1c3aae25116e66c177579b0b79182b09340b19753Chris Lattner/*
2ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman * IEEE 802.1X-2004 Authenticator - EAPOL state machine
36fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * Copyright (c) 2002-2009, Jouni Malinen <j@w1.fi>
46fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell *
56fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * This software may be distributed under the terms of the BSD license.
66fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell * See README for more details.
7ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman */
86fbcc26f1460eaee4e0eb8b426fc1ff0c7af11beJohn Criswell
9ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman#ifndef EAPOL_AUTH_SM_H
10c3aae25116e66c177579b0b79182b09340b19753Chris Lattner#define EAPOL_AUTH_SM_H
11c3aae25116e66c177579b0b79182b09340b19753Chris Lattner
12ea61c358720aa6c7a159d51658b34276316aa841Misha Brukman#define EAPOL_SM_PREAUTH BIT(0)
13cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_WAIT_START BIT(1)
14cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_USES_WPA BIT(2)
15cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#define EAPOL_SM_FROM_PMKSA_CACHE BIT(3)
16cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner
17cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerstruct eapol_auth_config {
18c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int eap_reauth_period;
19b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner	int wpa;
20b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner	int individual_wep_key_len;
21cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner	int eap_server;
22109654fae9c5b8b96bd3a829824cdbceb27ced06Chris Lattner	void *ssl_ctx;
23eb19e40efbd3cae80c908a30cdf4d33450733c45Chris Lattner	void *msg_ctx;
24d0fde30ce850b78371fd1386338350591f9ff494Brian Gaeke	void *eap_sim_db_priv;
25d0fde30ce850b78371fd1386338350591f9ff494Brian Gaeke	char *eap_req_id_text; /* a copy of this will be allocated */
26c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	size_t eap_req_id_text_len;
27c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	u8 *pac_opaque_encr_key;
28b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey	u8 *eap_fast_a_id;
29c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	size_t eap_fast_a_id_len;
30c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	char *eap_fast_a_id_info;
31c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int eap_fast_prov;
32c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int pac_key_lifetime;
33c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int pac_key_refresh_time;
34c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int eap_sim_aka_result_ind;
35c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int tnc;
36c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	struct wps_context *wps;
37c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int fragment_size;
38c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	u16 pwd_group;
39c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	int pbc_in_m1;
40c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	const u8 *server_id;
41cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner	size_t server_id_len;
42cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner
43063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner	/* Opaque context pointer to owner data for callback functions */
44c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	void *ctx;
45b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey};
46cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner
47c3aae25116e66c177579b0b79182b09340b19753Chris Lattnerstruct eap_user;
48c3aae25116e66c177579b0b79182b09340b19753Chris Lattner
49cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnertypedef enum {
50b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner	EAPOL_LOGGER_DEBUG, EAPOL_LOGGER_INFO, EAPOL_LOGGER_WARNING
51b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner} eapol_logger_level;
52691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth
53691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharthenum eapol_event {
54691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth	EAPOL_AUTH_SM_CHANGE,
55691ef2ba066dda14ae4ac0ad645054fbc967785aAndrew Lenharth	EAPOL_AUTH_REAUTHENTICATE
56cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner};
57b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey
58b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskeystruct eapol_auth_cb {
59c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	void (*eapol_send)(void *ctx, void *sta_ctx, u8 type, const u8 *data,
60c3aae25116e66c177579b0b79182b09340b19753Chris Lattner			   size_t datalen);
61cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner	void (*aaa_send)(void *ctx, void *sta_ctx, const u8 *data,
62cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner			 size_t datalen);
63c3aae25116e66c177579b0b79182b09340b19753Chris Lattner	void (*finished)(void *ctx, void *sta_ctx, int success, int preauth,
64063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner			 int remediation);
65063287a76b5d1486f498fcf674a26d1155471a3fChris Lattner	int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
66b2efb853f00d45b1c8d57f92acd0028fbdeffda6Jim Laskey			    int phase2, struct eap_user *user);
67cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner	int (*sta_entry_alive)(void *ctx, const u8 *addr);
681080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner	void (*logger)(void *ctx, const u8 *addr, eapol_logger_level level,
691080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner		       const char *txt);
701080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner	void (*set_port_authorized)(void *ctx, void *sta_ctx, int authorized);
711080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner	void (*abort_auth)(void *ctx, void *sta_ctx);
721080b9ee534579c67f7c99364cc6fa11edbcd919Chris Lattner	void (*tx_key)(void *ctx, void *sta_ctx);
73b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner	void (*eapol_event)(void *ctx, void *sta_ctx, enum eapol_event type);
74b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner};
75b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner
76b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner
77b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattnerstruct eapol_authenticator * eapol_auth_init(struct eapol_auth_config *conf,
78b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattner					     struct eapol_auth_cb *cb);
79b80e2be8894db9f843f32ebaffb9b7fd6b57d206Chris Lattnervoid eapol_auth_deinit(struct eapol_authenticator *eapol);
80c3aae25116e66c177579b0b79182b09340b19753Chris Lattnerstruct eapol_state_machine *
81cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnereapol_auth_alloc(struct eapol_authenticator *eapol, const u8 *addr,
82c3aae25116e66c177579b0b79182b09340b19753Chris Lattner		 int flags, const struct wpabuf *assoc_wps_ie,
83cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner		 const struct wpabuf *assoc_p2p_ie, void *sta_ctx,
84c3aae25116e66c177579b0b79182b09340b19753Chris Lattner		 const char *identity, const char *radius_cui);
85c3aae25116e66c177579b0b79182b09340b19753Chris Lattnervoid eapol_auth_free(struct eapol_state_machine *sm);
86c3aae25116e66c177579b0b79182b09340b19753Chris Lattnervoid eapol_auth_step(struct eapol_state_machine *sm);
87cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerint eapol_auth_dump_state(struct eapol_state_machine *sm, char *buf,
88c3aae25116e66c177579b0b79182b09340b19753Chris Lattner			  size_t buflen);
89cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattnerint eapol_auth_eap_pending_cb(struct eapol_state_machine *sm, void *ctx);
90c3aae25116e66c177579b0b79182b09340b19753Chris Lattner
91cacf462915344c2af25eef1af1f3ee2c7280ff56Chris Lattner#endif /* EAPOL_AUTH_SM_H */
921d4d41411190dd9e62764e56713753d4155764ddNate Begeman