eap_server_wsc.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501
  1. /*
  2. * EAP-WSC server for Wi-Fi Protected Setup
  3. * Copyright (c) 2007-2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "eloop.h"
  17. #include "eap_i.h"
  18. #include "eap_common/eap_wsc_common.h"
  19. #include "wps/wps.h"
  20. struct eap_wsc_data {
  21. enum { START, MSG, FRAG_ACK, WAIT_FRAG_ACK, DONE, FAIL } state;
  22. int registrar;
  23. struct wpabuf *in_buf;
  24. struct wpabuf *out_buf;
  25. enum wsc_op_code in_op_code, out_op_code;
  26. size_t out_used;
  27. size_t fragment_size;
  28. struct wps_data *wps;
  29. int ext_reg_timeout;
  30. };
  31. static const char * eap_wsc_state_txt(int state)
  32. {
  33. switch (state) {
  34. case START:
  35. return "START";
  36. case MSG:
  37. return "MSG";
  38. case FRAG_ACK:
  39. return "FRAG_ACK";
  40. case WAIT_FRAG_ACK:
  41. return "WAIT_FRAG_ACK";
  42. case DONE:
  43. return "DONE";
  44. case FAIL:
  45. return "FAIL";
  46. default:
  47. return "?";
  48. }
  49. }
  50. static void eap_wsc_state(struct eap_wsc_data *data, int state)
  51. {
  52. wpa_printf(MSG_DEBUG, "EAP-WSC: %s -> %s",
  53. eap_wsc_state_txt(data->state),
  54. eap_wsc_state_txt(state));
  55. data->state = state;
  56. }
  57. static void eap_wsc_ext_reg_timeout(void *eloop_ctx, void *timeout_ctx)
  58. {
  59. struct eap_sm *sm = eloop_ctx;
  60. struct eap_wsc_data *data = timeout_ctx;
  61. if (sm->method_pending != METHOD_PENDING_WAIT)
  62. return;
  63. wpa_printf(MSG_DEBUG, "EAP-WSC: Timeout while waiting for an External "
  64. "Registrar");
  65. data->ext_reg_timeout = 1;
  66. eap_sm_pending_cb(sm);
  67. }
  68. static void * eap_wsc_init(struct eap_sm *sm)
  69. {
  70. struct eap_wsc_data *data;
  71. int registrar;
  72. struct wps_config cfg;
  73. if (sm->identity && sm->identity_len == WSC_ID_REGISTRAR_LEN &&
  74. os_memcmp(sm->identity, WSC_ID_REGISTRAR, WSC_ID_REGISTRAR_LEN) ==
  75. 0)
  76. registrar = 0; /* Supplicant is Registrar */
  77. else if (sm->identity && sm->identity_len == WSC_ID_ENROLLEE_LEN &&
  78. os_memcmp(sm->identity, WSC_ID_ENROLLEE, WSC_ID_ENROLLEE_LEN)
  79. == 0)
  80. registrar = 1; /* Supplicant is Enrollee */
  81. else {
  82. wpa_hexdump_ascii(MSG_INFO, "EAP-WSC: Unexpected identity",
  83. sm->identity, sm->identity_len);
  84. return NULL;
  85. }
  86. data = os_zalloc(sizeof(*data));
  87. if (data == NULL)
  88. return NULL;
  89. data->state = registrar ? START : MSG;
  90. data->registrar = registrar;
  91. os_memset(&cfg, 0, sizeof(cfg));
  92. cfg.wps = sm->wps;
  93. cfg.registrar = registrar;
  94. if (registrar) {
  95. if (sm->wps == NULL || sm->wps->registrar == NULL) {
  96. wpa_printf(MSG_INFO, "EAP-WSC: WPS Registrar not "
  97. "initialized");
  98. os_free(data);
  99. return NULL;
  100. }
  101. } else {
  102. if (sm->user == NULL || sm->user->password == NULL) {
  103. wpa_printf(MSG_INFO, "EAP-WSC: No AP PIN (password) "
  104. "configured for Enrollee functionality");
  105. os_free(data);
  106. return NULL;
  107. }
  108. cfg.pin = sm->user->password;
  109. cfg.pin_len = sm->user->password_len;
  110. }
  111. cfg.assoc_wps_ie = sm->assoc_wps_ie;
  112. cfg.peer_addr = sm->peer_addr;
  113. if (0 /* TODO: could provide option for forcing PSK format */)
  114. cfg.use_psk_key = 1;
  115. data->wps = wps_init(&cfg);
  116. if (data->wps == NULL) {
  117. os_free(data);
  118. return NULL;
  119. }
  120. data->fragment_size = WSC_FRAGMENT_SIZE;
  121. return data;
  122. }
  123. static void eap_wsc_reset(struct eap_sm *sm, void *priv)
  124. {
  125. struct eap_wsc_data *data = priv;
  126. eloop_cancel_timeout(eap_wsc_ext_reg_timeout, sm, data);
  127. wpabuf_free(data->in_buf);
  128. wpabuf_free(data->out_buf);
  129. wps_deinit(data->wps);
  130. os_free(data);
  131. }
  132. static struct wpabuf * eap_wsc_build_start(struct eap_sm *sm,
  133. struct eap_wsc_data *data, u8 id)
  134. {
  135. struct wpabuf *req;
  136. req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, 2,
  137. EAP_CODE_REQUEST, id);
  138. if (req == NULL) {
  139. wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
  140. "request");
  141. return NULL;
  142. }
  143. wpa_printf(MSG_DEBUG, "EAP-WSC: Send WSC/Start");
  144. wpabuf_put_u8(req, WSC_Start); /* Op-Code */
  145. wpabuf_put_u8(req, 0); /* Flags */
  146. return req;
  147. }
  148. static struct wpabuf * eap_wsc_build_msg(struct eap_wsc_data *data, u8 id)
  149. {
  150. struct wpabuf *req;
  151. u8 flags;
  152. size_t send_len, plen;
  153. flags = 0;
  154. send_len = wpabuf_len(data->out_buf) - data->out_used;
  155. if (2 + send_len > data->fragment_size) {
  156. send_len = data->fragment_size - 2;
  157. flags |= WSC_FLAGS_MF;
  158. if (data->out_used == 0) {
  159. flags |= WSC_FLAGS_LF;
  160. send_len -= 2;
  161. }
  162. }
  163. plen = 2 + send_len;
  164. if (flags & WSC_FLAGS_LF)
  165. plen += 2;
  166. req = eap_msg_alloc(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC, plen,
  167. EAP_CODE_REQUEST, id);
  168. if (req == NULL) {
  169. wpa_printf(MSG_ERROR, "EAP-WSC: Failed to allocate memory for "
  170. "request");
  171. return NULL;
  172. }
  173. wpabuf_put_u8(req, data->out_op_code); /* Op-Code */
  174. wpabuf_put_u8(req, flags); /* Flags */
  175. if (flags & WSC_FLAGS_LF)
  176. wpabuf_put_be16(req, wpabuf_len(data->out_buf));
  177. wpabuf_put_data(req, wpabuf_head_u8(data->out_buf) + data->out_used,
  178. send_len);
  179. data->out_used += send_len;
  180. if (data->out_used == wpabuf_len(data->out_buf)) {
  181. wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
  182. "(message sent completely)",
  183. (unsigned long) send_len);
  184. wpabuf_free(data->out_buf);
  185. data->out_buf = NULL;
  186. data->out_used = 0;
  187. eap_wsc_state(data, MSG);
  188. } else {
  189. wpa_printf(MSG_DEBUG, "EAP-WSC: Sending out %lu bytes "
  190. "(%lu more to send)", (unsigned long) send_len,
  191. (unsigned long) wpabuf_len(data->out_buf) -
  192. data->out_used);
  193. eap_wsc_state(data, WAIT_FRAG_ACK);
  194. }
  195. return req;
  196. }
  197. static struct wpabuf * eap_wsc_buildReq(struct eap_sm *sm, void *priv, u8 id)
  198. {
  199. struct eap_wsc_data *data = priv;
  200. switch (data->state) {
  201. case START:
  202. return eap_wsc_build_start(sm, data, id);
  203. case MSG:
  204. if (data->out_buf == NULL) {
  205. data->out_buf = wps_get_msg(data->wps,
  206. &data->out_op_code);
  207. if (data->out_buf == NULL) {
  208. wpa_printf(MSG_DEBUG, "EAP-WSC: Failed to "
  209. "receive message from WPS");
  210. return NULL;
  211. }
  212. data->out_used = 0;
  213. }
  214. /* pass through */
  215. case WAIT_FRAG_ACK:
  216. return eap_wsc_build_msg(data, id);
  217. case FRAG_ACK:
  218. return eap_wsc_build_frag_ack(id, EAP_CODE_REQUEST);
  219. default:
  220. wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected state %d in "
  221. "buildReq", data->state);
  222. return NULL;
  223. }
  224. }
  225. static Boolean eap_wsc_check(struct eap_sm *sm, void *priv,
  226. struct wpabuf *respData)
  227. {
  228. const u8 *pos;
  229. size_t len;
  230. pos = eap_hdr_validate(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC,
  231. respData, &len);
  232. if (pos == NULL || len < 2) {
  233. wpa_printf(MSG_INFO, "EAP-WSC: Invalid frame");
  234. return TRUE;
  235. }
  236. return FALSE;
  237. }
  238. static int eap_wsc_process_cont(struct eap_wsc_data *data,
  239. const u8 *buf, size_t len, u8 op_code)
  240. {
  241. /* Process continuation of a pending message */
  242. if (op_code != data->in_op_code) {
  243. wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d in "
  244. "fragment (expected %d)",
  245. op_code, data->in_op_code);
  246. eap_wsc_state(data, FAIL);
  247. return -1;
  248. }
  249. if (len > wpabuf_tailroom(data->in_buf)) {
  250. wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment overflow");
  251. eap_wsc_state(data, FAIL);
  252. return -1;
  253. }
  254. wpabuf_put_data(data->in_buf, buf, len);
  255. wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes, waiting for %lu "
  256. "bytes more", (unsigned long) len,
  257. (unsigned long) wpabuf_tailroom(data->in_buf));
  258. return 0;
  259. }
  260. static int eap_wsc_process_fragment(struct eap_wsc_data *data,
  261. u8 flags, u8 op_code, u16 message_length,
  262. const u8 *buf, size_t len)
  263. {
  264. /* Process a fragment that is not the last one of the message */
  265. if (data->in_buf == NULL && !(flags & WSC_FLAGS_LF)) {
  266. wpa_printf(MSG_DEBUG, "EAP-WSC: No Message Length "
  267. "field in a fragmented packet");
  268. return -1;
  269. }
  270. if (data->in_buf == NULL) {
  271. /* First fragment of the message */
  272. data->in_buf = wpabuf_alloc(message_length);
  273. if (data->in_buf == NULL) {
  274. wpa_printf(MSG_DEBUG, "EAP-WSC: No memory for "
  275. "message");
  276. return -1;
  277. }
  278. data->in_op_code = op_code;
  279. wpabuf_put_data(data->in_buf, buf, len);
  280. wpa_printf(MSG_DEBUG, "EAP-WSC: Received %lu bytes in "
  281. "first fragment, waiting for %lu bytes more",
  282. (unsigned long) len,
  283. (unsigned long) wpabuf_tailroom(data->in_buf));
  284. }
  285. return 0;
  286. }
  287. static void eap_wsc_process(struct eap_sm *sm, void *priv,
  288. struct wpabuf *respData)
  289. {
  290. struct eap_wsc_data *data = priv;
  291. const u8 *start, *pos, *end;
  292. size_t len;
  293. u8 op_code, flags;
  294. u16 message_length = 0;
  295. enum wps_process_res res;
  296. struct wpabuf tmpbuf;
  297. eloop_cancel_timeout(eap_wsc_ext_reg_timeout, sm, data);
  298. if (data->ext_reg_timeout) {
  299. eap_wsc_state(data, FAIL);
  300. return;
  301. }
  302. pos = eap_hdr_validate(EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC,
  303. respData, &len);
  304. if (pos == NULL || len < 2)
  305. return; /* Should not happen; message already verified */
  306. start = pos;
  307. end = start + len;
  308. op_code = *pos++;
  309. flags = *pos++;
  310. if (flags & WSC_FLAGS_LF) {
  311. if (end - pos < 2) {
  312. wpa_printf(MSG_DEBUG, "EAP-WSC: Message underflow");
  313. return;
  314. }
  315. message_length = WPA_GET_BE16(pos);
  316. pos += 2;
  317. if (message_length < end - pos) {
  318. wpa_printf(MSG_DEBUG, "EAP-WSC: Invalid Message "
  319. "Length");
  320. return;
  321. }
  322. }
  323. wpa_printf(MSG_DEBUG, "EAP-WSC: Received packet: Op-Code %d "
  324. "Flags 0x%x Message Length %d",
  325. op_code, flags, message_length);
  326. if (data->state == WAIT_FRAG_ACK) {
  327. if (op_code != WSC_FRAG_ACK) {
  328. wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d "
  329. "in WAIT_FRAG_ACK state", op_code);
  330. eap_wsc_state(data, FAIL);
  331. return;
  332. }
  333. wpa_printf(MSG_DEBUG, "EAP-WSC: Fragment acknowledged");
  334. eap_wsc_state(data, MSG);
  335. return;
  336. }
  337. if (op_code != WSC_ACK && op_code != WSC_NACK && op_code != WSC_MSG &&
  338. op_code != WSC_Done) {
  339. wpa_printf(MSG_DEBUG, "EAP-WSC: Unexpected Op-Code %d",
  340. op_code);
  341. eap_wsc_state(data, FAIL);
  342. return;
  343. }
  344. if (data->in_buf &&
  345. eap_wsc_process_cont(data, pos, end - pos, op_code) < 0) {
  346. eap_wsc_state(data, FAIL);
  347. return;
  348. }
  349. if (flags & WSC_FLAGS_MF) {
  350. if (eap_wsc_process_fragment(data, flags, op_code,
  351. message_length, pos, end - pos) <
  352. 0)
  353. eap_wsc_state(data, FAIL);
  354. else
  355. eap_wsc_state(data, FRAG_ACK);
  356. return;
  357. }
  358. if (data->in_buf == NULL) {
  359. /* Wrap unfragmented messages as wpabuf without extra copy */
  360. wpabuf_set(&tmpbuf, pos, end - pos);
  361. data->in_buf = &tmpbuf;
  362. }
  363. res = wps_process_msg(data->wps, op_code, data->in_buf);
  364. switch (res) {
  365. case WPS_DONE:
  366. wpa_printf(MSG_DEBUG, "EAP-WSC: WPS processing completed "
  367. "successfully - report EAP failure");
  368. eap_wsc_state(data, FAIL);
  369. break;
  370. case WPS_CONTINUE:
  371. eap_wsc_state(data, MSG);
  372. break;
  373. case WPS_FAILURE:
  374. wpa_printf(MSG_DEBUG, "EAP-WSC: WPS processing failed");
  375. eap_wsc_state(data, FAIL);
  376. break;
  377. case WPS_PENDING:
  378. eap_wsc_state(data, MSG);
  379. sm->method_pending = METHOD_PENDING_WAIT;
  380. eloop_cancel_timeout(eap_wsc_ext_reg_timeout, sm, data);
  381. eloop_register_timeout(5, 0, eap_wsc_ext_reg_timeout,
  382. sm, data);
  383. break;
  384. }
  385. if (data->in_buf != &tmpbuf)
  386. wpabuf_free(data->in_buf);
  387. data->in_buf = NULL;
  388. }
  389. static Boolean eap_wsc_isDone(struct eap_sm *sm, void *priv)
  390. {
  391. struct eap_wsc_data *data = priv;
  392. return data->state == FAIL;
  393. }
  394. static Boolean eap_wsc_isSuccess(struct eap_sm *sm, void *priv)
  395. {
  396. /* EAP-WSC will always result in EAP-Failure */
  397. return FALSE;
  398. }
  399. static int eap_wsc_getTimeout(struct eap_sm *sm, void *priv)
  400. {
  401. /* Recommended retransmit times: retransmit timeout 5 seconds,
  402. * per-message timeout 15 seconds, i.e., 3 tries. */
  403. sm->MaxRetrans = 2; /* total 3 attempts */
  404. return 5;
  405. }
  406. int eap_server_wsc_register(void)
  407. {
  408. struct eap_method *eap;
  409. int ret;
  410. eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
  411. EAP_VENDOR_WFA, EAP_VENDOR_TYPE_WSC,
  412. "WSC");
  413. if (eap == NULL)
  414. return -1;
  415. eap->init = eap_wsc_init;
  416. eap->reset = eap_wsc_reset;
  417. eap->buildReq = eap_wsc_buildReq;
  418. eap->check = eap_wsc_check;
  419. eap->process = eap_wsc_process;
  420. eap->isDone = eap_wsc_isDone;
  421. eap->isSuccess = eap_wsc_isSuccess;
  422. eap->getTimeout = eap_wsc_getTimeout;
  423. ret = eap_server_method_register(eap);
  424. if (ret)
  425. eap_server_method_free(eap);
  426. return ret;
  427. }