ikev2.c 30 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241
  1. /*
  2. * IKEv2 responder (RFC 4306) for EAP-IKEV2
  3. * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/dh_groups.h"
  11. #include "crypto/random.h"
  12. #include "ikev2.h"
  13. void ikev2_responder_deinit(struct ikev2_responder_data *data)
  14. {
  15. ikev2_free_keys(&data->keys);
  16. wpabuf_free(data->i_dh_public);
  17. wpabuf_free(data->r_dh_private);
  18. os_free(data->IDi);
  19. os_free(data->IDr);
  20. os_free(data->shared_secret);
  21. wpabuf_free(data->i_sign_msg);
  22. wpabuf_free(data->r_sign_msg);
  23. os_free(data->key_pad);
  24. }
  25. static int ikev2_derive_keys(struct ikev2_responder_data *data)
  26. {
  27. u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN];
  28. size_t buf_len, pad_len;
  29. struct wpabuf *shared;
  30. const struct ikev2_integ_alg *integ;
  31. const struct ikev2_prf_alg *prf;
  32. const struct ikev2_encr_alg *encr;
  33. int ret;
  34. const u8 *addr[2];
  35. size_t len[2];
  36. /* RFC 4306, Sect. 2.14 */
  37. integ = ikev2_get_integ(data->proposal.integ);
  38. prf = ikev2_get_prf(data->proposal.prf);
  39. encr = ikev2_get_encr(data->proposal.encr);
  40. if (integ == NULL || prf == NULL || encr == NULL) {
  41. wpa_printf(MSG_INFO, "IKEV2: Unsupported proposal");
  42. return -1;
  43. }
  44. shared = dh_derive_shared(data->i_dh_public, data->r_dh_private,
  45. data->dh);
  46. if (shared == NULL)
  47. return -1;
  48. /* Construct Ni | Nr | SPIi | SPIr */
  49. buf_len = data->i_nonce_len + data->r_nonce_len + 2 * IKEV2_SPI_LEN;
  50. buf = os_malloc(buf_len);
  51. if (buf == NULL) {
  52. wpabuf_free(shared);
  53. return -1;
  54. }
  55. pos = buf;
  56. os_memcpy(pos, data->i_nonce, data->i_nonce_len);
  57. pos += data->i_nonce_len;
  58. os_memcpy(pos, data->r_nonce, data->r_nonce_len);
  59. pos += data->r_nonce_len;
  60. os_memcpy(pos, data->i_spi, IKEV2_SPI_LEN);
  61. pos += IKEV2_SPI_LEN;
  62. os_memcpy(pos, data->r_spi, IKEV2_SPI_LEN);
  63. /* SKEYSEED = prf(Ni | Nr, g^ir) */
  64. /* Use zero-padding per RFC 4306, Sect. 2.14 */
  65. pad_len = data->dh->prime_len - wpabuf_len(shared);
  66. pad = os_zalloc(pad_len ? pad_len : 1);
  67. if (pad == NULL) {
  68. wpabuf_free(shared);
  69. os_free(buf);
  70. return -1;
  71. }
  72. addr[0] = pad;
  73. len[0] = pad_len;
  74. addr[1] = wpabuf_head(shared);
  75. len[1] = wpabuf_len(shared);
  76. if (ikev2_prf_hash(prf->id, buf, data->i_nonce_len + data->r_nonce_len,
  77. 2, addr, len, skeyseed) < 0) {
  78. wpabuf_free(shared);
  79. os_free(buf);
  80. os_free(pad);
  81. return -1;
  82. }
  83. os_free(pad);
  84. wpabuf_free(shared);
  85. /* DH parameters are not needed anymore, so free them */
  86. wpabuf_free(data->i_dh_public);
  87. data->i_dh_public = NULL;
  88. wpabuf_free(data->r_dh_private);
  89. data->r_dh_private = NULL;
  90. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SKEYSEED",
  91. skeyseed, prf->hash_len);
  92. ret = ikev2_derive_sk_keys(prf, integ, encr, skeyseed, buf, buf_len,
  93. &data->keys);
  94. os_free(buf);
  95. return ret;
  96. }
  97. static int ikev2_parse_transform(struct ikev2_proposal_data *prop,
  98. const u8 *pos, const u8 *end)
  99. {
  100. int transform_len;
  101. const struct ikev2_transform *t;
  102. u16 transform_id;
  103. const u8 *tend;
  104. if (end - pos < (int) sizeof(*t)) {
  105. wpa_printf(MSG_INFO, "IKEV2: Too short transform");
  106. return -1;
  107. }
  108. t = (const struct ikev2_transform *) pos;
  109. transform_len = WPA_GET_BE16(t->transform_length);
  110. if (transform_len < (int) sizeof(*t) || pos + transform_len > end) {
  111. wpa_printf(MSG_INFO, "IKEV2: Invalid transform length %d",
  112. transform_len);
  113. return -1;
  114. }
  115. tend = pos + transform_len;
  116. transform_id = WPA_GET_BE16(t->transform_id);
  117. wpa_printf(MSG_DEBUG, "IKEV2: Transform:");
  118. wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Transform Length: %d "
  119. "Transform Type: %d Transform ID: %d",
  120. t->type, transform_len, t->transform_type, transform_id);
  121. if (t->type != 0 && t->type != 3) {
  122. wpa_printf(MSG_INFO, "IKEV2: Unexpected Transform type");
  123. return -1;
  124. }
  125. pos = (const u8 *) (t + 1);
  126. if (pos < tend) {
  127. wpa_hexdump(MSG_DEBUG, "IKEV2: Transform Attributes",
  128. pos, tend - pos);
  129. }
  130. switch (t->transform_type) {
  131. case IKEV2_TRANSFORM_ENCR:
  132. if (ikev2_get_encr(transform_id)) {
  133. if (transform_id == ENCR_AES_CBC) {
  134. if (tend - pos != 4) {
  135. wpa_printf(MSG_DEBUG, "IKEV2: No "
  136. "Transform Attr for AES");
  137. break;
  138. }
  139. if (WPA_GET_BE16(pos) != 0x800e) {
  140. wpa_printf(MSG_DEBUG, "IKEV2: Not a "
  141. "Key Size attribute for "
  142. "AES");
  143. break;
  144. }
  145. if (WPA_GET_BE16(pos + 2) != 128) {
  146. wpa_printf(MSG_DEBUG, "IKEV2: "
  147. "Unsupported AES key size "
  148. "%d bits",
  149. WPA_GET_BE16(pos + 2));
  150. break;
  151. }
  152. }
  153. prop->encr = transform_id;
  154. }
  155. break;
  156. case IKEV2_TRANSFORM_PRF:
  157. if (ikev2_get_prf(transform_id))
  158. prop->prf = transform_id;
  159. break;
  160. case IKEV2_TRANSFORM_INTEG:
  161. if (ikev2_get_integ(transform_id))
  162. prop->integ = transform_id;
  163. break;
  164. case IKEV2_TRANSFORM_DH:
  165. if (dh_groups_get(transform_id))
  166. prop->dh = transform_id;
  167. break;
  168. }
  169. return transform_len;
  170. }
  171. static int ikev2_parse_proposal(struct ikev2_proposal_data *prop,
  172. const u8 *pos, const u8 *end)
  173. {
  174. const u8 *pend, *ppos;
  175. int proposal_len, i;
  176. const struct ikev2_proposal *p;
  177. if (end - pos < (int) sizeof(*p)) {
  178. wpa_printf(MSG_INFO, "IKEV2: Too short proposal");
  179. return -1;
  180. }
  181. /* FIX: AND processing if multiple proposals use the same # */
  182. p = (const struct ikev2_proposal *) pos;
  183. proposal_len = WPA_GET_BE16(p->proposal_length);
  184. if (proposal_len < (int) sizeof(*p) || pos + proposal_len > end) {
  185. wpa_printf(MSG_INFO, "IKEV2: Invalid proposal length %d",
  186. proposal_len);
  187. return -1;
  188. }
  189. wpa_printf(MSG_DEBUG, "IKEV2: SAi1 Proposal # %d",
  190. p->proposal_num);
  191. wpa_printf(MSG_DEBUG, "IKEV2: Type: %d Proposal Length: %d "
  192. " Protocol ID: %d",
  193. p->type, proposal_len, p->protocol_id);
  194. wpa_printf(MSG_DEBUG, "IKEV2: SPI Size: %d Transforms: %d",
  195. p->spi_size, p->num_transforms);
  196. if (p->type != 0 && p->type != 2) {
  197. wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal type");
  198. return -1;
  199. }
  200. if (p->protocol_id != IKEV2_PROTOCOL_IKE) {
  201. wpa_printf(MSG_DEBUG, "IKEV2: Unexpected Protocol ID "
  202. "(only IKE allowed for EAP-IKEv2)");
  203. return -1;
  204. }
  205. if (p->proposal_num != prop->proposal_num) {
  206. if (p->proposal_num == prop->proposal_num + 1)
  207. prop->proposal_num = p->proposal_num;
  208. else {
  209. wpa_printf(MSG_INFO, "IKEV2: Unexpected Proposal #");
  210. return -1;
  211. }
  212. }
  213. ppos = (const u8 *) (p + 1);
  214. pend = pos + proposal_len;
  215. if (ppos + p->spi_size > pend) {
  216. wpa_printf(MSG_INFO, "IKEV2: Not enough room for SPI "
  217. "in proposal");
  218. return -1;
  219. }
  220. if (p->spi_size) {
  221. wpa_hexdump(MSG_DEBUG, "IKEV2: SPI",
  222. ppos, p->spi_size);
  223. ppos += p->spi_size;
  224. }
  225. /*
  226. * For initial IKE_SA negotiation, SPI Size MUST be zero; for
  227. * subsequent negotiations, it must be 8 for IKE. We only support
  228. * initial case for now.
  229. */
  230. if (p->spi_size != 0) {
  231. wpa_printf(MSG_INFO, "IKEV2: Unexpected SPI Size");
  232. return -1;
  233. }
  234. if (p->num_transforms == 0) {
  235. wpa_printf(MSG_INFO, "IKEV2: At least one transform required");
  236. return -1;
  237. }
  238. for (i = 0; i < (int) p->num_transforms; i++) {
  239. int tlen = ikev2_parse_transform(prop, ppos, pend);
  240. if (tlen < 0)
  241. return -1;
  242. ppos += tlen;
  243. }
  244. if (ppos != pend) {
  245. wpa_printf(MSG_INFO, "IKEV2: Unexpected data after "
  246. "transforms");
  247. return -1;
  248. }
  249. return proposal_len;
  250. }
  251. static int ikev2_process_sai1(struct ikev2_responder_data *data,
  252. const u8 *sai1, size_t sai1_len)
  253. {
  254. struct ikev2_proposal_data prop;
  255. const u8 *pos, *end;
  256. int found = 0;
  257. /* Security Association Payloads: <Proposals> */
  258. if (sai1 == NULL) {
  259. wpa_printf(MSG_INFO, "IKEV2: SAi1 not received");
  260. return -1;
  261. }
  262. os_memset(&prop, 0, sizeof(prop));
  263. prop.proposal_num = 1;
  264. pos = sai1;
  265. end = sai1 + sai1_len;
  266. while (pos < end) {
  267. int plen;
  268. prop.integ = -1;
  269. prop.prf = -1;
  270. prop.encr = -1;
  271. prop.dh = -1;
  272. plen = ikev2_parse_proposal(&prop, pos, end);
  273. if (plen < 0)
  274. return -1;
  275. if (!found && prop.integ != -1 && prop.prf != -1 &&
  276. prop.encr != -1 && prop.dh != -1) {
  277. os_memcpy(&data->proposal, &prop, sizeof(prop));
  278. data->dh = dh_groups_get(prop.dh);
  279. found = 1;
  280. }
  281. pos += plen;
  282. }
  283. if (pos != end) {
  284. wpa_printf(MSG_INFO, "IKEV2: Unexpected data after proposals");
  285. return -1;
  286. }
  287. if (!found) {
  288. wpa_printf(MSG_INFO, "IKEV2: No acceptable proposal found");
  289. return -1;
  290. }
  291. wpa_printf(MSG_DEBUG, "IKEV2: Accepted proposal #%d: ENCR:%d PRF:%d "
  292. "INTEG:%d D-H:%d", data->proposal.proposal_num,
  293. data->proposal.encr, data->proposal.prf,
  294. data->proposal.integ, data->proposal.dh);
  295. return 0;
  296. }
  297. static int ikev2_process_kei(struct ikev2_responder_data *data,
  298. const u8 *kei, size_t kei_len)
  299. {
  300. u16 group;
  301. /*
  302. * Key Exchange Payload:
  303. * DH Group # (16 bits)
  304. * RESERVED (16 bits)
  305. * Key Exchange Data (Diffie-Hellman public value)
  306. */
  307. if (kei == NULL) {
  308. wpa_printf(MSG_INFO, "IKEV2: KEi not received");
  309. return -1;
  310. }
  311. if (kei_len < 4 + 96) {
  312. wpa_printf(MSG_INFO, "IKEV2: Too show Key Exchange Payload");
  313. return -1;
  314. }
  315. group = WPA_GET_BE16(kei);
  316. wpa_printf(MSG_DEBUG, "IKEV2: KEi DH Group #%u", group);
  317. if (group != data->proposal.dh) {
  318. wpa_printf(MSG_DEBUG, "IKEV2: KEi DH Group #%u does not match "
  319. "with the selected proposal (%u)",
  320. group, data->proposal.dh);
  321. /* Reject message with Notify payload of type
  322. * INVALID_KE_PAYLOAD (RFC 4306, Sect. 3.4) */
  323. data->error_type = INVALID_KE_PAYLOAD;
  324. data->state = NOTIFY;
  325. return -1;
  326. }
  327. if (data->dh == NULL) {
  328. wpa_printf(MSG_INFO, "IKEV2: Unsupported DH group");
  329. return -1;
  330. }
  331. /* RFC 4306, Section 3.4:
  332. * The length of DH public value MUST be equal to the length of the
  333. * prime modulus.
  334. */
  335. if (kei_len - 4 != data->dh->prime_len) {
  336. wpa_printf(MSG_INFO, "IKEV2: Invalid DH public value length "
  337. "%ld (expected %ld)",
  338. (long) (kei_len - 4), (long) data->dh->prime_len);
  339. return -1;
  340. }
  341. wpabuf_free(data->i_dh_public);
  342. data->i_dh_public = wpabuf_alloc(kei_len - 4);
  343. if (data->i_dh_public == NULL)
  344. return -1;
  345. wpabuf_put_data(data->i_dh_public, kei + 4, kei_len - 4);
  346. wpa_hexdump_buf(MSG_DEBUG, "IKEV2: KEi Diffie-Hellman Public Value",
  347. data->i_dh_public);
  348. return 0;
  349. }
  350. static int ikev2_process_ni(struct ikev2_responder_data *data,
  351. const u8 *ni, size_t ni_len)
  352. {
  353. if (ni == NULL) {
  354. wpa_printf(MSG_INFO, "IKEV2: Ni not received");
  355. return -1;
  356. }
  357. if (ni_len < IKEV2_NONCE_MIN_LEN || ni_len > IKEV2_NONCE_MAX_LEN) {
  358. wpa_printf(MSG_INFO, "IKEV2: Invalid Ni length %ld",
  359. (long) ni_len);
  360. return -1;
  361. }
  362. data->i_nonce_len = ni_len;
  363. os_memcpy(data->i_nonce, ni, ni_len);
  364. wpa_hexdump(MSG_MSGDUMP, "IKEV2: Ni",
  365. data->i_nonce, data->i_nonce_len);
  366. return 0;
  367. }
  368. static int ikev2_process_sa_init(struct ikev2_responder_data *data,
  369. const struct ikev2_hdr *hdr,
  370. struct ikev2_payloads *pl)
  371. {
  372. if (ikev2_process_sai1(data, pl->sa, pl->sa_len) < 0 ||
  373. ikev2_process_kei(data, pl->ke, pl->ke_len) < 0 ||
  374. ikev2_process_ni(data, pl->nonce, pl->nonce_len) < 0)
  375. return -1;
  376. os_memcpy(data->i_spi, hdr->i_spi, IKEV2_SPI_LEN);
  377. return 0;
  378. }
  379. static int ikev2_process_idi(struct ikev2_responder_data *data,
  380. const u8 *idi, size_t idi_len)
  381. {
  382. u8 id_type;
  383. if (idi == NULL) {
  384. wpa_printf(MSG_INFO, "IKEV2: No IDi received");
  385. return -1;
  386. }
  387. if (idi_len < 4) {
  388. wpa_printf(MSG_INFO, "IKEV2: Too short IDi payload");
  389. return -1;
  390. }
  391. id_type = idi[0];
  392. idi += 4;
  393. idi_len -= 4;
  394. wpa_printf(MSG_DEBUG, "IKEV2: IDi ID Type %d", id_type);
  395. wpa_hexdump_ascii(MSG_DEBUG, "IKEV2: IDi", idi, idi_len);
  396. os_free(data->IDi);
  397. data->IDi = os_malloc(idi_len);
  398. if (data->IDi == NULL)
  399. return -1;
  400. os_memcpy(data->IDi, idi, idi_len);
  401. data->IDi_len = idi_len;
  402. data->IDi_type = id_type;
  403. return 0;
  404. }
  405. static int ikev2_process_cert(struct ikev2_responder_data *data,
  406. const u8 *cert, size_t cert_len)
  407. {
  408. u8 cert_encoding;
  409. if (cert == NULL) {
  410. if (data->peer_auth == PEER_AUTH_CERT) {
  411. wpa_printf(MSG_INFO, "IKEV2: No Certificate received");
  412. return -1;
  413. }
  414. return 0;
  415. }
  416. if (cert_len < 1) {
  417. wpa_printf(MSG_INFO, "IKEV2: No Cert Encoding field");
  418. return -1;
  419. }
  420. cert_encoding = cert[0];
  421. cert++;
  422. cert_len--;
  423. wpa_printf(MSG_DEBUG, "IKEV2: Cert Encoding %d", cert_encoding);
  424. wpa_hexdump(MSG_MSGDUMP, "IKEV2: Certificate Data", cert, cert_len);
  425. /* TODO: validate certificate */
  426. return 0;
  427. }
  428. static int ikev2_process_auth_cert(struct ikev2_responder_data *data,
  429. u8 method, const u8 *auth, size_t auth_len)
  430. {
  431. if (method != AUTH_RSA_SIGN) {
  432. wpa_printf(MSG_INFO, "IKEV2: Unsupported authentication "
  433. "method %d", method);
  434. return -1;
  435. }
  436. /* TODO: validate AUTH */
  437. return 0;
  438. }
  439. static int ikev2_process_auth_secret(struct ikev2_responder_data *data,
  440. u8 method, const u8 *auth,
  441. size_t auth_len)
  442. {
  443. u8 auth_data[IKEV2_MAX_HASH_LEN];
  444. const struct ikev2_prf_alg *prf;
  445. if (method != AUTH_SHARED_KEY_MIC) {
  446. wpa_printf(MSG_INFO, "IKEV2: Unsupported authentication "
  447. "method %d", method);
  448. return -1;
  449. }
  450. /* msg | Nr | prf(SK_pi,IDi') */
  451. if (ikev2_derive_auth_data(data->proposal.prf, data->i_sign_msg,
  452. data->IDi, data->IDi_len, data->IDi_type,
  453. &data->keys, 1, data->shared_secret,
  454. data->shared_secret_len,
  455. data->r_nonce, data->r_nonce_len,
  456. data->key_pad, data->key_pad_len,
  457. auth_data) < 0) {
  458. wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
  459. return -1;
  460. }
  461. wpabuf_free(data->i_sign_msg);
  462. data->i_sign_msg = NULL;
  463. prf = ikev2_get_prf(data->proposal.prf);
  464. if (prf == NULL)
  465. return -1;
  466. if (auth_len != prf->hash_len ||
  467. os_memcmp_const(auth, auth_data, auth_len) != 0) {
  468. wpa_printf(MSG_INFO, "IKEV2: Invalid Authentication Data");
  469. wpa_hexdump(MSG_DEBUG, "IKEV2: Received Authentication Data",
  470. auth, auth_len);
  471. wpa_hexdump(MSG_DEBUG, "IKEV2: Expected Authentication Data",
  472. auth_data, prf->hash_len);
  473. data->error_type = AUTHENTICATION_FAILED;
  474. data->state = NOTIFY;
  475. return -1;
  476. }
  477. wpa_printf(MSG_DEBUG, "IKEV2: Server authenticated successfully "
  478. "using shared keys");
  479. return 0;
  480. }
  481. static int ikev2_process_auth(struct ikev2_responder_data *data,
  482. const u8 *auth, size_t auth_len)
  483. {
  484. u8 auth_method;
  485. if (auth == NULL) {
  486. wpa_printf(MSG_INFO, "IKEV2: No Authentication Payload");
  487. return -1;
  488. }
  489. if (auth_len < 4) {
  490. wpa_printf(MSG_INFO, "IKEV2: Too short Authentication "
  491. "Payload");
  492. return -1;
  493. }
  494. auth_method = auth[0];
  495. auth += 4;
  496. auth_len -= 4;
  497. wpa_printf(MSG_DEBUG, "IKEV2: Auth Method %d", auth_method);
  498. wpa_hexdump(MSG_MSGDUMP, "IKEV2: Authentication Data", auth, auth_len);
  499. switch (data->peer_auth) {
  500. case PEER_AUTH_CERT:
  501. return ikev2_process_auth_cert(data, auth_method, auth,
  502. auth_len);
  503. case PEER_AUTH_SECRET:
  504. return ikev2_process_auth_secret(data, auth_method, auth,
  505. auth_len);
  506. }
  507. return -1;
  508. }
  509. static int ikev2_process_sa_auth_decrypted(struct ikev2_responder_data *data,
  510. u8 next_payload,
  511. u8 *payload, size_t payload_len)
  512. {
  513. struct ikev2_payloads pl;
  514. wpa_printf(MSG_DEBUG, "IKEV2: Processing decrypted payloads");
  515. if (ikev2_parse_payloads(&pl, next_payload, payload, payload +
  516. payload_len) < 0) {
  517. wpa_printf(MSG_INFO, "IKEV2: Failed to parse decrypted "
  518. "payloads");
  519. return -1;
  520. }
  521. if (ikev2_process_idi(data, pl.idi, pl.idi_len) < 0 ||
  522. ikev2_process_cert(data, pl.cert, pl.cert_len) < 0 ||
  523. ikev2_process_auth(data, pl.auth, pl.auth_len) < 0)
  524. return -1;
  525. return 0;
  526. }
  527. static int ikev2_process_sa_auth(struct ikev2_responder_data *data,
  528. const struct ikev2_hdr *hdr,
  529. struct ikev2_payloads *pl)
  530. {
  531. u8 *decrypted;
  532. size_t decrypted_len;
  533. int ret;
  534. decrypted = ikev2_decrypt_payload(data->proposal.encr,
  535. data->proposal.integ,
  536. &data->keys, 1, hdr, pl->encrypted,
  537. pl->encrypted_len, &decrypted_len);
  538. if (decrypted == NULL)
  539. return -1;
  540. ret = ikev2_process_sa_auth_decrypted(data, pl->encr_next_payload,
  541. decrypted, decrypted_len);
  542. os_free(decrypted);
  543. return ret;
  544. }
  545. static int ikev2_validate_rx_state(struct ikev2_responder_data *data,
  546. u8 exchange_type, u32 message_id)
  547. {
  548. switch (data->state) {
  549. case SA_INIT:
  550. /* Expect to receive IKE_SA_INIT: HDR, SAi1, KEi, Ni */
  551. if (exchange_type != IKE_SA_INIT) {
  552. wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type "
  553. "%u in SA_INIT state", exchange_type);
  554. return -1;
  555. }
  556. if (message_id != 0) {
  557. wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u "
  558. "in SA_INIT state", message_id);
  559. return -1;
  560. }
  561. break;
  562. case SA_AUTH:
  563. /* Expect to receive IKE_SA_AUTH:
  564. * HDR, SK {IDi, [CERT,] [CERTREQ,] [IDr,]
  565. * AUTH, SAi2, TSi, TSr}
  566. */
  567. if (exchange_type != IKE_SA_AUTH) {
  568. wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type "
  569. "%u in SA_AUTH state", exchange_type);
  570. return -1;
  571. }
  572. if (message_id != 1) {
  573. wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u "
  574. "in SA_AUTH state", message_id);
  575. return -1;
  576. }
  577. break;
  578. case CHILD_SA:
  579. if (exchange_type != CREATE_CHILD_SA) {
  580. wpa_printf(MSG_INFO, "IKEV2: Unexpected Exchange Type "
  581. "%u in CHILD_SA state", exchange_type);
  582. return -1;
  583. }
  584. if (message_id != 2) {
  585. wpa_printf(MSG_INFO, "IKEV2: Unexpected Message ID %u "
  586. "in CHILD_SA state", message_id);
  587. return -1;
  588. }
  589. break;
  590. case NOTIFY:
  591. case IKEV2_DONE:
  592. case IKEV2_FAILED:
  593. return -1;
  594. }
  595. return 0;
  596. }
  597. int ikev2_responder_process(struct ikev2_responder_data *data,
  598. const struct wpabuf *buf)
  599. {
  600. const struct ikev2_hdr *hdr;
  601. u32 length, message_id;
  602. const u8 *pos, *end;
  603. struct ikev2_payloads pl;
  604. wpa_printf(MSG_MSGDUMP, "IKEV2: Received message (len %lu)",
  605. (unsigned long) wpabuf_len(buf));
  606. if (wpabuf_len(buf) < sizeof(*hdr)) {
  607. wpa_printf(MSG_INFO, "IKEV2: Too short frame to include HDR");
  608. return -1;
  609. }
  610. data->error_type = 0;
  611. hdr = (const struct ikev2_hdr *) wpabuf_head(buf);
  612. end = wpabuf_head_u8(buf) + wpabuf_len(buf);
  613. message_id = WPA_GET_BE32(hdr->message_id);
  614. length = WPA_GET_BE32(hdr->length);
  615. wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Initiator's SPI",
  616. hdr->i_spi, IKEV2_SPI_LEN);
  617. wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI",
  618. hdr->r_spi, IKEV2_SPI_LEN);
  619. wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Version: 0x%x "
  620. "Exchange Type: %u",
  621. hdr->next_payload, hdr->version, hdr->exchange_type);
  622. wpa_printf(MSG_DEBUG, "IKEV2: Message ID: %u Length: %u",
  623. message_id, length);
  624. if (hdr->version != IKEV2_VERSION) {
  625. wpa_printf(MSG_INFO, "IKEV2: Unsupported HDR version 0x%x "
  626. "(expected 0x%x)", hdr->version, IKEV2_VERSION);
  627. return -1;
  628. }
  629. if (length != wpabuf_len(buf)) {
  630. wpa_printf(MSG_INFO, "IKEV2: Invalid length (HDR: %lu != "
  631. "RX: %lu)", (unsigned long) length,
  632. (unsigned long) wpabuf_len(buf));
  633. return -1;
  634. }
  635. if (ikev2_validate_rx_state(data, hdr->exchange_type, message_id) < 0)
  636. return -1;
  637. if ((hdr->flags & (IKEV2_HDR_INITIATOR | IKEV2_HDR_RESPONSE)) !=
  638. IKEV2_HDR_INITIATOR) {
  639. wpa_printf(MSG_INFO, "IKEV2: Unexpected Flags value 0x%x",
  640. hdr->flags);
  641. return -1;
  642. }
  643. if (data->state != SA_INIT) {
  644. if (os_memcmp(data->i_spi, hdr->i_spi, IKEV2_SPI_LEN) != 0) {
  645. wpa_printf(MSG_INFO, "IKEV2: Unexpected IKE_SA "
  646. "Initiator's SPI");
  647. return -1;
  648. }
  649. if (os_memcmp(data->r_spi, hdr->r_spi, IKEV2_SPI_LEN) != 0) {
  650. wpa_printf(MSG_INFO, "IKEV2: Unexpected IKE_SA "
  651. "Responder's SPI");
  652. return -1;
  653. }
  654. }
  655. pos = (const u8 *) (hdr + 1);
  656. if (ikev2_parse_payloads(&pl, hdr->next_payload, pos, end) < 0)
  657. return -1;
  658. if (data->state == SA_INIT) {
  659. data->last_msg = LAST_MSG_SA_INIT;
  660. if (ikev2_process_sa_init(data, hdr, &pl) < 0) {
  661. if (data->state == NOTIFY)
  662. return 0;
  663. return -1;
  664. }
  665. wpabuf_free(data->i_sign_msg);
  666. data->i_sign_msg = wpabuf_dup(buf);
  667. }
  668. if (data->state == SA_AUTH) {
  669. data->last_msg = LAST_MSG_SA_AUTH;
  670. if (ikev2_process_sa_auth(data, hdr, &pl) < 0) {
  671. if (data->state == NOTIFY)
  672. return 0;
  673. return -1;
  674. }
  675. }
  676. return 0;
  677. }
  678. static void ikev2_build_hdr(struct ikev2_responder_data *data,
  679. struct wpabuf *msg, u8 exchange_type,
  680. u8 next_payload, u32 message_id)
  681. {
  682. struct ikev2_hdr *hdr;
  683. wpa_printf(MSG_DEBUG, "IKEV2: Adding HDR");
  684. /* HDR - RFC 4306, Sect. 3.1 */
  685. hdr = wpabuf_put(msg, sizeof(*hdr));
  686. os_memcpy(hdr->i_spi, data->i_spi, IKEV2_SPI_LEN);
  687. os_memcpy(hdr->r_spi, data->r_spi, IKEV2_SPI_LEN);
  688. hdr->next_payload = next_payload;
  689. hdr->version = IKEV2_VERSION;
  690. hdr->exchange_type = exchange_type;
  691. hdr->flags = IKEV2_HDR_RESPONSE;
  692. WPA_PUT_BE32(hdr->message_id, message_id);
  693. }
  694. static int ikev2_build_sar1(struct ikev2_responder_data *data,
  695. struct wpabuf *msg, u8 next_payload)
  696. {
  697. struct ikev2_payload_hdr *phdr;
  698. size_t plen;
  699. struct ikev2_proposal *p;
  700. struct ikev2_transform *t;
  701. wpa_printf(MSG_DEBUG, "IKEV2: Adding SAr1 payload");
  702. /* SAr1 - RFC 4306, Sect. 2.7 and 3.3 */
  703. phdr = wpabuf_put(msg, sizeof(*phdr));
  704. phdr->next_payload = next_payload;
  705. phdr->flags = 0;
  706. p = wpabuf_put(msg, sizeof(*p));
  707. p->proposal_num = data->proposal.proposal_num;
  708. p->protocol_id = IKEV2_PROTOCOL_IKE;
  709. p->num_transforms = 4;
  710. t = wpabuf_put(msg, sizeof(*t));
  711. t->type = 3;
  712. t->transform_type = IKEV2_TRANSFORM_ENCR;
  713. WPA_PUT_BE16(t->transform_id, data->proposal.encr);
  714. if (data->proposal.encr == ENCR_AES_CBC) {
  715. /* Transform Attribute: Key Len = 128 bits */
  716. wpabuf_put_be16(msg, 0x800e); /* AF=1, AttrType=14 */
  717. wpabuf_put_be16(msg, 128); /* 128-bit key */
  718. }
  719. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) t;
  720. WPA_PUT_BE16(t->transform_length, plen);
  721. t = wpabuf_put(msg, sizeof(*t));
  722. t->type = 3;
  723. WPA_PUT_BE16(t->transform_length, sizeof(*t));
  724. t->transform_type = IKEV2_TRANSFORM_PRF;
  725. WPA_PUT_BE16(t->transform_id, data->proposal.prf);
  726. t = wpabuf_put(msg, sizeof(*t));
  727. t->type = 3;
  728. WPA_PUT_BE16(t->transform_length, sizeof(*t));
  729. t->transform_type = IKEV2_TRANSFORM_INTEG;
  730. WPA_PUT_BE16(t->transform_id, data->proposal.integ);
  731. t = wpabuf_put(msg, sizeof(*t));
  732. WPA_PUT_BE16(t->transform_length, sizeof(*t));
  733. t->transform_type = IKEV2_TRANSFORM_DH;
  734. WPA_PUT_BE16(t->transform_id, data->proposal.dh);
  735. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) p;
  736. WPA_PUT_BE16(p->proposal_length, plen);
  737. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  738. WPA_PUT_BE16(phdr->payload_length, plen);
  739. return 0;
  740. }
  741. static int ikev2_build_ker(struct ikev2_responder_data *data,
  742. struct wpabuf *msg, u8 next_payload)
  743. {
  744. struct ikev2_payload_hdr *phdr;
  745. size_t plen;
  746. struct wpabuf *pv;
  747. wpa_printf(MSG_DEBUG, "IKEV2: Adding KEr payload");
  748. pv = dh_init(data->dh, &data->r_dh_private);
  749. if (pv == NULL) {
  750. wpa_printf(MSG_DEBUG, "IKEV2: Failed to initialize DH");
  751. return -1;
  752. }
  753. /* KEr - RFC 4306, Sect. 3.4 */
  754. phdr = wpabuf_put(msg, sizeof(*phdr));
  755. phdr->next_payload = next_payload;
  756. phdr->flags = 0;
  757. wpabuf_put_be16(msg, data->proposal.dh); /* DH Group # */
  758. wpabuf_put(msg, 2); /* RESERVED */
  759. /*
  760. * RFC 4306, Sect. 3.4: possible zero padding for public value to
  761. * match the length of the prime.
  762. */
  763. wpabuf_put(msg, data->dh->prime_len - wpabuf_len(pv));
  764. wpabuf_put_buf(msg, pv);
  765. wpabuf_free(pv);
  766. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  767. WPA_PUT_BE16(phdr->payload_length, plen);
  768. return 0;
  769. }
  770. static int ikev2_build_nr(struct ikev2_responder_data *data,
  771. struct wpabuf *msg, u8 next_payload)
  772. {
  773. struct ikev2_payload_hdr *phdr;
  774. size_t plen;
  775. wpa_printf(MSG_DEBUG, "IKEV2: Adding Nr payload");
  776. /* Nr - RFC 4306, Sect. 3.9 */
  777. phdr = wpabuf_put(msg, sizeof(*phdr));
  778. phdr->next_payload = next_payload;
  779. phdr->flags = 0;
  780. wpabuf_put_data(msg, data->r_nonce, data->r_nonce_len);
  781. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  782. WPA_PUT_BE16(phdr->payload_length, plen);
  783. return 0;
  784. }
  785. static int ikev2_build_idr(struct ikev2_responder_data *data,
  786. struct wpabuf *msg, u8 next_payload)
  787. {
  788. struct ikev2_payload_hdr *phdr;
  789. size_t plen;
  790. wpa_printf(MSG_DEBUG, "IKEV2: Adding IDr payload");
  791. if (data->IDr == NULL) {
  792. wpa_printf(MSG_INFO, "IKEV2: No IDr available");
  793. return -1;
  794. }
  795. /* IDr - RFC 4306, Sect. 3.5 */
  796. phdr = wpabuf_put(msg, sizeof(*phdr));
  797. phdr->next_payload = next_payload;
  798. phdr->flags = 0;
  799. wpabuf_put_u8(msg, ID_KEY_ID);
  800. wpabuf_put(msg, 3); /* RESERVED */
  801. wpabuf_put_data(msg, data->IDr, data->IDr_len);
  802. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  803. WPA_PUT_BE16(phdr->payload_length, plen);
  804. return 0;
  805. }
  806. static int ikev2_build_auth(struct ikev2_responder_data *data,
  807. struct wpabuf *msg, u8 next_payload)
  808. {
  809. struct ikev2_payload_hdr *phdr;
  810. size_t plen;
  811. const struct ikev2_prf_alg *prf;
  812. wpa_printf(MSG_DEBUG, "IKEV2: Adding AUTH payload");
  813. prf = ikev2_get_prf(data->proposal.prf);
  814. if (prf == NULL)
  815. return -1;
  816. /* Authentication - RFC 4306, Sect. 3.8 */
  817. phdr = wpabuf_put(msg, sizeof(*phdr));
  818. phdr->next_payload = next_payload;
  819. phdr->flags = 0;
  820. wpabuf_put_u8(msg, AUTH_SHARED_KEY_MIC);
  821. wpabuf_put(msg, 3); /* RESERVED */
  822. /* msg | Ni | prf(SK_pr,IDr') */
  823. if (ikev2_derive_auth_data(data->proposal.prf, data->r_sign_msg,
  824. data->IDr, data->IDr_len, ID_KEY_ID,
  825. &data->keys, 0, data->shared_secret,
  826. data->shared_secret_len,
  827. data->i_nonce, data->i_nonce_len,
  828. data->key_pad, data->key_pad_len,
  829. wpabuf_put(msg, prf->hash_len)) < 0) {
  830. wpa_printf(MSG_INFO, "IKEV2: Could not derive AUTH data");
  831. return -1;
  832. }
  833. wpabuf_free(data->r_sign_msg);
  834. data->r_sign_msg = NULL;
  835. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  836. WPA_PUT_BE16(phdr->payload_length, plen);
  837. return 0;
  838. }
  839. static int ikev2_build_notification(struct ikev2_responder_data *data,
  840. struct wpabuf *msg, u8 next_payload)
  841. {
  842. struct ikev2_payload_hdr *phdr;
  843. size_t plen;
  844. wpa_printf(MSG_DEBUG, "IKEV2: Adding Notification payload");
  845. if (data->error_type == 0) {
  846. wpa_printf(MSG_INFO, "IKEV2: No Notify Message Type "
  847. "available");
  848. return -1;
  849. }
  850. /* Notify - RFC 4306, Sect. 3.10 */
  851. phdr = wpabuf_put(msg, sizeof(*phdr));
  852. phdr->next_payload = next_payload;
  853. phdr->flags = 0;
  854. wpabuf_put_u8(msg, 0); /* Protocol ID: no existing SA */
  855. wpabuf_put_u8(msg, 0); /* SPI Size */
  856. wpabuf_put_be16(msg, data->error_type);
  857. switch (data->error_type) {
  858. case INVALID_KE_PAYLOAD:
  859. if (data->proposal.dh == -1) {
  860. wpa_printf(MSG_INFO, "IKEV2: No DH Group selected for "
  861. "INVALID_KE_PAYLOAD notifications");
  862. return -1;
  863. }
  864. wpabuf_put_be16(msg, data->proposal.dh);
  865. wpa_printf(MSG_DEBUG, "IKEV2: INVALID_KE_PAYLOAD - request "
  866. "DH Group #%d", data->proposal.dh);
  867. break;
  868. case AUTHENTICATION_FAILED:
  869. /* no associated data */
  870. break;
  871. default:
  872. wpa_printf(MSG_INFO, "IKEV2: Unsupported Notify Message Type "
  873. "%d", data->error_type);
  874. return -1;
  875. }
  876. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  877. WPA_PUT_BE16(phdr->payload_length, plen);
  878. return 0;
  879. }
  880. static struct wpabuf * ikev2_build_sa_init(struct ikev2_responder_data *data)
  881. {
  882. struct wpabuf *msg;
  883. /* build IKE_SA_INIT: HDR, SAr1, KEr, Nr, [CERTREQ], [SK{IDr}] */
  884. if (os_get_random(data->r_spi, IKEV2_SPI_LEN))
  885. return NULL;
  886. wpa_hexdump(MSG_DEBUG, "IKEV2: IKE_SA Responder's SPI",
  887. data->r_spi, IKEV2_SPI_LEN);
  888. data->r_nonce_len = IKEV2_NONCE_MIN_LEN;
  889. if (random_get_bytes(data->r_nonce, data->r_nonce_len))
  890. return NULL;
  891. wpa_hexdump(MSG_DEBUG, "IKEV2: Nr", data->r_nonce, data->r_nonce_len);
  892. msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1500);
  893. if (msg == NULL)
  894. return NULL;
  895. ikev2_build_hdr(data, msg, IKE_SA_INIT, IKEV2_PAYLOAD_SA, 0);
  896. if (ikev2_build_sar1(data, msg, IKEV2_PAYLOAD_KEY_EXCHANGE) ||
  897. ikev2_build_ker(data, msg, IKEV2_PAYLOAD_NONCE) ||
  898. ikev2_build_nr(data, msg, data->peer_auth == PEER_AUTH_SECRET ?
  899. IKEV2_PAYLOAD_ENCRYPTED :
  900. IKEV2_PAYLOAD_NO_NEXT_PAYLOAD)) {
  901. wpabuf_free(msg);
  902. return NULL;
  903. }
  904. if (ikev2_derive_keys(data)) {
  905. wpabuf_free(msg);
  906. return NULL;
  907. }
  908. if (data->peer_auth == PEER_AUTH_CERT) {
  909. /* TODO: CERTREQ with SHA-1 hashes of Subject Public Key Info
  910. * for trust agents */
  911. }
  912. if (data->peer_auth == PEER_AUTH_SECRET) {
  913. struct wpabuf *plain = wpabuf_alloc(data->IDr_len + 1000);
  914. if (plain == NULL) {
  915. wpabuf_free(msg);
  916. return NULL;
  917. }
  918. if (ikev2_build_idr(data, plain,
  919. IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) ||
  920. ikev2_build_encrypted(data->proposal.encr,
  921. data->proposal.integ,
  922. &data->keys, 0, msg, plain,
  923. IKEV2_PAYLOAD_IDr)) {
  924. wpabuf_free(plain);
  925. wpabuf_free(msg);
  926. return NULL;
  927. }
  928. wpabuf_free(plain);
  929. }
  930. ikev2_update_hdr(msg);
  931. wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_INIT)", msg);
  932. data->state = SA_AUTH;
  933. wpabuf_free(data->r_sign_msg);
  934. data->r_sign_msg = wpabuf_dup(msg);
  935. return msg;
  936. }
  937. static struct wpabuf * ikev2_build_sa_auth(struct ikev2_responder_data *data)
  938. {
  939. struct wpabuf *msg, *plain;
  940. /* build IKE_SA_AUTH: HDR, SK {IDr, [CERT,] AUTH} */
  941. msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + data->IDr_len + 1000);
  942. if (msg == NULL)
  943. return NULL;
  944. ikev2_build_hdr(data, msg, IKE_SA_AUTH, IKEV2_PAYLOAD_ENCRYPTED, 1);
  945. plain = wpabuf_alloc(data->IDr_len + 1000);
  946. if (plain == NULL) {
  947. wpabuf_free(msg);
  948. return NULL;
  949. }
  950. if (ikev2_build_idr(data, plain, IKEV2_PAYLOAD_AUTHENTICATION) ||
  951. ikev2_build_auth(data, plain, IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) ||
  952. ikev2_build_encrypted(data->proposal.encr, data->proposal.integ,
  953. &data->keys, 0, msg, plain,
  954. IKEV2_PAYLOAD_IDr)) {
  955. wpabuf_free(plain);
  956. wpabuf_free(msg);
  957. return NULL;
  958. }
  959. wpabuf_free(plain);
  960. wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (SA_AUTH)", msg);
  961. data->state = IKEV2_DONE;
  962. return msg;
  963. }
  964. static struct wpabuf * ikev2_build_notify(struct ikev2_responder_data *data)
  965. {
  966. struct wpabuf *msg;
  967. msg = wpabuf_alloc(sizeof(struct ikev2_hdr) + 1000);
  968. if (msg == NULL)
  969. return NULL;
  970. if (data->last_msg == LAST_MSG_SA_AUTH) {
  971. /* HDR, SK{N} */
  972. struct wpabuf *plain = wpabuf_alloc(100);
  973. if (plain == NULL) {
  974. wpabuf_free(msg);
  975. return NULL;
  976. }
  977. ikev2_build_hdr(data, msg, IKE_SA_AUTH,
  978. IKEV2_PAYLOAD_ENCRYPTED, 1);
  979. if (ikev2_build_notification(data, plain,
  980. IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) ||
  981. ikev2_build_encrypted(data->proposal.encr,
  982. data->proposal.integ,
  983. &data->keys, 0, msg, plain,
  984. IKEV2_PAYLOAD_NOTIFICATION)) {
  985. wpabuf_free(plain);
  986. wpabuf_free(msg);
  987. return NULL;
  988. }
  989. wpabuf_free(plain);
  990. data->state = IKEV2_FAILED;
  991. } else {
  992. /* HDR, N */
  993. ikev2_build_hdr(data, msg, IKE_SA_INIT,
  994. IKEV2_PAYLOAD_NOTIFICATION, 0);
  995. if (ikev2_build_notification(data, msg,
  996. IKEV2_PAYLOAD_NO_NEXT_PAYLOAD)) {
  997. wpabuf_free(msg);
  998. return NULL;
  999. }
  1000. data->state = SA_INIT;
  1001. }
  1002. ikev2_update_hdr(msg);
  1003. wpa_hexdump_buf(MSG_MSGDUMP, "IKEV2: Sending message (Notification)",
  1004. msg);
  1005. return msg;
  1006. }
  1007. struct wpabuf * ikev2_responder_build(struct ikev2_responder_data *data)
  1008. {
  1009. switch (data->state) {
  1010. case SA_INIT:
  1011. return ikev2_build_sa_init(data);
  1012. case SA_AUTH:
  1013. return ikev2_build_sa_auth(data);
  1014. case CHILD_SA:
  1015. return NULL;
  1016. case NOTIFY:
  1017. return ikev2_build_notify(data);
  1018. case IKEV2_DONE:
  1019. case IKEV2_FAILED:
  1020. return NULL;
  1021. }
  1022. return NULL;
  1023. }