2008-02-27 20:34:43 -05:00
|
|
|
/*
|
|
|
|
* EAP peer method: EAP-SIM (RFC 4186)
|
2012-09-02 06:04:18 -04:00
|
|
|
* Copyright (c) 2004-2012, Jouni Malinen <j@w1.fi>
|
2008-02-27 20:34:43 -05:00
|
|
|
*
|
2012-02-11 09:46:35 -05:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2008-02-27 20:34:43 -05:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "includes.h"
|
|
|
|
|
|
|
|
#include "common.h"
|
2009-12-05 14:00:52 -05:00
|
|
|
#include "pcsc_funcs.h"
|
|
|
|
#include "crypto/milenage.h"
|
2010-11-23 18:05:20 -05:00
|
|
|
#include "crypto/random.h"
|
2008-02-27 20:34:43 -05:00
|
|
|
#include "eap_peer/eap_i.h"
|
|
|
|
#include "eap_config.h"
|
|
|
|
#include "eap_common/eap_sim_common.h"
|
|
|
|
|
|
|
|
|
|
|
|
struct eap_sim_data {
|
|
|
|
u8 *ver_list;
|
|
|
|
size_t ver_list_len;
|
|
|
|
int selected_version;
|
|
|
|
size_t min_num_chal, num_chal;
|
|
|
|
|
|
|
|
u8 kc[3][EAP_SIM_KC_LEN];
|
|
|
|
u8 sres[3][EAP_SIM_SRES_LEN];
|
|
|
|
u8 nonce_mt[EAP_SIM_NONCE_MT_LEN], nonce_s[EAP_SIM_NONCE_S_LEN];
|
|
|
|
u8 mk[EAP_SIM_MK_LEN];
|
|
|
|
u8 k_aut[EAP_SIM_K_AUT_LEN];
|
|
|
|
u8 k_encr[EAP_SIM_K_ENCR_LEN];
|
|
|
|
u8 msk[EAP_SIM_KEYING_DATA_LEN];
|
|
|
|
u8 emsk[EAP_EMSK_LEN];
|
|
|
|
u8 rand[3][GSM_RAND_LEN];
|
|
|
|
|
|
|
|
int num_id_req, num_notification;
|
|
|
|
u8 *pseudonym;
|
|
|
|
size_t pseudonym_len;
|
|
|
|
u8 *reauth_id;
|
|
|
|
size_t reauth_id_len;
|
|
|
|
int reauth;
|
|
|
|
unsigned int counter, counter_too_small;
|
|
|
|
u8 *last_eap_identity;
|
|
|
|
size_t last_eap_identity_len;
|
|
|
|
enum {
|
2014-06-20 17:25:40 -04:00
|
|
|
CONTINUE, RESULT_SUCCESS, SUCCESS, FAILURE
|
2008-02-27 20:34:43 -05:00
|
|
|
} state;
|
|
|
|
int result_ind, use_result_ind;
|
EAP-SIM: Don't use anonymous identity in phase2
The "anonymous_identity" configuration field has more than one
semantic meaning. For tunneled EAP methods, this refers to the
outer EAP identity. For EAP-SIM, this refers to the pseudonym
identity. Also, interestingly, EAP-SIM can overwrite the
"anonymous_identity" field if one is provided to it by the
authenticator.
When EAP-SIM is tunneled within an outer method, it makes sense
to only use this value for the outer method, since it's unlikely
that this will also be valid as an identity for the inner EAP-SIM
method. Also, presumably since the outer method protects the
EAP-SIM transaction, there is no need for a pseudonym in this
usage.
Similarly, if EAP-SIM is being used as an inner method, it must
not push the pseudonym identity using eap_set_anon_id() since it
could overwrite the identity for the outer EAP method.
Signed-off-by: Paul Stewart <pstew@google.com>
2017-02-08 20:47:57 -05:00
|
|
|
int use_pseudonym;
|
2008-02-27 20:34:43 -05:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef CONFIG_NO_STDOUT_DEBUG
|
|
|
|
static const char * eap_sim_state_txt(int state)
|
|
|
|
{
|
|
|
|
switch (state) {
|
|
|
|
case CONTINUE:
|
|
|
|
return "CONTINUE";
|
|
|
|
case RESULT_SUCCESS:
|
|
|
|
return "RESULT_SUCCESS";
|
|
|
|
case SUCCESS:
|
|
|
|
return "SUCCESS";
|
|
|
|
case FAILURE:
|
|
|
|
return "FAILURE";
|
|
|
|
default:
|
|
|
|
return "?";
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif /* CONFIG_NO_STDOUT_DEBUG */
|
|
|
|
|
|
|
|
|
|
|
|
static void eap_sim_state(struct eap_sim_data *data, int state)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: %s -> %s",
|
|
|
|
eap_sim_state_txt(data->state),
|
|
|
|
eap_sim_state_txt(state));
|
|
|
|
data->state = state;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void * eap_sim_init(struct eap_sm *sm)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data;
|
|
|
|
struct eap_peer_config *config = eap_get_config(sm);
|
|
|
|
|
|
|
|
data = os_zalloc(sizeof(*data));
|
|
|
|
if (data == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
2010-11-23 18:05:20 -05:00
|
|
|
if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) {
|
2008-02-27 20:34:43 -05:00
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
|
|
|
|
"for NONCE_MT");
|
|
|
|
os_free(data);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
data->min_num_chal = 2;
|
|
|
|
if (config && config->phase1) {
|
|
|
|
char *pos = os_strstr(config->phase1, "sim_min_num_chal=");
|
|
|
|
if (pos) {
|
|
|
|
data->min_num_chal = atoi(pos + 17);
|
|
|
|
if (data->min_num_chal < 2 || data->min_num_chal > 3) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Invalid "
|
|
|
|
"sim_min_num_chal configuration "
|
|
|
|
"(%lu, expected 2 or 3)",
|
|
|
|
(unsigned long) data->min_num_chal);
|
|
|
|
os_free(data);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Set minimum number of "
|
|
|
|
"challenges to %lu",
|
|
|
|
(unsigned long) data->min_num_chal);
|
|
|
|
}
|
|
|
|
|
|
|
|
data->result_ind = os_strstr(config->phase1, "result_ind=1") !=
|
|
|
|
NULL;
|
|
|
|
}
|
|
|
|
|
EAP-SIM: Don't use anonymous identity in phase2
The "anonymous_identity" configuration field has more than one
semantic meaning. For tunneled EAP methods, this refers to the
outer EAP identity. For EAP-SIM, this refers to the pseudonym
identity. Also, interestingly, EAP-SIM can overwrite the
"anonymous_identity" field if one is provided to it by the
authenticator.
When EAP-SIM is tunneled within an outer method, it makes sense
to only use this value for the outer method, since it's unlikely
that this will also be valid as an identity for the inner EAP-SIM
method. Also, presumably since the outer method protects the
EAP-SIM transaction, there is no need for a pseudonym in this
usage.
Similarly, if EAP-SIM is being used as an inner method, it must
not push the pseudonym identity using eap_set_anon_id() since it
could overwrite the identity for the outer EAP method.
Signed-off-by: Paul Stewart <pstew@google.com>
2017-02-08 20:47:57 -05:00
|
|
|
data->use_pseudonym = !sm->init_phase2;
|
|
|
|
if (config && config->anonymous_identity && data->use_pseudonym) {
|
2012-09-02 06:04:18 -04:00
|
|
|
data->pseudonym = os_malloc(config->anonymous_identity_len);
|
|
|
|
if (data->pseudonym) {
|
|
|
|
os_memcpy(data->pseudonym, config->anonymous_identity,
|
|
|
|
config->anonymous_identity_len);
|
|
|
|
data->pseudonym_len = config->anonymous_identity_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
eap_sim_state(data, CONTINUE);
|
|
|
|
|
|
|
|
return data;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-06-29 14:16:30 -04:00
|
|
|
static void eap_sim_clear_keys(struct eap_sim_data *data, int reauth)
|
|
|
|
{
|
|
|
|
if (!reauth) {
|
|
|
|
os_memset(data->mk, 0, EAP_SIM_MK_LEN);
|
|
|
|
os_memset(data->k_aut, 0, EAP_SIM_K_AUT_LEN);
|
|
|
|
os_memset(data->k_encr, 0, EAP_SIM_K_ENCR_LEN);
|
|
|
|
}
|
|
|
|
os_memset(data->kc, 0, 3 * EAP_SIM_KC_LEN);
|
|
|
|
os_memset(data->sres, 0, 3 * EAP_SIM_SRES_LEN);
|
|
|
|
os_memset(data->msk, 0, EAP_SIM_KEYING_DATA_LEN);
|
|
|
|
os_memset(data->emsk, 0, EAP_EMSK_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
static void eap_sim_deinit(struct eap_sm *sm, void *priv)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
if (data) {
|
|
|
|
os_free(data->ver_list);
|
|
|
|
os_free(data->pseudonym);
|
|
|
|
os_free(data->reauth_id);
|
|
|
|
os_free(data->last_eap_identity);
|
2014-06-29 14:16:30 -04:00
|
|
|
eap_sim_clear_keys(data, 0);
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(data);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-10-19 11:36:12 -04:00
|
|
|
static int eap_sim_ext_sim_req(struct eap_sm *sm, struct eap_sim_data *data)
|
|
|
|
{
|
|
|
|
char req[200], *pos, *end;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Use external SIM processing");
|
|
|
|
pos = req;
|
|
|
|
end = pos + sizeof(req);
|
|
|
|
pos += os_snprintf(pos, end - pos, "GSM-AUTH");
|
|
|
|
for (i = 0; i < data->num_chal; i++) {
|
|
|
|
pos += os_snprintf(pos, end - pos, ":");
|
|
|
|
pos += wpa_snprintf_hex(pos, end - pos, data->rand[i],
|
|
|
|
GSM_RAND_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
eap_sm_request_sim(sm, req);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int eap_sim_ext_sim_result(struct eap_sm *sm, struct eap_sim_data *data,
|
|
|
|
struct eap_peer_config *conf)
|
|
|
|
{
|
|
|
|
char *resp, *pos;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG,
|
|
|
|
"EAP-SIM: Use result from external SIM processing");
|
|
|
|
|
|
|
|
resp = conf->external_sim_resp;
|
|
|
|
conf->external_sim_resp = NULL;
|
|
|
|
|
|
|
|
if (os_strncmp(resp, "GSM-AUTH:", 9) != 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Unrecognized external SIM processing response");
|
|
|
|
os_free(resp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = resp + 9;
|
|
|
|
for (i = 0; i < data->num_chal; i++) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND",
|
|
|
|
data->rand[i], GSM_RAND_LEN);
|
|
|
|
|
|
|
|
if (hexstr2bin(pos, data->kc[i], EAP_SIM_KC_LEN) < 0)
|
|
|
|
goto invalid;
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
|
|
|
|
data->kc[i], EAP_SIM_KC_LEN);
|
|
|
|
pos += EAP_SIM_KC_LEN * 2;
|
|
|
|
if (*pos != ':')
|
|
|
|
goto invalid;
|
|
|
|
pos++;
|
|
|
|
|
|
|
|
if (hexstr2bin(pos, data->sres[i], EAP_SIM_SRES_LEN) < 0)
|
|
|
|
goto invalid;
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES",
|
|
|
|
data->sres[i], EAP_SIM_SRES_LEN);
|
|
|
|
pos += EAP_SIM_SRES_LEN * 2;
|
|
|
|
if (i + 1 < data->num_chal) {
|
|
|
|
if (*pos != ':')
|
|
|
|
goto invalid;
|
|
|
|
pos++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(resp);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
invalid:
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Invalid external SIM processing GSM-AUTH response");
|
|
|
|
os_free(resp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
static int eap_sim_gsm_auth(struct eap_sm *sm, struct eap_sim_data *data)
|
|
|
|
{
|
2008-11-05 21:21:32 -05:00
|
|
|
struct eap_peer_config *conf;
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: GSM authentication algorithm");
|
2008-11-05 21:21:32 -05:00
|
|
|
|
|
|
|
conf = eap_get_config(sm);
|
|
|
|
if (conf == NULL)
|
2008-02-27 20:34:43 -05:00
|
|
|
return -1;
|
2013-10-19 11:36:12 -04:00
|
|
|
|
|
|
|
if (sm->external_sim) {
|
|
|
|
if (conf->external_sim_resp)
|
|
|
|
return eap_sim_ext_sim_result(sm, data, conf);
|
|
|
|
else
|
|
|
|
return eap_sim_ext_sim_req(sm, data);
|
|
|
|
}
|
|
|
|
|
2016-01-15 11:41:30 -05:00
|
|
|
#ifdef PCSC_FUNCS
|
2008-11-05 21:21:32 -05:00
|
|
|
if (conf->pcsc) {
|
|
|
|
if (scard_gsm_auth(sm->scard_ctx, data->rand[0],
|
|
|
|
data->sres[0], data->kc[0]) ||
|
|
|
|
scard_gsm_auth(sm->scard_ctx, data->rand[1],
|
|
|
|
data->sres[1], data->kc[1]) ||
|
|
|
|
(data->num_chal > 2 &&
|
|
|
|
scard_gsm_auth(sm->scard_ctx, data->rand[2],
|
|
|
|
data->sres[2], data->kc[2]))) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: GSM SIM "
|
|
|
|
"authentication could not be completed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2016-01-15 11:41:30 -05:00
|
|
|
#endif /* PCSC_FUNCS */
|
2008-11-05 21:21:32 -05:00
|
|
|
|
|
|
|
#ifdef CONFIG_SIM_SIMULATOR
|
|
|
|
if (conf->password) {
|
|
|
|
u8 opc[16], k[16];
|
|
|
|
const char *pos;
|
2008-11-22 07:06:58 -05:00
|
|
|
size_t i;
|
2008-11-05 21:21:32 -05:00
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Use internal GSM-Milenage "
|
|
|
|
"implementation for authentication");
|
|
|
|
if (conf->password_len < 65) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: invalid GSM-Milenage "
|
|
|
|
"password");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
pos = (const char *) conf->password;
|
|
|
|
if (hexstr2bin(pos, k, 16))
|
|
|
|
return -1;
|
|
|
|
pos += 32;
|
|
|
|
if (*pos != ':')
|
|
|
|
return -1;
|
|
|
|
pos++;
|
|
|
|
|
|
|
|
if (hexstr2bin(pos, opc, 16))
|
|
|
|
return -1;
|
|
|
|
|
2008-11-22 07:06:58 -05:00
|
|
|
for (i = 0; i < data->num_chal; i++) {
|
|
|
|
if (gsm_milenage(opc, k, data->rand[i],
|
|
|
|
data->sres[i], data->kc[i])) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: "
|
|
|
|
"GSM-Milenage authentication "
|
|
|
|
"could not be completed");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-SIM: RAND",
|
|
|
|
data->rand[i], GSM_RAND_LEN);
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: SRES",
|
|
|
|
data->sres[i], EAP_SIM_SRES_LEN);
|
|
|
|
wpa_hexdump_key(MSG_DEBUG, "EAP-SIM: Kc",
|
|
|
|
data->kc[i], EAP_SIM_KC_LEN);
|
2008-11-05 21:21:32 -05:00
|
|
|
}
|
|
|
|
return 0;
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
2008-11-05 21:21:32 -05:00
|
|
|
#endif /* CONFIG_SIM_SIMULATOR */
|
|
|
|
|
|
|
|
#ifdef CONFIG_SIM_HARDCODED
|
2008-02-27 20:34:43 -05:00
|
|
|
/* These hardcoded Kc and SRES values are used for testing. RAND to
|
|
|
|
* KC/SREC mapping is very bogus as far as real authentication is
|
|
|
|
* concerned, but it is quite useful for cases where the AS is rotating
|
|
|
|
* the order of pre-configured values. */
|
|
|
|
{
|
|
|
|
size_t i;
|
2008-11-05 21:21:32 -05:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Use hardcoded Kc and SRES "
|
|
|
|
"values for testing");
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
for (i = 0; i < data->num_chal; i++) {
|
|
|
|
if (data->rand[i][0] == 0xaa) {
|
|
|
|
os_memcpy(data->kc[i],
|
|
|
|
"\xa0\xa1\xa2\xa3\xa4\xa5\xa6\xa7",
|
|
|
|
EAP_SIM_KC_LEN);
|
|
|
|
os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4",
|
|
|
|
EAP_SIM_SRES_LEN);
|
|
|
|
} else if (data->rand[i][0] == 0xbb) {
|
|
|
|
os_memcpy(data->kc[i],
|
|
|
|
"\xb0\xb1\xb2\xb3\xb4\xb5\xb6\xb7",
|
|
|
|
EAP_SIM_KC_LEN);
|
|
|
|
os_memcpy(data->sres[i], "\xe1\xe2\xe3\xe4",
|
|
|
|
EAP_SIM_SRES_LEN);
|
|
|
|
} else {
|
|
|
|
os_memcpy(data->kc[i],
|
|
|
|
"\xc0\xc1\xc2\xc3\xc4\xc5\xc6\xc7",
|
|
|
|
EAP_SIM_KC_LEN);
|
|
|
|
os_memcpy(data->sres[i], "\xf1\xf2\xf3\xf4",
|
|
|
|
EAP_SIM_SRES_LEN);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2008-11-05 21:21:32 -05:00
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
return 0;
|
2008-11-05 21:21:32 -05:00
|
|
|
|
|
|
|
#else /* CONFIG_SIM_HARDCODED */
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: No GSM authentication algorithm "
|
|
|
|
"enabled");
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
#endif /* CONFIG_SIM_HARDCODED */
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int eap_sim_supported_ver(int version)
|
|
|
|
{
|
|
|
|
return version == EAP_SIM_VERSION;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#define CLEAR_PSEUDONYM 0x01
|
|
|
|
#define CLEAR_REAUTH_ID 0x02
|
|
|
|
#define CLEAR_EAP_ID 0x04
|
|
|
|
|
2012-09-02 06:04:18 -04:00
|
|
|
static void eap_sim_clear_identities(struct eap_sm *sm,
|
|
|
|
struct eap_sim_data *data, int id)
|
2008-02-27 20:34:43 -05:00
|
|
|
{
|
2011-12-04 10:17:21 -05:00
|
|
|
if ((id & CLEAR_PSEUDONYM) && data->pseudonym) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old pseudonym");
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(data->pseudonym);
|
|
|
|
data->pseudonym = NULL;
|
|
|
|
data->pseudonym_len = 0;
|
EAP-SIM: Don't use anonymous identity in phase2
The "anonymous_identity" configuration field has more than one
semantic meaning. For tunneled EAP methods, this refers to the
outer EAP identity. For EAP-SIM, this refers to the pseudonym
identity. Also, interestingly, EAP-SIM can overwrite the
"anonymous_identity" field if one is provided to it by the
authenticator.
When EAP-SIM is tunneled within an outer method, it makes sense
to only use this value for the outer method, since it's unlikely
that this will also be valid as an identity for the inner EAP-SIM
method. Also, presumably since the outer method protects the
EAP-SIM transaction, there is no need for a pseudonym in this
usage.
Similarly, if EAP-SIM is being used as an inner method, it must
not push the pseudonym identity using eap_set_anon_id() since it
could overwrite the identity for the outer EAP method.
Signed-off-by: Paul Stewart <pstew@google.com>
2017-02-08 20:47:57 -05:00
|
|
|
if (data->use_pseudonym)
|
|
|
|
eap_set_anon_id(sm, NULL, 0);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
2011-12-04 10:17:21 -05:00
|
|
|
if ((id & CLEAR_REAUTH_ID) && data->reauth_id) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old reauth_id");
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(data->reauth_id);
|
|
|
|
data->reauth_id = NULL;
|
|
|
|
data->reauth_id_len = 0;
|
|
|
|
}
|
2011-12-04 10:17:21 -05:00
|
|
|
if ((id & CLEAR_EAP_ID) && data->last_eap_identity) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: forgetting old eap_id");
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(data->last_eap_identity);
|
|
|
|
data->last_eap_identity = NULL;
|
|
|
|
data->last_eap_identity_len = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-28 12:38:46 -05:00
|
|
|
static int eap_sim_learn_ids(struct eap_sm *sm, struct eap_sim_data *data,
|
2008-02-27 20:34:43 -05:00
|
|
|
struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
if (attr->next_pseudonym) {
|
2012-01-28 12:38:46 -05:00
|
|
|
const u8 *identity = NULL;
|
|
|
|
size_t identity_len = 0;
|
|
|
|
const u8 *realm = NULL;
|
|
|
|
size_t realm_len = 0;
|
|
|
|
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG,
|
|
|
|
"EAP-SIM: (encr) AT_NEXT_PSEUDONYM",
|
|
|
|
attr->next_pseudonym,
|
|
|
|
attr->next_pseudonym_len);
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(data->pseudonym);
|
2012-01-28 12:38:46 -05:00
|
|
|
/* Look for the realm of the permanent identity */
|
|
|
|
identity = eap_get_config_identity(sm, &identity_len);
|
|
|
|
if (identity) {
|
|
|
|
for (realm = identity, realm_len = identity_len;
|
|
|
|
realm_len > 0; realm_len--, realm++) {
|
|
|
|
if (*realm == '@')
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
data->pseudonym = os_malloc(attr->next_pseudonym_len +
|
|
|
|
realm_len);
|
2008-02-27 20:34:43 -05:00
|
|
|
if (data->pseudonym == NULL) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
|
|
|
|
"next pseudonym");
|
2012-01-28 12:38:46 -05:00
|
|
|
data->pseudonym_len = 0;
|
2008-02-27 20:34:43 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
os_memcpy(data->pseudonym, attr->next_pseudonym,
|
|
|
|
attr->next_pseudonym_len);
|
2012-01-28 12:38:46 -05:00
|
|
|
if (realm_len) {
|
|
|
|
os_memcpy(data->pseudonym + attr->next_pseudonym_len,
|
|
|
|
realm, realm_len);
|
|
|
|
}
|
|
|
|
data->pseudonym_len = attr->next_pseudonym_len + realm_len;
|
EAP-SIM: Don't use anonymous identity in phase2
The "anonymous_identity" configuration field has more than one
semantic meaning. For tunneled EAP methods, this refers to the
outer EAP identity. For EAP-SIM, this refers to the pseudonym
identity. Also, interestingly, EAP-SIM can overwrite the
"anonymous_identity" field if one is provided to it by the
authenticator.
When EAP-SIM is tunneled within an outer method, it makes sense
to only use this value for the outer method, since it's unlikely
that this will also be valid as an identity for the inner EAP-SIM
method. Also, presumably since the outer method protects the
EAP-SIM transaction, there is no need for a pseudonym in this
usage.
Similarly, if EAP-SIM is being used as an inner method, it must
not push the pseudonym identity using eap_set_anon_id() since it
could overwrite the identity for the outer EAP method.
Signed-off-by: Paul Stewart <pstew@google.com>
2017-02-08 20:47:57 -05:00
|
|
|
if (data->use_pseudonym)
|
|
|
|
eap_set_anon_id(sm, data->pseudonym,
|
|
|
|
data->pseudonym_len);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
if (attr->next_reauth_id) {
|
|
|
|
os_free(data->reauth_id);
|
|
|
|
data->reauth_id = os_malloc(attr->next_reauth_id_len);
|
|
|
|
if (data->reauth_id == NULL) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: (encr) No memory for "
|
|
|
|
"next reauth_id");
|
2012-01-28 12:38:46 -05:00
|
|
|
data->reauth_id_len = 0;
|
2008-02-27 20:34:43 -05:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
os_memcpy(data->reauth_id, attr->next_reauth_id,
|
|
|
|
attr->next_reauth_id_len);
|
|
|
|
data->reauth_id_len = attr->next_reauth_id_len;
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG,
|
|
|
|
"EAP-SIM: (encr) AT_NEXT_REAUTH_ID",
|
|
|
|
data->reauth_id,
|
|
|
|
data->reauth_id_len);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_client_error(struct eap_sim_data *data, u8 id,
|
|
|
|
int err)
|
|
|
|
{
|
|
|
|
struct eap_sim_msg *msg;
|
|
|
|
|
|
|
|
eap_sim_state(data, FAILURE);
|
|
|
|
data->num_id_req = 0;
|
|
|
|
data->num_notification = 0;
|
|
|
|
|
2012-09-01 17:58:03 -04:00
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Send Client-Error (error code %d)",
|
|
|
|
err);
|
2008-02-27 20:34:43 -05:00
|
|
|
msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM,
|
|
|
|
EAP_SIM_SUBTYPE_CLIENT_ERROR);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_CLIENT_ERROR_CODE, err, NULL, 0);
|
2014-06-29 11:46:29 -04:00
|
|
|
return eap_sim_msg_finish(msg, EAP_TYPE_SIM, NULL, NULL, 0);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_response_start(struct eap_sm *sm,
|
|
|
|
struct eap_sim_data *data, u8 id,
|
|
|
|
enum eap_sim_id_req id_req)
|
|
|
|
{
|
|
|
|
const u8 *identity = NULL;
|
|
|
|
size_t identity_len = 0;
|
|
|
|
struct eap_sim_msg *msg;
|
|
|
|
|
|
|
|
data->reauth = 0;
|
|
|
|
if (id_req == ANY_ID && data->reauth_id) {
|
|
|
|
identity = data->reauth_id;
|
|
|
|
identity_len = data->reauth_id_len;
|
|
|
|
data->reauth = 1;
|
|
|
|
} else if ((id_req == ANY_ID || id_req == FULLAUTH_ID) &&
|
|
|
|
data->pseudonym) {
|
|
|
|
identity = data->pseudonym;
|
|
|
|
identity_len = data->pseudonym_len;
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_REAUTH_ID);
|
2008-02-27 20:34:43 -05:00
|
|
|
} else if (id_req != NO_ID_REQ) {
|
|
|
|
identity = eap_get_config_identity(sm, &identity_len);
|
|
|
|
if (identity) {
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_PSEUDONYM |
|
2008-02-27 20:34:43 -05:00
|
|
|
CLEAR_REAUTH_ID);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (id_req != NO_ID_REQ)
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_EAP_ID);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Generating EAP-SIM Start (id=%d)", id);
|
|
|
|
msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id,
|
|
|
|
EAP_TYPE_SIM, EAP_SIM_SUBTYPE_START);
|
|
|
|
if (!data->reauth) {
|
|
|
|
wpa_hexdump(MSG_DEBUG, " AT_NONCE_MT",
|
|
|
|
data->nonce_mt, EAP_SIM_NONCE_MT_LEN);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_NONCE_MT, 0,
|
|
|
|
data->nonce_mt, EAP_SIM_NONCE_MT_LEN);
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_SELECTED_VERSION %d",
|
|
|
|
data->selected_version);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_SELECTED_VERSION,
|
|
|
|
data->selected_version, NULL, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (identity) {
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, " AT_IDENTITY",
|
|
|
|
identity, identity_len);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_IDENTITY, identity_len,
|
|
|
|
identity, identity_len);
|
|
|
|
}
|
|
|
|
|
2014-06-29 11:46:29 -04:00
|
|
|
return eap_sim_msg_finish(msg, EAP_TYPE_SIM, NULL, NULL, 0);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_response_challenge(struct eap_sim_data *data,
|
|
|
|
u8 id)
|
|
|
|
{
|
|
|
|
struct eap_sim_msg *msg;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Generating EAP-SIM Challenge (id=%d)", id);
|
|
|
|
msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM,
|
|
|
|
EAP_SIM_SUBTYPE_CHALLENGE);
|
|
|
|
if (data->use_result_ind) {
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_MAC");
|
|
|
|
eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
|
2014-06-29 11:46:29 -04:00
|
|
|
return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut,
|
|
|
|
(u8 *) data->sres,
|
2008-02-27 20:34:43 -05:00
|
|
|
data->num_chal * EAP_SIM_SRES_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_response_reauth(struct eap_sim_data *data,
|
2012-09-01 17:39:48 -04:00
|
|
|
u8 id, int counter_too_small,
|
|
|
|
const u8 *nonce_s)
|
2008-02-27 20:34:43 -05:00
|
|
|
{
|
|
|
|
struct eap_sim_msg *msg;
|
|
|
|
unsigned int counter;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Generating EAP-SIM Reauthentication (id=%d)",
|
|
|
|
id);
|
|
|
|
msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id, EAP_TYPE_SIM,
|
|
|
|
EAP_SIM_SUBTYPE_REAUTHENTICATION);
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_IV");
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
|
|
|
|
eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV, EAP_SIM_AT_ENCR_DATA);
|
|
|
|
|
|
|
|
if (counter_too_small) {
|
|
|
|
wpa_printf(MSG_DEBUG, " *AT_COUNTER_TOO_SMALL");
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER_TOO_SMALL, 0, NULL, 0);
|
|
|
|
counter = data->counter_too_small;
|
|
|
|
} else
|
|
|
|
counter = data->counter;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, " *AT_COUNTER %d", counter);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, counter, NULL, 0);
|
|
|
|
|
|
|
|
if (eap_sim_msg_add_encr_end(msg, data->k_encr, EAP_SIM_AT_PADDING)) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to encrypt "
|
|
|
|
"AT_ENCR_DATA");
|
|
|
|
eap_sim_msg_free(msg);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (data->use_result_ind) {
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_RESULT_IND");
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_RESULT_IND, 0, NULL, 0);
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_MAC");
|
|
|
|
eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
|
2014-06-29 11:46:29 -04:00
|
|
|
return eap_sim_msg_finish(msg, EAP_TYPE_SIM, data->k_aut, nonce_s,
|
2008-02-27 20:34:43 -05:00
|
|
|
EAP_SIM_NONCE_S_LEN);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_response_notification(struct eap_sim_data *data,
|
|
|
|
u8 id, u16 notification)
|
|
|
|
{
|
|
|
|
struct eap_sim_msg *msg;
|
|
|
|
u8 *k_aut = (notification & 0x4000) == 0 ? data->k_aut : NULL;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "Generating EAP-SIM Notification (id=%d)", id);
|
|
|
|
msg = eap_sim_msg_init(EAP_CODE_RESPONSE, id,
|
|
|
|
EAP_TYPE_SIM, EAP_SIM_SUBTYPE_NOTIFICATION);
|
|
|
|
if (k_aut && data->reauth) {
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_IV");
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_ENCR_DATA");
|
|
|
|
eap_sim_msg_add_encr_start(msg, EAP_SIM_AT_IV,
|
|
|
|
EAP_SIM_AT_ENCR_DATA);
|
|
|
|
wpa_printf(MSG_DEBUG, " *AT_COUNTER %d", data->counter);
|
|
|
|
eap_sim_msg_add(msg, EAP_SIM_AT_COUNTER, data->counter,
|
|
|
|
NULL, 0);
|
|
|
|
if (eap_sim_msg_add_encr_end(msg, data->k_encr,
|
|
|
|
EAP_SIM_AT_PADDING)) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to encrypt "
|
|
|
|
"AT_ENCR_DATA");
|
|
|
|
eap_sim_msg_free(msg);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (k_aut) {
|
|
|
|
wpa_printf(MSG_DEBUG, " AT_MAC");
|
|
|
|
eap_sim_msg_add_mac(msg, EAP_SIM_AT_MAC);
|
|
|
|
}
|
2014-06-29 11:46:29 -04:00
|
|
|
return eap_sim_msg_finish(msg, EAP_TYPE_SIM, k_aut, (u8 *) "", 0);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_process_start(struct eap_sm *sm,
|
|
|
|
struct eap_sim_data *data, u8 id,
|
|
|
|
struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
int selected_version = -1, id_error;
|
|
|
|
size_t i;
|
|
|
|
u8 *pos;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: subtype Start");
|
|
|
|
if (attr->version_list == NULL) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: No AT_VERSION_LIST in "
|
|
|
|
"SIM/Start");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNSUPPORTED_VERSION);
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(data->ver_list);
|
|
|
|
data->ver_list = os_malloc(attr->version_list_len);
|
|
|
|
if (data->ver_list == NULL) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Failed to allocate "
|
|
|
|
"memory for version list");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
os_memcpy(data->ver_list, attr->version_list, attr->version_list_len);
|
|
|
|
data->ver_list_len = attr->version_list_len;
|
|
|
|
pos = data->ver_list;
|
|
|
|
for (i = 0; i < data->ver_list_len / 2; i++) {
|
|
|
|
int ver = pos[0] * 256 + pos[1];
|
|
|
|
pos += 2;
|
|
|
|
if (eap_sim_supported_ver(ver)) {
|
|
|
|
selected_version = ver;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (selected_version < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Could not find a supported "
|
|
|
|
"version");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNSUPPORTED_VERSION);
|
|
|
|
}
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Selected Version %d",
|
|
|
|
selected_version);
|
|
|
|
data->selected_version = selected_version;
|
|
|
|
|
|
|
|
id_error = 0;
|
|
|
|
switch (attr->id_req) {
|
|
|
|
case NO_ID_REQ:
|
|
|
|
break;
|
|
|
|
case ANY_ID:
|
|
|
|
if (data->num_id_req > 0)
|
|
|
|
id_error++;
|
|
|
|
data->num_id_req++;
|
|
|
|
break;
|
|
|
|
case FULLAUTH_ID:
|
|
|
|
if (data->num_id_req > 1)
|
|
|
|
id_error++;
|
|
|
|
data->num_id_req++;
|
|
|
|
break;
|
|
|
|
case PERMANENT_ID:
|
|
|
|
if (data->num_id_req > 2)
|
|
|
|
id_error++;
|
|
|
|
data->num_id_req++;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (id_error) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Too many ID requests "
|
|
|
|
"used within one authentication");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
return eap_sim_response_start(sm, data, id, attr->id_req);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_process_challenge(struct eap_sm *sm,
|
|
|
|
struct eap_sim_data *data,
|
|
|
|
u8 id,
|
|
|
|
const struct wpabuf *reqData,
|
|
|
|
struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
const u8 *identity;
|
|
|
|
size_t identity_len;
|
|
|
|
struct eap_sim_attrs eattr;
|
2013-10-19 11:36:12 -04:00
|
|
|
int res;
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: subtype Challenge");
|
|
|
|
data->reauth = 0;
|
|
|
|
if (!attr->mac || !attr->rand) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
|
|
|
|
"did not include%s%s",
|
|
|
|
!attr->mac ? " AT_MAC" : "",
|
|
|
|
!attr->rand ? " AT_RAND" : "");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: %lu challenges",
|
|
|
|
(unsigned long) attr->num_chal);
|
|
|
|
if (attr->num_chal < data->min_num_chal) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Insufficient number of "
|
|
|
|
"challenges (%lu)", (unsigned long) attr->num_chal);
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_INSUFFICIENT_NUM_OF_CHAL);
|
|
|
|
}
|
|
|
|
if (attr->num_chal > 3) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Too many challenges "
|
|
|
|
"(%lu)", (unsigned long) attr->num_chal);
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Verify that RANDs are different */
|
|
|
|
if (os_memcmp(attr->rand, attr->rand + GSM_RAND_LEN,
|
|
|
|
GSM_RAND_LEN) == 0 ||
|
|
|
|
(attr->num_chal > 2 &&
|
|
|
|
(os_memcmp(attr->rand, attr->rand + 2 * GSM_RAND_LEN,
|
|
|
|
GSM_RAND_LEN) == 0 ||
|
|
|
|
os_memcmp(attr->rand + GSM_RAND_LEN,
|
|
|
|
attr->rand + 2 * GSM_RAND_LEN,
|
|
|
|
GSM_RAND_LEN) == 0))) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Same RAND used multiple times");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_RAND_NOT_FRESH);
|
|
|
|
}
|
|
|
|
|
|
|
|
os_memcpy(data->rand, attr->rand, attr->num_chal * GSM_RAND_LEN);
|
|
|
|
data->num_chal = attr->num_chal;
|
2013-10-19 11:36:12 -04:00
|
|
|
|
|
|
|
res = eap_sim_gsm_auth(sm, data);
|
|
|
|
if (res > 0) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Wait for external SIM processing");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
if (res) {
|
2008-02-27 20:34:43 -05:00
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: GSM authentication failed");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
if (data->last_eap_identity) {
|
|
|
|
identity = data->last_eap_identity;
|
|
|
|
identity_len = data->last_eap_identity_len;
|
|
|
|
} else if (data->pseudonym) {
|
|
|
|
identity = data->pseudonym;
|
|
|
|
identity_len = data->pseudonym_len;
|
|
|
|
} else
|
|
|
|
identity = eap_get_config_identity(sm, &identity_len);
|
|
|
|
wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Selected identity for MK "
|
|
|
|
"derivation", identity, identity_len);
|
|
|
|
eap_sim_derive_mk(identity, identity_len, data->nonce_mt,
|
|
|
|
data->selected_version, data->ver_list,
|
|
|
|
data->ver_list_len, data->num_chal,
|
|
|
|
(const u8 *) data->kc, data->mk);
|
|
|
|
eap_sim_derive_keys(data->mk, data->k_encr, data->k_aut, data->msk,
|
|
|
|
data->emsk);
|
|
|
|
if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, data->nonce_mt,
|
|
|
|
EAP_SIM_NONCE_MT_LEN)) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Challenge message "
|
|
|
|
"used invalid AT_MAC");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
2011-12-04 10:15:16 -05:00
|
|
|
/* Old reauthentication identity must not be used anymore. In
|
|
|
|
* other words, if no new reauth identity is received, full
|
|
|
|
* authentication will be used on next reauthentication (using
|
|
|
|
* pseudonym identity or permanent identity). */
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_REAUTH_ID | CLEAR_EAP_ID);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
if (attr->encr_data) {
|
|
|
|
u8 *decrypted;
|
|
|
|
decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
|
|
|
attr->encr_data_len, attr->iv,
|
|
|
|
&eattr, 0);
|
|
|
|
if (decrypted == NULL) {
|
|
|
|
return eap_sim_client_error(
|
|
|
|
data, id, EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
2012-01-28 12:38:46 -05:00
|
|
|
eap_sim_learn_ids(sm, data, &eattr);
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(decrypted);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data->result_ind && attr->result_ind)
|
|
|
|
data->use_result_ind = 1;
|
|
|
|
|
2014-06-20 17:25:40 -04:00
|
|
|
if (data->state != FAILURE) {
|
2008-02-27 20:34:43 -05:00
|
|
|
eap_sim_state(data, data->use_result_ind ?
|
|
|
|
RESULT_SUCCESS : SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
data->num_id_req = 0;
|
|
|
|
data->num_notification = 0;
|
|
|
|
/* RFC 4186 specifies that counter is initialized to one after
|
|
|
|
* fullauth, but initializing it to zero makes it easier to implement
|
|
|
|
* reauth verification. */
|
|
|
|
data->counter = 0;
|
|
|
|
return eap_sim_response_challenge(data, id);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int eap_sim_process_notification_reauth(struct eap_sim_data *data,
|
|
|
|
struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
struct eap_sim_attrs eattr;
|
|
|
|
u8 *decrypted;
|
|
|
|
|
|
|
|
if (attr->encr_data == NULL || attr->iv == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Notification message after "
|
|
|
|
"reauth did not include encrypted data");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
|
|
|
attr->encr_data_len, attr->iv, &eattr,
|
|
|
|
0);
|
|
|
|
if (decrypted == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to parse encrypted "
|
|
|
|
"data from notification message");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eattr.counter < 0 || (size_t) eattr.counter != data->counter) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Counter in notification "
|
|
|
|
"message does not match with counter in reauth "
|
|
|
|
"message");
|
|
|
|
os_free(decrypted);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
os_free(decrypted);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int eap_sim_process_notification_auth(struct eap_sim_data *data,
|
|
|
|
const struct wpabuf *reqData,
|
|
|
|
struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
if (attr->mac == NULL) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: no AT_MAC in after_auth "
|
|
|
|
"Notification message");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Notification message "
|
|
|
|
"used invalid AT_MAC");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data->reauth &&
|
|
|
|
eap_sim_process_notification_reauth(data, attr)) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Invalid notification "
|
|
|
|
"message after reauth");
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_process_notification(
|
|
|
|
struct eap_sm *sm, struct eap_sim_data *data, u8 id,
|
|
|
|
const struct wpabuf *reqData, struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: subtype Notification");
|
|
|
|
if (data->num_notification > 0) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: too many notification "
|
|
|
|
"rounds (only one allowed)");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
data->num_notification++;
|
|
|
|
if (attr->notification == -1) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: no AT_NOTIFICATION in "
|
|
|
|
"Notification message");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((attr->notification & 0x4000) == 0 &&
|
|
|
|
eap_sim_process_notification_auth(data, reqData, attr)) {
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
eap_sim_report_notification(sm->msg_ctx, attr->notification, 0);
|
|
|
|
if (attr->notification >= 0 && attr->notification < 32768) {
|
|
|
|
eap_sim_state(data, FAILURE);
|
|
|
|
} else if (attr->notification == EAP_SIM_SUCCESS &&
|
|
|
|
data->state == RESULT_SUCCESS)
|
|
|
|
eap_sim_state(data, SUCCESS);
|
|
|
|
return eap_sim_response_notification(data, id, attr->notification);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_process_reauthentication(
|
|
|
|
struct eap_sm *sm, struct eap_sim_data *data, u8 id,
|
|
|
|
const struct wpabuf *reqData, struct eap_sim_attrs *attr)
|
|
|
|
{
|
|
|
|
struct eap_sim_attrs eattr;
|
|
|
|
u8 *decrypted;
|
|
|
|
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: subtype Reauthentication");
|
|
|
|
|
|
|
|
if (data->reauth_id == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Server is trying "
|
|
|
|
"reauthentication, but no reauth_id available");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
data->reauth = 1;
|
|
|
|
if (eap_sim_verify_mac(data->k_aut, reqData, attr->mac, (u8 *) "", 0))
|
|
|
|
{
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Reauthentication "
|
|
|
|
"did not have valid AT_MAC");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (attr->encr_data == NULL || attr->iv == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Reauthentication "
|
|
|
|
"message did not include encrypted data");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
decrypted = eap_sim_parse_encr(data->k_encr, attr->encr_data,
|
|
|
|
attr->encr_data_len, attr->iv, &eattr,
|
|
|
|
0);
|
|
|
|
if (decrypted == NULL) {
|
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to parse encrypted "
|
|
|
|
"data from reauthentication message");
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eattr.nonce_s == NULL || eattr.counter < 0) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: (encr) No%s%s in reauth packet",
|
|
|
|
!eattr.nonce_s ? " AT_NONCE_S" : "",
|
|
|
|
eattr.counter < 0 ? " AT_COUNTER" : "");
|
|
|
|
os_free(decrypted);
|
|
|
|
return eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (eattr.counter < 0 || (size_t) eattr.counter <= data->counter) {
|
2014-05-11 10:54:59 -04:00
|
|
|
struct wpabuf *res;
|
2008-02-27 20:34:43 -05:00
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: (encr) Invalid counter "
|
|
|
|
"(%d <= %d)", eattr.counter, data->counter);
|
|
|
|
data->counter_too_small = eattr.counter;
|
2014-05-11 10:54:59 -04:00
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
/* Reply using Re-auth w/ AT_COUNTER_TOO_SMALL. The current
|
|
|
|
* reauth_id must not be used to start a new reauthentication.
|
|
|
|
* However, since it was used in the last EAP-Response-Identity
|
|
|
|
* packet, it has to saved for the following fullauth to be
|
|
|
|
* used in MK derivation. */
|
|
|
|
os_free(data->last_eap_identity);
|
|
|
|
data->last_eap_identity = data->reauth_id;
|
|
|
|
data->last_eap_identity_len = data->reauth_id_len;
|
|
|
|
data->reauth_id = NULL;
|
|
|
|
data->reauth_id_len = 0;
|
2014-05-11 10:54:59 -04:00
|
|
|
|
|
|
|
res = eap_sim_response_reauth(data, id, 1, eattr.nonce_s);
|
2008-02-27 20:34:43 -05:00
|
|
|
os_free(decrypted);
|
2014-05-11 10:54:59 -04:00
|
|
|
|
|
|
|
return res;
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
data->counter = eattr.counter;
|
|
|
|
|
|
|
|
os_memcpy(data->nonce_s, eattr.nonce_s, EAP_SIM_NONCE_S_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-SIM: (encr) AT_NONCE_S",
|
|
|
|
data->nonce_s, EAP_SIM_NONCE_S_LEN);
|
|
|
|
|
|
|
|
eap_sim_derive_keys_reauth(data->counter,
|
|
|
|
data->reauth_id, data->reauth_id_len,
|
|
|
|
data->nonce_s, data->mk, data->msk,
|
|
|
|
data->emsk);
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_REAUTH_ID | CLEAR_EAP_ID);
|
2012-01-28 12:38:46 -05:00
|
|
|
eap_sim_learn_ids(sm, data, &eattr);
|
2008-02-27 20:34:43 -05:00
|
|
|
|
|
|
|
if (data->result_ind && attr->result_ind)
|
|
|
|
data->use_result_ind = 1;
|
|
|
|
|
2014-06-20 17:25:40 -04:00
|
|
|
if (data->state != FAILURE) {
|
2008-02-27 20:34:43 -05:00
|
|
|
eap_sim_state(data, data->use_result_ind ?
|
|
|
|
RESULT_SUCCESS : SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
data->num_id_req = 0;
|
|
|
|
data->num_notification = 0;
|
|
|
|
if (data->counter > EAP_SIM_MAX_FAST_REAUTHS) {
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Maximum number of "
|
|
|
|
"fast reauths performed - force fullauth");
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data,
|
|
|
|
CLEAR_REAUTH_ID | CLEAR_EAP_ID);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
os_free(decrypted);
|
2012-09-01 17:39:48 -04:00
|
|
|
return eap_sim_response_reauth(data, id, 0, data->nonce_s);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static struct wpabuf * eap_sim_process(struct eap_sm *sm, void *priv,
|
|
|
|
struct eap_method_ret *ret,
|
|
|
|
const struct wpabuf *reqData)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
const struct eap_hdr *req;
|
|
|
|
u8 subtype, id;
|
|
|
|
struct wpabuf *res;
|
|
|
|
const u8 *pos;
|
|
|
|
struct eap_sim_attrs attr;
|
|
|
|
size_t len;
|
|
|
|
|
|
|
|
wpa_hexdump_buf(MSG_DEBUG, "EAP-SIM: EAP data", reqData);
|
|
|
|
if (eap_get_config_identity(sm, &len) == NULL) {
|
|
|
|
wpa_printf(MSG_INFO, "EAP-SIM: Identity not configured");
|
|
|
|
eap_sm_request_identity(sm);
|
|
|
|
ret->ignore = TRUE;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_SIM, reqData, &len);
|
2015-05-03 04:18:31 -04:00
|
|
|
if (pos == NULL || len < 3) {
|
2008-02-27 20:34:43 -05:00
|
|
|
ret->ignore = TRUE;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
req = wpabuf_head(reqData);
|
|
|
|
id = req->identifier;
|
|
|
|
len = be_to_host16(req->length);
|
|
|
|
|
|
|
|
ret->ignore = FALSE;
|
|
|
|
ret->methodState = METHOD_MAY_CONT;
|
|
|
|
ret->decision = DECISION_FAIL;
|
|
|
|
ret->allowNotifications = TRUE;
|
|
|
|
|
|
|
|
subtype = *pos++;
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Subtype=%d", subtype);
|
|
|
|
pos += 2; /* Reserved */
|
|
|
|
|
|
|
|
if (eap_sim_parse_attr(pos, wpabuf_head_u8(reqData) + len, &attr, 0,
|
|
|
|
0)) {
|
|
|
|
res = eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (subtype) {
|
|
|
|
case EAP_SIM_SUBTYPE_START:
|
|
|
|
res = eap_sim_process_start(sm, data, id, &attr);
|
|
|
|
break;
|
|
|
|
case EAP_SIM_SUBTYPE_CHALLENGE:
|
|
|
|
res = eap_sim_process_challenge(sm, data, id, reqData, &attr);
|
|
|
|
break;
|
|
|
|
case EAP_SIM_SUBTYPE_NOTIFICATION:
|
|
|
|
res = eap_sim_process_notification(sm, data, id, reqData,
|
|
|
|
&attr);
|
|
|
|
break;
|
|
|
|
case EAP_SIM_SUBTYPE_REAUTHENTICATION:
|
|
|
|
res = eap_sim_process_reauthentication(sm, data, id, reqData,
|
|
|
|
&attr);
|
|
|
|
break;
|
|
|
|
case EAP_SIM_SUBTYPE_CLIENT_ERROR:
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: subtype Client-Error");
|
|
|
|
res = eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
wpa_printf(MSG_DEBUG, "EAP-SIM: Unknown subtype=%d", subtype);
|
|
|
|
res = eap_sim_client_error(data, id,
|
|
|
|
EAP_SIM_UNABLE_TO_PROCESS_PACKET);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
done:
|
|
|
|
if (data->state == FAILURE) {
|
|
|
|
ret->decision = DECISION_FAIL;
|
|
|
|
ret->methodState = METHOD_DONE;
|
|
|
|
} else if (data->state == SUCCESS) {
|
|
|
|
ret->decision = data->use_result_ind ?
|
|
|
|
DECISION_UNCOND_SUCC : DECISION_COND_SUCC;
|
|
|
|
ret->methodState = data->use_result_ind ?
|
|
|
|
METHOD_DONE : METHOD_MAY_CONT;
|
2014-06-20 17:25:40 -04:00
|
|
|
} else if (data->state == RESULT_SUCCESS)
|
2008-02-27 20:34:43 -05:00
|
|
|
ret->methodState = METHOD_CONT;
|
|
|
|
|
|
|
|
if (ret->methodState == METHOD_DONE) {
|
|
|
|
ret->allowNotifications = FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return res;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static Boolean eap_sim_has_reauth_data(struct eap_sm *sm, void *priv)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
return data->pseudonym || data->reauth_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void eap_sim_deinit_for_reauth(struct eap_sm *sm, void *priv)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
2012-09-02 06:04:18 -04:00
|
|
|
eap_sim_clear_identities(sm, data, CLEAR_EAP_ID);
|
2008-02-27 20:34:43 -05:00
|
|
|
data->use_result_ind = 0;
|
2014-06-29 14:16:30 -04:00
|
|
|
eap_sim_clear_keys(data, 1);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void * eap_sim_init_for_reauth(struct eap_sm *sm, void *priv)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
2010-11-23 18:05:20 -05:00
|
|
|
if (random_get_bytes(data->nonce_mt, EAP_SIM_NONCE_MT_LEN)) {
|
2008-02-27 20:34:43 -05:00
|
|
|
wpa_printf(MSG_WARNING, "EAP-SIM: Failed to get random data "
|
|
|
|
"for NONCE_MT");
|
2015-11-28 12:43:55 -05:00
|
|
|
eap_sim_deinit(sm, data);
|
2008-02-27 20:34:43 -05:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
data->num_id_req = 0;
|
|
|
|
data->num_notification = 0;
|
|
|
|
eap_sim_state(data, CONTINUE);
|
|
|
|
return priv;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static const u8 * eap_sim_get_identity(struct eap_sm *sm, void *priv,
|
|
|
|
size_t *len)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
|
|
|
|
if (data->reauth_id) {
|
|
|
|
*len = data->reauth_id_len;
|
|
|
|
return data->reauth_id;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (data->pseudonym) {
|
|
|
|
*len = data->pseudonym_len;
|
|
|
|
return data->pseudonym;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static Boolean eap_sim_isKeyAvailable(struct eap_sm *sm, void *priv)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
return data->state == SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static u8 * eap_sim_getKey(struct eap_sm *sm, void *priv, size_t *len)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
u8 *key;
|
|
|
|
|
|
|
|
if (data->state != SUCCESS)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
key = os_malloc(EAP_SIM_KEYING_DATA_LEN);
|
|
|
|
if (key == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*len = EAP_SIM_KEYING_DATA_LEN;
|
|
|
|
os_memcpy(key, data->msk, EAP_SIM_KEYING_DATA_LEN);
|
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-08 17:53:54 -05:00
|
|
|
static u8 * eap_sim_get_session_id(struct eap_sm *sm, void *priv, size_t *len)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
u8 *id;
|
|
|
|
|
|
|
|
if (data->state != SUCCESS)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*len = 1 + data->num_chal * GSM_RAND_LEN + EAP_SIM_NONCE_MT_LEN;
|
|
|
|
id = os_malloc(*len);
|
|
|
|
if (id == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
id[0] = EAP_TYPE_SIM;
|
|
|
|
os_memcpy(id + 1, data->rand, data->num_chal * GSM_RAND_LEN);
|
|
|
|
os_memcpy(id + 1 + data->num_chal * GSM_RAND_LEN, data->nonce_mt,
|
|
|
|
EAP_SIM_NONCE_MT_LEN);
|
|
|
|
wpa_hexdump(MSG_DEBUG, "EAP-SIM: Derived Session-Id", id, *len);
|
|
|
|
|
|
|
|
return id;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-02-27 20:34:43 -05:00
|
|
|
static u8 * eap_sim_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
|
|
|
|
{
|
|
|
|
struct eap_sim_data *data = priv;
|
|
|
|
u8 *key;
|
|
|
|
|
|
|
|
if (data->state != SUCCESS)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
key = os_malloc(EAP_EMSK_LEN);
|
|
|
|
if (key == NULL)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
*len = EAP_EMSK_LEN;
|
|
|
|
os_memcpy(key, data->emsk, EAP_EMSK_LEN);
|
|
|
|
|
|
|
|
return key;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int eap_peer_sim_register(void)
|
|
|
|
{
|
|
|
|
struct eap_method *eap;
|
|
|
|
|
|
|
|
eap = eap_peer_method_alloc(EAP_PEER_METHOD_INTERFACE_VERSION,
|
|
|
|
EAP_VENDOR_IETF, EAP_TYPE_SIM, "SIM");
|
|
|
|
if (eap == NULL)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
eap->init = eap_sim_init;
|
|
|
|
eap->deinit = eap_sim_deinit;
|
|
|
|
eap->process = eap_sim_process;
|
|
|
|
eap->isKeyAvailable = eap_sim_isKeyAvailable;
|
|
|
|
eap->getKey = eap_sim_getKey;
|
2013-02-08 17:53:54 -05:00
|
|
|
eap->getSessionId = eap_sim_get_session_id;
|
2008-02-27 20:34:43 -05:00
|
|
|
eap->has_reauth_data = eap_sim_has_reauth_data;
|
|
|
|
eap->deinit_for_reauth = eap_sim_deinit_for_reauth;
|
|
|
|
eap->init_for_reauth = eap_sim_init_for_reauth;
|
|
|
|
eap->get_identity = eap_sim_get_identity;
|
|
|
|
eap->get_emsk = eap_sim_get_emsk;
|
|
|
|
|
2016-01-13 16:25:54 -05:00
|
|
|
return eap_peer_method_register(eap);
|
2008-02-27 20:34:43 -05:00
|
|
|
}
|