eap_tls_common.h revision 281806
1189251Ssam/*
2214734Srpaulo * EAP-TLS/PEAP/TTLS/FAST server common functions
3214734Srpaulo * Copyright (c) 2004-2009, Jouni Malinen <j@w1.fi>
4189251Ssam *
5252726Srpaulo * This software may be distributed under the terms of the BSD license.
6252726Srpaulo * See README for more details.
7189251Ssam */
8189251Ssam
9189251Ssam#ifndef EAP_TLS_COMMON_H
10189251Ssam#define EAP_TLS_COMMON_H
11189251Ssam
12214734Srpaulo/**
13214734Srpaulo * struct eap_ssl_data - TLS data for EAP methods
14214734Srpaulo */
15189251Ssamstruct eap_ssl_data {
16214734Srpaulo	/**
17214734Srpaulo	 * conn - TLS connection context data from tls_connection_init()
18214734Srpaulo	 */
19189251Ssam	struct tls_connection *conn;
20189251Ssam
21214734Srpaulo	/**
22214734Srpaulo	 * tls_out - TLS message to be sent out in fragments
23214734Srpaulo	 */
24214734Srpaulo	struct wpabuf *tls_out;
25214734Srpaulo
26214734Srpaulo	/**
27214734Srpaulo	 * tls_out_pos - The current position in the outgoing TLS message
28214734Srpaulo	 */
29214734Srpaulo	size_t tls_out_pos;
30214734Srpaulo
31214734Srpaulo	/**
32214734Srpaulo	 * tls_out_limit - Maximum fragment size for outgoing TLS messages
33214734Srpaulo	 */
34189251Ssam	size_t tls_out_limit;
35189251Ssam
36214734Srpaulo	/**
37214734Srpaulo	 * tls_in - Received TLS message buffer for re-assembly
38214734Srpaulo	 */
39214734Srpaulo	struct wpabuf *tls_in;
40214734Srpaulo
41214734Srpaulo	/**
42214734Srpaulo	 * phase2 - Whether this TLS connection is used in EAP phase 2 (tunnel)
43214734Srpaulo	 */
44189251Ssam	int phase2;
45189251Ssam
46214734Srpaulo	/**
47214734Srpaulo	 * eap - EAP state machine allocated with eap_server_sm_init()
48214734Srpaulo	 */
49189251Ssam	struct eap_sm *eap;
50189251Ssam
51189251Ssam	enum { MSG, FRAG_ACK, WAIT_FRAG_ACK } state;
52189251Ssam	struct wpabuf tmpbuf;
53189251Ssam};
54189251Ssam
55189251Ssam
56189251Ssam/* EAP TLS Flags */
57189251Ssam#define EAP_TLS_FLAGS_LENGTH_INCLUDED 0x80
58189251Ssam#define EAP_TLS_FLAGS_MORE_FRAGMENTS 0x40
59189251Ssam#define EAP_TLS_FLAGS_START 0x20
60189251Ssam#define EAP_TLS_VERSION_MASK 0x07
61189251Ssam
62189251Ssam /* could be up to 128 bytes, but only the first 64 bytes are used */
63189251Ssam#define EAP_TLS_KEY_LEN 64
64189251Ssam
65252726Srpaulo/* dummy type used as a flag for UNAUTH-TLS */
66252726Srpaulo#define EAP_UNAUTH_TLS_TYPE 255
67281806Srpaulo#define EAP_WFA_UNAUTH_TLS_TYPE 254
68189251Ssam
69252726Srpaulo
70252726Srpaulostruct wpabuf * eap_tls_msg_alloc(EapType type, size_t payload_len,
71252726Srpaulo				  u8 code, u8 identifier);
72189251Ssamint eap_server_tls_ssl_init(struct eap_sm *sm, struct eap_ssl_data *data,
73189251Ssam			    int verify_peer);
74189251Ssamvoid eap_server_tls_ssl_deinit(struct eap_sm *sm, struct eap_ssl_data *data);
75189251Ssamu8 * eap_server_tls_derive_key(struct eap_sm *sm, struct eap_ssl_data *data,
76189251Ssam			       char *label, size_t len);
77281806Srpaulou8 * eap_server_tls_derive_session_id(struct eap_sm *sm,
78281806Srpaulo				      struct eap_ssl_data *data, u8 eap_type,
79281806Srpaulo				      size_t *len);
80189251Ssamstruct wpabuf * eap_server_tls_build_msg(struct eap_ssl_data *data,
81189251Ssam					 int eap_type, int version, u8 id);
82189251Ssamstruct wpabuf * eap_server_tls_build_ack(u8 id, int eap_type, int version);
83189251Ssamint eap_server_tls_phase1(struct eap_sm *sm, struct eap_ssl_data *data);
84189251Ssamstruct wpabuf * eap_server_tls_encrypt(struct eap_sm *sm,
85189251Ssam				       struct eap_ssl_data *data,
86214734Srpaulo				       const struct wpabuf *plain);
87189251Ssamint eap_server_tls_process(struct eap_sm *sm, struct eap_ssl_data *data,
88189251Ssam			   struct wpabuf *respData, void *priv, int eap_type,
89189251Ssam			   int (*proc_version)(struct eap_sm *sm, void *priv,
90189251Ssam					       int peer_version),
91189251Ssam			   void (*proc_msg)(struct eap_sm *sm, void *priv,
92189251Ssam					    const struct wpabuf *respData));
93189251Ssam
94189251Ssam#endif /* EAP_TLS_COMMON_H */
95