|  | #include "utils/includes.h" | 
|  | #include "utils/common.h" | 
|  | #include "utils/eloop.h" | 
|  | #include "crypto/crypto.h" | 
|  | #include "crypto/tls.h" | 
|  |  | 
|  | #include "ap/ap_config.h" | 
|  | #include "eap_server/eap.h" | 
|  | #include "radius/radius.h" | 
|  | #include "radius/radius_server.h" | 
|  | #include "eap_register.h" | 
|  |  | 
|  | #include <libubox/blobmsg_json.h> | 
|  | #include <libubox/blobmsg.h> | 
|  | #include <libubox/avl.h> | 
|  | #include <libubox/avl-cmp.h> | 
|  | #include <libubox/kvlist.h> | 
|  |  | 
|  | #include <sys/stat.h> | 
|  | #include <fnmatch.h> | 
|  |  | 
|  | #define VENDOR_ID_WISPR 14122 | 
|  | #define VENDOR_ATTR_SIZE 6 | 
|  |  | 
|  | struct radius_parse_attr_data { | 
|  | unsigned int vendor; | 
|  | u8 type; | 
|  | int size; | 
|  | char format; | 
|  | const char *data; | 
|  | }; | 
|  |  | 
|  | struct radius_parse_attr_state { | 
|  | struct hostapd_radius_attr *prev; | 
|  | struct hostapd_radius_attr *attr; | 
|  | struct wpabuf *buf; | 
|  | void *attrdata; | 
|  | }; | 
|  |  | 
|  | struct radius_user_state { | 
|  | struct avl_node node; | 
|  | struct eap_user data; | 
|  | }; | 
|  |  | 
|  | struct radius_user_data { | 
|  | struct kvlist users; | 
|  | struct avl_tree user_state; | 
|  | struct blob_attr *wildcard; | 
|  | }; | 
|  |  | 
|  | struct radius_state { | 
|  | struct radius_server_data *radius; | 
|  | struct eap_config eap; | 
|  |  | 
|  | struct radius_user_data phase1, phase2; | 
|  | const char *user_file; | 
|  | time_t user_file_ts; | 
|  |  | 
|  | int n_attrs; | 
|  | struct hostapd_radius_attr *attrs; | 
|  | }; | 
|  |  | 
|  | struct radius_config { | 
|  | struct tls_connection_params tls; | 
|  | struct radius_server_conf radius; | 
|  | }; | 
|  |  | 
|  | enum { | 
|  | USER_ATTR_PASSWORD, | 
|  | USER_ATTR_HASH, | 
|  | USER_ATTR_SALT, | 
|  | USER_ATTR_METHODS, | 
|  | USER_ATTR_RADIUS, | 
|  | USER_ATTR_VLAN, | 
|  | USER_ATTR_MAX_RATE_UP, | 
|  | USER_ATTR_MAX_RATE_DOWN, | 
|  | __USER_ATTR_MAX | 
|  | }; | 
|  |  | 
|  | static void radius_tls_event(void *ctx, enum tls_event ev, | 
|  | union tls_event_data *data) | 
|  | { | 
|  | switch (ev) { | 
|  | case TLS_CERT_CHAIN_SUCCESS: | 
|  | wpa_printf(MSG_DEBUG, "radius: remote certificate verification success"); | 
|  | break; | 
|  | case TLS_CERT_CHAIN_FAILURE: | 
|  | wpa_printf(MSG_INFO, "radius: certificate chain failure: reason=%d depth=%d subject='%s' err='%s'", | 
|  | data->cert_fail.reason, | 
|  | data->cert_fail.depth, | 
|  | data->cert_fail.subject, | 
|  | data->cert_fail.reason_txt); | 
|  | break; | 
|  | case TLS_PEER_CERTIFICATE: | 
|  | wpa_printf(MSG_DEBUG, "radius: peer certificate: depth=%d serial_num=%s subject=%s", | 
|  | data->peer_cert.depth, | 
|  | data->peer_cert.serial_num ? data->peer_cert.serial_num : "N/A", | 
|  | data->peer_cert.subject); | 
|  | break; | 
|  | case TLS_ALERT: | 
|  | if (data->alert.is_local) | 
|  | wpa_printf(MSG_DEBUG, "radius: local TLS alert: %s", | 
|  | data->alert.description); | 
|  | else | 
|  | wpa_printf(MSG_DEBUG, "radius: remote TLS alert: %s", | 
|  | data->alert.description); | 
|  | break; | 
|  | case TLS_UNSAFE_RENEGOTIATION_DISABLED: | 
|  | /* Not applicable to TLS server */ | 
|  | break; | 
|  | } | 
|  | } | 
|  |  | 
|  | static void radius_userdata_init(struct radius_user_data *u) | 
|  | { | 
|  | kvlist_init(&u->users, kvlist_blob_len); | 
|  | avl_init(&u->user_state, avl_strcmp, false, NULL); | 
|  | } | 
|  |  | 
|  | static void radius_userdata_free(struct radius_user_data *u) | 
|  | { | 
|  | struct radius_user_state *s, *tmp; | 
|  |  | 
|  | kvlist_free(&u->users); | 
|  | free(u->wildcard); | 
|  | u->wildcard = NULL; | 
|  | avl_remove_all_elements(&u->user_state, s, node, tmp) | 
|  | free(s); | 
|  | } | 
|  |  | 
|  | static void | 
|  | radius_userdata_load(struct radius_user_data *u, struct blob_attr *data) | 
|  | { | 
|  | enum { | 
|  | USERSTATE_USERS, | 
|  | USERSTATE_WILDCARD, | 
|  | __USERSTATE_MAX, | 
|  | }; | 
|  | static const struct blobmsg_policy policy[__USERSTATE_MAX] = { | 
|  | [USERSTATE_USERS] = { "users", BLOBMSG_TYPE_TABLE }, | 
|  | [USERSTATE_WILDCARD] = { "wildcard", BLOBMSG_TYPE_ARRAY }, | 
|  | }; | 
|  | struct blob_attr *tb[__USERSTATE_MAX], *cur; | 
|  | int rem; | 
|  |  | 
|  | if (!data) | 
|  | return; | 
|  |  | 
|  | blobmsg_parse(policy, __USERSTATE_MAX, tb, blobmsg_data(data), blobmsg_len(data)); | 
|  |  | 
|  | blobmsg_for_each_attr(cur, tb[USERSTATE_USERS], rem) | 
|  | kvlist_set(&u->users, blobmsg_name(cur), cur); | 
|  |  | 
|  | if (tb[USERSTATE_WILDCARD]) | 
|  | u->wildcard = blob_memdup(tb[USERSTATE_WILDCARD]); | 
|  | } | 
|  |  | 
|  | static void | 
|  | load_userfile(struct radius_state *s) | 
|  | { | 
|  | enum { | 
|  | USERDATA_PHASE1, | 
|  | USERDATA_PHASE2, | 
|  | __USERDATA_MAX | 
|  | }; | 
|  | static const struct blobmsg_policy policy[__USERDATA_MAX] = { | 
|  | [USERDATA_PHASE1] = { "phase1", BLOBMSG_TYPE_TABLE }, | 
|  | [USERDATA_PHASE2] = { "phase2", BLOBMSG_TYPE_TABLE }, | 
|  | }; | 
|  | struct blob_attr *tb[__USERDATA_MAX], *cur; | 
|  | static struct blob_buf b; | 
|  | struct stat st; | 
|  | int rem; | 
|  |  | 
|  | if (stat(s->user_file, &st)) | 
|  | return; | 
|  |  | 
|  | if (s->user_file_ts == st.st_mtime) | 
|  | return; | 
|  |  | 
|  | s->user_file_ts = st.st_mtime; | 
|  | radius_userdata_free(&s->phase1); | 
|  | radius_userdata_free(&s->phase2); | 
|  |  | 
|  | blob_buf_init(&b, 0); | 
|  | blobmsg_add_json_from_file(&b, s->user_file); | 
|  | blobmsg_parse(policy, __USERDATA_MAX, tb, blob_data(b.head), blob_len(b.head)); | 
|  | radius_userdata_load(&s->phase1, tb[USERDATA_PHASE1]); | 
|  | radius_userdata_load(&s->phase2, tb[USERDATA_PHASE2]); | 
|  |  | 
|  | blob_buf_free(&b); | 
|  | } | 
|  |  | 
|  | static struct blob_attr * | 
|  | radius_user_get(struct radius_user_data *s, const char *name) | 
|  | { | 
|  | struct blob_attr *cur; | 
|  | int rem; | 
|  |  | 
|  | cur = kvlist_get(&s->users, name); | 
|  | if (cur) | 
|  | return cur; | 
|  |  | 
|  | blobmsg_for_each_attr(cur, s->wildcard, rem) { | 
|  | static const struct blobmsg_policy policy = { | 
|  | "name", BLOBMSG_TYPE_STRING | 
|  | }; | 
|  | struct blob_attr *pattern; | 
|  |  | 
|  | if (blobmsg_type(cur) != BLOBMSG_TYPE_TABLE) | 
|  | continue; | 
|  |  | 
|  | blobmsg_parse(&policy, 1, &pattern, blobmsg_data(cur), blobmsg_len(cur)); | 
|  | if (!name) | 
|  | continue; | 
|  |  | 
|  | if (!fnmatch(blobmsg_get_string(pattern), name, 0)) | 
|  | return cur; | 
|  | } | 
|  |  | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static struct radius_parse_attr_data * | 
|  | radius_parse_attr(struct blob_attr *attr) | 
|  | { | 
|  | static const struct blobmsg_policy policy[4] = { | 
|  | { .type = BLOBMSG_TYPE_INT32 }, | 
|  | { .type = BLOBMSG_TYPE_INT32 }, | 
|  | { .type = BLOBMSG_TYPE_STRING }, | 
|  | { .type = BLOBMSG_TYPE_STRING }, | 
|  | }; | 
|  | static struct radius_parse_attr_data data; | 
|  | struct blob_attr *tb[4]; | 
|  | const char *format; | 
|  |  | 
|  | blobmsg_parse_array(policy, ARRAY_SIZE(policy), tb, blobmsg_data(attr), blobmsg_len(attr)); | 
|  |  | 
|  | if (!tb[0] || !tb[1] || !tb[2] || !tb[3]) | 
|  | return NULL; | 
|  |  | 
|  | format = blobmsg_get_string(tb[2]); | 
|  | if (strlen(format) != 1) | 
|  | return NULL; | 
|  |  | 
|  | data.vendor = blobmsg_get_u32(tb[0]); | 
|  | data.type = blobmsg_get_u32(tb[1]); | 
|  | data.format = format[0]; | 
|  | data.data = blobmsg_get_string(tb[3]); | 
|  | data.size = strlen(data.data); | 
|  |  | 
|  | switch (data.format) { | 
|  | case 's': | 
|  | break; | 
|  | case 'x': | 
|  | if (data.size & 1) | 
|  | return NULL; | 
|  | data.size /= 2; | 
|  | break; | 
|  | case 'd': | 
|  | data.size = 4; | 
|  | break; | 
|  | default: | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | return &data; | 
|  | } | 
|  |  | 
|  | static void | 
|  | radius_count_attrs(struct blob_attr **tb, int *n_attr, size_t *attr_size) | 
|  | { | 
|  | struct blob_attr *data = tb[USER_ATTR_RADIUS]; | 
|  | struct blob_attr *cur; | 
|  | int rem; | 
|  |  | 
|  | blobmsg_for_each_attr(cur, data, rem) { | 
|  | struct radius_parse_attr_data *data; | 
|  | size_t prev = *attr_size; | 
|  |  | 
|  | data = radius_parse_attr(cur); | 
|  | if (!data) | 
|  | continue; | 
|  |  | 
|  | *attr_size += data->size; | 
|  | if (data->vendor) | 
|  | *attr_size += VENDOR_ATTR_SIZE; | 
|  |  | 
|  | (*n_attr)++; | 
|  | } | 
|  |  | 
|  | *n_attr += !!tb[USER_ATTR_VLAN] * 3 + | 
|  | !!tb[USER_ATTR_MAX_RATE_UP] + | 
|  | !!tb[USER_ATTR_MAX_RATE_DOWN]; | 
|  | *attr_size += !!tb[USER_ATTR_VLAN] * (4 + 4 + 5) + | 
|  | !!tb[USER_ATTR_MAX_RATE_UP] * (4 + VENDOR_ATTR_SIZE) + | 
|  | !!tb[USER_ATTR_MAX_RATE_DOWN] * (4 + VENDOR_ATTR_SIZE); | 
|  | } | 
|  |  | 
|  | static void * | 
|  | radius_add_attr(struct radius_parse_attr_state *state, | 
|  | u32 vendor, u8 type, u8 len) | 
|  | { | 
|  | struct hostapd_radius_attr *attr; | 
|  | struct wpabuf *buf; | 
|  | void *val; | 
|  |  | 
|  | val = state->attrdata; | 
|  |  | 
|  | buf = state->buf++; | 
|  | buf->buf = val; | 
|  |  | 
|  | attr = state->attr++; | 
|  | attr->val = buf; | 
|  | attr->type = type; | 
|  |  | 
|  | if (state->prev) | 
|  | state->prev->next = attr; | 
|  | state->prev = attr; | 
|  |  | 
|  | if (vendor) { | 
|  | u8 *vendor_hdr = val + 4; | 
|  |  | 
|  | WPA_PUT_BE32(val, vendor); | 
|  | vendor_hdr[0] = type; | 
|  | vendor_hdr[1] = len + 2; | 
|  |  | 
|  | len += VENDOR_ATTR_SIZE; | 
|  | val += VENDOR_ATTR_SIZE; | 
|  | attr->type = RADIUS_ATTR_VENDOR_SPECIFIC; | 
|  | } | 
|  |  | 
|  | buf->size = buf->used = len; | 
|  | state->attrdata += len; | 
|  |  | 
|  | return val; | 
|  | } | 
|  |  | 
|  | static void | 
|  | radius_parse_attrs(struct blob_attr **tb, struct radius_parse_attr_state *state) | 
|  | { | 
|  | struct blob_attr *data = tb[USER_ATTR_RADIUS]; | 
|  | struct hostapd_radius_attr *prev = NULL; | 
|  | struct blob_attr *cur; | 
|  | int len, rem; | 
|  | void *val; | 
|  |  | 
|  | if ((cur = tb[USER_ATTR_VLAN]) != NULL && blobmsg_get_u32(cur) < 4096) { | 
|  | char buf[5]; | 
|  |  | 
|  | val = radius_add_attr(state, 0, RADIUS_ATTR_TUNNEL_TYPE, 4); | 
|  | WPA_PUT_BE32(val, RADIUS_TUNNEL_TYPE_VLAN); | 
|  |  | 
|  | val = radius_add_attr(state, 0, RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, 4); | 
|  | WPA_PUT_BE32(val, RADIUS_TUNNEL_MEDIUM_TYPE_802); | 
|  |  | 
|  | len = snprintf(buf, sizeof(buf), "%d", blobmsg_get_u32(cur)); | 
|  | val = radius_add_attr(state, 0, RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, len); | 
|  | memcpy(val, buf, len); | 
|  | } | 
|  |  | 
|  | if ((cur = tb[USER_ATTR_MAX_RATE_UP]) != NULL) { | 
|  | val = radius_add_attr(state, VENDOR_ID_WISPR, 7, 4); | 
|  | WPA_PUT_BE32(val, blobmsg_get_u32(cur)); | 
|  | } | 
|  |  | 
|  | if ((cur = tb[USER_ATTR_MAX_RATE_DOWN]) != NULL) { | 
|  | val = radius_add_attr(state, VENDOR_ID_WISPR, 8, 4); | 
|  | WPA_PUT_BE32(val, blobmsg_get_u32(cur)); | 
|  | } | 
|  |  | 
|  | blobmsg_for_each_attr(cur, data, rem) { | 
|  | struct radius_parse_attr_data *data; | 
|  | void *val; | 
|  | int size; | 
|  |  | 
|  | data = radius_parse_attr(cur); | 
|  | if (!data) | 
|  | continue; | 
|  |  | 
|  | val = radius_add_attr(state, data->vendor, data->type, data->size); | 
|  | switch (data->format) { | 
|  | case 's': | 
|  | memcpy(val, data->data, data->size); | 
|  | break; | 
|  | case 'x': | 
|  | hexstr2bin(data->data, val, data->size); | 
|  | break; | 
|  | case 'd': | 
|  | WPA_PUT_BE32(val, atoi(data->data)); | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | static void | 
|  | radius_user_parse_methods(struct eap_user *eap, struct blob_attr *data) | 
|  | { | 
|  | struct blob_attr *cur; | 
|  | int rem, n = 0; | 
|  |  | 
|  | if (!data) | 
|  | return; | 
|  |  | 
|  | blobmsg_for_each_attr(cur, data, rem) { | 
|  | const char *method; | 
|  |  | 
|  | if (blobmsg_type(cur) != BLOBMSG_TYPE_STRING) | 
|  | continue; | 
|  |  | 
|  | if (n == EAP_MAX_METHODS) | 
|  | break; | 
|  |  | 
|  | method = blobmsg_get_string(cur); | 
|  | eap->methods[n].method = eap_server_get_type(method, &eap->methods[n].vendor); | 
|  | if (eap->methods[n].vendor == EAP_VENDOR_IETF && | 
|  | eap->methods[n].method == EAP_TYPE_NONE) { | 
|  | if (!strcmp(method, "TTLS-PAP")) { | 
|  | eap->ttls_auth |= EAP_TTLS_AUTH_PAP; | 
|  | continue; | 
|  | } | 
|  | if (!strcmp(method, "TTLS-CHAP")) { | 
|  | eap->ttls_auth |= EAP_TTLS_AUTH_CHAP; | 
|  | continue; | 
|  | } | 
|  | if (!strcmp(method, "TTLS-MSCHAP")) { | 
|  | eap->ttls_auth |= EAP_TTLS_AUTH_MSCHAP; | 
|  | continue; | 
|  | } | 
|  | if (!strcmp(method, "TTLS-MSCHAPV2")) { | 
|  | eap->ttls_auth |= EAP_TTLS_AUTH_MSCHAPV2; | 
|  | continue; | 
|  | } | 
|  | } | 
|  | n++; | 
|  | } | 
|  | } | 
|  |  | 
|  | static struct eap_user * | 
|  | radius_user_get_state(struct radius_user_data *u, struct blob_attr *data, | 
|  | const char *id) | 
|  | { | 
|  | static const struct blobmsg_policy policy[__USER_ATTR_MAX] = { | 
|  | [USER_ATTR_PASSWORD] = { "password", BLOBMSG_TYPE_STRING }, | 
|  | [USER_ATTR_HASH] = { "hash", BLOBMSG_TYPE_STRING }, | 
|  | [USER_ATTR_SALT] = { "salt", BLOBMSG_TYPE_STRING }, | 
|  | [USER_ATTR_METHODS] = { "methods", BLOBMSG_TYPE_ARRAY }, | 
|  | [USER_ATTR_RADIUS] = { "radius", BLOBMSG_TYPE_ARRAY }, | 
|  | [USER_ATTR_VLAN] = { "vlan-id", BLOBMSG_TYPE_INT32 }, | 
|  | [USER_ATTR_MAX_RATE_UP] = { "max-rate-up", BLOBMSG_TYPE_INT32 }, | 
|  | [USER_ATTR_MAX_RATE_DOWN] = { "max-rate-down", BLOBMSG_TYPE_INT32 }, | 
|  | }; | 
|  | struct blob_attr *tb[__USER_ATTR_MAX], *cur; | 
|  | char *password_buf, *salt_buf, *name_buf; | 
|  | struct radius_parse_attr_state astate = {}; | 
|  | struct hostapd_radius_attr *attr; | 
|  | struct radius_user_state *state; | 
|  | int pw_len = 0, salt_len = 0; | 
|  | struct eap_user *eap; | 
|  | struct wpabuf *val; | 
|  | size_t attrsize = 0; | 
|  | void *attrdata; | 
|  | int n_attr = 0; | 
|  |  | 
|  | state = avl_find_element(&u->user_state, id, state, node); | 
|  | if (state) | 
|  | return &state->data; | 
|  |  | 
|  | blobmsg_parse(policy, __USER_ATTR_MAX, tb, blobmsg_data(data), blobmsg_len(data)); | 
|  |  | 
|  | if ((cur = tb[USER_ATTR_SALT]) != NULL) | 
|  | salt_len = strlen(blobmsg_get_string(cur)) / 2; | 
|  | if ((cur = tb[USER_ATTR_HASH]) != NULL) | 
|  | pw_len = strlen(blobmsg_get_string(cur)) / 2; | 
|  | else if ((cur = tb[USER_ATTR_PASSWORD]) != NULL) | 
|  | pw_len = blobmsg_len(cur) - 1; | 
|  | radius_count_attrs(tb, &n_attr, &attrsize); | 
|  |  | 
|  | state = calloc_a(sizeof(*state), &name_buf, strlen(id) + 1, | 
|  | &password_buf, pw_len, | 
|  | &salt_buf, salt_len, | 
|  | &astate.attr, n_attr * sizeof(*astate.attr), | 
|  | &astate.buf, n_attr * sizeof(*astate.buf), | 
|  | &astate.attrdata, attrsize); | 
|  | eap = &state->data; | 
|  | eap->salt = salt_len ? salt_buf : NULL; | 
|  | eap->salt_len = salt_len; | 
|  | eap->password = pw_len ? password_buf : NULL; | 
|  | eap->password_len = pw_len; | 
|  | eap->force_version = -1; | 
|  |  | 
|  | if ((cur = tb[USER_ATTR_SALT]) != NULL) | 
|  | hexstr2bin(blobmsg_get_string(cur), salt_buf, salt_len); | 
|  | if ((cur = tb[USER_ATTR_PASSWORD]) != NULL) | 
|  | memcpy(password_buf, blobmsg_get_string(cur), pw_len); | 
|  | else if ((cur = tb[USER_ATTR_HASH]) != NULL) { | 
|  | hexstr2bin(blobmsg_get_string(cur), password_buf, pw_len); | 
|  | eap->password_hash = 1; | 
|  | } | 
|  | radius_user_parse_methods(eap, tb[USER_ATTR_METHODS]); | 
|  |  | 
|  | if (n_attr > 0) { | 
|  | cur = tb[USER_ATTR_RADIUS]; | 
|  | eap->accept_attr = astate.attr; | 
|  | radius_parse_attrs(tb, &astate); | 
|  | } | 
|  |  | 
|  | state->node.key = strcpy(name_buf, id); | 
|  | avl_insert(&u->user_state, &state->node); | 
|  |  | 
|  | return &state->data; | 
|  |  | 
|  | free: | 
|  | free(state); | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | static int radius_get_eap_user(void *ctx, const u8 *identity, | 
|  | size_t identity_len, int phase2, | 
|  | struct eap_user *user) | 
|  | { | 
|  | struct radius_state *s = ctx; | 
|  | struct radius_user_data *u = phase2 ? &s->phase2 : &s->phase1; | 
|  | struct blob_attr *entry; | 
|  | struct eap_user *data; | 
|  | char *id; | 
|  |  | 
|  | if (identity_len > 512) | 
|  | return -1; | 
|  |  | 
|  | load_userfile(s); | 
|  |  | 
|  | id = alloca(identity_len + 1); | 
|  | memcpy(id, identity, identity_len); | 
|  | id[identity_len] = 0; | 
|  |  | 
|  | entry = radius_user_get(u, id); | 
|  | if (!entry) | 
|  | return -1; | 
|  |  | 
|  | if (!user) | 
|  | return 0; | 
|  |  | 
|  | data = radius_user_get_state(u, entry, id); | 
|  | if (!data) | 
|  | return -1; | 
|  |  | 
|  | *user = *data; | 
|  | if (user->password_len > 0) | 
|  | user->password = os_memdup(user->password, user->password_len); | 
|  | if (user->salt_len > 0) | 
|  | user->salt = os_memdup(user->salt, user->salt_len); | 
|  | user->phase2 = phase2; | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int radius_setup(struct radius_state *s, struct radius_config *c) | 
|  | { | 
|  | struct eap_config *eap = &s->eap; | 
|  | struct tls_config conf = { | 
|  | .event_cb = radius_tls_event, | 
|  | .tls_flags = TLS_CONN_DISABLE_TLSv1_3, | 
|  | .cb_ctx = s, | 
|  | }; | 
|  |  | 
|  | eap->eap_server = 1; | 
|  | eap->max_auth_rounds = 100; | 
|  | eap->max_auth_rounds_short = 50; | 
|  | eap->ssl_ctx = tls_init(&conf); | 
|  | if (!eap->ssl_ctx) { | 
|  | wpa_printf(MSG_INFO, "TLS init failed\n"); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | if (tls_global_set_params(eap->ssl_ctx, &c->tls)) { | 
|  | wpa_printf(MSG_INFO, "failed to set TLS parameters\n"); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | c->radius.eap_cfg = eap; | 
|  | c->radius.conf_ctx = s; | 
|  | c->radius.get_eap_user = radius_get_eap_user; | 
|  | s->radius = radius_server_init(&c->radius); | 
|  | if (!s->radius) { | 
|  | wpa_printf(MSG_INFO, "failed to initialize radius server\n"); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static int radius_init(struct radius_state *s) | 
|  | { | 
|  | memset(s, 0, sizeof(*s)); | 
|  | radius_userdata_init(&s->phase1); | 
|  | radius_userdata_init(&s->phase2); | 
|  | } | 
|  |  | 
|  | static void radius_deinit(struct radius_state *s) | 
|  | { | 
|  | if (s->radius) | 
|  | radius_server_deinit(s->radius); | 
|  |  | 
|  | if (s->eap.ssl_ctx) | 
|  | tls_deinit(s->eap.ssl_ctx); | 
|  |  | 
|  | radius_userdata_free(&s->phase1); | 
|  | radius_userdata_free(&s->phase2); | 
|  | } | 
|  |  | 
|  | static int usage(const char *progname) | 
|  | { | 
|  | fprintf(stderr, "Usage: %s <options>\n", | 
|  | progname); | 
|  | } | 
|  |  | 
|  | int radius_main(int argc, char **argv) | 
|  | { | 
|  | static struct radius_state state = {}; | 
|  | static struct radius_config config = {}; | 
|  | const char *progname = argv[0]; | 
|  | int ret = 0; | 
|  | int ch; | 
|  |  | 
|  | wpa_debug_setup_stdout(); | 
|  | wpa_debug_level = 0; | 
|  |  | 
|  | if (eloop_init()) { | 
|  | wpa_printf(MSG_ERROR, "Failed to initialize event loop"); | 
|  | return 1; | 
|  | } | 
|  |  | 
|  | eap_server_register_methods(); | 
|  | radius_init(&state); | 
|  |  | 
|  | while ((ch = getopt(argc, argv, "6C:c:d:i:k:K:p:P:s:u:")) != -1) { | 
|  | switch (ch) { | 
|  | case '6': | 
|  | config.radius.ipv6 = 1; | 
|  | break; | 
|  | case 'C': | 
|  | config.tls.ca_cert = optarg; | 
|  | break; | 
|  | case 'c': | 
|  | if (config.tls.client_cert2) | 
|  | return usage(progname); | 
|  |  | 
|  | if (config.tls.client_cert) | 
|  | config.tls.client_cert2 = optarg; | 
|  | else | 
|  | config.tls.client_cert = optarg; | 
|  | break; | 
|  | case 'd': | 
|  | config.tls.dh_file = optarg; | 
|  | break; | 
|  | case 'i': | 
|  | state.eap.server_id = optarg; | 
|  | state.eap.server_id_len = strlen(optarg); | 
|  | break; | 
|  | case 'k': | 
|  | if (config.tls.private_key2) | 
|  | return usage(progname); | 
|  |  | 
|  | if (config.tls.private_key) | 
|  | config.tls.private_key2 = optarg; | 
|  | else | 
|  | config.tls.private_key = optarg; | 
|  | break; | 
|  | case 'K': | 
|  | if (config.tls.private_key_passwd2) | 
|  | return usage(progname); | 
|  |  | 
|  | if (config.tls.private_key_passwd) | 
|  | config.tls.private_key_passwd2 = optarg; | 
|  | else | 
|  | config.tls.private_key_passwd = optarg; | 
|  | break; | 
|  | case 'p': | 
|  | config.radius.auth_port = atoi(optarg); | 
|  | break; | 
|  | case 'P': | 
|  | config.radius.acct_port = atoi(optarg); | 
|  | break; | 
|  | case 's': | 
|  | config.radius.client_file = optarg; | 
|  | break; | 
|  | case 'u': | 
|  | state.user_file = optarg; | 
|  | break; | 
|  | default: | 
|  | return usage(progname); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (!config.tls.client_cert || !config.tls.private_key || | 
|  | !config.radius.client_file || !state.eap.server_id || | 
|  | !state.user_file) { | 
|  | wpa_printf(MSG_INFO, "missing options\n"); | 
|  | goto out; | 
|  | } | 
|  |  | 
|  | ret = radius_setup(&state, &config); | 
|  | if (ret) | 
|  | goto out; | 
|  |  | 
|  | load_userfile(&state); | 
|  | eloop_run(); | 
|  |  | 
|  | out: | 
|  | radius_deinit(&state); | 
|  | os_program_deinit(); | 
|  |  | 
|  | return ret; | 
|  | } |