/* * WPA Supplicant / EAP-MD5 * Copyright (c) 2004-2005, Jouni Malinen * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License version 2 as * published by the Free Software Foundation. * * Alternatively, this software may be distributed under the terms of BSD * license. * * See README and COPYING for more details. */ #include #include #include "common.h" #include "eap_i.h" #include "wpa_supplicant.h" #include "config_ssid.h" #include "md5.h" #include "crypto.h" static void * eap_md5_init(struct eap_sm *sm) { return (void *) 1; } static void eap_md5_deinit(struct eap_sm *sm, void *priv) { } static u8 * eap_md5_process(struct eap_sm *sm, void *priv, struct eap_method_ret *ret, const u8 *reqData, size_t reqDataLen, size_t *respDataLen) { struct wpa_ssid *config = eap_get_config(sm); const struct eap_hdr *req; struct eap_hdr *resp; const u8 *pos, *challenge; u8 *rpos; int challenge_len; size_t len; const u8 *addr[3]; size_t elen[3]; if (config == NULL || config->password == NULL) { wpa_printf(MSG_INFO, "EAP-MD5: Password not configured"); eap_sm_request_password(sm, config); ret->ignore = TRUE; return NULL; } pos = eap_hdr_validate(EAP_TYPE_MD5, reqData, reqDataLen, &len); if (pos == NULL || len == 0) { wpa_printf(MSG_INFO, "EAP-MD5: Invalid frame (pos=%p len=%lu)", pos, (unsigned long) len); ret->ignore = TRUE; return NULL; } req = (const struct eap_hdr *) reqData; challenge_len = *pos++; if (challenge_len == 0 || challenge_len > len - 1) { wpa_printf(MSG_INFO, "EAP-MD5: Invalid challenge " "(challenge_len=%d len=%lu)", challenge_len, (unsigned long) len); ret->ignore = TRUE; return NULL; } ret->ignore = FALSE; challenge = pos; wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Challenge", challenge, challenge_len); wpa_printf(MSG_DEBUG, "EAP-MD5: generating Challenge Response"); ret->methodState = METHOD_DONE; ret->decision = DECISION_UNCOND_SUCC; ret->allowNotifications = TRUE; *respDataLen = sizeof(struct eap_hdr) + 1 + 1 + MD5_MAC_LEN; resp = malloc(*respDataLen); if (resp == NULL) return NULL; resp->code = EAP_CODE_RESPONSE; resp->identifier = req->identifier; resp->length = host_to_be16(*respDataLen); rpos = (u8 *) (resp + 1); *rpos++ = EAP_TYPE_MD5; *rpos++ = MD5_MAC_LEN; /* Value-Size */ addr[0] = &resp->identifier; elen[0] = 1; addr[1] = config->password; elen[1] = config->password_len; addr[2] = challenge; elen[2] = challenge_len; md5_vector(3, addr, elen, rpos); wpa_hexdump(MSG_MSGDUMP, "EAP-MD5: Response", rpos, MD5_MAC_LEN); return (u8 *) resp; } const struct eap_method eap_method_md5 = { .method = EAP_TYPE_MD5, .name = "MD5", .init = eap_md5_init, .deinit = eap_md5_deinit, .process = eap_md5_process, };