eap_sim_common.h 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230
  1. /*
  2. * EAP peer/server: EAP-SIM/AKA/AKA' shared routines
  3. * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #ifndef EAP_SIM_COMMON_H
  9. #define EAP_SIM_COMMON_H
  10. #define EAP_SIM_NONCE_S_LEN 16
  11. #define EAP_SIM_NONCE_MT_LEN 16
  12. #define EAP_SIM_MAC_LEN 16
  13. #define EAP_SIM_MK_LEN 20
  14. #define EAP_SIM_K_AUT_LEN 16
  15. #define EAP_SIM_K_ENCR_LEN 16
  16. #define EAP_SIM_KEYING_DATA_LEN 64
  17. #define EAP_SIM_IV_LEN 16
  18. #define EAP_SIM_KC_LEN 8
  19. #define EAP_SIM_SRES_LEN 4
  20. #define GSM_RAND_LEN 16
  21. #define EAP_SIM_VERSION 1
  22. /* EAP-SIM Subtypes */
  23. #define EAP_SIM_SUBTYPE_START 10
  24. #define EAP_SIM_SUBTYPE_CHALLENGE 11
  25. #define EAP_SIM_SUBTYPE_NOTIFICATION 12
  26. #define EAP_SIM_SUBTYPE_REAUTHENTICATION 13
  27. #define EAP_SIM_SUBTYPE_CLIENT_ERROR 14
  28. /* AT_CLIENT_ERROR_CODE error codes */
  29. #define EAP_SIM_UNABLE_TO_PROCESS_PACKET 0
  30. #define EAP_SIM_UNSUPPORTED_VERSION 1
  31. #define EAP_SIM_INSUFFICIENT_NUM_OF_CHAL 2
  32. #define EAP_SIM_RAND_NOT_FRESH 3
  33. #define EAP_SIM_MAX_FAST_REAUTHS 1000
  34. #define EAP_SIM_MAX_CHAL 3
  35. /* EAP-AKA Subtypes */
  36. #define EAP_AKA_SUBTYPE_CHALLENGE 1
  37. #define EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT 2
  38. #define EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE 4
  39. #define EAP_AKA_SUBTYPE_IDENTITY 5
  40. #define EAP_AKA_SUBTYPE_NOTIFICATION 12
  41. #define EAP_AKA_SUBTYPE_REAUTHENTICATION 13
  42. #define EAP_AKA_SUBTYPE_CLIENT_ERROR 14
  43. /* AT_CLIENT_ERROR_CODE error codes */
  44. #define EAP_AKA_UNABLE_TO_PROCESS_PACKET 0
  45. #define EAP_AKA_RAND_LEN 16
  46. #define EAP_AKA_AUTN_LEN 16
  47. #define EAP_AKA_AUTS_LEN 14
  48. #define EAP_AKA_RES_MAX_LEN 16
  49. #define EAP_AKA_IK_LEN 16
  50. #define EAP_AKA_CK_LEN 16
  51. #define EAP_AKA_MAX_FAST_REAUTHS 1000
  52. #define EAP_AKA_MIN_RES_LEN 4
  53. #define EAP_AKA_MAX_RES_LEN 16
  54. #define EAP_AKA_CHECKCODE_LEN 20
  55. #define EAP_AKA_PRIME_K_AUT_LEN 32
  56. #define EAP_AKA_PRIME_CHECKCODE_LEN 32
  57. #define EAP_AKA_PRIME_K_RE_LEN 32
  58. struct wpabuf;
  59. void eap_sim_derive_mk(const u8 *identity, size_t identity_len,
  60. const u8 *nonce_mt, u16 selected_version,
  61. const u8 *ver_list, size_t ver_list_len,
  62. int num_chal, const u8 *kc, u8 *mk);
  63. void eap_aka_derive_mk(const u8 *identity, size_t identity_len,
  64. const u8 *ik, const u8 *ck, u8 *mk);
  65. int eap_sim_derive_keys(const u8 *mk, u8 *k_encr, u8 *k_aut, u8 *msk,
  66. u8 *emsk);
  67. int eap_sim_derive_keys_reauth(u16 _counter,
  68. const u8 *identity, size_t identity_len,
  69. const u8 *nonce_s, const u8 *mk, u8 *msk,
  70. u8 *emsk);
  71. int eap_sim_verify_mac(const u8 *k_aut, const struct wpabuf *req,
  72. const u8 *mac, const u8 *extra, size_t extra_len);
  73. void eap_sim_add_mac(const u8 *k_aut, const u8 *msg, size_t msg_len, u8 *mac,
  74. const u8 *extra, size_t extra_len);
  75. #if defined(EAP_AKA_PRIME) || defined(EAP_SERVER_AKA_PRIME)
  76. void eap_aka_prime_derive_keys(const u8 *identity, size_t identity_len,
  77. const u8 *ik, const u8 *ck, u8 *k_encr,
  78. u8 *k_aut, u8 *k_re, u8 *msk, u8 *emsk);
  79. int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
  80. const u8 *identity, size_t identity_len,
  81. const u8 *nonce_s, u8 *msk, u8 *emsk);
  82. int eap_sim_verify_mac_sha256(const u8 *k_aut, const struct wpabuf *req,
  83. const u8 *mac, const u8 *extra,
  84. size_t extra_len);
  85. void eap_sim_add_mac_sha256(const u8 *k_aut, const u8 *msg, size_t msg_len,
  86. u8 *mac, const u8 *extra, size_t extra_len);
  87. void eap_aka_prime_derive_ck_ik_prime(u8 *ck, u8 *ik, const u8 *sqn_ak,
  88. const u8 *network_name,
  89. size_t network_name_len);
  90. #else /* EAP_AKA_PRIME || EAP_SERVER_AKA_PRIME */
  91. static inline void eap_aka_prime_derive_keys(const u8 *identity,
  92. size_t identity_len,
  93. const u8 *ik, const u8 *ck,
  94. u8 *k_encr, u8 *k_aut, u8 *k_re,
  95. u8 *msk, u8 *emsk)
  96. {
  97. }
  98. static inline int eap_aka_prime_derive_keys_reauth(const u8 *k_re, u16 counter,
  99. const u8 *identity,
  100. size_t identity_len,
  101. const u8 *nonce_s, u8 *msk,
  102. u8 *emsk)
  103. {
  104. return -1;
  105. }
  106. static inline int eap_sim_verify_mac_sha256(const u8 *k_aut,
  107. const struct wpabuf *req,
  108. const u8 *mac, const u8 *extra,
  109. size_t extra_len)
  110. {
  111. return -1;
  112. }
  113. #endif /* EAP_AKA_PRIME || EAP_SERVER_AKA_PRIME */
  114. /* EAP-SIM/AKA Attributes (0..127 non-skippable) */
  115. #define EAP_SIM_AT_RAND 1
  116. #define EAP_SIM_AT_AUTN 2 /* only AKA */
  117. #define EAP_SIM_AT_RES 3 /* only AKA, only peer->server */
  118. #define EAP_SIM_AT_AUTS 4 /* only AKA, only peer->server */
  119. #define EAP_SIM_AT_PADDING 6 /* only encrypted */
  120. #define EAP_SIM_AT_NONCE_MT 7 /* only SIM, only send */
  121. #define EAP_SIM_AT_PERMANENT_ID_REQ 10
  122. #define EAP_SIM_AT_MAC 11
  123. #define EAP_SIM_AT_NOTIFICATION 12
  124. #define EAP_SIM_AT_ANY_ID_REQ 13
  125. #define EAP_SIM_AT_IDENTITY 14 /* only send */
  126. #define EAP_SIM_AT_VERSION_LIST 15 /* only SIM */
  127. #define EAP_SIM_AT_SELECTED_VERSION 16 /* only SIM */
  128. #define EAP_SIM_AT_FULLAUTH_ID_REQ 17
  129. #define EAP_SIM_AT_COUNTER 19 /* only encrypted */
  130. #define EAP_SIM_AT_COUNTER_TOO_SMALL 20 /* only encrypted */
  131. #define EAP_SIM_AT_NONCE_S 21 /* only encrypted */
  132. #define EAP_SIM_AT_CLIENT_ERROR_CODE 22 /* only send */
  133. #define EAP_SIM_AT_KDF_INPUT 23 /* only AKA' */
  134. #define EAP_SIM_AT_KDF 24 /* only AKA' */
  135. #define EAP_SIM_AT_IV 129
  136. #define EAP_SIM_AT_ENCR_DATA 130
  137. #define EAP_SIM_AT_NEXT_PSEUDONYM 132 /* only encrypted */
  138. #define EAP_SIM_AT_NEXT_REAUTH_ID 133 /* only encrypted */
  139. #define EAP_SIM_AT_CHECKCODE 134 /* only AKA */
  140. #define EAP_SIM_AT_RESULT_IND 135
  141. #define EAP_SIM_AT_BIDDING 136
  142. /* AT_NOTIFICATION notification code values */
  143. #define EAP_SIM_GENERAL_FAILURE_AFTER_AUTH 0
  144. #define EAP_SIM_TEMPORARILY_DENIED 1026
  145. #define EAP_SIM_NOT_SUBSCRIBED 1031
  146. #define EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH 16384
  147. #define EAP_SIM_SUCCESS 32768
  148. /* EAP-AKA' AT_KDF Key Derivation Function values */
  149. #define EAP_AKA_PRIME_KDF 1
  150. /* AT_BIDDING flags */
  151. #define EAP_AKA_BIDDING_FLAG_D 0x8000
  152. enum eap_sim_id_req {
  153. NO_ID_REQ, ANY_ID, FULLAUTH_ID, PERMANENT_ID
  154. };
  155. struct eap_sim_attrs {
  156. const u8 *rand, *autn, *mac, *iv, *encr_data, *version_list, *nonce_s;
  157. const u8 *next_pseudonym, *next_reauth_id;
  158. const u8 *nonce_mt, *identity, *res, *auts;
  159. const u8 *checkcode;
  160. const u8 *kdf_input;
  161. const u8 *bidding;
  162. size_t num_chal, version_list_len, encr_data_len;
  163. size_t next_pseudonym_len, next_reauth_id_len, identity_len, res_len;
  164. size_t res_len_bits;
  165. size_t checkcode_len;
  166. size_t kdf_input_len;
  167. enum eap_sim_id_req id_req;
  168. int notification, counter, selected_version, client_error_code;
  169. int counter_too_small;
  170. int result_ind;
  171. #define EAP_AKA_PRIME_KDF_MAX 10
  172. u16 kdf[EAP_AKA_PRIME_KDF_MAX];
  173. size_t kdf_count;
  174. };
  175. int eap_sim_parse_attr(const u8 *start, const u8 *end,
  176. struct eap_sim_attrs *attr, int aka, int encr);
  177. u8 * eap_sim_parse_encr(const u8 *k_encr, const u8 *encr_data,
  178. size_t encr_data_len, const u8 *iv,
  179. struct eap_sim_attrs *attr, int aka);
  180. struct eap_sim_msg;
  181. struct eap_sim_msg * eap_sim_msg_init(int code, int id, int type, int subtype);
  182. struct wpabuf * eap_sim_msg_finish(struct eap_sim_msg *msg, int type,
  183. const u8 *k_aut,
  184. const u8 *extra, size_t extra_len);
  185. void eap_sim_msg_free(struct eap_sim_msg *msg);
  186. u8 * eap_sim_msg_add_full(struct eap_sim_msg *msg, u8 attr,
  187. const u8 *data, size_t len);
  188. u8 * eap_sim_msg_add(struct eap_sim_msg *msg, u8 attr,
  189. u16 value, const u8 *data, size_t len);
  190. u8 * eap_sim_msg_add_mac(struct eap_sim_msg *msg, u8 attr);
  191. int eap_sim_msg_add_encr_start(struct eap_sim_msg *msg, u8 attr_iv,
  192. u8 attr_encr);
  193. int eap_sim_msg_add_encr_end(struct eap_sim_msg *msg, u8 *k_encr,
  194. int attr_pad);
  195. void eap_sim_report_notification(void *msg_ctx, int notification, int aka);
  196. #endif /* EAP_SIM_COMMON_H */