18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/* 28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * hostapd / EAP Full Authenticator state machine (RFC 4137) 38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2004-2007, Jouni Malinen <j@w1.fi> 48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license. 6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details. 78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#ifndef EAP_H 108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define EAP_H 118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common/defs.h" 138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "eap_common/eap_defs.h" 148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "eap_server/eap_methods.h" 158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "wpabuf.h" 168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_sm; 188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define EAP_TTLS_AUTH_PAP 1 208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define EAP_TTLS_AUTH_CHAP 2 218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define EAP_TTLS_AUTH_MSCHAP 4 228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#define EAP_TTLS_AUTH_MSCHAPV2 8 238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_user { 258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct { 268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int vendor; 278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u32 method; 288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } methods[EAP_MAX_METHODS]; 298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *password; 308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t password_len; 318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int password_hash; /* whether password is hashed with 328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * nt_password_hash() */ 338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int phase2; 348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int force_version; 358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int ttls_auth; /* bitfield of 368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * EAP_TTLS_AUTH_{PAP,CHAP,MSCHAP,MSCHAPV2} */ 378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_eapol_interface { 408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* Lower layer to full authenticator variables */ 418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapResp; /* shared with EAPOL Backend Authentication */ 428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *eapRespData; 438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean portEnabled; 448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int retransWhile; 458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapRestart; /* shared with EAPOL Authenticator PAE */ 468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int eapSRTT; 478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int eapRTTVAR; 488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* Full authenticator to lower layer variables */ 508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapReq; /* shared with EAPOL Backend Authentication */ 518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapNoReq; /* shared with EAPOL Backend Authentication */ 528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapSuccess; 538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapFail; 548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapTimeout; 558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *eapReqData; 568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *eapKeyData; 578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t eapKeyDataLen; 588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean eapKeyAvailable; /* called keyAvailable in IEEE 802.1X-2004 */ 598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* AAA interface to full authenticator variables */ 618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaEapReq; 628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaEapNoReq; 638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaSuccess; 648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaFail; 658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *aaaEapReqData; 668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *aaaEapKeyData; 678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t aaaEapKeyDataLen; 688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaEapKeyAvailable; 698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int aaaMethodTimeout; 708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* Full authenticator to AAA interface variables */ 728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaEapResp; 738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *aaaEapRespData; 748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* aaaIdentity -> eap_get_identity() */ 758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean aaaTimeout; 768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eapol_callbacks { 798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int phase2, struct eap_user *user); 818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const char * (*get_eap_req_id_text)(void *ctx, size_t *len); 828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_config { 858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt void *ssl_ctx; 868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt void *msg_ctx; 878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt void *eap_sim_db_priv; 888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt Boolean backend_auth; 898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int eap_server; 908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u16 pwd_group; 918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *pac_opaque_encr_key; 928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *eap_fast_a_id; 938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t eap_fast_a_id_len; 948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt char *eap_fast_a_id_info; 958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int eap_fast_prov; 968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int pac_key_lifetime; 978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int pac_key_refresh_time; 988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int eap_sim_aka_result_ind; 998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int tnc; 1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wps_context *wps; 1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct wpabuf *assoc_wps_ie; 1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct wpabuf *assoc_p2p_ie; 1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *peer_addr; 1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int fragment_size; 10587fd279308af3f806848c8f2ab65ef18c6ac4c30Jouni Malinen 10687fd279308af3f806848c8f2ab65ef18c6ac4c30Jouni Malinen int pbc_in_m1; 1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_sm * eap_server_sm_init(void *eapol_ctx, 1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eapol_callbacks *eapol_cb, 1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_config *eap_conf); 1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid eap_server_sm_deinit(struct eap_sm *sm); 1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint eap_server_sm_step(struct eap_sm *sm); 1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid eap_sm_notify_cached(struct eap_sm *sm); 1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid eap_sm_pending_cb(struct eap_sm *sm); 1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint eap_sm_method_pending(struct eap_sm *sm); 1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtconst u8 * eap_get_identity(struct eap_sm *sm, size_t *len); 1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_eapol_interface * eap_get_interface(struct eap_sm *sm); 1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtvoid eap_server_clear_identity(struct eap_sm *sm); 1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#endif /* EAP_H */ 123