2 * EAP peer method: Test method for vendor specific (expanded) EAP type
3 * Copyright (c) 2005-2015, Jouni Malinen <j@w1.fi>
5 * This software may be distributed under the terms of the BSD license.
6 * See README for more details.
8 * This file implements a vendor specific test method using EAP expanded types.
9 * This is only for test use and must not be used for authentication since no
10 * security is provided.
20 #define EAP_VENDOR_ID EAP_VENDOR_HOSTAP
21 #define EAP_VENDOR_TYPE 0xfcfbfaf9
24 struct eap_vendor_test_data {
25 enum { INIT, CONFIRM, SUCCESS } state;
31 static void * eap_vendor_test_init(struct eap_sm *sm)
33 struct eap_vendor_test_data *data;
37 data = os_zalloc(sizeof(*data));
43 password = eap_get_config_password(sm, &password_len);
44 data->test_pending_req = password && password_len == 7 &&
45 os_memcmp(password, "pending", 7) == 0;
51 static void eap_vendor_test_deinit(struct eap_sm *sm, void *priv)
53 struct eap_vendor_test_data *data = priv;
58 static void eap_vendor_ready(void *eloop_ctx, void *timeout_ctx)
60 struct eap_sm *sm = eloop_ctx;
61 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Ready to re-process pending "
63 eap_notify_pending(sm);
67 static struct wpabuf * eap_vendor_test_process(struct eap_sm *sm, void *priv,
68 struct eap_method_ret *ret,
69 const struct wpabuf *reqData)
71 struct eap_vendor_test_data *data = priv;
76 pos = eap_hdr_validate(EAP_VENDOR_ID, EAP_VENDOR_TYPE, reqData, &len);
77 if (pos == NULL || len < 1) {
82 if (data->state == INIT && *pos != 1) {
83 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
84 "%d in INIT state", *pos);
89 if (data->state == CONFIRM && *pos != 3) {
90 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
91 "%d in CONFIRM state", *pos);
96 if (data->state == SUCCESS) {
97 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Unexpected message "
103 if (data->state == CONFIRM) {
104 if (data->test_pending_req && data->first_try) {
106 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Testing "
109 eloop_register_timeout(1, 0, eap_vendor_ready, sm,
117 wpa_printf(MSG_DEBUG, "EAP-VENDOR-TEST: Generating Response");
118 ret->allowNotifications = TRUE;
120 resp = eap_msg_alloc(EAP_VENDOR_ID, EAP_VENDOR_TYPE, 1,
121 EAP_CODE_RESPONSE, eap_get_id(reqData));
125 if (data->state == INIT) {
126 wpabuf_put_u8(resp, 2);
127 data->state = CONFIRM;
128 ret->methodState = METHOD_CONT;
129 ret->decision = DECISION_FAIL;
131 wpabuf_put_u8(resp, 4);
132 data->state = SUCCESS;
133 ret->methodState = METHOD_DONE;
134 ret->decision = DECISION_UNCOND_SUCC;
141 static Boolean eap_vendor_test_isKeyAvailable(struct eap_sm *sm, void *priv)
143 struct eap_vendor_test_data *data = priv;
144 return data->state == SUCCESS;
148 static u8 * eap_vendor_test_getKey(struct eap_sm *sm, void *priv, size_t *len)
150 struct eap_vendor_test_data *data = priv;
152 const int key_len = 64;
154 if (data->state != SUCCESS)
157 key = os_malloc(key_len);
161 os_memset(key, 0x11, key_len / 2);
162 os_memset(key + key_len / 2, 0x22, key_len / 2);
169 int eap_peer_vendor_test_register(void)
171 struct eap_method *eap;
173 eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
174 EAP_VENDOR_ID, EAP_VENDOR_TYPE,
179 eap->init = eap_vendor_test_init;
180 eap->deinit = eap_vendor_test_deinit;
181 eap->process = eap_vendor_test_process;
182 eap->isKeyAvailable = eap_vendor_test_isKeyAvailable;
183 eap->getKey = eap_vendor_test_getKey;
185 return eap_peer_method_register(eap);