Fix small HTTP processing issues
[wpasupplicant] / hostapd / ieee802_1x.c
index 2e291f1..a1545c7 100644 (file)
 #include "wpa.h"
 #include "preauth.h"
 #include "pmksa_cache.h"
-#include "driver.h"
+#include "driver_i.h"
 #include "hw_features.h"
 #include "eap_server/eap.h"
+#include "ieee802_11_defs.h"
 
 
 static void ieee802_1x_finished(struct hostapd_data *hapd,
@@ -105,19 +106,6 @@ void ieee802_1x_set_sta_authorized(struct hostapd_data *hapd,
 }
 
 
-static void ieee802_1x_eap_timeout(void *eloop_ctx, void *timeout_ctx)
-{
-       struct sta_info *sta = eloop_ctx;
-       struct eapol_state_machine *sm = sta->eapol_sm;
-       if (sm == NULL)
-               return;
-       hostapd_logger(sm->hapd, sta->addr, HOSTAPD_MODULE_IEEE8021X,
-                      HOSTAPD_LEVEL_DEBUG, "EAP timeout");
-       sm->eap_if->eapTimeout = TRUE;
-       eapol_auth_step(sm);
-}
-
-
 static void ieee802_1x_tx_key_one(struct hostapd_data *hapd,
                                  struct sta_info *sta,
                                  int idx, int broadcast,
@@ -197,6 +185,7 @@ static void ieee802_1x_tx_key_one(struct hostapd_data *hapd,
 }
 
 
+#ifndef CONFIG_NO_VLAN
 static struct hostapd_wep_keys *
 ieee802_1x_group_alloc(struct hostapd_data *hapd, const char *ifname)
 {
@@ -231,8 +220,8 @@ ieee802_1x_group_alloc(struct hostapd_data *hapd, const char *ifname)
        wpa_hexdump_key(MSG_DEBUG, "Default WEP key (dynamic VLAN)",
                        key->key[key->idx], key->len[key->idx]);
 
-       if (hostapd_set_encryption(ifname, hapd, "WEP", NULL, key->idx,
-                                  key->key[key->idx], key->len[key->idx], 1))
+       if (hostapd_set_key(ifname, hapd, WPA_ALG_WEP, NULL, key->idx, 1,
+                           NULL, 0, key->key[key->idx], key->len[key->idx]))
                printf("Could not set dynamic VLAN WEP encryption key.\n");
 
        hostapd_set_ieee8021x(ifname, hapd, 1);
@@ -291,13 +280,16 @@ ieee802_1x_get_group(struct hostapd_data *hapd, struct hostapd_ssid *ssid,
 
        return ssid->dyn_vlan_keys[vlan_id];
 }
+#endif /* CONFIG_NO_VLAN */
 
 
 void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
 {
-       struct hostapd_wep_keys *key = NULL;
        struct eapol_state_machine *sm = sta->eapol_sm;
+#ifndef CONFIG_NO_VLAN
+       struct hostapd_wep_keys *key = NULL;
        int vlan_id;
+#endif /* CONFIG_NO_VLAN */
 
        if (sm == NULL || !sm->eap_if->eapKeyData)
                return;
@@ -305,6 +297,7 @@ void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
        wpa_printf(MSG_DEBUG, "IEEE 802.1X: Sending EAPOL-Key(s) to " MACSTR,
                   MAC2STR(sta->addr));
 
+#ifndef CONFIG_NO_VLAN
        vlan_id = sta->vlan_id;
        if (vlan_id < 0 || vlan_id > MAX_VLAN_ID)
                vlan_id = 0;
@@ -315,7 +308,9 @@ void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
                        ieee802_1x_tx_key_one(hapd, sta, key->idx, 1,
                                              key->key[key->idx],
                                              key->len[key->idx]);
-       } else if (hapd->default_wep_key) {
+       } else
+#endif /* CONFIG_NO_VLAN */
+       if (hapd->default_wep_key) {
                ieee802_1x_tx_key_one(hapd, sta, hapd->default_wep_key_idx, 1,
                                      hapd->default_wep_key,
                                      hapd->conf->default_wep_key_len);
@@ -340,10 +335,9 @@ void ieee802_1x_tx_key(struct hostapd_data *hapd, struct sta_info *sta)
 
                /* TODO: set encryption in TX callback, i.e., only after STA
                 * has ACKed EAPOL-Key frame */
-               if (hostapd_set_encryption(hapd->conf->iface, hapd, "WEP",
-                                          sta->addr, 0, ikey,
-                                          hapd->conf->individual_wep_key_len,
-                                          1)) {
+               if (hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_WEP,
+                                   sta->addr, 0, 1, NULL, 0, ikey,
+                                   hapd->conf->individual_wep_key_len)) {
                        wpa_printf(MSG_ERROR, "Could not set individual WEP "
                                   "encryption.");
                }
@@ -383,6 +377,7 @@ int radius_sta_rate(struct hostapd_data *hapd, struct sta_info *sta)
 }
 
 
+#ifndef CONFIG_NO_RADIUS
 static void ieee802_1x_learn_identity(struct hostapd_data *hapd,
                                      struct eapol_state_machine *sm,
                                      const u8 *eap, size_t len)
@@ -553,6 +548,7 @@ static void ieee802_1x_encapsulate_radius(struct hostapd_data *hapd,
        radius_msg_free(msg);
        os_free(msg);
 }
+#endif /* CONFIG_NO_RADIUS */
 
 
 char *eap_type_text(u8 type)
@@ -594,7 +590,6 @@ static void handle_eap_response(struct hostapd_data *hapd,
        }
 
        sm->eap_type_supp = type = data[0];
-       eloop_cancel_timeout(ieee802_1x_eap_timeout, sta, NULL);
 
        hostapd_logger(hapd, sm->addr, HOSTAPD_MODULE_IEEE8021X,
                       HOSTAPD_LEVEL_DEBUG, "received EAP packet (code=%d "
@@ -660,7 +655,15 @@ static void handle_eap(struct hostapd_data *hapd, struct sta_info *sta,
 }
 
 
-/* Process the EAPOL frames from the Supplicant */
+/**
+ * ieee802_1x_receive - Process the EAPOL frames from the Supplicant
+ * @hapd: hostapd BSS data
+ * @sa: Source address (sender of the EAPOL frame)
+ * @buf: EAPOL frame
+ * @len: Length of buf in octets
+ *
+ * This function is called for each incoming EAPOL frame from the interface
+ */
 void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
                        size_t len)
 {
@@ -670,14 +673,16 @@ void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
        u16 datalen;
        struct rsn_pmksa_cache_entry *pmksa;
 
-       if (!hapd->conf->ieee802_1x && !hapd->conf->wpa)
+       if (!hapd->conf->ieee802_1x && !hapd->conf->wpa &&
+           !hapd->conf->wps_state)
                return;
 
        wpa_printf(MSG_DEBUG, "IEEE 802.1X: %lu bytes from " MACSTR,
                   (unsigned long) len, MAC2STR(sa));
        sta = ap_get_sta(hapd, sa);
-       if (!sta) {
-               printf("   no station information available\n");
+       if (!sta || !(sta->flags & WLAN_STA_ASSOC)) {
+               wpa_printf(MSG_DEBUG, "IEEE 802.1X data frame from not "
+                          "associated STA");
                return;
        }
 
@@ -718,7 +723,8 @@ void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
                return;
        }
 
-       if (!hapd->conf->ieee802_1x ||
+       if ((!hapd->conf->ieee802_1x &&
+            !(sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS))) ||
            wpa_key_mgmt_wpa_psk(wpa_auth_sta_key_mgmt(sta->wpa_sm)))
                return;
 
@@ -728,6 +734,20 @@ void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
                                                 sta);
                if (!sta->eapol_sm)
                        return;
+
+#ifdef CONFIG_WPS
+               if (!hapd->conf->ieee802_1x &&
+                   ((sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS)) ==
+                    WLAN_STA_MAYBE_WPS)) {
+                       /*
+                        * Delay EAPOL frame transmission until a possible WPS
+                        * STA initiates the handshake with EAPOL-Start.
+                        */
+                       sta->eapol_sm->flags |= EAPOL_SM_WAIT_START;
+               }
+#endif /* CONFIG_WPS */
+
+               sta->eapol_sm->eap_if->portEnabled = TRUE;
        }
 
        /* since we support version 1, we can ignore version field and proceed
@@ -766,6 +786,7 @@ void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
                               "from STA");
                sta->acct_terminate_cause =
                        RADIUS_ACCT_TERMINATE_CAUSE_USER_REQUEST;
+               accounting_sta_stop(hapd, sta);
                sta->eapol_sm->eapolLogoff = TRUE;
                sta->eapol_sm->dot1xAuthEapolLogoffFramesRx++;
                break;
@@ -794,12 +815,32 @@ void ieee802_1x_receive(struct hostapd_data *hapd, const u8 *sa, const u8 *buf,
 }
 
 
+/**
+ * ieee802_1x_new_station - Start IEEE 802.1X authentication
+ * @hapd: hostapd BSS data
+ * @sta: The station
+ *
+ * This function is called to start IEEE 802.1X authentication when a new
+ * station completes IEEE 802.11 association.
+ */
 void ieee802_1x_new_station(struct hostapd_data *hapd, struct sta_info *sta)
 {
        struct rsn_pmksa_cache_entry *pmksa;
        int reassoc = 1;
        int force_1x = 0;
 
+#ifdef CONFIG_WPS
+       if (hapd->conf->wps_state && hapd->conf->wpa &&
+           (sta->flags & (WLAN_STA_WPS | WLAN_STA_MAYBE_WPS))) {
+               /*
+                * Need to enable IEEE 802.1X/EAPOL state machines for possible
+                * WPS handshake even if IEEE 802.1X/EAPOL is not used for
+                * authentication in this BSS.
+                */
+               force_1x = 1;
+       }
+#endif /* CONFIG_WPS */
+
        if ((!force_1x && !hapd->conf->ieee802_1x) ||
            wpa_key_mgmt_wpa_psk(wpa_auth_sta_key_mgmt(sta->wpa_sm)))
                return;
@@ -820,6 +861,17 @@ void ieee802_1x_new_station(struct hostapd_data *hapd, struct sta_info *sta)
                reassoc = 0;
        }
 
+#ifdef CONFIG_WPS
+       sta->eapol_sm->flags &= ~EAPOL_SM_WAIT_START;
+       if (!hapd->conf->ieee802_1x && !(sta->flags & WLAN_STA_WPS)) {
+               /*
+                * Delay EAPOL frame transmission until a possible WPS
+                * initiates the handshake with EAPOL-Start.
+                */
+               sta->eapol_sm->flags |= EAPOL_SM_WAIT_START;
+       }
+#endif /* CONFIG_WPS */
+
        sta->eapol_sm->eap_if->portEnabled = TRUE;
 
        pmksa = wpa_auth_sta_get_pmksa(sta->wpa_sm);
@@ -857,69 +909,29 @@ void ieee802_1x_new_station(struct hostapd_data *hapd, struct sta_info *sta)
 }
 
 
-void ieee802_1x_free_radius_class(struct radius_class_data *class)
-{
-       size_t i;
-       if (class == NULL)
-               return;
-       for (i = 0; i < class->count; i++)
-               os_free(class->attr[i].data);
-       os_free(class->attr);
-       class->attr = NULL;
-       class->count = 0;
-}
-
-
-int ieee802_1x_copy_radius_class(struct radius_class_data *dst,
-                                const struct radius_class_data *src)
-{
-       size_t i;
-
-       if (src->attr == NULL)
-               return 0;
-
-       dst->attr = os_zalloc(src->count * sizeof(struct radius_attr_data));
-       if (dst->attr == NULL)
-               return -1;
-
-       dst->count = 0;
-
-       for (i = 0; i < src->count; i++) {
-               dst->attr[i].data = os_malloc(src->attr[i].len);
-               if (dst->attr[i].data == NULL)
-                       break;
-               dst->count++;
-               os_memcpy(dst->attr[i].data, src->attr[i].data,
-                         src->attr[i].len);
-               dst->attr[i].len = src->attr[i].len;
-       }
-
-       return 0;
-}
-
-
 void ieee802_1x_free_station(struct sta_info *sta)
 {
        struct eapol_state_machine *sm = sta->eapol_sm;
 
-       eloop_cancel_timeout(ieee802_1x_eap_timeout, sta, NULL);
-
        if (sm == NULL)
                return;
 
        sta->eapol_sm = NULL;
 
+#ifndef CONFIG_NO_RADIUS
        if (sm->last_recv_radius) {
                radius_msg_free(sm->last_recv_radius);
                os_free(sm->last_recv_radius);
        }
+       radius_free_class(&sm->radius_class);
+#endif /* CONFIG_NO_RADIUS */
 
        os_free(sm->identity);
-       ieee802_1x_free_radius_class(&sm->radius_class);
        eapol_auth_free(sm);
 }
 
 
+#ifndef CONFIG_NO_RADIUS
 static void ieee802_1x_decapsulate_radius(struct hostapd_data *hapd,
                                          struct sta_info *sta)
 {
@@ -1003,7 +1015,8 @@ static void ieee802_1x_decapsulate_radius(struct hostapd_data *hapd,
 static void ieee802_1x_get_keys(struct hostapd_data *hapd,
                                struct sta_info *sta, struct radius_msg *msg,
                                struct radius_msg *req,
-                               u8 *shared_secret, size_t shared_secret_len)
+                               const u8 *shared_secret,
+                               size_t shared_secret_len)
 {
        struct radius_ms_mppe_keys *keys;
        struct eapol_state_machine *sm = sta->eapol_sm;
@@ -1055,7 +1068,7 @@ static void ieee802_1x_store_radius_class(struct hostapd_data *hapd,
            sm == NULL)
                return;
 
-       ieee802_1x_free_radius_class(&sm->radius_class);
+       radius_free_class(&sm->radius_class);
        count = radius_msg_count_attr(msg, RADIUS_ATTR_CLASS, 1);
        if (count <= 0)
                return;
@@ -1163,17 +1176,24 @@ ieee802_1x_search_radius_identifier(struct hostapd_data *hapd, u8 identifier)
 }
 
 
-/* Process the RADIUS frames from Authentication Server */
+/**
+ * ieee802_1x_receive_auth - Process RADIUS frames from Authentication Server
+ * @msg: RADIUS response message
+ * @req: RADIUS request message
+ * @shared_secret: RADIUS shared secret
+ * @shared_secret_len: Length of shared_secret in octets
+ * @data: Context data (struct hostapd_data *)
+ * Returns: Processing status
+ */
 static RadiusRxResult
 ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
-                       u8 *shared_secret, size_t shared_secret_len,
+                       const u8 *shared_secret, size_t shared_secret_len,
                        void *data)
 {
        struct hostapd_data *hapd = data;
        struct sta_info *sta;
        u32 session_timeout = 0, termination_action, acct_interim_interval;
        int session_timeout_set, old_vlanid = 0;
-       int eap_timeout;
        struct eapol_state_machine *sm;
        int override_eapReq = 0;
 
@@ -1246,6 +1266,7 @@ ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
        case RADIUS_CODE_ACCESS_ACCEPT:
                if (sta->ssid->dynamic_vlan == DYNAMIC_VLAN_DISABLED)
                        sta->vlan_id = 0;
+#ifndef CONFIG_NO_VLAN
                else {
                        old_vlanid = sta->vlan_id;
                        sta->vlan_id = radius_msg_get_vlanid(msg);
@@ -1266,6 +1287,7 @@ ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
                                       "ID in Access-Accept");
                        break;
                }
+#endif /* CONFIG_NO_VLAN */
 
                ap_sta_bind_vlan(hapd, sta, old_vlanid);
 
@@ -1299,18 +1321,20 @@ ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
                sm->eap_if->aaaEapReq = TRUE;
                if (session_timeout_set) {
                        /* RFC 2869, Ch. 2.3.2; RFC 3580, Ch. 3.17 */
-                       eap_timeout = session_timeout;
-               } else
-                       eap_timeout = 30;
-               hostapd_logger(hapd, sm->addr, HOSTAPD_MODULE_IEEE8021X,
-                              HOSTAPD_LEVEL_DEBUG,
-                              "using EAP timeout of %d seconds%s",
-                              eap_timeout,
-                              session_timeout_set ? " (from RADIUS)" : "");
-               eloop_cancel_timeout(ieee802_1x_eap_timeout, sta, NULL);
-               eloop_register_timeout(eap_timeout, 0, ieee802_1x_eap_timeout,
-                                      sta, NULL);
-               sm->eap_if->eapTimeout = FALSE;
+                       sm->eap_if->aaaMethodTimeout = session_timeout;
+                       hostapd_logger(hapd, sm->addr,
+                                      HOSTAPD_MODULE_IEEE8021X,
+                                      HOSTAPD_LEVEL_DEBUG,
+                                      "using EAP timeout of %d seconds (from "
+                                      "RADIUS)",
+                                      sm->eap_if->aaaMethodTimeout);
+               } else {
+                       /*
+                        * Use dynamic retransmission behavior per EAP
+                        * specification.
+                        */
+                       sm->eap_if->aaaMethodTimeout = 0;
+               }
                break;
        }
 
@@ -1322,6 +1346,7 @@ ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req,
 
        return RADIUS_RX_QUEUED;
 }
+#endif /* CONFIG_NO_RADIUS */
 
 
 void ieee802_1x_abort_auth(struct hostapd_data *hapd, struct sta_info *sta)
@@ -1333,11 +1358,29 @@ void ieee802_1x_abort_auth(struct hostapd_data *hapd, struct sta_info *sta)
        hostapd_logger(hapd, sta->addr, HOSTAPD_MODULE_IEEE8021X,
                       HOSTAPD_LEVEL_DEBUG, "aborting authentication");
 
+#ifndef CONFIG_NO_RADIUS
        if (sm->last_recv_radius) {
                radius_msg_free(sm->last_recv_radius);
                os_free(sm->last_recv_radius);
                sm->last_recv_radius = NULL;
        }
+#endif /* CONFIG_NO_RADIUS */
+
+       if (sm->eap_if->eapTimeout) {
+               /*
+                * Disconnect the STA since it did not reply to the last EAP
+                * request and we cannot continue EAP processing (EAP-Failure
+                * could only be sent if the EAP peer actually replied).
+                */
+               sm->eap_if->portEnabled = FALSE;
+               hostapd_sta_deauth(hapd, sta->addr,
+                                  WLAN_REASON_PREV_AUTH_NOT_VALID);
+               sta->flags &= ~(WLAN_STA_AUTH | WLAN_STA_ASSOC |
+                               WLAN_STA_AUTHORIZED);
+               eloop_cancel_timeout(ap_handle_timer, hapd, sta);
+               eloop_register_timeout(0, 0, ap_handle_timer, hapd, sta);
+               sta->timeout_next = STA_REMOVE;
+       }
 }
 
 
@@ -1439,10 +1482,10 @@ static void ieee802_1x_rekey(void *eloop_ctx, void *timeout_ctx)
 
        /* TODO: Could setup key for RX here, but change default TX keyid only
         * after new broadcast key has been sent to all stations. */
-       if (hostapd_set_encryption(hapd->conf->iface, hapd, "WEP", NULL,
-                                  hapd->default_wep_key_idx,
-                                  hapd->default_wep_key,
-                                  hapd->conf->default_wep_key_len, 1)) {
+       if (hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_WEP, NULL,
+                           hapd->default_wep_key_idx, 1, NULL, 0,
+                           hapd->default_wep_key,
+                           hapd->conf->default_wep_key_len)) {
                hostapd_logger(hapd, NULL, HOSTAPD_MODULE_IEEE8021X,
                               HOSTAPD_LEVEL_WARNING, "failed to configure a "
                               "new broadcast key");
@@ -1470,10 +1513,12 @@ static void ieee802_1x_eapol_send(void *ctx, void *sta_ctx, u8 type,
 static void ieee802_1x_aaa_send(void *ctx, void *sta_ctx,
                                const u8 *data, size_t datalen)
 {
+#ifndef CONFIG_NO_RADIUS
        struct hostapd_data *hapd = ctx;
        struct sta_info *sta = sta_ctx;
 
        ieee802_1x_encapsulate_radius(hapd, sta, data, datalen);
+#endif /* CONFIG_NO_RADIUS */
 }
 
 
@@ -1541,6 +1586,7 @@ static int ieee802_1x_sta_entry_alive(void *ctx, const u8 *addr)
 static void ieee802_1x_logger(void *ctx, const u8 *addr,
                              eapol_logger_level level, const char *txt)
 {
+#ifndef CONFIG_NO_HOSTAPD_LOGGER
        struct hostapd_data *hapd = ctx;
        int hlevel;
 
@@ -1559,6 +1605,7 @@ static void ieee802_1x_logger(void *ctx, const u8 *addr,
 
        hostapd_logger(hapd, addr, HOSTAPD_MODULE_IEEE8021X, hlevel, "%s",
                       txt);
+#endif /* CONFIG_NO_HOSTAPD_LOGGER */
 }
 
 
@@ -1605,9 +1652,14 @@ int ieee802_1x_init(struct hostapd_data *hapd)
        conf.eap_req_id_text_len = hapd->conf->eap_req_id_text_len;
        conf.pac_opaque_encr_key = hapd->conf->pac_opaque_encr_key;
        conf.eap_fast_a_id = hapd->conf->eap_fast_a_id;
+       conf.eap_fast_a_id_len = hapd->conf->eap_fast_a_id_len;
+       conf.eap_fast_a_id_info = hapd->conf->eap_fast_a_id_info;
        conf.eap_fast_prov = hapd->conf->eap_fast_prov;
+       conf.pac_key_lifetime = hapd->conf->pac_key_lifetime;
+       conf.pac_key_refresh_time = hapd->conf->pac_key_refresh_time;
        conf.eap_sim_aka_result_ind = hapd->conf->eap_sim_aka_result_ind;
        conf.tnc = hapd->conf->tnc;
+       conf.wps = hapd->wps;
 
        os_memset(&cb, 0, sizeof(cb));
        cb.eapol_send = ieee802_1x_eapol_send;
@@ -1628,16 +1680,18 @@ int ieee802_1x_init(struct hostapd_data *hapd)
            hostapd_set_ieee8021x(hapd->conf->iface, hapd, 1))
                return -1;
 
+#ifndef CONFIG_NO_RADIUS
        if (radius_client_register(hapd->radius, RADIUS_AUTH,
                                   ieee802_1x_receive_auth, hapd))
                return -1;
+#endif /* CONFIG_NO_RADIUS */
 
        if (hapd->conf->default_wep_key_len) {
                hostapd_set_privacy(hapd, 1);
 
                for (i = 0; i < 4; i++)
-                       hostapd_set_encryption(hapd->conf->iface, hapd,
-                                              "none", NULL, i, NULL, 0, 0);
+                       hostapd_set_key(hapd->conf->iface, hapd, WPA_ALG_NONE,
+                                       NULL, i, 0, NULL, 0, NULL, 0);
 
                ieee802_1x_rekey(hapd, NULL);
 
@@ -1672,7 +1726,7 @@ int ieee802_1x_reconfig(struct hostapd_data *hapd,
 
 
 int ieee802_1x_tx_status(struct hostapd_data *hapd, struct sta_info *sta,
-                        u8 *buf, size_t len, int ack)
+                        const u8 *buf, size_t len, int ack)
 {
        struct ieee80211_hdr *hdr;
        struct ieee802_1x_hdr *xhdr;