xref: /freebsd/contrib/wpa/src/eap_server/eap_server_gtc.c (revision f4b37ed0f8b307b1f3f0f630ca725d68f1dff30d)
1 /*
2  * hostapd / EAP-GTC (RFC 3748)
3  * Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8 
9 #include "includes.h"
10 
11 #include "common.h"
12 #include "eap_i.h"
13 
14 
15 struct eap_gtc_data {
16 	enum { CONTINUE, SUCCESS, FAILURE } state;
17 	int prefix;
18 };
19 
20 
21 static void * eap_gtc_init(struct eap_sm *sm)
22 {
23 	struct eap_gtc_data *data;
24 
25 	data = os_zalloc(sizeof(*data));
26 	if (data == NULL)
27 		return NULL;
28 	data->state = CONTINUE;
29 
30 #ifdef EAP_SERVER_FAST
31 	if (sm->m && sm->m->vendor == EAP_VENDOR_IETF &&
32 	    sm->m->method == EAP_TYPE_FAST) {
33 		wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
34 			   "with challenge/response");
35 		data->prefix = 1;
36 	}
37 #endif /* EAP_SERVER_FAST */
38 
39 	return data;
40 }
41 
42 
43 static void eap_gtc_reset(struct eap_sm *sm, void *priv)
44 {
45 	struct eap_gtc_data *data = priv;
46 	os_free(data);
47 }
48 
49 
50 static struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id)
51 {
52 	struct eap_gtc_data *data = priv;
53 	struct wpabuf *req;
54 	char *msg;
55 	size_t msg_len;
56 
57 	msg = data->prefix ? "CHALLENGE=Password" : "Password";
58 
59 	msg_len = os_strlen(msg);
60 	req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
61 			    EAP_CODE_REQUEST, id);
62 	if (req == NULL) {
63 		wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for "
64 			   "request");
65 		data->state = FAILURE;
66 		return NULL;
67 	}
68 
69 	wpabuf_put_data(req, msg, msg_len);
70 
71 	data->state = CONTINUE;
72 
73 	return req;
74 }
75 
76 
77 static Boolean eap_gtc_check(struct eap_sm *sm, void *priv,
78 			     struct wpabuf *respData)
79 {
80 	const u8 *pos;
81 	size_t len;
82 
83 	pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len);
84 	if (pos == NULL || len < 1) {
85 		wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame");
86 		return TRUE;
87 	}
88 
89 	return FALSE;
90 }
91 
92 
93 static void eap_gtc_process(struct eap_sm *sm, void *priv,
94 			    struct wpabuf *respData)
95 {
96 	struct eap_gtc_data *data = priv;
97 	const u8 *pos;
98 	size_t rlen;
99 
100 	pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
101 	if (pos == NULL || rlen < 1)
102 		return; /* Should not happen - frame already validated */
103 
104 	wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
105 
106 #ifdef EAP_SERVER_FAST
107 	if (data->prefix) {
108 		const u8 *pos2, *end;
109 		/* "RESPONSE=<user>\0<password>" */
110 		if (rlen < 10) {
111 			wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
112 				   "for EAP-FAST prefix");
113 			data->state = FAILURE;
114 			return;
115 		}
116 
117 		end = pos + rlen;
118 		pos += 9;
119 		pos2 = pos;
120 		while (pos2 < end && *pos2)
121 			pos2++;
122 		if (pos2 == end) {
123 			wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
124 				   "response to EAP-FAST prefix");
125 			data->state = FAILURE;
126 			return;
127 		}
128 
129 		wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user",
130 				  pos, pos2 - pos);
131 		if (sm->identity && sm->require_identity_match &&
132 		    (pos2 - pos != (int) sm->identity_len ||
133 		     os_memcmp(pos, sm->identity, sm->identity_len))) {
134 			wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
135 				   "not match with required Identity");
136 			wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected "
137 					  "identity",
138 					  sm->identity, sm->identity_len);
139 			data->state = FAILURE;
140 			return;
141 		} else {
142 			os_free(sm->identity);
143 			sm->identity_len = pos2 - pos;
144 			sm->identity = os_malloc(sm->identity_len);
145 			if (sm->identity == NULL) {
146 				data->state = FAILURE;
147 				return;
148 			}
149 			os_memcpy(sm->identity, pos, sm->identity_len);
150 		}
151 
152 		if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
153 			wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
154 					  "Identity not found in the user "
155 					  "database",
156 					  sm->identity, sm->identity_len);
157 			data->state = FAILURE;
158 			return;
159 		}
160 
161 		pos = pos2 + 1;
162 		rlen = end - pos;
163 		wpa_hexdump_ascii_key(MSG_MSGDUMP,
164 				      "EAP-GTC: Response password",
165 				      pos, rlen);
166 	}
167 #endif /* EAP_SERVER_FAST */
168 
169 	if (sm->user == NULL || sm->user->password == NULL ||
170 	    sm->user->password_hash) {
171 		wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
172 			   "configured");
173 		data->state = FAILURE;
174 		return;
175 	}
176 
177 	if (rlen != sm->user->password_len ||
178 	    os_memcmp_const(pos, sm->user->password, rlen) != 0) {
179 		wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure");
180 		data->state = FAILURE;
181 	} else {
182 		wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
183 		data->state = SUCCESS;
184 	}
185 }
186 
187 
188 static Boolean eap_gtc_isDone(struct eap_sm *sm, void *priv)
189 {
190 	struct eap_gtc_data *data = priv;
191 	return data->state != CONTINUE;
192 }
193 
194 
195 static Boolean eap_gtc_isSuccess(struct eap_sm *sm, void *priv)
196 {
197 	struct eap_gtc_data *data = priv;
198 	return data->state == SUCCESS;
199 }
200 
201 
202 int eap_server_gtc_register(void)
203 {
204 	struct eap_method *eap;
205 	int ret;
206 
207 	eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
208 				      EAP_VENDOR_IETF, EAP_TYPE_GTC, "GTC");
209 	if (eap == NULL)
210 		return -1;
211 
212 	eap->init = eap_gtc_init;
213 	eap->reset = eap_gtc_reset;
214 	eap->buildReq = eap_gtc_buildReq;
215 	eap->check = eap_gtc_check;
216 	eap->process = eap_gtc_process;
217 	eap->isDone = eap_gtc_isDone;
218 	eap->isSuccess = eap_gtc_isSuccess;
219 
220 	ret = eap_server_method_register(eap);
221 	if (ret)
222 		eap_server_method_free(eap);
223 	return ret;
224 }
225