eap_tls_common.h revision 281806
1189251Ssam/* 2214734Srpaulo * EAP-TLS/PEAP/TTLS/FAST server common functions 3214734Srpaulo * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi> 4189251Ssam * 5252726Srpaulo * This software may be distributed under the terms of the BSD license. 6252726Srpaulo * See README for more details. 7189251Ssam */ 8189251Ssam 9189251Ssam#ifndef EAP_TLS_COMMON_H 10189251Ssam#define EAP_TLS_COMMON_H 11189251Ssam 12214734Srpaulo/** 13214734Srpaulo * struct eap_ssl_data - TLS data for EAP methods 14214734Srpaulo */ 15189251Ssamstruct eap_ssl_data { 16214734Srpaulo /** 17214734Srpaulo * conn - TLS connection context data from tls_connection_init() 18214734Srpaulo */ 19189251Ssam struct tls_connection *conn; 20189251Ssam 21214734Srpaulo /** 22214734Srpaulo * tls_out - TLS message to be sent out in fragments 23214734Srpaulo */ 24214734Srpaulo struct wpabuf *tls_out; 25214734Srpaulo 26214734Srpaulo /** 27214734Srpaulo * tls_out_pos - The current position in the outgoing TLS message 28214734Srpaulo */ 29214734Srpaulo size_t tls_out_pos; 30214734Srpaulo 31214734Srpaulo /** 32214734Srpaulo * tls_out_limit - Maximum fragment size for outgoing TLS messages 33214734Srpaulo */ 34189251Ssam size_t tls_out_limit; 35189251Ssam 36214734Srpaulo /** 37214734Srpaulo * tls_in - Received TLS message buffer for re-assembly 38214734Srpaulo */ 39214734Srpaulo struct wpabuf *tls_in; 40214734Srpaulo 41214734Srpaulo /** 42214734Srpaulo * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel) 43214734Srpaulo */ 44189251Ssam int phase2; 45189251Ssam 46214734Srpaulo /** 47214734Srpaulo * eap - EAP state machine allocated with eap_server_sm_init() 48214734Srpaulo */ 49189251Ssam struct eap_sm *eap; 50189251Ssam 51189251Ssam enum { MSG, FRAG_ACK, WAIT_FRAG_ACK } state; 52189251Ssam struct wpabuf tmpbuf; 53189251Ssam}; 54189251Ssam 55189251Ssam 56189251Ssam/* EAP TLS Flags */ 57189251Ssam#define EAP_TLS_FLAGS_LENGTH_INCLUDED 0x80 58189251Ssam#define EAP_TLS_FLAGS_MORE_FRAGMENTS 0x40 59189251Ssam#define EAP_TLS_FLAGS_START 0x20 60189251Ssam#define EAP_TLS_VERSION_MASK 0x07 61189251Ssam 62189251Ssam /* could be up to 128 bytes, but only the first 64 bytes are used */ 63189251Ssam#define EAP_TLS_KEY_LEN 64 64189251Ssam 65252726Srpaulo/* dummy type used as a flag for UNAUTH-TLS */ 66252726Srpaulo#define EAP_UNAUTH_TLS_TYPE 255 67281806Srpaulo#define EAP_WFA_UNAUTH_TLS_TYPE 254 68189251Ssam 69252726Srpaulo 70252726Srpaulostruct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len, 71252726Srpaulo u8 code, u8 identifier); 72189251Ssamint eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data, 73189251Ssam int verify_peer); 74189251Ssamvoid eap_server_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data); 75189251Ssamu8 * eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data, 76189251Ssam char *label, size_t len); 77281806Srpaulou8 * eap_server_tls_derive_session_id(struct eap_sm *sm, 78281806Srpaulo struct eap_ssl_data *data, u8 eap_type, 79281806Srpaulo size_t *len); 80189251Ssamstruct wpabuf * eap_server_tls_build_msg(struct eap_ssl_data *data, 81189251Ssam int eap_type, int version, u8 id); 82189251Ssamstruct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version); 83189251Ssamint eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data); 84189251Ssamstruct wpabuf * eap_server_tls_encrypt(struct eap_sm *sm, 85189251Ssam struct eap_ssl_data *data, 86214734Srpaulo const struct wpabuf *plain); 87189251Ssamint eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data, 88189251Ssam struct wpabuf *respData, void *priv, int eap_type, 89189251Ssam int (*proc_version)(struct eap_sm *sm, void *priv, 90189251Ssam int peer_version), 91189251Ssam void (*proc_msg)(struct eap_sm *sm, void *priv, 92189251Ssam const struct wpabuf *respData)); 93189251Ssam 94189251Ssam#endif /* EAP_TLS_COMMON_H */ 95