tncc.c revision 281806
1189251Ssam/*
2189251Ssam * EAP-TNC - TNCC (IF-IMC and IF-TNCCS)
3189251Ssam * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
4189251Ssam *
5252726Srpaulo * This software may be distributed under the terms of the BSD license.
6252726Srpaulo * See README for more details.
7189251Ssam */
8189251Ssam
9189251Ssam#include "includes.h"
10189251Ssam#ifndef CONFIG_NATIVE_WINDOWS
11189251Ssam#include <dlfcn.h>
12189251Ssam#endif /* CONFIG_NATIVE_WINDOWS */
13189251Ssam
14189251Ssam#include "common.h"
15189251Ssam#include "base64.h"
16281806Srpaulo#include "common/tnc.h"
17189251Ssam#include "tncc.h"
18189251Ssam#include "eap_common/eap_tlv_common.h"
19189251Ssam#include "eap_common/eap_defs.h"
20189251Ssam
21189251Ssam
22189251Ssam#ifdef UNICODE
23189251Ssam#define TSTR "%S"
24189251Ssam#else /* UNICODE */
25189251Ssam#define TSTR "%s"
26189251Ssam#endif /* UNICODE */
27189251Ssam
28189251Ssam
29281806Srpaulo#ifndef TNC_CONFIG_FILE
30189251Ssam#define TNC_CONFIG_FILE "/etc/tnc_config"
31281806Srpaulo#endif /* TNC_CONFIG_FILE */
32189251Ssam#define TNC_WINREG_PATH TEXT("SOFTWARE\\Trusted Computing Group\\TNC\\IMCs")
33189251Ssam#define IF_TNCCS_START \
34189251Ssam"<?xml version=\"1.0\"?>\n" \
35189251Ssam"<TNCCS-Batch BatchId=\"%d\" Recipient=\"TNCS\" " \
36189251Ssam"xmlns=\"http://www.trustedcomputinggroup.org/IWG/TNC/1_0/IF_TNCCS#\" " \
37189251Ssam"xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\" " \
38189251Ssam"xsi:schemaLocation=\"http://www.trustedcomputinggroup.org/IWG/TNC/1_0/" \
39189251Ssam"IF_TNCCS# https://www.trustedcomputinggroup.org/XML/SCHEMA/TNCCS_1.0.xsd\">\n"
40189251Ssam#define IF_TNCCS_END "\n</TNCCS-Batch>"
41189251Ssam
42189251Ssam/* TNC IF-IMC */
43189251Ssam
44189251Ssam/* IF-TNCCS-SOH - SSoH and SSoHR Attributes */
45189251Ssamenum {
46189251Ssam	SSOH_MS_MACHINE_INVENTORY = 1,
47189251Ssam	SSOH_MS_QUARANTINE_STATE = 2,
48189251Ssam	SSOH_MS_PACKET_INFO = 3,
49189251Ssam	SSOH_MS_SYSTEMGENERATED_IDS = 4,
50189251Ssam	SSOH_MS_MACHINENAME = 5,
51189251Ssam	SSOH_MS_CORRELATIONID = 6,
52189251Ssam	SSOH_MS_INSTALLED_SHVS = 7,
53189251Ssam	SSOH_MS_MACHINE_INVENTORY_EX = 8
54189251Ssam};
55189251Ssam
56189251Ssamstruct tnc_if_imc {
57189251Ssam	struct tnc_if_imc *next;
58189251Ssam	char *name;
59189251Ssam	char *path;
60189251Ssam	void *dlhandle; /* from dlopen() */
61189251Ssam	TNC_IMCID imcID;
62189251Ssam	TNC_ConnectionID connectionID;
63189251Ssam	TNC_MessageTypeList supported_types;
64189251Ssam	size_t num_supported_types;
65189251Ssam	u8 *imc_send;
66189251Ssam	size_t imc_send_len;
67189251Ssam
68189251Ssam	/* Functions implemented by IMCs (with TNC_IMC_ prefix) */
69189251Ssam	TNC_Result (*Initialize)(
70189251Ssam		TNC_IMCID imcID,
71189251Ssam		TNC_Version minVersion,
72189251Ssam		TNC_Version maxVersion,
73189251Ssam		TNC_Version *pOutActualVersion);
74189251Ssam	TNC_Result (*NotifyConnectionChange)(
75189251Ssam		TNC_IMCID imcID,
76189251Ssam		TNC_ConnectionID connectionID,
77189251Ssam		TNC_ConnectionState newState);
78189251Ssam	TNC_Result (*BeginHandshake)(
79189251Ssam		TNC_IMCID imcID,
80189251Ssam		TNC_ConnectionID connectionID);
81189251Ssam	TNC_Result (*ReceiveMessage)(
82189251Ssam		TNC_IMCID imcID,
83189251Ssam		TNC_ConnectionID connectionID,
84189251Ssam		TNC_BufferReference messageBuffer,
85189251Ssam		TNC_UInt32 messageLength,
86189251Ssam		TNC_MessageType messageType);
87189251Ssam	TNC_Result (*BatchEnding)(
88189251Ssam		TNC_IMCID imcID,
89189251Ssam		TNC_ConnectionID connectionID);
90189251Ssam	TNC_Result (*Terminate)(TNC_IMCID imcID);
91189251Ssam	TNC_Result (*ProvideBindFunction)(
92189251Ssam		TNC_IMCID imcID,
93189251Ssam		TNC_TNCC_BindFunctionPointer bindFunction);
94189251Ssam};
95189251Ssam
96189251Ssamstruct tncc_data {
97189251Ssam	struct tnc_if_imc *imc;
98189251Ssam	unsigned int last_batchid;
99189251Ssam};
100189251Ssam
101189251Ssam#define TNC_MAX_IMC_ID 10
102189251Ssamstatic struct tnc_if_imc *tnc_imc[TNC_MAX_IMC_ID] = { NULL };
103189251Ssam
104189251Ssam
105189251Ssam/* TNCC functions that IMCs can call */
106189251Ssam
107189251SsamTNC_Result TNC_TNCC_ReportMessageTypes(
108189251Ssam	TNC_IMCID imcID,
109189251Ssam	TNC_MessageTypeList supportedTypes,
110189251Ssam	TNC_UInt32 typeCount)
111189251Ssam{
112189251Ssam	TNC_UInt32 i;
113189251Ssam	struct tnc_if_imc *imc;
114189251Ssam
115189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_ReportMessageTypes(imcID=%lu "
116189251Ssam		   "typeCount=%lu)",
117189251Ssam		   (unsigned long) imcID, (unsigned long) typeCount);
118189251Ssam
119189251Ssam	for (i = 0; i < typeCount; i++) {
120189251Ssam		wpa_printf(MSG_DEBUG, "TNC: supportedTypes[%lu] = %lu",
121189251Ssam			   i, supportedTypes[i]);
122189251Ssam	}
123189251Ssam
124189251Ssam	if (imcID >= TNC_MAX_IMC_ID || tnc_imc[imcID] == NULL)
125189251Ssam		return TNC_RESULT_INVALID_PARAMETER;
126189251Ssam
127189251Ssam	imc = tnc_imc[imcID];
128189251Ssam	os_free(imc->supported_types);
129189251Ssam	imc->supported_types =
130252726Srpaulo		os_malloc(typeCount * sizeof(TNC_MessageType));
131189251Ssam	if (imc->supported_types == NULL)
132189251Ssam		return TNC_RESULT_FATAL;
133189251Ssam	os_memcpy(imc->supported_types, supportedTypes,
134252726Srpaulo		  typeCount * sizeof(TNC_MessageType));
135189251Ssam	imc->num_supported_types = typeCount;
136189251Ssam
137189251Ssam	return TNC_RESULT_SUCCESS;
138189251Ssam}
139189251Ssam
140189251Ssam
141189251SsamTNC_Result TNC_TNCC_SendMessage(
142189251Ssam	TNC_IMCID imcID,
143189251Ssam	TNC_ConnectionID connectionID,
144189251Ssam	TNC_BufferReference message,
145189251Ssam	TNC_UInt32 messageLength,
146189251Ssam	TNC_MessageType messageType)
147189251Ssam{
148189251Ssam	struct tnc_if_imc *imc;
149189251Ssam	unsigned char *b64;
150189251Ssam	size_t b64len;
151189251Ssam
152189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage(imcID=%lu "
153189251Ssam		   "connectionID=%lu messageType=%lu)",
154189251Ssam		   imcID, connectionID, messageType);
155189251Ssam	wpa_hexdump_ascii(MSG_DEBUG, "TNC: TNC_TNCC_SendMessage",
156189251Ssam			  message, messageLength);
157189251Ssam
158189251Ssam	if (imcID >= TNC_MAX_IMC_ID || tnc_imc[imcID] == NULL)
159189251Ssam		return TNC_RESULT_INVALID_PARAMETER;
160189251Ssam
161189251Ssam	b64 = base64_encode(message, messageLength, &b64len);
162189251Ssam	if (b64 == NULL)
163189251Ssam		return TNC_RESULT_FATAL;
164189251Ssam
165189251Ssam	imc = tnc_imc[imcID];
166189251Ssam	os_free(imc->imc_send);
167189251Ssam	imc->imc_send_len = 0;
168189251Ssam	imc->imc_send = os_zalloc(b64len + 100);
169189251Ssam	if (imc->imc_send == NULL) {
170189251Ssam		os_free(b64);
171189251Ssam		return TNC_RESULT_OTHER;
172189251Ssam	}
173189251Ssam
174189251Ssam	imc->imc_send_len =
175189251Ssam		os_snprintf((char *) imc->imc_send, b64len + 100,
176189251Ssam			    "<IMC-IMV-Message><Type>%08X</Type>"
177189251Ssam			    "<Base64>%s</Base64></IMC-IMV-Message>",
178189251Ssam			    (unsigned int) messageType, b64);
179189251Ssam
180189251Ssam	os_free(b64);
181189251Ssam
182189251Ssam	return TNC_RESULT_SUCCESS;
183189251Ssam}
184189251Ssam
185189251Ssam
186189251SsamTNC_Result TNC_TNCC_RequestHandshakeRetry(
187189251Ssam	TNC_IMCID imcID,
188189251Ssam	TNC_ConnectionID connectionID,
189189251Ssam	TNC_RetryReason reason)
190189251Ssam{
191189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_RequestHandshakeRetry");
192189251Ssam
193189251Ssam	if (imcID >= TNC_MAX_IMC_ID || tnc_imc[imcID] == NULL)
194189251Ssam		return TNC_RESULT_INVALID_PARAMETER;
195189251Ssam
196189251Ssam	/*
197189251Ssam	 * TODO: trigger a call to eapol_sm_request_reauth(). This would
198189251Ssam	 * require that the IMC continues to be loaded in memory afer
199189251Ssam	 * authentication..
200189251Ssam	 */
201189251Ssam
202189251Ssam	return TNC_RESULT_SUCCESS;
203189251Ssam}
204189251Ssam
205189251Ssam
206189251SsamTNC_Result TNC_9048_LogMessage(TNC_IMCID imcID, TNC_UInt32 severity,
207189251Ssam			       const char *message)
208189251Ssam{
209189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_9048_LogMessage(imcID=%lu "
210189251Ssam		   "severity==%lu message='%s')",
211189251Ssam		   imcID, severity, message);
212189251Ssam	return TNC_RESULT_SUCCESS;
213189251Ssam}
214189251Ssam
215189251Ssam
216189251SsamTNC_Result TNC_9048_UserMessage(TNC_IMCID imcID, TNC_ConnectionID connectionID,
217189251Ssam				const char *message)
218189251Ssam{
219189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_9048_UserMessage(imcID=%lu "
220189251Ssam		   "connectionID==%lu message='%s')",
221189251Ssam		   imcID, connectionID, message);
222189251Ssam	return TNC_RESULT_SUCCESS;
223189251Ssam}
224189251Ssam
225189251Ssam
226189251SsamTNC_Result TNC_TNCC_BindFunction(
227189251Ssam	TNC_IMCID imcID,
228189251Ssam	char *functionName,
229189251Ssam	void **pOutfunctionPointer)
230189251Ssam{
231189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_TNCC_BindFunction(imcID=%lu, "
232189251Ssam		   "functionName='%s')", (unsigned long) imcID, functionName);
233189251Ssam
234189251Ssam	if (imcID >= TNC_MAX_IMC_ID || tnc_imc[imcID] == NULL)
235189251Ssam		return TNC_RESULT_INVALID_PARAMETER;
236189251Ssam
237189251Ssam	if (pOutfunctionPointer == NULL)
238189251Ssam		return TNC_RESULT_INVALID_PARAMETER;
239189251Ssam
240189251Ssam	if (os_strcmp(functionName, "TNC_TNCC_ReportMessageTypes") == 0)
241189251Ssam		*pOutfunctionPointer = TNC_TNCC_ReportMessageTypes;
242189251Ssam	else if (os_strcmp(functionName, "TNC_TNCC_SendMessage") == 0)
243189251Ssam		*pOutfunctionPointer = TNC_TNCC_SendMessage;
244189251Ssam	else if (os_strcmp(functionName, "TNC_TNCC_RequestHandshakeRetry") ==
245189251Ssam		 0)
246189251Ssam		*pOutfunctionPointer = TNC_TNCC_RequestHandshakeRetry;
247189251Ssam	else if (os_strcmp(functionName, "TNC_9048_LogMessage") == 0)
248189251Ssam		*pOutfunctionPointer = TNC_9048_LogMessage;
249189251Ssam	else if (os_strcmp(functionName, "TNC_9048_UserMessage") == 0)
250189251Ssam		*pOutfunctionPointer = TNC_9048_UserMessage;
251189251Ssam	else
252189251Ssam		*pOutfunctionPointer = NULL;
253189251Ssam
254189251Ssam	return TNC_RESULT_SUCCESS;
255189251Ssam}
256189251Ssam
257189251Ssam
258189251Ssamstatic void * tncc_get_sym(void *handle, char *func)
259189251Ssam{
260189251Ssam	void *fptr;
261189251Ssam
262189251Ssam#ifdef CONFIG_NATIVE_WINDOWS
263189251Ssam#ifdef _WIN32_WCE
264189251Ssam	fptr = GetProcAddressA(handle, func);
265189251Ssam#else /* _WIN32_WCE */
266189251Ssam	fptr = GetProcAddress(handle, func);
267189251Ssam#endif /* _WIN32_WCE */
268189251Ssam#else /* CONFIG_NATIVE_WINDOWS */
269189251Ssam	fptr = dlsym(handle, func);
270189251Ssam#endif /* CONFIG_NATIVE_WINDOWS */
271189251Ssam
272189251Ssam	return fptr;
273189251Ssam}
274189251Ssam
275189251Ssam
276189251Ssamstatic int tncc_imc_resolve_funcs(struct tnc_if_imc *imc)
277189251Ssam{
278189251Ssam	void *handle = imc->dlhandle;
279189251Ssam
280189251Ssam	/* Mandatory IMC functions */
281189251Ssam	imc->Initialize = tncc_get_sym(handle, "TNC_IMC_Initialize");
282189251Ssam	if (imc->Initialize == NULL) {
283189251Ssam		wpa_printf(MSG_ERROR, "TNC: IMC does not export "
284189251Ssam			   "TNC_IMC_Initialize");
285189251Ssam		return -1;
286189251Ssam	}
287189251Ssam
288189251Ssam	imc->BeginHandshake = tncc_get_sym(handle, "TNC_IMC_BeginHandshake");
289189251Ssam	if (imc->BeginHandshake == NULL) {
290189251Ssam		wpa_printf(MSG_ERROR, "TNC: IMC does not export "
291189251Ssam			   "TNC_IMC_BeginHandshake");
292189251Ssam		return -1;
293189251Ssam	}
294189251Ssam
295189251Ssam	imc->ProvideBindFunction =
296189251Ssam		tncc_get_sym(handle, "TNC_IMC_ProvideBindFunction");
297189251Ssam	if (imc->ProvideBindFunction == NULL) {
298189251Ssam		wpa_printf(MSG_ERROR, "TNC: IMC does not export "
299189251Ssam			   "TNC_IMC_ProvideBindFunction");
300189251Ssam		return -1;
301189251Ssam	}
302189251Ssam
303189251Ssam	/* Optional IMC functions */
304189251Ssam	imc->NotifyConnectionChange =
305189251Ssam		tncc_get_sym(handle, "TNC_IMC_NotifyConnectionChange");
306189251Ssam	imc->ReceiveMessage = tncc_get_sym(handle, "TNC_IMC_ReceiveMessage");
307189251Ssam	imc->BatchEnding = tncc_get_sym(handle, "TNC_IMC_BatchEnding");
308189251Ssam	imc->Terminate = tncc_get_sym(handle, "TNC_IMC_Terminate");
309189251Ssam
310189251Ssam	return 0;
311189251Ssam}
312189251Ssam
313189251Ssam
314189251Ssamstatic int tncc_imc_initialize(struct tnc_if_imc *imc)
315189251Ssam{
316189251Ssam	TNC_Result res;
317189251Ssam	TNC_Version imc_ver;
318189251Ssam
319189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Initialize for IMC '%s'",
320189251Ssam		   imc->name);
321189251Ssam	res = imc->Initialize(imc->imcID, TNC_IFIMC_VERSION_1,
322189251Ssam			      TNC_IFIMC_VERSION_1, &imc_ver);
323189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Initialize: res=%lu imc_ver=%lu",
324189251Ssam		   (unsigned long) res, (unsigned long) imc_ver);
325189251Ssam
326189251Ssam	return res == TNC_RESULT_SUCCESS ? 0 : -1;
327189251Ssam}
328189251Ssam
329189251Ssam
330189251Ssamstatic int tncc_imc_terminate(struct tnc_if_imc *imc)
331189251Ssam{
332189251Ssam	TNC_Result res;
333189251Ssam
334189251Ssam	if (imc->Terminate == NULL)
335189251Ssam		return 0;
336189251Ssam
337189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_Terminate for IMC '%s'",
338189251Ssam		   imc->name);
339189251Ssam	res = imc->Terminate(imc->imcID);
340189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_Terminate: %lu",
341189251Ssam		   (unsigned long) res);
342189251Ssam
343189251Ssam	return res == TNC_RESULT_SUCCESS ? 0 : -1;
344189251Ssam}
345189251Ssam
346189251Ssam
347189251Ssamstatic int tncc_imc_provide_bind_function(struct tnc_if_imc *imc)
348189251Ssam{
349189251Ssam	TNC_Result res;
350189251Ssam
351189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_ProvideBindFunction for "
352189251Ssam		   "IMC '%s'", imc->name);
353189251Ssam	res = imc->ProvideBindFunction(imc->imcID, TNC_TNCC_BindFunction);
354189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_ProvideBindFunction: res=%lu",
355189251Ssam		   (unsigned long) res);
356189251Ssam
357189251Ssam	return res == TNC_RESULT_SUCCESS ? 0 : -1;
358189251Ssam}
359189251Ssam
360189251Ssam
361189251Ssamstatic int tncc_imc_notify_connection_change(struct tnc_if_imc *imc,
362189251Ssam					     TNC_ConnectionState state)
363189251Ssam{
364189251Ssam	TNC_Result res;
365189251Ssam
366189251Ssam	if (imc->NotifyConnectionChange == NULL)
367189251Ssam		return 0;
368189251Ssam
369189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_NotifyConnectionChange(%d)"
370189251Ssam		   " for IMC '%s'", (int) state, imc->name);
371189251Ssam	res = imc->NotifyConnectionChange(imc->imcID, imc->connectionID,
372189251Ssam					  state);
373189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_NotifyConnectionChange: %lu",
374189251Ssam		   (unsigned long) res);
375189251Ssam
376189251Ssam	return res == TNC_RESULT_SUCCESS ? 0 : -1;
377189251Ssam}
378189251Ssam
379189251Ssam
380189251Ssamstatic int tncc_imc_begin_handshake(struct tnc_if_imc *imc)
381189251Ssam{
382189251Ssam	TNC_Result res;
383189251Ssam
384189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Calling TNC_IMC_BeginHandshake for IMC "
385189251Ssam		   "'%s'", imc->name);
386189251Ssam	res = imc->BeginHandshake(imc->imcID, imc->connectionID);
387189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNC_IMC_BeginHandshake: %lu",
388189251Ssam		   (unsigned long) res);
389189251Ssam
390189251Ssam	return res == TNC_RESULT_SUCCESS ? 0 : -1;
391189251Ssam}
392189251Ssam
393189251Ssam
394189251Ssamstatic int tncc_load_imc(struct tnc_if_imc *imc)
395189251Ssam{
396189251Ssam	if (imc->path == NULL) {
397189251Ssam		wpa_printf(MSG_DEBUG, "TNC: No IMC configured");
398189251Ssam		return -1;
399189251Ssam	}
400189251Ssam
401189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Opening IMC: %s (%s)",
402189251Ssam		   imc->name, imc->path);
403189251Ssam#ifdef CONFIG_NATIVE_WINDOWS
404189251Ssam#ifdef UNICODE
405189251Ssam	{
406189251Ssam		TCHAR *lib = wpa_strdup_tchar(imc->path);
407189251Ssam		if (lib == NULL)
408189251Ssam			return -1;
409189251Ssam		imc->dlhandle = LoadLibrary(lib);
410189251Ssam		os_free(lib);
411189251Ssam	}
412189251Ssam#else /* UNICODE */
413189251Ssam	imc->dlhandle = LoadLibrary(imc->path);
414189251Ssam#endif /* UNICODE */
415189251Ssam	if (imc->dlhandle == NULL) {
416189251Ssam		wpa_printf(MSG_ERROR, "TNC: Failed to open IMC '%s' (%s): %d",
417189251Ssam			   imc->name, imc->path, (int) GetLastError());
418189251Ssam		return -1;
419189251Ssam	}
420189251Ssam#else /* CONFIG_NATIVE_WINDOWS */
421189251Ssam	imc->dlhandle = dlopen(imc->path, RTLD_LAZY);
422189251Ssam	if (imc->dlhandle == NULL) {
423189251Ssam		wpa_printf(MSG_ERROR, "TNC: Failed to open IMC '%s' (%s): %s",
424189251Ssam			   imc->name, imc->path, dlerror());
425189251Ssam		return -1;
426189251Ssam	}
427189251Ssam#endif /* CONFIG_NATIVE_WINDOWS */
428189251Ssam
429189251Ssam	if (tncc_imc_resolve_funcs(imc) < 0) {
430189251Ssam		wpa_printf(MSG_ERROR, "TNC: Failed to resolve IMC functions");
431189251Ssam		return -1;
432189251Ssam	}
433189251Ssam
434189251Ssam	if (tncc_imc_initialize(imc) < 0 ||
435189251Ssam	    tncc_imc_provide_bind_function(imc) < 0) {
436189251Ssam		wpa_printf(MSG_ERROR, "TNC: Failed to initialize IMC");
437189251Ssam		return -1;
438189251Ssam	}
439189251Ssam
440189251Ssam	return 0;
441189251Ssam}
442189251Ssam
443189251Ssam
444189251Ssamstatic void tncc_unload_imc(struct tnc_if_imc *imc)
445189251Ssam{
446189251Ssam	tncc_imc_terminate(imc);
447189251Ssam	tnc_imc[imc->imcID] = NULL;
448189251Ssam
449189251Ssam	if (imc->dlhandle) {
450189251Ssam#ifdef CONFIG_NATIVE_WINDOWS
451189251Ssam		FreeLibrary(imc->dlhandle);
452189251Ssam#else /* CONFIG_NATIVE_WINDOWS */
453189251Ssam		dlclose(imc->dlhandle);
454189251Ssam#endif /* CONFIG_NATIVE_WINDOWS */
455189251Ssam	}
456189251Ssam	os_free(imc->name);
457189251Ssam	os_free(imc->path);
458189251Ssam	os_free(imc->supported_types);
459189251Ssam	os_free(imc->imc_send);
460189251Ssam}
461189251Ssam
462189251Ssam
463189251Ssamstatic int tncc_supported_type(struct tnc_if_imc *imc, unsigned int type)
464189251Ssam{
465189251Ssam	size_t i;
466189251Ssam	unsigned int vendor, subtype;
467189251Ssam
468189251Ssam	if (imc == NULL || imc->supported_types == NULL)
469189251Ssam		return 0;
470189251Ssam
471189251Ssam	vendor = type >> 8;
472189251Ssam	subtype = type & 0xff;
473189251Ssam
474189251Ssam	for (i = 0; i < imc->num_supported_types; i++) {
475189251Ssam		unsigned int svendor, ssubtype;
476189251Ssam		svendor = imc->supported_types[i] >> 8;
477189251Ssam		ssubtype = imc->supported_types[i] & 0xff;
478189251Ssam		if ((vendor == svendor || svendor == TNC_VENDORID_ANY) &&
479189251Ssam		    (subtype == ssubtype || ssubtype == TNC_SUBTYPE_ANY))
480189251Ssam			return 1;
481189251Ssam	}
482189251Ssam
483189251Ssam	return 0;
484189251Ssam}
485189251Ssam
486189251Ssam
487189251Ssamstatic void tncc_send_to_imcs(struct tncc_data *tncc, unsigned int type,
488189251Ssam			      const u8 *msg, size_t len)
489189251Ssam{
490189251Ssam	struct tnc_if_imc *imc;
491189251Ssam	TNC_Result res;
492189251Ssam
493189251Ssam	wpa_hexdump_ascii(MSG_MSGDUMP, "TNC: Message to IMC(s)", msg, len);
494189251Ssam
495189251Ssam	for (imc = tncc->imc; imc; imc = imc->next) {
496189251Ssam		if (imc->ReceiveMessage == NULL ||
497189251Ssam		    !tncc_supported_type(imc, type))
498189251Ssam			continue;
499189251Ssam
500189251Ssam		wpa_printf(MSG_DEBUG, "TNC: Call ReceiveMessage for IMC '%s'",
501189251Ssam			   imc->name);
502189251Ssam		res = imc->ReceiveMessage(imc->imcID, imc->connectionID,
503189251Ssam					  (TNC_BufferReference) msg, len,
504189251Ssam					  type);
505189251Ssam		wpa_printf(MSG_DEBUG, "TNC: ReceiveMessage: %lu",
506189251Ssam			   (unsigned long) res);
507189251Ssam	}
508189251Ssam}
509189251Ssam
510189251Ssam
511189251Ssamvoid tncc_init_connection(struct tncc_data *tncc)
512189251Ssam{
513189251Ssam	struct tnc_if_imc *imc;
514189251Ssam
515189251Ssam	for (imc = tncc->imc; imc; imc = imc->next) {
516189251Ssam		tncc_imc_notify_connection_change(
517189251Ssam			imc, TNC_CONNECTION_STATE_CREATE);
518189251Ssam		tncc_imc_notify_connection_change(
519189251Ssam			imc, TNC_CONNECTION_STATE_HANDSHAKE);
520189251Ssam
521189251Ssam		os_free(imc->imc_send);
522189251Ssam		imc->imc_send = NULL;
523189251Ssam		imc->imc_send_len = 0;
524189251Ssam
525189251Ssam		tncc_imc_begin_handshake(imc);
526189251Ssam	}
527189251Ssam}
528189251Ssam
529189251Ssam
530189251Ssamsize_t tncc_total_send_len(struct tncc_data *tncc)
531189251Ssam{
532189251Ssam	struct tnc_if_imc *imc;
533189251Ssam
534189251Ssam	size_t len = 0;
535189251Ssam	for (imc = tncc->imc; imc; imc = imc->next)
536189251Ssam		len += imc->imc_send_len;
537189251Ssam	return len;
538189251Ssam}
539189251Ssam
540189251Ssam
541189251Ssamu8 * tncc_copy_send_buf(struct tncc_data *tncc, u8 *pos)
542189251Ssam{
543189251Ssam	struct tnc_if_imc *imc;
544189251Ssam
545189251Ssam	for (imc = tncc->imc; imc; imc = imc->next) {
546189251Ssam		if (imc->imc_send == NULL)
547189251Ssam			continue;
548189251Ssam
549189251Ssam		os_memcpy(pos, imc->imc_send, imc->imc_send_len);
550189251Ssam		pos += imc->imc_send_len;
551189251Ssam		os_free(imc->imc_send);
552189251Ssam		imc->imc_send = NULL;
553189251Ssam		imc->imc_send_len = 0;
554189251Ssam	}
555189251Ssam
556189251Ssam	return pos;
557189251Ssam}
558189251Ssam
559189251Ssam
560189251Ssamchar * tncc_if_tnccs_start(struct tncc_data *tncc)
561189251Ssam{
562189251Ssam	char *buf = os_malloc(1000);
563189251Ssam	if (buf == NULL)
564189251Ssam		return NULL;
565189251Ssam	tncc->last_batchid++;
566189251Ssam	os_snprintf(buf, 1000, IF_TNCCS_START, tncc->last_batchid);
567189251Ssam	return buf;
568189251Ssam}
569189251Ssam
570189251Ssam
571189251Ssamchar * tncc_if_tnccs_end(void)
572189251Ssam{
573189251Ssam	char *buf = os_malloc(100);
574189251Ssam	if (buf == NULL)
575189251Ssam		return NULL;
576189251Ssam	os_snprintf(buf, 100, IF_TNCCS_END);
577189251Ssam	return buf;
578189251Ssam}
579189251Ssam
580189251Ssam
581189251Ssamstatic void tncc_notify_recommendation(struct tncc_data *tncc,
582189251Ssam				       enum tncc_process_res res)
583189251Ssam{
584189251Ssam	TNC_ConnectionState state;
585189251Ssam	struct tnc_if_imc *imc;
586189251Ssam
587189251Ssam	switch (res) {
588189251Ssam	case TNCCS_RECOMMENDATION_ALLOW:
589189251Ssam		state = TNC_CONNECTION_STATE_ACCESS_ALLOWED;
590189251Ssam		break;
591189251Ssam	case TNCCS_RECOMMENDATION_NONE:
592189251Ssam		state = TNC_CONNECTION_STATE_ACCESS_NONE;
593189251Ssam		break;
594189251Ssam	case TNCCS_RECOMMENDATION_ISOLATE:
595189251Ssam		state = TNC_CONNECTION_STATE_ACCESS_ISOLATED;
596189251Ssam		break;
597189251Ssam	default:
598189251Ssam		state = TNC_CONNECTION_STATE_ACCESS_NONE;
599189251Ssam		break;
600189251Ssam	}
601189251Ssam
602189251Ssam	for (imc = tncc->imc; imc; imc = imc->next)
603189251Ssam		tncc_imc_notify_connection_change(imc, state);
604189251Ssam}
605189251Ssam
606189251Ssam
607189251Ssamstatic int tncc_get_type(char *start, unsigned int *type)
608189251Ssam{
609189251Ssam	char *pos = os_strstr(start, "<Type>");
610189251Ssam	if (pos == NULL)
611189251Ssam		return -1;
612189251Ssam	pos += 6;
613189251Ssam	*type = strtoul(pos, NULL, 16);
614189251Ssam	return 0;
615189251Ssam}
616189251Ssam
617189251Ssam
618189251Ssamstatic unsigned char * tncc_get_base64(char *start, size_t *decoded_len)
619189251Ssam{
620189251Ssam	char *pos, *pos2;
621189251Ssam	unsigned char *decoded;
622189251Ssam
623189251Ssam	pos = os_strstr(start, "<Base64>");
624189251Ssam	if (pos == NULL)
625189251Ssam		return NULL;
626189251Ssam
627189251Ssam	pos += 8;
628189251Ssam	pos2 = os_strstr(pos, "</Base64>");
629189251Ssam	if (pos2 == NULL)
630189251Ssam		return NULL;
631189251Ssam	*pos2 = '\0';
632189251Ssam
633189251Ssam	decoded = base64_decode((unsigned char *) pos, os_strlen(pos),
634189251Ssam				decoded_len);
635189251Ssam	*pos2 = '<';
636189251Ssam	if (decoded == NULL) {
637189251Ssam		wpa_printf(MSG_DEBUG, "TNC: Failed to decode Base64 data");
638189251Ssam	}
639189251Ssam
640189251Ssam	return decoded;
641189251Ssam}
642189251Ssam
643189251Ssam
644189251Ssamstatic enum tncc_process_res tncc_get_recommendation(char *start)
645189251Ssam{
646189251Ssam	char *pos, *pos2, saved;
647189251Ssam	int recom;
648189251Ssam
649189251Ssam	pos = os_strstr(start, "<TNCCS-Recommendation ");
650189251Ssam	if (pos == NULL)
651189251Ssam		return TNCCS_RECOMMENDATION_ERROR;
652189251Ssam
653189251Ssam	pos += 21;
654189251Ssam	pos = os_strstr(pos, " type=");
655189251Ssam	if (pos == NULL)
656189251Ssam		return TNCCS_RECOMMENDATION_ERROR;
657189251Ssam	pos += 6;
658189251Ssam
659189251Ssam	if (*pos == '"')
660189251Ssam		pos++;
661189251Ssam
662189251Ssam	pos2 = pos;
663189251Ssam	while (*pos2 != '\0' && *pos2 != '"' && *pos2 != '>')
664189251Ssam		pos2++;
665189251Ssam
666189251Ssam	if (*pos2 == '\0')
667189251Ssam		return TNCCS_RECOMMENDATION_ERROR;
668189251Ssam
669189251Ssam	saved = *pos2;
670189251Ssam	*pos2 = '\0';
671189251Ssam	wpa_printf(MSG_DEBUG, "TNC: TNCCS-Recommendation: '%s'", pos);
672189251Ssam
673189251Ssam	recom = TNCCS_RECOMMENDATION_ERROR;
674189251Ssam	if (os_strcmp(pos, "allow") == 0)
675189251Ssam		recom = TNCCS_RECOMMENDATION_ALLOW;
676189251Ssam	else if (os_strcmp(pos, "none") == 0)
677189251Ssam		recom = TNCCS_RECOMMENDATION_NONE;
678189251Ssam	else if (os_strcmp(pos, "isolate") == 0)
679189251Ssam		recom = TNCCS_RECOMMENDATION_ISOLATE;
680189251Ssam
681189251Ssam	*pos2 = saved;
682189251Ssam
683189251Ssam	return recom;
684189251Ssam}
685189251Ssam
686189251Ssam
687189251Ssamenum tncc_process_res tncc_process_if_tnccs(struct tncc_data *tncc,
688189251Ssam					    const u8 *msg, size_t len)
689189251Ssam{
690189251Ssam	char *buf, *start, *end, *pos, *pos2, *payload;
691189251Ssam	unsigned int batch_id;
692189251Ssam	unsigned char *decoded;
693189251Ssam	size_t decoded_len;
694189251Ssam	enum tncc_process_res res = TNCCS_PROCESS_OK_NO_RECOMMENDATION;
695189251Ssam	int recommendation_msg = 0;
696189251Ssam
697281806Srpaulo	buf = dup_binstr(msg, len);
698189251Ssam	if (buf == NULL)
699189251Ssam		return TNCCS_PROCESS_ERROR;
700189251Ssam
701189251Ssam	start = os_strstr(buf, "<TNCCS-Batch ");
702189251Ssam	end = os_strstr(buf, "</TNCCS-Batch>");
703189251Ssam	if (start == NULL || end == NULL || start > end) {
704189251Ssam		os_free(buf);
705189251Ssam		return TNCCS_PROCESS_ERROR;
706189251Ssam	}
707189251Ssam
708189251Ssam	start += 13;
709189251Ssam	while (*start == ' ')
710189251Ssam		start++;
711189251Ssam	*end = '\0';
712189251Ssam
713189251Ssam	pos = os_strstr(start, "BatchId=");
714189251Ssam	if (pos == NULL) {
715189251Ssam		os_free(buf);
716189251Ssam		return TNCCS_PROCESS_ERROR;
717189251Ssam	}
718189251Ssam
719189251Ssam	pos += 8;
720189251Ssam	if (*pos == '"')
721189251Ssam		pos++;
722189251Ssam	batch_id = atoi(pos);
723189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Received IF-TNCCS BatchId=%u",
724189251Ssam		   batch_id);
725189251Ssam	if (batch_id != tncc->last_batchid + 1) {
726189251Ssam		wpa_printf(MSG_DEBUG, "TNC: Unexpected IF-TNCCS BatchId "
727189251Ssam			   "%u (expected %u)",
728189251Ssam			   batch_id, tncc->last_batchid + 1);
729189251Ssam		os_free(buf);
730189251Ssam		return TNCCS_PROCESS_ERROR;
731189251Ssam	}
732189251Ssam	tncc->last_batchid = batch_id;
733189251Ssam
734189251Ssam	while (*pos != '\0' && *pos != '>')
735189251Ssam		pos++;
736189251Ssam	if (*pos == '\0') {
737189251Ssam		os_free(buf);
738189251Ssam		return TNCCS_PROCESS_ERROR;
739189251Ssam	}
740189251Ssam	pos++;
741189251Ssam	payload = start;
742189251Ssam
743189251Ssam	/*
744189251Ssam	 * <IMC-IMV-Message>
745189251Ssam	 * <Type>01234567</Type>
746189251Ssam	 * <Base64>foo==</Base64>
747189251Ssam	 * </IMC-IMV-Message>
748189251Ssam	 */
749189251Ssam
750189251Ssam	while (*start) {
751189251Ssam		char *endpos;
752189251Ssam		unsigned int type;
753189251Ssam
754189251Ssam		pos = os_strstr(start, "<IMC-IMV-Message>");
755189251Ssam		if (pos == NULL)
756189251Ssam			break;
757189251Ssam		start = pos + 17;
758189251Ssam		end = os_strstr(start, "</IMC-IMV-Message>");
759189251Ssam		if (end == NULL)
760189251Ssam			break;
761189251Ssam		*end = '\0';
762189251Ssam		endpos = end;
763189251Ssam		end += 18;
764189251Ssam
765189251Ssam		if (tncc_get_type(start, &type) < 0) {
766189251Ssam			*endpos = '<';
767189251Ssam			start = end;
768189251Ssam			continue;
769189251Ssam		}
770189251Ssam		wpa_printf(MSG_DEBUG, "TNC: IMC-IMV-Message Type 0x%x", type);
771189251Ssam
772189251Ssam		decoded = tncc_get_base64(start, &decoded_len);
773189251Ssam		if (decoded == NULL) {
774189251Ssam			*endpos = '<';
775189251Ssam			start = end;
776189251Ssam			continue;
777189251Ssam		}
778189251Ssam
779189251Ssam		tncc_send_to_imcs(tncc, type, decoded, decoded_len);
780189251Ssam
781189251Ssam		os_free(decoded);
782189251Ssam
783189251Ssam		start = end;
784189251Ssam	}
785189251Ssam
786189251Ssam	/*
787189251Ssam	 * <TNCC-TNCS-Message>
788189251Ssam	 * <Type>01234567</Type>
789189251Ssam	 * <XML><TNCCS-Foo type="foo"></TNCCS-Foo></XML>
790189251Ssam	 * <Base64>foo==</Base64>
791189251Ssam	 * </TNCC-TNCS-Message>
792189251Ssam	 */
793189251Ssam
794189251Ssam	start = payload;
795189251Ssam	while (*start) {
796189251Ssam		unsigned int type;
797189251Ssam		char *xml, *xmlend, *endpos;
798189251Ssam
799189251Ssam		pos = os_strstr(start, "<TNCC-TNCS-Message>");
800189251Ssam		if (pos == NULL)
801189251Ssam			break;
802189251Ssam		start = pos + 19;
803189251Ssam		end = os_strstr(start, "</TNCC-TNCS-Message>");
804189251Ssam		if (end == NULL)
805189251Ssam			break;
806189251Ssam		*end = '\0';
807189251Ssam		endpos = end;
808189251Ssam		end += 20;
809189251Ssam
810189251Ssam		if (tncc_get_type(start, &type) < 0) {
811189251Ssam			*endpos = '<';
812189251Ssam			start = end;
813189251Ssam			continue;
814189251Ssam		}
815189251Ssam		wpa_printf(MSG_DEBUG, "TNC: TNCC-TNCS-Message Type 0x%x",
816189251Ssam			   type);
817189251Ssam
818189251Ssam		/* Base64 OR XML */
819189251Ssam		decoded = NULL;
820189251Ssam		xml = NULL;
821189251Ssam		xmlend = NULL;
822189251Ssam		pos = os_strstr(start, "<XML>");
823189251Ssam		if (pos) {
824189251Ssam			pos += 5;
825189251Ssam			pos2 = os_strstr(pos, "</XML>");
826189251Ssam			if (pos2 == NULL) {
827189251Ssam				*endpos = '<';
828189251Ssam				start = end;
829189251Ssam				continue;
830189251Ssam			}
831189251Ssam			xmlend = pos2;
832189251Ssam			xml = pos;
833189251Ssam		} else {
834189251Ssam			decoded = tncc_get_base64(start, &decoded_len);
835189251Ssam			if (decoded == NULL) {
836189251Ssam				*endpos = '<';
837189251Ssam				start = end;
838189251Ssam				continue;
839189251Ssam			}
840189251Ssam		}
841189251Ssam
842189251Ssam		if (decoded) {
843189251Ssam			wpa_hexdump_ascii(MSG_MSGDUMP,
844189251Ssam					  "TNC: TNCC-TNCS-Message Base64",
845189251Ssam					  decoded, decoded_len);
846189251Ssam			os_free(decoded);
847189251Ssam		}
848189251Ssam
849189251Ssam		if (xml) {
850189251Ssam			wpa_hexdump_ascii(MSG_MSGDUMP,
851189251Ssam					  "TNC: TNCC-TNCS-Message XML",
852189251Ssam					  (unsigned char *) xml,
853189251Ssam					  xmlend - xml);
854189251Ssam		}
855189251Ssam
856189251Ssam		if (type == TNC_TNCCS_RECOMMENDATION && xml) {
857189251Ssam			/*
858189251Ssam			 * <TNCCS-Recommendation type="allow">
859189251Ssam			 * </TNCCS-Recommendation>
860189251Ssam			 */
861189251Ssam			*xmlend = '\0';
862189251Ssam			res = tncc_get_recommendation(xml);
863189251Ssam			*xmlend = '<';
864189251Ssam			recommendation_msg = 1;
865189251Ssam		}
866189251Ssam
867189251Ssam		start = end;
868189251Ssam	}
869189251Ssam
870189251Ssam	os_free(buf);
871189251Ssam
872189251Ssam	if (recommendation_msg)
873189251Ssam		tncc_notify_recommendation(tncc, res);
874189251Ssam
875189251Ssam	return res;
876189251Ssam}
877189251Ssam
878189251Ssam
879189251Ssam#ifdef CONFIG_NATIVE_WINDOWS
880189251Ssamstatic int tncc_read_config_reg(struct tncc_data *tncc, HKEY hive)
881189251Ssam{
882189251Ssam	HKEY hk, hk2;
883189251Ssam	LONG ret;
884189251Ssam	DWORD i;
885189251Ssam	struct tnc_if_imc *imc, *last;
886189251Ssam	int j;
887189251Ssam
888189251Ssam	last = tncc->imc;
889189251Ssam	while (last && last->next)
890189251Ssam		last = last->next;
891189251Ssam
892189251Ssam	ret = RegOpenKeyEx(hive, TNC_WINREG_PATH, 0, KEY_ENUMERATE_SUB_KEYS,
893189251Ssam			   &hk);
894189251Ssam	if (ret != ERROR_SUCCESS)
895189251Ssam		return 0;
896189251Ssam
897189251Ssam	for (i = 0; ; i++) {
898189251Ssam		TCHAR name[255], *val;
899189251Ssam		DWORD namelen, buflen;
900189251Ssam
901189251Ssam		namelen = 255;
902189251Ssam		ret = RegEnumKeyEx(hk, i, name, &namelen, NULL, NULL, NULL,
903189251Ssam				   NULL);
904189251Ssam
905189251Ssam		if (ret == ERROR_NO_MORE_ITEMS)
906189251Ssam			break;
907189251Ssam
908189251Ssam		if (ret != ERROR_SUCCESS) {
909189251Ssam			wpa_printf(MSG_DEBUG, "TNC: RegEnumKeyEx failed: 0x%x",
910189251Ssam				   (unsigned int) ret);
911189251Ssam			break;
912189251Ssam		}
913189251Ssam
914189251Ssam		if (namelen >= 255)
915189251Ssam			namelen = 255 - 1;
916189251Ssam		name[namelen] = '\0';
917189251Ssam
918189251Ssam		wpa_printf(MSG_DEBUG, "TNC: IMC '" TSTR "'", name);
919189251Ssam
920189251Ssam		ret = RegOpenKeyEx(hk, name, 0, KEY_QUERY_VALUE, &hk2);
921189251Ssam		if (ret != ERROR_SUCCESS) {
922189251Ssam			wpa_printf(MSG_DEBUG, "Could not open IMC key '" TSTR
923189251Ssam				   "'", name);
924189251Ssam			continue;
925189251Ssam		}
926189251Ssam
927189251Ssam		ret = RegQueryValueEx(hk2, TEXT("Path"), NULL, NULL, NULL,
928189251Ssam				      &buflen);
929189251Ssam		if (ret != ERROR_SUCCESS) {
930189251Ssam			wpa_printf(MSG_DEBUG, "TNC: Could not read Path from "
931189251Ssam				   "IMC key '" TSTR "'", name);
932189251Ssam			RegCloseKey(hk2);
933189251Ssam			continue;
934189251Ssam		}
935189251Ssam
936189251Ssam		val = os_malloc(buflen);
937189251Ssam		if (val == NULL) {
938189251Ssam			RegCloseKey(hk2);
939189251Ssam			continue;
940189251Ssam		}
941189251Ssam
942189251Ssam		ret = RegQueryValueEx(hk2, TEXT("Path"), NULL, NULL,
943189251Ssam				      (LPBYTE) val, &buflen);
944189251Ssam		if (ret != ERROR_SUCCESS) {
945189251Ssam			os_free(val);
946189251Ssam			RegCloseKey(hk2);
947189251Ssam			continue;
948189251Ssam		}
949189251Ssam
950189251Ssam		RegCloseKey(hk2);
951189251Ssam
952189251Ssam		wpa_unicode2ascii_inplace(val);
953189251Ssam		wpa_printf(MSG_DEBUG, "TNC: IMC Path '%s'", (char *) val);
954189251Ssam
955189251Ssam		for (j = 0; j < TNC_MAX_IMC_ID; j++) {
956189251Ssam			if (tnc_imc[j] == NULL)
957189251Ssam				break;
958189251Ssam		}
959189251Ssam		if (j >= TNC_MAX_IMC_ID) {
960189251Ssam			wpa_printf(MSG_DEBUG, "TNC: Too many IMCs");
961189251Ssam			os_free(val);
962189251Ssam			continue;
963189251Ssam		}
964189251Ssam
965189251Ssam		imc = os_zalloc(sizeof(*imc));
966189251Ssam		if (imc == NULL) {
967189251Ssam			os_free(val);
968189251Ssam			break;
969189251Ssam		}
970189251Ssam
971189251Ssam		imc->imcID = j;
972189251Ssam
973189251Ssam		wpa_unicode2ascii_inplace(name);
974189251Ssam		imc->name = os_strdup((char *) name);
975189251Ssam		imc->path = os_strdup((char *) val);
976189251Ssam
977189251Ssam		os_free(val);
978189251Ssam
979189251Ssam		if (last == NULL)
980189251Ssam			tncc->imc = imc;
981189251Ssam		else
982189251Ssam			last->next = imc;
983189251Ssam		last = imc;
984189251Ssam
985189251Ssam		tnc_imc[imc->imcID] = imc;
986189251Ssam	}
987189251Ssam
988189251Ssam	RegCloseKey(hk);
989189251Ssam
990189251Ssam	return 0;
991189251Ssam}
992189251Ssam
993189251Ssam
994189251Ssamstatic int tncc_read_config(struct tncc_data *tncc)
995189251Ssam{
996189251Ssam	if (tncc_read_config_reg(tncc, HKEY_LOCAL_MACHINE) < 0 ||
997189251Ssam	    tncc_read_config_reg(tncc, HKEY_CURRENT_USER) < 0)
998189251Ssam		return -1;
999189251Ssam	return 0;
1000189251Ssam}
1001189251Ssam
1002189251Ssam#else /* CONFIG_NATIVE_WINDOWS */
1003189251Ssam
1004189251Ssamstatic struct tnc_if_imc * tncc_parse_imc(char *start, char *end, int *error)
1005189251Ssam{
1006189251Ssam	struct tnc_if_imc *imc;
1007189251Ssam	char *pos, *pos2;
1008189251Ssam	int i;
1009189251Ssam
1010189251Ssam	for (i = 0; i < TNC_MAX_IMC_ID; i++) {
1011189251Ssam		if (tnc_imc[i] == NULL)
1012189251Ssam			break;
1013189251Ssam	}
1014189251Ssam	if (i >= TNC_MAX_IMC_ID) {
1015189251Ssam		wpa_printf(MSG_DEBUG, "TNC: Too many IMCs");
1016189251Ssam		return NULL;
1017189251Ssam	}
1018189251Ssam
1019189251Ssam	imc = os_zalloc(sizeof(*imc));
1020189251Ssam	if (imc == NULL) {
1021189251Ssam		*error = 1;
1022189251Ssam		return NULL;
1023189251Ssam	}
1024189251Ssam
1025189251Ssam	imc->imcID = i;
1026189251Ssam
1027189251Ssam	pos = start;
1028189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Configured IMC: %s", pos);
1029189251Ssam	if (pos + 1 >= end || *pos != '"') {
1030189251Ssam		wpa_printf(MSG_ERROR, "TNC: Ignoring invalid IMC line '%s' "
1031189251Ssam			   "(no starting quotation mark)", start);
1032189251Ssam		os_free(imc);
1033189251Ssam		return NULL;
1034189251Ssam	}
1035189251Ssam
1036189251Ssam	pos++;
1037189251Ssam	pos2 = pos;
1038189251Ssam	while (pos2 < end && *pos2 != '"')
1039189251Ssam		pos2++;
1040189251Ssam	if (pos2 >= end) {
1041189251Ssam		wpa_printf(MSG_ERROR, "TNC: Ignoring invalid IMC line '%s' "
1042189251Ssam			   "(no ending quotation mark)", start);
1043189251Ssam		os_free(imc);
1044189251Ssam		return NULL;
1045189251Ssam	}
1046189251Ssam	*pos2 = '\0';
1047189251Ssam	wpa_printf(MSG_DEBUG, "TNC: Name: '%s'", pos);
1048189251Ssam	imc->name = os_strdup(pos);
1049189251Ssam
1050189251Ssam	pos = pos2 + 1;
1051189251Ssam	if (pos >= end || *pos != ' ') {
1052189251Ssam		wpa_printf(MSG_ERROR, "TNC: Ignoring invalid IMC line '%s' "
1053189251Ssam			   "(no space after name)", start);
1054209158Srpaulo		os_free(imc->name);
1055189251Ssam		os_free(imc);
1056189251Ssam		return NULL;
1057189251Ssam	}
1058189251Ssam
1059189251Ssam	pos++;
1060189251Ssam	wpa_printf(MSG_DEBUG, "TNC: IMC file: '%s'", pos);
1061189251Ssam	imc->path = os_strdup(pos);
1062189251Ssam	tnc_imc[imc->imcID] = imc;
1063189251Ssam
1064189251Ssam	return imc;
1065189251Ssam}
1066189251Ssam
1067189251Ssam
1068189251Ssamstatic int tncc_read_config(struct tncc_data *tncc)
1069189251Ssam{
1070189251Ssam	char *config, *end, *pos, *line_end;
1071189251Ssam	size_t config_len;
1072189251Ssam	struct tnc_if_imc *imc, *last;
1073189251Ssam
1074189251Ssam	last = NULL;
1075189251Ssam
1076189251Ssam	config = os_readfile(TNC_CONFIG_FILE, &config_len);
1077189251Ssam	if (config == NULL) {
1078189251Ssam		wpa_printf(MSG_ERROR, "TNC: Could not open TNC configuration "
1079189251Ssam			   "file '%s'", TNC_CONFIG_FILE);
1080189251Ssam		return -1;
1081189251Ssam	}
1082189251Ssam
1083189251Ssam	end = config + config_len;
1084189251Ssam	for (pos = config; pos < end; pos = line_end + 1) {
1085189251Ssam		line_end = pos;
1086189251Ssam		while (*line_end != '\n' && *line_end != '\r' &&
1087189251Ssam		       line_end < end)
1088189251Ssam			line_end++;
1089189251Ssam		*line_end = '\0';
1090189251Ssam
1091189251Ssam		if (os_strncmp(pos, "IMC ", 4) == 0) {
1092189251Ssam			int error = 0;
1093189251Ssam
1094189251Ssam			imc = tncc_parse_imc(pos + 4, line_end, &error);
1095281806Srpaulo			if (error) {
1096281806Srpaulo				os_free(config);
1097189251Ssam				return -1;
1098281806Srpaulo			}
1099189251Ssam			if (imc) {
1100189251Ssam				if (last == NULL)
1101189251Ssam					tncc->imc = imc;
1102189251Ssam				else
1103189251Ssam					last->next = imc;
1104189251Ssam				last = imc;
1105189251Ssam			}
1106189251Ssam		}
1107189251Ssam	}
1108189251Ssam
1109189251Ssam	os_free(config);
1110189251Ssam
1111189251Ssam	return 0;
1112189251Ssam}
1113189251Ssam
1114189251Ssam#endif /* CONFIG_NATIVE_WINDOWS */
1115189251Ssam
1116189251Ssam
1117189251Ssamstruct tncc_data * tncc_init(void)
1118189251Ssam{
1119189251Ssam	struct tncc_data *tncc;
1120189251Ssam	struct tnc_if_imc *imc;
1121189251Ssam
1122189251Ssam	tncc = os_zalloc(sizeof(*tncc));
1123189251Ssam	if (tncc == NULL)
1124189251Ssam		return NULL;
1125189251Ssam
1126189251Ssam	/* TODO:
1127189251Ssam	 * move loading and Initialize() to a location that is not
1128189251Ssam	 *    re-initialized for every EAP-TNC session (?)
1129189251Ssam	 */
1130189251Ssam
1131189251Ssam	if (tncc_read_config(tncc) < 0) {
1132189251Ssam		wpa_printf(MSG_ERROR, "TNC: Failed to read TNC configuration");
1133189251Ssam		goto failed;
1134189251Ssam	}
1135189251Ssam
1136189251Ssam	for (imc = tncc->imc; imc; imc = imc->next) {
1137189251Ssam		if (tncc_load_imc(imc)) {
1138189251Ssam			wpa_printf(MSG_ERROR, "TNC: Failed to load IMC '%s'",
1139189251Ssam				   imc->name);
1140189251Ssam			goto failed;
1141189251Ssam		}
1142189251Ssam	}
1143189251Ssam
1144189251Ssam	return tncc;
1145189251Ssam
1146189251Ssamfailed:
1147189251Ssam	tncc_deinit(tncc);
1148189251Ssam	return NULL;
1149189251Ssam}
1150189251Ssam
1151189251Ssam
1152189251Ssamvoid tncc_deinit(struct tncc_data *tncc)
1153189251Ssam{
1154189251Ssam	struct tnc_if_imc *imc, *prev;
1155189251Ssam
1156189251Ssam	imc = tncc->imc;
1157189251Ssam	while (imc) {
1158189251Ssam		tncc_unload_imc(imc);
1159189251Ssam
1160189251Ssam		prev = imc;
1161189251Ssam		imc = imc->next;
1162189251Ssam		os_free(prev);
1163189251Ssam	}
1164189251Ssam
1165189251Ssam	os_free(tncc);
1166189251Ssam}
1167189251Ssam
1168189251Ssam
1169189251Ssamstatic struct wpabuf * tncc_build_soh(int ver)
1170189251Ssam{
1171189251Ssam	struct wpabuf *buf;
1172189251Ssam	u8 *tlv_len, *tlv_len2, *outer_len, *inner_len, *ssoh_len, *end;
1173189251Ssam	u8 correlation_id[24];
1174189251Ssam	/* TODO: get correct name */
1175189251Ssam	char *machinename = "wpa_supplicant@w1.fi";
1176189251Ssam
1177189251Ssam	if (os_get_random(correlation_id, sizeof(correlation_id)))
1178189251Ssam		return NULL;
1179189251Ssam	wpa_hexdump(MSG_DEBUG, "TNC: SoH Correlation ID",
1180189251Ssam		    correlation_id, sizeof(correlation_id));
1181189251Ssam
1182189251Ssam	buf = wpabuf_alloc(200);
1183189251Ssam	if (buf == NULL)
1184189251Ssam		return NULL;
1185189251Ssam
1186189251Ssam	/* Vendor-Specific TLV (Microsoft) - SoH */
1187189251Ssam	wpabuf_put_be16(buf, EAP_TLV_VENDOR_SPECIFIC_TLV); /* TLV Type */
1188189251Ssam	tlv_len = wpabuf_put(buf, 2); /* Length */
1189189251Ssam	wpabuf_put_be32(buf, EAP_VENDOR_MICROSOFT); /* Vendor_Id */
1190189251Ssam	wpabuf_put_be16(buf, 0x01); /* TLV Type - SoH TLV */
1191189251Ssam	tlv_len2 = wpabuf_put(buf, 2); /* Length */
1192189251Ssam
1193189251Ssam	/* SoH Header */
1194189251Ssam	wpabuf_put_be16(buf, EAP_TLV_VENDOR_SPECIFIC_TLV); /* Outer Type */
1195189251Ssam	outer_len = wpabuf_put(buf, 2);
1196189251Ssam	wpabuf_put_be32(buf, EAP_VENDOR_MICROSOFT); /* IANA SMI Code */
1197189251Ssam	wpabuf_put_be16(buf, ver); /* Inner Type */
1198189251Ssam	inner_len = wpabuf_put(buf, 2);
1199189251Ssam
1200189251Ssam	if (ver == 2) {
1201189251Ssam		/* SoH Mode Sub-Header */
1202189251Ssam		/* Outer Type */
1203189251Ssam		wpabuf_put_be16(buf, EAP_TLV_VENDOR_SPECIFIC_TLV);
1204189251Ssam		wpabuf_put_be16(buf, 4 + 24 + 1 + 1); /* Length */
1205189251Ssam		wpabuf_put_be32(buf, EAP_VENDOR_MICROSOFT); /* IANA SMI Code */
1206189251Ssam		/* Value: */
1207189251Ssam		wpabuf_put_data(buf, correlation_id, sizeof(correlation_id));
1208189251Ssam		wpabuf_put_u8(buf, 0x01); /* Intent Flag - Request */
1209189251Ssam		wpabuf_put_u8(buf, 0x00); /* Content-Type Flag */
1210189251Ssam	}
1211189251Ssam
1212189251Ssam	/* SSoH TLV */
1213189251Ssam	/* System-Health-Id */
1214189251Ssam	wpabuf_put_be16(buf, 0x0002); /* Type */
1215189251Ssam	wpabuf_put_be16(buf, 4); /* Length */
1216189251Ssam	wpabuf_put_be32(buf, 79616);
1217189251Ssam	/* Vendor-Specific Attribute */
1218189251Ssam	wpabuf_put_be16(buf, EAP_TLV_VENDOR_SPECIFIC_TLV);
1219189251Ssam	ssoh_len = wpabuf_put(buf, 2);
1220189251Ssam	wpabuf_put_be32(buf, EAP_VENDOR_MICROSOFT); /* IANA SMI Code */
1221189251Ssam
1222189251Ssam	/* MS-Packet-Info */
1223189251Ssam	wpabuf_put_u8(buf, SSOH_MS_PACKET_INFO);
1224189251Ssam	/* Note: IF-TNCCS-SOH v1.0 r8 claims this field to be:
1225189251Ssam	 * Reserved(4 bits) r(1 bit) Vers(3 bits), but Windows XP
1226189251Ssam	 * SP3 seems to be sending 0x11 for SSoH, i.e., r(request/response) bit
1227189251Ssam	 * would not be in the specified location.
1228189251Ssam	 * [MS-SOH] 4.0.2: Reserved(3 bits) r(1 bit) Vers(4 bits)
1229189251Ssam	 */
1230189251Ssam	wpabuf_put_u8(buf, 0x11); /* r=request, vers=1 */
1231189251Ssam
1232189251Ssam	/* MS-Machine-Inventory */
1233189251Ssam	/* TODO: get correct values; 0 = not applicable for OS */
1234189251Ssam	wpabuf_put_u8(buf, SSOH_MS_MACHINE_INVENTORY);
1235189251Ssam	wpabuf_put_be32(buf, 0); /* osVersionMajor */
1236189251Ssam	wpabuf_put_be32(buf, 0); /* osVersionMinor */
1237189251Ssam	wpabuf_put_be32(buf, 0); /* osVersionBuild */
1238189251Ssam	wpabuf_put_be16(buf, 0); /* spVersionMajor */
1239189251Ssam	wpabuf_put_be16(buf, 0); /* spVersionMinor */
1240189251Ssam	wpabuf_put_be16(buf, 0); /* procArch */
1241189251Ssam
1242189251Ssam	/* MS-MachineName */
1243189251Ssam	wpabuf_put_u8(buf, SSOH_MS_MACHINENAME);
1244189251Ssam	wpabuf_put_be16(buf, os_strlen(machinename) + 1);
1245189251Ssam	wpabuf_put_data(buf, machinename, os_strlen(machinename) + 1);
1246189251Ssam
1247189251Ssam	/* MS-CorrelationId */
1248189251Ssam	wpabuf_put_u8(buf, SSOH_MS_CORRELATIONID);
1249189251Ssam	wpabuf_put_data(buf, correlation_id, sizeof(correlation_id));
1250189251Ssam
1251189251Ssam	/* MS-Quarantine-State */
1252189251Ssam	wpabuf_put_u8(buf, SSOH_MS_QUARANTINE_STATE);
1253189251Ssam	wpabuf_put_be16(buf, 1); /* Flags: ExtState=0, f=0, qState=1 */
1254189251Ssam	wpabuf_put_be32(buf, 0xffffffff); /* ProbTime (hi) */
1255189251Ssam	wpabuf_put_be32(buf, 0xffffffff); /* ProbTime (lo) */
1256189251Ssam	wpabuf_put_be16(buf, 1); /* urlLenInBytes */
1257189251Ssam	wpabuf_put_u8(buf, 0); /* null termination for the url */
1258189251Ssam
1259189251Ssam	/* MS-Machine-Inventory-Ex */
1260189251Ssam	wpabuf_put_u8(buf, SSOH_MS_MACHINE_INVENTORY_EX);
1261189251Ssam	wpabuf_put_be32(buf, 0); /* Reserved
1262189251Ssam				  * (note: Windows XP SP3 uses 0xdecafbad) */
1263189251Ssam	wpabuf_put_u8(buf, 1); /* ProductType: Client */
1264189251Ssam
1265189251Ssam	/* Update SSoH Length */
1266189251Ssam	end = wpabuf_put(buf, 0);
1267189251Ssam	WPA_PUT_BE16(ssoh_len, end - ssoh_len - 2);
1268189251Ssam
1269189251Ssam	/* TODO: SoHReportEntry TLV (zero or more) */
1270189251Ssam
1271189251Ssam	/* Update length fields */
1272189251Ssam	end = wpabuf_put(buf, 0);
1273189251Ssam	WPA_PUT_BE16(tlv_len, end - tlv_len - 2);
1274189251Ssam	WPA_PUT_BE16(tlv_len2, end - tlv_len2 - 2);
1275189251Ssam	WPA_PUT_BE16(outer_len, end - outer_len - 2);
1276189251Ssam	WPA_PUT_BE16(inner_len, end - inner_len - 2);
1277189251Ssam
1278189251Ssam	return buf;
1279189251Ssam}
1280189251Ssam
1281189251Ssam
1282189251Ssamstruct wpabuf * tncc_process_soh_request(int ver, const u8 *data, size_t len)
1283189251Ssam{
1284189251Ssam	const u8 *pos;
1285189251Ssam
1286189251Ssam	wpa_hexdump(MSG_DEBUG, "TNC: SoH Request", data, len);
1287189251Ssam
1288189251Ssam	if (len < 12)
1289189251Ssam		return NULL;
1290189251Ssam
1291189251Ssam	/* SoH Request */
1292189251Ssam	pos = data;
1293189251Ssam
1294189251Ssam	/* TLV Type */
1295189251Ssam	if (WPA_GET_BE16(pos) != EAP_TLV_VENDOR_SPECIFIC_TLV)
1296189251Ssam		return NULL;
1297189251Ssam	pos += 2;
1298189251Ssam
1299189251Ssam	/* Length */
1300189251Ssam	if (WPA_GET_BE16(pos) < 8)
1301189251Ssam		return NULL;
1302189251Ssam	pos += 2;
1303189251Ssam
1304189251Ssam	/* Vendor_Id */
1305189251Ssam	if (WPA_GET_BE32(pos) != EAP_VENDOR_MICROSOFT)
1306189251Ssam		return NULL;
1307189251Ssam	pos += 4;
1308189251Ssam
1309189251Ssam	/* TLV Type */
1310189251Ssam	if (WPA_GET_BE16(pos) != 0x02 /* SoH request TLV */)
1311189251Ssam		return NULL;
1312189251Ssam
1313189251Ssam	wpa_printf(MSG_DEBUG, "TNC: SoH Request TLV received");
1314189251Ssam
1315189251Ssam	return tncc_build_soh(2);
1316189251Ssam}
1317