⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eap_fast.c

📁 最新的Host AP 新添加了许多pcmcia 的驱动
💻 C
📖 第 1 页 / 共 3 页
字号:
/* * EAP-FAST server (RFC 4851) * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */#include "includes.h"#include "common.h"#include "aes_wrap.h"#include "sha1.h"#include "eap_i.h"#include "eap_tls_common.h"#include "tls.h"#include "eap_common/eap_tlv_common.h"#include "eap_common/eap_fast_common.h"static void eap_fast_reset(struct eap_sm *sm, void *priv);/* Private PAC-Opaque TLV types */#define PAC_OPAQUE_TYPE_PAD 0#define PAC_OPAQUE_TYPE_KEY 1#define PAC_OPAQUE_TYPE_LIFETIME 2#define PAC_OPAQUE_TYPE_IDENTITY 3struct eap_fast_data {	struct eap_ssl_data ssl;	enum {		START, PHASE1, PHASE2_START, PHASE2_ID, PHASE2_METHOD,		CRYPTO_BINDING, REQUEST_PAC, SUCCESS, FAILURE	} state;	int fast_version;	const struct eap_method *phase2_method;	void *phase2_priv;	int force_version;	int peer_version;	u8 crypto_binding_nonce[32];	int final_result;	struct eap_fast_key_block_provisioning *key_block_p;	u8 simck[EAP_FAST_SIMCK_LEN];	u8 cmk[EAP_FAST_CMK_LEN];	int simck_idx;	u8 pac_opaque_encr[16];	u8 *srv_id;	size_t srv_id_len;	char *srv_id_info;	int anon_provisioning;	int send_new_pac; /* server triggered re-keying of Tunnel PAC */	struct wpabuf *pending_phase2_resp;	u8 *identity; /* from PAC-Opaque */	size_t identity_len;	int eap_seq;	int tnc_started;	int pac_key_lifetime;	int pac_key_refresh_time;};static const char * eap_fast_state_txt(int state){	switch (state) {	case START:		return "START";	case PHASE1:		return "PHASE1";	case PHASE2_START:		return "PHASE2_START";	case PHASE2_ID:		return "PHASE2_ID";	case PHASE2_METHOD:		return "PHASE2_METHOD";	case CRYPTO_BINDING:		return "CRYPTO_BINDING";	case REQUEST_PAC:		return "REQUEST_PAC";	case SUCCESS:		return "SUCCESS";	case FAILURE:		return "FAILURE";	default:		return "Unknown?!";	}}static void eap_fast_state(struct eap_fast_data *data, int state){	wpa_printf(MSG_DEBUG, "EAP-FAST: %s -> %s",		   eap_fast_state_txt(data->state),		   eap_fast_state_txt(state));	data->state = state;}static EapType eap_fast_req_failure(struct eap_sm *sm,				    struct eap_fast_data *data){	/* TODO: send Result TLV(FAILURE) */	eap_fast_state(data, FAILURE);	return EAP_TYPE_NONE;}static int eap_fast_session_ticket_cb(void *ctx, const u8 *ticket, size_t len,				      const u8 *client_random,				      const u8 *server_random,				      u8 *master_secret){	struct eap_fast_data *data = ctx;	const u8 *pac_opaque;	size_t pac_opaque_len;	u8 *buf, *pos, *end, *pac_key = NULL;	os_time_t lifetime = 0;	struct os_time now;	u8 *identity = NULL;	size_t identity_len = 0;	wpa_printf(MSG_DEBUG, "EAP-FAST: SessionTicket callback");	wpa_hexdump(MSG_DEBUG, "EAP-FAST: SessionTicket (PAC-Opaque)",		    ticket, len);	if (len < 4 || WPA_GET_BE16(ticket) != PAC_TYPE_PAC_OPAQUE) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid "			   "SessionTicket");		return 0;	}	pac_opaque_len = WPA_GET_BE16(ticket + 2);	pac_opaque = ticket + 4;	if (pac_opaque_len < 8 || pac_opaque_len % 8 ||	    pac_opaque_len > len - 4) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Ignore invalid PAC-Opaque "			   "(len=%lu left=%lu)",			   (unsigned long) pac_opaque_len,			   (unsigned long) len);		return 0;	}	wpa_hexdump(MSG_DEBUG, "EAP-FAST: Received PAC-Opaque",		    pac_opaque, pac_opaque_len);	buf = os_malloc(pac_opaque_len - 8);	if (buf == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to allocate memory "			   "for decrypting PAC-Opaque");		return 0;	}	if (aes_unwrap(data->pac_opaque_encr, (pac_opaque_len - 8) / 8,		       pac_opaque, buf) < 0) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to decrypt "			   "PAC-Opaque");		os_free(buf);		/*		 * This may have been caused by server changing the PAC-Opaque		 * encryption key, so just ignore this PAC-Opaque instead of		 * failing the authentication completely. Provisioning can now		 * be used to provision a new PAC.		 */		return 0;	}	end = buf + pac_opaque_len - 8;	wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: Decrypted PAC-Opaque",			buf, end - buf);	pos = buf;	while (pos + 1 < end) {		if (pos + 2 + pos[1] > end)			break;		switch (*pos) {		case PAC_OPAQUE_TYPE_PAD:			pos = end;			break;		case PAC_OPAQUE_TYPE_KEY:			if (pos[1] != EAP_FAST_PAC_KEY_LEN) {				wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid "					   "PAC-Key length %d", pos[1]);				os_free(buf);				return -1;			}			pac_key = pos + 2;			wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: PAC-Key from "					"decrypted PAC-Opaque",					pac_key, EAP_FAST_PAC_KEY_LEN);			break;		case PAC_OPAQUE_TYPE_LIFETIME:			if (pos[1] != 4) {				wpa_printf(MSG_DEBUG, "EAP-FAST: Invalid "					   "PAC-Key lifetime length %d",					   pos[1]);				os_free(buf);				return -1;			}			lifetime = WPA_GET_BE32(pos + 2);			break;		case PAC_OPAQUE_TYPE_IDENTITY:			identity = pos + 2;			identity_len = pos[1];			break;		}		pos += 2 + pos[1];	}	if (pac_key == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: No PAC-Key included in "			   "PAC-Opaque");		os_free(buf);		return -1;	}	if (identity) {		wpa_hexdump_ascii(MSG_DEBUG, "EAP-FAST: Identity from "				  "PAC-Opaque", identity, identity_len);		os_free(data->identity);		data->identity = os_malloc(identity_len);		if (data->identity) {			os_memcpy(data->identity, identity, identity_len);			data->identity_len = identity_len;		}	}	if (os_get_time(&now) < 0 || lifetime <= 0 || now.sec > lifetime) {		wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Key not valid anymore "			   "(lifetime=%ld now=%ld)", lifetime, now.sec);		data->send_new_pac = 2;		/*		 * Allow PAC to be used to allow a PAC update with some level		 * of server authentication (i.e., do not fall back to full TLS		 * handshake since we cannot be sure that the peer would be		 * able to validate server certificate now). However, reject		 * the authentication since the PAC was not valid anymore. Peer		 * can connect again with the newly provisioned PAC after this.		 */	} else if (lifetime - now.sec < data->pac_key_refresh_time) {		wpa_printf(MSG_DEBUG, "EAP-FAST: PAC-Key soft timeout; send "			   "an update if authentication succeeds");		data->send_new_pac = 1;	}	eap_fast_derive_master_secret(pac_key, server_random, client_random,				      master_secret);	os_free(buf);	return 1;}static void eap_fast_derive_key_auth(struct eap_sm *sm,				     struct eap_fast_data *data){	u8 *sks;	/* RFC 4851, Section 5.1:	 * Extra key material after TLS key_block: session_key_seed[40]	 */	sks = eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn, "key expansion",				  EAP_FAST_SKS_LEN);	if (sks == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive "			   "session_key_seed");		return;	}	/*	 * RFC 4851, Section 5.2:	 * S-IMCK[0] = session_key_seed	 */	wpa_hexdump_key(MSG_DEBUG,			"EAP-FAST: session_key_seed (SKS = S-IMCK[0])",			sks, EAP_FAST_SKS_LEN);	data->simck_idx = 0;	os_memcpy(data->simck, sks, EAP_FAST_SIMCK_LEN);	os_free(sks);}static void eap_fast_derive_key_provisioning(struct eap_sm *sm,					     struct eap_fast_data *data){	os_free(data->key_block_p);	data->key_block_p = (struct eap_fast_key_block_provisioning *)		eap_fast_derive_key(sm->ssl_ctx, data->ssl.conn,				    "key expansion",				    sizeof(*data->key_block_p));	if (data->key_block_p == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Failed to derive key block");		return;	}	/*	 * RFC 4851, Section 5.2:	 * S-IMCK[0] = session_key_seed	 */	wpa_hexdump_key(MSG_DEBUG,			"EAP-FAST: session_key_seed (SKS = S-IMCK[0])",			data->key_block_p->session_key_seed,			sizeof(data->key_block_p->session_key_seed));	data->simck_idx = 0;	os_memcpy(data->simck, data->key_block_p->session_key_seed,		  EAP_FAST_SIMCK_LEN);	wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: server_challenge",			data->key_block_p->server_challenge,			sizeof(data->key_block_p->server_challenge));	wpa_hexdump_key(MSG_DEBUG, "EAP-FAST: client_challenge",			data->key_block_p->client_challenge,			sizeof(data->key_block_p->client_challenge));}static int eap_fast_get_phase2_key(struct eap_sm *sm,				   struct eap_fast_data *data,				   u8 *isk, size_t isk_len){	u8 *key;	size_t key_len;	os_memset(isk, 0, isk_len);	if (data->phase2_method == NULL || data->phase2_priv == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Phase 2 method not "			   "available");		return -1;	}	if (data->phase2_method->getKey == NULL)		return 0;	if ((key = data->phase2_method->getKey(sm, data->phase2_priv,					       &key_len)) == NULL) {		wpa_printf(MSG_DEBUG, "EAP-FAST: Could not get key material "			   "from Phase 2");		return -1;	}	if (key_len > isk_len)		key_len = isk_len;	if (key_len == 32 &&	    data->phase2_method->vendor == EAP_VENDOR_IETF &&	    data->phase2_method->method == EAP_TYPE_MSCHAPV2) {		/*		 * EAP-FAST uses reverse order for MS-MPPE keys when deriving		 * MSK from EAP-MSCHAPv2. Swap the keys here to get the correct		 * ISK for EAP-FAST cryptobinding.		 */		os_memcpy(isk, key + 16, 16);		os_memcpy(isk + 16, key, 16);	} else		os_memcpy(isk, key, key_len);	os_free(key);	return 0;}static int eap_fast_update_icmk(struct eap_sm *sm, struct eap_fast_data *data){	u8 isk[32], imck[60];	wpa_printf(MSG_DEBUG, "EAP-FAST: Deriving ICMK[%d] (S-IMCK and CMK)",		   data->simck_idx + 1);	/*	 * RFC 4851, Section 5.2:	 * IMCK[j] = T-PRF(S-IMCK[j-1], "Inner Methods Compound Keys",	 *                 MSK[j], 60)	 * S-IMCK[j] = first 40 octets of IMCK[j]	 * CMK[j] = last 20 octets of IMCK[j]	 */	if (eap_fast_get_phase2_key(sm, data, isk, sizeof(isk)) < 0)		return -1;	wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: ISK[j]", isk, sizeof(isk));	sha1_t_prf(data->simck, EAP_FAST_SIMCK_LEN,		   "Inner Methods Compound Keys",		   isk, sizeof(isk), imck, sizeof(imck));	data->simck_idx++;	os_memcpy(data->simck, imck, EAP_FAST_SIMCK_LEN);	wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: S-IMCK[j]",			data->simck, EAP_FAST_SIMCK_LEN);	os_memcpy(data->cmk, imck + EAP_FAST_SIMCK_LEN, EAP_FAST_CMK_LEN);	wpa_hexdump_key(MSG_MSGDUMP, "EAP-FAST: CMK[j]",			data->cmk, EAP_FAST_CMK_LEN);	return 0;}static void * eap_fast_init(struct eap_sm *sm){	struct eap_fast_data *data;	u8 ciphers[5] = {		TLS_CIPHER_ANON_DH_AES128_SHA,		TLS_CIPHER_AES128_SHA,		TLS_CIPHER_RSA_DHE_AES128_SHA,		TLS_CIPHER_RC4_SHA,		TLS_CIPHER_NONE	};	data = os_zalloc(sizeof(*data));	if (data == NULL)		return NULL;	data->fast_version = EAP_FAST_VERSION;	data->force_version = -1;	if (sm->user && sm->user->force_version >= 0) {		data->force_version = sm->user->force_version;		wpa_printf(MSG_DEBUG, "EAP-FAST: forcing version %d",			   data->force_version);		data->fast_version = data->force_version;	}	data->state = START;	if (eap_server_tls_ssl_init(sm, &data->ssl, 0)) {		wpa_printf(MSG_INFO, "EAP-FAST: Failed to initialize SSL.");		eap_fast_reset(sm, data);		return NULL;	}	if (tls_connection_set_cipher_list(sm->ssl_ctx, data->ssl.conn,					   ciphers) < 0) {		wpa_printf(MSG_INFO, "EAP-FAST: Failed to set TLS cipher "			   "suites");		eap_fast_reset(sm, data);		return NULL;	}	if (tls_connection_set_session_ticket_cb(sm->ssl_ctx, data->ssl.conn,						 eap_fast_session_ticket_cb,						 data) < 0) {		wpa_printf(MSG_INFO, "EAP-FAST: Failed to set SessionTicket "			   "callback");		eap_fast_reset(sm, data);		return NULL;	}	if (sm->pac_opaque_encr_key == NULL) {		wpa_printf(MSG_INFO, "EAP-FAST: No PAC-Opaque encryption key "			   "configured");		eap_fast_reset(sm, data);		return NULL;	}	os_memcpy(data->pac_opaque_encr, sm->pac_opaque_encr_key,		  sizeof(data->pac_opaque_encr));	if (sm->eap_fast_a_id == NULL) {		wpa_printf(MSG_INFO, "EAP-FAST: No A-ID configured");		eap_fast_reset(sm, data);		return NULL;	}	data->srv_id = os_malloc(sm->eap_fast_a_id_len);	if (data->srv_id == NULL) {		eap_fast_reset(sm, data);		return NULL;	}	os_memcpy(data->srv_id, sm->eap_fast_a_id, sm->eap_fast_a_id_len);	data->srv_id_len = sm->eap_fast_a_id_len;	if (sm->eap_fast_a_id_info == NULL) {		wpa_printf(MSG_INFO, "EAP-FAST: No A-ID-Info configured");		eap_fast_reset(sm, data);		return NULL;	}	data->srv_id_info = os_strdup(sm->eap_fast_a_id_info);	if (data->srv_id_info == NULL) {		eap_fast_reset(sm, data);		return NULL;	}	/* PAC-Key lifetime in seconds (hard limit) */	data->pac_key_lifetime = sm->pac_key_lifetime;	/*	 * PAC-Key refresh time in seconds (soft limit on remaining hard	 * limit). The server will generate a new PAC-Key when this number of	 * seconds (or fewer) of the lifetime remains.	 */	data->pac_key_refresh_time = sm->pac_key_refresh_time;	return data;}static void eap_fast_reset(struct eap_sm *sm, void *priv){	struct eap_fast_data *data = priv;	if (data == NULL)		return;	if (data->phase2_priv && data->phase2_method)		data->phase2_method->reset(sm, data->phase2_priv);	eap_server_tls_ssl_deinit(sm, &data->ssl);	os_free(data->srv_id);	os_free(data->srv_id_info);	os_free(data->key_block_p);	wpabuf_free(data->pending_phase2_resp);	os_free(data->identity);	os_free(data);}static struct wpabuf * eap_fast_build_start(struct eap_sm *sm,					    struct eap_fast_data *data, u8 id){	struct wpabuf *req;	req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_FAST,			    1 + sizeof(struct pac_tlv_hdr) + data->srv_id_len,			    EAP_CODE_REQUEST, id);	if (req == NULL) {		wpa_printf(MSG_ERROR, "EAP-FAST: Failed to allocate memory for"			   " request");		eap_fast_state(data, FAILURE);		return NULL;	}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -