1c3aae25116e66c177579b0b79182b09340b19753Chris Lattner/* 2ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman * IEEE 802.1X-2004 Authenticator - EAPOL state machine 36fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi> 46fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * 56fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * This software may be distributed under the terms of the BSD license. 66fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * See README for more details. 7ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman */ 86fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell 9ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman#ifndef EAPOL_AUTH_SM_H 10c3aae25116e66c177579b0b79182b09340b19753Chris Lattner#define EAPOL_AUTH_SM_H 11c3aae25116e66c177579b0b79182b09340b19753Chris Lattner 12ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman#define EAPOL_SM_PREAUTH BIT(0) 13cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_WAIT_START BIT(1) 14cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_USES_WPA BIT(2) 15cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_FROM_PMKSA_CACHE BIT(3) 16cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner 17cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerstruct eapol_auth_config { 18c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int eap_reauth_period; 19b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner int wpa; 20b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner int individual_wep_key_len; 21cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner int eap_server; 22109654fae9c5b8b96bd3a829824cdbceb27ced06Chris Lattner void *ssl_ctx; 23eb19e40efbd3cae80c908a30cdf4d33450733c45Chris Lattner void *msg_ctx; 24d0fde30ce850b78371fd1386338350591f9ff494Brian Gaeke void *eap_sim_db_priv; 25d0fde30ce850b78371fd1386338350591f9ff494Brian Gaeke char *eap_req_id_text; /* a copy of this will be allocated */ 26c3aae25116e66c177579b0b79182b09340b19753Chris Lattner size_t eap_req_id_text_len; 27c3aae25116e66c177579b0b79182b09340b19753Chris Lattner u8 *pac_opaque_encr_key; 28b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey u8 *eap_fast_a_id; 29c3aae25116e66c177579b0b79182b09340b19753Chris Lattner size_t eap_fast_a_id_len; 30c3aae25116e66c177579b0b79182b09340b19753Chris Lattner char *eap_fast_a_id_info; 31c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int eap_fast_prov; 32c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int pac_key_lifetime; 33c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int pac_key_refresh_time; 34c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int eap_sim_aka_result_ind; 35c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int tnc; 36c3aae25116e66c177579b0b79182b09340b19753Chris Lattner struct wps_context *wps; 37c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int fragment_size; 38c3aae25116e66c177579b0b79182b09340b19753Chris Lattner u16 pwd_group; 39c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int pbc_in_m1; 40c3aae25116e66c177579b0b79182b09340b19753Chris Lattner const u8 *server_id; 41cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner size_t server_id_len; 42cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner 43063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner /* Opaque context pointer to owner data for callback functions */ 44c3aae25116e66c177579b0b79182b09340b19753Chris Lattner void *ctx; 45b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey}; 46cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner 47c3aae25116e66c177579b0b79182b09340b19753Chris Lattnerstruct eap_user; 48c3aae25116e66c177579b0b79182b09340b19753Chris Lattner 49cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnertypedef enum { 50b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner EAPOL_LOGGER_DEBUG, EAPOL_LOGGER_INFO, EAPOL_LOGGER_WARNING 51b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner} eapol_logger_level; 52691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth 53691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharthenum eapol_event { 54691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth EAPOL_AUTH_SM_CHANGE, 55691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth EAPOL_AUTH_REAUTHENTICATE 56cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner}; 57b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey 58b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskeystruct eapol_auth_cb { 59c3aae25116e66c177579b0b79182b09340b19753Chris Lattner void (*eapol_send)(void *ctx, void *sta_ctx, u8 type, const u8 *data, 60c3aae25116e66c177579b0b79182b09340b19753Chris Lattner size_t datalen); 61cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner void (*aaa_send)(void *ctx, void *sta_ctx, const u8 *data, 62cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner size_t datalen); 63c3aae25116e66c177579b0b79182b09340b19753Chris Lattner void (*finished)(void *ctx, void *sta_ctx, int success, int preauth, 64063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner int remediation); 65063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len, 66b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey int phase2, struct eap_user *user); 67cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner int (*sta_entry_alive)(void *ctx, const u8 *addr); 681080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner void (*logger)(void *ctx, const u8 *addr, eapol_logger_level level, 691080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner const char *txt); 701080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized); 711080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner void (*abort_auth)(void *ctx, void *sta_ctx); 721080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner void (*tx_key)(void *ctx, void *sta_ctx); 73b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner void (*eapol_event)(void *ctx, void *sta_ctx, enum eapol_event type); 74b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner}; 75b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner 76b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner 77b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattnerstruct eapol_authenticator * eapol_auth_init(struct eapol_auth_config *conf, 78b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner struct eapol_auth_cb *cb); 79b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattnervoid eapol_auth_deinit(struct eapol_authenticator *eapol); 80c3aae25116e66c177579b0b79182b09340b19753Chris Lattnerstruct eapol_state_machine * 81cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnereapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr, 82c3aae25116e66c177579b0b79182b09340b19753Chris Lattner int flags, const struct wpabuf *assoc_wps_ie, 83cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner const struct wpabuf *assoc_p2p_ie, void *sta_ctx, 84c3aae25116e66c177579b0b79182b09340b19753Chris Lattner const char *identity, const char *radius_cui); 85c3aae25116e66c177579b0b79182b09340b19753Chris Lattnervoid eapol_auth_free(struct eapol_state_machine *sm); 86c3aae25116e66c177579b0b79182b09340b19753Chris Lattnervoid eapol_auth_step(struct eapol_state_machine *sm); 87cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerint eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf, 88c3aae25116e66c177579b0b79182b09340b19753Chris Lattner size_t buflen); 89cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerint eapol_auth_eap_pending_cb(struct eapol_state_machine *sm, void *ctx); 90c3aae25116e66c177579b0b79182b09340b19753Chris Lattner 91cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#endif /* EAPOL_AUTH_SM_H */ 921d4d41411190dd9e62764e56713753d4155764ddNate Begeman