139beb93cSSam Leffler /* 239beb93cSSam Leffler * WPA Supplicant - test code 35b9c547cSRui Paulo * Copyright (c) 2003-2013, Jouni Malinen <j@w1.fi> 439beb93cSSam Leffler * 5f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license. 6f05cddf9SRui Paulo * See README for more details. 739beb93cSSam Leffler * 839beb93cSSam Leffler * IEEE 802.1X Supplicant test code (to be used in place of wpa_supplicant.c. 939beb93cSSam Leffler * Not used in production version. 1039beb93cSSam Leffler */ 1139beb93cSSam Leffler 1239beb93cSSam Leffler #include "includes.h" 1339beb93cSSam Leffler #include <assert.h> 1439beb93cSSam Leffler 1539beb93cSSam Leffler #include "common.h" 16f05cddf9SRui Paulo #include "utils/ext_password.h" 17780fb4a2SCy Schubert #include "common/version.h" 18*206b73d0SCy Schubert #include "crypto/tls.h" 1939beb93cSSam Leffler #include "config.h" 2039beb93cSSam Leffler #include "eapol_supp/eapol_supp_sm.h" 2139beb93cSSam Leffler #include "eap_peer/eap.h" 22f05cddf9SRui Paulo #include "eap_server/eap_methods.h" 2339beb93cSSam Leffler #include "eloop.h" 24f05cddf9SRui Paulo #include "utils/base64.h" 25e28a4053SRui Paulo #include "rsn_supp/wpa.h" 2639beb93cSSam Leffler #include "wpa_supplicant_i.h" 2739beb93cSSam Leffler #include "radius/radius.h" 2839beb93cSSam Leffler #include "radius/radius_client.h" 29f05cddf9SRui Paulo #include "common/wpa_ctrl.h" 3039beb93cSSam Leffler #include "ctrl_iface.h" 3139beb93cSSam Leffler #include "pcsc_funcs.h" 325b9c547cSRui Paulo #include "wpas_glue.h" 3339beb93cSSam Leffler 3439beb93cSSam Leffler 35325151a3SRui Paulo const struct wpa_driver_ops *const wpa_drivers[] = { NULL }; 3639beb93cSSam Leffler 3739beb93cSSam Leffler 3839beb93cSSam Leffler struct extra_radius_attr { 3939beb93cSSam Leffler u8 type; 4039beb93cSSam Leffler char syntax; 4139beb93cSSam Leffler char *data; 4239beb93cSSam Leffler struct extra_radius_attr *next; 4339beb93cSSam Leffler }; 4439beb93cSSam Leffler 4539beb93cSSam Leffler struct eapol_test_data { 4639beb93cSSam Leffler struct wpa_supplicant *wpa_s; 4739beb93cSSam Leffler 4839beb93cSSam Leffler int eapol_test_num_reauths; 4939beb93cSSam Leffler int no_mppe_keys; 5039beb93cSSam Leffler int num_mppe_ok, num_mppe_mismatch; 515b9c547cSRui Paulo int req_eap_key_name; 5239beb93cSSam Leffler 5339beb93cSSam Leffler u8 radius_identifier; 5439beb93cSSam Leffler struct radius_msg *last_recv_radius; 5539beb93cSSam Leffler struct in_addr own_ip_addr; 5639beb93cSSam Leffler struct radius_client_data *radius; 5739beb93cSSam Leffler struct hostapd_radius_servers *radius_conf; 5839beb93cSSam Leffler 59f05cddf9SRui Paulo /* last received EAP Response from Authentication Server */ 60f05cddf9SRui Paulo struct wpabuf *last_eap_radius; 6139beb93cSSam Leffler 6239beb93cSSam Leffler u8 authenticator_pmk[PMK_LEN]; 6339beb93cSSam Leffler size_t authenticator_pmk_len; 645b9c547cSRui Paulo u8 authenticator_eap_key_name[256]; 655b9c547cSRui Paulo size_t authenticator_eap_key_name_len; 6639beb93cSSam Leffler int radius_access_accept_received; 6739beb93cSSam Leffler int radius_access_reject_received; 6839beb93cSSam Leffler int auth_timed_out; 6939beb93cSSam Leffler 7039beb93cSSam Leffler u8 *eap_identity; 7139beb93cSSam Leffler size_t eap_identity_len; 7239beb93cSSam Leffler 7339beb93cSSam Leffler char *connect_info; 7439beb93cSSam Leffler u8 own_addr[ETH_ALEN]; 7539beb93cSSam Leffler struct extra_radius_attr *extra_attrs; 76f05cddf9SRui Paulo 77f05cddf9SRui Paulo FILE *server_cert_file; 785b9c547cSRui Paulo 795b9c547cSRui Paulo const char *pcsc_reader; 805b9c547cSRui Paulo const char *pcsc_pin; 81325151a3SRui Paulo 82325151a3SRui Paulo unsigned int ctrl_iface:1; 83325151a3SRui Paulo unsigned int id_req_sent:1; 8439beb93cSSam Leffler }; 8539beb93cSSam Leffler 8639beb93cSSam Leffler static struct eapol_test_data eapol_test; 8739beb93cSSam Leffler 8839beb93cSSam Leffler 8939beb93cSSam Leffler static void send_eap_request_identity(void *eloop_ctx, void *timeout_ctx); 9039beb93cSSam Leffler 9139beb93cSSam Leffler 9239beb93cSSam Leffler static void hostapd_logger_cb(void *ctx, const u8 *addr, unsigned int module, 9339beb93cSSam Leffler int level, const char *txt, size_t len) 9439beb93cSSam Leffler { 9539beb93cSSam Leffler if (addr) 9639beb93cSSam Leffler wpa_printf(MSG_DEBUG, "STA " MACSTR ": %s\n", 9739beb93cSSam Leffler MAC2STR(addr), txt); 9839beb93cSSam Leffler else 9939beb93cSSam Leffler wpa_printf(MSG_DEBUG, "%s", txt); 10039beb93cSSam Leffler } 10139beb93cSSam Leffler 10239beb93cSSam Leffler 10339beb93cSSam Leffler static int add_extra_attr(struct radius_msg *msg, 10439beb93cSSam Leffler struct extra_radius_attr *attr) 10539beb93cSSam Leffler { 10639beb93cSSam Leffler size_t len; 10739beb93cSSam Leffler char *pos; 10839beb93cSSam Leffler u32 val; 109f05cddf9SRui Paulo char buf[RADIUS_MAX_ATTR_LEN + 1]; 11039beb93cSSam Leffler 11139beb93cSSam Leffler switch (attr->syntax) { 11239beb93cSSam Leffler case 's': 11339beb93cSSam Leffler os_snprintf(buf, sizeof(buf), "%s", attr->data); 11439beb93cSSam Leffler len = os_strlen(buf); 11539beb93cSSam Leffler break; 11639beb93cSSam Leffler case 'n': 11739beb93cSSam Leffler buf[0] = '\0'; 11839beb93cSSam Leffler len = 1; 11939beb93cSSam Leffler break; 12039beb93cSSam Leffler case 'x': 12139beb93cSSam Leffler pos = attr->data; 12239beb93cSSam Leffler if (pos[0] == '0' && pos[1] == 'x') 12339beb93cSSam Leffler pos += 2; 12439beb93cSSam Leffler len = os_strlen(pos); 125f05cddf9SRui Paulo if ((len & 1) || (len / 2) > RADIUS_MAX_ATTR_LEN) { 12639beb93cSSam Leffler printf("Invalid extra attribute hexstring\n"); 12739beb93cSSam Leffler return -1; 12839beb93cSSam Leffler } 12939beb93cSSam Leffler len /= 2; 13039beb93cSSam Leffler if (hexstr2bin(pos, (u8 *) buf, len) < 0) { 13139beb93cSSam Leffler printf("Invalid extra attribute hexstring\n"); 13239beb93cSSam Leffler return -1; 13339beb93cSSam Leffler } 13439beb93cSSam Leffler break; 13539beb93cSSam Leffler case 'd': 13639beb93cSSam Leffler val = htonl(atoi(attr->data)); 13739beb93cSSam Leffler os_memcpy(buf, &val, 4); 13839beb93cSSam Leffler len = 4; 13939beb93cSSam Leffler break; 14039beb93cSSam Leffler default: 14139beb93cSSam Leffler printf("Incorrect extra attribute syntax specification\n"); 14239beb93cSSam Leffler return -1; 14339beb93cSSam Leffler } 14439beb93cSSam Leffler 14539beb93cSSam Leffler if (!radius_msg_add_attr(msg, attr->type, (u8 *) buf, len)) { 14639beb93cSSam Leffler printf("Could not add attribute %d\n", attr->type); 14739beb93cSSam Leffler return -1; 14839beb93cSSam Leffler } 14939beb93cSSam Leffler 15039beb93cSSam Leffler return 0; 15139beb93cSSam Leffler } 15239beb93cSSam Leffler 15339beb93cSSam Leffler 15439beb93cSSam Leffler static int add_extra_attrs(struct radius_msg *msg, 15539beb93cSSam Leffler struct extra_radius_attr *attrs) 15639beb93cSSam Leffler { 15739beb93cSSam Leffler struct extra_radius_attr *p; 15839beb93cSSam Leffler for (p = attrs; p; p = p->next) { 15939beb93cSSam Leffler if (add_extra_attr(msg, p) < 0) 16039beb93cSSam Leffler return -1; 16139beb93cSSam Leffler } 16239beb93cSSam Leffler return 0; 16339beb93cSSam Leffler } 16439beb93cSSam Leffler 16539beb93cSSam Leffler 16639beb93cSSam Leffler static struct extra_radius_attr * 16739beb93cSSam Leffler find_extra_attr(struct extra_radius_attr *attrs, u8 type) 16839beb93cSSam Leffler { 16939beb93cSSam Leffler struct extra_radius_attr *p; 17039beb93cSSam Leffler for (p = attrs; p; p = p->next) { 17139beb93cSSam Leffler if (p->type == type) 17239beb93cSSam Leffler return p; 17339beb93cSSam Leffler } 17439beb93cSSam Leffler return NULL; 17539beb93cSSam Leffler } 17639beb93cSSam Leffler 17739beb93cSSam Leffler 17839beb93cSSam Leffler static void ieee802_1x_encapsulate_radius(struct eapol_test_data *e, 17939beb93cSSam Leffler const u8 *eap, size_t len) 18039beb93cSSam Leffler { 18139beb93cSSam Leffler struct radius_msg *msg; 182f05cddf9SRui Paulo char buf[RADIUS_MAX_ATTR_LEN + 1]; 18339beb93cSSam Leffler const struct eap_hdr *hdr; 18439beb93cSSam Leffler const u8 *pos; 18539beb93cSSam Leffler 18639beb93cSSam Leffler wpa_printf(MSG_DEBUG, "Encapsulating EAP message into a RADIUS " 18739beb93cSSam Leffler "packet"); 18839beb93cSSam Leffler 18939beb93cSSam Leffler e->radius_identifier = radius_client_get_id(e->radius); 19039beb93cSSam Leffler msg = radius_msg_new(RADIUS_CODE_ACCESS_REQUEST, 19139beb93cSSam Leffler e->radius_identifier); 19239beb93cSSam Leffler if (msg == NULL) { 19339beb93cSSam Leffler printf("Could not create net RADIUS packet\n"); 19439beb93cSSam Leffler return; 19539beb93cSSam Leffler } 19639beb93cSSam Leffler 197780fb4a2SCy Schubert radius_msg_make_authenticator(msg); 19839beb93cSSam Leffler 19939beb93cSSam Leffler hdr = (const struct eap_hdr *) eap; 20039beb93cSSam Leffler pos = (const u8 *) (hdr + 1); 20139beb93cSSam Leffler if (len > sizeof(*hdr) && hdr->code == EAP_CODE_RESPONSE && 20239beb93cSSam Leffler pos[0] == EAP_TYPE_IDENTITY) { 20339beb93cSSam Leffler pos++; 20439beb93cSSam Leffler os_free(e->eap_identity); 20539beb93cSSam Leffler e->eap_identity_len = len - sizeof(*hdr) - 1; 20639beb93cSSam Leffler e->eap_identity = os_malloc(e->eap_identity_len); 20739beb93cSSam Leffler if (e->eap_identity) { 20839beb93cSSam Leffler os_memcpy(e->eap_identity, pos, e->eap_identity_len); 20939beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "Learned identity from " 21039beb93cSSam Leffler "EAP-Response-Identity", 21139beb93cSSam Leffler e->eap_identity, e->eap_identity_len); 21239beb93cSSam Leffler } 21339beb93cSSam Leffler } 21439beb93cSSam Leffler 21539beb93cSSam Leffler if (e->eap_identity && 21639beb93cSSam Leffler !radius_msg_add_attr(msg, RADIUS_ATTR_USER_NAME, 21739beb93cSSam Leffler e->eap_identity, e->eap_identity_len)) { 21839beb93cSSam Leffler printf("Could not add User-Name\n"); 21939beb93cSSam Leffler goto fail; 22039beb93cSSam Leffler } 22139beb93cSSam Leffler 2225b9c547cSRui Paulo if (e->req_eap_key_name && 2235b9c547cSRui Paulo !radius_msg_add_attr(msg, RADIUS_ATTR_EAP_KEY_NAME, (u8 *) "\0", 2245b9c547cSRui Paulo 1)) { 2255b9c547cSRui Paulo printf("Could not add EAP-Key-Name\n"); 2265b9c547cSRui Paulo goto fail; 2275b9c547cSRui Paulo } 2285b9c547cSRui Paulo 22939beb93cSSam Leffler if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_NAS_IP_ADDRESS) && 23039beb93cSSam Leffler !radius_msg_add_attr(msg, RADIUS_ATTR_NAS_IP_ADDRESS, 23139beb93cSSam Leffler (u8 *) &e->own_ip_addr, 4)) { 23239beb93cSSam Leffler printf("Could not add NAS-IP-Address\n"); 23339beb93cSSam Leffler goto fail; 23439beb93cSSam Leffler } 23539beb93cSSam Leffler 23639beb93cSSam Leffler os_snprintf(buf, sizeof(buf), RADIUS_802_1X_ADDR_FORMAT, 23739beb93cSSam Leffler MAC2STR(e->wpa_s->own_addr)); 23839beb93cSSam Leffler if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_CALLING_STATION_ID) 23939beb93cSSam Leffler && 24039beb93cSSam Leffler !radius_msg_add_attr(msg, RADIUS_ATTR_CALLING_STATION_ID, 24139beb93cSSam Leffler (u8 *) buf, os_strlen(buf))) { 24239beb93cSSam Leffler printf("Could not add Calling-Station-Id\n"); 24339beb93cSSam Leffler goto fail; 24439beb93cSSam Leffler } 24539beb93cSSam Leffler 24639beb93cSSam Leffler /* TODO: should probably check MTU from driver config; 2304 is max for 24739beb93cSSam Leffler * IEEE 802.11, but use 1400 to avoid problems with too large packets 24839beb93cSSam Leffler */ 24939beb93cSSam Leffler if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_FRAMED_MTU) && 25039beb93cSSam Leffler !radius_msg_add_attr_int32(msg, RADIUS_ATTR_FRAMED_MTU, 1400)) { 25139beb93cSSam Leffler printf("Could not add Framed-MTU\n"); 25239beb93cSSam Leffler goto fail; 25339beb93cSSam Leffler } 25439beb93cSSam Leffler 25539beb93cSSam Leffler if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_NAS_PORT_TYPE) && 25639beb93cSSam Leffler !radius_msg_add_attr_int32(msg, RADIUS_ATTR_NAS_PORT_TYPE, 25739beb93cSSam Leffler RADIUS_NAS_PORT_TYPE_IEEE_802_11)) { 25839beb93cSSam Leffler printf("Could not add NAS-Port-Type\n"); 25939beb93cSSam Leffler goto fail; 26039beb93cSSam Leffler } 26139beb93cSSam Leffler 262780fb4a2SCy Schubert if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_SERVICE_TYPE) && 263780fb4a2SCy Schubert !radius_msg_add_attr_int32(msg, RADIUS_ATTR_SERVICE_TYPE, 264780fb4a2SCy Schubert RADIUS_SERVICE_TYPE_FRAMED)) { 265780fb4a2SCy Schubert printf("Could not add Service-Type\n"); 266780fb4a2SCy Schubert goto fail; 267780fb4a2SCy Schubert } 268780fb4a2SCy Schubert 26939beb93cSSam Leffler os_snprintf(buf, sizeof(buf), "%s", e->connect_info); 27039beb93cSSam Leffler if (!find_extra_attr(e->extra_attrs, RADIUS_ATTR_CONNECT_INFO) && 27139beb93cSSam Leffler !radius_msg_add_attr(msg, RADIUS_ATTR_CONNECT_INFO, 27239beb93cSSam Leffler (u8 *) buf, os_strlen(buf))) { 27339beb93cSSam Leffler printf("Could not add Connect-Info\n"); 27439beb93cSSam Leffler goto fail; 27539beb93cSSam Leffler } 27639beb93cSSam Leffler 27739beb93cSSam Leffler if (add_extra_attrs(msg, e->extra_attrs) < 0) 27839beb93cSSam Leffler goto fail; 27939beb93cSSam Leffler 28039beb93cSSam Leffler if (eap && !radius_msg_add_eap(msg, eap, len)) { 28139beb93cSSam Leffler printf("Could not add EAP-Message\n"); 28239beb93cSSam Leffler goto fail; 28339beb93cSSam Leffler } 28439beb93cSSam Leffler 28539beb93cSSam Leffler /* State attribute must be copied if and only if this packet is 28639beb93cSSam Leffler * Access-Request reply to the previous Access-Challenge */ 287e28a4053SRui Paulo if (e->last_recv_radius && 288e28a4053SRui Paulo radius_msg_get_hdr(e->last_recv_radius)->code == 28939beb93cSSam Leffler RADIUS_CODE_ACCESS_CHALLENGE) { 29039beb93cSSam Leffler int res = radius_msg_copy_attr(msg, e->last_recv_radius, 29139beb93cSSam Leffler RADIUS_ATTR_STATE); 29239beb93cSSam Leffler if (res < 0) { 29339beb93cSSam Leffler printf("Could not copy State attribute from previous " 29439beb93cSSam Leffler "Access-Challenge\n"); 29539beb93cSSam Leffler goto fail; 29639beb93cSSam Leffler } 29739beb93cSSam Leffler if (res > 0) { 29839beb93cSSam Leffler wpa_printf(MSG_DEBUG, " Copied RADIUS State " 29939beb93cSSam Leffler "Attribute"); 30039beb93cSSam Leffler } 30139beb93cSSam Leffler } 30239beb93cSSam Leffler 303f05cddf9SRui Paulo if (radius_client_send(e->radius, msg, RADIUS_AUTH, e->wpa_s->own_addr) 304f05cddf9SRui Paulo < 0) 305f05cddf9SRui Paulo goto fail; 30639beb93cSSam Leffler return; 30739beb93cSSam Leffler 30839beb93cSSam Leffler fail: 30939beb93cSSam Leffler radius_msg_free(msg); 31039beb93cSSam Leffler } 31139beb93cSSam Leffler 31239beb93cSSam Leffler 31339beb93cSSam Leffler static int eapol_test_eapol_send(void *ctx, int type, const u8 *buf, 31439beb93cSSam Leffler size_t len) 31539beb93cSSam Leffler { 31639beb93cSSam Leffler printf("WPA: eapol_test_eapol_send(type=%d len=%lu)\n", 31739beb93cSSam Leffler type, (unsigned long) len); 31839beb93cSSam Leffler if (type == IEEE802_1X_TYPE_EAP_PACKET) { 31939beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "TX EAP -> RADIUS", buf, len); 32039beb93cSSam Leffler ieee802_1x_encapsulate_radius(&eapol_test, buf, len); 32139beb93cSSam Leffler } 32239beb93cSSam Leffler return 0; 32339beb93cSSam Leffler } 32439beb93cSSam Leffler 32539beb93cSSam Leffler 32639beb93cSSam Leffler static void eapol_test_set_config_blob(void *ctx, 32739beb93cSSam Leffler struct wpa_config_blob *blob) 32839beb93cSSam Leffler { 329f05cddf9SRui Paulo struct eapol_test_data *e = ctx; 330f05cddf9SRui Paulo wpa_config_set_blob(e->wpa_s->conf, blob); 33139beb93cSSam Leffler } 33239beb93cSSam Leffler 33339beb93cSSam Leffler 33439beb93cSSam Leffler static const struct wpa_config_blob * 33539beb93cSSam Leffler eapol_test_get_config_blob(void *ctx, const char *name) 33639beb93cSSam Leffler { 337f05cddf9SRui Paulo struct eapol_test_data *e = ctx; 338f05cddf9SRui Paulo return wpa_config_get_blob(e->wpa_s->conf, name); 33939beb93cSSam Leffler } 34039beb93cSSam Leffler 34139beb93cSSam Leffler 34239beb93cSSam Leffler static void eapol_test_eapol_done_cb(void *ctx) 34339beb93cSSam Leffler { 344325151a3SRui Paulo struct eapol_test_data *e = ctx; 345325151a3SRui Paulo 34639beb93cSSam Leffler printf("WPA: EAPOL processing complete\n"); 347325151a3SRui Paulo wpa_supplicant_cancel_auth_timeout(e->wpa_s); 348325151a3SRui Paulo wpa_supplicant_set_state(e->wpa_s, WPA_COMPLETED); 34939beb93cSSam Leffler } 35039beb93cSSam Leffler 35139beb93cSSam Leffler 35239beb93cSSam Leffler static void eapol_sm_reauth(void *eloop_ctx, void *timeout_ctx) 35339beb93cSSam Leffler { 35439beb93cSSam Leffler struct eapol_test_data *e = eloop_ctx; 35539beb93cSSam Leffler printf("\n\n\n\n\neapol_test: Triggering EAP reauthentication\n\n"); 35639beb93cSSam Leffler e->radius_access_accept_received = 0; 35739beb93cSSam Leffler send_eap_request_identity(e->wpa_s, NULL); 35839beb93cSSam Leffler } 35939beb93cSSam Leffler 36039beb93cSSam Leffler 36139beb93cSSam Leffler static int eapol_test_compare_pmk(struct eapol_test_data *e) 36239beb93cSSam Leffler { 36339beb93cSSam Leffler u8 pmk[PMK_LEN]; 36439beb93cSSam Leffler int ret = 1; 3655b9c547cSRui Paulo const u8 *sess_id; 3665b9c547cSRui Paulo size_t sess_id_len; 36739beb93cSSam Leffler 36839beb93cSSam Leffler if (eapol_sm_get_key(e->wpa_s->eapol, pmk, PMK_LEN) == 0) { 36939beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "PMK from EAPOL", pmk, PMK_LEN); 37039beb93cSSam Leffler if (os_memcmp(pmk, e->authenticator_pmk, PMK_LEN) != 0) { 37139beb93cSSam Leffler printf("WARNING: PMK mismatch\n"); 37239beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "PMK from AS", 37339beb93cSSam Leffler e->authenticator_pmk, PMK_LEN); 37439beb93cSSam Leffler } else if (e->radius_access_accept_received) 37539beb93cSSam Leffler ret = 0; 37639beb93cSSam Leffler } else if (e->authenticator_pmk_len == 16 && 37739beb93cSSam Leffler eapol_sm_get_key(e->wpa_s->eapol, pmk, 16) == 0) { 37839beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "LEAP PMK from EAPOL", pmk, 16); 37939beb93cSSam Leffler if (os_memcmp(pmk, e->authenticator_pmk, 16) != 0) { 38039beb93cSSam Leffler printf("WARNING: PMK mismatch\n"); 38139beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "PMK from AS", 38239beb93cSSam Leffler e->authenticator_pmk, 16); 38339beb93cSSam Leffler } else if (e->radius_access_accept_received) 38439beb93cSSam Leffler ret = 0; 38539beb93cSSam Leffler } else if (e->radius_access_accept_received && e->no_mppe_keys) { 38639beb93cSSam Leffler /* No keying material expected */ 38739beb93cSSam Leffler ret = 0; 38839beb93cSSam Leffler } 38939beb93cSSam Leffler 39039beb93cSSam Leffler if (ret && !e->no_mppe_keys) 39139beb93cSSam Leffler e->num_mppe_mismatch++; 39239beb93cSSam Leffler else if (!e->no_mppe_keys) 39339beb93cSSam Leffler e->num_mppe_ok++; 39439beb93cSSam Leffler 3955b9c547cSRui Paulo sess_id = eapol_sm_get_session_id(e->wpa_s->eapol, &sess_id_len); 3965b9c547cSRui Paulo if (!sess_id) 3975b9c547cSRui Paulo return ret; 3985b9c547cSRui Paulo if (e->authenticator_eap_key_name_len == 0) { 3995b9c547cSRui Paulo wpa_printf(MSG_INFO, "No EAP-Key-Name received from server"); 4005b9c547cSRui Paulo return ret; 4015b9c547cSRui Paulo } 4025b9c547cSRui Paulo 4035b9c547cSRui Paulo if (e->authenticator_eap_key_name_len != sess_id_len || 4045b9c547cSRui Paulo os_memcmp(e->authenticator_eap_key_name, sess_id, sess_id_len) != 0) 4055b9c547cSRui Paulo { 4065b9c547cSRui Paulo wpa_printf(MSG_INFO, 4075b9c547cSRui Paulo "Locally derived EAP Session-Id does not match EAP-Key-Name from server"); 4085b9c547cSRui Paulo wpa_hexdump(MSG_DEBUG, "EAP Session-Id", sess_id, sess_id_len); 4095b9c547cSRui Paulo wpa_hexdump(MSG_DEBUG, "EAP-Key-Name from server", 4105b9c547cSRui Paulo e->authenticator_eap_key_name, 4115b9c547cSRui Paulo e->authenticator_eap_key_name_len); 4125b9c547cSRui Paulo } else { 4135b9c547cSRui Paulo wpa_printf(MSG_INFO, 4145b9c547cSRui Paulo "Locally derived EAP Session-Id matches EAP-Key-Name from server"); 4155b9c547cSRui Paulo } 4165b9c547cSRui Paulo 41739beb93cSSam Leffler return ret; 41839beb93cSSam Leffler } 41939beb93cSSam Leffler 42039beb93cSSam Leffler 4215b9c547cSRui Paulo static void eapol_sm_cb(struct eapol_sm *eapol, enum eapol_supp_result result, 4225b9c547cSRui Paulo void *ctx) 42339beb93cSSam Leffler { 42439beb93cSSam Leffler struct eapol_test_data *e = ctx; 4255b9c547cSRui Paulo printf("eapol_sm_cb: result=%d\n", result); 426325151a3SRui Paulo e->id_req_sent = 0; 427325151a3SRui Paulo if (e->ctrl_iface) 428325151a3SRui Paulo return; 42939beb93cSSam Leffler e->eapol_test_num_reauths--; 43039beb93cSSam Leffler if (e->eapol_test_num_reauths < 0) 43139beb93cSSam Leffler eloop_terminate(); 43239beb93cSSam Leffler else { 43339beb93cSSam Leffler eapol_test_compare_pmk(e); 43439beb93cSSam Leffler eloop_register_timeout(0, 100000, eapol_sm_reauth, e, NULL); 43539beb93cSSam Leffler } 43639beb93cSSam Leffler } 43739beb93cSSam Leffler 43839beb93cSSam Leffler 439f05cddf9SRui Paulo static void eapol_test_write_cert(FILE *f, const char *subject, 440f05cddf9SRui Paulo const struct wpabuf *cert) 441f05cddf9SRui Paulo { 442f05cddf9SRui Paulo unsigned char *encoded; 443f05cddf9SRui Paulo 444f05cddf9SRui Paulo encoded = base64_encode(wpabuf_head(cert), wpabuf_len(cert), NULL); 445f05cddf9SRui Paulo if (encoded == NULL) 446f05cddf9SRui Paulo return; 447f05cddf9SRui Paulo fprintf(f, "%s\n-----BEGIN CERTIFICATE-----\n%s" 448f05cddf9SRui Paulo "-----END CERTIFICATE-----\n\n", subject, encoded); 449f05cddf9SRui Paulo os_free(encoded); 450f05cddf9SRui Paulo } 451f05cddf9SRui Paulo 452f05cddf9SRui Paulo 4535b9c547cSRui Paulo #if defined(CONFIG_CTRL_IFACE) || !defined(CONFIG_NO_STDOUT_DEBUG) 4545b9c547cSRui Paulo static void eapol_test_eap_param_needed(void *ctx, enum wpa_ctrl_req_type field, 4555b9c547cSRui Paulo const char *default_txt) 4565b9c547cSRui Paulo { 4575b9c547cSRui Paulo struct eapol_test_data *e = ctx; 4585b9c547cSRui Paulo struct wpa_supplicant *wpa_s = e->wpa_s; 4595b9c547cSRui Paulo struct wpa_ssid *ssid = wpa_s->current_ssid; 4605b9c547cSRui Paulo const char *field_name, *txt = NULL; 4615b9c547cSRui Paulo char *buf; 4625b9c547cSRui Paulo size_t buflen; 4635b9c547cSRui Paulo int len; 4645b9c547cSRui Paulo 4655b9c547cSRui Paulo if (ssid == NULL) 4665b9c547cSRui Paulo return; 4675b9c547cSRui Paulo 4685b9c547cSRui Paulo field_name = wpa_supplicant_ctrl_req_to_string(field, default_txt, 4695b9c547cSRui Paulo &txt); 4705b9c547cSRui Paulo if (field_name == NULL) { 4715b9c547cSRui Paulo wpa_printf(MSG_WARNING, "Unhandled EAP param %d needed", 4725b9c547cSRui Paulo field); 4735b9c547cSRui Paulo return; 4745b9c547cSRui Paulo } 4755b9c547cSRui Paulo 4765b9c547cSRui Paulo buflen = 100 + os_strlen(txt) + ssid->ssid_len; 4775b9c547cSRui Paulo buf = os_malloc(buflen); 4785b9c547cSRui Paulo if (buf == NULL) 4795b9c547cSRui Paulo return; 4805b9c547cSRui Paulo len = os_snprintf(buf, buflen, 4815b9c547cSRui Paulo WPA_CTRL_REQ "%s-%d:%s needed for SSID ", 4825b9c547cSRui Paulo field_name, ssid->id, txt); 4835b9c547cSRui Paulo if (os_snprintf_error(buflen, len)) { 4845b9c547cSRui Paulo os_free(buf); 4855b9c547cSRui Paulo return; 4865b9c547cSRui Paulo } 4875b9c547cSRui Paulo if (ssid->ssid && buflen > len + ssid->ssid_len) { 4885b9c547cSRui Paulo os_memcpy(buf + len, ssid->ssid, ssid->ssid_len); 4895b9c547cSRui Paulo len += ssid->ssid_len; 4905b9c547cSRui Paulo buf[len] = '\0'; 4915b9c547cSRui Paulo } 4925b9c547cSRui Paulo buf[buflen - 1] = '\0'; 4935b9c547cSRui Paulo wpa_msg(wpa_s, MSG_INFO, "%s", buf); 4945b9c547cSRui Paulo os_free(buf); 4955b9c547cSRui Paulo } 4965b9c547cSRui Paulo #else /* CONFIG_CTRL_IFACE || !CONFIG_NO_STDOUT_DEBUG */ 4975b9c547cSRui Paulo #define eapol_test_eap_param_needed NULL 4985b9c547cSRui Paulo #endif /* CONFIG_CTRL_IFACE || !CONFIG_NO_STDOUT_DEBUG */ 4995b9c547cSRui Paulo 5005b9c547cSRui Paulo 501*206b73d0SCy Schubert static void eapol_test_cert_cb(void *ctx, struct tls_cert_data *cert, 502*206b73d0SCy Schubert const char *cert_hash) 503f05cddf9SRui Paulo { 504f05cddf9SRui Paulo struct eapol_test_data *e = ctx; 505*206b73d0SCy Schubert int i; 506f05cddf9SRui Paulo 507f05cddf9SRui Paulo wpa_msg(e->wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_CERT 508f05cddf9SRui Paulo "depth=%d subject='%s'%s%s", 509*206b73d0SCy Schubert cert->depth, cert->subject, 510f05cddf9SRui Paulo cert_hash ? " hash=" : "", 511f05cddf9SRui Paulo cert_hash ? cert_hash : ""); 512f05cddf9SRui Paulo 513*206b73d0SCy Schubert if (cert->cert) { 514f05cddf9SRui Paulo char *cert_hex; 515*206b73d0SCy Schubert size_t len = wpabuf_len(cert->cert) * 2 + 1; 516f05cddf9SRui Paulo cert_hex = os_malloc(len); 517f05cddf9SRui Paulo if (cert_hex) { 518*206b73d0SCy Schubert wpa_snprintf_hex(cert_hex, len, wpabuf_head(cert->cert), 519*206b73d0SCy Schubert wpabuf_len(cert->cert)); 520f05cddf9SRui Paulo wpa_msg_ctrl(e->wpa_s, MSG_INFO, 521f05cddf9SRui Paulo WPA_EVENT_EAP_PEER_CERT 522f05cddf9SRui Paulo "depth=%d subject='%s' cert=%s", 523*206b73d0SCy Schubert cert->depth, cert->subject, cert_hex); 524f05cddf9SRui Paulo os_free(cert_hex); 525f05cddf9SRui Paulo } 526f05cddf9SRui Paulo 527f05cddf9SRui Paulo if (e->server_cert_file) 528f05cddf9SRui Paulo eapol_test_write_cert(e->server_cert_file, 529*206b73d0SCy Schubert cert->subject, cert->cert); 530f05cddf9SRui Paulo } 5315b9c547cSRui Paulo 532*206b73d0SCy Schubert for (i = 0; i < cert->num_altsubject; i++) 5335b9c547cSRui Paulo wpa_msg(e->wpa_s, MSG_INFO, WPA_EVENT_EAP_PEER_ALT 534*206b73d0SCy Schubert "depth=%d %s", cert->depth, cert->altsubject[i]); 535f05cddf9SRui Paulo } 536f05cddf9SRui Paulo 537f05cddf9SRui Paulo 538f05cddf9SRui Paulo static void eapol_test_set_anon_id(void *ctx, const u8 *id, size_t len) 539f05cddf9SRui Paulo { 540f05cddf9SRui Paulo struct eapol_test_data *e = ctx; 541f05cddf9SRui Paulo struct wpa_supplicant *wpa_s = e->wpa_s; 542f05cddf9SRui Paulo char *str; 543f05cddf9SRui Paulo int res; 544f05cddf9SRui Paulo 545f05cddf9SRui Paulo wpa_hexdump_ascii(MSG_DEBUG, "EAP method updated anonymous_identity", 546f05cddf9SRui Paulo id, len); 547f05cddf9SRui Paulo 548f05cddf9SRui Paulo if (wpa_s->current_ssid == NULL) 549f05cddf9SRui Paulo return; 550f05cddf9SRui Paulo 551f05cddf9SRui Paulo if (id == NULL) { 552f05cddf9SRui Paulo if (wpa_config_set(wpa_s->current_ssid, "anonymous_identity", 553f05cddf9SRui Paulo "NULL", 0) < 0) 554f05cddf9SRui Paulo return; 555f05cddf9SRui Paulo } else { 556f05cddf9SRui Paulo str = os_malloc(len * 2 + 1); 557f05cddf9SRui Paulo if (str == NULL) 558f05cddf9SRui Paulo return; 559f05cddf9SRui Paulo wpa_snprintf_hex(str, len * 2 + 1, id, len); 560f05cddf9SRui Paulo res = wpa_config_set(wpa_s->current_ssid, "anonymous_identity", 561f05cddf9SRui Paulo str, 0); 562f05cddf9SRui Paulo os_free(str); 563f05cddf9SRui Paulo if (res < 0) 564f05cddf9SRui Paulo return; 565f05cddf9SRui Paulo } 566f05cddf9SRui Paulo } 567f05cddf9SRui Paulo 568f05cddf9SRui Paulo 569325151a3SRui Paulo static enum wpa_states eapol_test_get_state(void *ctx) 570325151a3SRui Paulo { 571325151a3SRui Paulo struct eapol_test_data *e = ctx; 572325151a3SRui Paulo struct wpa_supplicant *wpa_s = e->wpa_s; 573325151a3SRui Paulo 574325151a3SRui Paulo return wpa_s->wpa_state; 575325151a3SRui Paulo } 576325151a3SRui Paulo 577325151a3SRui Paulo 57839beb93cSSam Leffler static int test_eapol(struct eapol_test_data *e, struct wpa_supplicant *wpa_s, 57939beb93cSSam Leffler struct wpa_ssid *ssid) 58039beb93cSSam Leffler { 58139beb93cSSam Leffler struct eapol_config eapol_conf; 58239beb93cSSam Leffler struct eapol_ctx *ctx; 583325151a3SRui Paulo struct wpa_sm_ctx *wctx; 58439beb93cSSam Leffler 58539beb93cSSam Leffler ctx = os_zalloc(sizeof(*ctx)); 58639beb93cSSam Leffler if (ctx == NULL) { 58739beb93cSSam Leffler printf("Failed to allocate EAPOL context.\n"); 58839beb93cSSam Leffler return -1; 58939beb93cSSam Leffler } 590f05cddf9SRui Paulo ctx->ctx = e; 59139beb93cSSam Leffler ctx->msg_ctx = wpa_s; 59239beb93cSSam Leffler ctx->scard_ctx = wpa_s->scard; 59339beb93cSSam Leffler ctx->cb = eapol_sm_cb; 59439beb93cSSam Leffler ctx->cb_ctx = e; 59539beb93cSSam Leffler ctx->eapol_send_ctx = wpa_s; 59639beb93cSSam Leffler ctx->preauth = 0; 59739beb93cSSam Leffler ctx->eapol_done_cb = eapol_test_eapol_done_cb; 59839beb93cSSam Leffler ctx->eapol_send = eapol_test_eapol_send; 59939beb93cSSam Leffler ctx->set_config_blob = eapol_test_set_config_blob; 60039beb93cSSam Leffler ctx->get_config_blob = eapol_test_get_config_blob; 60139beb93cSSam Leffler ctx->opensc_engine_path = wpa_s->conf->opensc_engine_path; 60239beb93cSSam Leffler ctx->pkcs11_engine_path = wpa_s->conf->pkcs11_engine_path; 60339beb93cSSam Leffler ctx->pkcs11_module_path = wpa_s->conf->pkcs11_module_path; 6045b9c547cSRui Paulo ctx->openssl_ciphers = wpa_s->conf->openssl_ciphers; 6055b9c547cSRui Paulo ctx->eap_param_needed = eapol_test_eap_param_needed; 606f05cddf9SRui Paulo ctx->cert_cb = eapol_test_cert_cb; 607f05cddf9SRui Paulo ctx->cert_in_cb = 1; 608f05cddf9SRui Paulo ctx->set_anon_id = eapol_test_set_anon_id; 60939beb93cSSam Leffler 61039beb93cSSam Leffler wpa_s->eapol = eapol_sm_init(ctx); 61139beb93cSSam Leffler if (wpa_s->eapol == NULL) { 61239beb93cSSam Leffler os_free(ctx); 61339beb93cSSam Leffler printf("Failed to initialize EAPOL state machines.\n"); 61439beb93cSSam Leffler return -1; 61539beb93cSSam Leffler } 61639beb93cSSam Leffler 617325151a3SRui Paulo wpa_s->key_mgmt = WPA_KEY_MGMT_IEEE8021X_NO_WPA; 618325151a3SRui Paulo wctx = os_zalloc(sizeof(*wctx)); 619325151a3SRui Paulo if (wctx == NULL) { 620325151a3SRui Paulo os_free(ctx); 621325151a3SRui Paulo return -1; 622325151a3SRui Paulo } 623325151a3SRui Paulo wctx->ctx = e; 624325151a3SRui Paulo wctx->msg_ctx = wpa_s; 625325151a3SRui Paulo wctx->get_state = eapol_test_get_state; 626325151a3SRui Paulo wpa_s->wpa = wpa_sm_init(wctx); 627325151a3SRui Paulo if (!wpa_s->wpa) { 628325151a3SRui Paulo os_free(ctx); 629325151a3SRui Paulo os_free(wctx); 630325151a3SRui Paulo return -1; 631325151a3SRui Paulo } 632325151a3SRui Paulo 633325151a3SRui Paulo if (!ssid) 634325151a3SRui Paulo return 0; 635325151a3SRui Paulo 63639beb93cSSam Leffler wpa_s->current_ssid = ssid; 63739beb93cSSam Leffler os_memset(&eapol_conf, 0, sizeof(eapol_conf)); 63839beb93cSSam Leffler eapol_conf.accept_802_1x_keys = 1; 63939beb93cSSam Leffler eapol_conf.required_keys = 0; 64039beb93cSSam Leffler eapol_conf.fast_reauth = wpa_s->conf->fast_reauth; 64139beb93cSSam Leffler eapol_conf.workaround = ssid->eap_workaround; 6425b9c547cSRui Paulo eapol_conf.external_sim = wpa_s->conf->external_sim; 64339beb93cSSam Leffler eapol_sm_notify_config(wpa_s->eapol, &ssid->eap, &eapol_conf); 64439beb93cSSam Leffler eapol_sm_register_scard_ctx(wpa_s->eapol, wpa_s->scard); 64539beb93cSSam Leffler 64639beb93cSSam Leffler 64739beb93cSSam Leffler eapol_sm_notify_portValid(wpa_s->eapol, FALSE); 64839beb93cSSam Leffler /* 802.1X::portControl = Auto */ 64939beb93cSSam Leffler eapol_sm_notify_portEnabled(wpa_s->eapol, TRUE); 65039beb93cSSam Leffler 65139beb93cSSam Leffler return 0; 65239beb93cSSam Leffler } 65339beb93cSSam Leffler 65439beb93cSSam Leffler 65539beb93cSSam Leffler static void test_eapol_clean(struct eapol_test_data *e, 65639beb93cSSam Leffler struct wpa_supplicant *wpa_s) 65739beb93cSSam Leffler { 65839beb93cSSam Leffler struct extra_radius_attr *p, *prev; 65939beb93cSSam Leffler 660325151a3SRui Paulo wpa_sm_deinit(wpa_s->wpa); 661325151a3SRui Paulo wpa_s->wpa = NULL; 66239beb93cSSam Leffler radius_client_deinit(e->radius); 663f05cddf9SRui Paulo wpabuf_free(e->last_eap_radius); 66439beb93cSSam Leffler radius_msg_free(e->last_recv_radius); 665e28a4053SRui Paulo e->last_recv_radius = NULL; 66639beb93cSSam Leffler os_free(e->eap_identity); 66739beb93cSSam Leffler e->eap_identity = NULL; 66839beb93cSSam Leffler eapol_sm_deinit(wpa_s->eapol); 66939beb93cSSam Leffler wpa_s->eapol = NULL; 67039beb93cSSam Leffler if (e->radius_conf && e->radius_conf->auth_server) { 67139beb93cSSam Leffler os_free(e->radius_conf->auth_server->shared_secret); 67239beb93cSSam Leffler os_free(e->radius_conf->auth_server); 67339beb93cSSam Leffler } 67439beb93cSSam Leffler os_free(e->radius_conf); 67539beb93cSSam Leffler e->radius_conf = NULL; 67639beb93cSSam Leffler scard_deinit(wpa_s->scard); 67739beb93cSSam Leffler if (wpa_s->ctrl_iface) { 67839beb93cSSam Leffler wpa_supplicant_ctrl_iface_deinit(wpa_s->ctrl_iface); 67939beb93cSSam Leffler wpa_s->ctrl_iface = NULL; 68039beb93cSSam Leffler } 681f05cddf9SRui Paulo 682f05cddf9SRui Paulo ext_password_deinit(wpa_s->ext_pw); 683f05cddf9SRui Paulo wpa_s->ext_pw = NULL; 684f05cddf9SRui Paulo 68539beb93cSSam Leffler wpa_config_free(wpa_s->conf); 68639beb93cSSam Leffler 68739beb93cSSam Leffler p = e->extra_attrs; 68839beb93cSSam Leffler while (p) { 68939beb93cSSam Leffler prev = p; 69039beb93cSSam Leffler p = p->next; 69139beb93cSSam Leffler os_free(prev); 69239beb93cSSam Leffler } 69339beb93cSSam Leffler } 69439beb93cSSam Leffler 69539beb93cSSam Leffler 69639beb93cSSam Leffler static void send_eap_request_identity(void *eloop_ctx, void *timeout_ctx) 69739beb93cSSam Leffler { 69839beb93cSSam Leffler struct wpa_supplicant *wpa_s = eloop_ctx; 69939beb93cSSam Leffler u8 buf[100], *pos; 70039beb93cSSam Leffler struct ieee802_1x_hdr *hdr; 70139beb93cSSam Leffler struct eap_hdr *eap; 70239beb93cSSam Leffler 70339beb93cSSam Leffler hdr = (struct ieee802_1x_hdr *) buf; 70439beb93cSSam Leffler hdr->version = EAPOL_VERSION; 70539beb93cSSam Leffler hdr->type = IEEE802_1X_TYPE_EAP_PACKET; 70639beb93cSSam Leffler hdr->length = htons(5); 70739beb93cSSam Leffler 70839beb93cSSam Leffler eap = (struct eap_hdr *) (hdr + 1); 70939beb93cSSam Leffler eap->code = EAP_CODE_REQUEST; 7104bc52338SCy Schubert if (os_get_random((u8 *) &eap->identifier, sizeof(eap->identifier)) < 0) 7114bc52338SCy Schubert eap->identifier = os_random() & 0xff; 71239beb93cSSam Leffler eap->length = htons(5); 71339beb93cSSam Leffler pos = (u8 *) (eap + 1); 71439beb93cSSam Leffler *pos = EAP_TYPE_IDENTITY; 71539beb93cSSam Leffler 71639beb93cSSam Leffler printf("Sending fake EAP-Request-Identity\n"); 71739beb93cSSam Leffler eapol_sm_rx_eapol(wpa_s->eapol, wpa_s->bssid, buf, 71839beb93cSSam Leffler sizeof(*hdr) + 5); 71939beb93cSSam Leffler } 72039beb93cSSam Leffler 72139beb93cSSam Leffler 72239beb93cSSam Leffler static void eapol_test_timeout(void *eloop_ctx, void *timeout_ctx) 72339beb93cSSam Leffler { 72439beb93cSSam Leffler struct eapol_test_data *e = eloop_ctx; 72539beb93cSSam Leffler printf("EAPOL test timed out\n"); 72639beb93cSSam Leffler e->auth_timed_out = 1; 72739beb93cSSam Leffler eloop_terminate(); 72839beb93cSSam Leffler } 72939beb93cSSam Leffler 73039beb93cSSam Leffler 73139beb93cSSam Leffler static char *eap_type_text(u8 type) 73239beb93cSSam Leffler { 73339beb93cSSam Leffler switch (type) { 73439beb93cSSam Leffler case EAP_TYPE_IDENTITY: return "Identity"; 73539beb93cSSam Leffler case EAP_TYPE_NOTIFICATION: return "Notification"; 73639beb93cSSam Leffler case EAP_TYPE_NAK: return "Nak"; 73739beb93cSSam Leffler case EAP_TYPE_TLS: return "TLS"; 73839beb93cSSam Leffler case EAP_TYPE_TTLS: return "TTLS"; 73939beb93cSSam Leffler case EAP_TYPE_PEAP: return "PEAP"; 74039beb93cSSam Leffler case EAP_TYPE_SIM: return "SIM"; 74139beb93cSSam Leffler case EAP_TYPE_GTC: return "GTC"; 74239beb93cSSam Leffler case EAP_TYPE_MD5: return "MD5"; 74339beb93cSSam Leffler case EAP_TYPE_OTP: return "OTP"; 74439beb93cSSam Leffler case EAP_TYPE_FAST: return "FAST"; 74539beb93cSSam Leffler case EAP_TYPE_SAKE: return "SAKE"; 74639beb93cSSam Leffler case EAP_TYPE_PSK: return "PSK"; 74739beb93cSSam Leffler default: return "Unknown"; 74839beb93cSSam Leffler } 74939beb93cSSam Leffler } 75039beb93cSSam Leffler 75139beb93cSSam Leffler 75239beb93cSSam Leffler static void ieee802_1x_decapsulate_radius(struct eapol_test_data *e) 75339beb93cSSam Leffler { 754f05cddf9SRui Paulo struct wpabuf *eap; 755f05cddf9SRui Paulo const struct eap_hdr *hdr; 75639beb93cSSam Leffler int eap_type = -1; 75739beb93cSSam Leffler char buf[64]; 75839beb93cSSam Leffler struct radius_msg *msg; 75939beb93cSSam Leffler 76039beb93cSSam Leffler if (e->last_recv_radius == NULL) 76139beb93cSSam Leffler return; 76239beb93cSSam Leffler 76339beb93cSSam Leffler msg = e->last_recv_radius; 76439beb93cSSam Leffler 765f05cddf9SRui Paulo eap = radius_msg_get_eap(msg); 76639beb93cSSam Leffler if (eap == NULL) { 76739beb93cSSam Leffler /* draft-aboba-radius-rfc2869bis-20.txt, Chap. 2.6.3: 76839beb93cSSam Leffler * RADIUS server SHOULD NOT send Access-Reject/no EAP-Message 76939beb93cSSam Leffler * attribute */ 77039beb93cSSam Leffler wpa_printf(MSG_DEBUG, "could not extract " 77139beb93cSSam Leffler "EAP-Message from RADIUS message"); 772f05cddf9SRui Paulo wpabuf_free(e->last_eap_radius); 77339beb93cSSam Leffler e->last_eap_radius = NULL; 77439beb93cSSam Leffler return; 77539beb93cSSam Leffler } 77639beb93cSSam Leffler 777f05cddf9SRui Paulo if (wpabuf_len(eap) < sizeof(*hdr)) { 77839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "too short EAP packet " 77939beb93cSSam Leffler "received from authentication server"); 780f05cddf9SRui Paulo wpabuf_free(eap); 78139beb93cSSam Leffler return; 78239beb93cSSam Leffler } 78339beb93cSSam Leffler 784f05cddf9SRui Paulo if (wpabuf_len(eap) > sizeof(*hdr)) 785f05cddf9SRui Paulo eap_type = (wpabuf_head_u8(eap))[sizeof(*hdr)]; 78639beb93cSSam Leffler 787f05cddf9SRui Paulo hdr = wpabuf_head(eap); 78839beb93cSSam Leffler switch (hdr->code) { 78939beb93cSSam Leffler case EAP_CODE_REQUEST: 79039beb93cSSam Leffler os_snprintf(buf, sizeof(buf), "EAP-Request-%s (%d)", 79139beb93cSSam Leffler eap_type >= 0 ? eap_type_text(eap_type) : "??", 79239beb93cSSam Leffler eap_type); 79339beb93cSSam Leffler break; 79439beb93cSSam Leffler case EAP_CODE_RESPONSE: 79539beb93cSSam Leffler os_snprintf(buf, sizeof(buf), "EAP Response-%s (%d)", 79639beb93cSSam Leffler eap_type >= 0 ? eap_type_text(eap_type) : "??", 79739beb93cSSam Leffler eap_type); 79839beb93cSSam Leffler break; 79939beb93cSSam Leffler case EAP_CODE_SUCCESS: 80039beb93cSSam Leffler os_strlcpy(buf, "EAP Success", sizeof(buf)); 80139beb93cSSam Leffler /* LEAP uses EAP Success within an authentication, so must not 80239beb93cSSam Leffler * stop here with eloop_terminate(); */ 80339beb93cSSam Leffler break; 80439beb93cSSam Leffler case EAP_CODE_FAILURE: 80539beb93cSSam Leffler os_strlcpy(buf, "EAP Failure", sizeof(buf)); 806325151a3SRui Paulo if (e->ctrl_iface) 807325151a3SRui Paulo break; 80839beb93cSSam Leffler eloop_terminate(); 80939beb93cSSam Leffler break; 81039beb93cSSam Leffler default: 81139beb93cSSam Leffler os_strlcpy(buf, "unknown EAP code", sizeof(buf)); 812f05cddf9SRui Paulo wpa_hexdump_buf(MSG_DEBUG, "Decapsulated EAP packet", eap); 81339beb93cSSam Leffler break; 81439beb93cSSam Leffler } 81539beb93cSSam Leffler wpa_printf(MSG_DEBUG, "decapsulated EAP packet (code=%d " 81639beb93cSSam Leffler "id=%d len=%d) from RADIUS server: %s", 81739beb93cSSam Leffler hdr->code, hdr->identifier, ntohs(hdr->length), buf); 81839beb93cSSam Leffler 81939beb93cSSam Leffler /* sta->eapol_sm->be_auth.idFromServer = hdr->identifier; */ 82039beb93cSSam Leffler 821f05cddf9SRui Paulo wpabuf_free(e->last_eap_radius); 82239beb93cSSam Leffler e->last_eap_radius = eap; 82339beb93cSSam Leffler 82439beb93cSSam Leffler { 82539beb93cSSam Leffler struct ieee802_1x_hdr *dot1x; 826f05cddf9SRui Paulo dot1x = os_malloc(sizeof(*dot1x) + wpabuf_len(eap)); 82739beb93cSSam Leffler assert(dot1x != NULL); 82839beb93cSSam Leffler dot1x->version = EAPOL_VERSION; 82939beb93cSSam Leffler dot1x->type = IEEE802_1X_TYPE_EAP_PACKET; 830f05cddf9SRui Paulo dot1x->length = htons(wpabuf_len(eap)); 831f05cddf9SRui Paulo os_memcpy((u8 *) (dot1x + 1), wpabuf_head(eap), 832f05cddf9SRui Paulo wpabuf_len(eap)); 83339beb93cSSam Leffler eapol_sm_rx_eapol(e->wpa_s->eapol, e->wpa_s->bssid, 834f05cddf9SRui Paulo (u8 *) dot1x, 835f05cddf9SRui Paulo sizeof(*dot1x) + wpabuf_len(eap)); 83639beb93cSSam Leffler os_free(dot1x); 83739beb93cSSam Leffler } 83839beb93cSSam Leffler } 83939beb93cSSam Leffler 84039beb93cSSam Leffler 84139beb93cSSam Leffler static void ieee802_1x_get_keys(struct eapol_test_data *e, 84239beb93cSSam Leffler struct radius_msg *msg, struct radius_msg *req, 8433157ba21SRui Paulo const u8 *shared_secret, 8443157ba21SRui Paulo size_t shared_secret_len) 84539beb93cSSam Leffler { 84639beb93cSSam Leffler struct radius_ms_mppe_keys *keys; 8475b9c547cSRui Paulo u8 *buf; 8485b9c547cSRui Paulo size_t len; 84939beb93cSSam Leffler 85039beb93cSSam Leffler keys = radius_msg_get_ms_keys(msg, req, shared_secret, 85139beb93cSSam Leffler shared_secret_len); 85239beb93cSSam Leffler if (keys && keys->send == NULL && keys->recv == NULL) { 85339beb93cSSam Leffler os_free(keys); 85439beb93cSSam Leffler keys = radius_msg_get_cisco_keys(msg, req, shared_secret, 85539beb93cSSam Leffler shared_secret_len); 85639beb93cSSam Leffler } 85739beb93cSSam Leffler 85839beb93cSSam Leffler if (keys) { 85939beb93cSSam Leffler if (keys->send) { 86039beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "MS-MPPE-Send-Key (sign)", 86139beb93cSSam Leffler keys->send, keys->send_len); 86239beb93cSSam Leffler } 86339beb93cSSam Leffler if (keys->recv) { 86439beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "MS-MPPE-Recv-Key (crypt)", 86539beb93cSSam Leffler keys->recv, keys->recv_len); 86639beb93cSSam Leffler e->authenticator_pmk_len = 86739beb93cSSam Leffler keys->recv_len > PMK_LEN ? PMK_LEN : 86839beb93cSSam Leffler keys->recv_len; 86939beb93cSSam Leffler os_memcpy(e->authenticator_pmk, keys->recv, 87039beb93cSSam Leffler e->authenticator_pmk_len); 87139beb93cSSam Leffler if (e->authenticator_pmk_len == 16 && keys->send && 87239beb93cSSam Leffler keys->send_len == 16) { 87339beb93cSSam Leffler /* MS-CHAP-v2 derives 16 octet keys */ 87439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "Use MS-MPPE-Send-Key " 87539beb93cSSam Leffler "to extend PMK to 32 octets"); 87639beb93cSSam Leffler os_memcpy(e->authenticator_pmk + 87739beb93cSSam Leffler e->authenticator_pmk_len, 87839beb93cSSam Leffler keys->send, keys->send_len); 87939beb93cSSam Leffler e->authenticator_pmk_len += keys->send_len; 88039beb93cSSam Leffler } 88139beb93cSSam Leffler } 88239beb93cSSam Leffler 88339beb93cSSam Leffler os_free(keys->send); 88439beb93cSSam Leffler os_free(keys->recv); 88539beb93cSSam Leffler os_free(keys); 88639beb93cSSam Leffler } 8875b9c547cSRui Paulo 8885b9c547cSRui Paulo if (radius_msg_get_attr_ptr(msg, RADIUS_ATTR_EAP_KEY_NAME, &buf, &len, 8895b9c547cSRui Paulo NULL) == 0) { 8905b9c547cSRui Paulo os_memcpy(e->authenticator_eap_key_name, buf, len); 8915b9c547cSRui Paulo e->authenticator_eap_key_name_len = len; 8925b9c547cSRui Paulo } else { 8935b9c547cSRui Paulo e->authenticator_eap_key_name_len = 0; 8945b9c547cSRui Paulo } 89539beb93cSSam Leffler } 89639beb93cSSam Leffler 89739beb93cSSam Leffler 89839beb93cSSam Leffler /* Process the RADIUS frames from Authentication Server */ 89939beb93cSSam Leffler static RadiusRxResult 90039beb93cSSam Leffler ieee802_1x_receive_auth(struct radius_msg *msg, struct radius_msg *req, 9013157ba21SRui Paulo const u8 *shared_secret, size_t shared_secret_len, 90239beb93cSSam Leffler void *data) 90339beb93cSSam Leffler { 90439beb93cSSam Leffler struct eapol_test_data *e = data; 905e28a4053SRui Paulo struct radius_hdr *hdr = radius_msg_get_hdr(msg); 90639beb93cSSam Leffler 90739beb93cSSam Leffler /* RFC 2869, Ch. 5.13: valid Message-Authenticator attribute MUST be 90839beb93cSSam Leffler * present when packet contains an EAP-Message attribute */ 909e28a4053SRui Paulo if (hdr->code == RADIUS_CODE_ACCESS_REJECT && 91039beb93cSSam Leffler radius_msg_get_attr(msg, RADIUS_ATTR_MESSAGE_AUTHENTICATOR, NULL, 91139beb93cSSam Leffler 0) < 0 && 91239beb93cSSam Leffler radius_msg_get_attr(msg, RADIUS_ATTR_EAP_MESSAGE, NULL, 0) < 0) { 91339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "Allowing RADIUS " 91439beb93cSSam Leffler "Access-Reject without Message-Authenticator " 91539beb93cSSam Leffler "since it does not include EAP-Message\n"); 91639beb93cSSam Leffler } else if (radius_msg_verify(msg, shared_secret, shared_secret_len, 91739beb93cSSam Leffler req, 1)) { 91839beb93cSSam Leffler printf("Incoming RADIUS packet did not have correct " 91939beb93cSSam Leffler "Message-Authenticator - dropped\n"); 92039beb93cSSam Leffler return RADIUS_RX_UNKNOWN; 92139beb93cSSam Leffler } 92239beb93cSSam Leffler 923e28a4053SRui Paulo if (hdr->code != RADIUS_CODE_ACCESS_ACCEPT && 924e28a4053SRui Paulo hdr->code != RADIUS_CODE_ACCESS_REJECT && 925e28a4053SRui Paulo hdr->code != RADIUS_CODE_ACCESS_CHALLENGE) { 92639beb93cSSam Leffler printf("Unknown RADIUS message code\n"); 92739beb93cSSam Leffler return RADIUS_RX_UNKNOWN; 92839beb93cSSam Leffler } 92939beb93cSSam Leffler 93039beb93cSSam Leffler e->radius_identifier = -1; 93139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "RADIUS packet matching with station"); 93239beb93cSSam Leffler 93339beb93cSSam Leffler radius_msg_free(e->last_recv_radius); 93439beb93cSSam Leffler e->last_recv_radius = msg; 93539beb93cSSam Leffler 936e28a4053SRui Paulo switch (hdr->code) { 93739beb93cSSam Leffler case RADIUS_CODE_ACCESS_ACCEPT: 93839beb93cSSam Leffler e->radius_access_accept_received = 1; 93939beb93cSSam Leffler ieee802_1x_get_keys(e, msg, req, shared_secret, 94039beb93cSSam Leffler shared_secret_len); 94139beb93cSSam Leffler break; 94239beb93cSSam Leffler case RADIUS_CODE_ACCESS_REJECT: 94339beb93cSSam Leffler e->radius_access_reject_received = 1; 94439beb93cSSam Leffler break; 94539beb93cSSam Leffler } 94639beb93cSSam Leffler 94739beb93cSSam Leffler ieee802_1x_decapsulate_radius(e); 94839beb93cSSam Leffler 949e28a4053SRui Paulo if ((hdr->code == RADIUS_CODE_ACCESS_ACCEPT && 95039beb93cSSam Leffler e->eapol_test_num_reauths < 0) || 951e28a4053SRui Paulo hdr->code == RADIUS_CODE_ACCESS_REJECT) { 952325151a3SRui Paulo if (!e->ctrl_iface) 95339beb93cSSam Leffler eloop_terminate(); 95439beb93cSSam Leffler } 95539beb93cSSam Leffler 95639beb93cSSam Leffler return RADIUS_RX_QUEUED; 95739beb93cSSam Leffler } 95839beb93cSSam Leffler 95939beb93cSSam Leffler 960325151a3SRui Paulo static int driver_get_ssid(void *priv, u8 *ssid) 961325151a3SRui Paulo { 962325151a3SRui Paulo ssid[0] = 0; 963325151a3SRui Paulo return 0; 964325151a3SRui Paulo } 965325151a3SRui Paulo 966325151a3SRui Paulo 967325151a3SRui Paulo static int driver_get_bssid(void *priv, u8 *bssid) 968325151a3SRui Paulo { 969325151a3SRui Paulo struct eapol_test_data *e = priv; 970325151a3SRui Paulo 971325151a3SRui Paulo if (e->ctrl_iface && !e->id_req_sent) { 972325151a3SRui Paulo eloop_register_timeout(0, 0, send_eap_request_identity, 973325151a3SRui Paulo e->wpa_s, NULL); 974325151a3SRui Paulo e->id_req_sent = 1; 975325151a3SRui Paulo } 976325151a3SRui Paulo 977325151a3SRui Paulo os_memset(bssid, 0, ETH_ALEN); 978325151a3SRui Paulo bssid[5] = 1; 979325151a3SRui Paulo return 0; 980325151a3SRui Paulo } 981325151a3SRui Paulo 982325151a3SRui Paulo 983325151a3SRui Paulo static int driver_get_capa(void *priv, struct wpa_driver_capa *capa) 984325151a3SRui Paulo { 985325151a3SRui Paulo os_memset(capa, 0, sizeof(*capa)); 986325151a3SRui Paulo capa->flags = WPA_DRIVER_FLAGS_WIRED; 987325151a3SRui Paulo return 0; 988325151a3SRui Paulo } 989325151a3SRui Paulo 990325151a3SRui Paulo 991325151a3SRui Paulo struct wpa_driver_ops eapol_test_drv_ops = { 992325151a3SRui Paulo .name = "test", 993325151a3SRui Paulo .get_ssid = driver_get_ssid, 994325151a3SRui Paulo .get_bssid = driver_get_bssid, 995325151a3SRui Paulo .get_capa = driver_get_capa, 996325151a3SRui Paulo }; 997325151a3SRui Paulo 99839beb93cSSam Leffler static void wpa_init_conf(struct eapol_test_data *e, 99939beb93cSSam Leffler struct wpa_supplicant *wpa_s, const char *authsrv, 100039beb93cSSam Leffler int port, const char *secret, 1001325151a3SRui Paulo const char *cli_addr, const char *ifname) 100239beb93cSSam Leffler { 100339beb93cSSam Leffler struct hostapd_radius_server *as; 100439beb93cSSam Leffler int res; 100539beb93cSSam Leffler 1006325151a3SRui Paulo wpa_s->driver = &eapol_test_drv_ops; 1007325151a3SRui Paulo wpa_s->drv_priv = e; 100839beb93cSSam Leffler wpa_s->bssid[5] = 1; 100939beb93cSSam Leffler os_memcpy(wpa_s->own_addr, e->own_addr, ETH_ALEN); 101039beb93cSSam Leffler e->own_ip_addr.s_addr = htonl((127 << 24) | 1); 1011325151a3SRui Paulo os_strlcpy(wpa_s->ifname, ifname, sizeof(wpa_s->ifname)); 101239beb93cSSam Leffler 101339beb93cSSam Leffler e->radius_conf = os_zalloc(sizeof(struct hostapd_radius_servers)); 101439beb93cSSam Leffler assert(e->radius_conf != NULL); 101539beb93cSSam Leffler e->radius_conf->num_auth_servers = 1; 101639beb93cSSam Leffler as = os_zalloc(sizeof(struct hostapd_radius_server)); 101739beb93cSSam Leffler assert(as != NULL); 101839beb93cSSam Leffler #if defined(CONFIG_NATIVE_WINDOWS) || defined(CONFIG_ANSI_C_EXTRA) 101939beb93cSSam Leffler { 102039beb93cSSam Leffler int a[4]; 102139beb93cSSam Leffler u8 *pos; 102239beb93cSSam Leffler sscanf(authsrv, "%d.%d.%d.%d", &a[0], &a[1], &a[2], &a[3]); 102339beb93cSSam Leffler pos = (u8 *) &as->addr.u.v4; 102439beb93cSSam Leffler *pos++ = a[0]; 102539beb93cSSam Leffler *pos++ = a[1]; 102639beb93cSSam Leffler *pos++ = a[2]; 102739beb93cSSam Leffler *pos++ = a[3]; 102839beb93cSSam Leffler } 102939beb93cSSam Leffler #else /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */ 1030325151a3SRui Paulo if (hostapd_parse_ip_addr(authsrv, &as->addr) < 0) { 10315b9c547cSRui Paulo wpa_printf(MSG_ERROR, "Invalid IP address '%s'", 10325b9c547cSRui Paulo authsrv); 10335b9c547cSRui Paulo assert(0); 10345b9c547cSRui Paulo } 103539beb93cSSam Leffler #endif /* CONFIG_NATIVE_WINDOWS or CONFIG_ANSI_C_EXTRA */ 103639beb93cSSam Leffler as->port = port; 103739beb93cSSam Leffler as->shared_secret = (u8 *) os_strdup(secret); 103839beb93cSSam Leffler as->shared_secret_len = os_strlen(secret); 103939beb93cSSam Leffler e->radius_conf->auth_server = as; 104039beb93cSSam Leffler e->radius_conf->auth_servers = as; 104139beb93cSSam Leffler e->radius_conf->msg_dumps = 1; 104239beb93cSSam Leffler if (cli_addr) { 104339beb93cSSam Leffler if (hostapd_parse_ip_addr(cli_addr, 104439beb93cSSam Leffler &e->radius_conf->client_addr) == 0) 104539beb93cSSam Leffler e->radius_conf->force_client_addr = 1; 104639beb93cSSam Leffler else { 104739beb93cSSam Leffler wpa_printf(MSG_ERROR, "Invalid IP address '%s'", 104839beb93cSSam Leffler cli_addr); 104939beb93cSSam Leffler assert(0); 105039beb93cSSam Leffler } 105139beb93cSSam Leffler } 105239beb93cSSam Leffler 105339beb93cSSam Leffler e->radius = radius_client_init(wpa_s, e->radius_conf); 105439beb93cSSam Leffler assert(e->radius != NULL); 105539beb93cSSam Leffler 105639beb93cSSam Leffler res = radius_client_register(e->radius, RADIUS_AUTH, 105739beb93cSSam Leffler ieee802_1x_receive_auth, e); 105839beb93cSSam Leffler assert(res == 0); 105939beb93cSSam Leffler } 106039beb93cSSam Leffler 106139beb93cSSam Leffler 10625b9c547cSRui Paulo static int scard_test(struct eapol_test_data *e) 106339beb93cSSam Leffler { 106439beb93cSSam Leffler struct scard_data *scard; 106539beb93cSSam Leffler size_t len; 106639beb93cSSam Leffler char imsi[20]; 106739beb93cSSam Leffler unsigned char _rand[16]; 106839beb93cSSam Leffler #ifdef PCSC_FUNCS 106939beb93cSSam Leffler unsigned char sres[4]; 107039beb93cSSam Leffler unsigned char kc[8]; 107139beb93cSSam Leffler #endif /* PCSC_FUNCS */ 107239beb93cSSam Leffler #define num_triplets 5 107339beb93cSSam Leffler unsigned char rand_[num_triplets][16]; 107439beb93cSSam Leffler unsigned char sres_[num_triplets][4]; 107539beb93cSSam Leffler unsigned char kc_[num_triplets][8]; 107639beb93cSSam Leffler int i, res; 107739beb93cSSam Leffler size_t j; 107839beb93cSSam Leffler 107939beb93cSSam Leffler #define AKA_RAND_LEN 16 108039beb93cSSam Leffler #define AKA_AUTN_LEN 16 108139beb93cSSam Leffler #define AKA_AUTS_LEN 14 108239beb93cSSam Leffler #define RES_MAX_LEN 16 108339beb93cSSam Leffler #define IK_LEN 16 108439beb93cSSam Leffler #define CK_LEN 16 108539beb93cSSam Leffler unsigned char aka_rand[AKA_RAND_LEN]; 108639beb93cSSam Leffler unsigned char aka_autn[AKA_AUTN_LEN]; 108739beb93cSSam Leffler unsigned char aka_auts[AKA_AUTS_LEN]; 108839beb93cSSam Leffler unsigned char aka_res[RES_MAX_LEN]; 108939beb93cSSam Leffler size_t aka_res_len; 109039beb93cSSam Leffler unsigned char aka_ik[IK_LEN]; 109139beb93cSSam Leffler unsigned char aka_ck[CK_LEN]; 109239beb93cSSam Leffler 10935b9c547cSRui Paulo scard = scard_init(e->pcsc_reader); 109439beb93cSSam Leffler if (scard == NULL) 109539beb93cSSam Leffler return -1; 10965b9c547cSRui Paulo if (scard_set_pin(scard, e->pcsc_pin)) { 109739beb93cSSam Leffler wpa_printf(MSG_WARNING, "PIN validation failed"); 109839beb93cSSam Leffler scard_deinit(scard); 109939beb93cSSam Leffler return -1; 110039beb93cSSam Leffler } 110139beb93cSSam Leffler 110239beb93cSSam Leffler len = sizeof(imsi); 110339beb93cSSam Leffler if (scard_get_imsi(scard, imsi, &len)) 110439beb93cSSam Leffler goto failed; 110539beb93cSSam Leffler wpa_hexdump_ascii(MSG_DEBUG, "SCARD: IMSI", (u8 *) imsi, len); 110639beb93cSSam Leffler /* NOTE: Permanent Username: 1 | IMSI */ 110739beb93cSSam Leffler 1108f05cddf9SRui Paulo wpa_printf(MSG_DEBUG, "SCARD: MNC length %d", 1109f05cddf9SRui Paulo scard_get_mnc_len(scard)); 1110f05cddf9SRui Paulo 111139beb93cSSam Leffler os_memset(_rand, 0, sizeof(_rand)); 111239beb93cSSam Leffler if (scard_gsm_auth(scard, _rand, sres, kc)) 111339beb93cSSam Leffler goto failed; 111439beb93cSSam Leffler 111539beb93cSSam Leffler os_memset(_rand, 0xff, sizeof(_rand)); 111639beb93cSSam Leffler if (scard_gsm_auth(scard, _rand, sres, kc)) 111739beb93cSSam Leffler goto failed; 111839beb93cSSam Leffler 111939beb93cSSam Leffler for (i = 0; i < num_triplets; i++) { 112039beb93cSSam Leffler os_memset(rand_[i], i, sizeof(rand_[i])); 112139beb93cSSam Leffler if (scard_gsm_auth(scard, rand_[i], sres_[i], kc_[i])) 112239beb93cSSam Leffler goto failed; 112339beb93cSSam Leffler } 112439beb93cSSam Leffler 112539beb93cSSam Leffler for (i = 0; i < num_triplets; i++) { 112639beb93cSSam Leffler printf("1"); 112739beb93cSSam Leffler for (j = 0; j < len; j++) 112839beb93cSSam Leffler printf("%c", imsi[j]); 112939beb93cSSam Leffler printf(","); 113039beb93cSSam Leffler for (j = 0; j < 16; j++) 113139beb93cSSam Leffler printf("%02X", rand_[i][j]); 113239beb93cSSam Leffler printf(","); 113339beb93cSSam Leffler for (j = 0; j < 4; j++) 113439beb93cSSam Leffler printf("%02X", sres_[i][j]); 113539beb93cSSam Leffler printf(","); 113639beb93cSSam Leffler for (j = 0; j < 8; j++) 113739beb93cSSam Leffler printf("%02X", kc_[i][j]); 113839beb93cSSam Leffler printf("\n"); 113939beb93cSSam Leffler } 114039beb93cSSam Leffler 114139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "Trying to use UMTS authentication"); 114239beb93cSSam Leffler 114339beb93cSSam Leffler /* seq 39 (0x28) */ 114439beb93cSSam Leffler os_memset(aka_rand, 0xaa, 16); 114539beb93cSSam Leffler os_memcpy(aka_autn, "\x86\x71\x31\xcb\xa2\xfc\x61\xdf" 114639beb93cSSam Leffler "\xa3\xb3\x97\x9d\x07\x32\xa2\x12", 16); 114739beb93cSSam Leffler 114839beb93cSSam Leffler res = scard_umts_auth(scard, aka_rand, aka_autn, aka_res, &aka_res_len, 114939beb93cSSam Leffler aka_ik, aka_ck, aka_auts); 115039beb93cSSam Leffler if (res == 0) { 115139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "UMTS auth completed successfully"); 115239beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "RES", aka_res, aka_res_len); 115339beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IK", aka_ik, IK_LEN); 115439beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "CK", aka_ck, CK_LEN); 115539beb93cSSam Leffler } else if (res == -2) { 115639beb93cSSam Leffler wpa_printf(MSG_DEBUG, "UMTS auth resulted in synchronization " 115739beb93cSSam Leffler "failure"); 115839beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "AUTS", aka_auts, AKA_AUTS_LEN); 115939beb93cSSam Leffler } else { 116039beb93cSSam Leffler wpa_printf(MSG_DEBUG, "UMTS auth failed"); 116139beb93cSSam Leffler } 116239beb93cSSam Leffler 116339beb93cSSam Leffler failed: 116439beb93cSSam Leffler scard_deinit(scard); 116539beb93cSSam Leffler 116639beb93cSSam Leffler return 0; 116739beb93cSSam Leffler #undef num_triplets 116839beb93cSSam Leffler } 116939beb93cSSam Leffler 117039beb93cSSam Leffler 11715b9c547cSRui Paulo static int scard_get_triplets(struct eapol_test_data *e, int argc, char *argv[]) 117239beb93cSSam Leffler { 117339beb93cSSam Leffler struct scard_data *scard; 117439beb93cSSam Leffler size_t len; 117539beb93cSSam Leffler char imsi[20]; 117639beb93cSSam Leffler unsigned char _rand[16]; 117739beb93cSSam Leffler unsigned char sres[4]; 117839beb93cSSam Leffler unsigned char kc[8]; 117939beb93cSSam Leffler int num_triplets; 118039beb93cSSam Leffler int i; 118139beb93cSSam Leffler size_t j; 118239beb93cSSam Leffler 118339beb93cSSam Leffler if (argc < 2 || ((num_triplets = atoi(argv[1])) <= 0)) { 118439beb93cSSam Leffler printf("invalid parameters for sim command\n"); 118539beb93cSSam Leffler return -1; 118639beb93cSSam Leffler } 118739beb93cSSam Leffler 118839beb93cSSam Leffler if (argc <= 2 || os_strcmp(argv[2], "debug") != 0) { 118939beb93cSSam Leffler /* disable debug output */ 119039beb93cSSam Leffler wpa_debug_level = 99; 119139beb93cSSam Leffler } 119239beb93cSSam Leffler 11935b9c547cSRui Paulo scard = scard_init(e->pcsc_reader); 119439beb93cSSam Leffler if (scard == NULL) { 119539beb93cSSam Leffler printf("Failed to open smartcard connection\n"); 119639beb93cSSam Leffler return -1; 119739beb93cSSam Leffler } 119839beb93cSSam Leffler if (scard_set_pin(scard, argv[0])) { 119939beb93cSSam Leffler wpa_printf(MSG_WARNING, "PIN validation failed"); 120039beb93cSSam Leffler scard_deinit(scard); 120139beb93cSSam Leffler return -1; 120239beb93cSSam Leffler } 120339beb93cSSam Leffler 120439beb93cSSam Leffler len = sizeof(imsi); 120539beb93cSSam Leffler if (scard_get_imsi(scard, imsi, &len)) { 120639beb93cSSam Leffler scard_deinit(scard); 120739beb93cSSam Leffler return -1; 120839beb93cSSam Leffler } 120939beb93cSSam Leffler 121039beb93cSSam Leffler for (i = 0; i < num_triplets; i++) { 121139beb93cSSam Leffler os_memset(_rand, i, sizeof(_rand)); 121239beb93cSSam Leffler if (scard_gsm_auth(scard, _rand, sres, kc)) 121339beb93cSSam Leffler break; 121439beb93cSSam Leffler 121539beb93cSSam Leffler /* IMSI:Kc:SRES:RAND */ 121639beb93cSSam Leffler for (j = 0; j < len; j++) 121739beb93cSSam Leffler printf("%c", imsi[j]); 121839beb93cSSam Leffler printf(":"); 121939beb93cSSam Leffler for (j = 0; j < 8; j++) 122039beb93cSSam Leffler printf("%02X", kc[j]); 122139beb93cSSam Leffler printf(":"); 122239beb93cSSam Leffler for (j = 0; j < 4; j++) 122339beb93cSSam Leffler printf("%02X", sres[j]); 122439beb93cSSam Leffler printf(":"); 122539beb93cSSam Leffler for (j = 0; j < 16; j++) 122639beb93cSSam Leffler printf("%02X", _rand[j]); 122739beb93cSSam Leffler printf("\n"); 122839beb93cSSam Leffler } 122939beb93cSSam Leffler 123039beb93cSSam Leffler scard_deinit(scard); 123139beb93cSSam Leffler 123239beb93cSSam Leffler return 0; 123339beb93cSSam Leffler } 123439beb93cSSam Leffler 123539beb93cSSam Leffler 1236e28a4053SRui Paulo static void eapol_test_terminate(int sig, void *signal_ctx) 123739beb93cSSam Leffler { 1238e28a4053SRui Paulo struct wpa_supplicant *wpa_s = signal_ctx; 123939beb93cSSam Leffler wpa_msg(wpa_s, MSG_INFO, "Signal %d received - terminating", sig); 124039beb93cSSam Leffler eloop_terminate(); 124139beb93cSSam Leffler } 124239beb93cSSam Leffler 124339beb93cSSam Leffler 124439beb93cSSam Leffler static void usage(void) 124539beb93cSSam Leffler { 124639beb93cSSam Leffler printf("usage:\n" 1247780fb4a2SCy Schubert "eapol_test [-enWSv] -c<conf> [-a<AS IP>] [-p<AS port>] " 124839beb93cSSam Leffler "[-s<AS secret>]\\\n" 124939beb93cSSam Leffler " [-r<count>] [-t<timeout>] [-C<Connect-Info>] \\\n" 1250f05cddf9SRui Paulo " [-M<client MAC address>] [-o<server cert file] \\\n" 12515b9c547cSRui Paulo " [-N<attr spec>] [-R<PC/SC reader>] " 12525b9c547cSRui Paulo "[-P<PC/SC PIN>] \\\n" 1253325151a3SRui Paulo " [-A<client IP>] [-i<ifname>] [-T<ctrl_iface>]\n" 125439beb93cSSam Leffler "eapol_test scard\n" 125539beb93cSSam Leffler "eapol_test sim <PIN> <num triplets> [debug]\n" 125639beb93cSSam Leffler "\n"); 125739beb93cSSam Leffler printf("options:\n" 125839beb93cSSam Leffler " -c<conf> = configuration file\n" 125939beb93cSSam Leffler " -a<AS IP> = IP address of the authentication server, " 126039beb93cSSam Leffler "default 127.0.0.1\n" 126139beb93cSSam Leffler " -p<AS port> = UDP port of the authentication server, " 126239beb93cSSam Leffler "default 1812\n" 126339beb93cSSam Leffler " -s<AS secret> = shared secret with the authentication " 126439beb93cSSam Leffler "server, default 'radius'\n" 126539beb93cSSam Leffler " -A<client IP> = IP address of the client, default: select " 126639beb93cSSam Leffler "automatically\n" 126739beb93cSSam Leffler " -r<count> = number of re-authentications\n" 12685b9c547cSRui Paulo " -e = Request EAP-Key-Name\n" 126939beb93cSSam Leffler " -W = wait for a control interface monitor before starting\n" 127039beb93cSSam Leffler " -S = save configuration after authentication\n" 127139beb93cSSam Leffler " -n = no MPPE keys expected\n" 1272780fb4a2SCy Schubert " -v = show version\n" 127339beb93cSSam Leffler " -t<timeout> = sets timeout in seconds (default: 30 s)\n" 127439beb93cSSam Leffler " -C<Connect-Info> = RADIUS Connect-Info (default: " 127539beb93cSSam Leffler "CONNECT 11Mbps 802.11b)\n" 127639beb93cSSam Leffler " -M<client MAC address> = Set own MAC address " 127739beb93cSSam Leffler "(Calling-Station-Id,\n" 127839beb93cSSam Leffler " default: 02:00:00:00:00:01)\n" 1279f05cddf9SRui Paulo " -o<server cert file> = Write received server certificate\n" 1280f05cddf9SRui Paulo " chain to the specified file\n" 128139beb93cSSam Leffler " -N<attr spec> = send arbitrary attribute specified by:\n" 128239beb93cSSam Leffler " attr_id:syntax:value or attr_id\n" 128339beb93cSSam Leffler " attr_id - number id of the attribute\n" 128439beb93cSSam Leffler " syntax - one of: s, d, x\n" 128539beb93cSSam Leffler " s = string\n" 128639beb93cSSam Leffler " d = integer\n" 128739beb93cSSam Leffler " x = octet string\n" 128839beb93cSSam Leffler " value - attribute value.\n" 128939beb93cSSam Leffler " When only attr_id is specified, NULL will be used as " 129039beb93cSSam Leffler "value.\n" 129139beb93cSSam Leffler " Multiple attributes can be specified by using the " 129239beb93cSSam Leffler "option several times.\n"); 129339beb93cSSam Leffler } 129439beb93cSSam Leffler 129539beb93cSSam Leffler 129639beb93cSSam Leffler int main(int argc, char *argv[]) 129739beb93cSSam Leffler { 12985b9c547cSRui Paulo struct wpa_global global; 129939beb93cSSam Leffler struct wpa_supplicant wpa_s; 130039beb93cSSam Leffler int c, ret = 1, wait_for_monitor = 0, save_config = 0; 130139beb93cSSam Leffler char *as_addr = "127.0.0.1"; 130239beb93cSSam Leffler int as_port = 1812; 130339beb93cSSam Leffler char *as_secret = "radius"; 130439beb93cSSam Leffler char *cli_addr = NULL; 130539beb93cSSam Leffler char *conf = NULL; 130639beb93cSSam Leffler int timeout = 30; 130739beb93cSSam Leffler char *pos; 130839beb93cSSam Leffler struct extra_radius_attr *p = NULL, *p1; 1309325151a3SRui Paulo const char *ifname = "test"; 1310325151a3SRui Paulo const char *ctrl_iface = NULL; 131139beb93cSSam Leffler 131239beb93cSSam Leffler if (os_program_init()) 131339beb93cSSam Leffler return -1; 131439beb93cSSam Leffler 131539beb93cSSam Leffler hostapd_logger_register_cb(hostapd_logger_cb); 131639beb93cSSam Leffler 131739beb93cSSam Leffler os_memset(&eapol_test, 0, sizeof(eapol_test)); 131839beb93cSSam Leffler eapol_test.connect_info = "CONNECT 11Mbps 802.11b"; 131939beb93cSSam Leffler os_memcpy(eapol_test.own_addr, "\x02\x00\x00\x00\x00\x01", ETH_ALEN); 13205b9c547cSRui Paulo eapol_test.pcsc_pin = "1234"; 132139beb93cSSam Leffler 132239beb93cSSam Leffler wpa_debug_level = 0; 132339beb93cSSam Leffler wpa_debug_show_keys = 1; 132439beb93cSSam Leffler 132539beb93cSSam Leffler for (;;) { 1326780fb4a2SCy Schubert c = getopt(argc, argv, "a:A:c:C:ei:M:nN:o:p:P:r:R:s:St:T:vW"); 132739beb93cSSam Leffler if (c < 0) 132839beb93cSSam Leffler break; 132939beb93cSSam Leffler switch (c) { 133039beb93cSSam Leffler case 'a': 133139beb93cSSam Leffler as_addr = optarg; 133239beb93cSSam Leffler break; 133339beb93cSSam Leffler case 'A': 133439beb93cSSam Leffler cli_addr = optarg; 133539beb93cSSam Leffler break; 133639beb93cSSam Leffler case 'c': 133739beb93cSSam Leffler conf = optarg; 133839beb93cSSam Leffler break; 133939beb93cSSam Leffler case 'C': 134039beb93cSSam Leffler eapol_test.connect_info = optarg; 134139beb93cSSam Leffler break; 13425b9c547cSRui Paulo case 'e': 13435b9c547cSRui Paulo eapol_test.req_eap_key_name = 1; 13445b9c547cSRui Paulo break; 1345325151a3SRui Paulo case 'i': 1346325151a3SRui Paulo ifname = optarg; 1347325151a3SRui Paulo break; 134839beb93cSSam Leffler case 'M': 134939beb93cSSam Leffler if (hwaddr_aton(optarg, eapol_test.own_addr)) { 135039beb93cSSam Leffler usage(); 135139beb93cSSam Leffler return -1; 135239beb93cSSam Leffler } 135339beb93cSSam Leffler break; 135439beb93cSSam Leffler case 'n': 135539beb93cSSam Leffler eapol_test.no_mppe_keys++; 135639beb93cSSam Leffler break; 1357f05cddf9SRui Paulo case 'o': 1358f05cddf9SRui Paulo if (eapol_test.server_cert_file) 1359f05cddf9SRui Paulo fclose(eapol_test.server_cert_file); 1360f05cddf9SRui Paulo eapol_test.server_cert_file = fopen(optarg, "w"); 1361f05cddf9SRui Paulo if (eapol_test.server_cert_file == NULL) { 1362f05cddf9SRui Paulo printf("Could not open '%s' for writing\n", 1363f05cddf9SRui Paulo optarg); 1364f05cddf9SRui Paulo return -1; 1365f05cddf9SRui Paulo } 1366f05cddf9SRui Paulo break; 136739beb93cSSam Leffler case 'p': 136839beb93cSSam Leffler as_port = atoi(optarg); 136939beb93cSSam Leffler break; 13705b9c547cSRui Paulo case 'P': 13715b9c547cSRui Paulo eapol_test.pcsc_pin = optarg; 13725b9c547cSRui Paulo break; 137339beb93cSSam Leffler case 'r': 137439beb93cSSam Leffler eapol_test.eapol_test_num_reauths = atoi(optarg); 137539beb93cSSam Leffler break; 13765b9c547cSRui Paulo case 'R': 13775b9c547cSRui Paulo eapol_test.pcsc_reader = optarg; 13785b9c547cSRui Paulo break; 137939beb93cSSam Leffler case 's': 138039beb93cSSam Leffler as_secret = optarg; 138139beb93cSSam Leffler break; 138239beb93cSSam Leffler case 'S': 138339beb93cSSam Leffler save_config++; 138439beb93cSSam Leffler break; 138539beb93cSSam Leffler case 't': 138639beb93cSSam Leffler timeout = atoi(optarg); 138739beb93cSSam Leffler break; 1388325151a3SRui Paulo case 'T': 1389325151a3SRui Paulo ctrl_iface = optarg; 1390325151a3SRui Paulo eapol_test.ctrl_iface = 1; 1391325151a3SRui Paulo break; 1392780fb4a2SCy Schubert case 'v': 1393780fb4a2SCy Schubert printf("eapol_test v" VERSION_STR "\n"); 1394780fb4a2SCy Schubert return 0; 139539beb93cSSam Leffler case 'W': 139639beb93cSSam Leffler wait_for_monitor++; 139739beb93cSSam Leffler break; 139839beb93cSSam Leffler case 'N': 1399f05cddf9SRui Paulo p1 = os_zalloc(sizeof(*p1)); 140039beb93cSSam Leffler if (p1 == NULL) 140139beb93cSSam Leffler break; 140239beb93cSSam Leffler if (!p) 140339beb93cSSam Leffler eapol_test.extra_attrs = p1; 140439beb93cSSam Leffler else 140539beb93cSSam Leffler p->next = p1; 140639beb93cSSam Leffler p = p1; 140739beb93cSSam Leffler 140839beb93cSSam Leffler p->type = atoi(optarg); 140939beb93cSSam Leffler pos = os_strchr(optarg, ':'); 141039beb93cSSam Leffler if (pos == NULL) { 141139beb93cSSam Leffler p->syntax = 'n'; 141239beb93cSSam Leffler p->data = NULL; 141339beb93cSSam Leffler break; 141439beb93cSSam Leffler } 141539beb93cSSam Leffler 141639beb93cSSam Leffler pos++; 141739beb93cSSam Leffler if (pos[0] == '\0' || pos[1] != ':') { 141839beb93cSSam Leffler printf("Incorrect format of attribute " 141939beb93cSSam Leffler "specification\n"); 142039beb93cSSam Leffler break; 142139beb93cSSam Leffler } 142239beb93cSSam Leffler 142339beb93cSSam Leffler p->syntax = pos[0]; 142439beb93cSSam Leffler p->data = pos + 2; 142539beb93cSSam Leffler break; 142639beb93cSSam Leffler default: 142739beb93cSSam Leffler usage(); 142839beb93cSSam Leffler return -1; 142939beb93cSSam Leffler } 143039beb93cSSam Leffler } 143139beb93cSSam Leffler 143239beb93cSSam Leffler if (argc > optind && os_strcmp(argv[optind], "scard") == 0) { 14335b9c547cSRui Paulo return scard_test(&eapol_test); 143439beb93cSSam Leffler } 143539beb93cSSam Leffler 143639beb93cSSam Leffler if (argc > optind && os_strcmp(argv[optind], "sim") == 0) { 14375b9c547cSRui Paulo return scard_get_triplets(&eapol_test, argc - optind - 1, 143839beb93cSSam Leffler &argv[optind + 1]); 143939beb93cSSam Leffler } 144039beb93cSSam Leffler 1441325151a3SRui Paulo if (conf == NULL && !ctrl_iface) { 144239beb93cSSam Leffler usage(); 144339beb93cSSam Leffler printf("Configuration file is required.\n"); 144439beb93cSSam Leffler return -1; 144539beb93cSSam Leffler } 144639beb93cSSam Leffler 1447e28a4053SRui Paulo if (eap_register_methods()) { 144839beb93cSSam Leffler wpa_printf(MSG_ERROR, "Failed to register EAP methods"); 144939beb93cSSam Leffler return -1; 145039beb93cSSam Leffler } 145139beb93cSSam Leffler 1452e28a4053SRui Paulo if (eloop_init()) { 145339beb93cSSam Leffler wpa_printf(MSG_ERROR, "Failed to initialize event loop"); 145439beb93cSSam Leffler return -1; 145539beb93cSSam Leffler } 145639beb93cSSam Leffler 14575b9c547cSRui Paulo os_memset(&global, 0, sizeof(global)); 145839beb93cSSam Leffler os_memset(&wpa_s, 0, sizeof(wpa_s)); 14595b9c547cSRui Paulo wpa_s.global = &global; 146039beb93cSSam Leffler eapol_test.wpa_s = &wpa_s; 14615b9c547cSRui Paulo dl_list_init(&wpa_s.bss); 14625b9c547cSRui Paulo dl_list_init(&wpa_s.bss_id); 1463325151a3SRui Paulo if (conf) 14645b9c547cSRui Paulo wpa_s.conf = wpa_config_read(conf, NULL); 1465325151a3SRui Paulo else 1466325151a3SRui Paulo wpa_s.conf = wpa_config_alloc_empty(ctrl_iface, NULL); 146739beb93cSSam Leffler if (wpa_s.conf == NULL) { 146839beb93cSSam Leffler printf("Failed to parse configuration file '%s'.\n", conf); 146939beb93cSSam Leffler return -1; 147039beb93cSSam Leffler } 1471325151a3SRui Paulo if (!ctrl_iface && wpa_s.conf->ssid == NULL) { 147239beb93cSSam Leffler printf("No networks defined.\n"); 147339beb93cSSam Leffler return -1; 147439beb93cSSam Leffler } 147539beb93cSSam Leffler 14765b9c547cSRui Paulo if (eapol_test.pcsc_reader) { 14775b9c547cSRui Paulo os_free(wpa_s.conf->pcsc_reader); 14785b9c547cSRui Paulo wpa_s.conf->pcsc_reader = os_strdup(eapol_test.pcsc_reader); 14795b9c547cSRui Paulo } 14805b9c547cSRui Paulo 148139beb93cSSam Leffler wpa_init_conf(&eapol_test, &wpa_s, as_addr, as_port, as_secret, 1482325151a3SRui Paulo cli_addr, ifname); 148339beb93cSSam Leffler wpa_s.ctrl_iface = wpa_supplicant_ctrl_iface_init(&wpa_s); 148439beb93cSSam Leffler if (wpa_s.ctrl_iface == NULL) { 148539beb93cSSam Leffler printf("Failed to initialize control interface '%s'.\n" 148639beb93cSSam Leffler "You may have another eapol_test process already " 148739beb93cSSam Leffler "running or the file was\n" 148839beb93cSSam Leffler "left by an unclean termination of eapol_test in " 148939beb93cSSam Leffler "which case you will need\n" 149039beb93cSSam Leffler "to manually remove this file before starting " 149139beb93cSSam Leffler "eapol_test again.\n", 149239beb93cSSam Leffler wpa_s.conf->ctrl_interface); 149339beb93cSSam Leffler return -1; 149439beb93cSSam Leffler } 1495325151a3SRui Paulo if (wpa_s.conf->ssid && 1496325151a3SRui Paulo wpa_supplicant_scard_init(&wpa_s, wpa_s.conf->ssid)) 149739beb93cSSam Leffler return -1; 149839beb93cSSam Leffler 149939beb93cSSam Leffler if (test_eapol(&eapol_test, &wpa_s, wpa_s.conf->ssid)) 150039beb93cSSam Leffler return -1; 150139beb93cSSam Leffler 1502f05cddf9SRui Paulo if (wpas_init_ext_pw(&wpa_s) < 0) 1503f05cddf9SRui Paulo return -1; 1504f05cddf9SRui Paulo 150539beb93cSSam Leffler if (wait_for_monitor) 150639beb93cSSam Leffler wpa_supplicant_ctrl_iface_wait(wpa_s.ctrl_iface); 150739beb93cSSam Leffler 1508325151a3SRui Paulo if (!ctrl_iface) { 1509325151a3SRui Paulo eloop_register_timeout(timeout, 0, eapol_test_timeout, 1510325151a3SRui Paulo &eapol_test, NULL); 1511325151a3SRui Paulo eloop_register_timeout(0, 0, send_eap_request_identity, &wpa_s, 151239beb93cSSam Leffler NULL); 1513325151a3SRui Paulo } 1514e28a4053SRui Paulo eloop_register_signal_terminate(eapol_test_terminate, &wpa_s); 1515e28a4053SRui Paulo eloop_register_signal_reconfig(eapol_test_terminate, &wpa_s); 151639beb93cSSam Leffler eloop_run(); 151739beb93cSSam Leffler 151839beb93cSSam Leffler eloop_cancel_timeout(eapol_test_timeout, &eapol_test, NULL); 151939beb93cSSam Leffler eloop_cancel_timeout(eapol_sm_reauth, &eapol_test, NULL); 152039beb93cSSam Leffler 152139beb93cSSam Leffler if (eapol_test_compare_pmk(&eapol_test) == 0 || 152239beb93cSSam Leffler eapol_test.no_mppe_keys) 152339beb93cSSam Leffler ret = 0; 152439beb93cSSam Leffler if (eapol_test.auth_timed_out) 152539beb93cSSam Leffler ret = -2; 152639beb93cSSam Leffler if (eapol_test.radius_access_reject_received) 152739beb93cSSam Leffler ret = -3; 152839beb93cSSam Leffler 152939beb93cSSam Leffler if (save_config) 153039beb93cSSam Leffler wpa_config_write(conf, wpa_s.conf); 153139beb93cSSam Leffler 153239beb93cSSam Leffler test_eapol_clean(&eapol_test, &wpa_s); 153339beb93cSSam Leffler 153439beb93cSSam Leffler eap_peer_unregister_methods(); 1535f05cddf9SRui Paulo #ifdef CONFIG_AP 1536f05cddf9SRui Paulo eap_server_unregister_methods(); 1537f05cddf9SRui Paulo #endif /* CONFIG_AP */ 153839beb93cSSam Leffler 153939beb93cSSam Leffler eloop_destroy(); 154039beb93cSSam Leffler 1541f05cddf9SRui Paulo if (eapol_test.server_cert_file) 1542f05cddf9SRui Paulo fclose(eapol_test.server_cert_file); 1543f05cddf9SRui Paulo 154439beb93cSSam Leffler printf("MPPE keys OK: %d mismatch: %d\n", 154539beb93cSSam Leffler eapol_test.num_mppe_ok, eapol_test.num_mppe_mismatch); 154639beb93cSSam Leffler if (eapol_test.num_mppe_mismatch) 154739beb93cSSam Leffler ret = -4; 154839beb93cSSam Leffler if (ret) 154939beb93cSSam Leffler printf("FAILURE\n"); 155039beb93cSSam Leffler else 155139beb93cSSam Leffler printf("SUCCESS\n"); 155239beb93cSSam Leffler 155339beb93cSSam Leffler os_program_deinit(); 155439beb93cSSam Leffler 155539beb93cSSam Leffler return ret; 155639beb93cSSam Leffler } 1557