2018-01-24 00:29:12 +01:00
|
|
|
/*
|
|
|
|
*
|
|
|
|
* Wireless daemon for Linux
|
|
|
|
*
|
2019-10-25 00:43:08 +02:00
|
|
|
* Copyright (C) 2018-2019 Intel Corporation. All rights reserved.
|
2018-01-24 00:29:12 +01:00
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include <config.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <string.h>
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <ell/ell.h>
|
2018-10-19 08:24:57 +02:00
|
|
|
|
2019-12-12 21:10:16 +01:00
|
|
|
#include "src/crypto.h"
|
2019-04-03 18:34:22 +02:00
|
|
|
#include "src/missing.h"
|
2018-12-05 23:08:57 +01:00
|
|
|
#include "src/eap.h"
|
|
|
|
#include "src/eap-private.h"
|
|
|
|
#include "src/eap-tls-common.h"
|
2018-01-24 00:29:12 +01:00
|
|
|
|
2018-02-14 01:14:48 +01:00
|
|
|
/*
|
|
|
|
* Protected EAP Protocol (PEAP): EAP type 25 as described in:
|
|
|
|
*
|
|
|
|
* PEAPv0: draft-kamath-pppext-peapv0-00
|
|
|
|
* PEAPv1: draft-josefsson-pppext-eap-tls-eap-05
|
|
|
|
*/
|
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state {
|
|
|
|
struct eap_state *phase2;
|
2019-12-05 22:13:50 +01:00
|
|
|
|
|
|
|
uint8_t key[128];
|
2020-01-31 23:25:15 +01:00
|
|
|
uint8_t isk[32];
|
2019-12-05 22:13:49 +01:00
|
|
|
};
|
|
|
|
|
2020-01-31 23:25:15 +01:00
|
|
|
static void eap_peap_phase2_key_ready(const uint8_t *msk_data, size_t msk_len,
|
|
|
|
const uint8_t *emsk_data, size_t emsk_len,
|
|
|
|
const uint8_t *iv, size_t iv_len,
|
|
|
|
const uint8_t *session_id, size_t session_len,
|
|
|
|
void *user_data)
|
|
|
|
{
|
|
|
|
struct peap_state *peap_state =
|
|
|
|
eap_tls_common_get_variant_data(user_data);
|
|
|
|
|
|
|
|
l_debug("PEAP: New ISK received");
|
|
|
|
|
|
|
|
memcpy(peap_state->isk, msk_data, sizeof(peap_state->isk));
|
|
|
|
}
|
|
|
|
|
2018-02-15 01:14:48 +01:00
|
|
|
static void eap_peap_phase2_send_response(const uint8_t *pdu, size_t pdu_len,
|
|
|
|
void *user_data)
|
|
|
|
{
|
2018-02-15 01:14:49 +01:00
|
|
|
struct eap_state *eap = user_data;
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (eap_tls_common_get_negotiated_version(eap) == EAP_TLS_VERSION_0) {
|
2018-02-15 01:14:49 +01:00
|
|
|
if (pdu_len < 5)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (pdu[4] != EAP_TYPE_EXTENSIONS) {
|
|
|
|
pdu += 4;
|
|
|
|
pdu_len -= 4;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_tunnel_send(eap, pdu, pdu_len);
|
2018-02-15 01:14:48 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
static void eap_peap_phase2_complete(enum eap_result result, void *user_data)
|
|
|
|
{
|
|
|
|
struct eap_state *eap = user_data;
|
2019-12-05 22:13:50 +01:00
|
|
|
struct peap_state *peap_state;
|
2018-02-15 01:14:48 +01:00
|
|
|
|
2019-09-11 22:13:25 +02:00
|
|
|
l_debug("result: %d", result);
|
|
|
|
|
2018-02-15 01:14:48 +01:00
|
|
|
/*
|
2018-02-23 21:05:52 +01:00
|
|
|
* PEAPv1: draft-josefsson-pppext-eap-tls-eap-05, Section 2.2
|
2018-02-15 01:14:48 +01:00
|
|
|
*
|
|
|
|
* The receipt of a EAP-Failure or EAP-Success within the TLS protected
|
|
|
|
* channel results in a shutdown of the TLS channel by the peer.
|
|
|
|
*/
|
2019-09-11 22:13:26 +02:00
|
|
|
if (result == EAP_RESULT_SUCCESS)
|
|
|
|
/*
|
|
|
|
* Some of the EAP-PEAP server implementations seem to require a
|
|
|
|
* cleartext ACK for the tunneled EAP-Success messages instead
|
|
|
|
* of simply closing the tunnel.
|
|
|
|
*/
|
|
|
|
eap_tls_common_send_empty_response(eap);
|
|
|
|
else
|
|
|
|
eap_tls_common_tunnel_close(eap);
|
2018-02-23 21:05:52 +01:00
|
|
|
|
|
|
|
eap_discard_success_and_failure(eap, false);
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_set_completed(eap);
|
2018-02-23 21:05:52 +01:00
|
|
|
|
|
|
|
if (result != EAP_RESULT_SUCCESS) {
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_set_phase2_failed(eap);
|
|
|
|
|
2018-02-23 21:05:52 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-12-05 22:13:50 +01:00
|
|
|
peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
|
|
|
|
eap_set_key_material(eap, peap_state->key + 0, 64, NULL, 0, NULL,
|
|
|
|
0, NULL, 0);
|
|
|
|
explicit_bzero(peap_state->key, sizeof(peap_state->key));
|
2020-01-31 23:25:15 +01:00
|
|
|
explicit_bzero(peap_state->isk, sizeof(peap_state->isk));
|
2019-12-05 22:13:50 +01:00
|
|
|
|
2018-02-23 21:05:52 +01:00
|
|
|
eap_method_success(eap);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* PEAPv0: draft-kamath-pppext-peapv0-00, Section 2
|
|
|
|
*/
|
|
|
|
#define EAP_EXTENSIONS_HEADER_LEN 5
|
2019-12-05 22:13:51 +01:00
|
|
|
#define EAP_EXTENSIONS_TLV_HEADER_LEN 4
|
2019-12-12 21:10:15 +01:00
|
|
|
#define EAP_EXTENSIONS_TLV_M_BIT_MASK 0x8000
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-05 22:13:51 +01:00
|
|
|
enum eap_extensions_tlv_type {
|
2018-02-23 21:05:52 +01:00
|
|
|
/* Reserved = 0x0000, */
|
|
|
|
/* Reserved = 0x0001, */
|
|
|
|
/* Reserved = 0x0002, */
|
2019-12-12 21:10:16 +01:00
|
|
|
EAP_EXTENSIONS_TLV_TYPE_RESULT = 0x8003,
|
|
|
|
EAP_EXTENSIONS_TLV_TYPE_CRYPTOBINDING = 0x000C,
|
2018-02-23 21:05:52 +01:00
|
|
|
};
|
|
|
|
|
2019-12-12 21:10:16 +01:00
|
|
|
enum TLV_CRYPTOBINDING_TYPE {
|
|
|
|
TLV_CRYPTOBINDING_TYPE_REQUEST = 0,
|
|
|
|
TLV_CRYPTOBINDING_TYPE_RESPONSE = 1,
|
|
|
|
};
|
|
|
|
|
|
|
|
static bool cryptobinding_tlv_generate_csk(struct eap_state *eap, uint8_t *imck)
|
|
|
|
{
|
|
|
|
struct peap_state *peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
static const char *label = "Session Key Generating Function";
|
|
|
|
|
|
|
|
if (!prf_plus_sha1(imck, 40, label, strlen(label), "\00", 1,
|
|
|
|
peap_state->key, sizeof(peap_state->key)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool cryptobinding_tlv_generate_imck(struct eap_state *eap,
|
|
|
|
uint8_t *imck_out)
|
|
|
|
{
|
|
|
|
struct peap_state *peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
static const char *label = "Inner Methods Compound Keys";
|
|
|
|
|
|
|
|
if (!prf_plus_sha1(peap_state->key, 40, label, strlen(label),
|
2020-01-31 23:25:15 +01:00
|
|
|
peap_state->isk, 32, imck_out, 60))
|
2019-12-12 21:10:16 +01:00
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int eap_extensions_handle_cryptobinding_tlv(struct eap_state *eap,
|
|
|
|
const uint8_t *data,
|
|
|
|
uint16_t tlv_value_len,
|
|
|
|
uint8_t *response)
|
|
|
|
{
|
|
|
|
static const uint8_t cryptobinding_val_len = 56;
|
|
|
|
static const uint8_t cryptobinding_compound_mac_len = 20;
|
|
|
|
static const uint8_t cryptobinding_nonce_len = 32;
|
|
|
|
const uint8_t *nonce;
|
|
|
|
const uint8_t *server_compound_mac;
|
|
|
|
uint8_t client_compound_mac[cryptobinding_compound_mac_len];
|
|
|
|
const uint8_t *cryptobinding_tlv_value;
|
|
|
|
uint8_t buf[61];
|
|
|
|
uint8_t imck[60];
|
|
|
|
|
2019-12-17 23:15:05 +01:00
|
|
|
l_debug("");
|
2019-12-13 20:32:51 +01:00
|
|
|
|
2019-12-12 21:10:16 +01:00
|
|
|
if (tlv_value_len != cryptobinding_val_len)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
cryptobinding_tlv_value = data;
|
|
|
|
|
|
|
|
/* Reserved byte: must be ignored on receipt. */
|
|
|
|
data += 1;
|
|
|
|
|
|
|
|
/* Version byte: must be set to 0. */
|
|
|
|
if (*data)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
data += 1;
|
|
|
|
|
|
|
|
/* RecvVersion byte: must be set to 0. */
|
|
|
|
if (*data)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
data += 1;
|
|
|
|
|
|
|
|
/* SubType byte: cryptobinding TLV request. */
|
|
|
|
if (*data != TLV_CRYPTOBINDING_TYPE_REQUEST)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
data += 1;
|
|
|
|
|
|
|
|
nonce = data;
|
|
|
|
data += cryptobinding_nonce_len;
|
|
|
|
|
|
|
|
server_compound_mac = data;
|
|
|
|
|
|
|
|
l_put_be16(EAP_EXTENSIONS_TLV_TYPE_CRYPTOBINDING, &buf[0]);
|
|
|
|
l_put_be16(tlv_value_len, &buf[2]);
|
|
|
|
memcpy(&buf[4], cryptobinding_tlv_value,
|
|
|
|
4 + cryptobinding_nonce_len);
|
|
|
|
memset(&buf[EAP_EXTENSIONS_TLV_HEADER_LEN + 4 +
|
|
|
|
cryptobinding_nonce_len],
|
|
|
|
0, cryptobinding_compound_mac_len);
|
|
|
|
buf[60] = EAP_TYPE_PEAP;
|
|
|
|
|
|
|
|
if (!cryptobinding_tlv_generate_imck(eap, imck)) {
|
|
|
|
l_error("PEAP: Failed to generate IMCK to validate "
|
|
|
|
"server compound MAC.");
|
|
|
|
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!hmac_sha1(imck + 40, 20, buf, sizeof(buf), client_compound_mac,
|
|
|
|
cryptobinding_compound_mac_len)) {
|
|
|
|
l_error("PEAP: Failed to generate compound MAC to validate "
|
|
|
|
"server compound MAC.");
|
|
|
|
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (memcmp(server_compound_mac, client_compound_mac,
|
|
|
|
cryptobinding_compound_mac_len)) {
|
|
|
|
l_error("PEAP: Generated compound MAC and server compound MAC "
|
|
|
|
"don't match.");
|
2020-01-31 23:25:17 +01:00
|
|
|
return -EIO;
|
2019-12-12 21:10:16 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Build response Crypto-Binding TLV */
|
|
|
|
data = response;
|
|
|
|
|
|
|
|
l_put_be16(EAP_EXTENSIONS_TLV_TYPE_CRYPTOBINDING, response);
|
|
|
|
response += 2;
|
|
|
|
|
|
|
|
l_put_be16(cryptobinding_val_len, response);
|
|
|
|
response += 2;
|
|
|
|
|
|
|
|
/* Reserved - must be set to 0. */
|
|
|
|
l_put_u8(0, response);
|
|
|
|
response += 1;
|
|
|
|
|
|
|
|
/* Version */
|
|
|
|
l_put_u8(EAP_TLS_VERSION_0, response);
|
|
|
|
response += 1;
|
|
|
|
|
|
|
|
/* Received Version */
|
|
|
|
l_put_u8(EAP_TLS_VERSION_0, response);
|
|
|
|
response += 1;
|
|
|
|
|
|
|
|
/* Sub-Type */
|
|
|
|
l_put_u8(TLV_CRYPTOBINDING_TYPE_RESPONSE, response);
|
|
|
|
response += 1;
|
|
|
|
|
|
|
|
memcpy(response, nonce, cryptobinding_nonce_len);
|
|
|
|
response += cryptobinding_nonce_len;
|
|
|
|
|
|
|
|
memcpy(buf, data, EAP_EXTENSIONS_TLV_HEADER_LEN + 4 +
|
|
|
|
cryptobinding_nonce_len);
|
|
|
|
|
|
|
|
if (!hmac_sha1(imck + 40, 20, buf, sizeof(buf), client_compound_mac,
|
|
|
|
cryptobinding_compound_mac_len)) {
|
|
|
|
l_error("PEAP: Failed to generate client compound MAC.");
|
|
|
|
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
memcpy(response, client_compound_mac, cryptobinding_compound_mac_len);
|
|
|
|
|
|
|
|
if (!cryptobinding_tlv_generate_csk(eap, imck)) {
|
|
|
|
l_error("PEAP: Failed to generate Compound Session Key.");
|
|
|
|
|
|
|
|
return -EIO;
|
|
|
|
}
|
|
|
|
|
|
|
|
return EAP_EXTENSIONS_TLV_HEADER_LEN + cryptobinding_val_len;
|
|
|
|
}
|
|
|
|
|
2018-02-23 21:05:52 +01:00
|
|
|
enum eap_extensions_result {
|
|
|
|
EAP_EXTENSIONS_RESULT_SUCCCESS = 1,
|
|
|
|
EAP_EXTENSIONS_RESULT_FAILURE = 2,
|
|
|
|
};
|
|
|
|
|
2019-12-05 22:13:51 +01:00
|
|
|
static int eap_extensions_handle_result_tlv(struct eap_state *eap,
|
2018-02-23 21:05:52 +01:00
|
|
|
const uint8_t *data,
|
|
|
|
size_t data_len,
|
2019-12-12 21:10:15 +01:00
|
|
|
uint8_t *response,
|
|
|
|
uint8_t *result)
|
2018-02-23 21:05:52 +01:00
|
|
|
{
|
2019-12-12 21:10:15 +01:00
|
|
|
static const uint8_t result_tlv_len = 2;
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state *peap_state;
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
if (data_len != result_tlv_len)
|
|
|
|
return -EBADMSG;
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
*result = l_get_be16(data);
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
l_debug("result: %d", *result);
|
2019-09-11 22:13:25 +02:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
switch (*result) {
|
2018-02-23 21:05:52 +01:00
|
|
|
case EAP_EXTENSIONS_RESULT_SUCCCESS:
|
2019-12-05 22:13:49 +01:00
|
|
|
peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
*result = eap_method_is_success(peap_state->phase2) ?
|
2018-02-23 21:05:52 +01:00
|
|
|
EAP_EXTENSIONS_RESULT_SUCCCESS :
|
|
|
|
EAP_EXTENSIONS_RESULT_FAILURE;
|
|
|
|
/* fall through */
|
|
|
|
case EAP_EXTENSIONS_RESULT_FAILURE:
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
return -ENOENT;
|
|
|
|
}
|
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
/* Build response Result TLV */
|
|
|
|
|
|
|
|
l_put_be16(EAP_EXTENSIONS_TLV_TYPE_RESULT, response);
|
|
|
|
response += 2;
|
|
|
|
|
|
|
|
l_put_be16(result_tlv_len, response);
|
|
|
|
response += 2;
|
|
|
|
|
|
|
|
l_put_be16(*result, response);
|
|
|
|
|
|
|
|
return EAP_EXTENSIONS_TLV_HEADER_LEN + result_tlv_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int eap_extensions_process_tlvs(struct eap_state *eap,
|
|
|
|
const uint8_t *data,
|
|
|
|
size_t data_len,
|
|
|
|
uint8_t *response,
|
|
|
|
uint8_t *result)
|
|
|
|
{
|
|
|
|
int response_len = 0;
|
|
|
|
uint16_t tlv_type;
|
|
|
|
uint16_t tlv_value_len;
|
2020-02-06 00:19:05 +01:00
|
|
|
bool seen_result_tlv = false;
|
|
|
|
bool seen_cryptobinding_tlv = false;
|
2019-12-12 21:10:15 +01:00
|
|
|
|
|
|
|
while (data_len >= EAP_EXTENSIONS_TLV_HEADER_LEN) {
|
|
|
|
int response_tlv_len = 0;
|
|
|
|
|
|
|
|
tlv_type = l_get_be16(data);
|
|
|
|
data += 2;
|
|
|
|
|
|
|
|
tlv_value_len = l_get_be16(data);
|
|
|
|
data += 2;
|
|
|
|
|
|
|
|
data_len -= EAP_EXTENSIONS_TLV_HEADER_LEN;
|
|
|
|
|
|
|
|
if (data_len < tlv_value_len)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
switch (tlv_type) {
|
|
|
|
case EAP_EXTENSIONS_TLV_TYPE_RESULT:
|
2020-02-06 00:19:05 +01:00
|
|
|
if (seen_result_tlv)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
seen_result_tlv = true;
|
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
response_tlv_len = eap_extensions_handle_result_tlv(eap,
|
|
|
|
data, tlv_value_len, response,
|
|
|
|
result);
|
|
|
|
|
2019-12-12 21:10:16 +01:00
|
|
|
break;
|
|
|
|
case EAP_EXTENSIONS_TLV_TYPE_CRYPTOBINDING:
|
2020-02-06 00:19:05 +01:00
|
|
|
if (seen_cryptobinding_tlv)
|
|
|
|
return -EBADMSG;
|
|
|
|
|
|
|
|
seen_cryptobinding_tlv = true;
|
|
|
|
|
2019-12-12 21:10:16 +01:00
|
|
|
response_tlv_len =
|
|
|
|
eap_extensions_handle_cryptobinding_tlv(eap,
|
|
|
|
data, tlv_value_len, response);
|
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
if (tlv_type & EAP_EXTENSIONS_TLV_M_BIT_MASK)
|
|
|
|
return -ENOENT;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (response_tlv_len < 0)
|
|
|
|
return response_tlv_len;
|
|
|
|
|
|
|
|
response += response_tlv_len;
|
|
|
|
response_len += response_tlv_len;
|
|
|
|
|
|
|
|
data += tlv_value_len;
|
|
|
|
data_len -= tlv_value_len;
|
|
|
|
}
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
return response_len;
|
2018-02-15 01:14:48 +01:00
|
|
|
}
|
|
|
|
|
2018-02-15 01:14:49 +01:00
|
|
|
static void eap_extensions_handle_request(struct eap_state *eap,
|
2018-02-23 21:05:52 +01:00
|
|
|
uint8_t id,
|
2018-02-15 01:14:49 +01:00
|
|
|
const uint8_t *pkt,
|
2018-02-23 21:05:52 +01:00
|
|
|
size_t len)
|
2018-02-15 01:14:49 +01:00
|
|
|
{
|
2019-12-05 22:13:50 +01:00
|
|
|
struct peap_state *peap_state;
|
2019-12-12 21:10:15 +01:00
|
|
|
uint8_t result = EAP_EXTENSIONS_RESULT_FAILURE;
|
|
|
|
/*
|
|
|
|
* The buffer size is chosen to satisfy the needs of the two supported
|
|
|
|
* TLVs.
|
|
|
|
*/
|
|
|
|
uint8_t response[256];
|
|
|
|
int response_len;
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
response_len = eap_extensions_process_tlvs(eap, pkt, len,
|
|
|
|
&response[EAP_EXTENSIONS_HEADER_LEN],
|
|
|
|
&result);
|
|
|
|
|
2019-12-13 20:32:51 +01:00
|
|
|
if (response_len < 0) {
|
|
|
|
l_debug("PEAP: Failed to process TLVs %d", response_len);
|
|
|
|
|
2018-02-23 21:05:52 +01:00
|
|
|
return;
|
2019-12-13 20:32:51 +01:00
|
|
|
}
|
2018-02-23 21:05:52 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
response_len += EAP_EXTENSIONS_HEADER_LEN;
|
|
|
|
|
2018-02-23 21:05:52 +01:00
|
|
|
response[0] = EAP_CODE_RESPONSE;
|
|
|
|
response[1] = id;
|
2019-12-12 21:10:15 +01:00
|
|
|
l_put_be16(response_len, &response[2]);
|
2018-02-23 21:05:52 +01:00
|
|
|
response[4] = EAP_TYPE_EXTENSIONS;
|
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
eap_peap_phase2_send_response(response, response_len, eap);
|
2018-02-23 21:05:52 +01:00
|
|
|
|
|
|
|
eap_discard_success_and_failure(eap, false);
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_set_completed(eap);
|
2018-02-15 01:14:49 +01:00
|
|
|
|
2019-12-12 21:10:15 +01:00
|
|
|
if (result != EAP_EXTENSIONS_RESULT_SUCCCESS) {
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_set_phase2_failed(eap);
|
2018-02-15 01:14:49 +01:00
|
|
|
|
2019-11-12 01:19:21 +01:00
|
|
|
eap_tls_common_tunnel_close(eap);
|
|
|
|
|
2018-02-15 01:14:49 +01:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2019-12-05 22:13:50 +01:00
|
|
|
peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
|
|
|
|
eap_set_key_material(eap, peap_state->key + 0, 64, NULL, 0, NULL,
|
|
|
|
0, NULL, 0);
|
|
|
|
explicit_bzero(peap_state->key, sizeof(peap_state->key));
|
2020-01-31 23:25:15 +01:00
|
|
|
explicit_bzero(peap_state->isk, sizeof(peap_state->isk));
|
2019-12-05 22:13:50 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_method_success(eap);
|
2018-01-31 20:46:06 +01:00
|
|
|
}
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
static bool eap_peap_tunnel_ready(struct eap_state *eap,
|
|
|
|
const char *peer_identity)
|
2018-01-31 20:46:06 +01:00
|
|
|
{
|
2019-12-05 22:13:50 +01:00
|
|
|
struct peap_state *peap_state = eap_tls_common_get_variant_data(eap);
|
2018-02-02 20:00:13 +01:00
|
|
|
|
|
|
|
/*
|
2022-01-11 17:51:11 +01:00
|
|
|
* PEAPv1: draft-josefsson-pppext-eap-tls-eap-05, Section 2.1.1
|
|
|
|
*
|
|
|
|
* Cleartext Success/Failure packets MUST be silently discarded once
|
|
|
|
* TLS tunnel has been brought up.
|
2018-02-02 20:00:13 +01:00
|
|
|
*/
|
2018-02-23 21:05:52 +01:00
|
|
|
eap_discard_success_and_failure(eap, true);
|
|
|
|
|
2018-02-02 20:00:13 +01:00
|
|
|
/* MSK, EMSK and challenge derivation */
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_tunnel_prf_get_bytes(eap, true, "client EAP encryption",
|
2019-12-05 22:13:50 +01:00
|
|
|
peap_state->key, 128);
|
2018-02-14 01:14:46 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_tls_common_send_empty_response(eap);
|
2018-01-31 20:46:06 +01:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
static bool eap_peap_tunnel_handle_request(struct eap_state *eap,
|
|
|
|
const uint8_t *pkt,
|
2018-02-02 19:30:35 +01:00
|
|
|
size_t len)
|
|
|
|
{
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state *peap_state;
|
2018-12-05 23:08:57 +01:00
|
|
|
uint8_t id;
|
2018-02-02 19:30:35 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (len > 4 && pkt[4] == EAP_TYPE_EXTENSIONS) {
|
|
|
|
uint16_t pkt_len;
|
|
|
|
uint8_t code = pkt[0];
|
2018-02-02 19:30:35 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (code != EAP_CODE_REQUEST)
|
|
|
|
return false;
|
2018-02-02 19:30:35 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
pkt_len = l_get_be16(pkt + 2);
|
|
|
|
if (pkt_len != len)
|
|
|
|
return false;
|
2018-02-02 19:30:35 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
id = pkt[1];
|
2018-02-02 19:30:35 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_extensions_handle_request(eap, id,
|
|
|
|
pkt + EAP_EXTENSIONS_HEADER_LEN,
|
|
|
|
len - EAP_EXTENSIONS_HEADER_LEN);
|
2018-01-24 00:29:14 +01:00
|
|
|
|
|
|
|
return true;
|
2018-02-15 01:14:46 +01:00
|
|
|
}
|
2018-01-31 20:46:07 +01:00
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
peap_state = eap_tls_common_get_variant_data(eap);
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (eap_tls_common_get_negotiated_version(eap) == EAP_TLS_VERSION_0) {
|
|
|
|
if (len < 1)
|
|
|
|
return false;
|
2018-01-31 20:46:06 +01:00
|
|
|
|
2018-01-31 20:46:07 +01:00
|
|
|
/*
|
2018-12-05 23:08:57 +01:00
|
|
|
* The PEAPv0 phase2 packets are headerless. Our implementation
|
|
|
|
* of the EAP methods requires packet identifier. Therefore,
|
|
|
|
* PEAP packet identifier is used for the headerless
|
|
|
|
* phase2 packets.
|
2018-01-31 20:46:07 +01:00
|
|
|
*/
|
2018-12-05 23:08:57 +01:00
|
|
|
eap_save_last_id(eap, &id);
|
2018-02-02 01:01:50 +01:00
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
__eap_handle_request(peap_state->phase2, id, pkt, len);
|
2018-02-28 23:49:51 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
return true;
|
2018-02-28 23:49:51 +01:00
|
|
|
}
|
2018-01-31 20:46:07 +01:00
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
eap_rx_packet(peap_state->phase2, pkt, len);
|
2018-02-28 23:49:51 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
return true;
|
2018-01-24 00:29:12 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
static void eap_peap_state_reset(void *variant_data)
|
2018-02-15 19:49:09 +01:00
|
|
|
{
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state *peap_state = variant_data;
|
|
|
|
|
|
|
|
if (!peap_state)
|
2018-02-15 19:49:09 +01:00
|
|
|
return;
|
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
eap_reset(peap_state->phase2);
|
2019-12-05 22:13:50 +01:00
|
|
|
|
|
|
|
explicit_bzero(peap_state->key, sizeof(peap_state->key));
|
2020-01-31 23:25:15 +01:00
|
|
|
explicit_bzero(peap_state->isk, sizeof(peap_state->isk));
|
2018-02-15 19:49:09 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
static void eap_peap_state_destroy(void *variant_data)
|
2018-04-18 07:03:30 +02:00
|
|
|
{
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state *peap_state = variant_data;
|
|
|
|
|
|
|
|
if (!peap_state)
|
2018-12-05 23:08:57 +01:00
|
|
|
return;
|
2018-04-18 07:03:30 +02:00
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
eap_reset(peap_state->phase2);
|
|
|
|
eap_free(peap_state->phase2);
|
|
|
|
|
2019-12-05 22:13:50 +01:00
|
|
|
explicit_bzero(peap_state->key, sizeof(peap_state->key));
|
2020-01-31 23:25:15 +01:00
|
|
|
explicit_bzero(peap_state->isk, sizeof(peap_state->isk));
|
2019-12-05 22:13:50 +01:00
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
l_free(peap_state);
|
2018-04-18 07:03:30 +02:00
|
|
|
}
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
static int eap_peap_settings_check(struct l_settings *settings,
|
|
|
|
struct l_queue *secrets,
|
|
|
|
const char *prefix,
|
|
|
|
struct l_queue **out_missing)
|
2018-01-24 00:29:13 +01:00
|
|
|
{
|
2018-12-05 23:08:57 +01:00
|
|
|
char setting_key_prefix[72];
|
|
|
|
int r;
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
snprintf(setting_key_prefix, sizeof(setting_key_prefix),
|
|
|
|
"%sPEAP-Phase2-", prefix);
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
r = __eap_check_settings(settings, secrets, setting_key_prefix, false,
|
|
|
|
out_missing);
|
|
|
|
if (r)
|
|
|
|
return r;
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
snprintf(setting_key_prefix, sizeof(setting_key_prefix), "%sPEAP-",
|
|
|
|
prefix);
|
|
|
|
return eap_tls_common_settings_check(settings, secrets,
|
|
|
|
setting_key_prefix,
|
|
|
|
out_missing);
|
|
|
|
}
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
static const struct eap_tls_variant_ops eap_ttls_ops = {
|
|
|
|
.version_max_supported = EAP_TLS_VERSION_1,
|
|
|
|
.tunnel_ready = eap_peap_tunnel_ready,
|
|
|
|
.tunnel_handle_request = eap_peap_tunnel_handle_request,
|
|
|
|
.reset = eap_peap_state_reset,
|
|
|
|
.destroy = eap_peap_state_destroy,
|
|
|
|
};
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
static bool eap_peap_settings_load(struct eap_state *eap,
|
|
|
|
struct l_settings *settings,
|
|
|
|
const char *prefix)
|
|
|
|
{
|
|
|
|
char setting_key_prefix[72];
|
2019-12-05 22:13:49 +01:00
|
|
|
struct peap_state *peap_state;
|
2018-12-05 23:08:57 +01:00
|
|
|
void *phase2;
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
phase2 = eap_new(eap_peap_phase2_send_response,
|
|
|
|
eap_peap_phase2_complete, eap);
|
2018-02-15 01:14:48 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (!phase2) {
|
2018-02-15 01:14:48 +01:00
|
|
|
l_error("Could not create the PEAP phase two EAP instance");
|
2018-12-05 23:08:57 +01:00
|
|
|
|
|
|
|
return false;
|
2018-02-15 01:14:48 +01:00
|
|
|
}
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
snprintf(setting_key_prefix, sizeof(setting_key_prefix),
|
|
|
|
"%sPEAP-Phase2-", prefix);
|
2018-02-15 01:14:48 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (!eap_load_settings(phase2, settings, setting_key_prefix)) {
|
|
|
|
eap_free(phase2);
|
2018-02-15 01:14:48 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
return false;
|
2018-02-15 01:14:48 +01:00
|
|
|
}
|
|
|
|
|
2019-12-05 22:13:49 +01:00
|
|
|
peap_state = l_new(struct peap_state, 1);
|
|
|
|
peap_state->phase2 = phase2;
|
2020-01-31 23:25:15 +01:00
|
|
|
eap_set_key_material_func(peap_state->phase2,
|
|
|
|
eap_peap_phase2_key_ready);
|
2019-12-05 22:13:49 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
snprintf(setting_key_prefix, sizeof(setting_key_prefix), "%sPEAP-",
|
|
|
|
prefix);
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
if (!eap_tls_common_settings_load(eap, settings, setting_key_prefix,
|
2019-12-05 22:13:49 +01:00
|
|
|
&eap_ttls_ops, peap_state))
|
2018-12-05 23:08:57 +01:00
|
|
|
return false;
|
2018-01-24 00:29:13 +01:00
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
return true;
|
2018-01-24 00:29:13 +01:00
|
|
|
}
|
|
|
|
|
2018-01-24 00:29:12 +01:00
|
|
|
static struct eap_method eap_peap = {
|
|
|
|
.request_type = EAP_TYPE_PEAP,
|
|
|
|
.name = "PEAP",
|
|
|
|
.exports_msk = true,
|
|
|
|
|
2018-12-05 23:08:57 +01:00
|
|
|
.handle_request = eap_tls_common_handle_request,
|
|
|
|
.handle_retransmit = eap_tls_common_handle_retransmit,
|
|
|
|
.free = eap_tls_common_state_free,
|
|
|
|
.reset_state = eap_tls_common_state_reset,
|
|
|
|
|
|
|
|
.check_settings = eap_peap_settings_check,
|
|
|
|
.load_settings = eap_peap_settings_load,
|
2018-01-24 00:29:12 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static int eap_peap_init(void)
|
|
|
|
{
|
|
|
|
l_debug("");
|
|
|
|
return eap_register_method(&eap_peap);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void eap_peap_exit(void)
|
|
|
|
{
|
|
|
|
l_debug("");
|
|
|
|
eap_unregister_method(&eap_peap);
|
|
|
|
}
|
|
|
|
|
|
|
|
EAP_METHOD_BUILTIN(eap_peap, eap_peap_init, eap_peap_exit)
|