⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eapmd5.c

📁 linux下 用来通过802.1x人证
💻 C
字号:
/** * A client-side 802.1x implementation  * * This code is released under both the GPL version 2 and BSD licenses. * Either license may be used.  The respective licenses are found below. * * Copyright (C) 2002 Bryan D. Payne & Nick L. Petroni Jr. * All Rights Reserved * * --- GPL Version 2 License --- * This program is free software; you can redistribute it and/or * modify it under the terms of the GNU General Public License * as published by the Free Software Foundation; either version 2 * of the License, or (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA  02111-1307, USA. * * --- BSD License --- * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions are met: * *  - Redistributions of source code must retain the above copyright notice, *    this list of conditions and the following disclaimer. *  - Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. *  - All advertising materials mentioning features or use of this software *    must display the following acknowledgement: *       This product includes software developed by the University of *       Maryland at College Park and its contributors. *  - Neither the name of the University nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE * POSSIBILITY OF SUCH DAMAGE. *//******************************************************************* * The driver function for a Linux application layer EAPOL  * implementation * File: eapmd5.c * * Authors: Chris.Hessing@utah.edu * * $Id: eapmd5.c,v 1.16 2004/06/15 03:22:29 chessing Exp $ * $Date: 2004/06/15 03:22:29 $ * $Log: eapmd5.c,v $ * Revision 1.16  2004/06/15 03:22:29  chessing * * XSupplicant Release 1.0 * * *******************************************************************/#include <openssl/ssl.h>#include <string.h>#include <strings.h>#include "xsup_debug.h"#include "xsup_err.h"#include "frame_structs.h"#include "config.h"   // For config_eap_md5 struct.#include "eap.h"#include "eapmd5.h"#include "interactive.h"#define MD5_LENGTH    0x10/***************************************************** * * Setup to handle MD5 EAP requests * * This function is called each time we recieve a packet of the EAP type MD5. * At a minimum, it should check to make sure it's stub in the structure  * exists, and if not, set up any variables it may need.  Since MD5 doesn't * have any state that needs to survive successive calls, we don't need to  * do anything here. * *****************************************************/int eapmd5_setup(struct generic_eap_data *thisint){  // Do anything special that might be needed for this EAP type to work.  debug_printf(DEBUG_EVERYTHING, "Initalized EAP-MD5!\n");  if (!thisint)    {      debug_printf(DEBUG_NORMAL, "Invalid EAP structure passed in to eapmd5_setup()!\n");      return XEMALLOC;    }  thisint->eap_data = (int *)malloc(sizeof(int));  if (thisint->eap_data == NULL) return XEMALLOC;  return XENONE;}/***************************************************** * * Process MD5 EAP Requests * * ******************************************************/int eapmd5_process(struct generic_eap_data *thisint, u_char *dataoffs, 		   int insize, u_char *outframe, int *outsize){  struct md5_values *md5data, *md5out;  struct config_eap_md5 *userdata;  u_char md5_result[16];  u_char *tohash;  char *username;  int tohashlen;  int *processReady;  if (!thisint->eap_data)    {      debug_printf(DEBUG_NORMAL, "Invalid EAP data passed in to eapmd5_process()!\n");      return XEMALLOC;    }  if (!outframe)    {      debug_printf(DEBUG_NORMAL, "Invalid buffer for return data in eapmd5_process()!\n");      return XEMALLOC;    }  processReady = (int *)thisint->eap_data;  userdata = (struct config_eap_md5 *)thisint->eap_conf_data;  debug_printf(DEBUG_EVERYTHING, "(EAP-MD5) Processing.\n");  if ((thisint->tempPwd == NULL) && (userdata->password == NULL))    {      thisint->need_password = 1;      thisint->eaptype = strdup("EAP-MD5");      thisint->eapchallenge = NULL;      *outsize = 0;      return XENONE;    }  // Make sure we have something to process...  if (dataoffs == NULL) return XENONE;  if (userdata->username == NULL)    {      username = thisint->identity;    } else {      username = userdata->username;    }  if ((userdata->password == NULL) && (thisint->tempPwd != NULL))    {      userdata->password = thisint->tempPwd;      thisint->tempPwd = NULL;      /*      debug_printf(DEBUG_AUTHTYPES, "Passed in password : %s\n",	      userdata->password);*/    }  // Actually process, and respond to challenges.  md5data = (struct md5_values *)dataoffs;  md5out = (struct md5_values *)outframe;    if (md5data->length != MD5_LENGTH)    {      debug_printf(DEBUG_NORMAL, "(EAP-MD5) Incorrect length value for MD5 random value.\n");      return XEMD5LEN;    }  tohashlen = (1+md5data->length+strlen(userdata->password));  tohash = (u_char *)malloc(tohashlen);  if (tohash == NULL)    {      debug_printf(DEBUG_NORMAL, "(EAP-MD5) Couldn't allocate memory for building hash source!\n");      return XEMALLOC;    }  // Make sure we clean out the memory space.  bzero(tohash, tohashlen);    // Build the information we need to hash. Start with the EAP identifier.  tohash[0] = thisint->eapid;  // Then, we need the password.  memcpy(&tohash[1], userdata->password, strlen(userdata->password));    // Then the random value sent to us.  memcpy(&tohash[1+strlen(userdata->password)], &md5data->randval, MD5_LENGTH);  // Now, run it through the hash routine.  MD5(tohash, tohashlen, &md5_result[0]);  // We are done with tohash, so free it.  free(tohash);  // Set up our response frame.  md5out->length = MD5_LENGTH;  memcpy(&md5out->randval[0], &md5_result[0], MD5_LENGTH);  memcpy(&outframe[sizeof(struct md5_values)], username, strlen(username));  *outsize = (sizeof(struct md5_values)+strlen(username));  return XENONE;}/******************************************************* * * Set our keys, if we can. * *******************************************************/int eapmd5_get_keys(struct interface_data *thisint){  // We don't key, so return -1.  (We return 0 if we set a key.)  return -1;}/******************************************************* * * Clean up after ourselves.  This will get called when we get a packet that * needs to be processed requests a different EAP type.  It will also be  * called on termination of the program. * *******************************************************/int eapmd5_cleanup(struct generic_eap_data *thisint){  // Clean up after ourselves.  debug_printf(DEBUG_AUTHTYPES, "(EAP-MD5) Cleaning up.\n");  if (thisint->eap_data != NULL)    {      free(thisint->eap_data);      thisint->eap_data = NULL;    }  return XENONE;}/******************************************************* * * If we fail an authentication, we will call this routine.  It should clean * up anything that shouldn't live in to the next authentication attempt. * *******************************************************/int eapmd5_failed(struct generic_eap_data *thisint){  struct config_eap_md5 *userdata;  if ((thisint == NULL) || (thisint->eap_conf_data == NULL))    {      debug_printf(DEBUG_AUTHTYPES, "Invalid MD5 configuration data!\n");      return XEMALLOC;    }  userdata = (struct config_eap_md5 *)thisint->eap_conf_data;  // If configure was passed the no password reset flag, we shouldn't do  // anything!#ifndef NO_PWD_RESET  /*  if (userdata->password != NULL)    {      free(userdata->password);      userdata->password = NULL;    }  */#endif  return XENONE;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -