0;
  327. }
  328. struct rsn_pmksa_cache_entry *
  329. pmksa_cache_add_okc(struct rsn_pmksa_cache *pmksa,
  330. const struct rsn_pmksa_cache_entry *old_entry,
  331. const u8 *aa, const u8 *pmkid)
  332. {
  333. struct rsn_pmksa_cache_entry *entry;
  334. entry = os_zalloc(sizeof(*entry));
  335. if (entry == NULL)
  336. return NULL;
  337. os_memcpy(entry->pmkid, pmkid, PMKID_LEN);
  338. os_memcpy(entry->pmk, old_entry->pmk, old_entry->pmk_len);
  339. entry->pmk_len = old_entry->pmk_len;
  340. entry->expiration = old_entry->expiration;
  341. entry->akmp = old_entry->akmp;
  342. os_memcpy(entry->spa, old_entry->spa, ETH_ALEN);
  343. entry->opportunistic = 1;
  344. if (old_entry->identity) {
  345. entry->identity = os_malloc(old_entry->identity_len);
  346. if (entry->identity) {
  347. entry->identity_len = old_entry->identity_len;
  348. os_memcpy(entry->identity, old_entry->identity,
  349. old_entry->identity_len);
  350. }
  351. }
  352. if (old_entry->cui)
  353. entry->cui = wpabuf_dup(old_entry->cui);
  354. #ifndef CONFIG_NO_RADIUS
  355. radius_copy_class(&entry->radius_class, &old_entry->radius_class);
  356. #endif /* CONFIG_NO_RADIUS */
  357. entry->eap_type_authsrv = old_entry->eap_type_authsrv;
  358. if (old_entry->vlan_desc) {
  359. entry->vlan_desc = os_zalloc(sizeof(struct vlan_description));
  360. if (entry->vlan_desc)
  361. *entry->vlan_desc = *old_entry->vlan_desc;
  362. } else {
  363. entry->vlan_desc = NULL;
  364. }
  365. entry->opportunistic = 1;
  366. pmksa_cache_link_entry(pmksa, entry);
  367. return entry;
  368. }
  369. /**
  370. * pmksa_cache_auth_deinit - Free all entries in PMKSA cache
  371. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  372. */
  373. void pmksa_cache_auth_deinit(struct rsn_pmksa_cache *pmksa)
  374. {
  375. struct rsn_pmksa_cache_entry *entry, *prev;
  376. int i;
  377. if (pmksa == NULL)
  378. return;
  379. entry = pmksa->pmksa;
  380. while (entry) {
  381. prev = entry;
  382. entry = entry->next;
  383. _pmksa_cache_free_entry(prev);
  384. }
  385. eloop_cancel_timeout(pmksa_cache_expire, pmksa, NULL);
  386. pmksa->pmksa_count = 0;
  387. pmksa->pmksa = NULL;
  388. for (i = 0; i < PMKID_HASH_SIZE; i++)
  389. pmksa->pmkid[i] = NULL;
  390. os_free(pmksa);
  391. }
  392. /**
  393. * pmksa_cache_auth_get - Fetch a PMKSA cache entry
  394. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  395. * @spa: Supplicant address or %NULL to match any
  396. * @pmkid: PMKID or %NULL to match any
  397. * Returns: Pointer to PMKSA cache entry or %NULL if no match was found
  398. */
  399. struct rsn_pmksa_cache_entry *
  400. pmksa_cache_auth_get(struct rsn_pmksa_cache *pmksa,
  401. const u8 *spa, const u8 *pmkid)
  402. {
  403. struct rsn_pmksa_cache_entry *entry;
  404. if (pmkid) {
  405. for (entry = pmksa->pmkid[PMKID_HASH(pmkid)]; entry;
  406. entry = entry->hnext) {
  407. if ((spa == NULL ||
  408. os_memcmp(entry->spa, spa, ETH_ALEN) == 0) &&
  409. os_memcmp(entry->pmkid, pmkid, PMKID_LEN) == 0)
  410. return entry;
  411. }
  412. } else {
  413. for (entry = pmksa->pmksa; entry; entry = entry->next) {
  414. if (spa == NULL ||
  415. os_memcmp(entry->spa, spa, ETH_ALEN) == 0)
  416. return entry;
  417. }
  418. }
  419. return NULL;
  420. }
  421. /**
  422. * pmksa_cache_get_okc - Fetch a PMKSA cache entry using OKC
  423. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  424. * @aa: Authenticator address
  425. * @spa: Supplicant address
  426. * @pmkid: PMKID
  427. * Returns: Pointer to PMKSA cache entry or %NULL if no match was found
  428. *
  429. * Use opportunistic key caching (OKC) to find a PMK for a supplicant.
  430. */
  431. struct rsn_pmksa_cache_entry * pmksa_cache_get_okc(
  432. struct rsn_pmksa_cache *pmksa, const u8 *aa, const u8 *spa,
  433. const u8 *pmkid)
  434. {
  435. struct rsn_pmksa_cache_entry *entry;
  436. u8 new_pmkid[PMKID_LEN];
  437. for (entry = pmksa->pmksa; entry; entry = entry->next) {
  438. if (os_memcmp(entry->spa, spa, ETH_ALEN) != 0)
  439. continue;
  440. rsn_pmkid(entry->pmk, entry->pmk_len, aa, spa, new_pmkid,
  441. wpa_key_mgmt_sha256(entry->akmp));
  442. if (os_memcmp(new_pmkid, pmkid, PMKID_LEN) == 0)
  443. return entry;
  444. }
  445. return NULL;
  446. }
  447. /**
  448. * pmksa_cache_auth_init - Initialize PMKSA cache
  449. * @free_cb: Callback function to be called when a PMKSA cache entry is freed
  450. * @ctx: Context pointer for free_cb function
  451. * Returns: Pointer to PMKSA cache data or %NULL on failure
  452. */
  453. struct rsn_pmksa_cache *
  454. pmksa_cache_auth_init(void (*free_cb)(struct rsn_pmksa_cache_entry *entry,
  455. void *ctx), void *ctx)
  456. {
  457. struct rsn_pmksa_cache *pmksa;
  458. pmksa = os_zalloc(sizeof(*pmksa));
  459. if (pmksa) {
  460. pmksa->free_cb = free_cb;
  461. pmksa->ctx = ctx;
  462. }
  463. return pmksa;
  464. }
  465. static int das_attr_match(struct rsn_pmksa_cache_entry *entry,
  466. struct radius_das_attrs *attr)
  467. {
  468. int match = 0;
  469. if (attr->sta_addr) {
  470. if (os_memcmp(attr->sta_addr, entry->spa, ETH_ALEN) != 0)
  471. return 0;
  472. match++;
  473. }
  474. if (attr->acct_multi_session_id) {
  475. char buf[20];
  476. if (attr->acct_multi_session_id_len != 16)
  477. return 0;
  478. os_snprintf(buf, sizeof(buf), "%016llX",
  479. (unsigned long long) entry->acct_multi_session_id);
  480. if (os_memcmp(attr->acct_multi_session_id, buf, 16) != 0)
  481. return 0;
  482. match++;
  483. }
  484. if (attr->cui) {
  485. if (!entry->cui ||
  486. attr->cui_len != wpabuf_len(entry->cui) ||
  487. os_memcmp(attr->cui, wpabuf_head(entry->cui),
  488. attr->cui_len) != 0)
  489. return 0;
  490. match++;
  491. }
  492. if (attr->user_name) {
  493. if (!entry->identity ||
  494. attr->user_name_len != entry->identity_len ||
  495. os_memcmp(attr->user_name, entry->identity,
  496. attr->user_name_len) != 0)
  497. return 0;
  498. match++;
  499. }
  500. return match;
  501. }
  502. int pmksa_cache_auth_radius_das_disconnect(struct rsn_pmksa_cache *pmksa,
  503. struct radius_das_attrs *attr)
  504. {
  505. int found = 0;
  506. struct rsn_pmksa_cache_entry *entry, *prev;
  507. if (attr->acct_session_id)
  508. return -1;
  509. entry = pmksa->pmksa;
  510. while (entry) {
  511. if (das_attr_match(entry, attr)) {
  512. found++;
  513. prev = entry;
  514. entry = entry->next;
  515. pmksa_cache_free_entry(pmksa, prev);
  516. continue;
  517. }
  518. entry = entry->next;
  519. }
  520. return found ? 0 : -1;
  521. }
  522. /**
  523. * pmksa_cache_auth_list - Dump text list of entries in PMKSA cache
  524. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  525. * @buf: Buffer for the list
  526. * @len: Length of the buffer
  527. * Returns: Number of bytes written to buffer
  528. *
  529. * This function is used to generate a text format representation of the
  530. * current PMKSA cache contents for the ctrl_iface PMKSA command.
  531. */
  532. int pmksa_cache_auth_list(struct rsn_pmksa_cache *pmksa, char *buf, size_t len)
  533. {
  534. int i, ret;
  535. char *pos = buf;
  536. struct rsn_pmksa_cache_entry *entry;
  537. struct os_reltime now;
  538. os_get_reltime(&now);
  539. ret = os_snprintf(pos, buf + len - pos,
  540. "Index / SPA / PMKID / expiration (in seconds) / opportunistic\n");
  541. if (os_snprintf_error(buf + len - pos, ret))
  542. return pos - buf;
  543. pos += ret;
  544. i = 0;
  545. entry = pmksa->pmksa;
  546. while (entry) {
  547. ret = os_snprintf(pos, buf + len - pos, "%d " MACSTR " ",
  548. i, MAC2STR(entry->spa));
  549. if (os_snprintf_error(buf + len - pos, ret))
  550. return pos - buf;
  551. pos += ret;
  552. pos += wpa_snprintf_hex(pos, buf + len - pos, entry->pmkid,
  553. PMKID_LEN);
  554. ret = os_snprintf(pos, buf + len - pos, " %d %d\n",
  555. (int) (entry->expiration - now.sec),
  556. entry->opportunistic);
  557. if (os_snprintf_error(buf + len - pos, ret))
  558. return pos - buf;
  559. pos += ret;
  560. entry = entry->next;
  561. }
  562. return pos - buf;
  563. }
  564. #ifdef CONFIG_PMKSA_CACHE_EXTERNAL
  565. #ifdef CONFIG_MESH
  566. /**
  567. * pmksa_cache_auth_list_mesh - Dump text list of entries in PMKSA cache
  568. * @pmksa: Pointer to PMKSA cache data from pmksa_cache_auth_init()
  569. * @addr: MAC address of the peer (NULL means any)
  570. * @buf: Buffer for the list
  571. * @len: Length of the buffer
  572. * Returns: Number of bytes written to buffer
  573. *
  574. * This function is used to generate a text format representation of the
  575. * current PMKSA cache contents for the ctrl_iface PMKSA_GET command to store
  576. * in external storage.
  577. */
  578. int pmksa_cache_auth_list_mesh(struct rsn_pmksa_cache *pmksa, const u8 *addr,
  579. char *buf, size_t len)
  580. {
  581. int ret;
  582. char *pos, *end;
  583. struct rsn_pmksa_cache_entry *entry;
  584. struct os_reltime now;
  585. pos = buf;
  586. end = buf + len;
  587. os_get_reltime(&now);
  588. /*
  589. * Entry format:
  590. * <BSSID> <PMKID> <PMK> <expiration in seconds>
  591. */
  592. for (entry = pmksa->pmksa; entry; entry = entry->next) {
  593. if (addr && os_memcmp(entry->spa, addr, ETH_ALEN) != 0)
  594. continue;
  595. ret = os_snprintf(pos, end - pos, MACSTR " ",
  596. MAC2STR(entry->spa));
  597. if (os_snprintf_error(end - pos, ret))
  598. return 0;
  599. pos += ret;
  600. pos += wpa_snprintf_hex(pos, end - pos, entry->pmkid,
  601. PMKID_LEN);
  602. ret = os_snprintf(pos, end - pos, " ");
  603. if (os_snprintf_error(end - pos, ret))
  604. return 0;
  605. pos += ret;
  606. pos += wpa_snprintf_hex(pos, end - pos, entry->pmk,
  607. entry->pmk_len);
  608. ret = os_snprintf(pos, end - pos, " %d\n",
  609. (int) (entry->expiration - now.sec));
  610. if (os_snprintf_error(end - pos, ret))
  611. return 0;
  612. pos += ret;
  613. }
  614. return pos - buf;
  615. }
  616. #endif /* CONFIG_MESH */
  617. #endif /* CONFIG_PMKSA_CACHE_EXTERNAL */