18d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/* 28d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * EAP peer method: EAP-PAX (RFC 4746) 38d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Copyright (c) 2005-2008, Jouni Malinen <j@w1.fi> 48d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 5c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * This software may be distributed under the terms of the BSD license. 6c5ec7f57ead87efa365800228aa0b09a12d9e6c4Dmitry Shmidt * See README for more details. 78d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 88d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 98d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "includes.h" 108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "common.h" 128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "crypto/random.h" 138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "eap_common/eap_pax_common.h" 148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt#include "eap_i.h" 158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt/* 178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * Note: only PAX_STD subprotocol is currently supported 188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * 198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * TODO: Add support with PAX_SEC with the mandatory to implement ciphersuite 208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * (HMAC_SHA1_128, IANA DH Group 14 (2048 bits), RSA-PKCS1-V1_5) and 218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * recommended ciphersuite (HMAC_SHA256_128, IANA DH Group 15 (3072 bits), 228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt * RSAES-OAEP). 238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt */ 248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstruct eap_pax_data { 268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt enum { PAX_INIT, PAX_STD_2_SENT, PAX_DONE } state; 278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 mac_id, dh_group_id, public_key_id; 288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt union { 298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 e[2 * EAP_PAX_RAND_LEN]; 308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct { 318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 x[EAP_PAX_RAND_LEN]; /* server rand */ 328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 y[EAP_PAX_RAND_LEN]; /* client rand */ 338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } r; 348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } rand; 358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt char *cid; 368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t cid_len; 378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 ak[EAP_PAX_AK_LEN]; 388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 mk[EAP_PAX_MK_LEN]; 398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 ck[EAP_PAX_CK_LEN]; 408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 ick[EAP_PAX_ICK_LEN]; 418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt}; 428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void eap_pax_deinit(struct eap_sm *sm, void *priv); 458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void * eap_pax_init(struct eap_sm *sm) 488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data; 508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *identity, *password; 518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t identity_len, password_len; 528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt identity = eap_get_config_identity(sm, &identity_len); 548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt password = eap_get_config_password(sm, &password_len); 558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (!identity || !password) { 568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: CID (nai) or key (password) " 578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "not configured"); 588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (password_len != EAP_PAX_AK_LEN) { 628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Invalid PSK length"); 638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data = os_zalloc(sizeof(*data)); 678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data == NULL) 688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->state = PAX_INIT; 708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->cid = os_malloc(identity_len); 728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->cid == NULL) { 738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_deinit(sm, data); 748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt os_memcpy(data->cid, identity, identity_len); 778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->cid_len = identity_len; 788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt os_memcpy(data->ak, password, EAP_PAX_AK_LEN); 808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return data; 828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic void eap_pax_deinit(struct eap_sm *sm, void *priv) 868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data = priv; 888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt os_free(data->cid); 89c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt bin_clear_free(data, sizeof(*data)); 908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic struct wpabuf * eap_pax_alloc_resp(const struct eap_pax_hdr *req, 948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 id, u8 op_code, size_t plen) 958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *resp; 978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_hdr *pax; 988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt resp = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_PAX, 1008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt sizeof(*pax) + plen, EAP_CODE_RESPONSE, id); 1018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (resp == NULL) 1028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax = wpabuf_put(resp, sizeof(*pax)); 1058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax->op_code = op_code; 1068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax->flags = 0; 1078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax->mac_id = req->mac_id; 1088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax->dh_group_id = req->dh_group_id; 1098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pax->public_key_id = req->public_key_id; 1108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return resp; 1128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 1138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic struct wpabuf * eap_pax_process_std_1(struct eap_pax_data *data, 1168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_method_ret *ret, u8 id, 1178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct eap_pax_hdr *req, 1188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t req_plen) 1198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 1208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *resp; 1218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *pos; 1228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *rpos; 1238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t left, plen; 1248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-1 (received)"); 1268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_INIT) { 1288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 received in " 1298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "unexpected state (%d) - ignored", data->state); 1308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->flags & EAP_PAX_FLAGS_CE) { 1358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with CE flag set - " 1368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "ignored"); 1378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left = req_plen - sizeof(*req); 1428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (left < 2 + EAP_PAX_RAND_LEN) { 1448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with too short " 1458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "payload"); 1468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos = (const u8 *) (req + 1); 1518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (WPA_GET_BE16(pos) != EAP_PAX_RAND_LEN) { 1528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-1 with incorrect A " 1538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "length %d (expected %d)", 1548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt WPA_GET_BE16(pos), EAP_PAX_RAND_LEN); 1558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos += 2; 1608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left -= 2; 1618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt os_memcpy(data->rand.r.x, pos, EAP_PAX_RAND_LEN); 1628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: X (server rand)", 1638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.x, EAP_PAX_RAND_LEN); 1648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos += EAP_PAX_RAND_LEN; 1658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left -= EAP_PAX_RAND_LEN; 1668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (left > 0) { 1688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 1698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos, left); 1708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (random_get_bytes(data->rand.r.y, EAP_PAX_RAND_LEN)) { 1738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_ERROR, "EAP-PAX: Failed to get random data"); 1748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: Y (client rand)", 1788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.y, EAP_PAX_RAND_LEN); 1798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (eap_pax_initial_key_derivation(req->mac_id, data->ak, data->rand.e, 1818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->mk, data->ck, data->ick) < 0) 1828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt { 1838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 1848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 1868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-2 (sending)"); 1888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt plen = 2 + EAP_PAX_RAND_LEN + 2 + data->cid_len + 2 + EAP_PAX_MAC_LEN + 1908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt EAP_PAX_ICV_LEN; 1918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_STD_2, plen); 1928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (resp == NULL) 1938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 1948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 1958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_put_be16(resp, EAP_PAX_RAND_LEN); 1968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_put_data(resp, data->rand.r.y, EAP_PAX_RAND_LEN); 1978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: B = Y (client rand)", 1988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.y, EAP_PAX_RAND_LEN); 1998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_put_be16(resp, data->cid_len); 2018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_put_data(resp, data->cid, data->cid_len); 2028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-PAX: CID", 2038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt (u8 *) data->cid, data->cid_len); 2048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_put_be16(resp, EAP_PAX_MAC_LEN); 2068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt rpos = wpabuf_put(resp, EAP_PAX_MAC_LEN); 2078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(req->mac_id, data->ck, EAP_PAX_CK_LEN, 2088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.x, EAP_PAX_RAND_LEN, 2098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.y, EAP_PAX_RAND_LEN, 2108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt (u8 *) data->cid, data->cid_len, rpos); 2118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(A, B, CID)", 2128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt rpos, EAP_PAX_MAC_LEN); 2138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* Optional ADE could be added here, if needed */ 2158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 2178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 2188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_head(resp), wpabuf_len(resp) - EAP_PAX_ICV_LEN, 2198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt NULL, 0, NULL, 0, rpos); 2208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 2218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->state = PAX_STD_2_SENT; 2238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->mac_id = req->mac_id; 2248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->dh_group_id = req->dh_group_id; 2258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->public_key_id = req->public_key_id; 2268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return resp; 2288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 2298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic struct wpabuf * eap_pax_process_std_3(struct eap_pax_data *data, 2328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_method_ret *ret, u8 id, 2338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct eap_pax_hdr *req, 2348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t req_plen) 2358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 2368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *resp; 2378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *rpos, mac[EAP_PAX_MAC_LEN]; 2388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *pos; 2398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t left; 2408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: PAX_STD-3 (received)"); 2428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_STD_2_SENT) { 2448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 received in " 2458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "unexpected state (%d) - ignored", data->state); 2468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 2478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 2488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->flags & EAP_PAX_FLAGS_CE) { 2518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with CE flag set - " 2528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "ignored"); 2538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 2548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 2558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left = req_plen - sizeof(*req); 2588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (left < 2 + EAP_PAX_MAC_LEN) { 2608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with too short " 2618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "payload"); 2628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 2638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 2648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos = (const u8 *) (req + 1); 2678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (WPA_GET_BE16(pos) != EAP_PAX_MAC_LEN) { 2688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: PAX_STD-3 with incorrect " 2698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "MAC_CK length %d (expected %d)", 2708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt WPA_GET_BE16(pos), EAP_PAX_MAC_LEN); 2718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 2728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 2738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos += 2; 2758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left -= 2; 2768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: MAC_CK(B, CID)", 2778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos, EAP_PAX_MAC_LEN); 2788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(data->mac_id, data->ck, EAP_PAX_CK_LEN, 2798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.r.y, EAP_PAX_RAND_LEN, 2808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt (u8 *) data->cid, data->cid_len, NULL, 0, mac); 281c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt if (os_memcmp_const(pos, mac, EAP_PAX_MAC_LEN) != 0) { 2828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Invalid MAC_CK(B, CID) " 2838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "received"); 2848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected MAC_CK(B, CID)", 2858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt mac, EAP_PAX_MAC_LEN); 2868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->methodState = METHOD_DONE; 2878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->decision = DECISION_FAIL; 2888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 2898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos += EAP_PAX_MAC_LEN; 2928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt left -= EAP_PAX_MAC_LEN; 2938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (left > 0) { 2958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ignored extra payload", 2968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos, left); 2978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 2988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 2998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: PAX-ACK (sending)"); 3008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt resp = eap_pax_alloc_resp(req, id, EAP_PAX_OP_ACK, EAP_PAX_ICV_LEN); 3028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (resp == NULL) 3038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* Optional ADE could be added here, if needed */ 3068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt rpos = wpabuf_put(resp, EAP_PAX_ICV_LEN); 3088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(data->mac_id, data->ick, EAP_PAX_ICK_LEN, 3098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_head(resp), wpabuf_len(resp) - EAP_PAX_ICV_LEN, 3108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt NULL, 0, NULL, 0, rpos); 3118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", rpos, EAP_PAX_ICV_LEN); 3128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->state = PAX_DONE; 3148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->methodState = METHOD_DONE; 3158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->decision = DECISION_UNCOND_SUCC; 3168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->allowNotifications = FALSE; 3178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return resp; 3198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 3208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic struct wpabuf * eap_pax_process(struct eap_sm *sm, void *priv, 3238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_method_ret *ret, 3248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct wpabuf *reqData) 3258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 3268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data = priv; 3278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const struct eap_pax_hdr *req; 3288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct wpabuf *resp; 3298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 icvbuf[EAP_PAX_ICV_LEN], id; 3308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt const u8 *icv, *pos; 3318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt size_t len; 3328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u16 flen, mlen; 3338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_PAX, reqData, &len); 3358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (pos == NULL || len < EAP_PAX_ICV_LEN) { 3368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt id = eap_get_id(reqData); 3408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req = (const struct eap_pax_hdr *) pos; 3418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt flen = len - EAP_PAX_ICV_LEN; 3428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt mlen = wpabuf_len(reqData) - EAP_PAX_ICV_LEN; 3438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: received frame: op_code 0x%x " 3458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "flags 0x%x mac_id 0x%x dh_group_id 0x%x " 3468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "public_key_id 0x%x", 3478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req->op_code, req->flags, req->mac_id, req->dh_group_id, 3488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req->public_key_id); 3498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: received payload", 3508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt pos, len - EAP_PAX_ICV_LEN); 3518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_INIT && data->mac_id != req->mac_id) { 3538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: MAC ID changed during " 3548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "authentication (was 0x%d, is 0x%d)", 3558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->mac_id, req->mac_id); 3568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_INIT && data->dh_group_id != req->dh_group_id) { 3618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: DH Group ID changed during " 3628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "authentication (was 0x%d, is 0x%d)", 3638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->dh_group_id, req->dh_group_id); 3648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_INIT && 3698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->public_key_id != req->public_key_id) { 3708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Public Key ID changed during " 3718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "authentication (was 0x%d, is 0x%d)", 3728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->public_key_id, req->public_key_id); 3738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* TODO: add support EAP_PAX_HMAC_SHA256_128 */ 3788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->mac_id != EAP_PAX_MAC_HMAC_SHA1_128) { 3798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Unsupported MAC ID 0x%x", 3808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req->mac_id); 3818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->dh_group_id != EAP_PAX_DH_GROUP_NONE) { 3868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Unsupported DH Group ID 0x%x", 3878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req->dh_group_id); 3888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->public_key_id != EAP_PAX_PUBLIC_KEY_NONE) { 3938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: Unsupported Public Key ID 0x%x", 3948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt req->public_key_id); 3958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 3968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 3978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 3988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 3998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->flags & EAP_PAX_FLAGS_MF) { 4008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt /* TODO: add support for reassembling fragments */ 4018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_INFO, "EAP-PAX: fragmentation not supported - " 4028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "ignored packet"); 4038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 4048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 4068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt icv = pos + len - EAP_PAX_ICV_LEN; 4088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: ICV", icv, EAP_PAX_ICV_LEN); 4098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (req->op_code == EAP_PAX_OP_STD_1) { 4108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(req->mac_id, (u8 *) "", 0, 4118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, 4128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt icvbuf); 4138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } else { 4148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_mac(req->mac_id, data->ick, EAP_PAX_ICK_LEN, 4158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpabuf_head(reqData), mlen, NULL, 0, NULL, 0, 4168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt icvbuf); 4178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 418c28170251eb54dbf64a9074a07fee377587425b2Dmitry Shmidt if (os_memcmp_const(icv, icvbuf, EAP_PAX_ICV_LEN) != 0) { 4198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: invalid ICV - ignoring the " 4208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "message"); 4218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_hexdump(MSG_MSGDUMP, "EAP-PAX: expected ICV", 4228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt icvbuf, EAP_PAX_ICV_LEN); 4238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 4248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 4268d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4278d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = FALSE; 4288d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->methodState = METHOD_MAY_CONT; 4298d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->decision = DECISION_FAIL; 4308d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->allowNotifications = TRUE; 4318d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4328d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt switch (req->op_code) { 4338d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt case EAP_PAX_OP_STD_1: 4348d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt resp = eap_pax_process_std_1(data, ret, id, req, flen); 4358d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt break; 4368d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt case EAP_PAX_OP_STD_3: 4378d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt resp = eap_pax_process_std_3(data, ret, id, req, flen); 4388d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt break; 4398d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt default: 4408d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt wpa_printf(MSG_DEBUG, "EAP-PAX: ignoring message with unknown " 4418d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "op_code %d", req->op_code); 4428d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->ignore = TRUE; 4438d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4448d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 4458d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4468d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (ret->methodState == METHOD_DONE) { 4478d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret->allowNotifications = FALSE; 4488d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt } 4498d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4508d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return resp; 4518d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 4528d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4538d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4548d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic Boolean eap_pax_isKeyAvailable(struct eap_sm *sm, void *priv) 4558d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 4568d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data = priv; 4578d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return data->state == PAX_DONE; 4588d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 4598d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4608d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4618d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u8 * eap_pax_getKey(struct eap_sm *sm, void *priv, size_t *len) 4628d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 4638d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data = priv; 4648d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *key; 4658d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4668d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_DONE) 4678d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4688d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4698d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt key = os_malloc(EAP_MSK_LEN); 4708d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (key == NULL) 4718d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4728d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4738d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *len = EAP_MSK_LEN; 4748d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 4758d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "Master Session Key", data->rand.e, 2 * EAP_PAX_RAND_LEN, 4768d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt EAP_MSK_LEN, key); 4778d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4788d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return key; 4798d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 4808d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4818d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4828d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtstatic u8 * eap_pax_get_emsk(struct eap_sm *sm, void *priv, size_t *len) 4838d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 4848d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_pax_data *data = priv; 4858d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt u8 *key; 4868d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4878d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (data->state != PAX_DONE) 4888d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4898d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4908d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt key = os_malloc(EAP_EMSK_LEN); 4918d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (key == NULL) 4928d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return NULL; 4938d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 4948d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt *len = EAP_EMSK_LEN; 4958d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_pax_kdf(data->mac_id, data->mk, EAP_PAX_MK_LEN, 4968d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt "Extended Master Session Key", 4978d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt data->rand.e, 2 * EAP_PAX_RAND_LEN, 4988d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt EAP_EMSK_LEN, key); 4998d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5008d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return key; 5018d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 5028d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5038d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5048d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidtint eap_peer_pax_register(void) 5058d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt{ 5068d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt struct eap_method *eap; 5078d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt int ret; 5088d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5098d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION, 5108d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt EAP_VENDOR_IETF, EAP_TYPE_PAX, "PAX"); 5118d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (eap == NULL) 5128d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return -1; 5138d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5148d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->init = eap_pax_init; 5158d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->deinit = eap_pax_deinit; 5168d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->process = eap_pax_process; 5178d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->isKeyAvailable = eap_pax_isKeyAvailable; 5188d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->getKey = eap_pax_getKey; 5198d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap->get_emsk = eap_pax_get_emsk; 5208d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt 5218d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt ret = eap_peer_method_register(eap); 5228d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt if (ret) 5238d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt eap_peer_method_free(eap); 5248d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt return ret; 5258d520ff1dc2da35cdca849e982051b86468016d8Dmitry Shmidt} 526