1a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant/*
2a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant * hostapd / EAP-GTC (RFC 3748)
3a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant * Copyright (c) 2004-2006, Jouni Malinen <j@w1.fi>
4a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant *
5b64f8b07c104c6cc986570ac8ee0ed16a9f23976Howard Hinnant * This software may be distributed under the terms of the BSD license.
6b64f8b07c104c6cc986570ac8ee0ed16a9f23976Howard Hinnant * See README for more details.
7a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant */
8a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
9c8e18896019239e6c8b970accafbe8c8592c80ffDaniel Dunbar#include "includes.h"
104dc5b2198d1aa4ab585a3d4a87ee9626d681f9f7Dan Albert
114dc5b2198d1aa4ab585a3d4a87ee9626d681f9f7Dan Albert#include "common.h"
12a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant#include "eap_i.h"
13a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
14a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
15a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnantstruct eap_gtc_data {
16a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	enum { CONTINUE, SUCCESS, FAILURE } state;
17a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	int prefix;
18a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant};
19a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
20a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
21a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnantstatic void * eap_gtc_init(struct eap_sm *sm)
22a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant{
23a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	struct eap_gtc_data *data;
24a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
25a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	data = os_zalloc(sizeof(*data));
26a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	if (data == NULL)
27a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		return NULL;
28a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	data->state = CONTINUE;
29a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
30a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant#ifdef EAP_SERVER_FAST
31a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	if (sm->m && sm->m->vendor == EAP_VENDOR_IETF &&
32a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	    sm->m->method == EAP_TYPE_FAST) {
33a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		wpa_printf(MSG_DEBUG, "EAP-GTC: EAP-FAST tunnel - use prefix "
34a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant			   "with challenge/response");
35a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		data->prefix = 1;
36a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	}
37a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant#endif /* EAP_SERVER_FAST */
38a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
39a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	return data;
40a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant}
41a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
42a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
43a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnantstatic void eap_gtc_reset(struct eap_sm *sm, void *priv)
44a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant{
45a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	struct eap_gtc_data *data = priv;
46a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	os_free(data);
47a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant}
48a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
49a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
50a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnantstatic struct wpabuf * eap_gtc_buildReq(struct eap_sm *sm, void *priv, u8 id)
51a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant{
52a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	struct eap_gtc_data *data = priv;
53a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	struct wpabuf *req;
54a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	char *msg;
55a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	size_t msg_len;
56a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
57a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	msg = data->prefix ? "CHALLENGE=Password" : "Password";
58a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
59a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	msg_len = os_strlen(msg);
60a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GTC, msg_len,
61a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant			    EAP_CODE_REQUEST, id);
62a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	if (req == NULL) {
63a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		wpa_printf(MSG_ERROR, "EAP-GTC: Failed to allocate memory for "
64a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant			   "request");
65a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		data->state = FAILURE;
66a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		return NULL;
67a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	}
68a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
69a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	wpabuf_put_data(req, msg, msg_len);
70a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
71a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	data->state = CONTINUE;
72a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
73a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	return req;
74a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant}
75a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
76a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
77a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnantstatic Boolean eap_gtc_check(struct eap_sm *sm, void *priv,
78a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant			     struct wpabuf *respData)
79a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant{
80a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	const u8 *pos;
81a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	size_t len;
82a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
83a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &len);
84a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	if (pos == NULL || len < 1) {
85a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		wpa_printf(MSG_INFO, "EAP-GTC: Invalid frame");
86a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		return TRUE;
87a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	}
88a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
89a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant	return FALSE;
90a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant}
91a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant
923e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant
933e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnantstatic void eap_gtc_process(struct eap_sm *sm, void *priv,
943e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant			    struct wpabuf *respData)
953e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant{
963e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant	struct eap_gtc_data *data = priv;
973e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant	const u8 *pos;
983e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant	size_t rlen;
993e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant
1003e3ae9ec4186fd968903ec94613bcea96ab31e56Howard Hinnant	pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GTC, respData, &rlen);
1018634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow	if (pos == NULL || rlen < 1)
1028634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow		return; /* Should not happen - frame already validated */
1038634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow
1048634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow	wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-GTC: Response", pos, rlen);
1058634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow
1068634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow#ifdef EAP_SERVER_FAST
1078634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow	if (data->prefix) {
1088634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow		const u8 *pos2, *end;
1098634fc5494641850c89eab7a1f2357a55d694c0cMarshall Clow		/* "RESPONSE=<user>\0<password>" */
110a6a062df66fe49704bd074464af30bf8c3db6ea5Howard Hinnant		if (rlen < 10) {
111			wpa_printf(MSG_DEBUG, "EAP-GTC: Too short response "
112				   "for EAP-FAST prefix");
113			data->state = FAILURE;
114			return;
115		}
116
117		end = pos + rlen;
118		pos += 9;
119		pos2 = pos;
120		while (pos2 < end && *pos2)
121			pos2++;
122		if (pos2 == end) {
123			wpa_printf(MSG_DEBUG, "EAP-GTC: No password in "
124				   "response to EAP-FAST prefix");
125			data->state = FAILURE;
126			return;
127		}
128
129		wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Response user",
130				  pos, pos2 - pos);
131		if (sm->identity && sm->require_identity_match &&
132		    (pos2 - pos != (int) sm->identity_len ||
133		     os_memcmp(pos, sm->identity, sm->identity_len))) {
134			wpa_printf(MSG_DEBUG, "EAP-GTC: Phase 2 Identity did "
135				   "not match with required Identity");
136			wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-GTC: Expected "
137					  "identity",
138					  sm->identity, sm->identity_len);
139			data->state = FAILURE;
140			return;
141		} else {
142			os_free(sm->identity);
143			sm->identity_len = pos2 - pos;
144			sm->identity = os_malloc(sm->identity_len);
145			if (sm->identity == NULL) {
146				data->state = FAILURE;
147				return;
148			}
149			os_memcpy(sm->identity, pos, sm->identity_len);
150		}
151
152		if (eap_user_get(sm, sm->identity, sm->identity_len, 1) != 0) {
153			wpa_hexdump_ascii(MSG_DEBUG, "EAP-GTC: Phase2 "
154					  "Identity not found in the user "
155					  "database",
156					  sm->identity, sm->identity_len);
157			data->state = FAILURE;
158			return;
159		}
160
161		pos = pos2 + 1;
162		rlen = end - pos;
163		wpa_hexdump_ascii_key(MSG_MSGDUMP,
164				      "EAP-GTC: Response password",
165				      pos, rlen);
166	}
167#endif /* EAP_SERVER_FAST */
168
169	if (sm->user == NULL || sm->user->password == NULL ||
170	    sm->user->password_hash) {
171		wpa_printf(MSG_INFO, "EAP-GTC: Plaintext password not "
172			   "configured");
173		data->state = FAILURE;
174		return;
175	}
176
177	if (rlen != sm->user->password_len ||
178	    os_memcmp_const(pos, sm->user->password, rlen) != 0) {
179		wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Failure");
180		data->state = FAILURE;
181	} else {
182		wpa_printf(MSG_DEBUG, "EAP-GTC: Done - Success");
183		data->state = SUCCESS;
184	}
185}
186
187
188static Boolean eap_gtc_isDone(struct eap_sm *sm, void *priv)
189{
190	struct eap_gtc_data *data = priv;
191	return data->state != CONTINUE;
192}
193
194
195static Boolean eap_gtc_isSuccess(struct eap_sm *sm, void *priv)
196{
197	struct eap_gtc_data *data = priv;
198	return data->state == SUCCESS;
199}
200
201
202int eap_server_gtc_register(void)
203{
204	struct eap_method *eap;
205	int ret;
206
207	eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
208				      EAP_VENDOR_IETF, EAP_TYPE_GTC, "GTC");
209	if (eap == NULL)
210		return -1;
211
212	eap->init = eap_gtc_init;
213	eap->reset = eap_gtc_reset;
214	eap->buildReq = eap_gtc_buildReq;
215	eap->check = eap_gtc_check;
216	eap->process = eap_gtc_process;
217	eap->isDone = eap_gtc_isDone;
218	eap->isSuccess = eap_gtc_isSuccess;
219
220	ret = eap_server_method_register(eap);
221	if (ret)
222		eap_server_method_free(eap);
223	return ret;
224}
225