eap_server_ttls.c 36 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359
  1. /*
  2. * hostapd / EAP-TTLS (RFC 5281)
  3. * Copyright (c) 2004-2011, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/ms_funcs.h"
  11. #include "crypto/sha1.h"
  12. #include "crypto/tls.h"
  13. #include "eap_server/eap_i.h"
  14. #include "eap_server/eap_tls_common.h"
  15. #include "eap_common/chap.h"
  16. #include "eap_common/eap_ttls.h"
  17. #define EAP_TTLS_VERSION 0
  18. static void eap_ttls_reset(struct eap_sm *sm, void *priv);
  19. struct eap_ttls_data {
  20. struct eap_ssl_data ssl;
  21. enum {
  22. START, PHASE1, PHASE2_START, PHASE2_METHOD,
  23. PHASE2_MSCHAPV2_RESP, SUCCESS, FAILURE
  24. } state;
  25. int ttls_version;
  26. const struct eap_method *phase2_method;
  27. void *phase2_priv;
  28. int mschapv2_resp_ok;
  29. u8 mschapv2_auth_response[20];
  30. u8 mschapv2_ident;
  31. struct wpabuf *pending_phase2_eap_resp;
  32. int tnc_started;
  33. };
  34. static const char * eap_ttls_state_txt(int state)
  35. {
  36. switch (state) {
  37. case START:
  38. return "START";
  39. case PHASE1:
  40. return "PHASE1";
  41. case PHASE2_START:
  42. return "PHASE2_START";
  43. case PHASE2_METHOD:
  44. return "PHASE2_METHOD";
  45. case PHASE2_MSCHAPV2_RESP:
  46. return "PHASE2_MSCHAPV2_RESP";
  47. case SUCCESS:
  48. return "SUCCESS";
  49. case FAILURE:
  50. return "FAILURE";
  51. default:
  52. return "Unknown?!";
  53. }
  54. }
  55. static void eap_ttls_state(struct eap_ttls_data *data, int state)
  56. {
  57. wpa_printf(MSG_DEBUG, "EAP-TTLS: %s -> %s",
  58. eap_ttls_state_txt(data->state),
  59. eap_ttls_state_txt(state));
  60. data->state = state;
  61. if (state == FAILURE)
  62. tls_connection_remove_session(data->ssl.conn);
  63. }
  64. static void eap_ttls_valid_session(struct eap_sm *sm,
  65. struct eap_ttls_data *data)
  66. {
  67. struct wpabuf *buf;
  68. if (!sm->tls_session_lifetime)
  69. return;
  70. buf = wpabuf_alloc(1 + 1 + sm->identity_len);
  71. if (!buf)
  72. return;
  73. wpabuf_put_u8(buf, EAP_TYPE_TTLS);
  74. if (sm->identity) {
  75. u8 id_len;
  76. if (sm->identity_len <= 255)
  77. id_len = sm->identity_len;
  78. else
  79. id_len = 255;
  80. wpabuf_put_u8(buf, id_len);
  81. wpabuf_put_data(buf, sm->identity, id_len);
  82. } else {
  83. wpabuf_put_u8(buf, 0);
  84. }
  85. tls_connection_set_success_data(data->ssl.conn, buf);
  86. }
  87. static u8 * eap_ttls_avp_hdr(u8 *avphdr, u32 avp_code, u32 vendor_id,
  88. int mandatory, size_t len)
  89. {
  90. struct ttls_avp_vendor *avp;
  91. u8 flags;
  92. size_t hdrlen;
  93. avp = (struct ttls_avp_vendor *) avphdr;
  94. flags = mandatory ? AVP_FLAGS_MANDATORY : 0;
  95. if (vendor_id) {
  96. flags |= AVP_FLAGS_VENDOR;
  97. hdrlen = sizeof(*avp);
  98. avp->vendor_id = host_to_be32(vendor_id);
  99. } else {
  100. hdrlen = sizeof(struct ttls_avp);
  101. }
  102. avp->avp_code = host_to_be32(avp_code);
  103. avp->avp_length = host_to_be32(((u32) flags << 24) |
  104. ((u32) (hdrlen + len)));
  105. return avphdr + hdrlen;
  106. }
  107. static struct wpabuf * eap_ttls_avp_encapsulate(struct wpabuf *resp,
  108. u32 avp_code, int mandatory)
  109. {
  110. struct wpabuf *avp;
  111. u8 *pos;
  112. avp = wpabuf_alloc(sizeof(struct ttls_avp) + wpabuf_len(resp) + 4);
  113. if (avp == NULL) {
  114. wpabuf_free(resp);
  115. return NULL;
  116. }
  117. pos = eap_ttls_avp_hdr(wpabuf_mhead(avp), avp_code, 0, mandatory,
  118. wpabuf_len(resp));
  119. os_memcpy(pos, wpabuf_head(resp), wpabuf_len(resp));
  120. pos += wpabuf_len(resp);
  121. AVP_PAD((const u8 *) wpabuf_head(avp), pos);
  122. wpabuf_free(resp);
  123. wpabuf_put(avp, pos - (u8 *) wpabuf_head(avp));
  124. return avp;
  125. }
  126. struct eap_ttls_avp {
  127. /* Note: eap is allocated memory; caller is responsible for freeing
  128. * it. All the other pointers are pointing to the packet data, i.e.,
  129. * they must not be freed separately. */
  130. u8 *eap;
  131. size_t eap_len;
  132. u8 *user_name;
  133. size_t user_name_len;
  134. u8 *user_password;
  135. size_t user_password_len;
  136. u8 *chap_challenge;
  137. size_t chap_challenge_len;
  138. u8 *chap_password;
  139. size_t chap_password_len;
  140. u8 *mschap_challenge;
  141. size_t mschap_challenge_len;
  142. u8 *mschap_response;
  143. size_t mschap_response_len;
  144. u8 *mschap2_response;
  145. size_t mschap2_response_len;
  146. };
  147. static int eap_ttls_avp_parse(struct wpabuf *buf, struct eap_ttls_avp *parse)
  148. {
  149. struct ttls_avp *avp;
  150. u8 *pos;
  151. int left;
  152. pos = wpabuf_mhead(buf);
  153. left = wpabuf_len(buf);
  154. os_memset(parse, 0, sizeof(*parse));
  155. while (left > 0) {
  156. u32 avp_code, avp_length, vendor_id = 0;
  157. u8 avp_flags, *dpos;
  158. size_t pad, dlen;
  159. avp = (struct ttls_avp *) pos;
  160. avp_code = be_to_host32(avp->avp_code);
  161. avp_length = be_to_host32(avp->avp_length);
  162. avp_flags = (avp_length >> 24) & 0xff;
  163. avp_length &= 0xffffff;
  164. wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP: code=%d flags=0x%02x "
  165. "length=%d", (int) avp_code, avp_flags,
  166. (int) avp_length);
  167. if ((int) avp_length > left) {
  168. wpa_printf(MSG_WARNING, "EAP-TTLS: AVP overflow "
  169. "(len=%d, left=%d) - dropped",
  170. (int) avp_length, left);
  171. goto fail;
  172. }
  173. if (avp_length < sizeof(*avp)) {
  174. wpa_printf(MSG_WARNING, "EAP-TTLS: Invalid AVP length "
  175. "%d", avp_length);
  176. goto fail;
  177. }
  178. dpos = (u8 *) (avp + 1);
  179. dlen = avp_length - sizeof(*avp);
  180. if (avp_flags & AVP_FLAGS_VENDOR) {
  181. if (dlen < 4) {
  182. wpa_printf(MSG_WARNING, "EAP-TTLS: vendor AVP "
  183. "underflow");
  184. goto fail;
  185. }
  186. vendor_id = be_to_host32(* (be32 *) dpos);
  187. wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP vendor_id %d",
  188. (int) vendor_id);
  189. dpos += 4;
  190. dlen -= 4;
  191. }
  192. wpa_hexdump(MSG_DEBUG, "EAP-TTLS: AVP data", dpos, dlen);
  193. if (vendor_id == 0 && avp_code == RADIUS_ATTR_EAP_MESSAGE) {
  194. wpa_printf(MSG_DEBUG, "EAP-TTLS: AVP - EAP Message");
  195. if (parse->eap == NULL) {
  196. parse->eap = os_malloc(dlen);
  197. if (parse->eap == NULL) {
  198. wpa_printf(MSG_WARNING, "EAP-TTLS: "
  199. "failed to allocate memory "
  200. "for Phase 2 EAP data");
  201. goto fail;
  202. }
  203. os_memcpy(parse->eap, dpos, dlen);
  204. parse->eap_len = dlen;
  205. } else {
  206. u8 *neweap = os_realloc(parse->eap,
  207. parse->eap_len + dlen);
  208. if (neweap == NULL) {
  209. wpa_printf(MSG_WARNING, "EAP-TTLS: "
  210. "failed to allocate memory "
  211. "for Phase 2 EAP data");
  212. goto fail;
  213. }
  214. os_memcpy(neweap + parse->eap_len, dpos, dlen);
  215. parse->eap = neweap;
  216. parse->eap_len += dlen;
  217. }
  218. } else if (vendor_id == 0 &&
  219. avp_code == RADIUS_ATTR_USER_NAME) {
  220. wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: User-Name",
  221. dpos, dlen);
  222. parse->user_name = dpos;
  223. parse->user_name_len = dlen;
  224. } else if (vendor_id == 0 &&
  225. avp_code == RADIUS_ATTR_USER_PASSWORD) {
  226. u8 *password = dpos;
  227. size_t password_len = dlen;
  228. while (password_len > 0 &&
  229. password[password_len - 1] == '\0') {
  230. password_len--;
  231. }
  232. wpa_hexdump_ascii_key(MSG_DEBUG, "EAP-TTLS: "
  233. "User-Password (PAP)",
  234. password, password_len);
  235. parse->user_password = password;
  236. parse->user_password_len = password_len;
  237. } else if (vendor_id == 0 &&
  238. avp_code == RADIUS_ATTR_CHAP_CHALLENGE) {
  239. wpa_hexdump(MSG_DEBUG,
  240. "EAP-TTLS: CHAP-Challenge (CHAP)",
  241. dpos, dlen);
  242. parse->chap_challenge = dpos;
  243. parse->chap_challenge_len = dlen;
  244. } else if (vendor_id == 0 &&
  245. avp_code == RADIUS_ATTR_CHAP_PASSWORD) {
  246. wpa_hexdump(MSG_DEBUG,
  247. "EAP-TTLS: CHAP-Password (CHAP)",
  248. dpos, dlen);
  249. parse->chap_password = dpos;
  250. parse->chap_password_len = dlen;
  251. } else if (vendor_id == RADIUS_VENDOR_ID_MICROSOFT &&
  252. avp_code == RADIUS_ATTR_MS_CHAP_CHALLENGE) {
  253. wpa_hexdump(MSG_DEBUG,
  254. "EAP-TTLS: MS-CHAP-Challenge",
  255. dpos, dlen);
  256. parse->mschap_challenge = dpos;
  257. parse->mschap_challenge_len = dlen;
  258. } else if (vendor_id == RADIUS_VENDOR_ID_MICROSOFT &&
  259. avp_code == RADIUS_ATTR_MS_CHAP_RESPONSE) {
  260. wpa_hexdump(MSG_DEBUG,
  261. "EAP-TTLS: MS-CHAP-Response (MSCHAP)",
  262. dpos, dlen);
  263. parse->mschap_response = dpos;
  264. parse->mschap_response_len = dlen;
  265. } else if (vendor_id == RADIUS_VENDOR_ID_MICROSOFT &&
  266. avp_code == RADIUS_ATTR_MS_CHAP2_RESPONSE) {
  267. wpa_hexdump(MSG_DEBUG,
  268. "EAP-TTLS: MS-CHAP2-Response (MSCHAPV2)",
  269. dpos, dlen);
  270. parse->mschap2_response = dpos;
  271. parse->mschap2_response_len = dlen;
  272. } else if (avp_flags & AVP_FLAGS_MANDATORY) {
  273. wpa_printf(MSG_WARNING, "EAP-TTLS: Unsupported "
  274. "mandatory AVP code %d vendor_id %d - "
  275. "dropped", (int) avp_code, (int) vendor_id);
  276. goto fail;
  277. } else {
  278. wpa_printf(MSG_DEBUG, "EAP-TTLS: Ignoring unsupported "
  279. "AVP code %d vendor_id %d",
  280. (int) avp_code, (int) vendor_id);
  281. }
  282. pad = (4 - (avp_length & 3)) & 3;
  283. pos += avp_length + pad;
  284. left -= avp_length + pad;
  285. }
  286. return 0;
  287. fail:
  288. os_free(parse->eap);
  289. parse->eap = NULL;
  290. return -1;
  291. }
  292. static u8 * eap_ttls_implicit_challenge(struct eap_sm *sm,
  293. struct eap_ttls_data *data, size_t len)
  294. {
  295. return eap_server_tls_derive_key(sm, &data->ssl, "ttls challenge",
  296. len);
  297. }
  298. static void * eap_ttls_init(struct eap_sm *sm)
  299. {
  300. struct eap_ttls_data *data;
  301. data = os_zalloc(sizeof(*data));
  302. if (data == NULL)
  303. return NULL;
  304. data->ttls_version = EAP_TTLS_VERSION;
  305. data->state = START;
  306. if (eap_server_tls_ssl_init(sm, &data->ssl, 0, EAP_TYPE_TTLS)) {
  307. wpa_printf(MSG_INFO, "EAP-TTLS: Failed to initialize SSL.");
  308. eap_ttls_reset(sm, data);
  309. return NULL;
  310. }
  311. return data;
  312. }
  313. static void eap_ttls_reset(struct eap_sm *sm, void *priv)
  314. {
  315. struct eap_ttls_data *data = priv;
  316. if (data == NULL)
  317. return;
  318. if (data->phase2_priv && data->phase2_method)
  319. data->phase2_method->reset(sm, data->phase2_priv);
  320. eap_server_tls_ssl_deinit(sm, &data->ssl);
  321. wpabuf_free(data->pending_phase2_eap_resp);
  322. bin_clear_free(data, sizeof(*data));
  323. }
  324. static struct wpabuf * eap_ttls_build_start(struct eap_sm *sm,
  325. struct eap_ttls_data *data, u8 id)
  326. {
  327. struct wpabuf *req;
  328. req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TTLS, 1,
  329. EAP_CODE_REQUEST, id);
  330. if (req == NULL) {
  331. wpa_printf(MSG_ERROR, "EAP-TTLS: Failed to allocate memory for"
  332. " request");
  333. eap_ttls_state(data, FAILURE);
  334. return NULL;
  335. }
  336. wpabuf_put_u8(req, EAP_TLS_FLAGS_START | data->ttls_version);
  337. eap_ttls_state(data, PHASE1);
  338. return req;
  339. }
  340. static struct wpabuf * eap_ttls_build_phase2_eap_req(
  341. struct eap_sm *sm, struct eap_ttls_data *data, u8 id)
  342. {
  343. struct wpabuf *buf, *encr_req;
  344. buf = data->phase2_method->buildReq(sm, data->phase2_priv, id);
  345. if (buf == NULL)
  346. return NULL;
  347. wpa_hexdump_buf_key(MSG_DEBUG,
  348. "EAP-TTLS/EAP: Encapsulate Phase 2 data", buf);
  349. buf = eap_ttls_avp_encapsulate(buf, RADIUS_ATTR_EAP_MESSAGE, 1);
  350. if (buf == NULL) {
  351. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Failed to encapsulate "
  352. "packet");
  353. return NULL;
  354. }
  355. wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS/EAP: Encrypt encapsulated "
  356. "Phase 2 data", buf);
  357. encr_req = eap_server_tls_encrypt(sm, &data->ssl, buf);
  358. wpabuf_free(buf);
  359. return encr_req;
  360. }
  361. static struct wpabuf * eap_ttls_build_phase2_mschapv2(
  362. struct eap_sm *sm, struct eap_ttls_data *data)
  363. {
  364. struct wpabuf *encr_req, msgbuf;
  365. u8 *req, *pos, *end;
  366. int ret;
  367. pos = req = os_malloc(100);
  368. if (req == NULL)
  369. return NULL;
  370. end = req + 100;
  371. if (data->mschapv2_resp_ok) {
  372. pos = eap_ttls_avp_hdr(pos, RADIUS_ATTR_MS_CHAP2_SUCCESS,
  373. RADIUS_VENDOR_ID_MICROSOFT, 1, 43);
  374. *pos++ = data->mschapv2_ident;
  375. ret = os_snprintf((char *) pos, end - pos, "S=");
  376. if (!os_snprintf_error(end - pos, ret))
  377. pos += ret;
  378. pos += wpa_snprintf_hex_uppercase(
  379. (char *) pos, end - pos, data->mschapv2_auth_response,
  380. sizeof(data->mschapv2_auth_response));
  381. } else {
  382. pos = eap_ttls_avp_hdr(pos, RADIUS_ATTR_MS_CHAP_ERROR,
  383. RADIUS_VENDOR_ID_MICROSOFT, 1, 6);
  384. os_memcpy(pos, "Failed", 6);
  385. pos += 6;
  386. AVP_PAD(req, pos);
  387. }
  388. wpabuf_set(&msgbuf, req, pos - req);
  389. wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Encrypting Phase 2 "
  390. "data", &msgbuf);
  391. encr_req = eap_server_tls_encrypt(sm, &data->ssl, &msgbuf);
  392. os_free(req);
  393. return encr_req;
  394. }
  395. static struct wpabuf * eap_ttls_buildReq(struct eap_sm *sm, void *priv, u8 id)
  396. {
  397. struct eap_ttls_data *data = priv;
  398. if (data->ssl.state == FRAG_ACK) {
  399. return eap_server_tls_build_ack(id, EAP_TYPE_TTLS,
  400. data->ttls_version);
  401. }
  402. if (data->ssl.state == WAIT_FRAG_ACK) {
  403. return eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TTLS,
  404. data->ttls_version, id);
  405. }
  406. switch (data->state) {
  407. case START:
  408. return eap_ttls_build_start(sm, data, id);
  409. case PHASE1:
  410. if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) {
  411. wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase1 done, "
  412. "starting Phase2");
  413. eap_ttls_state(data, PHASE2_START);
  414. }
  415. break;
  416. case PHASE2_METHOD:
  417. wpabuf_free(data->ssl.tls_out);
  418. data->ssl.tls_out_pos = 0;
  419. data->ssl.tls_out = eap_ttls_build_phase2_eap_req(sm, data,
  420. id);
  421. break;
  422. case PHASE2_MSCHAPV2_RESP:
  423. wpabuf_free(data->ssl.tls_out);
  424. data->ssl.tls_out_pos = 0;
  425. data->ssl.tls_out = eap_ttls_build_phase2_mschapv2(sm, data);
  426. break;
  427. default:
  428. wpa_printf(MSG_DEBUG, "EAP-TTLS: %s - unexpected state %d",
  429. __func__, data->state);
  430. return NULL;
  431. }
  432. return eap_server_tls_build_msg(&data->ssl, EAP_TYPE_TTLS,
  433. data->ttls_version, id);
  434. }
  435. static Boolean eap_ttls_check(struct eap_sm *sm, void *priv,
  436. struct wpabuf *respData)
  437. {
  438. const u8 *pos;
  439. size_t len;
  440. pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_TTLS, respData, &len);
  441. if (pos == NULL || len < 1) {
  442. wpa_printf(MSG_INFO, "EAP-TTLS: Invalid frame");
  443. return TRUE;
  444. }
  445. return FALSE;
  446. }
  447. static void eap_ttls_process_phase2_pap(struct eap_sm *sm,
  448. struct eap_ttls_data *data,
  449. const u8 *user_password,
  450. size_t user_password_len)
  451. {
  452. if (!sm->user || !sm->user->password || sm->user->password_hash ||
  453. !(sm->user->ttls_auth & EAP_TTLS_AUTH_PAP)) {
  454. wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: No plaintext user "
  455. "password configured");
  456. eap_ttls_state(data, FAILURE);
  457. return;
  458. }
  459. if (sm->user->password_len != user_password_len ||
  460. os_memcmp_const(sm->user->password, user_password,
  461. user_password_len) != 0) {
  462. wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Invalid user password");
  463. eap_ttls_state(data, FAILURE);
  464. return;
  465. }
  466. wpa_printf(MSG_DEBUG, "EAP-TTLS/PAP: Correct user password");
  467. eap_ttls_state(data, SUCCESS);
  468. eap_ttls_valid_session(sm, data);
  469. }
  470. static void eap_ttls_process_phase2_chap(struct eap_sm *sm,
  471. struct eap_ttls_data *data,
  472. const u8 *challenge,
  473. size_t challenge_len,
  474. const u8 *password,
  475. size_t password_len)
  476. {
  477. u8 *chal, hash[CHAP_MD5_LEN];
  478. if (challenge == NULL || password == NULL ||
  479. challenge_len != EAP_TTLS_CHAP_CHALLENGE_LEN ||
  480. password_len != 1 + EAP_TTLS_CHAP_PASSWORD_LEN) {
  481. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Invalid CHAP attributes "
  482. "(challenge len %lu password len %lu)",
  483. (unsigned long) challenge_len,
  484. (unsigned long) password_len);
  485. eap_ttls_state(data, FAILURE);
  486. return;
  487. }
  488. if (!sm->user || !sm->user->password || sm->user->password_hash ||
  489. !(sm->user->ttls_auth & EAP_TTLS_AUTH_CHAP)) {
  490. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: No plaintext user "
  491. "password configured");
  492. eap_ttls_state(data, FAILURE);
  493. return;
  494. }
  495. chal = eap_ttls_implicit_challenge(sm, data,
  496. EAP_TTLS_CHAP_CHALLENGE_LEN + 1);
  497. if (chal == NULL) {
  498. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Failed to generate "
  499. "challenge from TLS data");
  500. eap_ttls_state(data, FAILURE);
  501. return;
  502. }
  503. if (os_memcmp_const(challenge, chal, EAP_TTLS_CHAP_CHALLENGE_LEN)
  504. != 0 ||
  505. password[0] != chal[EAP_TTLS_CHAP_CHALLENGE_LEN]) {
  506. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Challenge mismatch");
  507. os_free(chal);
  508. eap_ttls_state(data, FAILURE);
  509. return;
  510. }
  511. os_free(chal);
  512. /* MD5(Ident + Password + Challenge) */
  513. chap_md5(password[0], sm->user->password, sm->user->password_len,
  514. challenge, challenge_len, hash);
  515. if (os_memcmp_const(hash, password + 1, EAP_TTLS_CHAP_PASSWORD_LEN) ==
  516. 0) {
  517. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Correct user password");
  518. eap_ttls_state(data, SUCCESS);
  519. eap_ttls_valid_session(sm, data);
  520. } else {
  521. wpa_printf(MSG_DEBUG, "EAP-TTLS/CHAP: Invalid user password");
  522. eap_ttls_state(data, FAILURE);
  523. }
  524. }
  525. static void eap_ttls_process_phase2_mschap(struct eap_sm *sm,
  526. struct eap_ttls_data *data,
  527. u8 *challenge, size_t challenge_len,
  528. u8 *response, size_t response_len)
  529. {
  530. u8 *chal, nt_response[24];
  531. if (challenge == NULL || response == NULL ||
  532. challenge_len != EAP_TTLS_MSCHAP_CHALLENGE_LEN ||
  533. response_len != EAP_TTLS_MSCHAP_RESPONSE_LEN) {
  534. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Invalid MS-CHAP "
  535. "attributes (challenge len %lu response len %lu)",
  536. (unsigned long) challenge_len,
  537. (unsigned long) response_len);
  538. eap_ttls_state(data, FAILURE);
  539. return;
  540. }
  541. if (!sm->user || !sm->user->password ||
  542. !(sm->user->ttls_auth & EAP_TTLS_AUTH_MSCHAP)) {
  543. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: No user password "
  544. "configured");
  545. eap_ttls_state(data, FAILURE);
  546. return;
  547. }
  548. chal = eap_ttls_implicit_challenge(sm, data,
  549. EAP_TTLS_MSCHAP_CHALLENGE_LEN + 1);
  550. if (chal == NULL) {
  551. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Failed to generate "
  552. "challenge from TLS data");
  553. eap_ttls_state(data, FAILURE);
  554. return;
  555. }
  556. #ifdef CONFIG_TESTING_OPTIONS
  557. eap_server_mschap_rx_callback(sm, "TTLS-MSCHAP",
  558. sm->identity, sm->identity_len,
  559. challenge, response + 2 + 24);
  560. #endif /* CONFIG_TESTING_OPTIONS */
  561. if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAP_CHALLENGE_LEN)
  562. != 0 ||
  563. response[0] != chal[EAP_TTLS_MSCHAP_CHALLENGE_LEN]) {
  564. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Challenge mismatch");
  565. os_free(chal);
  566. eap_ttls_state(data, FAILURE);
  567. return;
  568. }
  569. os_free(chal);
  570. if ((sm->user->password_hash &&
  571. challenge_response(challenge, sm->user->password, nt_response)) ||
  572. (!sm->user->password_hash &&
  573. nt_challenge_response(challenge, sm->user->password,
  574. sm->user->password_len, nt_response))) {
  575. eap_ttls_state(data, FAILURE);
  576. return;
  577. }
  578. if (os_memcmp_const(nt_response, response + 2 + 24, 24) == 0) {
  579. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Correct response");
  580. eap_ttls_state(data, SUCCESS);
  581. eap_ttls_valid_session(sm, data);
  582. } else {
  583. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAP: Invalid NT-Response");
  584. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Received",
  585. response + 2 + 24, 24);
  586. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAP: Expected",
  587. nt_response, 24);
  588. eap_ttls_state(data, FAILURE);
  589. }
  590. }
  591. static void eap_ttls_process_phase2_mschapv2(struct eap_sm *sm,
  592. struct eap_ttls_data *data,
  593. u8 *challenge,
  594. size_t challenge_len,
  595. u8 *response, size_t response_len)
  596. {
  597. u8 *chal, *username, nt_response[24], *rx_resp, *peer_challenge,
  598. *auth_challenge;
  599. size_t username_len, i;
  600. if (challenge == NULL || response == NULL ||
  601. challenge_len != EAP_TTLS_MSCHAPV2_CHALLENGE_LEN ||
  602. response_len != EAP_TTLS_MSCHAPV2_RESPONSE_LEN) {
  603. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Invalid MS-CHAP2 "
  604. "attributes (challenge len %lu response len %lu)",
  605. (unsigned long) challenge_len,
  606. (unsigned long) response_len);
  607. eap_ttls_state(data, FAILURE);
  608. return;
  609. }
  610. if (!sm->user || !sm->user->password ||
  611. !(sm->user->ttls_auth & EAP_TTLS_AUTH_MSCHAPV2)) {
  612. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user password "
  613. "configured");
  614. eap_ttls_state(data, FAILURE);
  615. return;
  616. }
  617. if (sm->identity == NULL) {
  618. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: No user identity "
  619. "known");
  620. eap_ttls_state(data, FAILURE);
  621. return;
  622. }
  623. /* MSCHAPv2 does not include optional domain name in the
  624. * challenge-response calculation, so remove domain prefix
  625. * (if present). */
  626. username = sm->identity;
  627. username_len = sm->identity_len;
  628. for (i = 0; i < username_len; i++) {
  629. if (username[i] == '\\') {
  630. username_len -= i + 1;
  631. username += i + 1;
  632. break;
  633. }
  634. }
  635. chal = eap_ttls_implicit_challenge(
  636. sm, data, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN + 1);
  637. if (chal == NULL) {
  638. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Failed to generate "
  639. "challenge from TLS data");
  640. eap_ttls_state(data, FAILURE);
  641. return;
  642. }
  643. if (os_memcmp_const(challenge, chal, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN)
  644. != 0 ||
  645. response[0] != chal[EAP_TTLS_MSCHAPV2_CHALLENGE_LEN]) {
  646. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Challenge mismatch");
  647. os_free(chal);
  648. eap_ttls_state(data, FAILURE);
  649. return;
  650. }
  651. os_free(chal);
  652. auth_challenge = challenge;
  653. peer_challenge = response + 2;
  654. wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: User",
  655. username, username_len);
  656. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: auth_challenge",
  657. auth_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
  658. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: peer_challenge",
  659. peer_challenge, EAP_TTLS_MSCHAPV2_CHALLENGE_LEN);
  660. if (sm->user->password_hash) {
  661. generate_nt_response_pwhash(auth_challenge, peer_challenge,
  662. username, username_len,
  663. sm->user->password,
  664. nt_response);
  665. } else {
  666. generate_nt_response(auth_challenge, peer_challenge,
  667. username, username_len,
  668. sm->user->password,
  669. sm->user->password_len,
  670. nt_response);
  671. }
  672. rx_resp = response + 2 + EAP_TTLS_MSCHAPV2_CHALLENGE_LEN + 8;
  673. #ifdef CONFIG_TESTING_OPTIONS
  674. {
  675. u8 challenge2[8];
  676. if (challenge_hash(peer_challenge, auth_challenge,
  677. username, username_len, challenge2) == 0) {
  678. eap_server_mschap_rx_callback(sm, "TTLS-MSCHAPV2",
  679. username, username_len,
  680. challenge2, rx_resp);
  681. }
  682. }
  683. #endif /* CONFIG_TESTING_OPTIONS */
  684. if (os_memcmp_const(nt_response, rx_resp, 24) == 0) {
  685. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Correct "
  686. "NT-Response");
  687. data->mschapv2_resp_ok = 1;
  688. if (sm->user->password_hash) {
  689. generate_authenticator_response_pwhash(
  690. sm->user->password,
  691. peer_challenge, auth_challenge,
  692. username, username_len, nt_response,
  693. data->mschapv2_auth_response);
  694. } else {
  695. generate_authenticator_response(
  696. sm->user->password, sm->user->password_len,
  697. peer_challenge, auth_challenge,
  698. username, username_len, nt_response,
  699. data->mschapv2_auth_response);
  700. }
  701. } else {
  702. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Invalid "
  703. "NT-Response");
  704. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Received",
  705. rx_resp, 24);
  706. wpa_hexdump(MSG_MSGDUMP, "EAP-TTLS/MSCHAPV2: Expected",
  707. nt_response, 24);
  708. data->mschapv2_resp_ok = 0;
  709. }
  710. eap_ttls_state(data, PHASE2_MSCHAPV2_RESP);
  711. data->mschapv2_ident = response[0];
  712. }
  713. static int eap_ttls_phase2_eap_init(struct eap_sm *sm,
  714. struct eap_ttls_data *data,
  715. EapType eap_type)
  716. {
  717. if (data->phase2_priv && data->phase2_method) {
  718. data->phase2_method->reset(sm, data->phase2_priv);
  719. data->phase2_method = NULL;
  720. data->phase2_priv = NULL;
  721. }
  722. data->phase2_method = eap_server_get_eap_method(EAP_VENDOR_IETF,
  723. eap_type);
  724. if (!data->phase2_method)
  725. return -1;
  726. sm->init_phase2 = 1;
  727. data->phase2_priv = data->phase2_method->init(sm);
  728. sm->init_phase2 = 0;
  729. return data->phase2_priv == NULL ? -1 : 0;
  730. }
  731. static void eap_ttls_process_phase2_eap_response(struct eap_sm *sm,
  732. struct eap_ttls_data *data,
  733. u8 *in_data, size_t in_len)
  734. {
  735. u8 next_type = EAP_TYPE_NONE;
  736. struct eap_hdr *hdr;
  737. u8 *pos;
  738. size_t left;
  739. struct wpabuf buf;
  740. const struct eap_method *m = data->phase2_method;
  741. void *priv = data->phase2_priv;
  742. if (priv == NULL) {
  743. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: %s - Phase2 not "
  744. "initialized?!", __func__);
  745. return;
  746. }
  747. hdr = (struct eap_hdr *) in_data;
  748. pos = (u8 *) (hdr + 1);
  749. if (in_len > sizeof(*hdr) && *pos == EAP_TYPE_NAK) {
  750. left = in_len - sizeof(*hdr);
  751. wpa_hexdump(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 type Nak'ed; "
  752. "allowed types", pos + 1, left - 1);
  753. eap_sm_process_nak(sm, pos + 1, left - 1);
  754. if (sm->user && sm->user_eap_method_index < EAP_MAX_METHODS &&
  755. sm->user->methods[sm->user_eap_method_index].method !=
  756. EAP_TYPE_NONE) {
  757. next_type = sm->user->methods[
  758. sm->user_eap_method_index++].method;
  759. wpa_printf(MSG_DEBUG, "EAP-TTLS: try EAP type %d",
  760. next_type);
  761. if (eap_ttls_phase2_eap_init(sm, data, next_type)) {
  762. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to "
  763. "initialize EAP type %d",
  764. next_type);
  765. eap_ttls_state(data, FAILURE);
  766. return;
  767. }
  768. } else {
  769. eap_ttls_state(data, FAILURE);
  770. }
  771. return;
  772. }
  773. wpabuf_set(&buf, in_data, in_len);
  774. if (m->check(sm, priv, &buf)) {
  775. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 check() asked to "
  776. "ignore the packet");
  777. return;
  778. }
  779. m->process(sm, priv, &buf);
  780. if (sm->method_pending == METHOD_PENDING_WAIT) {
  781. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method is in "
  782. "pending wait state - save decrypted response");
  783. wpabuf_free(data->pending_phase2_eap_resp);
  784. data->pending_phase2_eap_resp = wpabuf_dup(&buf);
  785. }
  786. if (!m->isDone(sm, priv))
  787. return;
  788. if (!m->isSuccess(sm, priv)) {
  789. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: Phase2 method failed");
  790. eap_ttls_state(data, FAILURE);
  791. return;
  792. }
  793. switch (data->state) {
  794. case PHASE2_START:
  795. if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
  796. wpa_hexdump_ascii(MSG_DEBUG, "EAP_TTLS: Phase2 "
  797. "Identity not found in the user "
  798. "database",
  799. sm->identity, sm->identity_len);
  800. eap_ttls_state(data, FAILURE);
  801. break;
  802. }
  803. eap_ttls_state(data, PHASE2_METHOD);
  804. next_type = sm->user->methods[0].method;
  805. sm->user_eap_method_index = 1;
  806. wpa_printf(MSG_DEBUG, "EAP-TTLS: try EAP type %d", next_type);
  807. if (eap_ttls_phase2_eap_init(sm, data, next_type)) {
  808. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to initialize "
  809. "EAP type %d", next_type);
  810. eap_ttls_state(data, FAILURE);
  811. }
  812. break;
  813. case PHASE2_METHOD:
  814. eap_ttls_state(data, SUCCESS);
  815. eap_ttls_valid_session(sm, data);
  816. break;
  817. case FAILURE:
  818. break;
  819. default:
  820. wpa_printf(MSG_DEBUG, "EAP-TTLS: %s - unexpected state %d",
  821. __func__, data->state);
  822. break;
  823. }
  824. }
  825. static void eap_ttls_process_phase2_eap(struct eap_sm *sm,
  826. struct eap_ttls_data *data,
  827. const u8 *eap, size_t eap_len)
  828. {
  829. struct eap_hdr *hdr;
  830. size_t len;
  831. if (data->state == PHASE2_START) {
  832. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: initializing Phase 2");
  833. if (eap_ttls_phase2_eap_init(sm, data, EAP_TYPE_IDENTITY) < 0)
  834. {
  835. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: failed to "
  836. "initialize EAP-Identity");
  837. return;
  838. }
  839. }
  840. if (eap_len < sizeof(*hdr)) {
  841. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: too short Phase 2 EAP "
  842. "packet (len=%lu)", (unsigned long) eap_len);
  843. return;
  844. }
  845. hdr = (struct eap_hdr *) eap;
  846. len = be_to_host16(hdr->length);
  847. wpa_printf(MSG_DEBUG, "EAP-TTLS/EAP: received Phase 2 EAP: code=%d "
  848. "identifier=%d length=%lu", hdr->code, hdr->identifier,
  849. (unsigned long) len);
  850. if (len > eap_len) {
  851. wpa_printf(MSG_INFO, "EAP-TTLS/EAP: Length mismatch in Phase 2"
  852. " EAP frame (hdr len=%lu, data len in AVP=%lu)",
  853. (unsigned long) len, (unsigned long) eap_len);
  854. return;
  855. }
  856. switch (hdr->code) {
  857. case EAP_CODE_RESPONSE:
  858. eap_ttls_process_phase2_eap_response(sm, data, (u8 *) hdr,
  859. len);
  860. break;
  861. default:
  862. wpa_printf(MSG_INFO, "EAP-TTLS/EAP: Unexpected code=%d in "
  863. "Phase 2 EAP header", hdr->code);
  864. break;
  865. }
  866. }
  867. static void eap_ttls_process_phase2(struct eap_sm *sm,
  868. struct eap_ttls_data *data,
  869. struct wpabuf *in_buf)
  870. {
  871. struct wpabuf *in_decrypted;
  872. struct eap_ttls_avp parse;
  873. wpa_printf(MSG_DEBUG, "EAP-TTLS: received %lu bytes encrypted data for"
  874. " Phase 2", (unsigned long) wpabuf_len(in_buf));
  875. if (data->pending_phase2_eap_resp) {
  876. wpa_printf(MSG_DEBUG, "EAP-TTLS: Pending Phase 2 EAP response "
  877. "- skip decryption and use old data");
  878. eap_ttls_process_phase2_eap(
  879. sm, data, wpabuf_head(data->pending_phase2_eap_resp),
  880. wpabuf_len(data->pending_phase2_eap_resp));
  881. wpabuf_free(data->pending_phase2_eap_resp);
  882. data->pending_phase2_eap_resp = NULL;
  883. return;
  884. }
  885. in_decrypted = tls_connection_decrypt(sm->ssl_ctx, data->ssl.conn,
  886. in_buf);
  887. if (in_decrypted == NULL) {
  888. wpa_printf(MSG_INFO, "EAP-TTLS: Failed to decrypt Phase 2 "
  889. "data");
  890. eap_ttls_state(data, FAILURE);
  891. return;
  892. }
  893. wpa_hexdump_buf_key(MSG_DEBUG, "EAP-TTLS: Decrypted Phase 2 EAP",
  894. in_decrypted);
  895. if (eap_ttls_avp_parse(in_decrypted, &parse) < 0) {
  896. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to parse AVPs");
  897. wpabuf_free(in_decrypted);
  898. eap_ttls_state(data, FAILURE);
  899. return;
  900. }
  901. if (parse.user_name) {
  902. char *nbuf;
  903. nbuf = os_malloc(parse.user_name_len * 4 + 1);
  904. if (nbuf) {
  905. printf_encode(nbuf, parse.user_name_len * 4 + 1,
  906. parse.user_name,
  907. parse.user_name_len);
  908. eap_log_msg(sm, "TTLS-User-Name '%s'", nbuf);
  909. os_free(nbuf);
  910. }
  911. os_free(sm->identity);
  912. sm->identity = os_malloc(parse.user_name_len);
  913. if (sm->identity == NULL) {
  914. eap_ttls_state(data, FAILURE);
  915. goto done;
  916. }
  917. os_memcpy(sm->identity, parse.user_name, parse.user_name_len);
  918. sm->identity_len = parse.user_name_len;
  919. if (eap_user_get(sm, parse.user_name, parse.user_name_len, 1)
  920. != 0) {
  921. wpa_printf(MSG_DEBUG, "EAP-TTLS: Phase2 Identity not "
  922. "found in the user database");
  923. eap_ttls_state(data, FAILURE);
  924. goto done;
  925. }
  926. }
  927. #ifdef EAP_SERVER_TNC
  928. if (data->tnc_started && parse.eap == NULL) {
  929. wpa_printf(MSG_DEBUG, "EAP-TTLS: TNC started but no EAP "
  930. "response from peer");
  931. eap_ttls_state(data, FAILURE);
  932. goto done;
  933. }
  934. #endif /* EAP_SERVER_TNC */
  935. if (parse.eap) {
  936. eap_ttls_process_phase2_eap(sm, data, parse.eap,
  937. parse.eap_len);
  938. } else if (parse.user_password) {
  939. eap_ttls_process_phase2_pap(sm, data, parse.user_password,
  940. parse.user_password_len);
  941. } else if (parse.chap_password) {
  942. eap_ttls_process_phase2_chap(sm, data,
  943. parse.chap_challenge,
  944. parse.chap_challenge_len,
  945. parse.chap_password,
  946. parse.chap_password_len);
  947. } else if (parse.mschap_response) {
  948. eap_ttls_process_phase2_mschap(sm, data,
  949. parse.mschap_challenge,
  950. parse.mschap_challenge_len,
  951. parse.mschap_response,
  952. parse.mschap_response_len);
  953. } else if (parse.mschap2_response) {
  954. eap_ttls_process_phase2_mschapv2(sm, data,
  955. parse.mschap_challenge,
  956. parse.mschap_challenge_len,
  957. parse.mschap2_response,
  958. parse.mschap2_response_len);
  959. }
  960. done:
  961. wpabuf_free(in_decrypted);
  962. os_free(parse.eap);
  963. }
  964. static void eap_ttls_start_tnc(struct eap_sm *sm, struct eap_ttls_data *data)
  965. {
  966. #ifdef EAP_SERVER_TNC
  967. if (!sm->tnc || data->state != SUCCESS || data->tnc_started)
  968. return;
  969. wpa_printf(MSG_DEBUG, "EAP-TTLS: Initialize TNC");
  970. if (eap_ttls_phase2_eap_init(sm, data, EAP_TYPE_TNC)) {
  971. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to initialize TNC");
  972. eap_ttls_state(data, FAILURE);
  973. return;
  974. }
  975. data->tnc_started = 1;
  976. eap_ttls_state(data, PHASE2_METHOD);
  977. #endif /* EAP_SERVER_TNC */
  978. }
  979. static int eap_ttls_process_version(struct eap_sm *sm, void *priv,
  980. int peer_version)
  981. {
  982. struct eap_ttls_data *data = priv;
  983. if (peer_version < data->ttls_version) {
  984. wpa_printf(MSG_DEBUG, "EAP-TTLS: peer ver=%d, own ver=%d; "
  985. "use version %d",
  986. peer_version, data->ttls_version, peer_version);
  987. data->ttls_version = peer_version;
  988. }
  989. return 0;
  990. }
  991. static void eap_ttls_process_msg(struct eap_sm *sm, void *priv,
  992. const struct wpabuf *respData)
  993. {
  994. struct eap_ttls_data *data = priv;
  995. switch (data->state) {
  996. case PHASE1:
  997. if (eap_server_tls_phase1(sm, &data->ssl) < 0)
  998. eap_ttls_state(data, FAILURE);
  999. break;
  1000. case PHASE2_START:
  1001. case PHASE2_METHOD:
  1002. eap_ttls_process_phase2(sm, data, data->ssl.tls_in);
  1003. eap_ttls_start_tnc(sm, data);
  1004. break;
  1005. case PHASE2_MSCHAPV2_RESP:
  1006. if (data->mschapv2_resp_ok && wpabuf_len(data->ssl.tls_in) ==
  1007. 0) {
  1008. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Peer "
  1009. "acknowledged response");
  1010. eap_ttls_state(data, SUCCESS);
  1011. eap_ttls_valid_session(sm, data);
  1012. } else if (!data->mschapv2_resp_ok) {
  1013. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Peer "
  1014. "acknowledged error");
  1015. eap_ttls_state(data, FAILURE);
  1016. } else {
  1017. wpa_printf(MSG_DEBUG, "EAP-TTLS/MSCHAPV2: Unexpected "
  1018. "frame from peer (payload len %lu, "
  1019. "expected empty frame)",
  1020. (unsigned long)
  1021. wpabuf_len(data->ssl.tls_in));
  1022. eap_ttls_state(data, FAILURE);
  1023. }
  1024. eap_ttls_start_tnc(sm, data);
  1025. break;
  1026. default:
  1027. wpa_printf(MSG_DEBUG, "EAP-TTLS: Unexpected state %d in %s",
  1028. data->state, __func__);
  1029. break;
  1030. }
  1031. }
  1032. static void eap_ttls_process(struct eap_sm *sm, void *priv,
  1033. struct wpabuf *respData)
  1034. {
  1035. struct eap_ttls_data *data = priv;
  1036. const struct wpabuf *buf;
  1037. const u8 *pos;
  1038. u8 id_len;
  1039. if (eap_server_tls_process(sm, &data->ssl, respData, data,
  1040. EAP_TYPE_TTLS, eap_ttls_process_version,
  1041. eap_ttls_process_msg) < 0) {
  1042. eap_ttls_state(data, FAILURE);
  1043. return;
  1044. }
  1045. if (!tls_connection_established(sm->ssl_ctx, data->ssl.conn) ||
  1046. !tls_connection_resumed(sm->ssl_ctx, data->ssl.conn))
  1047. return;
  1048. buf = tls_connection_get_success_data(data->ssl.conn);
  1049. if (!buf || wpabuf_len(buf) < 1) {
  1050. wpa_printf(MSG_DEBUG,
  1051. "EAP-TTLS: No success data in resumed session - reject attempt");
  1052. eap_ttls_state(data, FAILURE);
  1053. return;
  1054. }
  1055. pos = wpabuf_head(buf);
  1056. if (*pos != EAP_TYPE_TTLS) {
  1057. wpa_printf(MSG_DEBUG,
  1058. "EAP-TTLS: Resumed session for another EAP type (%u) - reject attempt",
  1059. *pos);
  1060. eap_ttls_state(data, FAILURE);
  1061. return;
  1062. }
  1063. pos++;
  1064. id_len = *pos++;
  1065. wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: Identity from cached session",
  1066. pos, id_len);
  1067. os_free(sm->identity);
  1068. sm->identity = os_malloc(id_len ? id_len : 1);
  1069. if (!sm->identity) {
  1070. sm->identity_len = 0;
  1071. eap_ttls_state(data, FAILURE);
  1072. return;
  1073. }
  1074. os_memcpy(sm->identity, pos, id_len);
  1075. sm->identity_len = id_len;
  1076. if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
  1077. wpa_hexdump_ascii(MSG_DEBUG, "EAP-TTLS: Phase2 Identity not found in the user database",
  1078. sm->identity, sm->identity_len);
  1079. eap_ttls_state(data, FAILURE);
  1080. return;
  1081. }
  1082. wpa_printf(MSG_DEBUG,
  1083. "EAP-TTLS: Resuming previous session - skip Phase2");
  1084. eap_ttls_state(data, SUCCESS);
  1085. tls_connection_set_success_data_resumed(data->ssl.conn);
  1086. }
  1087. static Boolean eap_ttls_isDone(struct eap_sm *sm, void *priv)
  1088. {
  1089. struct eap_ttls_data *data = priv;
  1090. return data->state == SUCCESS || data->state == FAILURE;
  1091. }
  1092. static u8 * eap_ttls_getKey(struct eap_sm *sm, void *priv, size_t *len)
  1093. {
  1094. struct eap_ttls_data *data = priv;
  1095. u8 *eapKeyData;
  1096. if (data->state != SUCCESS)
  1097. return NULL;
  1098. eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
  1099. "ttls keying material",
  1100. EAP_TLS_KEY_LEN);
  1101. if (eapKeyData) {
  1102. *len = EAP_TLS_KEY_LEN;
  1103. wpa_hexdump_key(MSG_DEBUG, "EAP-TTLS: Derived key",
  1104. eapKeyData, EAP_TLS_KEY_LEN);
  1105. } else {
  1106. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive key");
  1107. }
  1108. return eapKeyData;
  1109. }
  1110. static Boolean eap_ttls_isSuccess(struct eap_sm *sm, void *priv)
  1111. {
  1112. struct eap_ttls_data *data = priv;
  1113. return data->state == SUCCESS;
  1114. }
  1115. static u8 * eap_ttls_get_session_id(struct eap_sm *sm, void *priv, size_t *len)
  1116. {
  1117. struct eap_ttls_data *data = priv;
  1118. if (data->state != SUCCESS)
  1119. return NULL;
  1120. return eap_server_tls_derive_session_id(sm, &data->ssl, EAP_TYPE_TTLS,
  1121. len);
  1122. }
  1123. static u8 * eap_ttls_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
  1124. {
  1125. struct eap_ttls_data *data = priv;
  1126. u8 *eapKeyData, *emsk;
  1127. if (data->state != SUCCESS)
  1128. return NULL;
  1129. eapKeyData = eap_server_tls_derive_key(sm, &data->ssl,
  1130. "ttls keying material",
  1131. EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
  1132. if (eapKeyData) {
  1133. emsk = os_malloc(EAP_EMSK_LEN);
  1134. if (emsk)
  1135. os_memcpy(emsk, eapKeyData + EAP_TLS_KEY_LEN,
  1136. EAP_EMSK_LEN);
  1137. bin_clear_free(eapKeyData, EAP_TLS_KEY_LEN + EAP_EMSK_LEN);
  1138. } else
  1139. emsk = NULL;
  1140. if (emsk) {
  1141. *len = EAP_EMSK_LEN;
  1142. wpa_hexdump(MSG_DEBUG, "EAP-TTLS: Derived EMSK",
  1143. emsk, EAP_EMSK_LEN);
  1144. } else {
  1145. wpa_printf(MSG_DEBUG, "EAP-TTLS: Failed to derive EMSK");
  1146. }
  1147. return emsk;
  1148. }
  1149. int eap_server_ttls_register(void)
  1150. {
  1151. struct eap_method *eap;
  1152. eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
  1153. EAP_VENDOR_IETF, EAP_TYPE_TTLS, "TTLS");
  1154. if (eap == NULL)
  1155. return -1;
  1156. eap->init = eap_ttls_init;
  1157. eap->reset = eap_ttls_reset;
  1158. eap->buildReq = eap_ttls_buildReq;
  1159. eap->check = eap_ttls_check;
  1160. eap->process = eap_ttls_process;
  1161. eap->isDone = eap_ttls_isDone;
  1162. eap->getKey = eap_ttls_getKey;
  1163. eap->isSuccess = eap_ttls_isSuccess;
  1164. eap->getSessionId = eap_ttls_get_session_id;
  1165. eap->get_emsk = eap_ttls_get_emsk;
  1166. return eap_server_method_register(eap);
  1167. }