⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eappeap.c

📁 可以用作很多客户端的XSUPPLICANT的源代码。比如用在802.1x或者无线AP上
💻 C
📖 第 1 页 / 共 2 页
字号:
      if (tls_funcs_load_root_certs(thisint, userdata->root_cert, 				    userdata->root_dir, userdata->crl_dir) != XENONE)	{	  debug_printf(DEBUG_NORMAL, "Couldn't load root certificates!\n");	  return XETLSINIT;	}    }  if ((userdata->user_cert != NULL) && ((userdata->user_key_pass != NULL) ||				   (thisint->tempPwd != NULL)))    {      debug_printf(DEBUG_NORMAL, "Using user certificate for PEAP!\n");      tls_funcs_load_user_cert(thisint, userdata->user_cert, userdata->user_key,			       userdata->user_key_pass, userdata->random_file);      mytls_vars->cert_loaded = TRUE;    }  if (userdata->user_cert == NULL) mytls_vars->cert_loaded = TRUE;  return XENONE;}int eappeap_process(struct generic_eap_data *thisint, u_char *dataoffs, 		    int insize, u_char *outframe, int *outsize){  struct config_eap_peap *userdata;  struct tls_vars *mytls_vars;  struct phase2_data *p2d;  int peap_version;  int retVal;  if ((!thisint) || (!dataoffs) || (!outframe))    {      debug_printf(DEBUG_NORMAL, "Invalid parameters passed to eappeap_process()!\n");      return XEMALLOC;    }  if (insize > 1520)    {      debug_printf(DEBUG_NORMAL, "Packet too large in eappeap_process()! Ignoring!\n");      return XEBADPACKETSIZE;    }  userdata = (struct config_eap_peap *)thisint->eap_conf_data;  if (!userdata)    {      debug_printf(DEBUG_NORMAL, "Invalid userdata structure in eappeap_process()!\n");      return XENOUSERDATA;    }  mytls_vars = (struct tls_vars *)thisint->eap_data;  if (!mytls_vars)    {      debug_printf(DEBUG_NORMAL, "Invalid EAP type data passed in to eappeap_process()!\n");      return XEMALLOC;    }  p2d = (struct phase2_data *)mytls_vars->phase2data;  if (!p2d)    {      debug_printf(DEBUG_NORMAL, "No phase 2 data available in eappeap_process()!\n");      return XEMALLOC;    }  // The state machine wants to know if we have anything else to say.  // We may be waiting for the server to send us more information, or  // we may need to send a request to the GUI for a password, and wait  // for an answer.  // PEAP is slightly different than others.  Since we don't *need* to have  // a client certificate to make things work correctly, we may not need  // a password here.  if (userdata->user_cert != NULL)    {      if ((thisint->tempPwd == NULL) && (userdata->user_key_pass == NULL))	{	  thisint->need_password = 1;	  thisint->eaptype = strdup("EAP-PEAP User Certificate");	  thisint->eapchallenge = NULL;	  	  *outsize = 0;	  return XENONE;	}      if ((mytls_vars->cert_loaded == FALSE) && ((thisint->tempPwd != NULL) ||						 (userdata->user_key_pass != NULL)))      {	// Load the user certificate.	if ((retVal = tls_funcs_load_user_cert(thisint, userdata->user_cert, 					       userdata->user_key,					       userdata->user_key_pass,					       userdata->random_file))!=XENONE)	  {	    debug_printf(DEBUG_NORMAL, "Error loading user certificate!\n");	    return retVal;	  } else {	    // Otherwise, the certificate is loaded.	    mytls_vars->cert_loaded = TRUE;	    // If we used the GUI to get a password, we need to free it	    // so that phase 2 can make use of it.	    if (thisint->tempPwd != NULL)	      {		free(thisint->tempPwd);		thisint->tempPwd = NULL;	      }	  }      }       }  if (dataoffs == NULL) return XENONE;      /* PEAP adds some version bits to flags byte.  They need to be stripped out. */  peap_version = ((uint8_t)dataoffs[0] & 0x03);  // Get the version #.  set_peap_version(p2d, peap_version);  // Tell PEAP what version we want to use.  dataoffs[0] = ((uint8_t)dataoffs[0] & 0xfc);  // Mask out the version bits.    tls_funcs_decode_packet(thisint, dataoffs, insize,  outframe, outsize, 			  (phase2_call)peap_do_phase2, userdata->chunk_size);  // We need to reset the version bits, just in case we store this frame for   // use later.  dataoffs[0] = dataoffs[0]+p2d->peap_version;  if (*outsize <= 0)    {      debug_printf(DEBUG_AUTHTYPES, "Nothing returned from PEAP!\n");      *outsize = 0;      return 0;    }    // By the time we come out the first time, we should have decided on which  // PEAP version we want to use.  So, set up the values needed to generate  // the keying material.    if (mytls_vars->sessionkeyconst == NULL)    {      switch (p2d->peap_version)	{	case PEAP_VERSION0:	  debug_printf(DEBUG_AUTHTYPES, "Setting Key Constant for PEAP v0!\n");	  mytls_vars->sessionkeyconst = (char *)malloc(PEAP_SESSION_KEY_CONST_SIZE);	  if (mytls_vars->sessionkeyconst == NULL) return XEMALLOC;	  	  bzero(mytls_vars->sessionkeyconst, PEAP_SESSION_KEY_CONST_SIZE);	  strncpy(mytls_vars->sessionkeyconst, PEAP_SESSION_KEY_CONST,		  PEAP_SESSION_KEY_CONST_SIZE);	  mytls_vars->sessionkeylen = PEAP_SESSION_KEY_CONST_SIZE;	  break;	  	case PEAP_VERSION1:	  debug_printf(DEBUG_AUTHTYPES, "Setting Key Constant for PEAP v1!\n");	  mytls_vars->sessionkeyconst = (char *)malloc(PEAPv1_SESSION_KEY_CONST_SIZE);	  if (mytls_vars->sessionkeyconst == NULL) return XEMALLOC;	  	  bzero(mytls_vars->sessionkeyconst, PEAPv1_SESSION_KEY_CONST_SIZE);	  strncpy(mytls_vars->sessionkeyconst, PEAPv1_SESSION_KEY_CONST,		  PEAPv1_SESSION_KEY_CONST_SIZE);	  mytls_vars->sessionkeylen = PEAPv1_SESSION_KEY_CONST_SIZE;	  break;	  	default:	  debug_printf(DEBUG_NORMAL, "Unknown PEAP version!\n");	  break;	}    }  if (*outsize > 0)    {      outframe[0] = outframe[0]+p2d->peap_version;    }  return XENONE;}int eappeap_get_keys(struct interface_data *thisint){  if (!thisint)    {      debug_printf(DEBUG_NORMAL, "Invalid interface struct passed to eappeap_get_keys()!\n");      return XEMALLOC;    }  if (thisint->keyingMaterial != NULL)    {      free(thisint->keyingMaterial);    }  thisint->keyingMaterial = tls_funcs_gen_keyblock(thisint->userdata->activemethod);  if (thisint->keyingMaterial == NULL) return -1;  return 0;}int eappeap_cleanup(struct generic_eap_data *thisint){  struct tls_vars *mytls_vars;  if (!thisint)    {      debug_printf(DEBUG_NORMAL, "Invalid interface struct passed to eappeap_cleanup()!\n");      return XEMALLOC;    }  mytls_vars = (struct tls_vars *)thisint->eap_data;    if (!mytls_vars)    {      debug_printf(DEBUG_NORMAL, "Invalid EAP type data in eappeap_cleanup()!\n");      return XEMALLOC;    }  if (mytls_vars->phase2data != NULL)    {      struct phase2_data *p2d;      p2d = (struct phase2_data *) mytls_vars->phase2data;      free(p2d->eapdata);      free(mytls_vars->phase2data);    }  tls_funcs_cleanup(thisint);  debug_printf(DEBUG_EVERYTHING, "(EAP-PEAP) Cleaned up.\n");  return XENONE;}int eappeap_failed(struct generic_eap_data *thisint){  if (!thisint)    {      debug_printf(DEBUG_NORMAL, "Invalid EAP data in eappeap_failed()!\n");      return XEMALLOC;    }  // Let our phase 2 die out, if there is one.  peap_phase2_failed(thisint);  tls_funcs_failed(thisint);  debug_printf(DEBUG_EVERYTHING, "(EAP-PEAP) Failed. Resetting.\n");  return XENONE;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -