eap_vendor_test.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. /*
  2. * EAP peer method: Test method for vendor specific (expanded) EAP type
  3. * Copyright (c) 2005-2015, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. *
  8. * This file implements a vendor specific test method using EAP expanded types.
  9. * This is only for test use and must not be used for authentication since no
  10. * security is provided.
  11. */
  12. #include "includes.h"
  13. #include "common.h"
  14. #include "eap_i.h"
  15. #include "eloop.h"
  16. #define EAP_VENDOR_ID EAP_VENDOR_HOSTAP
  17. #define EAP_VENDOR_TYPE 0xfcfbfaf9
  18. struct eap_vendor_test_data {
  19. enum { INIT, CONFIRM, SUCCESS } state;
  20. int first_try;
  21. int test_pending_req;
  22. };
  23. static void * eap_vendor_test_init(struct eap_sm *sm)
  24. {
  25. struct eap_vendor_test_data *data;
  26. const u8 *password;
  27. size_t password_len;
  28. data = os_zalloc(sizeof(*data));
  29. if (data == NULL)
  30. return NULL;
  31. data->state = INIT;
  32. data->first_try = 1;
  33. password = eap_get_config_password(sm, &password_len);
  34. data->test_pending_req = password && password_len == 7 &&
  35. os_memcmp(password, "pending", 7) == 0;
  36. return data;
  37. }
  38. static void eap_vendor_test_deinit(struct eap_sm *sm, void *priv)
  39. {
  40. struct eap_vendor_test_data *data = priv;
  41. os_free(data);
  42. }
  43. static void eap_vendor_ready(void *eloop_ctx, void *timeout_ctx)
  44. {
  45. struct eap_sm *sm = eloop_ctx;
  46. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
  47. "request");
  48. eap_notify_pending(sm);
  49. }
  50. static struct wpabuf * eap_vendor_test_process(struct eap_sm *sm, void *priv,
  51. struct eap_method_ret *ret,
  52. const struct wpabuf *reqData)
  53. {
  54. struct eap_vendor_test_data *data = priv;
  55. struct wpabuf *resp;
  56. const u8 *pos;
  57. size_t len;
  58. pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
  59. if (pos == NULL || len < 1) {
  60. ret->ignore = TRUE;
  61. return NULL;
  62. }
  63. if (data->state == INIT && *pos != 1) {
  64. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
  65. "%d in INIT state", *pos);
  66. ret->ignore = TRUE;
  67. return NULL;
  68. }
  69. if (data->state == CONFIRM && *pos != 3) {
  70. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
  71. "%d in CONFIRM state", *pos);
  72. ret->ignore = TRUE;
  73. return NULL;
  74. }
  75. if (data->state == SUCCESS) {
  76. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
  77. "in SUCCESS state");
  78. ret->ignore = TRUE;
  79. return NULL;
  80. }
  81. if (data->state == CONFIRM) {
  82. if (data->test_pending_req && data->first_try) {
  83. data->first_try = 0;
  84. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
  85. "pending request");
  86. ret->ignore = TRUE;
  87. eloop_register_timeout(1, 0, eap_vendor_ready, sm,
  88. NULL);
  89. return NULL;
  90. }
  91. }
  92. ret->ignore = FALSE;
  93. wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
  94. ret->allowNotifications = TRUE;
  95. resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
  96. EAP_CODE_RESPONSE, eap_get_id(reqData));
  97. if (resp == NULL)
  98. return NULL;
  99. if (data->state == INIT) {
  100. wpabuf_put_u8(resp, 2);
  101. data->state = CONFIRM;
  102. ret->methodState = METHOD_CONT;
  103. ret->decision = DECISION_FAIL;
  104. } else {
  105. wpabuf_put_u8(resp, 4);
  106. data->state = SUCCESS;
  107. ret->methodState = METHOD_DONE;
  108. ret->decision = DECISION_UNCOND_SUCC;
  109. }
  110. return resp;
  111. }
  112. static Boolean eap_vendor_test_isKeyAvailable(struct eap_sm *sm, void *priv)
  113. {
  114. struct eap_vendor_test_data *data = priv;
  115. return data->state == SUCCESS;
  116. }
  117. static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len)
  118. {
  119. struct eap_vendor_test_data *data = priv;
  120. u8 *key;
  121. const int key_len = 64;
  122. if (data->state != SUCCESS)
  123. return NULL;
  124. key = os_malloc(key_len);
  125. if (key == NULL)
  126. return NULL;
  127. os_memset(key, 0x11, key_len / 2);
  128. os_memset(key + key_len / 2, 0x22, key_len / 2);
  129. *len = key_len;
  130. return key;
  131. }
  132. int eap_peer_vendor_test_register(void)
  133. {
  134. struct eap_method *eap;
  135. int ret;
  136. eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
  137. EAP_VENDOR_ID, EAP_VENDOR_TYPE,
  138. "VENDOR-TEST");
  139. if (eap == NULL)
  140. return -1;
  141. eap->init = eap_vendor_test_init;
  142. eap->deinit = eap_vendor_test_deinit;
  143. eap->process = eap_vendor_test_process;
  144. eap->isKeyAvailable = eap_vendor_test_isKeyAvailable;
  145. eap->getKey = eap_vendor_test_getKey;
  146. ret = eap_peer_method_register(eap);
  147. if (ret)
  148. eap_peer_method_free(eap);
  149. return ret;
  150. }