eap_aka.c 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389
  1. /*
  2. * EAP peer method: EAP-AKA (RFC 4187) and EAP-AKA' (draft-arkko-eap-aka-kdf)
  3. * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This program is free software; you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License version 2 as
  7. * published by the Free Software Foundation.
  8. *
  9. * Alternatively, this software may be distributed under the terms of BSD
  10. * license.
  11. *
  12. * See README and COPYING for more details.
  13. */
  14. #include "includes.h"
  15. #include "common.h"
  16. #include "pcsc_funcs.h"
  17. #include "crypto/crypto.h"
  18. #include "crypto/sha1.h"
  19. #include "crypto/sha256.h"
  20. #include "hlr_auc_gw/milenage.h"
  21. #include "eap_common/eap_sim_common.h"
  22. #include "eap_config.h"
  23. #include "eap_i.h"
  24. struct eap_aka_data {
  25. u8 ik[EAP_AKA_IK_LEN], ck[EAP_AKA_CK_LEN], res[EAP_AKA_RES_MAX_LEN];
  26. size_t res_len;
  27. u8 nonce_s[EAP_SIM_NONCE_S_LEN];
  28. u8 mk[EAP_SIM_MK_LEN];
  29. u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN];
  30. u8 k_encr[EAP_SIM_K_ENCR_LEN];
  31. u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
  32. u8 msk[EAP_SIM_KEYING_DATA_LEN];
  33. u8 emsk[EAP_EMSK_LEN];
  34. u8 rand[EAP_AKA_RAND_LEN], autn[EAP_AKA_AUTN_LEN];
  35. u8 auts[EAP_AKA_AUTS_LEN];
  36. int num_id_req, num_notification;
  37. u8 *pseudonym;
  38. size_t pseudonym_len;
  39. u8 *reauth_id;
  40. size_t reauth_id_len;
  41. int reauth;
  42. unsigned int counter, counter_too_small;
  43. u8 *last_eap_identity;
  44. size_t last_eap_identity_len;
  45. enum {
  46. CONTINUE, RESULT_SUCCESS, RESULT_FAILURE, SUCCESS, FAILURE
  47. } state;
  48. struct wpabuf *id_msgs;
  49. int prev_id;
  50. int result_ind, use_result_ind;
  51. u8 eap_method;
  52. u8 *network_name;
  53. size_t network_name_len;
  54. u16 kdf;
  55. int kdf_negotiation;
  56. };
  57. #ifndef CONFIG_NO_STDOUT_DEBUG
  58. static const char * eap_aka_state_txt(int state)
  59. {
  60. switch (state) {
  61. case CONTINUE:
  62. return "CONTINUE";
  63. case RESULT_SUCCESS:
  64. return "RESULT_SUCCESS";
  65. case RESULT_FAILURE:
  66. return "RESULT_FAILURE";
  67. case SUCCESS:
  68. return "SUCCESS";
  69. case FAILURE:
  70. return "FAILURE";
  71. default:
  72. return "?";
  73. }
  74. }
  75. #endif /* CONFIG_NO_STDOUT_DEBUG */
  76. static void eap_aka_state(struct eap_aka_data *data, int state)
  77. {
  78. wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
  79. eap_aka_state_txt(data->state),
  80. eap_aka_state_txt(state));
  81. data->state = state;
  82. }
  83. static void * eap_aka_init(struct eap_sm *sm)
  84. {
  85. struct eap_aka_data *data;
  86. const char *phase1 = eap_get_config_phase1(sm);
  87. data = os_zalloc(sizeof(*data));
  88. if (data == NULL)
  89. return NULL;
  90. data->eap_method = EAP_TYPE_AKA;
  91. eap_aka_state(data, CONTINUE);
  92. data->prev_id = -1;
  93. data->result_ind = phase1 && os_strstr(phase1, "result_ind=1") != NULL;
  94. return data;
  95. }
  96. #ifdef EAP_AKA_PRIME
  97. static void * eap_aka_prime_init(struct eap_sm *sm)
  98. {
  99. struct eap_aka_data *data = eap_aka_init(sm);
  100. if (data == NULL)
  101. return NULL;
  102. data->eap_method = EAP_TYPE_AKA_PRIME;
  103. return data;
  104. }
  105. #endif /* EAP_AKA_PRIME */
  106. static void eap_aka_deinit(struct eap_sm *sm, void *priv)
  107. {
  108. struct eap_aka_data *data = priv;
  109. if (data) {
  110. os_free(data->pseudonym);
  111. os_free(data->reauth_id);
  112. os_free(data->last_eap_identity);
  113. wpabuf_free(data->id_msgs);
  114. os_free(data->network_name);
  115. os_free(data);
  116. }
  117. }
  118. static int eap_aka_umts_auth(struct eap_sm *sm, struct eap_aka_data *data)
  119. {
  120. struct eap_peer_config *conf;
  121. wpa_printf(MSG_DEBUG, "EAP-AKA: UMTS authentication algorithm");
  122. conf = eap_get_config(sm);
  123. if (conf == NULL)
  124. return -1;
  125. if (conf->pcsc) {
  126. return scard_umts_auth(sm->scard_ctx, data->rand,
  127. data->autn, data->res, &data->res_len,
  128. data->ik, data->ck, data->auts);
  129. }
  130. #ifdef CONFIG_USIM_SIMULATOR
  131. if (conf->password) {
  132. u8 opc[16], k[16], sqn[6];
  133. const char *pos;
  134. wpa_printf(MSG_DEBUG, "EAP-AKA: Use internal Milenage "
  135. "implementation for UMTS authentication");
  136. if (conf->password_len < 78) {
  137. wpa_printf(MSG_DEBUG, "EAP-AKA: invalid Milenage "
  138. "password");
  139. return -1;
  140. }
  141. pos = (const char *) conf->password;
  142. if (hexstr2bin(pos, k, 16))
  143. return -1;
  144. pos += 32;
  145. if (*pos != ':')
  146. return -1;
  147. pos++;
  148. if (hexstr2bin(pos, opc, 16))
  149. return -1;
  150. pos += 32;
  151. if (*pos != ':')
  152. return -1;
  153. pos++;
  154. if (hexstr2bin(pos, sqn, 6))
  155. return -1;
  156. return milenage_check(opc, k, sqn, data->rand, data->autn,
  157. data->ik, data->ck,
  158. data->res, &data->res_len, data->auts);
  159. }
  160. #endif /* CONFIG_USIM_SIMULATOR */
  161. #ifdef CONFIG_USIM_HARDCODED
  162. wpa_printf(MSG_DEBUG, "EAP-AKA: Use hardcoded Kc and SRES values for "
  163. "testing");
  164. /* These hardcoded Kc and SRES values are used for testing.
  165. * Could consider making them configurable. */
  166. os_memset(data->res, '2', EAP_AKA_RES_MAX_LEN);
  167. data->res_len = EAP_AKA_RES_MAX_LEN;
  168. os_memset(data->ik, '3', EAP_AKA_IK_LEN);
  169. os_memset(data->ck, '4', EAP_AKA_CK_LEN);
  170. {
  171. u8 autn[EAP_AKA_AUTN_LEN];
  172. os_memset(autn, '1', EAP_AKA_AUTN_LEN);
  173. if (os_memcmp(autn, data->autn, EAP_AKA_AUTN_LEN) != 0) {
  174. wpa_printf(MSG_WARNING, "EAP-AKA: AUTN did not match "
  175. "with expected value");
  176. return -1;
  177. }
  178. }
  179. #if 0
  180. {
  181. static int test_resync = 1;
  182. if (test_resync) {
  183. /* Test Resynchronization */
  184. test_resync = 0;
  185. return -2;
  186. }
  187. }
  188. #endif
  189. return 0;
  190. #else /* CONFIG_USIM_HARDCODED */
  191. wpa_printf(MSG_DEBUG, "EAP-AKA: No UMTS authentication algorith "
  192. "enabled");
  193. return -1;
  194. #endif /* CONFIG_USIM_HARDCODED */
  195. }
  196. #define CLEAR_PSEUDONYM 0x01
  197. #define CLEAR_REAUTH_ID 0x02
  198. #define CLEAR_EAP_ID 0x04
  199. static void eap_aka_clear_identities(struct eap_aka_data *data, int id)
  200. {
  201. wpa_printf(MSG_DEBUG, "EAP-AKA: forgetting old%s%s%s",
  202. id & CLEAR_PSEUDONYM ? " pseudonym" : "",
  203. id & CLEAR_REAUTH_ID ? " reauth_id" : "",
  204. id & CLEAR_EAP_ID ? " eap_id" : "");
  205. if (id & CLEAR_PSEUDONYM) {
  206. os_free(data->pseudonym);
  207. data->pseudonym = NULL;
  208. data->pseudonym_len = 0;
  209. }
  210. if (id & CLEAR_REAUTH_ID) {
  211. os_free(data->reauth_id);
  212. data->reauth_id = NULL;
  213. data->reauth_id_len = 0;
  214. }
  215. if (id & CLEAR_EAP_ID) {
  216. os_free(data->last_eap_identity);
  217. data->last_eap_identity = NULL;
  218. data->last_eap_identity_len = 0;
  219. }
  220. }
  221. static int eap_aka_learn_ids(struct eap_aka_data *data,
  222. struct eap_sim_attrs *attr)
  223. {
  224. if (attr->next_pseudonym) {
  225. os_free(data->pseudonym);
  226. data->pseudonym = os_malloc(attr->next_pseudonym_len);
  227. if (data->pseudonym == NULL) {
  228. wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
  229. "next pseudonym");
  230. return -1;
  231. }
  232. os_memcpy(data->pseudonym, attr->next_pseudonym,
  233. attr->next_pseudonym_len);
  234. data->pseudonym_len = attr->next_pseudonym_len;
  235. wpa_hexdump_ascii(MSG_DEBUG,
  236. "EAP-AKA: (encr) AT_NEXT_PSEUDONYM",
  237. data->pseudonym,
  238. data->pseudonym_len);
  239. }
  240. if (attr->next_reauth_id) {
  241. os_free(data->reauth_id);
  242. data->reauth_id = os_malloc(attr->next_reauth_id_len);
  243. if (data->reauth_id == NULL) {
  244. wpa_printf(MSG_INFO, "EAP-AKA: (encr) No memory for "
  245. "next reauth_id");
  246. return -1;
  247. }
  248. os_memcpy(data->reauth_id, attr->next_reauth_id,
  249. attr->next_reauth_id_len);
  250. data->reauth_id_len = attr->next_reauth_id_len;
  251. wpa_hexdump_ascii(MSG_DEBUG,
  252. "EAP-AKA: (encr) AT_NEXT_REAUTH_ID",
  253. data->reauth_id,
  254. data->reauth_id_len);
  255. }
  256. return 0;
  257. }
  258. static int eap_aka_add_id_msg(struct eap_aka_data *data,
  259. const struct wpabuf *msg)
  260. {
  261. if (msg == NULL)
  262. return -1;
  263. if (data->id_msgs == NULL) {
  264. data->id_msgs = wpabuf_dup(msg);
  265. return data->id_msgs == NULL ? -1 : 0;
  266. }
  267. if (wpabuf_resize(&data->id_msgs, wpabuf_len(msg)) < 0)
  268. return -1;
  269. wpabuf_put_buf(data->id_msgs, msg);
  270. return 0;
  271. }
  272. static void eap_aka_add_checkcode(struct eap_aka_data *data,
  273. struct eap_sim_msg *msg)
  274. {
  275. const u8 *addr;
  276. size_t len;
  277. u8 hash[SHA256_MAC_LEN];
  278. wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
  279. if (data->id_msgs == NULL) {
  280. /*
  281. * No EAP-AKA/Identity packets were exchanged - send empty
  282. * checkcode.
  283. */
  284. eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, NULL, 0);
  285. return;
  286. }
  287. /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
  288. addr = wpabuf_head(data->id_msgs);
  289. len = wpabuf_len(data->id_msgs);
  290. wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
  291. #ifdef EAP_AKA_PRIME
  292. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  293. sha256_vector(1, &addr, &len, hash);
  294. else
  295. #endif /* EAP_AKA_PRIME */
  296. sha1_vector(1, &addr, &len, hash);
  297. eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, hash,
  298. data->eap_method == EAP_TYPE_AKA_PRIME ?
  299. EAP_AKA_PRIME_CHECKCODE_LEN : EAP_AKA_CHECKCODE_LEN);
  300. }
  301. static int eap_aka_verify_checkcode(struct eap_aka_data *data,
  302. const u8 *checkcode, size_t checkcode_len)
  303. {
  304. const u8 *addr;
  305. size_t len;
  306. u8 hash[SHA256_MAC_LEN];
  307. size_t hash_len;
  308. if (checkcode == NULL)
  309. return -1;
  310. if (data->id_msgs == NULL) {
  311. if (checkcode_len != 0) {
  312. wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server "
  313. "indicates that AKA/Identity messages were "
  314. "used, but they were not");
  315. return -1;
  316. }
  317. return 0;
  318. }
  319. hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ?
  320. EAP_AKA_PRIME_CHECKCODE_LEN : EAP_AKA_CHECKCODE_LEN;
  321. if (checkcode_len != hash_len) {
  322. wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from server "
  323. "indicates that AKA/Identity message were not "
  324. "used, but they were");
  325. return -1;
  326. }
  327. /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */
  328. addr = wpabuf_head(data->id_msgs);
  329. len = wpabuf_len(data->id_msgs);
  330. #ifdef EAP_AKA_PRIME
  331. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  332. sha256_vector(1, &addr, &len, hash);
  333. else
  334. #endif /* EAP_AKA_PRIME */
  335. sha1_vector(1, &addr, &len, hash);
  336. if (os_memcmp(hash, checkcode, hash_len) != 0) {
  337. wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE");
  338. return -1;
  339. }
  340. return 0;
  341. }
  342. static struct wpabuf * eap_aka_client_error(struct eap_aka_data *data, u8 id,
  343. int err)
  344. {
  345. struct eap_sim_msg *msg;
  346. eap_aka_state(data, FAILURE);
  347. data->num_id_req = 0;
  348. data->num_notification = 0;
  349. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  350. EAP_AKA_SUBTYPE_CLIENT_ERROR);
  351. eap_sim_msg_add(msg, EAP_SIM_AT_CLIENT_ERROR_CODE, err, NULL, 0);
  352. return eap_sim_msg_finish(msg, NULL, NULL, 0);
  353. }
  354. static struct wpabuf * eap_aka_authentication_reject(struct eap_aka_data *data,
  355. u8 id)
  356. {
  357. struct eap_sim_msg *msg;
  358. eap_aka_state(data, FAILURE);
  359. data->num_id_req = 0;
  360. data->num_notification = 0;
  361. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Authentication-Reject "
  362. "(id=%d)", id);
  363. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  364. EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT);
  365. return eap_sim_msg_finish(msg, NULL, NULL, 0);
  366. }
  367. static struct wpabuf * eap_aka_synchronization_failure(
  368. struct eap_aka_data *data, u8 id)
  369. {
  370. struct eap_sim_msg *msg;
  371. data->num_id_req = 0;
  372. data->num_notification = 0;
  373. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Synchronization-Failure "
  374. "(id=%d)", id);
  375. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  376. EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE);
  377. wpa_printf(MSG_DEBUG, " AT_AUTS");
  378. eap_sim_msg_add_full(msg, EAP_SIM_AT_AUTS, data->auts,
  379. EAP_AKA_AUTS_LEN);
  380. return eap_sim_msg_finish(msg, NULL, NULL, 0);
  381. }
  382. static struct wpabuf * eap_aka_response_identity(struct eap_sm *sm,
  383. struct eap_aka_data *data,
  384. u8 id,
  385. enum eap_sim_id_req id_req)
  386. {
  387. const u8 *identity = NULL;
  388. size_t identity_len = 0;
  389. struct eap_sim_msg *msg;
  390. data->reauth = 0;
  391. if (id_req == ANY_ID && data->reauth_id) {
  392. identity = data->reauth_id;
  393. identity_len = data->reauth_id_len;
  394. data->reauth = 1;
  395. } else if ((id_req == ANY_ID || id_req == FULLAUTH_ID) &&
  396. data->pseudonym) {
  397. identity = data->pseudonym;
  398. identity_len = data->pseudonym_len;
  399. eap_aka_clear_identities(data, CLEAR_REAUTH_ID);
  400. } else if (id_req != NO_ID_REQ) {
  401. identity = eap_get_config_identity(sm, &identity_len);
  402. if (identity) {
  403. eap_aka_clear_identities(data, CLEAR_PSEUDONYM |
  404. CLEAR_REAUTH_ID);
  405. }
  406. }
  407. if (id_req != NO_ID_REQ)
  408. eap_aka_clear_identities(data, CLEAR_EAP_ID);
  409. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Identity (id=%d)", id);
  410. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  411. EAP_AKA_SUBTYPE_IDENTITY);
  412. if (identity) {
  413. wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY",
  414. identity, identity_len);
  415. eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
  416. identity, identity_len);
  417. }
  418. return eap_sim_msg_finish(msg, NULL, NULL, 0);
  419. }
  420. static struct wpabuf * eap_aka_response_challenge(struct eap_aka_data *data,
  421. u8 id)
  422. {
  423. struct eap_sim_msg *msg;
  424. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d)", id);
  425. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  426. EAP_AKA_SUBTYPE_CHALLENGE);
  427. wpa_printf(MSG_DEBUG, " AT_RES");
  428. eap_sim_msg_add(msg, EAP_SIM_AT_RES, data->res_len * 8,
  429. data->res, data->res_len);
  430. eap_aka_add_checkcode(data, msg);
  431. if (data->use_result_ind) {
  432. wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
  433. eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
  434. }
  435. wpa_printf(MSG_DEBUG, " AT_MAC");
  436. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  437. return eap_sim_msg_finish(msg, data->k_aut, (u8 *) "", 0);
  438. }
  439. static struct wpabuf * eap_aka_response_reauth(struct eap_aka_data *data,
  440. u8 id, int counter_too_small,
  441. const u8 *nonce_s)
  442. {
  443. struct eap_sim_msg *msg;
  444. unsigned int counter;
  445. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Reauthentication (id=%d)",
  446. id);
  447. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  448. EAP_AKA_SUBTYPE_REAUTHENTICATION);
  449. wpa_printf(MSG_DEBUG, " AT_IV");
  450. wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
  451. eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV, EAP_SIM_AT_ENCR_DATA);
  452. if (counter_too_small) {
  453. wpa_printf(MSG_DEBUG, " *AT_COUNTER_TOO_SMALL");
  454. eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER_TOO_SMALL, 0, NULL, 0);
  455. counter = data->counter_too_small;
  456. } else
  457. counter = data->counter;
  458. wpa_printf(MSG_DEBUG, " *AT_COUNTER %d", counter);
  459. eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, counter, NULL, 0);
  460. if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
  461. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt "
  462. "AT_ENCR_DATA");
  463. eap_sim_msg_free(msg);
  464. return NULL;
  465. }
  466. eap_aka_add_checkcode(data, msg);
  467. if (data->use_result_ind) {
  468. wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
  469. eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
  470. }
  471. wpa_printf(MSG_DEBUG, " AT_MAC");
  472. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  473. return eap_sim_msg_finish(msg, data->k_aut, nonce_s,
  474. EAP_SIM_NONCE_S_LEN);
  475. }
  476. static struct wpabuf * eap_aka_response_notification(struct eap_aka_data *data,
  477. u8 id, u16 notification)
  478. {
  479. struct eap_sim_msg *msg;
  480. u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL;
  481. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Notification (id=%d)", id);
  482. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  483. EAP_AKA_SUBTYPE_NOTIFICATION);
  484. if (k_aut && data->reauth) {
  485. wpa_printf(MSG_DEBUG, " AT_IV");
  486. wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
  487. eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV,
  488. EAP_SIM_AT_ENCR_DATA);
  489. wpa_printf(MSG_DEBUG, " *AT_COUNTER %d", data->counter);
  490. eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, data->counter,
  491. NULL, 0);
  492. if (eap_sim_msg_add_encr_end(msg, data->k_encr,
  493. EAP_SIM_AT_PADDING)) {
  494. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt "
  495. "AT_ENCR_DATA");
  496. eap_sim_msg_free(msg);
  497. return NULL;
  498. }
  499. }
  500. if (k_aut) {
  501. wpa_printf(MSG_DEBUG, " AT_MAC");
  502. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  503. }
  504. return eap_sim_msg_finish(msg, k_aut, (u8 *) "", 0);
  505. }
  506. static struct wpabuf * eap_aka_process_identity(struct eap_sm *sm,
  507. struct eap_aka_data *data,
  508. u8 id,
  509. const struct wpabuf *reqData,
  510. struct eap_sim_attrs *attr)
  511. {
  512. int id_error;
  513. struct wpabuf *buf;
  514. wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Identity");
  515. id_error = 0;
  516. switch (attr->id_req) {
  517. case NO_ID_REQ:
  518. break;
  519. case ANY_ID:
  520. if (data->num_id_req > 0)
  521. id_error++;
  522. data->num_id_req++;
  523. break;
  524. case FULLAUTH_ID:
  525. if (data->num_id_req > 1)
  526. id_error++;
  527. data->num_id_req++;
  528. break;
  529. case PERMANENT_ID:
  530. if (data->num_id_req > 2)
  531. id_error++;
  532. data->num_id_req++;
  533. break;
  534. }
  535. if (id_error) {
  536. wpa_printf(MSG_INFO, "EAP-AKA: Too many ID requests "
  537. "used within one authentication");
  538. return eap_aka_client_error(data, id,
  539. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  540. }
  541. buf = eap_aka_response_identity(sm, data, id, attr->id_req);
  542. if (data->prev_id != id) {
  543. eap_aka_add_id_msg(data, reqData);
  544. eap_aka_add_id_msg(data, buf);
  545. data->prev_id = id;
  546. }
  547. return buf;
  548. }
  549. static int eap_aka_verify_mac(struct eap_aka_data *data,
  550. const struct wpabuf *req,
  551. const u8 *mac, const u8 *extra,
  552. size_t extra_len)
  553. {
  554. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  555. return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
  556. extra_len);
  557. return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
  558. }
  559. #ifdef EAP_AKA_PRIME
  560. static struct wpabuf * eap_aka_prime_kdf_select(struct eap_aka_data *data,
  561. u8 id, u16 kdf)
  562. {
  563. struct eap_sim_msg *msg;
  564. data->kdf_negotiation = 1;
  565. data->kdf = kdf;
  566. wpa_printf(MSG_DEBUG, "Generating EAP-AKA Challenge (id=%d) (KDF "
  567. "select)", id);
  568. msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, data->eap_method,
  569. EAP_AKA_SUBTYPE_CHALLENGE);
  570. wpa_printf(MSG_DEBUG, " AT_KDF");
  571. eap_sim_msg_add(msg, EAP_SIM_AT_KDF, kdf, NULL, 0);
  572. return eap_sim_msg_finish(msg, NULL, NULL, 0);
  573. }
  574. static struct wpabuf * eap_aka_prime_kdf_neg(struct eap_aka_data *data,
  575. u8 id, struct eap_sim_attrs *attr)
  576. {
  577. size_t i;
  578. for (i = 0; i < attr->kdf_count; i++) {
  579. if (attr->kdf[i] == EAP_AKA_PRIME_KDF)
  580. return eap_aka_prime_kdf_select(data, id,
  581. EAP_AKA_PRIME_KDF);
  582. }
  583. /* No matching KDF found - fail authentication as if AUTN had been
  584. * incorrect */
  585. return eap_aka_authentication_reject(data, id);
  586. }
  587. static int eap_aka_prime_kdf_valid(struct eap_aka_data *data,
  588. struct eap_sim_attrs *attr)
  589. {
  590. size_t i, j;
  591. if (attr->kdf_count == 0)
  592. return 0;
  593. /* The only allowed (and required) duplication of a KDF is the addition
  594. * of the selected KDF into the beginning of the list. */
  595. if (data->kdf_negotiation) {
  596. if (attr->kdf[0] != data->kdf) {
  597. wpa_printf(MSG_WARNING, "EAP-AKA': The server did not "
  598. "accept the selected KDF");
  599. return 0;
  600. }
  601. for (i = 1; i < attr->kdf_count; i++) {
  602. if (attr->kdf[i] == data->kdf)
  603. break;
  604. }
  605. if (i == attr->kdf_count &&
  606. attr->kdf_count < EAP_AKA_PRIME_KDF_MAX) {
  607. wpa_printf(MSG_WARNING, "EAP-AKA': The server did not "
  608. "duplicate the selected KDF");
  609. return 0;
  610. }
  611. /* TODO: should check that the list is identical to the one
  612. * used in the previous Challenge message apart from the added
  613. * entry in the beginning. */
  614. }
  615. for (i = data->kdf ? 1 : 0; i < attr->kdf_count; i++) {
  616. for (j = i + 1; j < attr->kdf_count; j++) {
  617. if (attr->kdf[i] == attr->kdf[j]) {
  618. wpa_printf(MSG_WARNING, "EAP-AKA': The server "
  619. "included a duplicated KDF");
  620. return 0;
  621. }
  622. }
  623. }
  624. return 1;
  625. }
  626. #endif /* EAP_AKA_PRIME */
  627. static struct wpabuf * eap_aka_process_challenge(struct eap_sm *sm,
  628. struct eap_aka_data *data,
  629. u8 id,
  630. const struct wpabuf *reqData,
  631. struct eap_sim_attrs *attr)
  632. {
  633. const u8 *identity;
  634. size_t identity_len;
  635. int res;
  636. struct eap_sim_attrs eattr;
  637. wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Challenge");
  638. if (attr->checkcode &&
  639. eap_aka_verify_checkcode(data, attr->checkcode,
  640. attr->checkcode_len)) {
  641. wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the "
  642. "message");
  643. return eap_aka_client_error(data, id,
  644. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  645. }
  646. #ifdef EAP_AKA_PRIME
  647. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  648. if (!attr->kdf_input || attr->kdf_input_len == 0) {
  649. wpa_printf(MSG_WARNING, "EAP-AKA': Challenge message "
  650. "did not include non-empty AT_KDF_INPUT");
  651. /* Fail authentication as if AUTN had been incorrect */
  652. return eap_aka_authentication_reject(data, id);
  653. }
  654. os_free(data->network_name);
  655. data->network_name = os_malloc(attr->kdf_input_len);
  656. if (data->network_name == NULL) {
  657. wpa_printf(MSG_WARNING, "EAP-AKA': No memory for "
  658. "storing Network Name");
  659. return eap_aka_authentication_reject(data, id);
  660. }
  661. os_memcpy(data->network_name, attr->kdf_input,
  662. attr->kdf_input_len);
  663. data->network_name_len = attr->kdf_input_len;
  664. wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA': Network Name "
  665. "(AT_KDF_INPUT)",
  666. data->network_name, data->network_name_len);
  667. /* TODO: check Network Name per 3GPP.33.402 */
  668. if (!eap_aka_prime_kdf_valid(data, attr))
  669. return eap_aka_authentication_reject(data, id);
  670. if (attr->kdf[0] != EAP_AKA_PRIME_KDF)
  671. return eap_aka_prime_kdf_neg(data, id, attr);
  672. data->kdf = EAP_AKA_PRIME_KDF;
  673. wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
  674. }
  675. if (data->eap_method == EAP_TYPE_AKA && attr->bidding) {
  676. u16 flags = WPA_GET_BE16(attr->bidding);
  677. if ((flags & EAP_AKA_BIDDING_FLAG_D) &&
  678. eap_allowed_method(sm, EAP_VENDOR_IETF,
  679. EAP_TYPE_AKA_PRIME)) {
  680. wpa_printf(MSG_WARNING, "EAP-AKA: Bidding down from "
  681. "AKA' to AKA detected");
  682. /* Fail authentication as if AUTN had been incorrect */
  683. return eap_aka_authentication_reject(data, id);
  684. }
  685. }
  686. #endif /* EAP_AKA_PRIME */
  687. data->reauth = 0;
  688. if (!attr->mac || !attr->rand || !attr->autn) {
  689. wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message "
  690. "did not include%s%s%s",
  691. !attr->mac ? " AT_MAC" : "",
  692. !attr->rand ? " AT_RAND" : "",
  693. !attr->autn ? " AT_AUTN" : "");
  694. return eap_aka_client_error(data, id,
  695. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  696. }
  697. os_memcpy(data->rand, attr->rand, EAP_AKA_RAND_LEN);
  698. os_memcpy(data->autn, attr->autn, EAP_AKA_AUTN_LEN);
  699. res = eap_aka_umts_auth(sm, data);
  700. if (res == -1) {
  701. wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication "
  702. "failed (AUTN)");
  703. return eap_aka_authentication_reject(data, id);
  704. } else if (res == -2) {
  705. wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication "
  706. "failed (AUTN seq# -> AUTS)");
  707. return eap_aka_synchronization_failure(data, id);
  708. } else if (res) {
  709. wpa_printf(MSG_WARNING, "EAP-AKA: UMTS authentication failed");
  710. return eap_aka_client_error(data, id,
  711. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  712. }
  713. #ifdef EAP_AKA_PRIME
  714. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  715. /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
  716. * needed 6-octet SQN ^ AK for CK',IK' derivation */
  717. u16 amf = WPA_GET_BE16(data->autn + 6);
  718. if (!(amf & 0x8000)) {
  719. wpa_printf(MSG_WARNING, "EAP-AKA': AMF separation bit "
  720. "not set (AMF=0x%4x)", amf);
  721. return eap_aka_authentication_reject(data, id);
  722. }
  723. eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
  724. data->autn,
  725. data->network_name,
  726. data->network_name_len);
  727. }
  728. #endif /* EAP_AKA_PRIME */
  729. if (data->last_eap_identity) {
  730. identity = data->last_eap_identity;
  731. identity_len = data->last_eap_identity_len;
  732. } else if (data->pseudonym) {
  733. identity = data->pseudonym;
  734. identity_len = data->pseudonym_len;
  735. } else
  736. identity = eap_get_config_identity(sm, &identity_len);
  737. wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Selected identity for MK "
  738. "derivation", identity, identity_len);
  739. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  740. eap_aka_prime_derive_keys(identity, identity_len, data->ik,
  741. data->ck, data->k_encr, data->k_aut,
  742. data->k_re, data->msk, data->emsk);
  743. } else {
  744. eap_aka_derive_mk(identity, identity_len, data->ik, data->ck,
  745. data->mk);
  746. eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
  747. data->msk, data->emsk);
  748. }
  749. if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) {
  750. wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message "
  751. "used invalid AT_MAC");
  752. return eap_aka_client_error(data, id,
  753. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  754. }
  755. /* Old reauthentication and pseudonym identities must not be used
  756. * anymore. In other words, if no new identities are received, full
  757. * authentication will be used on next reauthentication. */
  758. eap_aka_clear_identities(data, CLEAR_PSEUDONYM | CLEAR_REAUTH_ID |
  759. CLEAR_EAP_ID);
  760. if (attr->encr_data) {
  761. u8 *decrypted;
  762. decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  763. attr->encr_data_len, attr->iv,
  764. &eattr, 0);
  765. if (decrypted == NULL) {
  766. return eap_aka_client_error(
  767. data, id, EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  768. }
  769. eap_aka_learn_ids(data, &eattr);
  770. os_free(decrypted);
  771. }
  772. if (data->result_ind && attr->result_ind)
  773. data->use_result_ind = 1;
  774. if (data->state != FAILURE && data->state != RESULT_FAILURE) {
  775. eap_aka_state(data, data->use_result_ind ?
  776. RESULT_SUCCESS : SUCCESS);
  777. }
  778. data->num_id_req = 0;
  779. data->num_notification = 0;
  780. /* RFC 4187 specifies that counter is initialized to one after
  781. * fullauth, but initializing it to zero makes it easier to implement
  782. * reauth verification. */
  783. data->counter = 0;
  784. return eap_aka_response_challenge(data, id);
  785. }
  786. static int eap_aka_process_notification_reauth(struct eap_aka_data *data,
  787. struct eap_sim_attrs *attr)
  788. {
  789. struct eap_sim_attrs eattr;
  790. u8 *decrypted;
  791. if (attr->encr_data == NULL || attr->iv == NULL) {
  792. wpa_printf(MSG_WARNING, "EAP-AKA: Notification message after "
  793. "reauth did not include encrypted data");
  794. return -1;
  795. }
  796. decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  797. attr->encr_data_len, attr->iv, &eattr,
  798. 0);
  799. if (decrypted == NULL) {
  800. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted "
  801. "data from notification message");
  802. return -1;
  803. }
  804. if (eattr.counter < 0 || (size_t) eattr.counter != data->counter) {
  805. wpa_printf(MSG_WARNING, "EAP-AKA: Counter in notification "
  806. "message does not match with counter in reauth "
  807. "message");
  808. os_free(decrypted);
  809. return -1;
  810. }
  811. os_free(decrypted);
  812. return 0;
  813. }
  814. static int eap_aka_process_notification_auth(struct eap_aka_data *data,
  815. const struct wpabuf *reqData,
  816. struct eap_sim_attrs *attr)
  817. {
  818. if (attr->mac == NULL) {
  819. wpa_printf(MSG_INFO, "EAP-AKA: no AT_MAC in after_auth "
  820. "Notification message");
  821. return -1;
  822. }
  823. if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) {
  824. wpa_printf(MSG_WARNING, "EAP-AKA: Notification message "
  825. "used invalid AT_MAC");
  826. return -1;
  827. }
  828. if (data->reauth &&
  829. eap_aka_process_notification_reauth(data, attr)) {
  830. wpa_printf(MSG_WARNING, "EAP-AKA: Invalid notification "
  831. "message after reauth");
  832. return -1;
  833. }
  834. return 0;
  835. }
  836. static struct wpabuf * eap_aka_process_notification(
  837. struct eap_sm *sm, struct eap_aka_data *data, u8 id,
  838. const struct wpabuf *reqData, struct eap_sim_attrs *attr)
  839. {
  840. wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Notification");
  841. if (data->num_notification > 0) {
  842. wpa_printf(MSG_INFO, "EAP-AKA: too many notification "
  843. "rounds (only one allowed)");
  844. return eap_aka_client_error(data, id,
  845. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  846. }
  847. data->num_notification++;
  848. if (attr->notification == -1) {
  849. wpa_printf(MSG_INFO, "EAP-AKA: no AT_NOTIFICATION in "
  850. "Notification message");
  851. return eap_aka_client_error(data, id,
  852. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  853. }
  854. if ((attr->notification & 0x4000) == 0 &&
  855. eap_aka_process_notification_auth(data, reqData, attr)) {
  856. return eap_aka_client_error(data, id,
  857. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  858. }
  859. eap_sim_report_notification(sm->msg_ctx, attr->notification, 1);
  860. if (attr->notification >= 0 && attr->notification < 32768) {
  861. eap_aka_state(data, FAILURE);
  862. } else if (attr->notification == EAP_SIM_SUCCESS &&
  863. data->state == RESULT_SUCCESS)
  864. eap_aka_state(data, SUCCESS);
  865. return eap_aka_response_notification(data, id, attr->notification);
  866. }
  867. static struct wpabuf * eap_aka_process_reauthentication(
  868. struct eap_sm *sm, struct eap_aka_data *data, u8 id,
  869. const struct wpabuf *reqData, struct eap_sim_attrs *attr)
  870. {
  871. struct eap_sim_attrs eattr;
  872. u8 *decrypted;
  873. wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Reauthentication");
  874. if (attr->checkcode &&
  875. eap_aka_verify_checkcode(data, attr->checkcode,
  876. attr->checkcode_len)) {
  877. wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the "
  878. "message");
  879. return eap_aka_client_error(data, id,
  880. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  881. }
  882. if (data->reauth_id == NULL) {
  883. wpa_printf(MSG_WARNING, "EAP-AKA: Server is trying "
  884. "reauthentication, but no reauth_id available");
  885. return eap_aka_client_error(data, id,
  886. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  887. }
  888. data->reauth = 1;
  889. if (eap_aka_verify_mac(data, reqData, attr->mac, (u8 *) "", 0)) {
  890. wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication "
  891. "did not have valid AT_MAC");
  892. return eap_aka_client_error(data, id,
  893. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  894. }
  895. if (attr->encr_data == NULL || attr->iv == NULL) {
  896. wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication "
  897. "message did not include encrypted data");
  898. return eap_aka_client_error(data, id,
  899. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  900. }
  901. decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  902. attr->encr_data_len, attr->iv, &eattr,
  903. 0);
  904. if (decrypted == NULL) {
  905. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted "
  906. "data from reauthentication message");
  907. return eap_aka_client_error(data, id,
  908. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  909. }
  910. if (eattr.nonce_s == NULL || eattr.counter < 0) {
  911. wpa_printf(MSG_INFO, "EAP-AKA: (encr) No%s%s in reauth packet",
  912. !eattr.nonce_s ? " AT_NONCE_S" : "",
  913. eattr.counter < 0 ? " AT_COUNTER" : "");
  914. os_free(decrypted);
  915. return eap_aka_client_error(data, id,
  916. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  917. }
  918. if (eattr.counter < 0 || (size_t) eattr.counter <= data->counter) {
  919. struct wpabuf *res;
  920. wpa_printf(MSG_INFO, "EAP-AKA: (encr) Invalid counter "
  921. "(%d <= %d)", eattr.counter, data->counter);
  922. data->counter_too_small = eattr.counter;
  923. /* Reply using Re-auth w/ AT_COUNTER_TOO_SMALL. The current
  924. * reauth_id must not be used to start a new reauthentication.
  925. * However, since it was used in the last EAP-Response-Identity
  926. * packet, it has to saved for the following fullauth to be
  927. * used in MK derivation. */
  928. os_free(data->last_eap_identity);
  929. data->last_eap_identity = data->reauth_id;
  930. data->last_eap_identity_len = data->reauth_id_len;
  931. data->reauth_id = NULL;
  932. data->reauth_id_len = 0;
  933. res = eap_aka_response_reauth(data, id, 1, eattr.nonce_s);
  934. os_free(decrypted);
  935. return res;
  936. }
  937. data->counter = eattr.counter;
  938. os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
  939. wpa_hexdump(MSG_DEBUG, "EAP-AKA: (encr) AT_NONCE_S",
  940. data->nonce_s, EAP_SIM_NONCE_S_LEN);
  941. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  942. eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
  943. data->reauth_id,
  944. data->reauth_id_len,
  945. data->nonce_s,
  946. data->msk, data->emsk);
  947. } else {
  948. eap_sim_derive_keys_reauth(data->counter, data->reauth_id,
  949. data->reauth_id_len,
  950. data->nonce_s, data->mk,
  951. data->msk, data->emsk);
  952. }
  953. eap_aka_clear_identities(data, CLEAR_REAUTH_ID | CLEAR_EAP_ID);
  954. eap_aka_learn_ids(data, &eattr);
  955. if (data->result_ind && attr->result_ind)
  956. data->use_result_ind = 1;
  957. if (data->state != FAILURE && data->state != RESULT_FAILURE) {
  958. eap_aka_state(data, data->use_result_ind ?
  959. RESULT_SUCCESS : SUCCESS);
  960. }
  961. data->num_id_req = 0;
  962. data->num_notification = 0;
  963. if (data->counter > EAP_AKA_MAX_FAST_REAUTHS) {
  964. wpa_printf(MSG_DEBUG, "EAP-AKA: Maximum number of "
  965. "fast reauths performed - force fullauth");
  966. eap_aka_clear_identities(data, CLEAR_REAUTH_ID | CLEAR_EAP_ID);
  967. }
  968. os_free(decrypted);
  969. return eap_aka_response_reauth(data, id, 0, data->nonce_s);
  970. }
  971. static struct wpabuf * eap_aka_process(struct eap_sm *sm, void *priv,
  972. struct eap_method_ret *ret,
  973. const struct wpabuf *reqData)
  974. {
  975. struct eap_aka_data *data = priv;
  976. const struct eap_hdr *req;
  977. u8 subtype, id;
  978. struct wpabuf *res;
  979. const u8 *pos;
  980. struct eap_sim_attrs attr;
  981. size_t len;
  982. wpa_hexdump_buf(MSG_DEBUG, "EAP-AKA: EAP data", reqData);
  983. if (eap_get_config_identity(sm, &len) == NULL) {
  984. wpa_printf(MSG_INFO, "EAP-AKA: Identity not configured");
  985. eap_sm_request_identity(sm);
  986. ret->ignore = TRUE;
  987. return NULL;
  988. }
  989. pos = eap_hdr_validate(EAP_VENDOR_IETF, data->eap_method, reqData,
  990. &len);
  991. if (pos == NULL || len < 1) {
  992. ret->ignore = TRUE;
  993. return NULL;
  994. }
  995. req = wpabuf_head(reqData);
  996. id = req->identifier;
  997. len = be_to_host16(req->length);
  998. ret->ignore = FALSE;
  999. ret->methodState = METHOD_MAY_CONT;
  1000. ret->decision = DECISION_FAIL;
  1001. ret->allowNotifications = TRUE;
  1002. subtype = *pos++;
  1003. wpa_printf(MSG_DEBUG, "EAP-AKA: Subtype=%d", subtype);
  1004. pos += 2; /* Reserved */
  1005. if (eap_sim_parse_attr(pos, wpabuf_head_u8(reqData) + len, &attr,
  1006. data->eap_method == EAP_TYPE_AKA_PRIME ? 2 : 1,
  1007. 0)) {
  1008. res = eap_aka_client_error(data, id,
  1009. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  1010. goto done;
  1011. }
  1012. switch (subtype) {
  1013. case EAP_AKA_SUBTYPE_IDENTITY:
  1014. res = eap_aka_process_identity(sm, data, id, reqData, &attr);
  1015. break;
  1016. case EAP_AKA_SUBTYPE_CHALLENGE:
  1017. res = eap_aka_process_challenge(sm, data, id, reqData, &attr);
  1018. break;
  1019. case EAP_AKA_SUBTYPE_NOTIFICATION:
  1020. res = eap_aka_process_notification(sm, data, id, reqData,
  1021. &attr);
  1022. break;
  1023. case EAP_AKA_SUBTYPE_REAUTHENTICATION:
  1024. res = eap_aka_process_reauthentication(sm, data, id, reqData,
  1025. &attr);
  1026. break;
  1027. case EAP_AKA_SUBTYPE_CLIENT_ERROR:
  1028. wpa_printf(MSG_DEBUG, "EAP-AKA: subtype Client-Error");
  1029. res = eap_aka_client_error(data, id,
  1030. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  1031. break;
  1032. default:
  1033. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown subtype=%d", subtype);
  1034. res = eap_aka_client_error(data, id,
  1035. EAP_AKA_UNABLE_TO_PROCESS_PACKET);
  1036. break;
  1037. }
  1038. done:
  1039. if (data->state == FAILURE) {
  1040. ret->decision = DECISION_FAIL;
  1041. ret->methodState = METHOD_DONE;
  1042. } else if (data->state == SUCCESS) {
  1043. ret->decision = data->use_result_ind ?
  1044. DECISION_UNCOND_SUCC : DECISION_COND_SUCC;
  1045. /*
  1046. * It is possible for the server to reply with AKA
  1047. * Notification, so we must allow the method to continue and
  1048. * not only accept EAP-Success at this point.
  1049. */
  1050. ret->methodState = data->use_result_ind ?
  1051. METHOD_DONE : METHOD_MAY_CONT;
  1052. } else if (data->state == RESULT_FAILURE)
  1053. ret->methodState = METHOD_CONT;
  1054. else if (data->state == RESULT_SUCCESS)
  1055. ret->methodState = METHOD_CONT;
  1056. if (ret->methodState == METHOD_DONE) {
  1057. ret->allowNotifications = FALSE;
  1058. }
  1059. return res;
  1060. }
  1061. static Boolean eap_aka_has_reauth_data(struct eap_sm *sm, void *priv)
  1062. {
  1063. struct eap_aka_data *data = priv;
  1064. return data->pseudonym || data->reauth_id;
  1065. }
  1066. static void eap_aka_deinit_for_reauth(struct eap_sm *sm, void *priv)
  1067. {
  1068. struct eap_aka_data *data = priv;
  1069. eap_aka_clear_identities(data, CLEAR_EAP_ID);
  1070. data->prev_id = -1;
  1071. wpabuf_free(data->id_msgs);
  1072. data->id_msgs = NULL;
  1073. data->use_result_ind = 0;
  1074. data->kdf_negotiation = 0;
  1075. }
  1076. static void * eap_aka_init_for_reauth(struct eap_sm *sm, void *priv)
  1077. {
  1078. struct eap_aka_data *data = priv;
  1079. data->num_id_req = 0;
  1080. data->num_notification = 0;
  1081. eap_aka_state(data, CONTINUE);
  1082. return priv;
  1083. }
  1084. static const u8 * eap_aka_get_identity(struct eap_sm *sm, void *priv,
  1085. size_t *len)
  1086. {
  1087. struct eap_aka_data *data = priv;
  1088. if (data->reauth_id) {
  1089. *len = data->reauth_id_len;
  1090. return data->reauth_id;
  1091. }
  1092. if (data->pseudonym) {
  1093. *len = data->pseudonym_len;
  1094. return data->pseudonym;
  1095. }
  1096. return NULL;
  1097. }
  1098. static Boolean eap_aka_isKeyAvailable(struct eap_sm *sm, void *priv)
  1099. {
  1100. struct eap_aka_data *data = priv;
  1101. return data->state == SUCCESS;
  1102. }
  1103. static u8 * eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len)
  1104. {
  1105. struct eap_aka_data *data = priv;
  1106. u8 *key;
  1107. if (data->state != SUCCESS)
  1108. return NULL;
  1109. key = os_malloc(EAP_SIM_KEYING_DATA_LEN);
  1110. if (key == NULL)
  1111. return NULL;
  1112. *len = EAP_SIM_KEYING_DATA_LEN;
  1113. os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
  1114. return key;
  1115. }
  1116. static u8 * eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
  1117. {
  1118. struct eap_aka_data *data = priv;
  1119. u8 *key;
  1120. if (data->state != SUCCESS)
  1121. return NULL;
  1122. key = os_malloc(EAP_EMSK_LEN);
  1123. if (key == NULL)
  1124. return NULL;
  1125. *len = EAP_EMSK_LEN;
  1126. os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  1127. return key;
  1128. }
  1129. int eap_peer_aka_register(void)
  1130. {
  1131. struct eap_method *eap;
  1132. int ret;
  1133. eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
  1134. EAP_VENDOR_IETF, EAP_TYPE_AKA, "AKA");
  1135. if (eap == NULL)
  1136. return -1;
  1137. eap->init = eap_aka_init;
  1138. eap->deinit = eap_aka_deinit;
  1139. eap->process = eap_aka_process;
  1140. eap->isKeyAvailable = eap_aka_isKeyAvailable;
  1141. eap->getKey = eap_aka_getKey;
  1142. eap->has_reauth_data = eap_aka_has_reauth_data;
  1143. eap->deinit_for_reauth = eap_aka_deinit_for_reauth;
  1144. eap->init_for_reauth = eap_aka_init_for_reauth;
  1145. eap->get_identity = eap_aka_get_identity;
  1146. eap->get_emsk = eap_aka_get_emsk;
  1147. ret = eap_peer_method_register(eap);
  1148. if (ret)
  1149. eap_peer_method_free(eap);
  1150. return ret;
  1151. }
  1152. #ifdef EAP_AKA_PRIME
  1153. int eap_peer_aka_prime_register(void)
  1154. {
  1155. struct eap_method *eap;
  1156. int ret;
  1157. eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
  1158. EAP_VENDOR_IETF, EAP_TYPE_AKA_PRIME,
  1159. "AKA'");
  1160. if (eap == NULL)
  1161. return -1;
  1162. eap->init = eap_aka_prime_init;
  1163. eap->deinit = eap_aka_deinit;
  1164. eap->process = eap_aka_process;
  1165. eap->isKeyAvailable = eap_aka_isKeyAvailable;
  1166. eap->getKey = eap_aka_getKey;
  1167. eap->has_reauth_data = eap_aka_has_reauth_data;
  1168. eap->deinit_for_reauth = eap_aka_deinit_for_reauth;
  1169. eap->init_for_reauth = eap_aka_init_for_reauth;
  1170. eap->get_identity = eap_aka_get_identity;
  1171. eap->get_emsk = eap_aka_get_emsk;
  1172. ret = eap_peer_method_register(eap);
  1173. if (ret)
  1174. eap_peer_method_free(eap);
  1175. return ret;
  1176. }
  1177. #endif /* EAP_AKA_PRIME */