eap_server_aka.c 36 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367
  1. /*
  2. * hostapd / EAP-AKA (RFC 4187) and EAP-AKA' (RFC 5448)
  3. * Copyright (c) 2005-2012, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/sha256.h"
  11. #include "crypto/crypto.h"
  12. #include "crypto/random.h"
  13. #include "eap_common/eap_sim_common.h"
  14. #include "eap_server/eap_i.h"
  15. #include "eap_server/eap_sim_db.h"
  16. struct eap_aka_data {
  17. u8 mk[EAP_SIM_MK_LEN];
  18. u8 nonce_s[EAP_SIM_NONCE_S_LEN];
  19. u8 k_aut[EAP_AKA_PRIME_K_AUT_LEN];
  20. u8 k_encr[EAP_SIM_K_ENCR_LEN];
  21. u8 k_re[EAP_AKA_PRIME_K_RE_LEN]; /* EAP-AKA' only */
  22. u8 msk[EAP_SIM_KEYING_DATA_LEN];
  23. u8 emsk[EAP_EMSK_LEN];
  24. u8 rand[EAP_AKA_RAND_LEN];
  25. u8 autn[EAP_AKA_AUTN_LEN];
  26. u8 ck[EAP_AKA_CK_LEN];
  27. u8 ik[EAP_AKA_IK_LEN];
  28. u8 res[EAP_AKA_RES_MAX_LEN];
  29. size_t res_len;
  30. enum {
  31. IDENTITY, CHALLENGE, REAUTH, NOTIFICATION, SUCCESS, FAILURE
  32. } state;
  33. char *next_pseudonym;
  34. char *next_reauth_id;
  35. u16 counter;
  36. struct eap_sim_reauth *reauth;
  37. int auts_reported; /* whether the current AUTS has been reported to the
  38. * eap_sim_db */
  39. u16 notification;
  40. int use_result_ind;
  41. struct wpabuf *id_msgs;
  42. int pending_id;
  43. u8 eap_method;
  44. u8 *network_name;
  45. size_t network_name_len;
  46. u16 kdf;
  47. int identity_round;
  48. char permanent[20]; /* Permanent username */
  49. };
  50. static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data);
  51. static const char * eap_aka_state_txt(int state)
  52. {
  53. switch (state) {
  54. case IDENTITY:
  55. return "IDENTITY";
  56. case CHALLENGE:
  57. return "CHALLENGE";
  58. case REAUTH:
  59. return "REAUTH";
  60. case SUCCESS:
  61. return "SUCCESS";
  62. case FAILURE:
  63. return "FAILURE";
  64. case NOTIFICATION:
  65. return "NOTIFICATION";
  66. default:
  67. return "Unknown?!";
  68. }
  69. }
  70. static void eap_aka_state(struct eap_aka_data *data, int state)
  71. {
  72. wpa_printf(MSG_DEBUG, "EAP-AKA: %s -> %s",
  73. eap_aka_state_txt(data->state),
  74. eap_aka_state_txt(state));
  75. data->state = state;
  76. }
  77. static int eap_aka_check_identity_reauth(struct eap_sm *sm,
  78. struct eap_aka_data *data,
  79. const char *username)
  80. {
  81. if (data->eap_method == EAP_TYPE_AKA_PRIME &&
  82. username[0] != EAP_AKA_PRIME_REAUTH_ID_PREFIX)
  83. return 0;
  84. if (data->eap_method == EAP_TYPE_AKA &&
  85. username[0] != EAP_AKA_REAUTH_ID_PREFIX)
  86. return 0;
  87. wpa_printf(MSG_DEBUG, "EAP-AKA: Reauth username '%s'", username);
  88. data->reauth = eap_sim_db_get_reauth_entry(sm->eap_sim_db_priv,
  89. username);
  90. if (data->reauth == NULL) {
  91. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown reauth identity - "
  92. "request full auth identity");
  93. /* Remain in IDENTITY state for another round */
  94. return 0;
  95. }
  96. wpa_printf(MSG_DEBUG, "EAP-AKA: Using fast re-authentication");
  97. os_strlcpy(data->permanent, data->reauth->permanent,
  98. sizeof(data->permanent));
  99. data->counter = data->reauth->counter;
  100. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  101. os_memcpy(data->k_encr, data->reauth->k_encr,
  102. EAP_SIM_K_ENCR_LEN);
  103. os_memcpy(data->k_aut, data->reauth->k_aut,
  104. EAP_AKA_PRIME_K_AUT_LEN);
  105. os_memcpy(data->k_re, data->reauth->k_re,
  106. EAP_AKA_PRIME_K_RE_LEN);
  107. } else {
  108. os_memcpy(data->mk, data->reauth->mk, EAP_SIM_MK_LEN);
  109. }
  110. eap_aka_state(data, REAUTH);
  111. return 1;
  112. }
  113. static void eap_aka_check_identity(struct eap_sm *sm,
  114. struct eap_aka_data *data)
  115. {
  116. char *username;
  117. /* Check if we already know the identity from EAP-Response/Identity */
  118. username = sim_get_username(sm->identity, sm->identity_len);
  119. if (username == NULL)
  120. return;
  121. if (eap_aka_check_identity_reauth(sm, data, username) > 0) {
  122. os_free(username);
  123. /*
  124. * Since re-auth username was recognized, skip AKA/Identity
  125. * exchange.
  126. */
  127. return;
  128. }
  129. if ((data->eap_method == EAP_TYPE_AKA_PRIME &&
  130. username[0] == EAP_AKA_PRIME_PSEUDONYM_PREFIX) ||
  131. (data->eap_method == EAP_TYPE_AKA &&
  132. username[0] == EAP_AKA_PSEUDONYM_PREFIX)) {
  133. const char *permanent;
  134. wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
  135. username);
  136. permanent = eap_sim_db_get_permanent(
  137. sm->eap_sim_db_priv, username);
  138. if (permanent == NULL) {
  139. os_free(username);
  140. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
  141. "identity - request permanent identity");
  142. /* Remain in IDENTITY state for another round */
  143. return;
  144. }
  145. os_strlcpy(data->permanent, permanent,
  146. sizeof(data->permanent));
  147. /*
  148. * Since pseudonym username was recognized, skip AKA/Identity
  149. * exchange.
  150. */
  151. eap_aka_fullauth(sm, data);
  152. }
  153. os_free(username);
  154. }
  155. static void * eap_aka_init(struct eap_sm *sm)
  156. {
  157. struct eap_aka_data *data;
  158. if (sm->eap_sim_db_priv == NULL) {
  159. wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
  160. return NULL;
  161. }
  162. data = os_zalloc(sizeof(*data));
  163. if (data == NULL)
  164. return NULL;
  165. data->eap_method = EAP_TYPE_AKA;
  166. data->state = IDENTITY;
  167. data->pending_id = -1;
  168. eap_aka_check_identity(sm, data);
  169. return data;
  170. }
  171. #ifdef EAP_SERVER_AKA_PRIME
  172. static void * eap_aka_prime_init(struct eap_sm *sm)
  173. {
  174. struct eap_aka_data *data;
  175. /* TODO: make ANID configurable; see 3GPP TS 24.302 */
  176. char *network_name = "WLAN";
  177. if (sm->eap_sim_db_priv == NULL) {
  178. wpa_printf(MSG_WARNING, "EAP-AKA: eap_sim_db not configured");
  179. return NULL;
  180. }
  181. data = os_zalloc(sizeof(*data));
  182. if (data == NULL)
  183. return NULL;
  184. data->eap_method = EAP_TYPE_AKA_PRIME;
  185. data->network_name = (u8 *) os_strdup(network_name);
  186. if (data->network_name == NULL) {
  187. os_free(data);
  188. return NULL;
  189. }
  190. data->network_name_len = os_strlen(network_name);
  191. data->state = IDENTITY;
  192. data->pending_id = -1;
  193. eap_aka_check_identity(sm, data);
  194. return data;
  195. }
  196. #endif /* EAP_SERVER_AKA_PRIME */
  197. static void eap_aka_reset(struct eap_sm *sm, void *priv)
  198. {
  199. struct eap_aka_data *data = priv;
  200. os_free(data->next_pseudonym);
  201. os_free(data->next_reauth_id);
  202. wpabuf_free(data->id_msgs);
  203. os_free(data->network_name);
  204. bin_clear_free(data, sizeof(*data));
  205. }
  206. static int eap_aka_add_id_msg(struct eap_aka_data *data,
  207. const struct wpabuf *msg)
  208. {
  209. if (msg == NULL)
  210. return -1;
  211. if (data->id_msgs == NULL) {
  212. data->id_msgs = wpabuf_dup(msg);
  213. return data->id_msgs == NULL ? -1 : 0;
  214. }
  215. if (wpabuf_resize(&data->id_msgs, wpabuf_len(msg)) < 0)
  216. return -1;
  217. wpabuf_put_buf(data->id_msgs, msg);
  218. return 0;
  219. }
  220. static void eap_aka_add_checkcode(struct eap_aka_data *data,
  221. struct eap_sim_msg *msg)
  222. {
  223. const u8 *addr;
  224. size_t len;
  225. u8 hash[SHA256_MAC_LEN];
  226. wpa_printf(MSG_DEBUG, " AT_CHECKCODE");
  227. if (data->id_msgs == NULL) {
  228. /*
  229. * No EAP-AKA/Identity packets were exchanged - send empty
  230. * checkcode.
  231. */
  232. eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, NULL, 0);
  233. return;
  234. }
  235. /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */
  236. addr = wpabuf_head(data->id_msgs);
  237. len = wpabuf_len(data->id_msgs);
  238. wpa_hexdump(MSG_MSGDUMP, "EAP-AKA: AT_CHECKCODE data", addr, len);
  239. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  240. sha256_vector(1, &addr, &len, hash);
  241. else
  242. sha1_vector(1, &addr, &len, hash);
  243. eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, hash,
  244. data->eap_method == EAP_TYPE_AKA_PRIME ?
  245. EAP_AKA_PRIME_CHECKCODE_LEN : EAP_AKA_CHECKCODE_LEN);
  246. }
  247. static int eap_aka_verify_checkcode(struct eap_aka_data *data,
  248. const u8 *checkcode, size_t checkcode_len)
  249. {
  250. const u8 *addr;
  251. size_t len;
  252. u8 hash[SHA256_MAC_LEN];
  253. size_t hash_len;
  254. if (checkcode == NULL)
  255. return -1;
  256. if (data->id_msgs == NULL) {
  257. if (checkcode_len != 0) {
  258. wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer "
  259. "indicates that AKA/Identity messages were "
  260. "used, but they were not");
  261. return -1;
  262. }
  263. return 0;
  264. }
  265. hash_len = data->eap_method == EAP_TYPE_AKA_PRIME ?
  266. EAP_AKA_PRIME_CHECKCODE_LEN : EAP_AKA_CHECKCODE_LEN;
  267. if (checkcode_len != hash_len) {
  268. wpa_printf(MSG_DEBUG, "EAP-AKA: Checkcode from peer indicates "
  269. "that AKA/Identity message were not used, but they "
  270. "were");
  271. return -1;
  272. }
  273. /* Checkcode is SHA1 hash over all EAP-AKA/Identity packets. */
  274. addr = wpabuf_head(data->id_msgs);
  275. len = wpabuf_len(data->id_msgs);
  276. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  277. sha256_vector(1, &addr, &len, hash);
  278. else
  279. sha1_vector(1, &addr, &len, hash);
  280. if (os_memcmp_const(hash, checkcode, hash_len) != 0) {
  281. wpa_printf(MSG_DEBUG, "EAP-AKA: Mismatch in AT_CHECKCODE");
  282. return -1;
  283. }
  284. return 0;
  285. }
  286. static struct wpabuf * eap_aka_build_identity(struct eap_sm *sm,
  287. struct eap_aka_data *data, u8 id)
  288. {
  289. struct eap_sim_msg *msg;
  290. struct wpabuf *buf;
  291. wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Identity");
  292. msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
  293. EAP_AKA_SUBTYPE_IDENTITY);
  294. data->identity_round++;
  295. if (data->identity_round == 1) {
  296. /*
  297. * RFC 4187, Chap. 4.1.4 recommends that identity from EAP is
  298. * ignored and the AKA/Identity is used to request the
  299. * identity.
  300. */
  301. wpa_printf(MSG_DEBUG, " AT_ANY_ID_REQ");
  302. eap_sim_msg_add(msg, EAP_SIM_AT_ANY_ID_REQ, 0, NULL, 0);
  303. } else if (data->identity_round > 3) {
  304. /* Cannot use more than three rounds of Identity messages */
  305. eap_sim_msg_free(msg);
  306. return NULL;
  307. } else if (sm->identity && sm->identity_len > 0 &&
  308. (sm->identity[0] == EAP_AKA_REAUTH_ID_PREFIX ||
  309. sm->identity[0] == EAP_AKA_PRIME_REAUTH_ID_PREFIX)) {
  310. /* Reauth id may have expired - try fullauth */
  311. wpa_printf(MSG_DEBUG, " AT_FULLAUTH_ID_REQ");
  312. eap_sim_msg_add(msg, EAP_SIM_AT_FULLAUTH_ID_REQ, 0, NULL, 0);
  313. } else {
  314. wpa_printf(MSG_DEBUG, " AT_PERMANENT_ID_REQ");
  315. eap_sim_msg_add(msg, EAP_SIM_AT_PERMANENT_ID_REQ, 0, NULL, 0);
  316. }
  317. buf = eap_sim_msg_finish(msg, data->eap_method, NULL, NULL, 0);
  318. if (eap_aka_add_id_msg(data, buf) < 0) {
  319. wpabuf_free(buf);
  320. return NULL;
  321. }
  322. data->pending_id = id;
  323. return buf;
  324. }
  325. static int eap_aka_build_encr(struct eap_sm *sm, struct eap_aka_data *data,
  326. struct eap_sim_msg *msg, u16 counter,
  327. const u8 *nonce_s)
  328. {
  329. os_free(data->next_pseudonym);
  330. if (nonce_s == NULL) {
  331. data->next_pseudonym =
  332. eap_sim_db_get_next_pseudonym(
  333. sm->eap_sim_db_priv,
  334. data->eap_method == EAP_TYPE_AKA_PRIME ?
  335. EAP_SIM_DB_AKA_PRIME : EAP_SIM_DB_AKA);
  336. } else {
  337. /* Do not update pseudonym during re-authentication */
  338. data->next_pseudonym = NULL;
  339. }
  340. os_free(data->next_reauth_id);
  341. if (data->counter <= EAP_AKA_MAX_FAST_REAUTHS) {
  342. data->next_reauth_id =
  343. eap_sim_db_get_next_reauth_id(
  344. sm->eap_sim_db_priv,
  345. data->eap_method == EAP_TYPE_AKA_PRIME ?
  346. EAP_SIM_DB_AKA_PRIME : EAP_SIM_DB_AKA);
  347. } else {
  348. wpa_printf(MSG_DEBUG, "EAP-AKA: Max fast re-authentication "
  349. "count exceeded - force full authentication");
  350. data->next_reauth_id = NULL;
  351. }
  352. if (data->next_pseudonym == NULL && data->next_reauth_id == NULL &&
  353. counter == 0 && nonce_s == NULL)
  354. return 0;
  355. wpa_printf(MSG_DEBUG, " AT_IV");
  356. wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
  357. eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV, EAP_SIM_AT_ENCR_DATA);
  358. if (counter > 0) {
  359. wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)", counter);
  360. eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, counter, NULL, 0);
  361. }
  362. if (nonce_s) {
  363. wpa_printf(MSG_DEBUG, " *AT_NONCE_S");
  364. eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_S, 0, nonce_s,
  365. EAP_SIM_NONCE_S_LEN);
  366. }
  367. if (data->next_pseudonym) {
  368. wpa_printf(MSG_DEBUG, " *AT_NEXT_PSEUDONYM (%s)",
  369. data->next_pseudonym);
  370. eap_sim_msg_add(msg, EAP_SIM_AT_NEXT_PSEUDONYM,
  371. os_strlen(data->next_pseudonym),
  372. (u8 *) data->next_pseudonym,
  373. os_strlen(data->next_pseudonym));
  374. }
  375. if (data->next_reauth_id) {
  376. wpa_printf(MSG_DEBUG, " *AT_NEXT_REAUTH_ID (%s)",
  377. data->next_reauth_id);
  378. eap_sim_msg_add(msg, EAP_SIM_AT_NEXT_REAUTH_ID,
  379. os_strlen(data->next_reauth_id),
  380. (u8 *) data->next_reauth_id,
  381. os_strlen(data->next_reauth_id));
  382. }
  383. if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
  384. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to encrypt "
  385. "AT_ENCR_DATA");
  386. return -1;
  387. }
  388. return 0;
  389. }
  390. static struct wpabuf * eap_aka_build_challenge(struct eap_sm *sm,
  391. struct eap_aka_data *data,
  392. u8 id)
  393. {
  394. struct eap_sim_msg *msg;
  395. wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Challenge");
  396. msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
  397. EAP_AKA_SUBTYPE_CHALLENGE);
  398. wpa_printf(MSG_DEBUG, " AT_RAND");
  399. eap_sim_msg_add(msg, EAP_SIM_AT_RAND, 0, data->rand, EAP_AKA_RAND_LEN);
  400. wpa_printf(MSG_DEBUG, " AT_AUTN");
  401. eap_sim_msg_add(msg, EAP_SIM_AT_AUTN, 0, data->autn, EAP_AKA_AUTN_LEN);
  402. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  403. if (data->kdf) {
  404. /* Add the selected KDF into the beginning */
  405. wpa_printf(MSG_DEBUG, " AT_KDF");
  406. eap_sim_msg_add(msg, EAP_SIM_AT_KDF, data->kdf,
  407. NULL, 0);
  408. }
  409. wpa_printf(MSG_DEBUG, " AT_KDF");
  410. eap_sim_msg_add(msg, EAP_SIM_AT_KDF, EAP_AKA_PRIME_KDF,
  411. NULL, 0);
  412. wpa_printf(MSG_DEBUG, " AT_KDF_INPUT");
  413. eap_sim_msg_add(msg, EAP_SIM_AT_KDF_INPUT,
  414. data->network_name_len,
  415. data->network_name, data->network_name_len);
  416. }
  417. if (eap_aka_build_encr(sm, data, msg, 0, NULL)) {
  418. eap_sim_msg_free(msg);
  419. return NULL;
  420. }
  421. eap_aka_add_checkcode(data, msg);
  422. if (sm->eap_sim_aka_result_ind) {
  423. wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
  424. eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
  425. }
  426. #ifdef EAP_SERVER_AKA_PRIME
  427. if (data->eap_method == EAP_TYPE_AKA) {
  428. u16 flags = 0;
  429. int i;
  430. int aka_prime_preferred = 0;
  431. i = 0;
  432. while (sm->user && i < EAP_MAX_METHODS &&
  433. (sm->user->methods[i].vendor != EAP_VENDOR_IETF ||
  434. sm->user->methods[i].method != EAP_TYPE_NONE)) {
  435. if (sm->user->methods[i].vendor == EAP_VENDOR_IETF) {
  436. if (sm->user->methods[i].method ==
  437. EAP_TYPE_AKA)
  438. break;
  439. if (sm->user->methods[i].method ==
  440. EAP_TYPE_AKA_PRIME) {
  441. aka_prime_preferred = 1;
  442. break;
  443. }
  444. }
  445. i++;
  446. }
  447. if (aka_prime_preferred)
  448. flags |= EAP_AKA_BIDDING_FLAG_D;
  449. eap_sim_msg_add(msg, EAP_SIM_AT_BIDDING, flags, NULL, 0);
  450. }
  451. #endif /* EAP_SERVER_AKA_PRIME */
  452. wpa_printf(MSG_DEBUG, " AT_MAC");
  453. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  454. return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
  455. }
  456. static struct wpabuf * eap_aka_build_reauth(struct eap_sm *sm,
  457. struct eap_aka_data *data, u8 id)
  458. {
  459. struct eap_sim_msg *msg;
  460. wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Re-authentication");
  461. if (random_get_bytes(data->nonce_s, EAP_SIM_NONCE_S_LEN))
  462. return NULL;
  463. wpa_hexdump_key(MSG_MSGDUMP, "EAP-AKA: NONCE_S",
  464. data->nonce_s, EAP_SIM_NONCE_S_LEN);
  465. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  466. eap_aka_prime_derive_keys_reauth(data->k_re, data->counter,
  467. sm->identity,
  468. sm->identity_len,
  469. data->nonce_s,
  470. data->msk, data->emsk);
  471. } else {
  472. eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
  473. data->msk, data->emsk);
  474. eap_sim_derive_keys_reauth(data->counter, sm->identity,
  475. sm->identity_len, data->nonce_s,
  476. data->mk, data->msk, data->emsk);
  477. }
  478. msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
  479. EAP_AKA_SUBTYPE_REAUTHENTICATION);
  480. if (eap_aka_build_encr(sm, data, msg, data->counter, data->nonce_s)) {
  481. eap_sim_msg_free(msg);
  482. return NULL;
  483. }
  484. eap_aka_add_checkcode(data, msg);
  485. if (sm->eap_sim_aka_result_ind) {
  486. wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
  487. eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
  488. }
  489. wpa_printf(MSG_DEBUG, " AT_MAC");
  490. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  491. return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
  492. }
  493. static struct wpabuf * eap_aka_build_notification(struct eap_sm *sm,
  494. struct eap_aka_data *data,
  495. u8 id)
  496. {
  497. struct eap_sim_msg *msg;
  498. wpa_printf(MSG_DEBUG, "EAP-AKA: Generating Notification");
  499. msg = eap_sim_msg_init(EAP_CODE_REQUEST, id, data->eap_method,
  500. EAP_AKA_SUBTYPE_NOTIFICATION);
  501. wpa_printf(MSG_DEBUG, " AT_NOTIFICATION (%d)", data->notification);
  502. eap_sim_msg_add(msg, EAP_SIM_AT_NOTIFICATION, data->notification,
  503. NULL, 0);
  504. if (data->use_result_ind) {
  505. if (data->reauth) {
  506. wpa_printf(MSG_DEBUG, " AT_IV");
  507. wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
  508. eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV,
  509. EAP_SIM_AT_ENCR_DATA);
  510. wpa_printf(MSG_DEBUG, " *AT_COUNTER (%u)",
  511. data->counter);
  512. eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, data->counter,
  513. NULL, 0);
  514. if (eap_sim_msg_add_encr_end(msg, data->k_encr,
  515. EAP_SIM_AT_PADDING)) {
  516. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to "
  517. "encrypt AT_ENCR_DATA");
  518. eap_sim_msg_free(msg);
  519. return NULL;
  520. }
  521. }
  522. wpa_printf(MSG_DEBUG, " AT_MAC");
  523. eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
  524. }
  525. return eap_sim_msg_finish(msg, data->eap_method, data->k_aut, NULL, 0);
  526. }
  527. static struct wpabuf * eap_aka_buildReq(struct eap_sm *sm, void *priv, u8 id)
  528. {
  529. struct eap_aka_data *data = priv;
  530. data->auts_reported = 0;
  531. switch (data->state) {
  532. case IDENTITY:
  533. return eap_aka_build_identity(sm, data, id);
  534. case CHALLENGE:
  535. return eap_aka_build_challenge(sm, data, id);
  536. case REAUTH:
  537. return eap_aka_build_reauth(sm, data, id);
  538. case NOTIFICATION:
  539. return eap_aka_build_notification(sm, data, id);
  540. default:
  541. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown state %d in "
  542. "buildReq", data->state);
  543. break;
  544. }
  545. return NULL;
  546. }
  547. static Boolean eap_aka_check(struct eap_sm *sm, void *priv,
  548. struct wpabuf *respData)
  549. {
  550. struct eap_aka_data *data = priv;
  551. const u8 *pos;
  552. size_t len;
  553. pos = eap_hdr_validate(EAP_VENDOR_IETF, data->eap_method, respData,
  554. &len);
  555. if (pos == NULL || len < 3) {
  556. wpa_printf(MSG_INFO, "EAP-AKA: Invalid frame");
  557. return TRUE;
  558. }
  559. return FALSE;
  560. }
  561. static Boolean eap_aka_subtype_ok(struct eap_aka_data *data, u8 subtype)
  562. {
  563. if (subtype == EAP_AKA_SUBTYPE_CLIENT_ERROR ||
  564. subtype == EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT)
  565. return FALSE;
  566. switch (data->state) {
  567. case IDENTITY:
  568. if (subtype != EAP_AKA_SUBTYPE_IDENTITY) {
  569. wpa_printf(MSG_INFO, "EAP-AKA: Unexpected response "
  570. "subtype %d", subtype);
  571. return TRUE;
  572. }
  573. break;
  574. case CHALLENGE:
  575. if (subtype != EAP_AKA_SUBTYPE_CHALLENGE &&
  576. subtype != EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE) {
  577. wpa_printf(MSG_INFO, "EAP-AKA: Unexpected response "
  578. "subtype %d", subtype);
  579. return TRUE;
  580. }
  581. break;
  582. case REAUTH:
  583. if (subtype != EAP_AKA_SUBTYPE_REAUTHENTICATION) {
  584. wpa_printf(MSG_INFO, "EAP-AKA: Unexpected response "
  585. "subtype %d", subtype);
  586. return TRUE;
  587. }
  588. break;
  589. case NOTIFICATION:
  590. if (subtype != EAP_AKA_SUBTYPE_NOTIFICATION) {
  591. wpa_printf(MSG_INFO, "EAP-AKA: Unexpected response "
  592. "subtype %d", subtype);
  593. return TRUE;
  594. }
  595. break;
  596. default:
  597. wpa_printf(MSG_INFO, "EAP-AKA: Unexpected state (%d) for "
  598. "processing a response", data->state);
  599. return TRUE;
  600. }
  601. return FALSE;
  602. }
  603. static void eap_aka_determine_identity(struct eap_sm *sm,
  604. struct eap_aka_data *data)
  605. {
  606. char *username;
  607. wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity",
  608. sm->identity, sm->identity_len);
  609. username = sim_get_username(sm->identity, sm->identity_len);
  610. if (username == NULL) {
  611. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  612. eap_aka_state(data, NOTIFICATION);
  613. return;
  614. }
  615. if (eap_aka_check_identity_reauth(sm, data, username) > 0) {
  616. os_free(username);
  617. return;
  618. }
  619. if (((data->eap_method == EAP_TYPE_AKA_PRIME &&
  620. username[0] == EAP_AKA_PRIME_REAUTH_ID_PREFIX) ||
  621. (data->eap_method == EAP_TYPE_AKA &&
  622. username[0] == EAP_AKA_REAUTH_ID_PREFIX)) &&
  623. data->identity_round == 1) {
  624. /* Remain in IDENTITY state for another round to request full
  625. * auth identity since we did not recognize reauth id */
  626. os_free(username);
  627. return;
  628. }
  629. if ((data->eap_method == EAP_TYPE_AKA_PRIME &&
  630. username[0] == EAP_AKA_PRIME_PSEUDONYM_PREFIX) ||
  631. (data->eap_method == EAP_TYPE_AKA &&
  632. username[0] == EAP_AKA_PSEUDONYM_PREFIX)) {
  633. const char *permanent;
  634. wpa_printf(MSG_DEBUG, "EAP-AKA: Pseudonym username '%s'",
  635. username);
  636. permanent = eap_sim_db_get_permanent(
  637. sm->eap_sim_db_priv, username);
  638. os_free(username);
  639. if (permanent == NULL) {
  640. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown pseudonym "
  641. "identity - request permanent identity");
  642. /* Remain in IDENTITY state for another round */
  643. return;
  644. }
  645. os_strlcpy(data->permanent, permanent,
  646. sizeof(data->permanent));
  647. } else if ((data->eap_method == EAP_TYPE_AKA_PRIME &&
  648. username[0] == EAP_AKA_PRIME_PERMANENT_PREFIX) ||
  649. (data->eap_method == EAP_TYPE_AKA &&
  650. username[0] == EAP_AKA_PERMANENT_PREFIX)) {
  651. wpa_printf(MSG_DEBUG, "EAP-AKA: Permanent username '%s'",
  652. username);
  653. os_strlcpy(data->permanent, username, sizeof(data->permanent));
  654. os_free(username);
  655. } else {
  656. wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized username '%s'",
  657. username);
  658. os_free(username);
  659. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  660. eap_aka_state(data, NOTIFICATION);
  661. return;
  662. }
  663. eap_aka_fullauth(sm, data);
  664. }
  665. static void eap_aka_fullauth(struct eap_sm *sm, struct eap_aka_data *data)
  666. {
  667. size_t identity_len;
  668. int res;
  669. res = eap_sim_db_get_aka_auth(sm->eap_sim_db_priv, data->permanent,
  670. data->rand, data->autn, data->ik,
  671. data->ck, data->res, &data->res_len, sm);
  672. if (res == EAP_SIM_DB_PENDING) {
  673. wpa_printf(MSG_DEBUG, "EAP-AKA: AKA authentication data "
  674. "not yet available - pending request");
  675. sm->method_pending = METHOD_PENDING_WAIT;
  676. return;
  677. }
  678. #ifdef EAP_SERVER_AKA_PRIME
  679. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  680. /* Note: AUTN = (SQN ^ AK) || AMF || MAC which gives us the
  681. * needed 6-octet SQN ^AK for CK',IK' derivation */
  682. eap_aka_prime_derive_ck_ik_prime(data->ck, data->ik,
  683. data->autn,
  684. data->network_name,
  685. data->network_name_len);
  686. }
  687. #endif /* EAP_SERVER_AKA_PRIME */
  688. data->reauth = NULL;
  689. data->counter = 0; /* reset re-auth counter since this is full auth */
  690. if (res != 0) {
  691. wpa_printf(MSG_INFO, "EAP-AKA: Failed to get AKA "
  692. "authentication data for the peer");
  693. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  694. eap_aka_state(data, NOTIFICATION);
  695. return;
  696. }
  697. if (sm->method_pending == METHOD_PENDING_WAIT) {
  698. wpa_printf(MSG_DEBUG, "EAP-AKA: AKA authentication data "
  699. "available - abort pending wait");
  700. sm->method_pending = METHOD_PENDING_NONE;
  701. }
  702. identity_len = sm->identity_len;
  703. while (identity_len > 0 && sm->identity[identity_len - 1] == '\0') {
  704. wpa_printf(MSG_DEBUG, "EAP-AKA: Workaround - drop last null "
  705. "character from identity");
  706. identity_len--;
  707. }
  708. wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation",
  709. sm->identity, identity_len);
  710. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  711. eap_aka_prime_derive_keys(sm->identity, identity_len, data->ik,
  712. data->ck, data->k_encr, data->k_aut,
  713. data->k_re, data->msk, data->emsk);
  714. } else {
  715. eap_aka_derive_mk(sm->identity, identity_len, data->ik,
  716. data->ck, data->mk);
  717. eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut,
  718. data->msk, data->emsk);
  719. }
  720. eap_aka_state(data, CHALLENGE);
  721. }
  722. static void eap_aka_process_identity(struct eap_sm *sm,
  723. struct eap_aka_data *data,
  724. struct wpabuf *respData,
  725. struct eap_sim_attrs *attr)
  726. {
  727. u8 *new_identity;
  728. wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Identity");
  729. if (attr->mac || attr->iv || attr->encr_data) {
  730. wpa_printf(MSG_WARNING, "EAP-AKA: Unexpected attribute "
  731. "received in EAP-Response/AKA-Identity");
  732. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  733. eap_aka_state(data, NOTIFICATION);
  734. return;
  735. }
  736. /*
  737. * We always request identity with AKA/Identity, so the peer is
  738. * required to have replied with one.
  739. */
  740. if (!attr->identity || attr->identity_len == 0) {
  741. wpa_printf(MSG_DEBUG, "EAP-AKA: Peer did not provide any "
  742. "identity");
  743. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  744. eap_aka_state(data, NOTIFICATION);
  745. return;
  746. }
  747. new_identity = os_malloc(attr->identity_len);
  748. if (new_identity == NULL) {
  749. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  750. eap_aka_state(data, NOTIFICATION);
  751. return;
  752. }
  753. os_free(sm->identity);
  754. sm->identity = new_identity;
  755. os_memcpy(sm->identity, attr->identity, attr->identity_len);
  756. sm->identity_len = attr->identity_len;
  757. eap_aka_determine_identity(sm, data);
  758. if (eap_get_id(respData) == data->pending_id) {
  759. data->pending_id = -1;
  760. eap_aka_add_id_msg(data, respData);
  761. }
  762. }
  763. static int eap_aka_verify_mac(struct eap_aka_data *data,
  764. const struct wpabuf *req,
  765. const u8 *mac, const u8 *extra,
  766. size_t extra_len)
  767. {
  768. if (data->eap_method == EAP_TYPE_AKA_PRIME)
  769. return eap_sim_verify_mac_sha256(data->k_aut, req, mac, extra,
  770. extra_len);
  771. return eap_sim_verify_mac(data->k_aut, req, mac, extra, extra_len);
  772. }
  773. static void eap_aka_process_challenge(struct eap_sm *sm,
  774. struct eap_aka_data *data,
  775. struct wpabuf *respData,
  776. struct eap_sim_attrs *attr)
  777. {
  778. wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Challenge");
  779. #ifdef EAP_SERVER_AKA_PRIME
  780. #if 0
  781. /* KDF negotiation; to be enabled only after more than one KDF is
  782. * supported */
  783. if (data->eap_method == EAP_TYPE_AKA_PRIME &&
  784. attr->kdf_count == 1 && attr->mac == NULL) {
  785. if (attr->kdf[0] != EAP_AKA_PRIME_KDF) {
  786. wpa_printf(MSG_WARNING, "EAP-AKA': Peer selected "
  787. "unknown KDF");
  788. data->notification =
  789. EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  790. eap_aka_state(data, NOTIFICATION);
  791. return;
  792. }
  793. data->kdf = attr->kdf[0];
  794. /* Allow negotiation to continue with the selected KDF by
  795. * sending another Challenge message */
  796. wpa_printf(MSG_DEBUG, "EAP-AKA': KDF %d selected", data->kdf);
  797. return;
  798. }
  799. #endif
  800. #endif /* EAP_SERVER_AKA_PRIME */
  801. if (attr->checkcode &&
  802. eap_aka_verify_checkcode(data, attr->checkcode,
  803. attr->checkcode_len)) {
  804. wpa_printf(MSG_WARNING, "EAP-AKA: Invalid AT_CHECKCODE in the "
  805. "message");
  806. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  807. eap_aka_state(data, NOTIFICATION);
  808. return;
  809. }
  810. if (attr->mac == NULL ||
  811. eap_aka_verify_mac(data, respData, attr->mac, NULL, 0)) {
  812. wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message "
  813. "did not include valid AT_MAC");
  814. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  815. eap_aka_state(data, NOTIFICATION);
  816. return;
  817. }
  818. /*
  819. * AT_RES is padded, so verify that there is enough room for RES and
  820. * that the RES length in bits matches with the expected RES.
  821. */
  822. if (attr->res == NULL || attr->res_len < data->res_len ||
  823. attr->res_len_bits != data->res_len * 8 ||
  824. os_memcmp_const(attr->res, data->res, data->res_len) != 0) {
  825. wpa_printf(MSG_WARNING, "EAP-AKA: Challenge message did not "
  826. "include valid AT_RES (attr len=%lu, res len=%lu "
  827. "bits, expected %lu bits)",
  828. (unsigned long) attr->res_len,
  829. (unsigned long) attr->res_len_bits,
  830. (unsigned long) data->res_len * 8);
  831. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  832. eap_aka_state(data, NOTIFICATION);
  833. return;
  834. }
  835. wpa_printf(MSG_DEBUG, "EAP-AKA: Challenge response includes the "
  836. "correct AT_MAC");
  837. if (sm->eap_sim_aka_result_ind && attr->result_ind) {
  838. data->use_result_ind = 1;
  839. data->notification = EAP_SIM_SUCCESS;
  840. eap_aka_state(data, NOTIFICATION);
  841. } else
  842. eap_aka_state(data, SUCCESS);
  843. if (data->next_pseudonym) {
  844. eap_sim_db_add_pseudonym(sm->eap_sim_db_priv, data->permanent,
  845. data->next_pseudonym);
  846. data->next_pseudonym = NULL;
  847. }
  848. if (data->next_reauth_id) {
  849. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  850. #ifdef EAP_SERVER_AKA_PRIME
  851. eap_sim_db_add_reauth_prime(sm->eap_sim_db_priv,
  852. data->permanent,
  853. data->next_reauth_id,
  854. data->counter + 1,
  855. data->k_encr, data->k_aut,
  856. data->k_re);
  857. #endif /* EAP_SERVER_AKA_PRIME */
  858. } else {
  859. eap_sim_db_add_reauth(sm->eap_sim_db_priv,
  860. data->permanent,
  861. data->next_reauth_id,
  862. data->counter + 1,
  863. data->mk);
  864. }
  865. data->next_reauth_id = NULL;
  866. }
  867. }
  868. static void eap_aka_process_sync_failure(struct eap_sm *sm,
  869. struct eap_aka_data *data,
  870. struct wpabuf *respData,
  871. struct eap_sim_attrs *attr)
  872. {
  873. wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Synchronization-Failure");
  874. if (attr->auts == NULL) {
  875. wpa_printf(MSG_WARNING, "EAP-AKA: Synchronization-Failure "
  876. "message did not include valid AT_AUTS");
  877. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  878. eap_aka_state(data, NOTIFICATION);
  879. return;
  880. }
  881. /* Avoid re-reporting AUTS when processing pending EAP packet by
  882. * maintaining a local flag stating whether this AUTS has already been
  883. * reported. */
  884. if (!data->auts_reported &&
  885. eap_sim_db_resynchronize(sm->eap_sim_db_priv, data->permanent,
  886. attr->auts, data->rand)) {
  887. wpa_printf(MSG_WARNING, "EAP-AKA: Resynchronization failed");
  888. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  889. eap_aka_state(data, NOTIFICATION);
  890. return;
  891. }
  892. data->auts_reported = 1;
  893. /* Remain in CHALLENGE state to re-try after resynchronization */
  894. eap_aka_fullauth(sm, data);
  895. }
  896. static void eap_aka_process_reauth(struct eap_sm *sm,
  897. struct eap_aka_data *data,
  898. struct wpabuf *respData,
  899. struct eap_sim_attrs *attr)
  900. {
  901. struct eap_sim_attrs eattr;
  902. u8 *decrypted = NULL;
  903. wpa_printf(MSG_DEBUG, "EAP-AKA: Processing Reauthentication");
  904. if (attr->mac == NULL ||
  905. eap_aka_verify_mac(data, respData, attr->mac, data->nonce_s,
  906. EAP_SIM_NONCE_S_LEN)) {
  907. wpa_printf(MSG_WARNING, "EAP-AKA: Re-authentication message "
  908. "did not include valid AT_MAC");
  909. goto fail;
  910. }
  911. if (attr->encr_data == NULL || attr->iv == NULL) {
  912. wpa_printf(MSG_WARNING, "EAP-AKA: Reauthentication "
  913. "message did not include encrypted data");
  914. goto fail;
  915. }
  916. decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
  917. attr->encr_data_len, attr->iv, &eattr,
  918. 0);
  919. if (decrypted == NULL) {
  920. wpa_printf(MSG_WARNING, "EAP-AKA: Failed to parse encrypted "
  921. "data from reauthentication message");
  922. goto fail;
  923. }
  924. if (eattr.counter != data->counter) {
  925. wpa_printf(MSG_WARNING, "EAP-AKA: Re-authentication message "
  926. "used incorrect counter %u, expected %u",
  927. eattr.counter, data->counter);
  928. goto fail;
  929. }
  930. os_free(decrypted);
  931. decrypted = NULL;
  932. wpa_printf(MSG_DEBUG, "EAP-AKA: Re-authentication response includes "
  933. "the correct AT_MAC");
  934. if (eattr.counter_too_small) {
  935. wpa_printf(MSG_DEBUG, "EAP-AKA: Re-authentication response "
  936. "included AT_COUNTER_TOO_SMALL - starting full "
  937. "authentication");
  938. eap_aka_fullauth(sm, data);
  939. return;
  940. }
  941. if (sm->eap_sim_aka_result_ind && attr->result_ind) {
  942. data->use_result_ind = 1;
  943. data->notification = EAP_SIM_SUCCESS;
  944. eap_aka_state(data, NOTIFICATION);
  945. } else
  946. eap_aka_state(data, SUCCESS);
  947. if (data->next_reauth_id) {
  948. if (data->eap_method == EAP_TYPE_AKA_PRIME) {
  949. #ifdef EAP_SERVER_AKA_PRIME
  950. eap_sim_db_add_reauth_prime(sm->eap_sim_db_priv,
  951. data->permanent,
  952. data->next_reauth_id,
  953. data->counter + 1,
  954. data->k_encr, data->k_aut,
  955. data->k_re);
  956. #endif /* EAP_SERVER_AKA_PRIME */
  957. } else {
  958. eap_sim_db_add_reauth(sm->eap_sim_db_priv,
  959. data->permanent,
  960. data->next_reauth_id,
  961. data->counter + 1,
  962. data->mk);
  963. }
  964. data->next_reauth_id = NULL;
  965. } else {
  966. eap_sim_db_remove_reauth(sm->eap_sim_db_priv, data->reauth);
  967. data->reauth = NULL;
  968. }
  969. return;
  970. fail:
  971. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  972. eap_aka_state(data, NOTIFICATION);
  973. eap_sim_db_remove_reauth(sm->eap_sim_db_priv, data->reauth);
  974. data->reauth = NULL;
  975. os_free(decrypted);
  976. }
  977. static void eap_aka_process_client_error(struct eap_sm *sm,
  978. struct eap_aka_data *data,
  979. struct wpabuf *respData,
  980. struct eap_sim_attrs *attr)
  981. {
  982. wpa_printf(MSG_DEBUG, "EAP-AKA: Client reported error %d",
  983. attr->client_error_code);
  984. if (data->notification == EAP_SIM_SUCCESS && data->use_result_ind)
  985. eap_aka_state(data, SUCCESS);
  986. else
  987. eap_aka_state(data, FAILURE);
  988. }
  989. static void eap_aka_process_authentication_reject(
  990. struct eap_sm *sm, struct eap_aka_data *data,
  991. struct wpabuf *respData, struct eap_sim_attrs *attr)
  992. {
  993. wpa_printf(MSG_DEBUG, "EAP-AKA: Client rejected authentication");
  994. eap_aka_state(data, FAILURE);
  995. }
  996. static void eap_aka_process_notification(struct eap_sm *sm,
  997. struct eap_aka_data *data,
  998. struct wpabuf *respData,
  999. struct eap_sim_attrs *attr)
  1000. {
  1001. wpa_printf(MSG_DEBUG, "EAP-AKA: Client replied to notification");
  1002. if (data->notification == EAP_SIM_SUCCESS && data->use_result_ind)
  1003. eap_aka_state(data, SUCCESS);
  1004. else
  1005. eap_aka_state(data, FAILURE);
  1006. }
  1007. static void eap_aka_process(struct eap_sm *sm, void *priv,
  1008. struct wpabuf *respData)
  1009. {
  1010. struct eap_aka_data *data = priv;
  1011. const u8 *pos, *end;
  1012. u8 subtype;
  1013. size_t len;
  1014. struct eap_sim_attrs attr;
  1015. pos = eap_hdr_validate(EAP_VENDOR_IETF, data->eap_method, respData,
  1016. &len);
  1017. if (pos == NULL || len < 3)
  1018. return;
  1019. end = pos + len;
  1020. subtype = *pos;
  1021. pos += 3;
  1022. if (eap_aka_subtype_ok(data, subtype)) {
  1023. wpa_printf(MSG_DEBUG, "EAP-AKA: Unrecognized or unexpected "
  1024. "EAP-AKA Subtype in EAP Response");
  1025. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  1026. eap_aka_state(data, NOTIFICATION);
  1027. return;
  1028. }
  1029. if (eap_sim_parse_attr(pos, end, &attr,
  1030. data->eap_method == EAP_TYPE_AKA_PRIME ? 2 : 1,
  1031. 0)) {
  1032. wpa_printf(MSG_DEBUG, "EAP-AKA: Failed to parse attributes");
  1033. data->notification = EAP_SIM_GENERAL_FAILURE_BEFORE_AUTH;
  1034. eap_aka_state(data, NOTIFICATION);
  1035. return;
  1036. }
  1037. if (subtype == EAP_AKA_SUBTYPE_CLIENT_ERROR) {
  1038. eap_aka_process_client_error(sm, data, respData, &attr);
  1039. return;
  1040. }
  1041. if (subtype == EAP_AKA_SUBTYPE_AUTHENTICATION_REJECT) {
  1042. eap_aka_process_authentication_reject(sm, data, respData,
  1043. &attr);
  1044. return;
  1045. }
  1046. switch (data->state) {
  1047. case IDENTITY:
  1048. eap_aka_process_identity(sm, data, respData, &attr);
  1049. break;
  1050. case CHALLENGE:
  1051. if (subtype == EAP_AKA_SUBTYPE_SYNCHRONIZATION_FAILURE) {
  1052. eap_aka_process_sync_failure(sm, data, respData,
  1053. &attr);
  1054. } else {
  1055. eap_aka_process_challenge(sm, data, respData, &attr);
  1056. }
  1057. break;
  1058. case REAUTH:
  1059. eap_aka_process_reauth(sm, data, respData, &attr);
  1060. break;
  1061. case NOTIFICATION:
  1062. eap_aka_process_notification(sm, data, respData, &attr);
  1063. break;
  1064. default:
  1065. wpa_printf(MSG_DEBUG, "EAP-AKA: Unknown state %d in "
  1066. "process", data->state);
  1067. break;
  1068. }
  1069. }
  1070. static Boolean eap_aka_isDone(struct eap_sm *sm, void *priv)
  1071. {
  1072. struct eap_aka_data *data = priv;
  1073. return data->state == SUCCESS || data->state == FAILURE;
  1074. }
  1075. static u8 * eap_aka_getKey(struct eap_sm *sm, void *priv, size_t *len)
  1076. {
  1077. struct eap_aka_data *data = priv;
  1078. u8 *key;
  1079. if (data->state != SUCCESS)
  1080. return NULL;
  1081. key = os_malloc(EAP_SIM_KEYING_DATA_LEN);
  1082. if (key == NULL)
  1083. return NULL;
  1084. os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
  1085. *len = EAP_SIM_KEYING_DATA_LEN;
  1086. return key;
  1087. }
  1088. static u8 * eap_aka_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
  1089. {
  1090. struct eap_aka_data *data = priv;
  1091. u8 *key;
  1092. if (data->state != SUCCESS)
  1093. return NULL;
  1094. key = os_malloc(EAP_EMSK_LEN);
  1095. if (key == NULL)
  1096. return NULL;
  1097. os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  1098. *len = EAP_EMSK_LEN;
  1099. return key;
  1100. }
  1101. static Boolean eap_aka_isSuccess(struct eap_sm *sm, void *priv)
  1102. {
  1103. struct eap_aka_data *data = priv;
  1104. return data->state == SUCCESS;
  1105. }
  1106. static u8 * eap_aka_get_session_id(struct eap_sm *sm, void *priv, size_t *len)
  1107. {
  1108. struct eap_aka_data *data = priv;
  1109. u8 *id;
  1110. if (data->state != SUCCESS)
  1111. return NULL;
  1112. *len = 1 + EAP_AKA_RAND_LEN + EAP_AKA_AUTN_LEN;
  1113. id = os_malloc(*len);
  1114. if (id == NULL)
  1115. return NULL;
  1116. id[0] = data->eap_method;
  1117. os_memcpy(id + 1, data->rand, EAP_AKA_RAND_LEN);
  1118. os_memcpy(id + 1 + EAP_AKA_RAND_LEN, data->autn, EAP_AKA_AUTN_LEN);
  1119. wpa_hexdump(MSG_DEBUG, "EAP-AKA: Derived Session-Id", id, *len);
  1120. return id;
  1121. }
  1122. int eap_server_aka_register(void)
  1123. {
  1124. struct eap_method *eap;
  1125. eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
  1126. EAP_VENDOR_IETF, EAP_TYPE_AKA, "AKA");
  1127. if (eap == NULL)
  1128. return -1;
  1129. eap->init = eap_aka_init;
  1130. eap->reset = eap_aka_reset;
  1131. eap->buildReq = eap_aka_buildReq;
  1132. eap->check = eap_aka_check;
  1133. eap->process = eap_aka_process;
  1134. eap->isDone = eap_aka_isDone;
  1135. eap->getKey = eap_aka_getKey;
  1136. eap->isSuccess = eap_aka_isSuccess;
  1137. eap->get_emsk = eap_aka_get_emsk;
  1138. eap->getSessionId = eap_aka_get_session_id;
  1139. return eap_server_method_register(eap);
  1140. }
  1141. #ifdef EAP_SERVER_AKA_PRIME
  1142. int eap_server_aka_prime_register(void)
  1143. {
  1144. struct eap_method *eap;
  1145. eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
  1146. EAP_VENDOR_IETF, EAP_TYPE_AKA_PRIME,
  1147. "AKA'");
  1148. if (eap == NULL)
  1149. return -1;
  1150. eap->init = eap_aka_prime_init;
  1151. eap->reset = eap_aka_reset;
  1152. eap->buildReq = eap_aka_buildReq;
  1153. eap->check = eap_aka_check;
  1154. eap->process = eap_aka_process;
  1155. eap->isDone = eap_aka_isDone;
  1156. eap->getKey = eap_aka_getKey;
  1157. eap->isSuccess = eap_aka_isSuccess;
  1158. eap->get_emsk = eap_aka_get_emsk;
  1159. eap->getSessionId = eap_aka_get_session_id;
  1160. return eap_server_method_register(eap);
  1161. }
  1162. #endif /* EAP_SERVER_AKA_PRIME */