hostapd vendor branch: Update version from 0.6.10 => 2.1
[dragonfly.git] / contrib / hostapd / src / eap_peer / mschapv2.c
1 /*
2  * MSCHAPV2 (RFC 2759)
3  * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi>
4  *
5  * This software may be distributed under the terms of the BSD license.
6  * See README for more details.
7  */
8
9 #include "includes.h"
10
11 #include "common.h"
12 #include "crypto/ms_funcs.h"
13 #include "mschapv2.h"
14
15 const u8 * mschapv2_remove_domain(const u8 *username, size_t *len)
16 {
17         size_t i;
18
19         /*
20          * MSCHAPv2 does not include optional domain name in the
21          * challenge-response calculation, so remove domain prefix
22          * (if present).
23          */
24
25         for (i = 0; i < *len; i++) {
26                 if (username[i] == '\\') {
27                         *len -= i + 1;
28                         return username + i + 1;
29                 }
30         }
31
32         return username;
33 }
34
35
36 int mschapv2_derive_response(const u8 *identity, size_t identity_len,
37                              const u8 *password, size_t password_len,
38                              int pwhash,
39                              const u8 *auth_challenge,
40                              const u8 *peer_challenge,
41                              u8 *nt_response, u8 *auth_response,
42                              u8 *master_key)
43 {
44         const u8 *username;
45         size_t username_len;
46         u8 password_hash[16], password_hash_hash[16];
47
48         wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity",
49                           identity, identity_len);
50         username_len = identity_len;
51         username = mschapv2_remove_domain(identity, &username_len);
52         wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username",
53                           username, username_len);
54
55         wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge",
56                     auth_challenge, MSCHAPV2_CHAL_LEN);
57         wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge",
58                     peer_challenge, MSCHAPV2_CHAL_LEN);
59         wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username",
60                           username, username_len);
61         /* Authenticator response is not really needed yet, but calculate it
62          * here so that challenges need not be saved. */
63         if (pwhash) {
64                 wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash",
65                                 password, password_len);
66                 if (generate_nt_response_pwhash(auth_challenge, peer_challenge,
67                                                 username, username_len,
68                                                 password, nt_response) ||
69                     generate_authenticator_response_pwhash(
70                             password, peer_challenge, auth_challenge,
71                             username, username_len, nt_response,
72                             auth_response))
73                         return -1;
74         } else {
75                 wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password",
76                                       password, password_len);
77                 if (generate_nt_response(auth_challenge, peer_challenge,
78                                          username, username_len,
79                                          password, password_len,
80                                          nt_response) ||
81                     generate_authenticator_response(password, password_len,
82                                                     peer_challenge,
83                                                     auth_challenge,
84                                                     username, username_len,
85                                                     nt_response,
86                                                     auth_response))
87                         return -1;
88         }
89         wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response",
90                     nt_response, MSCHAPV2_NT_RESPONSE_LEN);
91         wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response",
92                     auth_response, MSCHAPV2_AUTH_RESPONSE_LEN);
93
94         /* Generate master_key here since we have the needed data available. */
95         if (pwhash) {
96                 if (hash_nt_password_hash(password, password_hash_hash))
97                         return -1;
98         } else {
99                 if (nt_password_hash(password, password_len, password_hash) ||
100                     hash_nt_password_hash(password_hash, password_hash_hash))
101                         return -1;
102         }
103         if (get_master_key(password_hash_hash, nt_response, master_key))
104                 return -1;
105         wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key",
106                         master_key, MSCHAPV2_MASTER_KEY_LEN);
107
108         return 0;
109 }
110
111
112 int mschapv2_verify_auth_response(const u8 *auth_response,
113                                   const u8 *buf, size_t buf_len)
114 {
115         u8 recv_response[MSCHAPV2_AUTH_RESPONSE_LEN];
116         if (buf_len < 2 + 2 * MSCHAPV2_AUTH_RESPONSE_LEN ||
117             buf[0] != 'S' || buf[1] != '=' ||
118             hexstr2bin((char *) (buf + 2), recv_response,
119                        MSCHAPV2_AUTH_RESPONSE_LEN) ||
120             os_memcmp(auth_response, recv_response,
121                       MSCHAPV2_AUTH_RESPONSE_LEN) != 0)
122                 return -1;
123         return 0;
124 }