2005-06-05 20:52:14 +00:00
|
|
|
/*
|
2007-07-11 15:48:36 +00:00
|
|
|
* EAP peer method: EAP-TLV (draft-josefsson-pppext-eap-tls-eap-07.txt)
|
2008-03-24 19:46:53 +00:00
|
|
|
* Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
|
2005-06-05 20:52:14 +00:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU General Public License version 2 as
|
|
|
|
* published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* Alternatively, this software may be distributed under the terms of BSD
|
|
|
|
* license.
|
|
|
|
*
|
|
|
|
* See README and COPYING for more details.
|
|
|
|
*/
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
#include "includes.h"
|
2005-06-05 20:52:14 +00:00
|
|
|
|
|
|
|
#include "common.h"
|
|
|
|
#include "eap_i.h"
|
|
|
|
#include "eap_tlv.h"
|
|
|
|
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
/**
|
|
|
|
* eap_tlv_build_nak - Build EAP-TLV NAK message
|
|
|
|
* @id: EAP identifier for the header
|
|
|
|
* @nak_type: TLV type (EAP_TLV_*)
|
|
|
|
* @resp_len: Buffer for returning the response length
|
|
|
|
* Returns: Buffer to the allocated EAP-TLV NAK message or %NULL on failure
|
|
|
|
*
|
|
|
|
* This funtion builds an EAP-TLV NAK message. The caller is responsible for
|
|
|
|
* freeing the returned buffer.
|
|
|
|
*/
|
2006-03-07 05:26:33 +00:00
|
|
|
u8 * eap_tlv_build_nak(int id, u16 nak_type, size_t *resp_len)
|
2005-06-05 20:52:14 +00:00
|
|
|
{
|
|
|
|
struct eap_hdr *hdr;
|
|
|
|
u8 *pos;
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
hdr = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TLV, resp_len,
|
|
|
|
10, EAP_CODE_RESPONSE, id, &pos);
|
2005-06-05 20:52:14 +00:00
|
|
|
if (hdr == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*pos++ = 0x80; /* Mandatory */
|
|
|
|
*pos++ = EAP_TLV_NAK_TLV;
|
|
|
|
/* Length */
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 6;
|
|
|
|
/* Vendor-Id */
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 0;
|
|
|
|
/* NAK-Type */
|
2006-03-07 05:26:33 +00:00
|
|
|
WPA_PUT_BE16(pos, nak_type);
|
2005-06-05 20:52:14 +00:00
|
|
|
|
|
|
|
return (u8 *) hdr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
/**
|
|
|
|
* eap_tlv_build_result - Build EAP-TLV Result message
|
|
|
|
* @id: EAP identifier for the header
|
|
|
|
* @status: Status (EAP_TLV_RESULT_SUCCESS or EAP_TLV_RESULT_FAILURE)
|
|
|
|
* @resp_len: Buffer for returning the response length
|
|
|
|
* Returns: Buffer to the allocated EAP-TLV Result message or %NULL on failure
|
|
|
|
*
|
|
|
|
* This funtion builds an EAP-TLV Result message. The caller is responsible for
|
|
|
|
* freeing the returned buffer.
|
|
|
|
*/
|
2006-03-07 05:26:33 +00:00
|
|
|
u8 * eap_tlv_build_result(int id, u16 status, size_t *resp_len)
|
2005-06-05 20:52:14 +00:00
|
|
|
{
|
|
|
|
struct eap_hdr *hdr;
|
|
|
|
u8 *pos;
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
hdr = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_TLV, resp_len,
|
|
|
|
6, EAP_CODE_RESPONSE, id, &pos);
|
2005-06-05 20:52:14 +00:00
|
|
|
if (hdr == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*pos++ = 0x80; /* Mandatory */
|
|
|
|
*pos++ = EAP_TLV_RESULT_TLV;
|
|
|
|
/* Length */
|
|
|
|
*pos++ = 0;
|
|
|
|
*pos++ = 2;
|
|
|
|
/* Status */
|
2006-03-07 05:26:33 +00:00
|
|
|
WPA_PUT_BE16(pos, status);
|
2005-06-05 20:52:14 +00:00
|
|
|
|
|
|
|
return (u8 *) hdr;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-07-11 15:48:36 +00:00
|
|
|
/**
|
|
|
|
* eap_tlv_process - Process a received EAP-TLV message and generate a response
|
|
|
|
* @sm: Pointer to EAP state machine allocated with eap_sm_init()
|
|
|
|
* @ret: Return values from EAP request validation and processing
|
|
|
|
* @hdr: EAP-TLV request to be processed. The caller must have validated that
|
|
|
|
* the buffer is large enough to contain full request (hdr->length bytes) and
|
|
|
|
* that the EAP type is EAP_TYPE_TLV.
|
|
|
|
* @resp: Buffer to return a pointer to the allocated response message. This
|
|
|
|
* field should be initialized to %NULL before the call. The value will be
|
|
|
|
* updated if a response message is generated. The caller is responsible for
|
|
|
|
* freeing the allocated message.
|
|
|
|
* @resp_len: Buffer for returning the response length
|
|
|
|
* Returns: 0 on success, -1 on failure
|
|
|
|
*/
|
2005-06-05 20:52:14 +00:00
|
|
|
int eap_tlv_process(struct eap_sm *sm, struct eap_method_ret *ret,
|
2008-03-24 19:46:53 +00:00
|
|
|
const struct eap_hdr *hdr, u8 **resp, size_t *resp_len,
|
|
|
|
int force_failure)
|
2005-06-05 20:52:14 +00:00
|
|
|
{
|
2007-07-11 15:48:36 +00:00
|
|
|
size_t left, tlv_len;
|
2006-03-07 05:26:33 +00:00
|
|
|
const u8 *pos;
|
|
|
|
const u8 *result_tlv = NULL;
|
2005-06-05 20:52:14 +00:00
|
|
|
size_t result_tlv_len = 0;
|
2007-07-11 15:48:36 +00:00
|
|
|
int tlv_type, mandatory;
|
2005-06-05 20:52:14 +00:00
|
|
|
|
|
|
|
/* Parse TLVs */
|
|
|
|
left = be_to_host16(hdr->length) - sizeof(struct eap_hdr) - 1;
|
2006-03-07 05:26:33 +00:00
|
|
|
pos = (const u8 *) (hdr + 1);
|
2005-06-05 20:52:14 +00:00
|
|
|
pos++;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-TLV: Received TLVs", pos, left);
|
|
|
|
while (left >= 4) {
|
|
|
|
mandatory = !!(pos[0] & 0x80);
|
2006-03-07 05:26:33 +00:00
|
|
|
tlv_type = WPA_GET_BE16(pos) & 0x3fff;
|
|
|
|
pos += 2;
|
|
|
|
tlv_len = WPA_GET_BE16(pos);
|
|
|
|
pos += 2;
|
2005-06-05 20:52:14 +00:00
|
|
|
left -= 4;
|
|
|
|
if (tlv_len > left) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-TLV: TLV underrun "
|
2007-07-11 15:48:36 +00:00
|
|
|
"(tlv_len=%lu left=%lu)",
|
|
|
|
(unsigned long) tlv_len,
|
2005-06-05 20:52:14 +00:00
|
|
|
(unsigned long) left);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
switch (tlv_type) {
|
|
|
|
case EAP_TLV_RESULT_TLV:
|
|
|
|
result_tlv = pos;
|
|
|
|
result_tlv_len = tlv_len;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-TLV: Unsupported TLV Type "
|
|
|
|
"%d%s", tlv_type,
|
|
|
|
mandatory ? " (mandatory)" : "");
|
|
|
|
if (mandatory) {
|
|
|
|
/* NAK TLV and ignore all TLVs in this packet.
|
|
|
|
*/
|
|
|
|
*resp = eap_tlv_build_nak(hdr->identifier,
|
|
|
|
tlv_type, resp_len);
|
|
|
|
return *resp == NULL ? -1 : 0;
|
|
|
|
}
|
|
|
|
/* Ignore this TLV, but process other TLVs */
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos += tlv_len;
|
|
|
|
left -= tlv_len;
|
|
|
|
}
|
|
|
|
if (left) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-TLV: Last TLV too short in "
|
|
|
|
"Request (left=%lu)", (unsigned long) left);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Process supported TLVs */
|
|
|
|
if (result_tlv) {
|
|
|
|
int status, resp_status;
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-TLV: Result TLV",
|
|
|
|
result_tlv, result_tlv_len);
|
|
|
|
if (result_tlv_len < 2) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-TLV: Too short Result TLV "
|
|
|
|
"(len=%lu)",
|
|
|
|
(unsigned long) result_tlv_len);
|
|
|
|
return -1;
|
|
|
|
}
|
2006-03-07 05:26:33 +00:00
|
|
|
status = WPA_GET_BE16(result_tlv);
|
2005-06-05 20:52:14 +00:00
|
|
|
if (status == EAP_TLV_RESULT_SUCCESS) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Success "
|
|
|
|
"- EAP-TLV/Phase2 Completed");
|
2008-03-24 19:46:53 +00:00
|
|
|
if (force_failure) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-TLV: Earlier failure"
|
|
|
|
" - force failed Phase 2");
|
|
|
|
resp_status = EAP_TLV_RESULT_FAILURE;
|
|
|
|
ret->decision = DECISION_FAIL;
|
|
|
|
} else {
|
|
|
|
resp_status = EAP_TLV_RESULT_SUCCESS;
|
|
|
|
ret->decision = DECISION_UNCOND_SUCC;
|
|
|
|
}
|
2005-06-05 20:52:14 +00:00
|
|
|
} else if (status == EAP_TLV_RESULT_FAILURE) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-TLV: TLV Result - Failure");
|
|
|
|
resp_status = EAP_TLV_RESULT_FAILURE;
|
|
|
|
ret->decision = DECISION_FAIL;
|
|
|
|
} else {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-TLV: Unknown TLV Result "
|
|
|
|
"Status %d", status);
|
|
|
|
resp_status = EAP_TLV_RESULT_FAILURE;
|
|
|
|
ret->decision = DECISION_FAIL;
|
|
|
|
}
|
|
|
|
ret->methodState = METHOD_DONE;
|
|
|
|
|
|
|
|
*resp = eap_tlv_build_result(hdr->identifier, resp_status,
|
|
|
|
resp_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|