139beb93cSSam Leffler /* 239beb93cSSam Leffler * IKEv2 responder (RFC 4306) for EAP-IKEV2 339beb93cSSam Leffler * Copyright (c) 2007, Jouni Malinen <j@w1.fi> 439beb93cSSam Leffler * 5*f05cddf9SRui Paulo * This software may be distributed under the terms of the BSD license. 6*f05cddf9SRui Paulo * See README for more details. 739beb93cSSam Leffler */ 839beb93cSSam Leffler 939beb93cSSam Leffler #include "includes.h" 1039beb93cSSam Leffler 1139beb93cSSam Leffler #include "common.h" 12e28a4053SRui Paulo #include "crypto/dh_groups.h" 13*f05cddf9SRui Paulo #include "crypto/random.h" 1439beb93cSSam Leffler #include "ikev2.h" 1539beb93cSSam Leffler 1639beb93cSSam Leffler 1739beb93cSSam Leffler void ikev2_responder_deinit(struct ikev2_responder_data *data) 1839beb93cSSam Leffler { 1939beb93cSSam Leffler ikev2_free_keys(&data->keys); 2039beb93cSSam Leffler wpabuf_free(data->i_dh_public); 2139beb93cSSam Leffler wpabuf_free(data->r_dh_private); 2239beb93cSSam Leffler os_free(data->IDi); 2339beb93cSSam Leffler os_free(data->IDr); 2439beb93cSSam Leffler os_free(data->shared_secret); 2539beb93cSSam Leffler wpabuf_free(data->i_sign_msg); 2639beb93cSSam Leffler wpabuf_free(data->r_sign_msg); 2739beb93cSSam Leffler os_free(data->key_pad); 2839beb93cSSam Leffler } 2939beb93cSSam Leffler 3039beb93cSSam Leffler 3139beb93cSSam Leffler static int ikev2_derive_keys(struct ikev2_responder_data *data) 3239beb93cSSam Leffler { 3339beb93cSSam Leffler u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN]; 3439beb93cSSam Leffler size_t buf_len, pad_len; 3539beb93cSSam Leffler struct wpabuf *shared; 3639beb93cSSam Leffler const struct ikev2_integ_alg *integ; 3739beb93cSSam Leffler const struct ikev2_prf_alg *prf; 3839beb93cSSam Leffler const struct ikev2_encr_alg *encr; 3939beb93cSSam Leffler int ret; 4039beb93cSSam Leffler const u8 *addr[2]; 4139beb93cSSam Leffler size_t len[2]; 4239beb93cSSam Leffler 4339beb93cSSam Leffler /* RFC 4306, Sect. 2.14 */ 4439beb93cSSam Leffler 4539beb93cSSam Leffler integ = ikev2_get_integ(data->proposal.integ); 4639beb93cSSam Leffler prf = ikev2_get_prf(data->proposal.prf); 4739beb93cSSam Leffler encr = ikev2_get_encr(data->proposal.encr); 4839beb93cSSam Leffler if (integ == NULL || prf == NULL || encr == NULL) { 4939beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal"); 5039beb93cSSam Leffler return -1; 5139beb93cSSam Leffler } 5239beb93cSSam Leffler 5339beb93cSSam Leffler shared = dh_derive_shared(data->i_dh_public, data->r_dh_private, 5439beb93cSSam Leffler data->dh); 5539beb93cSSam Leffler if (shared == NULL) 5639beb93cSSam Leffler return -1; 5739beb93cSSam Leffler 5839beb93cSSam Leffler /* Construct Ni | Nr | SPIi | SPIr */ 5939beb93cSSam Leffler 6039beb93cSSam Leffler buf_len = data->i_nonce_len + data->r_nonce_len + 2 * IKEV2_SPI_LEN; 6139beb93cSSam Leffler buf = os_malloc(buf_len); 6239beb93cSSam Leffler if (buf == NULL) { 6339beb93cSSam Leffler wpabuf_free(shared); 6439beb93cSSam Leffler return -1; 6539beb93cSSam Leffler } 6639beb93cSSam Leffler 6739beb93cSSam Leffler pos = buf; 6839beb93cSSam Leffler os_memcpy(pos, data->i_nonce, data->i_nonce_len); 6939beb93cSSam Leffler pos += data->i_nonce_len; 7039beb93cSSam Leffler os_memcpy(pos, data->r_nonce, data->r_nonce_len); 7139beb93cSSam Leffler pos += data->r_nonce_len; 7239beb93cSSam Leffler os_memcpy(pos, data->i_spi, IKEV2_SPI_LEN); 7339beb93cSSam Leffler pos += IKEV2_SPI_LEN; 7439beb93cSSam Leffler os_memcpy(pos, data->r_spi, IKEV2_SPI_LEN); 7539beb93cSSam Leffler #ifdef CCNS_PL 7639beb93cSSam Leffler #if __BYTE_ORDER == __LITTLE_ENDIAN 7739beb93cSSam Leffler { 7839beb93cSSam Leffler int i; 7939beb93cSSam Leffler u8 *tmp = pos - IKEV2_SPI_LEN; 8039beb93cSSam Leffler /* Incorrect byte re-ordering on little endian hosts.. */ 8139beb93cSSam Leffler for (i = 0; i < IKEV2_SPI_LEN; i++) 8239beb93cSSam Leffler *tmp++ = data->i_spi[IKEV2_SPI_LEN - 1 - i]; 8339beb93cSSam Leffler for (i = 0; i < IKEV2_SPI_LEN; i++) 8439beb93cSSam Leffler *tmp++ = data->r_spi[IKEV2_SPI_LEN - 1 - i]; 8539beb93cSSam Leffler } 8639beb93cSSam Leffler #endif 8739beb93cSSam Leffler #endif /* CCNS_PL */ 8839beb93cSSam Leffler 8939beb93cSSam Leffler /* SKEYSEED = prf(Ni | Nr, g^ir) */ 9039beb93cSSam Leffler /* Use zero-padding per RFC 4306, Sect. 2.14 */ 9139beb93cSSam Leffler pad_len = data->dh->prime_len - wpabuf_len(shared); 9239beb93cSSam Leffler #ifdef CCNS_PL 9339beb93cSSam Leffler /* Shared secret is not zero-padded correctly */ 9439beb93cSSam Leffler pad_len = 0; 9539beb93cSSam Leffler #endif /* CCNS_PL */ 9639beb93cSSam Leffler pad = os_zalloc(pad_len ? pad_len : 1); 9739beb93cSSam Leffler if (pad == NULL) { 9839beb93cSSam Leffler wpabuf_free(shared); 9939beb93cSSam Leffler os_free(buf); 10039beb93cSSam Leffler return -1; 10139beb93cSSam Leffler } 10239beb93cSSam Leffler 10339beb93cSSam Leffler addr[0] = pad; 10439beb93cSSam Leffler len[0] = pad_len; 10539beb93cSSam Leffler addr[1] = wpabuf_head(shared); 10639beb93cSSam Leffler len[1] = wpabuf_len(shared); 10739beb93cSSam Leffler if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len, 10839beb93cSSam Leffler 2, addr, len, skeyseed) < 0) { 10939beb93cSSam Leffler wpabuf_free(shared); 11039beb93cSSam Leffler os_free(buf); 11139beb93cSSam Leffler os_free(pad); 11239beb93cSSam Leffler return -1; 11339beb93cSSam Leffler } 11439beb93cSSam Leffler os_free(pad); 11539beb93cSSam Leffler wpabuf_free(shared); 11639beb93cSSam Leffler 11739beb93cSSam Leffler /* DH parameters are not needed anymore, so free them */ 11839beb93cSSam Leffler wpabuf_free(data->i_dh_public); 11939beb93cSSam Leffler data->i_dh_public = NULL; 12039beb93cSSam Leffler wpabuf_free(data->r_dh_private); 12139beb93cSSam Leffler data->r_dh_private = NULL; 12239beb93cSSam Leffler 12339beb93cSSam Leffler wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED", 12439beb93cSSam Leffler skeyseed, prf->hash_len); 12539beb93cSSam Leffler 12639beb93cSSam Leffler ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len, 12739beb93cSSam Leffler &data->keys); 12839beb93cSSam Leffler os_free(buf); 12939beb93cSSam Leffler return ret; 13039beb93cSSam Leffler } 13139beb93cSSam Leffler 13239beb93cSSam Leffler 13339beb93cSSam Leffler static int ikev2_parse_transform(struct ikev2_proposal_data *prop, 13439beb93cSSam Leffler const u8 *pos, const u8 *end) 13539beb93cSSam Leffler { 13639beb93cSSam Leffler int transform_len; 13739beb93cSSam Leffler const struct ikev2_transform *t; 13839beb93cSSam Leffler u16 transform_id; 13939beb93cSSam Leffler const u8 *tend; 14039beb93cSSam Leffler 14139beb93cSSam Leffler if (end - pos < (int) sizeof(*t)) { 14239beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too short transform"); 14339beb93cSSam Leffler return -1; 14439beb93cSSam Leffler } 14539beb93cSSam Leffler 14639beb93cSSam Leffler t = (const struct ikev2_transform *) pos; 14739beb93cSSam Leffler transform_len = WPA_GET_BE16(t->transform_length); 14839beb93cSSam Leffler if (transform_len < (int) sizeof(*t) || pos + transform_len > end) { 14939beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d", 15039beb93cSSam Leffler transform_len); 15139beb93cSSam Leffler return -1; 15239beb93cSSam Leffler } 15339beb93cSSam Leffler tend = pos + transform_len; 15439beb93cSSam Leffler 15539beb93cSSam Leffler transform_id = WPA_GET_BE16(t->transform_id); 15639beb93cSSam Leffler 15739beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Transform:"); 15839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d " 15939beb93cSSam Leffler "Transform Type: %d Transform ID: %d", 16039beb93cSSam Leffler t->type, transform_len, t->transform_type, transform_id); 16139beb93cSSam Leffler 16239beb93cSSam Leffler if (t->type != 0 && t->type != 3) { 16339beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type"); 16439beb93cSSam Leffler return -1; 16539beb93cSSam Leffler } 16639beb93cSSam Leffler 16739beb93cSSam Leffler pos = (const u8 *) (t + 1); 16839beb93cSSam Leffler if (pos < tend) { 16939beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes", 17039beb93cSSam Leffler pos, tend - pos); 17139beb93cSSam Leffler } 17239beb93cSSam Leffler 17339beb93cSSam Leffler switch (t->transform_type) { 17439beb93cSSam Leffler case IKEV2_TRANSFORM_ENCR: 17539beb93cSSam Leffler if (ikev2_get_encr(transform_id)) { 17639beb93cSSam Leffler if (transform_id == ENCR_AES_CBC) { 17739beb93cSSam Leffler if (tend - pos != 4) { 17839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: No " 17939beb93cSSam Leffler "Transform Attr for AES"); 18039beb93cSSam Leffler break; 18139beb93cSSam Leffler } 18239beb93cSSam Leffler #ifdef CCNS_PL 18339beb93cSSam Leffler if (WPA_GET_BE16(pos) != 0x001d /* ?? */) { 18439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Not a " 18539beb93cSSam Leffler "Key Size attribute for " 18639beb93cSSam Leffler "AES"); 18739beb93cSSam Leffler break; 18839beb93cSSam Leffler } 18939beb93cSSam Leffler #else /* CCNS_PL */ 19039beb93cSSam Leffler if (WPA_GET_BE16(pos) != 0x800e) { 19139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Not a " 19239beb93cSSam Leffler "Key Size attribute for " 19339beb93cSSam Leffler "AES"); 19439beb93cSSam Leffler break; 19539beb93cSSam Leffler } 19639beb93cSSam Leffler #endif /* CCNS_PL */ 19739beb93cSSam Leffler if (WPA_GET_BE16(pos + 2) != 128) { 19839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: " 19939beb93cSSam Leffler "Unsupported AES key size " 20039beb93cSSam Leffler "%d bits", 20139beb93cSSam Leffler WPA_GET_BE16(pos + 2)); 20239beb93cSSam Leffler break; 20339beb93cSSam Leffler } 20439beb93cSSam Leffler } 20539beb93cSSam Leffler prop->encr = transform_id; 20639beb93cSSam Leffler } 20739beb93cSSam Leffler break; 20839beb93cSSam Leffler case IKEV2_TRANSFORM_PRF: 20939beb93cSSam Leffler if (ikev2_get_prf(transform_id)) 21039beb93cSSam Leffler prop->prf = transform_id; 21139beb93cSSam Leffler break; 21239beb93cSSam Leffler case IKEV2_TRANSFORM_INTEG: 21339beb93cSSam Leffler if (ikev2_get_integ(transform_id)) 21439beb93cSSam Leffler prop->integ = transform_id; 21539beb93cSSam Leffler break; 21639beb93cSSam Leffler case IKEV2_TRANSFORM_DH: 21739beb93cSSam Leffler if (dh_groups_get(transform_id)) 21839beb93cSSam Leffler prop->dh = transform_id; 21939beb93cSSam Leffler break; 22039beb93cSSam Leffler } 22139beb93cSSam Leffler 22239beb93cSSam Leffler return transform_len; 22339beb93cSSam Leffler } 22439beb93cSSam Leffler 22539beb93cSSam Leffler 22639beb93cSSam Leffler static int ikev2_parse_proposal(struct ikev2_proposal_data *prop, 22739beb93cSSam Leffler const u8 *pos, const u8 *end) 22839beb93cSSam Leffler { 22939beb93cSSam Leffler const u8 *pend, *ppos; 23039beb93cSSam Leffler int proposal_len, i; 23139beb93cSSam Leffler const struct ikev2_proposal *p; 23239beb93cSSam Leffler 23339beb93cSSam Leffler if (end - pos < (int) sizeof(*p)) { 23439beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too short proposal"); 23539beb93cSSam Leffler return -1; 23639beb93cSSam Leffler } 23739beb93cSSam Leffler 23839beb93cSSam Leffler /* FIX: AND processing if multiple proposals use the same # */ 23939beb93cSSam Leffler 24039beb93cSSam Leffler p = (const struct ikev2_proposal *) pos; 24139beb93cSSam Leffler proposal_len = WPA_GET_BE16(p->proposal_length); 24239beb93cSSam Leffler if (proposal_len < (int) sizeof(*p) || pos + proposal_len > end) { 24339beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d", 24439beb93cSSam Leffler proposal_len); 24539beb93cSSam Leffler return -1; 24639beb93cSSam Leffler } 24739beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d", 24839beb93cSSam Leffler p->proposal_num); 24939beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d " 25039beb93cSSam Leffler " Protocol ID: %d", 25139beb93cSSam Leffler p->type, proposal_len, p->protocol_id); 25239beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d", 25339beb93cSSam Leffler p->spi_size, p->num_transforms); 25439beb93cSSam Leffler 25539beb93cSSam Leffler if (p->type != 0 && p->type != 2) { 25639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type"); 25739beb93cSSam Leffler return -1; 25839beb93cSSam Leffler } 25939beb93cSSam Leffler 26039beb93cSSam Leffler if (p->protocol_id != IKEV2_PROTOCOL_IKE) { 26139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Unexpected Protocol ID " 26239beb93cSSam Leffler "(only IKE allowed for EAP-IKEv2)"); 26339beb93cSSam Leffler return -1; 26439beb93cSSam Leffler } 26539beb93cSSam Leffler 26639beb93cSSam Leffler if (p->proposal_num != prop->proposal_num) { 26739beb93cSSam Leffler if (p->proposal_num == prop->proposal_num + 1) 26839beb93cSSam Leffler prop->proposal_num = p->proposal_num; 26939beb93cSSam Leffler else { 27039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #"); 27139beb93cSSam Leffler return -1; 27239beb93cSSam Leffler } 27339beb93cSSam Leffler } 27439beb93cSSam Leffler 27539beb93cSSam Leffler ppos = (const u8 *) (p + 1); 27639beb93cSSam Leffler pend = pos + proposal_len; 27739beb93cSSam Leffler if (ppos + p->spi_size > pend) { 27839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI " 27939beb93cSSam Leffler "in proposal"); 28039beb93cSSam Leffler return -1; 28139beb93cSSam Leffler } 28239beb93cSSam Leffler if (p->spi_size) { 28339beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: SPI", 28439beb93cSSam Leffler ppos, p->spi_size); 28539beb93cSSam Leffler ppos += p->spi_size; 28639beb93cSSam Leffler } 28739beb93cSSam Leffler 28839beb93cSSam Leffler /* 28939beb93cSSam Leffler * For initial IKE_SA negotiation, SPI Size MUST be zero; for 29039beb93cSSam Leffler * subsequent negotiations, it must be 8 for IKE. We only support 29139beb93cSSam Leffler * initial case for now. 29239beb93cSSam Leffler */ 29339beb93cSSam Leffler if (p->spi_size != 0) { 29439beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size"); 29539beb93cSSam Leffler return -1; 29639beb93cSSam Leffler } 29739beb93cSSam Leffler 29839beb93cSSam Leffler if (p->num_transforms == 0) { 29939beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: At least one transform required"); 30039beb93cSSam Leffler return -1; 30139beb93cSSam Leffler } 30239beb93cSSam Leffler 30339beb93cSSam Leffler for (i = 0; i < (int) p->num_transforms; i++) { 30439beb93cSSam Leffler int tlen = ikev2_parse_transform(prop, ppos, pend); 30539beb93cSSam Leffler if (tlen < 0) 30639beb93cSSam Leffler return -1; 30739beb93cSSam Leffler ppos += tlen; 30839beb93cSSam Leffler } 30939beb93cSSam Leffler 31039beb93cSSam Leffler if (ppos != pend) { 31139beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected data after " 31239beb93cSSam Leffler "transforms"); 31339beb93cSSam Leffler return -1; 31439beb93cSSam Leffler } 31539beb93cSSam Leffler 31639beb93cSSam Leffler return proposal_len; 31739beb93cSSam Leffler } 31839beb93cSSam Leffler 31939beb93cSSam Leffler 32039beb93cSSam Leffler static int ikev2_process_sai1(struct ikev2_responder_data *data, 32139beb93cSSam Leffler const u8 *sai1, size_t sai1_len) 32239beb93cSSam Leffler { 32339beb93cSSam Leffler struct ikev2_proposal_data prop; 32439beb93cSSam Leffler const u8 *pos, *end; 32539beb93cSSam Leffler int found = 0; 32639beb93cSSam Leffler 32739beb93cSSam Leffler /* Security Association Payloads: <Proposals> */ 32839beb93cSSam Leffler 32939beb93cSSam Leffler if (sai1 == NULL) { 33039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: SAi1 not received"); 33139beb93cSSam Leffler return -1; 33239beb93cSSam Leffler } 33339beb93cSSam Leffler 33439beb93cSSam Leffler os_memset(&prop, 0, sizeof(prop)); 33539beb93cSSam Leffler prop.proposal_num = 1; 33639beb93cSSam Leffler 33739beb93cSSam Leffler pos = sai1; 33839beb93cSSam Leffler end = sai1 + sai1_len; 33939beb93cSSam Leffler 34039beb93cSSam Leffler while (pos < end) { 34139beb93cSSam Leffler int plen; 34239beb93cSSam Leffler 34339beb93cSSam Leffler prop.integ = -1; 34439beb93cSSam Leffler prop.prf = -1; 34539beb93cSSam Leffler prop.encr = -1; 34639beb93cSSam Leffler prop.dh = -1; 34739beb93cSSam Leffler plen = ikev2_parse_proposal(&prop, pos, end); 34839beb93cSSam Leffler if (plen < 0) 34939beb93cSSam Leffler return -1; 35039beb93cSSam Leffler 35139beb93cSSam Leffler if (!found && prop.integ != -1 && prop.prf != -1 && 35239beb93cSSam Leffler prop.encr != -1 && prop.dh != -1) { 35339beb93cSSam Leffler os_memcpy(&data->proposal, &prop, sizeof(prop)); 35439beb93cSSam Leffler data->dh = dh_groups_get(prop.dh); 35539beb93cSSam Leffler found = 1; 35639beb93cSSam Leffler } 35739beb93cSSam Leffler 35839beb93cSSam Leffler pos += plen; 35939beb93cSSam Leffler } 36039beb93cSSam Leffler 36139beb93cSSam Leffler if (pos != end) { 36239beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected data after proposals"); 36339beb93cSSam Leffler return -1; 36439beb93cSSam Leffler } 36539beb93cSSam Leffler 36639beb93cSSam Leffler if (!found) { 36739beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found"); 36839beb93cSSam Leffler return -1; 36939beb93cSSam Leffler } 37039beb93cSSam Leffler 37139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d " 37239beb93cSSam Leffler "INTEG:%d D-H:%d", data->proposal.proposal_num, 37339beb93cSSam Leffler data->proposal.encr, data->proposal.prf, 37439beb93cSSam Leffler data->proposal.integ, data->proposal.dh); 37539beb93cSSam Leffler 37639beb93cSSam Leffler return 0; 37739beb93cSSam Leffler } 37839beb93cSSam Leffler 37939beb93cSSam Leffler 38039beb93cSSam Leffler static int ikev2_process_kei(struct ikev2_responder_data *data, 38139beb93cSSam Leffler const u8 *kei, size_t kei_len) 38239beb93cSSam Leffler { 38339beb93cSSam Leffler u16 group; 38439beb93cSSam Leffler 38539beb93cSSam Leffler /* 38639beb93cSSam Leffler * Key Exchange Payload: 38739beb93cSSam Leffler * DH Group # (16 bits) 38839beb93cSSam Leffler * RESERVED (16 bits) 38939beb93cSSam Leffler * Key Exchange Data (Diffie-Hellman public value) 39039beb93cSSam Leffler */ 39139beb93cSSam Leffler 39239beb93cSSam Leffler if (kei == NULL) { 39339beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: KEi not received"); 39439beb93cSSam Leffler return -1; 39539beb93cSSam Leffler } 39639beb93cSSam Leffler 39739beb93cSSam Leffler if (kei_len < 4 + 96) { 39839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload"); 39939beb93cSSam Leffler return -1; 40039beb93cSSam Leffler } 40139beb93cSSam Leffler 40239beb93cSSam Leffler group = WPA_GET_BE16(kei); 40339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: KEi DH Group #%u", group); 40439beb93cSSam Leffler 40539beb93cSSam Leffler if (group != data->proposal.dh) { 40639beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: KEi DH Group #%u does not match " 40739beb93cSSam Leffler "with the selected proposal (%u)", 40839beb93cSSam Leffler group, data->proposal.dh); 40939beb93cSSam Leffler /* Reject message with Notify payload of type 41039beb93cSSam Leffler * INVALID_KE_PAYLOAD (RFC 4306, Sect. 3.4) */ 41139beb93cSSam Leffler data->error_type = INVALID_KE_PAYLOAD; 41239beb93cSSam Leffler data->state = NOTIFY; 41339beb93cSSam Leffler return -1; 41439beb93cSSam Leffler } 41539beb93cSSam Leffler 41639beb93cSSam Leffler if (data->dh == NULL) { 41739beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported DH group"); 41839beb93cSSam Leffler return -1; 41939beb93cSSam Leffler } 42039beb93cSSam Leffler 42139beb93cSSam Leffler /* RFC 4306, Section 3.4: 422*f05cddf9SRui Paulo * The length of DH public value MUST be equal to the length of the 42339beb93cSSam Leffler * prime modulus. 42439beb93cSSam Leffler */ 42539beb93cSSam Leffler if (kei_len - 4 != data->dh->prime_len) { 42639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid DH public value length " 42739beb93cSSam Leffler "%ld (expected %ld)", 42839beb93cSSam Leffler (long) (kei_len - 4), (long) data->dh->prime_len); 42939beb93cSSam Leffler return -1; 43039beb93cSSam Leffler } 43139beb93cSSam Leffler 43239beb93cSSam Leffler wpabuf_free(data->i_dh_public); 43339beb93cSSam Leffler data->i_dh_public = wpabuf_alloc(kei_len - 4); 43439beb93cSSam Leffler if (data->i_dh_public == NULL) 43539beb93cSSam Leffler return -1; 43639beb93cSSam Leffler wpabuf_put_data(data->i_dh_public, kei + 4, kei_len - 4); 43739beb93cSSam Leffler 43839beb93cSSam Leffler wpa_hexdump_buf(MSG_DEBUG, "IKEV2: KEi Diffie-Hellman Public Value", 43939beb93cSSam Leffler data->i_dh_public); 44039beb93cSSam Leffler 44139beb93cSSam Leffler return 0; 44239beb93cSSam Leffler } 44339beb93cSSam Leffler 44439beb93cSSam Leffler 44539beb93cSSam Leffler static int ikev2_process_ni(struct ikev2_responder_data *data, 44639beb93cSSam Leffler const u8 *ni, size_t ni_len) 44739beb93cSSam Leffler { 44839beb93cSSam Leffler if (ni == NULL) { 44939beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Ni not received"); 45039beb93cSSam Leffler return -1; 45139beb93cSSam Leffler } 45239beb93cSSam Leffler 45339beb93cSSam Leffler if (ni_len < IKEV2_NONCE_MIN_LEN || ni_len > IKEV2_NONCE_MAX_LEN) { 45439beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid Ni length %ld", 45539beb93cSSam Leffler (long) ni_len); 45639beb93cSSam Leffler return -1; 45739beb93cSSam Leffler } 45839beb93cSSam Leffler 45939beb93cSSam Leffler #ifdef CCNS_PL 46039beb93cSSam Leffler /* Zeros are removed incorrectly from the beginning of the nonces */ 46139beb93cSSam Leffler while (ni_len > 1 && *ni == 0) { 46239beb93cSSam Leffler ni_len--; 46339beb93cSSam Leffler ni++; 46439beb93cSSam Leffler } 46539beb93cSSam Leffler #endif /* CCNS_PL */ 46639beb93cSSam Leffler 46739beb93cSSam Leffler data->i_nonce_len = ni_len; 46839beb93cSSam Leffler os_memcpy(data->i_nonce, ni, ni_len); 46939beb93cSSam Leffler wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni", 47039beb93cSSam Leffler data->i_nonce, data->i_nonce_len); 47139beb93cSSam Leffler 47239beb93cSSam Leffler return 0; 47339beb93cSSam Leffler } 47439beb93cSSam Leffler 47539beb93cSSam Leffler 47639beb93cSSam Leffler static int ikev2_process_sa_init(struct ikev2_responder_data *data, 47739beb93cSSam Leffler const struct ikev2_hdr *hdr, 47839beb93cSSam Leffler struct ikev2_payloads *pl) 47939beb93cSSam Leffler { 48039beb93cSSam Leffler if (ikev2_process_sai1(data, pl->sa, pl->sa_len) < 0 || 48139beb93cSSam Leffler ikev2_process_kei(data, pl->ke, pl->ke_len) < 0 || 48239beb93cSSam Leffler ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0) 48339beb93cSSam Leffler return -1; 48439beb93cSSam Leffler 48539beb93cSSam Leffler os_memcpy(data->i_spi, hdr->i_spi, IKEV2_SPI_LEN); 48639beb93cSSam Leffler 48739beb93cSSam Leffler return 0; 48839beb93cSSam Leffler } 48939beb93cSSam Leffler 49039beb93cSSam Leffler 49139beb93cSSam Leffler static int ikev2_process_idi(struct ikev2_responder_data *data, 49239beb93cSSam Leffler const u8 *idi, size_t idi_len) 49339beb93cSSam Leffler { 49439beb93cSSam Leffler u8 id_type; 49539beb93cSSam Leffler 49639beb93cSSam Leffler if (idi == NULL) { 49739beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No IDi received"); 49839beb93cSSam Leffler return -1; 49939beb93cSSam Leffler } 50039beb93cSSam Leffler 50139beb93cSSam Leffler if (idi_len < 4) { 50239beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload"); 50339beb93cSSam Leffler return -1; 50439beb93cSSam Leffler } 50539beb93cSSam Leffler 50639beb93cSSam Leffler id_type = idi[0]; 50739beb93cSSam Leffler idi += 4; 50839beb93cSSam Leffler idi_len -= 4; 50939beb93cSSam Leffler 51039beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type); 51139beb93cSSam Leffler wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len); 51239beb93cSSam Leffler os_free(data->IDi); 51339beb93cSSam Leffler data->IDi = os_malloc(idi_len); 51439beb93cSSam Leffler if (data->IDi == NULL) 51539beb93cSSam Leffler return -1; 51639beb93cSSam Leffler os_memcpy(data->IDi, idi, idi_len); 51739beb93cSSam Leffler data->IDi_len = idi_len; 51839beb93cSSam Leffler data->IDi_type = id_type; 51939beb93cSSam Leffler 52039beb93cSSam Leffler return 0; 52139beb93cSSam Leffler } 52239beb93cSSam Leffler 52339beb93cSSam Leffler 52439beb93cSSam Leffler static int ikev2_process_cert(struct ikev2_responder_data *data, 52539beb93cSSam Leffler const u8 *cert, size_t cert_len) 52639beb93cSSam Leffler { 52739beb93cSSam Leffler u8 cert_encoding; 52839beb93cSSam Leffler 52939beb93cSSam Leffler if (cert == NULL) { 53039beb93cSSam Leffler if (data->peer_auth == PEER_AUTH_CERT) { 53139beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No Certificate received"); 53239beb93cSSam Leffler return -1; 53339beb93cSSam Leffler } 53439beb93cSSam Leffler return 0; 53539beb93cSSam Leffler } 53639beb93cSSam Leffler 53739beb93cSSam Leffler if (cert_len < 1) { 53839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field"); 53939beb93cSSam Leffler return -1; 54039beb93cSSam Leffler } 54139beb93cSSam Leffler 54239beb93cSSam Leffler cert_encoding = cert[0]; 54339beb93cSSam Leffler cert++; 54439beb93cSSam Leffler cert_len--; 54539beb93cSSam Leffler 54639beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding); 54739beb93cSSam Leffler wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len); 54839beb93cSSam Leffler 54939beb93cSSam Leffler /* TODO: validate certificate */ 55039beb93cSSam Leffler 55139beb93cSSam Leffler return 0; 55239beb93cSSam Leffler } 55339beb93cSSam Leffler 55439beb93cSSam Leffler 55539beb93cSSam Leffler static int ikev2_process_auth_cert(struct ikev2_responder_data *data, 55639beb93cSSam Leffler u8 method, const u8 *auth, size_t auth_len) 55739beb93cSSam Leffler { 55839beb93cSSam Leffler if (method != AUTH_RSA_SIGN) { 55939beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported authentication " 56039beb93cSSam Leffler "method %d", method); 56139beb93cSSam Leffler return -1; 56239beb93cSSam Leffler } 56339beb93cSSam Leffler 56439beb93cSSam Leffler /* TODO: validate AUTH */ 56539beb93cSSam Leffler return 0; 56639beb93cSSam Leffler } 56739beb93cSSam Leffler 56839beb93cSSam Leffler 56939beb93cSSam Leffler static int ikev2_process_auth_secret(struct ikev2_responder_data *data, 57039beb93cSSam Leffler u8 method, const u8 *auth, 57139beb93cSSam Leffler size_t auth_len) 57239beb93cSSam Leffler { 57339beb93cSSam Leffler u8 auth_data[IKEV2_MAX_HASH_LEN]; 57439beb93cSSam Leffler const struct ikev2_prf_alg *prf; 57539beb93cSSam Leffler 57639beb93cSSam Leffler if (method != AUTH_SHARED_KEY_MIC) { 57739beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported authentication " 57839beb93cSSam Leffler "method %d", method); 57939beb93cSSam Leffler return -1; 58039beb93cSSam Leffler } 58139beb93cSSam Leffler 58239beb93cSSam Leffler /* msg | Nr | prf(SK_pi,IDi') */ 58339beb93cSSam Leffler if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg, 58439beb93cSSam Leffler data->IDi, data->IDi_len, data->IDi_type, 58539beb93cSSam Leffler &data->keys, 1, data->shared_secret, 58639beb93cSSam Leffler data->shared_secret_len, 58739beb93cSSam Leffler data->r_nonce, data->r_nonce_len, 58839beb93cSSam Leffler data->key_pad, data->key_pad_len, 58939beb93cSSam Leffler auth_data) < 0) { 59039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 59139beb93cSSam Leffler return -1; 59239beb93cSSam Leffler } 59339beb93cSSam Leffler 59439beb93cSSam Leffler wpabuf_free(data->i_sign_msg); 59539beb93cSSam Leffler data->i_sign_msg = NULL; 59639beb93cSSam Leffler 59739beb93cSSam Leffler prf = ikev2_get_prf(data->proposal.prf); 59839beb93cSSam Leffler if (prf == NULL) 59939beb93cSSam Leffler return -1; 60039beb93cSSam Leffler 60139beb93cSSam Leffler if (auth_len != prf->hash_len || 60239beb93cSSam Leffler os_memcmp(auth, auth_data, auth_len) != 0) { 60339beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid Authentication Data"); 60439beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data", 60539beb93cSSam Leffler auth, auth_len); 60639beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data", 60739beb93cSSam Leffler auth_data, prf->hash_len); 60839beb93cSSam Leffler data->error_type = AUTHENTICATION_FAILED; 60939beb93cSSam Leffler data->state = NOTIFY; 61039beb93cSSam Leffler return -1; 61139beb93cSSam Leffler } 61239beb93cSSam Leffler 61339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Server authenticated successfully " 61439beb93cSSam Leffler "using shared keys"); 61539beb93cSSam Leffler 61639beb93cSSam Leffler return 0; 61739beb93cSSam Leffler } 61839beb93cSSam Leffler 61939beb93cSSam Leffler 62039beb93cSSam Leffler static int ikev2_process_auth(struct ikev2_responder_data *data, 62139beb93cSSam Leffler const u8 *auth, size_t auth_len) 62239beb93cSSam Leffler { 62339beb93cSSam Leffler u8 auth_method; 62439beb93cSSam Leffler 62539beb93cSSam Leffler if (auth == NULL) { 62639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload"); 62739beb93cSSam Leffler return -1; 62839beb93cSSam Leffler } 62939beb93cSSam Leffler 63039beb93cSSam Leffler if (auth_len < 4) { 63139beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too short Authentication " 63239beb93cSSam Leffler "Payload"); 63339beb93cSSam Leffler return -1; 63439beb93cSSam Leffler } 63539beb93cSSam Leffler 63639beb93cSSam Leffler auth_method = auth[0]; 63739beb93cSSam Leffler auth += 4; 63839beb93cSSam Leffler auth_len -= 4; 63939beb93cSSam Leffler 64039beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Auth Method %d", auth_method); 64139beb93cSSam Leffler wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len); 64239beb93cSSam Leffler 64339beb93cSSam Leffler switch (data->peer_auth) { 64439beb93cSSam Leffler case PEER_AUTH_CERT: 64539beb93cSSam Leffler return ikev2_process_auth_cert(data, auth_method, auth, 64639beb93cSSam Leffler auth_len); 64739beb93cSSam Leffler case PEER_AUTH_SECRET: 64839beb93cSSam Leffler return ikev2_process_auth_secret(data, auth_method, auth, 64939beb93cSSam Leffler auth_len); 65039beb93cSSam Leffler } 65139beb93cSSam Leffler 65239beb93cSSam Leffler return -1; 65339beb93cSSam Leffler } 65439beb93cSSam Leffler 65539beb93cSSam Leffler 65639beb93cSSam Leffler static int ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data, 65739beb93cSSam Leffler u8 next_payload, 65839beb93cSSam Leffler u8 *payload, size_t payload_len) 65939beb93cSSam Leffler { 66039beb93cSSam Leffler struct ikev2_payloads pl; 66139beb93cSSam Leffler 66239beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads"); 66339beb93cSSam Leffler 66439beb93cSSam Leffler if (ikev2_parse_payloads(&pl, next_payload, payload, payload + 66539beb93cSSam Leffler payload_len) < 0) { 66639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted " 66739beb93cSSam Leffler "payloads"); 66839beb93cSSam Leffler return -1; 66939beb93cSSam Leffler } 67039beb93cSSam Leffler 67139beb93cSSam Leffler if (ikev2_process_idi(data, pl.idi, pl.idi_len) < 0 || 67239beb93cSSam Leffler ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 || 67339beb93cSSam Leffler ikev2_process_auth(data, pl.auth, pl.auth_len) < 0) 67439beb93cSSam Leffler return -1; 67539beb93cSSam Leffler 67639beb93cSSam Leffler return 0; 67739beb93cSSam Leffler } 67839beb93cSSam Leffler 67939beb93cSSam Leffler 68039beb93cSSam Leffler static int ikev2_process_sa_auth(struct ikev2_responder_data *data, 68139beb93cSSam Leffler const struct ikev2_hdr *hdr, 68239beb93cSSam Leffler struct ikev2_payloads *pl) 68339beb93cSSam Leffler { 68439beb93cSSam Leffler u8 *decrypted; 68539beb93cSSam Leffler size_t decrypted_len; 68639beb93cSSam Leffler int ret; 68739beb93cSSam Leffler 68839beb93cSSam Leffler decrypted = ikev2_decrypt_payload(data->proposal.encr, 68939beb93cSSam Leffler data->proposal.integ, 69039beb93cSSam Leffler &data->keys, 1, hdr, pl->encrypted, 69139beb93cSSam Leffler pl->encrypted_len, &decrypted_len); 69239beb93cSSam Leffler if (decrypted == NULL) 69339beb93cSSam Leffler return -1; 69439beb93cSSam Leffler 69539beb93cSSam Leffler ret = ikev2_process_sa_auth_decrypted(data, pl->encr_next_payload, 69639beb93cSSam Leffler decrypted, decrypted_len); 69739beb93cSSam Leffler os_free(decrypted); 69839beb93cSSam Leffler 69939beb93cSSam Leffler return ret; 70039beb93cSSam Leffler } 70139beb93cSSam Leffler 70239beb93cSSam Leffler 70339beb93cSSam Leffler static int ikev2_validate_rx_state(struct ikev2_responder_data *data, 70439beb93cSSam Leffler u8 exchange_type, u32 message_id) 70539beb93cSSam Leffler { 70639beb93cSSam Leffler switch (data->state) { 70739beb93cSSam Leffler case SA_INIT: 70839beb93cSSam Leffler /* Expect to receive IKE_SA_INIT: HDR, SAi1, KEi, Ni */ 70939beb93cSSam Leffler if (exchange_type != IKE_SA_INIT) { 71039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type " 71139beb93cSSam Leffler "%u in SA_INIT state", exchange_type); 71239beb93cSSam Leffler return -1; 71339beb93cSSam Leffler } 71439beb93cSSam Leffler if (message_id != 0) { 71539beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u " 71639beb93cSSam Leffler "in SA_INIT state", message_id); 71739beb93cSSam Leffler return -1; 71839beb93cSSam Leffler } 71939beb93cSSam Leffler break; 72039beb93cSSam Leffler case SA_AUTH: 72139beb93cSSam Leffler /* Expect to receive IKE_SA_AUTH: 72239beb93cSSam Leffler * HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,] 72339beb93cSSam Leffler * AUTH, SAi2, TSi, TSr} 72439beb93cSSam Leffler */ 72539beb93cSSam Leffler if (exchange_type != IKE_SA_AUTH) { 72639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type " 72739beb93cSSam Leffler "%u in SA_AUTH state", exchange_type); 72839beb93cSSam Leffler return -1; 72939beb93cSSam Leffler } 73039beb93cSSam Leffler if (message_id != 1) { 73139beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u " 73239beb93cSSam Leffler "in SA_AUTH state", message_id); 73339beb93cSSam Leffler return -1; 73439beb93cSSam Leffler } 73539beb93cSSam Leffler break; 73639beb93cSSam Leffler case CHILD_SA: 73739beb93cSSam Leffler if (exchange_type != CREATE_CHILD_SA) { 73839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type " 73939beb93cSSam Leffler "%u in CHILD_SA state", exchange_type); 74039beb93cSSam Leffler return -1; 74139beb93cSSam Leffler } 74239beb93cSSam Leffler if (message_id != 2) { 74339beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u " 74439beb93cSSam Leffler "in CHILD_SA state", message_id); 74539beb93cSSam Leffler return -1; 74639beb93cSSam Leffler } 74739beb93cSSam Leffler break; 74839beb93cSSam Leffler case NOTIFY: 74939beb93cSSam Leffler case IKEV2_DONE: 75039beb93cSSam Leffler case IKEV2_FAILED: 75139beb93cSSam Leffler return -1; 75239beb93cSSam Leffler } 75339beb93cSSam Leffler 75439beb93cSSam Leffler return 0; 75539beb93cSSam Leffler } 75639beb93cSSam Leffler 75739beb93cSSam Leffler 75839beb93cSSam Leffler int ikev2_responder_process(struct ikev2_responder_data *data, 75939beb93cSSam Leffler const struct wpabuf *buf) 76039beb93cSSam Leffler { 76139beb93cSSam Leffler const struct ikev2_hdr *hdr; 76239beb93cSSam Leffler u32 length, message_id; 76339beb93cSSam Leffler const u8 *pos, *end; 76439beb93cSSam Leffler struct ikev2_payloads pl; 76539beb93cSSam Leffler 76639beb93cSSam Leffler wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)", 76739beb93cSSam Leffler (unsigned long) wpabuf_len(buf)); 76839beb93cSSam Leffler 76939beb93cSSam Leffler if (wpabuf_len(buf) < sizeof(*hdr)) { 77039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Too short frame to include HDR"); 77139beb93cSSam Leffler return -1; 77239beb93cSSam Leffler } 77339beb93cSSam Leffler 77439beb93cSSam Leffler data->error_type = 0; 77539beb93cSSam Leffler hdr = (const struct ikev2_hdr *) wpabuf_head(buf); 77639beb93cSSam Leffler end = wpabuf_head_u8(buf) + wpabuf_len(buf); 77739beb93cSSam Leffler message_id = WPA_GET_BE32(hdr->message_id); 77839beb93cSSam Leffler length = WPA_GET_BE32(hdr->length); 77939beb93cSSam Leffler 78039beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI", 78139beb93cSSam Leffler hdr->i_spi, IKEV2_SPI_LEN); 78239beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI", 78339beb93cSSam Leffler hdr->r_spi, IKEV2_SPI_LEN); 78439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x " 78539beb93cSSam Leffler "Exchange Type: %u", 78639beb93cSSam Leffler hdr->next_payload, hdr->version, hdr->exchange_type); 78739beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Message ID: %u Length: %u", 78839beb93cSSam Leffler message_id, length); 78939beb93cSSam Leffler 79039beb93cSSam Leffler if (hdr->version != IKEV2_VERSION) { 79139beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported HDR version 0x%x " 79239beb93cSSam Leffler "(expected 0x%x)", hdr->version, IKEV2_VERSION); 79339beb93cSSam Leffler return -1; 79439beb93cSSam Leffler } 79539beb93cSSam Leffler 79639beb93cSSam Leffler if (length != wpabuf_len(buf)) { 79739beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Invalid length (HDR: %lu != " 79839beb93cSSam Leffler "RX: %lu)", (unsigned long) length, 79939beb93cSSam Leffler (unsigned long) wpabuf_len(buf)); 80039beb93cSSam Leffler return -1; 80139beb93cSSam Leffler } 80239beb93cSSam Leffler 80339beb93cSSam Leffler if (ikev2_validate_rx_state(data, hdr->exchange_type, message_id) < 0) 80439beb93cSSam Leffler return -1; 80539beb93cSSam Leffler 80639beb93cSSam Leffler if ((hdr->flags & (IKEV2_HDR_INITIATOR | IKEV2_HDR_RESPONSE)) != 80739beb93cSSam Leffler IKEV2_HDR_INITIATOR) { 80839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected Flags value 0x%x", 80939beb93cSSam Leffler hdr->flags); 81039beb93cSSam Leffler return -1; 81139beb93cSSam Leffler } 81239beb93cSSam Leffler 81339beb93cSSam Leffler if (data->state != SA_INIT) { 81439beb93cSSam Leffler if (os_memcmp(data->i_spi, hdr->i_spi, IKEV2_SPI_LEN) != 0) { 81539beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected IKE_SA " 81639beb93cSSam Leffler "Initiator's SPI"); 81739beb93cSSam Leffler return -1; 81839beb93cSSam Leffler } 81939beb93cSSam Leffler if (os_memcmp(data->r_spi, hdr->r_spi, IKEV2_SPI_LEN) != 0) { 82039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unexpected IKE_SA " 82139beb93cSSam Leffler "Responder's SPI"); 82239beb93cSSam Leffler return -1; 82339beb93cSSam Leffler } 82439beb93cSSam Leffler } 82539beb93cSSam Leffler 82639beb93cSSam Leffler pos = (const u8 *) (hdr + 1); 82739beb93cSSam Leffler if (ikev2_parse_payloads(&pl, hdr->next_payload, pos, end) < 0) 82839beb93cSSam Leffler return -1; 82939beb93cSSam Leffler 83039beb93cSSam Leffler if (data->state == SA_INIT) { 83139beb93cSSam Leffler data->last_msg = LAST_MSG_SA_INIT; 83239beb93cSSam Leffler if (ikev2_process_sa_init(data, hdr, &pl) < 0) { 83339beb93cSSam Leffler if (data->state == NOTIFY) 83439beb93cSSam Leffler return 0; 83539beb93cSSam Leffler return -1; 83639beb93cSSam Leffler } 83739beb93cSSam Leffler wpabuf_free(data->i_sign_msg); 83839beb93cSSam Leffler data->i_sign_msg = wpabuf_dup(buf); 83939beb93cSSam Leffler } 84039beb93cSSam Leffler 84139beb93cSSam Leffler if (data->state == SA_AUTH) { 84239beb93cSSam Leffler data->last_msg = LAST_MSG_SA_AUTH; 84339beb93cSSam Leffler if (ikev2_process_sa_auth(data, hdr, &pl) < 0) { 84439beb93cSSam Leffler if (data->state == NOTIFY) 84539beb93cSSam Leffler return 0; 84639beb93cSSam Leffler return -1; 84739beb93cSSam Leffler } 84839beb93cSSam Leffler } 84939beb93cSSam Leffler 85039beb93cSSam Leffler return 0; 85139beb93cSSam Leffler } 85239beb93cSSam Leffler 85339beb93cSSam Leffler 85439beb93cSSam Leffler static void ikev2_build_hdr(struct ikev2_responder_data *data, 85539beb93cSSam Leffler struct wpabuf *msg, u8 exchange_type, 85639beb93cSSam Leffler u8 next_payload, u32 message_id) 85739beb93cSSam Leffler { 85839beb93cSSam Leffler struct ikev2_hdr *hdr; 85939beb93cSSam Leffler 86039beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding HDR"); 86139beb93cSSam Leffler 86239beb93cSSam Leffler /* HDR - RFC 4306, Sect. 3.1 */ 86339beb93cSSam Leffler hdr = wpabuf_put(msg, sizeof(*hdr)); 86439beb93cSSam Leffler os_memcpy(hdr->i_spi, data->i_spi, IKEV2_SPI_LEN); 86539beb93cSSam Leffler os_memcpy(hdr->r_spi, data->r_spi, IKEV2_SPI_LEN); 86639beb93cSSam Leffler hdr->next_payload = next_payload; 86739beb93cSSam Leffler hdr->version = IKEV2_VERSION; 86839beb93cSSam Leffler hdr->exchange_type = exchange_type; 86939beb93cSSam Leffler hdr->flags = IKEV2_HDR_RESPONSE; 87039beb93cSSam Leffler WPA_PUT_BE32(hdr->message_id, message_id); 87139beb93cSSam Leffler } 87239beb93cSSam Leffler 87339beb93cSSam Leffler 87439beb93cSSam Leffler static int ikev2_build_sar1(struct ikev2_responder_data *data, 87539beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 87639beb93cSSam Leffler { 87739beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 87839beb93cSSam Leffler size_t plen; 87939beb93cSSam Leffler struct ikev2_proposal *p; 88039beb93cSSam Leffler struct ikev2_transform *t; 88139beb93cSSam Leffler 88239beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding SAr1 payload"); 88339beb93cSSam Leffler 88439beb93cSSam Leffler /* SAr1 - RFC 4306, Sect. 2.7 and 3.3 */ 88539beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 88639beb93cSSam Leffler phdr->next_payload = next_payload; 88739beb93cSSam Leffler phdr->flags = 0; 88839beb93cSSam Leffler 88939beb93cSSam Leffler p = wpabuf_put(msg, sizeof(*p)); 89039beb93cSSam Leffler #ifdef CCNS_PL 89139beb93cSSam Leffler /* Seems to require that the Proposal # is 1 even though RFC 4306 89239beb93cSSam Leffler * Sect 3.3.1 has following requirement "When a proposal is accepted, 89339beb93cSSam Leffler * all of the proposal numbers in the SA payload MUST be the same and 89439beb93cSSam Leffler * MUST match the number on the proposal sent that was accepted.". 89539beb93cSSam Leffler */ 89639beb93cSSam Leffler p->proposal_num = 1; 89739beb93cSSam Leffler #else /* CCNS_PL */ 89839beb93cSSam Leffler p->proposal_num = data->proposal.proposal_num; 89939beb93cSSam Leffler #endif /* CCNS_PL */ 90039beb93cSSam Leffler p->protocol_id = IKEV2_PROTOCOL_IKE; 90139beb93cSSam Leffler p->num_transforms = 4; 90239beb93cSSam Leffler 90339beb93cSSam Leffler t = wpabuf_put(msg, sizeof(*t)); 90439beb93cSSam Leffler t->type = 3; 90539beb93cSSam Leffler t->transform_type = IKEV2_TRANSFORM_ENCR; 90639beb93cSSam Leffler WPA_PUT_BE16(t->transform_id, data->proposal.encr); 90739beb93cSSam Leffler if (data->proposal.encr == ENCR_AES_CBC) { 90839beb93cSSam Leffler /* Transform Attribute: Key Len = 128 bits */ 90939beb93cSSam Leffler #ifdef CCNS_PL 91039beb93cSSam Leffler wpabuf_put_be16(msg, 0x001d); /* ?? */ 91139beb93cSSam Leffler #else /* CCNS_PL */ 91239beb93cSSam Leffler wpabuf_put_be16(msg, 0x800e); /* AF=1, AttrType=14 */ 91339beb93cSSam Leffler #endif /* CCNS_PL */ 91439beb93cSSam Leffler wpabuf_put_be16(msg, 128); /* 128-bit key */ 91539beb93cSSam Leffler } 91639beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t; 91739beb93cSSam Leffler WPA_PUT_BE16(t->transform_length, plen); 91839beb93cSSam Leffler 91939beb93cSSam Leffler t = wpabuf_put(msg, sizeof(*t)); 92039beb93cSSam Leffler t->type = 3; 92139beb93cSSam Leffler WPA_PUT_BE16(t->transform_length, sizeof(*t)); 92239beb93cSSam Leffler t->transform_type = IKEV2_TRANSFORM_PRF; 92339beb93cSSam Leffler WPA_PUT_BE16(t->transform_id, data->proposal.prf); 92439beb93cSSam Leffler 92539beb93cSSam Leffler t = wpabuf_put(msg, sizeof(*t)); 92639beb93cSSam Leffler t->type = 3; 92739beb93cSSam Leffler WPA_PUT_BE16(t->transform_length, sizeof(*t)); 92839beb93cSSam Leffler t->transform_type = IKEV2_TRANSFORM_INTEG; 92939beb93cSSam Leffler WPA_PUT_BE16(t->transform_id, data->proposal.integ); 93039beb93cSSam Leffler 93139beb93cSSam Leffler t = wpabuf_put(msg, sizeof(*t)); 93239beb93cSSam Leffler WPA_PUT_BE16(t->transform_length, sizeof(*t)); 93339beb93cSSam Leffler t->transform_type = IKEV2_TRANSFORM_DH; 93439beb93cSSam Leffler WPA_PUT_BE16(t->transform_id, data->proposal.dh); 93539beb93cSSam Leffler 93639beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p; 93739beb93cSSam Leffler WPA_PUT_BE16(p->proposal_length, plen); 93839beb93cSSam Leffler 93939beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 94039beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 94139beb93cSSam Leffler 94239beb93cSSam Leffler return 0; 94339beb93cSSam Leffler } 94439beb93cSSam Leffler 94539beb93cSSam Leffler 94639beb93cSSam Leffler static int ikev2_build_ker(struct ikev2_responder_data *data, 94739beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 94839beb93cSSam Leffler { 94939beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 95039beb93cSSam Leffler size_t plen; 95139beb93cSSam Leffler struct wpabuf *pv; 95239beb93cSSam Leffler 95339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding KEr payload"); 95439beb93cSSam Leffler 95539beb93cSSam Leffler pv = dh_init(data->dh, &data->r_dh_private); 95639beb93cSSam Leffler if (pv == NULL) { 95739beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Failed to initialize DH"); 95839beb93cSSam Leffler return -1; 95939beb93cSSam Leffler } 96039beb93cSSam Leffler 96139beb93cSSam Leffler /* KEr - RFC 4306, Sect. 3.4 */ 96239beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 96339beb93cSSam Leffler phdr->next_payload = next_payload; 96439beb93cSSam Leffler phdr->flags = 0; 96539beb93cSSam Leffler 96639beb93cSSam Leffler wpabuf_put_be16(msg, data->proposal.dh); /* DH Group # */ 96739beb93cSSam Leffler wpabuf_put(msg, 2); /* RESERVED */ 96839beb93cSSam Leffler /* 96939beb93cSSam Leffler * RFC 4306, Sect. 3.4: possible zero padding for public value to 97039beb93cSSam Leffler * match the length of the prime. 97139beb93cSSam Leffler */ 97239beb93cSSam Leffler wpabuf_put(msg, data->dh->prime_len - wpabuf_len(pv)); 97339beb93cSSam Leffler wpabuf_put_buf(msg, pv); 97439beb93cSSam Leffler wpabuf_free(pv); 97539beb93cSSam Leffler 97639beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 97739beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 97839beb93cSSam Leffler return 0; 97939beb93cSSam Leffler } 98039beb93cSSam Leffler 98139beb93cSSam Leffler 98239beb93cSSam Leffler static int ikev2_build_nr(struct ikev2_responder_data *data, 98339beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 98439beb93cSSam Leffler { 98539beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 98639beb93cSSam Leffler size_t plen; 98739beb93cSSam Leffler 98839beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding Nr payload"); 98939beb93cSSam Leffler 99039beb93cSSam Leffler /* Nr - RFC 4306, Sect. 3.9 */ 99139beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 99239beb93cSSam Leffler phdr->next_payload = next_payload; 99339beb93cSSam Leffler phdr->flags = 0; 99439beb93cSSam Leffler wpabuf_put_data(msg, data->r_nonce, data->r_nonce_len); 99539beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 99639beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 99739beb93cSSam Leffler return 0; 99839beb93cSSam Leffler } 99939beb93cSSam Leffler 100039beb93cSSam Leffler 100139beb93cSSam Leffler static int ikev2_build_idr(struct ikev2_responder_data *data, 100239beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 100339beb93cSSam Leffler { 100439beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 100539beb93cSSam Leffler size_t plen; 100639beb93cSSam Leffler 100739beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding IDr payload"); 100839beb93cSSam Leffler 100939beb93cSSam Leffler if (data->IDr == NULL) { 101039beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No IDr available"); 101139beb93cSSam Leffler return -1; 101239beb93cSSam Leffler } 101339beb93cSSam Leffler 101439beb93cSSam Leffler /* IDr - RFC 4306, Sect. 3.5 */ 101539beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 101639beb93cSSam Leffler phdr->next_payload = next_payload; 101739beb93cSSam Leffler phdr->flags = 0; 101839beb93cSSam Leffler wpabuf_put_u8(msg, ID_KEY_ID); 101939beb93cSSam Leffler wpabuf_put(msg, 3); /* RESERVED */ 102039beb93cSSam Leffler wpabuf_put_data(msg, data->IDr, data->IDr_len); 102139beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 102239beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 102339beb93cSSam Leffler return 0; 102439beb93cSSam Leffler } 102539beb93cSSam Leffler 102639beb93cSSam Leffler 102739beb93cSSam Leffler static int ikev2_build_auth(struct ikev2_responder_data *data, 102839beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 102939beb93cSSam Leffler { 103039beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 103139beb93cSSam Leffler size_t plen; 103239beb93cSSam Leffler const struct ikev2_prf_alg *prf; 103339beb93cSSam Leffler 103439beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding AUTH payload"); 103539beb93cSSam Leffler 103639beb93cSSam Leffler prf = ikev2_get_prf(data->proposal.prf); 103739beb93cSSam Leffler if (prf == NULL) 103839beb93cSSam Leffler return -1; 103939beb93cSSam Leffler 104039beb93cSSam Leffler /* Authentication - RFC 4306, Sect. 3.8 */ 104139beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 104239beb93cSSam Leffler phdr->next_payload = next_payload; 104339beb93cSSam Leffler phdr->flags = 0; 104439beb93cSSam Leffler wpabuf_put_u8(msg, AUTH_SHARED_KEY_MIC); 104539beb93cSSam Leffler wpabuf_put(msg, 3); /* RESERVED */ 104639beb93cSSam Leffler 104739beb93cSSam Leffler /* msg | Ni | prf(SK_pr,IDr') */ 104839beb93cSSam Leffler if (ikev2_derive_auth_data(data->proposal.prf, data->r_sign_msg, 104939beb93cSSam Leffler data->IDr, data->IDr_len, ID_KEY_ID, 105039beb93cSSam Leffler &data->keys, 0, data->shared_secret, 105139beb93cSSam Leffler data->shared_secret_len, 105239beb93cSSam Leffler data->i_nonce, data->i_nonce_len, 105339beb93cSSam Leffler data->key_pad, data->key_pad_len, 105439beb93cSSam Leffler wpabuf_put(msg, prf->hash_len)) < 0) { 105539beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data"); 105639beb93cSSam Leffler return -1; 105739beb93cSSam Leffler } 105839beb93cSSam Leffler wpabuf_free(data->r_sign_msg); 105939beb93cSSam Leffler data->r_sign_msg = NULL; 106039beb93cSSam Leffler 106139beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 106239beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 106339beb93cSSam Leffler return 0; 106439beb93cSSam Leffler } 106539beb93cSSam Leffler 106639beb93cSSam Leffler 106739beb93cSSam Leffler static int ikev2_build_notification(struct ikev2_responder_data *data, 106839beb93cSSam Leffler struct wpabuf *msg, u8 next_payload) 106939beb93cSSam Leffler { 107039beb93cSSam Leffler struct ikev2_payload_hdr *phdr; 107139beb93cSSam Leffler size_t plen; 107239beb93cSSam Leffler 107339beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: Adding Notification payload"); 107439beb93cSSam Leffler 107539beb93cSSam Leffler if (data->error_type == 0) { 107639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No Notify Message Type " 107739beb93cSSam Leffler "available"); 107839beb93cSSam Leffler return -1; 107939beb93cSSam Leffler } 108039beb93cSSam Leffler 108139beb93cSSam Leffler /* Notify - RFC 4306, Sect. 3.10 */ 108239beb93cSSam Leffler phdr = wpabuf_put(msg, sizeof(*phdr)); 108339beb93cSSam Leffler phdr->next_payload = next_payload; 108439beb93cSSam Leffler phdr->flags = 0; 108539beb93cSSam Leffler #ifdef CCNS_PL 108639beb93cSSam Leffler wpabuf_put_u8(msg, 1); /* Protocol ID: IKE_SA notification */ 108739beb93cSSam Leffler #else /* CCNS_PL */ 108839beb93cSSam Leffler wpabuf_put_u8(msg, 0); /* Protocol ID: no existing SA */ 108939beb93cSSam Leffler #endif /* CCNS_PL */ 109039beb93cSSam Leffler wpabuf_put_u8(msg, 0); /* SPI Size */ 109139beb93cSSam Leffler wpabuf_put_be16(msg, data->error_type); 109239beb93cSSam Leffler 109339beb93cSSam Leffler switch (data->error_type) { 109439beb93cSSam Leffler case INVALID_KE_PAYLOAD: 109539beb93cSSam Leffler if (data->proposal.dh == -1) { 109639beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: No DH Group selected for " 109739beb93cSSam Leffler "INVALID_KE_PAYLOAD notifications"); 109839beb93cSSam Leffler return -1; 109939beb93cSSam Leffler } 110039beb93cSSam Leffler wpabuf_put_be16(msg, data->proposal.dh); 110139beb93cSSam Leffler wpa_printf(MSG_DEBUG, "IKEV2: INVALID_KE_PAYLOAD - request " 110239beb93cSSam Leffler "DH Group #%d", data->proposal.dh); 110339beb93cSSam Leffler break; 110439beb93cSSam Leffler case AUTHENTICATION_FAILED: 110539beb93cSSam Leffler /* no associated data */ 110639beb93cSSam Leffler break; 110739beb93cSSam Leffler default: 110839beb93cSSam Leffler wpa_printf(MSG_INFO, "IKEV2: Unsupported Notify Message Type " 110939beb93cSSam Leffler "%d", data->error_type); 111039beb93cSSam Leffler return -1; 111139beb93cSSam Leffler } 111239beb93cSSam Leffler 111339beb93cSSam Leffler plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr; 111439beb93cSSam Leffler WPA_PUT_BE16(phdr->payload_length, plen); 111539beb93cSSam Leffler return 0; 111639beb93cSSam Leffler } 111739beb93cSSam Leffler 111839beb93cSSam Leffler 111939beb93cSSam Leffler static struct wpabuf * ikev2_build_sa_init(struct ikev2_responder_data *data) 112039beb93cSSam Leffler { 112139beb93cSSam Leffler struct wpabuf *msg; 112239beb93cSSam Leffler 112339beb93cSSam Leffler /* build IKE_SA_INIT: HDR, SAr1, KEr, Nr, [CERTREQ], [SK{IDr}] */ 112439beb93cSSam Leffler 112539beb93cSSam Leffler if (os_get_random(data->r_spi, IKEV2_SPI_LEN)) 112639beb93cSSam Leffler return NULL; 112739beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI", 112839beb93cSSam Leffler data->r_spi, IKEV2_SPI_LEN); 112939beb93cSSam Leffler 113039beb93cSSam Leffler data->r_nonce_len = IKEV2_NONCE_MIN_LEN; 1131*f05cddf9SRui Paulo if (random_get_bytes(data->r_nonce, data->r_nonce_len)) 113239beb93cSSam Leffler return NULL; 113339beb93cSSam Leffler #ifdef CCNS_PL 113439beb93cSSam Leffler /* Zeros are removed incorrectly from the beginning of the nonces in 113539beb93cSSam Leffler * key derivation; as a workaround, make sure Nr does not start with 113639beb93cSSam Leffler * zero.. */ 113739beb93cSSam Leffler if (data->r_nonce[0] == 0) 113839beb93cSSam Leffler data->r_nonce[0] = 1; 113939beb93cSSam Leffler #endif /* CCNS_PL */ 114039beb93cSSam Leffler wpa_hexdump(MSG_DEBUG, "IKEV2: Nr", data->r_nonce, data->r_nonce_len); 114139beb93cSSam Leffler 114239beb93cSSam Leffler msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1500); 114339beb93cSSam Leffler if (msg == NULL) 114439beb93cSSam Leffler return NULL; 114539beb93cSSam Leffler 114639beb93cSSam Leffler ikev2_build_hdr(data, msg, IKE_SA_INIT, IKEV2_PAYLOAD_SA, 0); 114739beb93cSSam Leffler if (ikev2_build_sar1(data, msg, IKEV2_PAYLOAD_KEY_EXCHANGE) || 114839beb93cSSam Leffler ikev2_build_ker(data, msg, IKEV2_PAYLOAD_NONCE) || 114939beb93cSSam Leffler ikev2_build_nr(data, msg, data->peer_auth == PEER_AUTH_SECRET ? 115039beb93cSSam Leffler IKEV2_PAYLOAD_ENCRYPTED : 115139beb93cSSam Leffler IKEV2_PAYLOAD_NO_NEXT_PAYLOAD)) { 115239beb93cSSam Leffler wpabuf_free(msg); 115339beb93cSSam Leffler return NULL; 115439beb93cSSam Leffler } 115539beb93cSSam Leffler 115639beb93cSSam Leffler if (ikev2_derive_keys(data)) { 115739beb93cSSam Leffler wpabuf_free(msg); 115839beb93cSSam Leffler return NULL; 115939beb93cSSam Leffler } 116039beb93cSSam Leffler 116139beb93cSSam Leffler if (data->peer_auth == PEER_AUTH_CERT) { 116239beb93cSSam Leffler /* TODO: CERTREQ with SHA-1 hashes of Subject Public Key Info 116339beb93cSSam Leffler * for trust agents */ 116439beb93cSSam Leffler } 116539beb93cSSam Leffler 116639beb93cSSam Leffler if (data->peer_auth == PEER_AUTH_SECRET) { 116739beb93cSSam Leffler struct wpabuf *plain = wpabuf_alloc(data->IDr_len + 1000); 116839beb93cSSam Leffler if (plain == NULL) { 116939beb93cSSam Leffler wpabuf_free(msg); 117039beb93cSSam Leffler return NULL; 117139beb93cSSam Leffler } 117239beb93cSSam Leffler if (ikev2_build_idr(data, plain, 117339beb93cSSam Leffler IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) || 117439beb93cSSam Leffler ikev2_build_encrypted(data->proposal.encr, 117539beb93cSSam Leffler data->proposal.integ, 117639beb93cSSam Leffler &data->keys, 0, msg, plain, 117739beb93cSSam Leffler IKEV2_PAYLOAD_IDr)) { 117839beb93cSSam Leffler wpabuf_free(plain); 117939beb93cSSam Leffler wpabuf_free(msg); 118039beb93cSSam Leffler return NULL; 118139beb93cSSam Leffler } 118239beb93cSSam Leffler wpabuf_free(plain); 118339beb93cSSam Leffler } 118439beb93cSSam Leffler 118539beb93cSSam Leffler ikev2_update_hdr(msg); 118639beb93cSSam Leffler 118739beb93cSSam Leffler wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg); 118839beb93cSSam Leffler 118939beb93cSSam Leffler data->state = SA_AUTH; 119039beb93cSSam Leffler 119139beb93cSSam Leffler wpabuf_free(data->r_sign_msg); 119239beb93cSSam Leffler data->r_sign_msg = wpabuf_dup(msg); 119339beb93cSSam Leffler 119439beb93cSSam Leffler return msg; 119539beb93cSSam Leffler } 119639beb93cSSam Leffler 119739beb93cSSam Leffler 119839beb93cSSam Leffler static struct wpabuf * ikev2_build_sa_auth(struct ikev2_responder_data *data) 119939beb93cSSam Leffler { 120039beb93cSSam Leffler struct wpabuf *msg, *plain; 120139beb93cSSam Leffler 120239beb93cSSam Leffler /* build IKE_SA_AUTH: HDR, SK {IDr, [CERT,] AUTH} */ 120339beb93cSSam Leffler 120439beb93cSSam Leffler msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1000); 120539beb93cSSam Leffler if (msg == NULL) 120639beb93cSSam Leffler return NULL; 120739beb93cSSam Leffler ikev2_build_hdr(data, msg, IKE_SA_AUTH, IKEV2_PAYLOAD_ENCRYPTED, 1); 120839beb93cSSam Leffler 120939beb93cSSam Leffler plain = wpabuf_alloc(data->IDr_len + 1000); 121039beb93cSSam Leffler if (plain == NULL) { 121139beb93cSSam Leffler wpabuf_free(msg); 121239beb93cSSam Leffler return NULL; 121339beb93cSSam Leffler } 121439beb93cSSam Leffler 121539beb93cSSam Leffler if (ikev2_build_idr(data, plain, IKEV2_PAYLOAD_AUTHENTICATION) || 121639beb93cSSam Leffler ikev2_build_auth(data, plain, IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) || 121739beb93cSSam Leffler ikev2_build_encrypted(data->proposal.encr, data->proposal.integ, 121839beb93cSSam Leffler &data->keys, 0, msg, plain, 121939beb93cSSam Leffler IKEV2_PAYLOAD_IDr)) { 122039beb93cSSam Leffler wpabuf_free(plain); 122139beb93cSSam Leffler wpabuf_free(msg); 122239beb93cSSam Leffler return NULL; 122339beb93cSSam Leffler } 122439beb93cSSam Leffler wpabuf_free(plain); 122539beb93cSSam Leffler 122639beb93cSSam Leffler wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg); 122739beb93cSSam Leffler 122839beb93cSSam Leffler data->state = IKEV2_DONE; 122939beb93cSSam Leffler 123039beb93cSSam Leffler return msg; 123139beb93cSSam Leffler } 123239beb93cSSam Leffler 123339beb93cSSam Leffler 123439beb93cSSam Leffler static struct wpabuf * ikev2_build_notify(struct ikev2_responder_data *data) 123539beb93cSSam Leffler { 123639beb93cSSam Leffler struct wpabuf *msg; 123739beb93cSSam Leffler 123839beb93cSSam Leffler msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + 1000); 123939beb93cSSam Leffler if (msg == NULL) 124039beb93cSSam Leffler return NULL; 124139beb93cSSam Leffler if (data->last_msg == LAST_MSG_SA_AUTH) { 124239beb93cSSam Leffler /* HDR, SK{N} */ 124339beb93cSSam Leffler struct wpabuf *plain = wpabuf_alloc(100); 124439beb93cSSam Leffler if (plain == NULL) { 124539beb93cSSam Leffler wpabuf_free(msg); 124639beb93cSSam Leffler return NULL; 124739beb93cSSam Leffler } 124839beb93cSSam Leffler ikev2_build_hdr(data, msg, IKE_SA_AUTH, 124939beb93cSSam Leffler IKEV2_PAYLOAD_ENCRYPTED, 1); 125039beb93cSSam Leffler if (ikev2_build_notification(data, plain, 125139beb93cSSam Leffler IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) || 125239beb93cSSam Leffler ikev2_build_encrypted(data->proposal.encr, 125339beb93cSSam Leffler data->proposal.integ, 125439beb93cSSam Leffler &data->keys, 0, msg, plain, 125539beb93cSSam Leffler IKEV2_PAYLOAD_NOTIFICATION)) { 125639beb93cSSam Leffler wpabuf_free(plain); 125739beb93cSSam Leffler wpabuf_free(msg); 125839beb93cSSam Leffler return NULL; 125939beb93cSSam Leffler } 126039beb93cSSam Leffler data->state = IKEV2_FAILED; 126139beb93cSSam Leffler } else { 126239beb93cSSam Leffler /* HDR, N */ 126339beb93cSSam Leffler ikev2_build_hdr(data, msg, IKE_SA_INIT, 126439beb93cSSam Leffler IKEV2_PAYLOAD_NOTIFICATION, 0); 126539beb93cSSam Leffler if (ikev2_build_notification(data, msg, 126639beb93cSSam Leffler IKEV2_PAYLOAD_NO_NEXT_PAYLOAD)) { 126739beb93cSSam Leffler wpabuf_free(msg); 126839beb93cSSam Leffler return NULL; 126939beb93cSSam Leffler } 127039beb93cSSam Leffler data->state = SA_INIT; 127139beb93cSSam Leffler } 127239beb93cSSam Leffler 127339beb93cSSam Leffler ikev2_update_hdr(msg); 127439beb93cSSam Leffler 127539beb93cSSam Leffler wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (Notification)", 127639beb93cSSam Leffler msg); 127739beb93cSSam Leffler 127839beb93cSSam Leffler return msg; 127939beb93cSSam Leffler } 128039beb93cSSam Leffler 128139beb93cSSam Leffler 128239beb93cSSam Leffler struct wpabuf * ikev2_responder_build(struct ikev2_responder_data *data) 128339beb93cSSam Leffler { 128439beb93cSSam Leffler switch (data->state) { 128539beb93cSSam Leffler case SA_INIT: 128639beb93cSSam Leffler return ikev2_build_sa_init(data); 128739beb93cSSam Leffler case SA_AUTH: 128839beb93cSSam Leffler return ikev2_build_sa_auth(data); 128939beb93cSSam Leffler case CHILD_SA: 129039beb93cSSam Leffler return NULL; 129139beb93cSSam Leffler case NOTIFY: 129239beb93cSSam Leffler return ikev2_build_notify(data); 129339beb93cSSam Leffler case IKEV2_DONE: 129439beb93cSSam Leffler case IKEV2_FAILED: 129539beb93cSSam Leffler return NULL; 129639beb93cSSam Leffler } 129739beb93cSSam Leffler return NULL; 129839beb93cSSam Leffler } 1299