eap_fast.c 46 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769
  1. /*
  2. * EAP peer method: EAP-FAST (RFC 4851)
  3. * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/tls.h"
  11. #include "crypto/sha1.h"
  12. #include "eap_common/eap_tlv_common.h"
  13. #include "eap_i.h"
  14. #include "eap_tls_common.h"
  15. #include "eap_config.h"
  16. #include "eap_fast_pac.h"
  17. #ifdef EAP_FAST_DYNAMIC
  18. #include "eap_fast_pac.c"
  19. #endif /* EAP_FAST_DYNAMIC */
  20. /* TODO:
  21. * - test session resumption and enable it if it interoperates
  22. * - password change (pending mschapv2 packet; replay decrypted packet)
  23. */
  24. static void eap_fast_deinit(struct eap_sm *sm, void *priv);
  25. struct eap_fast_data {
  26. struct eap_ssl_data ssl;
  27. int fast_version;
  28. const struct eap_method *phase2_method;
  29. void *phase2_priv;
  30. int phase2_success;
  31. struct eap_method_type phase2_type;
  32. struct eap_method_type *phase2_types;
  33. size_t num_phase2_types;
  34. int resuming; /* starting a resumed session */
  35. struct eap_fast_key_block_provisioning *key_block_p;
  36. #define EAP_FAST_PROV_UNAUTH 1
  37. #define EAP_FAST_PROV_AUTH 2
  38. int provisioning_allowed; /* Allowed PAC provisioning modes */
  39. int provisioning; /* doing PAC provisioning (not the normal auth) */
  40. int anon_provisioning; /* doing anonymous (unauthenticated)
  41. * provisioning */
  42. int session_ticket_used;
  43. u8 key_data[EAP_FAST_KEY_LEN];
  44. u8 *session_id;
  45. size_t id_len;
  46. u8 emsk[EAP_EMSK_LEN];
  47. int success;
  48. struct eap_fast_pac *pac;
  49. struct eap_fast_pac *current_pac;
  50. size_t max_pac_list_len;
  51. int use_pac_binary_format;
  52. u8 simck[EAP_FAST_SIMCK_LEN];
  53. int simck_idx;
  54. struct wpabuf *pending_phase2_req;
  55. };
  56. static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len,
  57. const u8 *client_random,
  58. const u8 *server_random,
  59. u8 *master_secret)
  60. {
  61. struct eap_fast_data *data = ctx;
  62. wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");
  63. if (client_random == NULL || server_random == NULL ||
  64. master_secret == NULL) {
  65. wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket failed - fall "
  66. "back to full TLS handshake");
  67. data->session_ticket_used = 0;
  68. if (data->provisioning_allowed) {
  69. wpa_printf(MSG_DEBUG, "EAP-FAST: Try to provision a "
  70. "new PAC-Key");
  71. data->provisioning = 1;
  72. data->current_pac = NULL;
  73. }
  74. return 0;
  75. }
  76. wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket", ticket, len);
  77. if (data->current_pac == NULL) {
  78. wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key available for "
  79. "using SessionTicket");
  80. data->session_ticket_used = 0;
  81. return 0;
  82. }
  83. eap_fast_derive_master_secret(data->current_pac->pac_key,
  84. server_random, client_random,
  85. master_secret);
  86. data->session_ticket_used = 1;
  87. return 1;
  88. }
  89. static int eap_fast_parse_phase1(struct eap_fast_data *data,
  90. const char *phase1)
  91. {
  92. const char *pos;
  93. pos = os_strstr(phase1, "fast_provisioning=");
  94. if (pos) {
  95. data->provisioning_allowed = atoi(pos + 18);
  96. wpa_printf(MSG_DEBUG, "EAP-FAST: Automatic PAC provisioning "
  97. "mode: %d", data->provisioning_allowed);
  98. }
  99. pos = os_strstr(phase1, "fast_max_pac_list_len=");
  100. if (pos) {
  101. data->max_pac_list_len = atoi(pos + 22);
  102. if (data->max_pac_list_len == 0)
  103. data->max_pac_list_len = 1;
  104. wpa_printf(MSG_DEBUG, "EAP-FAST: Maximum PAC list length: %lu",
  105. (unsigned long) data->max_pac_list_len);
  106. }
  107. pos = os_strstr(phase1, "fast_pac_format=binary");
  108. if (pos) {
  109. data->use_pac_binary_format = 1;
  110. wpa_printf(MSG_DEBUG, "EAP-FAST: Using binary format for PAC "
  111. "list");
  112. }
  113. return 0;
  114. }
  115. static void * eap_fast_init(struct eap_sm *sm)
  116. {
  117. struct eap_fast_data *data;
  118. struct eap_peer_config *config = eap_get_config(sm);
  119. if (config == NULL)
  120. return NULL;
  121. data = os_zalloc(sizeof(*data));
  122. if (data == NULL)
  123. return NULL;
  124. data->fast_version = EAP_FAST_VERSION;
  125. data->max_pac_list_len = 10;
  126. if (config->phase1 && eap_fast_parse_phase1(data, config->phase1) < 0) {
  127. eap_fast_deinit(sm, data);
  128. return NULL;
  129. }
  130. if (eap_peer_select_phase2_methods(config, "auth=",
  131. &data->phase2_types,
  132. &data->num_phase2_types) < 0) {
  133. eap_fast_deinit(sm, data);
  134. return NULL;
  135. }
  136. data->phase2_type.vendor = EAP_VENDOR_IETF;
  137. data->phase2_type.method = EAP_TYPE_NONE;
  138. if (eap_peer_tls_ssl_init(sm, &data->ssl, config, EAP_TYPE_FAST)) {
  139. wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");
  140. eap_fast_deinit(sm, data);
  141. return NULL;
  142. }
  143. if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,
  144. eap_fast_session_ticket_cb,
  145. data) < 0) {
  146. wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket "
  147. "callback");
  148. eap_fast_deinit(sm, data);
  149. return NULL;
  150. }
  151. /*
  152. * The local RADIUS server in a Cisco AP does not seem to like empty
  153. * fragments before data, so disable that workaround for CBC.
  154. * TODO: consider making this configurable
  155. */
  156. if (tls_connection_enable_workaround(sm->ssl_ctx, data->ssl.conn)) {
  157. wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to enable TLS "
  158. "workarounds");
  159. }
  160. if (!config->pac_file) {
  161. wpa_printf(MSG_INFO, "EAP-FAST: No PAC file configured");
  162. eap_fast_deinit(sm, data);
  163. return NULL;
  164. }
  165. if (data->use_pac_binary_format &&
  166. eap_fast_load_pac_bin(sm, &data->pac, config->pac_file) < 0) {
  167. wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
  168. eap_fast_deinit(sm, data);
  169. return NULL;
  170. }
  171. if (!data->use_pac_binary_format &&
  172. eap_fast_load_pac(sm, &data->pac, config->pac_file) < 0) {
  173. wpa_printf(MSG_INFO, "EAP-FAST: Failed to load PAC file");
  174. eap_fast_deinit(sm, data);
  175. return NULL;
  176. }
  177. eap_fast_pac_list_truncate(data->pac, data->max_pac_list_len);
  178. if (data->pac == NULL && !data->provisioning_allowed) {
  179. wpa_printf(MSG_INFO, "EAP-FAST: No PAC configured and "
  180. "provisioning disabled");
  181. eap_fast_deinit(sm, data);
  182. return NULL;
  183. }
  184. return data;
  185. }
  186. static void eap_fast_deinit(struct eap_sm *sm, void *priv)
  187. {
  188. struct eap_fast_data *data = priv;
  189. struct eap_fast_pac *pac, *prev;
  190. if (data == NULL)
  191. return;
  192. if (data->phase2_priv && data->phase2_method)
  193. data->phase2_method->deinit(sm, data->phase2_priv);
  194. os_free(data->phase2_types);
  195. os_free(data->key_block_p);
  196. eap_peer_tls_ssl_deinit(sm, &data->ssl);
  197. pac = data->pac;
  198. prev = NULL;
  199. while (pac) {
  200. prev = pac;
  201. pac = pac->next;
  202. eap_fast_free_pac(prev);
  203. }
  204. os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
  205. os_memset(data->emsk, 0, EAP_EMSK_LEN);
  206. os_free(data->session_id);
  207. wpabuf_free(data->pending_phase2_req);
  208. os_free(data);
  209. }
  210. static int eap_fast_derive_msk(struct eap_fast_data *data)
  211. {
  212. eap_fast_derive_eap_msk(data->simck, data->key_data);
  213. eap_fast_derive_eap_emsk(data->simck, data->emsk);
  214. data->success = 1;
  215. return 0;
  216. }
  217. static void eap_fast_derive_key_auth(struct eap_sm *sm,
  218. struct eap_fast_data *data)
  219. {
  220. u8 *sks;
  221. /* RFC 4851, Section 5.1:
  222. * Extra key material after TLS key_block: session_key_seed[40]
  223. */
  224. sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion",
  225. EAP_FAST_SKS_LEN);
  226. if (sks == NULL) {
  227. wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive "
  228. "session_key_seed");
  229. return;
  230. }
  231. /*
  232. * RFC 4851, Section 5.2:
  233. * S-IMCK[0] = session_key_seed
  234. */
  235. wpa_hexdump_key(MSG_DEBUG,
  236. "EAP-FAST: session_key_seed (SKS = S-IMCK[0])",
  237. sks, EAP_FAST_SKS_LEN);
  238. data->simck_idx = 0;
  239. os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN);
  240. os_free(sks);
  241. }
  242. static void eap_fast_derive_key_provisioning(struct eap_sm *sm,
  243. struct eap_fast_data *data)
  244. {
  245. os_free(data->key_block_p);
  246. data->key_block_p = (struct eap_fast_key_block_provisioning *)
  247. eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,
  248. "key expansion",
  249. sizeof(*data->key_block_p));
  250. if (data->key_block_p == NULL) {
  251. wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block");
  252. return;
  253. }
  254. /*
  255. * RFC 4851, Section 5.2:
  256. * S-IMCK[0] = session_key_seed
  257. */
  258. wpa_hexdump_key(MSG_DEBUG,
  259. "EAP-FAST: session_key_seed (SKS = S-IMCK[0])",
  260. data->key_block_p->session_key_seed,
  261. sizeof(data->key_block_p->session_key_seed));
  262. data->simck_idx = 0;
  263. os_memcpy(data->simck, data->key_block_p->session_key_seed,
  264. EAP_FAST_SIMCK_LEN);
  265. wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: server_challenge",
  266. data->key_block_p->server_challenge,
  267. sizeof(data->key_block_p->server_challenge));
  268. wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: client_challenge",
  269. data->key_block_p->client_challenge,
  270. sizeof(data->key_block_p->client_challenge));
  271. }
  272. static void eap_fast_derive_keys(struct eap_sm *sm, struct eap_fast_data *data)
  273. {
  274. if (data->anon_provisioning)
  275. eap_fast_derive_key_provisioning(sm, data);
  276. else
  277. eap_fast_derive_key_auth(sm, data);
  278. }
  279. static int eap_fast_init_phase2_method(struct eap_sm *sm,
  280. struct eap_fast_data *data)
  281. {
  282. data->phase2_method =
  283. eap_peer_get_eap_method(data->phase2_type.vendor,
  284. data->phase2_type.method);
  285. if (data->phase2_method == NULL)
  286. return -1;
  287. if (data->key_block_p) {
  288. sm->auth_challenge = data->key_block_p->server_challenge;
  289. sm->peer_challenge = data->key_block_p->client_challenge;
  290. }
  291. sm->init_phase2 = 1;
  292. data->phase2_priv = data->phase2_method->init(sm);
  293. sm->init_phase2 = 0;
  294. sm->auth_challenge = NULL;
  295. sm->peer_challenge = NULL;
  296. return data->phase2_priv == NULL ? -1 : 0;
  297. }
  298. static int eap_fast_select_phase2_method(struct eap_fast_data *data, u8 type)
  299. {
  300. size_t i;
  301. /* TODO: TNC with anonymous provisioning; need to require both
  302. * completed MSCHAPv2 and TNC */
  303. if (data->anon_provisioning && type != EAP_TYPE_MSCHAPV2) {
  304. wpa_printf(MSG_INFO, "EAP-FAST: Only EAP-MSCHAPv2 is allowed "
  305. "during unauthenticated provisioning; reject phase2"
  306. " type %d", type);
  307. return -1;
  308. }
  309. #ifdef EAP_TNC
  310. if (type == EAP_TYPE_TNC) {
  311. data->phase2_type.vendor = EAP_VENDOR_IETF;
  312. data->phase2_type.method = EAP_TYPE_TNC;
  313. wpa_printf(MSG_DEBUG, "EAP-FAST: Selected Phase 2 EAP "
  314. "vendor %d method %d for TNC",
  315. data->phase2_type.vendor,
  316. data->phase2_type.method);
  317. return 0;
  318. }
  319. #endif /* EAP_TNC */
  320. for (i = 0; i < data->num_phase2_types; i++) {
  321. if (data->phase2_types[i].vendor != EAP_VENDOR_IETF ||
  322. data->phase2_types[i].method != type)
  323. continue;
  324. data->phase2_type.vendor = data->phase2_types[i].vendor;
  325. data->phase2_type.method = data->phase2_types[i].method;
  326. wpa_printf(MSG_DEBUG, "EAP-FAST: Selected Phase 2 EAP "
  327. "vendor %d method %d",
  328. data->phase2_type.vendor,
  329. data->phase2_type.method);
  330. break;
  331. }
  332. if (type != data->phase2_type.method || type == EAP_TYPE_NONE)
  333. return -1;
  334. return 0;
  335. }
  336. static int eap_fast_phase2_request(struct eap_sm *sm,
  337. struct eap_fast_data *data,
  338. struct eap_method_ret *ret,
  339. struct eap_hdr *hdr,
  340. struct wpabuf **resp)
  341. {
  342. size_t len = be_to_host16(hdr->length);
  343. u8 *pos;
  344. struct eap_method_ret iret;
  345. struct eap_peer_config *config = eap_get_config(sm);
  346. struct wpabuf msg;
  347. if (len <= sizeof(struct eap_hdr)) {
  348. wpa_printf(MSG_INFO, "EAP-FAST: too short "
  349. "Phase 2 request (len=%lu)", (unsigned long) len);
  350. return -1;
  351. }
  352. pos = (u8 *) (hdr + 1);
  353. wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 Request: type=%d", *pos);
  354. if (*pos == EAP_TYPE_IDENTITY) {
  355. *resp = eap_sm_buildIdentity(sm, hdr->identifier, 1);
  356. return 0;
  357. }
  358. if (data->phase2_priv && data->phase2_method &&
  359. *pos != data->phase2_type.method) {
  360. wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 EAP sequence - "
  361. "deinitialize previous method");
  362. data->phase2_method->deinit(sm, data->phase2_priv);
  363. data->phase2_method = NULL;
  364. data->phase2_priv = NULL;
  365. data->phase2_type.vendor = EAP_VENDOR_IETF;
  366. data->phase2_type.method = EAP_TYPE_NONE;
  367. }
  368. if (data->phase2_type.vendor == EAP_VENDOR_IETF &&
  369. data->phase2_type.method == EAP_TYPE_NONE &&
  370. eap_fast_select_phase2_method(data, *pos) < 0) {
  371. if (eap_peer_tls_phase2_nak(data->phase2_types,
  372. data->num_phase2_types,
  373. hdr, resp))
  374. return -1;
  375. return 0;
  376. }
  377. if ((data->phase2_priv == NULL &&
  378. eap_fast_init_phase2_method(sm, data) < 0) ||
  379. data->phase2_method == NULL) {
  380. wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize "
  381. "Phase 2 EAP method %d", *pos);
  382. ret->methodState = METHOD_DONE;
  383. ret->decision = DECISION_FAIL;
  384. return -1;
  385. }
  386. os_memset(&iret, 0, sizeof(iret));
  387. wpabuf_set(&msg, hdr, len);
  388. *resp = data->phase2_method->process(sm, data->phase2_priv, &iret,
  389. &msg);
  390. if (*resp == NULL ||
  391. (iret.methodState == METHOD_DONE &&
  392. iret.decision == DECISION_FAIL)) {
  393. ret->methodState = METHOD_DONE;
  394. ret->decision = DECISION_FAIL;
  395. } else if ((iret.methodState == METHOD_DONE ||
  396. iret.methodState == METHOD_MAY_CONT) &&
  397. (iret.decision == DECISION_UNCOND_SUCC ||
  398. iret.decision == DECISION_COND_SUCC)) {
  399. data->phase2_success = 1;
  400. }
  401. if (*resp == NULL && config &&
  402. (config->pending_req_identity || config->pending_req_password ||
  403. config->pending_req_otp || config->pending_req_new_password)) {
  404. wpabuf_free(data->pending_phase2_req);
  405. data->pending_phase2_req = wpabuf_alloc_copy(hdr, len);
  406. } else if (*resp == NULL)
  407. return -1;
  408. return 0;
  409. }
  410. static struct wpabuf * eap_fast_tlv_nak(int vendor_id, int tlv_type)
  411. {
  412. struct wpabuf *buf;
  413. struct eap_tlv_nak_tlv *nak;
  414. buf = wpabuf_alloc(sizeof(*nak));
  415. if (buf == NULL)
  416. return NULL;
  417. nak = wpabuf_put(buf, sizeof(*nak));
  418. nak->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY | EAP_TLV_NAK_TLV);
  419. nak->length = host_to_be16(6);
  420. nak->vendor_id = host_to_be32(vendor_id);
  421. nak->nak_type = host_to_be16(tlv_type);
  422. return buf;
  423. }
  424. static struct wpabuf * eap_fast_tlv_result(int status, int intermediate)
  425. {
  426. struct wpabuf *buf;
  427. struct eap_tlv_intermediate_result_tlv *result;
  428. buf = wpabuf_alloc(sizeof(*result));
  429. if (buf == NULL)
  430. return NULL;
  431. wpa_printf(MSG_DEBUG, "EAP-FAST: Add %sResult TLV(status=%d)",
  432. intermediate ? "Intermediate " : "", status);
  433. result = wpabuf_put(buf, sizeof(*result));
  434. result->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY |
  435. (intermediate ?
  436. EAP_TLV_INTERMEDIATE_RESULT_TLV :
  437. EAP_TLV_RESULT_TLV));
  438. result->length = host_to_be16(2);
  439. result->status = host_to_be16(status);
  440. return buf;
  441. }
  442. static struct wpabuf * eap_fast_tlv_pac_ack(void)
  443. {
  444. struct wpabuf *buf;
  445. struct eap_tlv_result_tlv *res;
  446. struct eap_tlv_pac_ack_tlv *ack;
  447. buf = wpabuf_alloc(sizeof(*res) + sizeof(*ack));
  448. if (buf == NULL)
  449. return NULL;
  450. wpa_printf(MSG_DEBUG, "EAP-FAST: Add PAC TLV (ack)");
  451. ack = wpabuf_put(buf, sizeof(*ack));
  452. ack->tlv_type = host_to_be16(EAP_TLV_PAC_TLV |
  453. EAP_TLV_TYPE_MANDATORY);
  454. ack->length = host_to_be16(sizeof(*ack) - sizeof(struct eap_tlv_hdr));
  455. ack->pac_type = host_to_be16(PAC_TYPE_PAC_ACKNOWLEDGEMENT);
  456. ack->pac_len = host_to_be16(2);
  457. ack->result = host_to_be16(EAP_TLV_RESULT_SUCCESS);
  458. return buf;
  459. }
  460. static struct wpabuf * eap_fast_process_eap_payload_tlv(
  461. struct eap_sm *sm, struct eap_fast_data *data,
  462. struct eap_method_ret *ret,
  463. u8 *eap_payload_tlv, size_t eap_payload_tlv_len)
  464. {
  465. struct eap_hdr *hdr;
  466. struct wpabuf *resp = NULL;
  467. if (eap_payload_tlv_len < sizeof(*hdr)) {
  468. wpa_printf(MSG_DEBUG, "EAP-FAST: too short EAP "
  469. "Payload TLV (len=%lu)",
  470. (unsigned long) eap_payload_tlv_len);
  471. return NULL;
  472. }
  473. hdr = (struct eap_hdr *) eap_payload_tlv;
  474. if (be_to_host16(hdr->length) > eap_payload_tlv_len) {
  475. wpa_printf(MSG_DEBUG, "EAP-FAST: EAP packet overflow in "
  476. "EAP Payload TLV");
  477. return NULL;
  478. }
  479. if (hdr->code != EAP_CODE_REQUEST) {
  480. wpa_printf(MSG_INFO, "EAP-FAST: Unexpected code=%d in "
  481. "Phase 2 EAP header", hdr->code);
  482. return NULL;
  483. }
  484. if (eap_fast_phase2_request(sm, data, ret, hdr, &resp)) {
  485. wpa_printf(MSG_INFO, "EAP-FAST: Phase2 Request processing "
  486. "failed");
  487. return NULL;
  488. }
  489. return eap_fast_tlv_eap_payload(resp);
  490. }
  491. static int eap_fast_validate_crypto_binding(
  492. struct eap_tlv_crypto_binding_tlv *_bind)
  493. {
  494. wpa_printf(MSG_DEBUG, "EAP-FAST: Crypto-Binding TLV: Version %d "
  495. "Received Version %d SubType %d",
  496. _bind->version, _bind->received_version, _bind->subtype);
  497. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
  498. _bind->nonce, sizeof(_bind->nonce));
  499. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
  500. _bind->compound_mac, sizeof(_bind->compound_mac));
  501. if (_bind->version != EAP_FAST_VERSION ||
  502. _bind->received_version != EAP_FAST_VERSION ||
  503. _bind->subtype != EAP_TLV_CRYPTO_BINDING_SUBTYPE_REQUEST) {
  504. wpa_printf(MSG_INFO, "EAP-FAST: Invalid version/subtype in "
  505. "Crypto-Binding TLV: Version %d "
  506. "Received Version %d SubType %d",
  507. _bind->version, _bind->received_version,
  508. _bind->subtype);
  509. return -1;
  510. }
  511. return 0;
  512. }
  513. static void eap_fast_write_crypto_binding(
  514. struct eap_tlv_crypto_binding_tlv *rbind,
  515. struct eap_tlv_crypto_binding_tlv *_bind, const u8 *cmk)
  516. {
  517. rbind->tlv_type = host_to_be16(EAP_TLV_TYPE_MANDATORY |
  518. EAP_TLV_CRYPTO_BINDING_TLV);
  519. rbind->length = host_to_be16(sizeof(*rbind) -
  520. sizeof(struct eap_tlv_hdr));
  521. rbind->version = EAP_FAST_VERSION;
  522. rbind->received_version = _bind->version;
  523. rbind->subtype = EAP_TLV_CRYPTO_BINDING_SUBTYPE_RESPONSE;
  524. os_memcpy(rbind->nonce, _bind->nonce, sizeof(_bind->nonce));
  525. inc_byte_array(rbind->nonce, sizeof(rbind->nonce));
  526. hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) rbind, sizeof(*rbind),
  527. rbind->compound_mac);
  528. wpa_printf(MSG_DEBUG, "EAP-FAST: Reply Crypto-Binding TLV: Version %d "
  529. "Received Version %d SubType %d",
  530. rbind->version, rbind->received_version, rbind->subtype);
  531. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: NONCE",
  532. rbind->nonce, sizeof(rbind->nonce));
  533. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Compound MAC",
  534. rbind->compound_mac, sizeof(rbind->compound_mac));
  535. }
  536. static int eap_fast_get_phase2_key(struct eap_sm *sm,
  537. struct eap_fast_data *data,
  538. u8 *isk, size_t isk_len)
  539. {
  540. u8 *key;
  541. size_t key_len;
  542. os_memset(isk, 0, isk_len);
  543. if (data->phase2_method == NULL || data->phase2_priv == NULL) {
  544. wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 method not "
  545. "available");
  546. return -1;
  547. }
  548. if (data->phase2_method->isKeyAvailable == NULL ||
  549. data->phase2_method->getKey == NULL)
  550. return 0;
  551. if (!data->phase2_method->isKeyAvailable(sm, data->phase2_priv) ||
  552. (key = data->phase2_method->getKey(sm, data->phase2_priv,
  553. &key_len)) == NULL) {
  554. wpa_printf(MSG_DEBUG, "EAP-FAST: Could not get key material "
  555. "from Phase 2");
  556. return -1;
  557. }
  558. if (key_len > isk_len)
  559. key_len = isk_len;
  560. if (key_len == 32 &&
  561. data->phase2_method->vendor == EAP_VENDOR_IETF &&
  562. data->phase2_method->method == EAP_TYPE_MSCHAPV2) {
  563. /*
  564. * EAP-FAST uses reverse order for MS-MPPE keys when deriving
  565. * MSK from EAP-MSCHAPv2. Swap the keys here to get the correct
  566. * ISK for EAP-FAST cryptobinding.
  567. */
  568. os_memcpy(isk, key + 16, 16);
  569. os_memcpy(isk + 16, key, 16);
  570. } else
  571. os_memcpy(isk, key, key_len);
  572. os_free(key);
  573. return 0;
  574. }
  575. static int eap_fast_get_cmk(struct eap_sm *sm, struct eap_fast_data *data,
  576. u8 *cmk)
  577. {
  578. u8 isk[32], imck[60];
  579. wpa_printf(MSG_DEBUG, "EAP-FAST: Determining CMK[%d] for Compound MIC "
  580. "calculation", data->simck_idx + 1);
  581. /*
  582. * RFC 4851, Section 5.2:
  583. * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys",
  584. * MSK[j], 60)
  585. * S-IMCK[j] = first 40 octets of IMCK[j]
  586. * CMK[j] = last 20 octets of IMCK[j]
  587. */
  588. if (eap_fast_get_phase2_key(sm, data, isk, sizeof(isk)) < 0)
  589. return -1;
  590. wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk));
  591. sha1_t_prf(data->simck, EAP_FAST_SIMCK_LEN,
  592. "Inner Methods Compound Keys",
  593. isk, sizeof(isk), imck, sizeof(imck));
  594. data->simck_idx++;
  595. os_memcpy(data->simck, imck, EAP_FAST_SIMCK_LEN);
  596. wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]",
  597. data->simck, EAP_FAST_SIMCK_LEN);
  598. os_memcpy(cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN);
  599. wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",
  600. cmk, EAP_FAST_CMK_LEN);
  601. return 0;
  602. }
  603. static u8 * eap_fast_write_pac_request(u8 *pos, u16 pac_type)
  604. {
  605. struct eap_tlv_hdr *pac;
  606. struct eap_tlv_request_action_tlv *act;
  607. struct eap_tlv_pac_type_tlv *type;
  608. act = (struct eap_tlv_request_action_tlv *) pos;
  609. act->tlv_type = host_to_be16(EAP_TLV_REQUEST_ACTION_TLV);
  610. act->length = host_to_be16(2);
  611. act->action = host_to_be16(EAP_TLV_ACTION_PROCESS_TLV);
  612. pac = (struct eap_tlv_hdr *) (act + 1);
  613. pac->tlv_type = host_to_be16(EAP_TLV_PAC_TLV);
  614. pac->length = host_to_be16(sizeof(*type));
  615. type = (struct eap_tlv_pac_type_tlv *) (pac + 1);
  616. type->tlv_type = host_to_be16(PAC_TYPE_PAC_TYPE);
  617. type->length = host_to_be16(2);
  618. type->pac_type = host_to_be16(pac_type);
  619. return (u8 *) (type + 1);
  620. }
  621. static struct wpabuf * eap_fast_process_crypto_binding(
  622. struct eap_sm *sm, struct eap_fast_data *data,
  623. struct eap_method_ret *ret,
  624. struct eap_tlv_crypto_binding_tlv *_bind, size_t bind_len)
  625. {
  626. struct wpabuf *resp;
  627. u8 *pos;
  628. u8 cmk[EAP_FAST_CMK_LEN], cmac[SHA1_MAC_LEN];
  629. int res;
  630. size_t len;
  631. if (eap_fast_validate_crypto_binding(_bind) < 0)
  632. return NULL;
  633. if (eap_fast_get_cmk(sm, data, cmk) < 0)
  634. return NULL;
  635. /* Validate received Compound MAC */
  636. os_memcpy(cmac, _bind->compound_mac, sizeof(cmac));
  637. os_memset(_bind->compound_mac, 0, sizeof(cmac));
  638. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Crypto-Binding TLV for Compound "
  639. "MAC calculation", (u8 *) _bind, bind_len);
  640. hmac_sha1(cmk, EAP_FAST_CMK_LEN, (u8 *) _bind, bind_len,
  641. _bind->compound_mac);
  642. res = os_memcmp_const(cmac, _bind->compound_mac, sizeof(cmac));
  643. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Received Compound MAC",
  644. cmac, sizeof(cmac));
  645. wpa_hexdump(MSG_MSGDUMP, "EAP-FAST: Calculated Compound MAC",
  646. _bind->compound_mac, sizeof(cmac));
  647. if (res != 0) {
  648. wpa_printf(MSG_INFO, "EAP-FAST: Compound MAC did not match");
  649. os_memcpy(_bind->compound_mac, cmac, sizeof(cmac));
  650. return NULL;
  651. }
  652. /*
  653. * Compound MAC was valid, so authentication succeeded. Reply with
  654. * crypto binding to allow server to complete authentication.
  655. */
  656. len = sizeof(struct eap_tlv_crypto_binding_tlv);
  657. resp = wpabuf_alloc(len);
  658. if (resp == NULL)
  659. return NULL;
  660. if (!data->anon_provisioning && data->phase2_success &&
  661. eap_fast_derive_msk(data) < 0) {
  662. wpa_printf(MSG_INFO, "EAP-FAST: Failed to generate MSK");
  663. ret->methodState = METHOD_DONE;
  664. ret->decision = DECISION_FAIL;
  665. data->phase2_success = 0;
  666. wpabuf_free(resp);
  667. return NULL;
  668. }
  669. if (!data->anon_provisioning && data->phase2_success) {
  670. os_free(data->session_id);
  671. data->session_id = eap_peer_tls_derive_session_id(
  672. sm, &data->ssl, EAP_TYPE_FAST, &data->id_len);
  673. if (data->session_id) {
  674. wpa_hexdump(MSG_DEBUG, "EAP-FAST: Derived Session-Id",
  675. data->session_id, data->id_len);
  676. } else {
  677. wpa_printf(MSG_ERROR, "EAP-FAST: Failed to derive "
  678. "Session-Id");
  679. wpabuf_free(resp);
  680. return NULL;
  681. }
  682. }
  683. pos = wpabuf_put(resp, sizeof(struct eap_tlv_crypto_binding_tlv));
  684. eap_fast_write_crypto_binding((struct eap_tlv_crypto_binding_tlv *)
  685. pos, _bind, cmk);
  686. return resp;
  687. }
  688. static void eap_fast_parse_pac_tlv(struct eap_fast_pac *entry, int type,
  689. u8 *pos, size_t len, int *pac_key_found)
  690. {
  691. switch (type & 0x7fff) {
  692. case PAC_TYPE_PAC_KEY:
  693. wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: PAC-Key", pos, len);
  694. if (len != EAP_FAST_PAC_KEY_LEN) {
  695. wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid PAC-Key "
  696. "length %lu", (unsigned long) len);
  697. break;
  698. }
  699. *pac_key_found = 1;
  700. os_memcpy(entry->pac_key, pos, len);
  701. break;
  702. case PAC_TYPE_PAC_OPAQUE:
  703. wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Opaque", pos, len);
  704. entry->pac_opaque = pos;
  705. entry->pac_opaque_len = len;
  706. break;
  707. case PAC_TYPE_PAC_INFO:
  708. wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info", pos, len);
  709. entry->pac_info = pos;
  710. entry->pac_info_len = len;
  711. break;
  712. default:
  713. wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC type %d",
  714. type);
  715. break;
  716. }
  717. }
  718. static int eap_fast_process_pac_tlv(struct eap_fast_pac *entry,
  719. u8 *pac, size_t pac_len)
  720. {
  721. struct pac_tlv_hdr *hdr;
  722. u8 *pos;
  723. size_t left, len;
  724. int type, pac_key_found = 0;
  725. pos = pac;
  726. left = pac_len;
  727. while (left > sizeof(*hdr)) {
  728. hdr = (struct pac_tlv_hdr *) pos;
  729. type = be_to_host16(hdr->type);
  730. len = be_to_host16(hdr->len);
  731. pos += sizeof(*hdr);
  732. left -= sizeof(*hdr);
  733. if (len > left) {
  734. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV overrun "
  735. "(type=%d len=%lu left=%lu)",
  736. type, (unsigned long) len,
  737. (unsigned long) left);
  738. return -1;
  739. }
  740. eap_fast_parse_pac_tlv(entry, type, pos, len, &pac_key_found);
  741. pos += len;
  742. left -= len;
  743. }
  744. if (!pac_key_found || !entry->pac_opaque || !entry->pac_info) {
  745. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV does not include "
  746. "all the required fields");
  747. return -1;
  748. }
  749. return 0;
  750. }
  751. static int eap_fast_parse_pac_info(struct eap_fast_pac *entry, int type,
  752. u8 *pos, size_t len)
  753. {
  754. u16 pac_type;
  755. u32 lifetime;
  756. struct os_time now;
  757. switch (type & 0x7fff) {
  758. case PAC_TYPE_CRED_LIFETIME:
  759. if (len != 4) {
  760. wpa_hexdump(MSG_DEBUG, "EAP-FAST: PAC-Info - "
  761. "Invalid CRED_LIFETIME length - ignored",
  762. pos, len);
  763. return 0;
  764. }
  765. /*
  766. * This is not currently saved separately in PAC files since
  767. * the server can automatically initiate PAC update when
  768. * needed. Anyway, the information is available from PAC-Info
  769. * dump if it is needed for something in the future.
  770. */
  771. lifetime = WPA_GET_BE32(pos);
  772. os_get_time(&now);
  773. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - CRED_LIFETIME %d "
  774. "(%d days)",
  775. lifetime, (lifetime - (u32) now.sec) / 86400);
  776. break;
  777. case PAC_TYPE_A_ID:
  778. wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID",
  779. pos, len);
  780. entry->a_id = pos;
  781. entry->a_id_len = len;
  782. break;
  783. case PAC_TYPE_I_ID:
  784. wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - I-ID",
  785. pos, len);
  786. entry->i_id = pos;
  787. entry->i_id_len = len;
  788. break;
  789. case PAC_TYPE_A_ID_INFO:
  790. wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: PAC-Info - A-ID-Info",
  791. pos, len);
  792. entry->a_id_info = pos;
  793. entry->a_id_info_len = len;
  794. break;
  795. case PAC_TYPE_PAC_TYPE:
  796. /* RFC 5422, Section 4.2.6 - PAC-Type TLV */
  797. if (len != 2) {
  798. wpa_printf(MSG_INFO, "EAP-FAST: Invalid PAC-Type "
  799. "length %lu (expected 2)",
  800. (unsigned long) len);
  801. wpa_hexdump_ascii(MSG_DEBUG,
  802. "EAP-FAST: PAC-Info - PAC-Type",
  803. pos, len);
  804. return -1;
  805. }
  806. pac_type = WPA_GET_BE16(pos);
  807. if (pac_type != PAC_TYPE_TUNNEL_PAC &&
  808. pac_type != PAC_TYPE_USER_AUTHORIZATION &&
  809. pac_type != PAC_TYPE_MACHINE_AUTHENTICATION) {
  810. wpa_printf(MSG_INFO, "EAP-FAST: Unsupported PAC Type "
  811. "%d", pac_type);
  812. return -1;
  813. }
  814. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info - PAC-Type %d",
  815. pac_type);
  816. entry->pac_type = pac_type;
  817. break;
  818. default:
  819. wpa_printf(MSG_DEBUG, "EAP-FAST: Ignored unknown PAC-Info "
  820. "type %d", type);
  821. break;
  822. }
  823. return 0;
  824. }
  825. static int eap_fast_process_pac_info(struct eap_fast_pac *entry)
  826. {
  827. struct pac_tlv_hdr *hdr;
  828. u8 *pos;
  829. size_t left, len;
  830. int type;
  831. /* RFC 5422, Section 4.2.4 */
  832. /* PAC-Type defaults to Tunnel PAC (Type 1) */
  833. entry->pac_type = PAC_TYPE_TUNNEL_PAC;
  834. pos = entry->pac_info;
  835. left = entry->pac_info_len;
  836. while (left > sizeof(*hdr)) {
  837. hdr = (struct pac_tlv_hdr *) pos;
  838. type = be_to_host16(hdr->type);
  839. len = be_to_host16(hdr->len);
  840. pos += sizeof(*hdr);
  841. left -= sizeof(*hdr);
  842. if (len > left) {
  843. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info overrun "
  844. "(type=%d len=%lu left=%lu)",
  845. type, (unsigned long) len,
  846. (unsigned long) left);
  847. return -1;
  848. }
  849. if (eap_fast_parse_pac_info(entry, type, pos, len) < 0)
  850. return -1;
  851. pos += len;
  852. left -= len;
  853. }
  854. if (entry->a_id == NULL || entry->a_id_info == NULL) {
  855. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Info does not include "
  856. "all the required fields");
  857. return -1;
  858. }
  859. return 0;
  860. }
  861. static struct wpabuf * eap_fast_process_pac(struct eap_sm *sm,
  862. struct eap_fast_data *data,
  863. struct eap_method_ret *ret,
  864. u8 *pac, size_t pac_len)
  865. {
  866. struct eap_peer_config *config = eap_get_config(sm);
  867. struct eap_fast_pac entry;
  868. os_memset(&entry, 0, sizeof(entry));
  869. if (eap_fast_process_pac_tlv(&entry, pac, pac_len) ||
  870. eap_fast_process_pac_info(&entry))
  871. return NULL;
  872. eap_fast_add_pac(&data->pac, &data->current_pac, &entry);
  873. eap_fast_pac_list_truncate(data->pac, data->max_pac_list_len);
  874. if (data->use_pac_binary_format)
  875. eap_fast_save_pac_bin(sm, data->pac, config->pac_file);
  876. else
  877. eap_fast_save_pac(sm, data->pac, config->pac_file);
  878. if (data->provisioning) {
  879. if (data->anon_provisioning) {
  880. /*
  881. * Unauthenticated provisioning does not provide keying
  882. * material and must end with an EAP-Failure.
  883. * Authentication will be done separately after this.
  884. */
  885. data->success = 0;
  886. ret->decision = DECISION_FAIL;
  887. } else {
  888. /*
  889. * Server may or may not allow authenticated
  890. * provisioning also for key generation.
  891. */
  892. ret->decision = DECISION_COND_SUCC;
  893. }
  894. wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
  895. "- Provisioning completed successfully");
  896. sm->expected_failure = 1;
  897. } else {
  898. /*
  899. * This is PAC refreshing, i.e., normal authentication that is
  900. * expected to be completed with an EAP-Success. However,
  901. * RFC 5422, Section 3.5 allows EAP-Failure to be sent even
  902. * after protected success exchange in case of EAP-Fast
  903. * provisioning, so we better use DECISION_COND_SUCC here
  904. * instead of DECISION_UNCOND_SUCC.
  905. */
  906. wpa_printf(MSG_DEBUG, "EAP-FAST: Send PAC-Acknowledgement TLV "
  907. "- PAC refreshing completed successfully");
  908. ret->decision = DECISION_COND_SUCC;
  909. }
  910. ret->methodState = METHOD_DONE;
  911. return eap_fast_tlv_pac_ack();
  912. }
  913. static int eap_fast_parse_decrypted(struct wpabuf *decrypted,
  914. struct eap_fast_tlv_parse *tlv,
  915. struct wpabuf **resp)
  916. {
  917. int mandatory, tlv_type, res;
  918. size_t len;
  919. u8 *pos, *end;
  920. os_memset(tlv, 0, sizeof(*tlv));
  921. /* Parse TLVs from the decrypted Phase 2 data */
  922. pos = wpabuf_mhead(decrypted);
  923. end = pos + wpabuf_len(decrypted);
  924. while (pos + 4 < end) {
  925. mandatory = pos[0] & 0x80;
  926. tlv_type = WPA_GET_BE16(pos) & 0x3fff;
  927. pos += 2;
  928. len = WPA_GET_BE16(pos);
  929. pos += 2;
  930. if (len > (size_t) (end - pos)) {
  931. wpa_printf(MSG_INFO, "EAP-FAST: TLV overflow");
  932. return -1;
  933. }
  934. wpa_printf(MSG_DEBUG, "EAP-FAST: Received Phase 2: "
  935. "TLV type %d length %u%s",
  936. tlv_type, (unsigned int) len,
  937. mandatory ? " (mandatory)" : "");
  938. res = eap_fast_parse_tlv(tlv, tlv_type, pos, len);
  939. if (res == -2)
  940. break;
  941. if (res < 0) {
  942. if (mandatory) {
  943. wpa_printf(MSG_DEBUG, "EAP-FAST: Nak unknown "
  944. "mandatory TLV type %d", tlv_type);
  945. *resp = eap_fast_tlv_nak(0, tlv_type);
  946. break;
  947. } else {
  948. wpa_printf(MSG_DEBUG, "EAP-FAST: ignored "
  949. "unknown optional TLV type %d",
  950. tlv_type);
  951. }
  952. }
  953. pos += len;
  954. }
  955. return 0;
  956. }
  957. static int eap_fast_encrypt_response(struct eap_sm *sm,
  958. struct eap_fast_data *data,
  959. struct wpabuf *resp,
  960. u8 identifier, struct wpabuf **out_data)
  961. {
  962. if (resp == NULL)
  963. return 0;
  964. wpa_hexdump_buf(MSG_DEBUG, "EAP-FAST: Encrypting Phase 2 data",
  965. resp);
  966. if (eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST,
  967. data->fast_version, identifier,
  968. resp, out_data)) {
  969. wpa_printf(MSG_INFO, "EAP-FAST: Failed to encrypt a Phase 2 "
  970. "frame");
  971. }
  972. wpabuf_free(resp);
  973. return 0;
  974. }
  975. static struct wpabuf * eap_fast_pac_request(void)
  976. {
  977. struct wpabuf *tmp;
  978. u8 *pos, *pos2;
  979. tmp = wpabuf_alloc(sizeof(struct eap_tlv_hdr) +
  980. sizeof(struct eap_tlv_request_action_tlv) +
  981. sizeof(struct eap_tlv_pac_type_tlv));
  982. if (tmp == NULL)
  983. return NULL;
  984. pos = wpabuf_put(tmp, 0);
  985. pos2 = eap_fast_write_pac_request(pos, PAC_TYPE_TUNNEL_PAC);
  986. wpabuf_put(tmp, pos2 - pos);
  987. return tmp;
  988. }
  989. static int eap_fast_process_decrypted(struct eap_sm *sm,
  990. struct eap_fast_data *data,
  991. struct eap_method_ret *ret,
  992. const struct eap_hdr *req,
  993. struct wpabuf *decrypted,
  994. struct wpabuf **out_data)
  995. {
  996. struct wpabuf *resp = NULL, *tmp;
  997. struct eap_fast_tlv_parse tlv;
  998. int failed = 0;
  999. if (eap_fast_parse_decrypted(decrypted, &tlv, &resp) < 0)
  1000. return 0;
  1001. if (resp)
  1002. return eap_fast_encrypt_response(sm, data, resp,
  1003. req->identifier, out_data);
  1004. if (tlv.result == EAP_TLV_RESULT_FAILURE) {
  1005. resp = eap_fast_tlv_result(EAP_TLV_RESULT_FAILURE, 0);
  1006. return eap_fast_encrypt_response(sm, data, resp,
  1007. req->identifier, out_data);
  1008. }
  1009. if (tlv.iresult == EAP_TLV_RESULT_FAILURE) {
  1010. resp = eap_fast_tlv_result(EAP_TLV_RESULT_FAILURE, 1);
  1011. return eap_fast_encrypt_response(sm, data, resp,
  1012. req->identifier, out_data);
  1013. }
  1014. if (tlv.crypto_binding) {
  1015. tmp = eap_fast_process_crypto_binding(sm, data, ret,
  1016. tlv.crypto_binding,
  1017. tlv.crypto_binding_len);
  1018. if (tmp == NULL)
  1019. failed = 1;
  1020. else
  1021. resp = wpabuf_concat(resp, tmp);
  1022. }
  1023. if (tlv.iresult == EAP_TLV_RESULT_SUCCESS) {
  1024. tmp = eap_fast_tlv_result(failed ? EAP_TLV_RESULT_FAILURE :
  1025. EAP_TLV_RESULT_SUCCESS, 1);
  1026. resp = wpabuf_concat(resp, tmp);
  1027. }
  1028. if (tlv.eap_payload_tlv) {
  1029. tmp = eap_fast_process_eap_payload_tlv(
  1030. sm, data, ret, tlv.eap_payload_tlv,
  1031. tlv.eap_payload_tlv_len);
  1032. resp = wpabuf_concat(resp, tmp);
  1033. }
  1034. if (tlv.pac && tlv.result != EAP_TLV_RESULT_SUCCESS) {
  1035. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC TLV without Result TLV "
  1036. "acknowledging success");
  1037. failed = 1;
  1038. } else if (tlv.pac && tlv.result == EAP_TLV_RESULT_SUCCESS) {
  1039. tmp = eap_fast_process_pac(sm, data, ret, tlv.pac,
  1040. tlv.pac_len);
  1041. resp = wpabuf_concat(resp, tmp);
  1042. }
  1043. if (data->current_pac == NULL && data->provisioning &&
  1044. !data->anon_provisioning && !tlv.pac &&
  1045. (tlv.iresult == EAP_TLV_RESULT_SUCCESS ||
  1046. tlv.result == EAP_TLV_RESULT_SUCCESS)) {
  1047. /*
  1048. * Need to request Tunnel PAC when using authenticated
  1049. * provisioning.
  1050. */
  1051. wpa_printf(MSG_DEBUG, "EAP-FAST: Request Tunnel PAC");
  1052. tmp = eap_fast_pac_request();
  1053. resp = wpabuf_concat(resp, tmp);
  1054. }
  1055. if (tlv.result == EAP_TLV_RESULT_SUCCESS && !failed) {
  1056. tmp = eap_fast_tlv_result(EAP_TLV_RESULT_SUCCESS, 0);
  1057. resp = wpabuf_concat(tmp, resp);
  1058. } else if (failed) {
  1059. tmp = eap_fast_tlv_result(EAP_TLV_RESULT_FAILURE, 0);
  1060. resp = wpabuf_concat(tmp, resp);
  1061. }
  1062. if (resp && tlv.result == EAP_TLV_RESULT_SUCCESS && !failed &&
  1063. tlv.crypto_binding && data->phase2_success) {
  1064. if (data->anon_provisioning) {
  1065. wpa_printf(MSG_DEBUG, "EAP-FAST: Unauthenticated "
  1066. "provisioning completed successfully.");
  1067. ret->methodState = METHOD_DONE;
  1068. ret->decision = DECISION_FAIL;
  1069. sm->expected_failure = 1;
  1070. } else {
  1071. wpa_printf(MSG_DEBUG, "EAP-FAST: Authentication "
  1072. "completed successfully.");
  1073. if (data->provisioning)
  1074. ret->methodState = METHOD_MAY_CONT;
  1075. else
  1076. ret->methodState = METHOD_DONE;
  1077. ret->decision = DECISION_UNCOND_SUCC;
  1078. }
  1079. }
  1080. if (resp == NULL) {
  1081. wpa_printf(MSG_DEBUG, "EAP-FAST: No recognized TLVs - send "
  1082. "empty response packet");
  1083. resp = wpabuf_alloc(1);
  1084. }
  1085. return eap_fast_encrypt_response(sm, data, resp, req->identifier,
  1086. out_data);
  1087. }
  1088. static int eap_fast_decrypt(struct eap_sm *sm, struct eap_fast_data *data,
  1089. struct eap_method_ret *ret,
  1090. const struct eap_hdr *req,
  1091. const struct wpabuf *in_data,
  1092. struct wpabuf **out_data)
  1093. {
  1094. struct wpabuf *in_decrypted;
  1095. int res;
  1096. wpa_printf(MSG_DEBUG, "EAP-FAST: Received %lu bytes encrypted data for"
  1097. " Phase 2", (unsigned long) wpabuf_len(in_data));
  1098. if (data->pending_phase2_req) {
  1099. wpa_printf(MSG_DEBUG, "EAP-FAST: Pending Phase 2 request - "
  1100. "skip decryption and use old data");
  1101. /* Clear TLS reassembly state. */
  1102. eap_peer_tls_reset_input(&data->ssl);
  1103. in_decrypted = data->pending_phase2_req;
  1104. data->pending_phase2_req = NULL;
  1105. goto continue_req;
  1106. }
  1107. if (wpabuf_len(in_data) == 0) {
  1108. /* Received TLS ACK - requesting more fragments */
  1109. return eap_peer_tls_encrypt(sm, &data->ssl, EAP_TYPE_FAST,
  1110. data->fast_version,
  1111. req->identifier, NULL, out_data);
  1112. }
  1113. res = eap_peer_tls_decrypt(sm, &data->ssl, in_data, &in_decrypted);
  1114. if (res)
  1115. return res;
  1116. continue_req:
  1117. wpa_hexdump_buf(MSG_MSGDUMP, "EAP-FAST: Decrypted Phase 2 TLV(s)",
  1118. in_decrypted);
  1119. if (wpabuf_len(in_decrypted) < 4) {
  1120. wpa_printf(MSG_INFO, "EAP-FAST: Too short Phase 2 "
  1121. "TLV frame (len=%lu)",
  1122. (unsigned long) wpabuf_len(in_decrypted));
  1123. wpabuf_free(in_decrypted);
  1124. return -1;
  1125. }
  1126. res = eap_fast_process_decrypted(sm, data, ret, req,
  1127. in_decrypted, out_data);
  1128. wpabuf_free(in_decrypted);
  1129. return res;
  1130. }
  1131. static const u8 * eap_fast_get_a_id(const u8 *buf, size_t len, size_t *id_len)
  1132. {
  1133. const u8 *a_id;
  1134. struct pac_tlv_hdr *hdr;
  1135. /*
  1136. * Parse authority identity (A-ID) from the EAP-FAST/Start. This
  1137. * supports both raw A-ID and one inside an A-ID TLV.
  1138. */
  1139. a_id = buf;
  1140. *id_len = len;
  1141. if (len > sizeof(*hdr)) {
  1142. int tlen;
  1143. hdr = (struct pac_tlv_hdr *) buf;
  1144. tlen = be_to_host16(hdr->len);
  1145. if (be_to_host16(hdr->type) == PAC_TYPE_A_ID &&
  1146. sizeof(*hdr) + tlen <= len) {
  1147. wpa_printf(MSG_DEBUG, "EAP-FAST: A-ID was in TLV "
  1148. "(Start)");
  1149. a_id = (u8 *) (hdr + 1);
  1150. *id_len = tlen;
  1151. }
  1152. }
  1153. wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: A-ID", a_id, *id_len);
  1154. return a_id;
  1155. }
  1156. static void eap_fast_select_pac(struct eap_fast_data *data,
  1157. const u8 *a_id, size_t a_id_len)
  1158. {
  1159. data->current_pac = eap_fast_get_pac(data->pac, a_id, a_id_len,
  1160. PAC_TYPE_TUNNEL_PAC);
  1161. if (data->current_pac == NULL) {
  1162. /*
  1163. * Tunnel PAC was not available for this A-ID. Try to use
  1164. * Machine Authentication PAC, if one is available.
  1165. */
  1166. data->current_pac = eap_fast_get_pac(
  1167. data->pac, a_id, a_id_len,
  1168. PAC_TYPE_MACHINE_AUTHENTICATION);
  1169. }
  1170. if (data->current_pac) {
  1171. wpa_printf(MSG_DEBUG, "EAP-FAST: PAC found for this A-ID "
  1172. "(PAC-Type %d)", data->current_pac->pac_type);
  1173. wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-FAST: A-ID-Info",
  1174. data->current_pac->a_id_info,
  1175. data->current_pac->a_id_info_len);
  1176. }
  1177. }
  1178. static int eap_fast_use_pac_opaque(struct eap_sm *sm,
  1179. struct eap_fast_data *data,
  1180. struct eap_fast_pac *pac)
  1181. {
  1182. u8 *tlv;
  1183. size_t tlv_len, olen;
  1184. struct eap_tlv_hdr *ehdr;
  1185. olen = pac->pac_opaque_len;
  1186. tlv_len = sizeof(*ehdr) + olen;
  1187. tlv = os_malloc(tlv_len);
  1188. if (tlv) {
  1189. ehdr = (struct eap_tlv_hdr *) tlv;
  1190. ehdr->tlv_type = host_to_be16(PAC_TYPE_PAC_OPAQUE);
  1191. ehdr->length = host_to_be16(olen);
  1192. os_memcpy(ehdr + 1, pac->pac_opaque, olen);
  1193. }
  1194. if (tlv == NULL ||
  1195. tls_connection_client_hello_ext(sm->ssl_ctx, data->ssl.conn,
  1196. TLS_EXT_PAC_OPAQUE,
  1197. tlv, tlv_len) < 0) {
  1198. wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to add PAC-Opaque TLS "
  1199. "extension");
  1200. os_free(tlv);
  1201. return -1;
  1202. }
  1203. os_free(tlv);
  1204. return 0;
  1205. }
  1206. static int eap_fast_clear_pac_opaque_ext(struct eap_sm *sm,
  1207. struct eap_fast_data *data)
  1208. {
  1209. if (tls_connection_client_hello_ext(sm->ssl_ctx, data->ssl.conn,
  1210. TLS_EXT_PAC_OPAQUE, NULL, 0) < 0) {
  1211. wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to remove PAC-Opaque "
  1212. "TLS extension");
  1213. return -1;
  1214. }
  1215. return 0;
  1216. }
  1217. static int eap_fast_set_provisioning_ciphers(struct eap_sm *sm,
  1218. struct eap_fast_data *data)
  1219. {
  1220. u8 ciphers[5];
  1221. int count = 0;
  1222. if (data->provisioning_allowed & EAP_FAST_PROV_UNAUTH) {
  1223. wpa_printf(MSG_DEBUG, "EAP-FAST: Enabling unauthenticated "
  1224. "provisioning TLS cipher suites");
  1225. ciphers[count++] = TLS_CIPHER_ANON_DH_AES128_SHA;
  1226. }
  1227. if (data->provisioning_allowed & EAP_FAST_PROV_AUTH) {
  1228. wpa_printf(MSG_DEBUG, "EAP-FAST: Enabling authenticated "
  1229. "provisioning TLS cipher suites");
  1230. ciphers[count++] = TLS_CIPHER_RSA_DHE_AES128_SHA;
  1231. ciphers[count++] = TLS_CIPHER_AES128_SHA;
  1232. ciphers[count++] = TLS_CIPHER_RC4_SHA;
  1233. }
  1234. ciphers[count++] = TLS_CIPHER_NONE;
  1235. if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn,
  1236. ciphers)) {
  1237. wpa_printf(MSG_INFO, "EAP-FAST: Could not configure TLS "
  1238. "cipher suites for provisioning");
  1239. return -1;
  1240. }
  1241. return 0;
  1242. }
  1243. static int eap_fast_process_start(struct eap_sm *sm,
  1244. struct eap_fast_data *data, u8 flags,
  1245. const u8 *pos, size_t left)
  1246. {
  1247. const u8 *a_id;
  1248. size_t a_id_len;
  1249. /* EAP-FAST Version negotiation (section 3.1) */
  1250. wpa_printf(MSG_DEBUG, "EAP-FAST: Start (server ver=%d, own ver=%d)",
  1251. flags & EAP_TLS_VERSION_MASK, data->fast_version);
  1252. if ((flags & EAP_TLS_VERSION_MASK) < data->fast_version)
  1253. data->fast_version = flags & EAP_TLS_VERSION_MASK;
  1254. wpa_printf(MSG_DEBUG, "EAP-FAST: Using FAST version %d",
  1255. data->fast_version);
  1256. a_id = eap_fast_get_a_id(pos, left, &a_id_len);
  1257. eap_fast_select_pac(data, a_id, a_id_len);
  1258. if (data->resuming && data->current_pac) {
  1259. wpa_printf(MSG_DEBUG, "EAP-FAST: Trying to resume session - "
  1260. "do not add PAC-Opaque to TLS ClientHello");
  1261. if (eap_fast_clear_pac_opaque_ext(sm, data) < 0)
  1262. return -1;
  1263. } else if (data->current_pac) {
  1264. /*
  1265. * PAC found for the A-ID and we are not resuming an old
  1266. * session, so add PAC-Opaque extension to ClientHello.
  1267. */
  1268. if (eap_fast_use_pac_opaque(sm, data, data->current_pac) < 0)
  1269. return -1;
  1270. } else {
  1271. /* No PAC found, so we must provision one. */
  1272. if (!data->provisioning_allowed) {
  1273. wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found and "
  1274. "provisioning disabled");
  1275. return -1;
  1276. }
  1277. wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC found - "
  1278. "starting provisioning");
  1279. if (eap_fast_set_provisioning_ciphers(sm, data) < 0 ||
  1280. eap_fast_clear_pac_opaque_ext(sm, data) < 0)
  1281. return -1;
  1282. data->provisioning = 1;
  1283. }
  1284. return 0;
  1285. }
  1286. static struct wpabuf * eap_fast_process(struct eap_sm *sm, void *priv,
  1287. struct eap_method_ret *ret,
  1288. const struct wpabuf *reqData)
  1289. {
  1290. const struct eap_hdr *req;
  1291. size_t left;
  1292. int res;
  1293. u8 flags, id;
  1294. struct wpabuf *resp;
  1295. const u8 *pos;
  1296. struct eap_fast_data *data = priv;
  1297. pos = eap_peer_tls_process_init(sm, &data->ssl, EAP_TYPE_FAST, ret,
  1298. reqData, &left, &flags);
  1299. if (pos == NULL)
  1300. return NULL;
  1301. req = wpabuf_head(reqData);
  1302. id = req->identifier;
  1303. if (flags & EAP_TLS_FLAGS_START) {
  1304. if (eap_fast_process_start(sm, data, flags, pos, left) < 0)
  1305. return NULL;
  1306. left = 0; /* A-ID is not used in further packet processing */
  1307. }
  1308. resp = NULL;
  1309. if (tls_connection_established(sm->ssl_ctx, data->ssl.conn) &&
  1310. !data->resuming) {
  1311. /* Process tunneled (encrypted) phase 2 data. */
  1312. struct wpabuf msg;
  1313. wpabuf_set(&msg, pos, left);
  1314. res = eap_fast_decrypt(sm, data, ret, req, &msg, &resp);
  1315. if (res < 0) {
  1316. ret->methodState = METHOD_DONE;
  1317. ret->decision = DECISION_FAIL;
  1318. /*
  1319. * Ack possible Alert that may have caused failure in
  1320. * decryption.
  1321. */
  1322. res = 1;
  1323. }
  1324. } else {
  1325. /* Continue processing TLS handshake (phase 1). */
  1326. res = eap_peer_tls_process_helper(sm, &data->ssl,
  1327. EAP_TYPE_FAST,
  1328. data->fast_version, id, pos,
  1329. left, &resp);
  1330. if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) {
  1331. char cipher[80];
  1332. wpa_printf(MSG_DEBUG,
  1333. "EAP-FAST: TLS done, proceed to Phase 2");
  1334. if (data->provisioning &&
  1335. (!(data->provisioning_allowed &
  1336. EAP_FAST_PROV_AUTH) ||
  1337. tls_get_cipher(sm->ssl_ctx, data->ssl.conn,
  1338. cipher, sizeof(cipher)) < 0 ||
  1339. os_strstr(cipher, "ADH-") ||
  1340. os_strstr(cipher, "anon"))) {
  1341. wpa_printf(MSG_DEBUG, "EAP-FAST: Using "
  1342. "anonymous (unauthenticated) "
  1343. "provisioning");
  1344. data->anon_provisioning = 1;
  1345. } else
  1346. data->anon_provisioning = 0;
  1347. data->resuming = 0;
  1348. eap_fast_derive_keys(sm, data);
  1349. }
  1350. if (res == 2) {
  1351. struct wpabuf msg;
  1352. /*
  1353. * Application data included in the handshake message.
  1354. */
  1355. wpabuf_free(data->pending_phase2_req);
  1356. data->pending_phase2_req = resp;
  1357. resp = NULL;
  1358. wpabuf_set(&msg, pos, left);
  1359. res = eap_fast_decrypt(sm, data, ret, req, &msg,
  1360. &resp);
  1361. }
  1362. }
  1363. if (res == 1) {
  1364. wpabuf_free(resp);
  1365. return eap_peer_tls_build_ack(id, EAP_TYPE_FAST,
  1366. data->fast_version);
  1367. }
  1368. return resp;
  1369. }
  1370. #if 0 /* FIX */
  1371. static Boolean eap_fast_has_reauth_data(struct eap_sm *sm, void *priv)
  1372. {
  1373. struct eap_fast_data *data = priv;
  1374. return tls_connection_established(sm->ssl_ctx, data->ssl.conn);
  1375. }
  1376. static void eap_fast_deinit_for_reauth(struct eap_sm *sm, void *priv)
  1377. {
  1378. struct eap_fast_data *data = priv;
  1379. os_free(data->key_block_p);
  1380. data->key_block_p = NULL;
  1381. wpabuf_free(data->pending_phase2_req);
  1382. data->pending_phase2_req = NULL;
  1383. }
  1384. static void * eap_fast_init_for_reauth(struct eap_sm *sm, void *priv)
  1385. {
  1386. struct eap_fast_data *data = priv;
  1387. if (eap_peer_tls_reauth_init(sm, &data->ssl)) {
  1388. os_free(data);
  1389. return NULL;
  1390. }
  1391. os_memset(data->key_data, 0, EAP_FAST_KEY_LEN);
  1392. os_memset(data->emsk, 0, EAP_EMSK_LEN);
  1393. os_free(data->session_id);
  1394. data->session_id = NULL;
  1395. if (data->phase2_priv && data->phase2_method &&
  1396. data->phase2_method->init_for_reauth)
  1397. data->phase2_method->init_for_reauth(sm, data->phase2_priv);
  1398. data->phase2_success = 0;
  1399. data->resuming = 1;
  1400. data->provisioning = 0;
  1401. data->anon_provisioning = 0;
  1402. data->simck_idx = 0;
  1403. return priv;
  1404. }
  1405. #endif
  1406. static int eap_fast_get_status(struct eap_sm *sm, void *priv, char *buf,
  1407. size_t buflen, int verbose)
  1408. {
  1409. struct eap_fast_data *data = priv;
  1410. int len, ret;
  1411. len = eap_peer_tls_status(sm, &data->ssl, buf, buflen, verbose);
  1412. if (data->phase2_method) {
  1413. ret = os_snprintf(buf + len, buflen - len,
  1414. "EAP-FAST Phase2 method=%s\n",
  1415. data->phase2_method->name);
  1416. if (os_snprintf_error(buflen - len, ret))
  1417. return len;
  1418. len += ret;
  1419. }
  1420. return len;
  1421. }
  1422. static Boolean eap_fast_isKeyAvailable(struct eap_sm *sm, void *priv)
  1423. {
  1424. struct eap_fast_data *data = priv;
  1425. return data->success;
  1426. }
  1427. static u8 * eap_fast_getKey(struct eap_sm *sm, void *priv, size_t *len)
  1428. {
  1429. struct eap_fast_data *data = priv;
  1430. u8 *key;
  1431. if (!data->success)
  1432. return NULL;
  1433. key = os_malloc(EAP_FAST_KEY_LEN);
  1434. if (key == NULL)
  1435. return NULL;
  1436. *len = EAP_FAST_KEY_LEN;
  1437. os_memcpy(key, data->key_data, EAP_FAST_KEY_LEN);
  1438. return key;
  1439. }
  1440. static u8 * eap_fast_get_session_id(struct eap_sm *sm, void *priv, size_t *len)
  1441. {
  1442. struct eap_fast_data *data = priv;
  1443. u8 *id;
  1444. if (!data->success)
  1445. return NULL;
  1446. id = os_malloc(data->id_len);
  1447. if (id == NULL)
  1448. return NULL;
  1449. *len = data->id_len;
  1450. os_memcpy(id, data->session_id, data->id_len);
  1451. return id;
  1452. }
  1453. static u8 * eap_fast_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
  1454. {
  1455. struct eap_fast_data *data = priv;
  1456. u8 *key;
  1457. if (!data->success)
  1458. return NULL;
  1459. key = os_malloc(EAP_EMSK_LEN);
  1460. if (key == NULL)
  1461. return NULL;
  1462. *len = EAP_EMSK_LEN;
  1463. os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  1464. return key;
  1465. }
  1466. int eap_peer_fast_register(void)
  1467. {
  1468. struct eap_method *eap;
  1469. int ret;
  1470. eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
  1471. EAP_VENDOR_IETF, EAP_TYPE_FAST, "FAST");
  1472. if (eap == NULL)
  1473. return -1;
  1474. eap->init = eap_fast_init;
  1475. eap->deinit = eap_fast_deinit;
  1476. eap->process = eap_fast_process;
  1477. eap->isKeyAvailable = eap_fast_isKeyAvailable;
  1478. eap->getKey = eap_fast_getKey;
  1479. eap->getSessionId = eap_fast_get_session_id;
  1480. eap->get_status = eap_fast_get_status;
  1481. #if 0
  1482. eap->has_reauth_data = eap_fast_has_reauth_data;
  1483. eap->deinit_for_reauth = eap_fast_deinit_for_reauth;
  1484. eap->init_for_reauth = eap_fast_init_for_reauth;
  1485. #endif
  1486. eap->get_emsk = eap_fast_get_emsk;
  1487. ret = eap_peer_method_register(eap);
  1488. if (ret)
  1489. eap_peer_method_free(eap);
  1490. return ret;
  1491. }