#ifndef _GSSAPIP_EAP_H_
#define _GSSAPIP_EAP_H_ 1
-#define BUILTIN_EAP 1
-
#include <assert.h>
#include <string.h>
#include <errno.h>
#include <gssapi/gssapi.h>
#include <gssapi/gssapi_ext.h>
#include "gssapi_eap.h"
-#include "util.h"
/* Kerberos includes */
#include <krb5.h>
#include <common.h>
#include <eap_peer/eap.h>
#include <eap_peer/eap_config.h>
-#include <crypto/tls.h> /* XXX testing implementation only */
+#include <crypto/tls.h>
#include <wpabuf.h>
#endif
+#include <freeradius-client.h>
+#include <freeradius/radius.h>
+
+#include "util.h"
+
+/* These name flags are informative and not actually used by anything yet */
#define NAME_FLAG_NAI 0x00000001
#define NAME_FLAG_SERVICE 0x00000002
-#define NAME_FLAG_RADIUS_ATTRIBUTES 0x00000004
-#define NAME_FLAG_SAML_ATTRIBUTES 0x00000008
-
-#define NAME_HAS_ATTRIBUTES(name) \
- (((name)->flags & (NAME_FLAG_RADIUS_ATTRIBUTES | \
- NAME_FLAG_SAML_ATTRIBUTES)) != 0)
+#define NAME_FLAG_COMPOSITE 0x00000004
struct gss_eap_saml_attr_ctx;
+struct gss_eap_attr_ctx;
struct gss_name_struct {
- GSSEAP_MUTEX mutex; /* mutex protecting attributes */
+ GSSEAP_MUTEX mutex; /* mutex protects attrCtx */
OM_uint32 flags;
krb5_principal krbPrincipal; /* this is immutable */
- struct gss_eap_radius_attr_ctx *radiusCtx;
- struct gss_eap_saml_attr_ctx *samlCtx;
+ struct gss_eap_attr_ctx *attrCtx;
};
-#define CRED_FLAG_INITIATE 0x00000001
-#define CRED_FLAG_ACCEPT 0x00000002
-#define CRED_FLAG_DEFAULT_IDENTITY 0x00000004
-#define CRED_FLAG_PASSWORD 0x00000008
+#define CRED_FLAG_INITIATE 0x00010000
+#define CRED_FLAG_ACCEPT 0x00020000
+#define CRED_FLAG_DEFAULT_IDENTITY 0x00040000
+#define CRED_FLAG_PASSWORD 0x00080000
+#define CRED_FLAG_PUBLIC_MASK 0x0000FFFF
struct gss_cred_id_struct {
GSSEAP_MUTEX mutex;
gss_buffer_desc password;
gss_OID_set mechanisms;
time_t expiryTime;
+ char *radiusConfigFile;
+ krb5_ccache krbCredCache;
+ gss_cred_id_t krbCred;
};
#define CTX_FLAG_INITIATOR 0x00000001
#define CTX_IS_INITIATOR(ctx) (((ctx)->flags & CTX_FLAG_INITIATOR) != 0)
enum gss_eap_state {
- EAP_STATE_AUTHENTICATE = 0,
-#if 0
- EAP_STATE_KEY_TRANSPORT,
- EAP_STATE_SECURE_ASSOCIATION,
-#endif
+ EAP_STATE_IDENTITY = 0,
+ EAP_STATE_AUTHENTICATE,
EAP_STATE_GSS_CHANNEL_BINDINGS,
+ EAP_STATE_FAST_REAUTH,
EAP_STATE_ESTABLISHED
};
#define CTX_FLAG_EAP_PORT_ENABLED 0x00400000
#define CTX_FLAG_EAP_ALT_ACCEPT 0x00800000
#define CTX_FLAG_EAP_ALT_REJECT 0x01000000
+#define CTX_FLAG_EAP_MASK 0xFFFF0000
struct gss_eap_initiator_ctx {
unsigned int idleWhile;
};
struct gss_eap_acceptor_ctx {
-#if defined(BUILTIN_EAP) && !defined(__cplusplus)
- struct eap_eapol_interface *eapPolInterface;
- void *tlsContext;
- struct eap_sm *eap;
-#endif
+ rc_handle *radHandle;
+ int lastStatus;
+ VALUE_PAIR *avps;
+ gss_buffer_desc state;
};
struct gss_ctx_id_struct {
int iov_count,
enum gss_eap_token_type toktype);
+OM_uint32
+gssEapWrapIovLength(OM_uint32 *minor,
+ gss_ctx_id_t ctx,
+ int conf_req_flag,
+ gss_qop_t qop_req,
+ int *conf_state,
+ gss_iov_buffer_desc *iov,
+ int iov_count);
+
#endif /* _GSSAPIP_EAP_H_ */