blob: b130368b64da292f6245052a0a60091813c4ac8b [file] [log] [blame]
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07001/*
2 * hostapd / EAP Full Authenticator state machine (RFC 4137)
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -08003 * Copyright (c) 2004-2014, Jouni Malinen <j@w1.fi>
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07004 *
Dmitry Shmidtc5ec7f52012-03-06 16:33:24 -08005 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -07007 */
8
9#ifndef EAP_H
10#define EAP_H
11
12#include "common/defs.h"
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -080013#include "utils/list.h"
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070014#include "eap_common/eap_defs.h"
15#include "eap_server/eap_methods.h"
16#include "wpabuf.h"
17
18struct eap_sm;
19
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070020#define EAP_TTLS_AUTH_PAP 1
21#define EAP_TTLS_AUTH_CHAP 2
22#define EAP_TTLS_AUTH_MSCHAP 4
23#define EAP_TTLS_AUTH_MSCHAPV2 8
24
25struct eap_user {
26 struct {
27 int vendor;
28 u32 method;
29 } methods[EAP_MAX_METHODS];
30 u8 *password;
31 size_t password_len;
32 int password_hash; /* whether password is hashed with
33 * nt_password_hash() */
Roshan Pius3a1667e2018-07-03 15:17:14 -070034 u8 *salt;
35 size_t salt_len;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070036 int phase2;
37 int force_version;
Dmitry Shmidtf21452a2014-02-26 10:55:25 -080038 unsigned int remediation:1;
Dmitry Shmidtdf5a7e42014-04-02 12:59:59 -070039 unsigned int macacl:1;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070040 int ttls_auth; /* bitfield of
41 * EAP_TTLS_AUTH_{PAP,CHAP,MSCHAP,MSCHAPV2} */
Dmitry Shmidt818ea482014-03-10 13:15:21 -070042 struct hostapd_radius_attr *accept_attr;
Roshan Pius3a1667e2018-07-03 15:17:14 -070043 u32 t_c_timestamp;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070044};
45
46struct eap_eapol_interface {
47 /* Lower layer to full authenticator variables */
48 Boolean eapResp; /* shared with EAPOL Backend Authentication */
49 struct wpabuf *eapRespData;
50 Boolean portEnabled;
51 int retransWhile;
52 Boolean eapRestart; /* shared with EAPOL Authenticator PAE */
53 int eapSRTT;
54 int eapRTTVAR;
55
56 /* Full authenticator to lower layer variables */
57 Boolean eapReq; /* shared with EAPOL Backend Authentication */
58 Boolean eapNoReq; /* shared with EAPOL Backend Authentication */
59 Boolean eapSuccess;
60 Boolean eapFail;
61 Boolean eapTimeout;
62 struct wpabuf *eapReqData;
63 u8 *eapKeyData;
64 size_t eapKeyDataLen;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -080065 u8 *eapSessionId;
66 size_t eapSessionIdLen;
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070067 Boolean eapKeyAvailable; /* called keyAvailable in IEEE 802.1X-2004 */
68
69 /* AAA interface to full authenticator variables */
70 Boolean aaaEapReq;
71 Boolean aaaEapNoReq;
72 Boolean aaaSuccess;
73 Boolean aaaFail;
74 struct wpabuf *aaaEapReqData;
75 u8 *aaaEapKeyData;
76 size_t aaaEapKeyDataLen;
77 Boolean aaaEapKeyAvailable;
78 int aaaMethodTimeout;
79
80 /* Full authenticator to AAA interface variables */
81 Boolean aaaEapResp;
82 struct wpabuf *aaaEapRespData;
83 /* aaaIdentity -> eap_get_identity() */
84 Boolean aaaTimeout;
85};
86
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -080087struct eap_server_erp_key {
88 struct dl_list list;
89 size_t rRK_len;
90 size_t rIK_len;
91 u8 rRK[ERP_MAX_KEY_LEN];
92 u8 rIK[ERP_MAX_KEY_LEN];
93 u32 recv_seq;
94 u8 cryptosuite;
95 char keyname_nai[];
96};
97
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -070098struct eapol_callbacks {
99 int (*get_eap_user)(void *ctx, const u8 *identity, size_t identity_len,
100 int phase2, struct eap_user *user);
101 const char * (*get_eap_req_id_text)(void *ctx, size_t *len);
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700102 void (*log_msg)(void *ctx, const char *msg);
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800103 int (*get_erp_send_reauth_start)(void *ctx);
104 const char * (*get_erp_domain)(void *ctx);
105 struct eap_server_erp_key * (*erp_get_key)(void *ctx,
106 const char *keyname);
107 int (*erp_add_key)(void *ctx, struct eap_server_erp_key *erp);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700108};
109
110struct eap_config {
111 void *ssl_ctx;
112 void *msg_ctx;
113 void *eap_sim_db_priv;
114 Boolean backend_auth;
115 int eap_server;
116 u16 pwd_group;
117 u8 *pac_opaque_encr_key;
118 u8 *eap_fast_a_id;
119 size_t eap_fast_a_id_len;
120 char *eap_fast_a_id_info;
121 int eap_fast_prov;
122 int pac_key_lifetime;
123 int pac_key_refresh_time;
124 int eap_sim_aka_result_ind;
125 int tnc;
126 struct wps_context *wps;
127 const struct wpabuf *assoc_wps_ie;
128 const struct wpabuf *assoc_p2p_ie;
129 const u8 *peer_addr;
130 int fragment_size;
Jouni Malinen87fd2792011-05-16 18:35:42 +0300131
132 int pbc_in_m1;
Dmitry Shmidt34af3062013-07-11 10:46:32 -0700133
134 const u8 *server_id;
135 size_t server_id_len;
Dmitry Shmidt6c0da2b2015-01-05 13:08:17 -0800136 int erp;
Dmitry Shmidtd80a4012015-11-05 16:35:40 -0800137 unsigned int tls_session_lifetime;
Dmitry Shmidtd2986c22017-10-23 14:22:09 -0700138 unsigned int tls_flags;
Dmitry Shmidt818ea482014-03-10 13:15:21 -0700139
140#ifdef CONFIG_TESTING_OPTIONS
141 u32 tls_test_flags;
142#endif /* CONFIG_TESTING_OPTIONS */
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700143};
144
145
146struct eap_sm * eap_server_sm_init(void *eapol_ctx,
Dmitry Shmidt1d755d02015-04-28 10:34:29 -0700147 const struct eapol_callbacks *eapol_cb,
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700148 struct eap_config *eap_conf);
149void eap_server_sm_deinit(struct eap_sm *sm);
150int eap_server_sm_step(struct eap_sm *sm);
151void eap_sm_notify_cached(struct eap_sm *sm);
152void eap_sm_pending_cb(struct eap_sm *sm);
153int eap_sm_method_pending(struct eap_sm *sm);
154const u8 * eap_get_identity(struct eap_sm *sm, size_t *len);
Hai Shalom39ba6fc2019-01-22 12:40:38 -0800155const char * eap_get_serial_num(struct eap_sm *sm);
Hai Shalom74f70d42019-02-11 14:42:39 -0800156const char * eap_get_method(struct eap_sm *sm);
157const char * eap_get_imsi(struct eap_sm *sm);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700158struct eap_eapol_interface * eap_get_interface(struct eap_sm *sm);
159void eap_server_clear_identity(struct eap_sm *sm);
Dmitry Shmidtaf9da312015-04-03 10:03:11 -0700160void eap_server_mschap_rx_callback(struct eap_sm *sm, const char *source,
161 const u8 *username, size_t username_len,
162 const u8 *challenge, const u8 *response);
Dmitry Shmidt9839ecd2016-11-07 11:05:47 -0800163void eap_erp_update_identity(struct eap_sm *sm, const u8 *eap, size_t len);
Hai Shalom021b0b52019-04-10 11:17:58 -0700164void eap_user_free(struct eap_user *user);
Dmitry Shmidt8d520ff2011-05-09 14:06:53 -0700165
166#endif /* EAP_H */