radius.c 39 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650
  1. /*
  2. * RADIUS message processing
  3. * Copyright (c) 2002-2009, 2011-2014, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "utils/includes.h"
  9. #include "utils/common.h"
  10. #include "utils/wpabuf.h"
  11. #include "crypto/md5.h"
  12. #include "crypto/crypto.h"
  13. #include "radius.h"
  14. /**
  15. * struct radius_msg - RADIUS message structure for new and parsed messages
  16. */
  17. struct radius_msg {
  18. /**
  19. * buf - Allocated buffer for RADIUS message
  20. */
  21. struct wpabuf *buf;
  22. /**
  23. * hdr - Pointer to the RADIUS header in buf
  24. */
  25. struct radius_hdr *hdr;
  26. /**
  27. * attr_pos - Array of indexes to attributes
  28. *
  29. * The values are number of bytes from buf to the beginning of
  30. * struct radius_attr_hdr.
  31. */
  32. size_t *attr_pos;
  33. /**
  34. * attr_size - Total size of the attribute pointer array
  35. */
  36. size_t attr_size;
  37. /**
  38. * attr_used - Total number of attributes in the array
  39. */
  40. size_t attr_used;
  41. };
  42. struct radius_hdr * radius_msg_get_hdr(struct radius_msg *msg)
  43. {
  44. return msg->hdr;
  45. }
  46. struct wpabuf * radius_msg_get_buf(struct radius_msg *msg)
  47. {
  48. return msg->buf;
  49. }
  50. static struct radius_attr_hdr *
  51. radius_get_attr_hdr(struct radius_msg *msg, int idx)
  52. {
  53. return (struct radius_attr_hdr *)
  54. (wpabuf_mhead_u8(msg->buf) + msg->attr_pos[idx]);
  55. }
  56. static void radius_msg_set_hdr(struct radius_msg *msg, u8 code, u8 identifier)
  57. {
  58. msg->hdr->code = code;
  59. msg->hdr->identifier = identifier;
  60. }
  61. static int radius_msg_initialize(struct radius_msg *msg)
  62. {
  63. msg->attr_pos = os_calloc(RADIUS_DEFAULT_ATTR_COUNT,
  64. sizeof(*msg->attr_pos));
  65. if (msg->attr_pos == NULL)
  66. return -1;
  67. msg->attr_size = RADIUS_DEFAULT_ATTR_COUNT;
  68. msg->attr_used = 0;
  69. return 0;
  70. }
  71. /**
  72. * radius_msg_new - Create a new RADIUS message
  73. * @code: Code for RADIUS header
  74. * @identifier: Identifier for RADIUS header
  75. * Returns: Context for RADIUS message or %NULL on failure
  76. *
  77. * The caller is responsible for freeing the returned data with
  78. * radius_msg_free().
  79. */
  80. struct radius_msg * radius_msg_new(u8 code, u8 identifier)
  81. {
  82. struct radius_msg *msg;
  83. msg = os_zalloc(sizeof(*msg));
  84. if (msg == NULL)
  85. return NULL;
  86. msg->buf = wpabuf_alloc(RADIUS_DEFAULT_MSG_SIZE);
  87. if (msg->buf == NULL || radius_msg_initialize(msg)) {
  88. radius_msg_free(msg);
  89. return NULL;
  90. }
  91. msg->hdr = wpabuf_put(msg->buf, sizeof(struct radius_hdr));
  92. radius_msg_set_hdr(msg, code, identifier);
  93. return msg;
  94. }
  95. /**
  96. * radius_msg_free - Free a RADIUS message
  97. * @msg: RADIUS message from radius_msg_new() or radius_msg_parse()
  98. */
  99. void radius_msg_free(struct radius_msg *msg)
  100. {
  101. if (msg == NULL)
  102. return;
  103. wpabuf_free(msg->buf);
  104. os_free(msg->attr_pos);
  105. os_free(msg);
  106. }
  107. static const char *radius_code_string(u8 code)
  108. {
  109. switch (code) {
  110. case RADIUS_CODE_ACCESS_REQUEST: return "Access-Request";
  111. case RADIUS_CODE_ACCESS_ACCEPT: return "Access-Accept";
  112. case RADIUS_CODE_ACCESS_REJECT: return "Access-Reject";
  113. case RADIUS_CODE_ACCOUNTING_REQUEST: return "Accounting-Request";
  114. case RADIUS_CODE_ACCOUNTING_RESPONSE: return "Accounting-Response";
  115. case RADIUS_CODE_ACCESS_CHALLENGE: return "Access-Challenge";
  116. case RADIUS_CODE_STATUS_SERVER: return "Status-Server";
  117. case RADIUS_CODE_STATUS_CLIENT: return "Status-Client";
  118. case RADIUS_CODE_RESERVED: return "Reserved";
  119. case RADIUS_CODE_DISCONNECT_REQUEST: return "Disconnect-Request";
  120. case RADIUS_CODE_DISCONNECT_ACK: return "Disconnect-ACK";
  121. case RADIUS_CODE_DISCONNECT_NAK: return "Disconnect-NAK";
  122. case RADIUS_CODE_COA_REQUEST: return "CoA-Request";
  123. case RADIUS_CODE_COA_ACK: return "CoA-ACK";
  124. case RADIUS_CODE_COA_NAK: return "CoA-NAK";
  125. default: return "?Unknown?";
  126. }
  127. }
  128. struct radius_attr_type {
  129. u8 type;
  130. char *name;
  131. enum {
  132. RADIUS_ATTR_UNDIST, RADIUS_ATTR_TEXT, RADIUS_ATTR_IP,
  133. RADIUS_ATTR_HEXDUMP, RADIUS_ATTR_INT32, RADIUS_ATTR_IPV6
  134. } data_type;
  135. };
  136. static struct radius_attr_type radius_attrs[] =
  137. {
  138. { RADIUS_ATTR_USER_NAME, "User-Name", RADIUS_ATTR_TEXT },
  139. { RADIUS_ATTR_USER_PASSWORD, "User-Password", RADIUS_ATTR_UNDIST },
  140. { RADIUS_ATTR_NAS_IP_ADDRESS, "NAS-IP-Address", RADIUS_ATTR_IP },
  141. { RADIUS_ATTR_NAS_PORT, "NAS-Port", RADIUS_ATTR_INT32 },
  142. { RADIUS_ATTR_FRAMED_MTU, "Framed-MTU", RADIUS_ATTR_INT32 },
  143. { RADIUS_ATTR_REPLY_MESSAGE, "Reply-Message", RADIUS_ATTR_TEXT },
  144. { RADIUS_ATTR_STATE, "State", RADIUS_ATTR_UNDIST },
  145. { RADIUS_ATTR_CLASS, "Class", RADIUS_ATTR_UNDIST },
  146. { RADIUS_ATTR_VENDOR_SPECIFIC, "Vendor-Specific", RADIUS_ATTR_UNDIST },
  147. { RADIUS_ATTR_SESSION_TIMEOUT, "Session-Timeout", RADIUS_ATTR_INT32 },
  148. { RADIUS_ATTR_IDLE_TIMEOUT, "Idle-Timeout", RADIUS_ATTR_INT32 },
  149. { RADIUS_ATTR_TERMINATION_ACTION, "Termination-Action",
  150. RADIUS_ATTR_INT32 },
  151. { RADIUS_ATTR_CALLED_STATION_ID, "Called-Station-Id",
  152. RADIUS_ATTR_TEXT },
  153. { RADIUS_ATTR_CALLING_STATION_ID, "Calling-Station-Id",
  154. RADIUS_ATTR_TEXT },
  155. { RADIUS_ATTR_NAS_IDENTIFIER, "NAS-Identifier", RADIUS_ATTR_TEXT },
  156. { RADIUS_ATTR_PROXY_STATE, "Proxy-State", RADIUS_ATTR_UNDIST },
  157. { RADIUS_ATTR_ACCT_STATUS_TYPE, "Acct-Status-Type",
  158. RADIUS_ATTR_INT32 },
  159. { RADIUS_ATTR_ACCT_DELAY_TIME, "Acct-Delay-Time", RADIUS_ATTR_INT32 },
  160. { RADIUS_ATTR_ACCT_INPUT_OCTETS, "Acct-Input-Octets",
  161. RADIUS_ATTR_INT32 },
  162. { RADIUS_ATTR_ACCT_OUTPUT_OCTETS, "Acct-Output-Octets",
  163. RADIUS_ATTR_INT32 },
  164. { RADIUS_ATTR_ACCT_SESSION_ID, "Acct-Session-Id", RADIUS_ATTR_TEXT },
  165. { RADIUS_ATTR_ACCT_AUTHENTIC, "Acct-Authentic", RADIUS_ATTR_INT32 },
  166. { RADIUS_ATTR_ACCT_SESSION_TIME, "Acct-Session-Time",
  167. RADIUS_ATTR_INT32 },
  168. { RADIUS_ATTR_ACCT_INPUT_PACKETS, "Acct-Input-Packets",
  169. RADIUS_ATTR_INT32 },
  170. { RADIUS_ATTR_ACCT_OUTPUT_PACKETS, "Acct-Output-Packets",
  171. RADIUS_ATTR_INT32 },
  172. { RADIUS_ATTR_ACCT_TERMINATE_CAUSE, "Acct-Terminate-Cause",
  173. RADIUS_ATTR_INT32 },
  174. { RADIUS_ATTR_ACCT_MULTI_SESSION_ID, "Acct-Multi-Session-Id",
  175. RADIUS_ATTR_TEXT },
  176. { RADIUS_ATTR_ACCT_LINK_COUNT, "Acct-Link-Count", RADIUS_ATTR_INT32 },
  177. { RADIUS_ATTR_ACCT_INPUT_GIGAWORDS, "Acct-Input-Gigawords",
  178. RADIUS_ATTR_INT32 },
  179. { RADIUS_ATTR_ACCT_OUTPUT_GIGAWORDS, "Acct-Output-Gigawords",
  180. RADIUS_ATTR_INT32 },
  181. { RADIUS_ATTR_EVENT_TIMESTAMP, "Event-Timestamp",
  182. RADIUS_ATTR_INT32 },
  183. { RADIUS_ATTR_NAS_PORT_TYPE, "NAS-Port-Type", RADIUS_ATTR_INT32 },
  184. { RADIUS_ATTR_TUNNEL_TYPE, "Tunnel-Type", RADIUS_ATTR_HEXDUMP },
  185. { RADIUS_ATTR_TUNNEL_MEDIUM_TYPE, "Tunnel-Medium-Type",
  186. RADIUS_ATTR_HEXDUMP },
  187. { RADIUS_ATTR_TUNNEL_PASSWORD, "Tunnel-Password",
  188. RADIUS_ATTR_UNDIST },
  189. { RADIUS_ATTR_CONNECT_INFO, "Connect-Info", RADIUS_ATTR_TEXT },
  190. { RADIUS_ATTR_EAP_MESSAGE, "EAP-Message", RADIUS_ATTR_UNDIST },
  191. { RADIUS_ATTR_MESSAGE_AUTHENTICATOR, "Message-Authenticator",
  192. RADIUS_ATTR_UNDIST },
  193. { RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID, "Tunnel-Private-Group-Id",
  194. RADIUS_ATTR_HEXDUMP },
  195. { RADIUS_ATTR_ACCT_INTERIM_INTERVAL, "Acct-Interim-Interval",
  196. RADIUS_ATTR_INT32 },
  197. { RADIUS_ATTR_CHARGEABLE_USER_IDENTITY, "Chargeable-User-Identity",
  198. RADIUS_ATTR_TEXT },
  199. { RADIUS_ATTR_NAS_IPV6_ADDRESS, "NAS-IPv6-Address", RADIUS_ATTR_IPV6 },
  200. { RADIUS_ATTR_ERROR_CAUSE, "Error-Cause", RADIUS_ATTR_INT32 },
  201. { RADIUS_ATTR_EAP_KEY_NAME, "EAP-Key-Name", RADIUS_ATTR_HEXDUMP },
  202. { RADIUS_ATTR_MOBILITY_DOMAIN_ID, "Mobility-Domain-Id",
  203. RADIUS_ATTR_INT32 },
  204. { RADIUS_ATTR_WLAN_HESSID, "WLAN-HESSID", RADIUS_ATTR_TEXT },
  205. { RADIUS_ATTR_WLAN_PAIRWISE_CIPHER, "WLAN-Pairwise-Cipher",
  206. RADIUS_ATTR_HEXDUMP },
  207. { RADIUS_ATTR_WLAN_GROUP_CIPHER, "WLAN-Group-Cipher",
  208. RADIUS_ATTR_HEXDUMP },
  209. { RADIUS_ATTR_WLAN_AKM_SUITE, "WLAN-AKM-Suite",
  210. RADIUS_ATTR_HEXDUMP },
  211. { RADIUS_ATTR_WLAN_GROUP_MGMT_CIPHER, "WLAN-Group-Mgmt-Pairwise-Cipher",
  212. RADIUS_ATTR_HEXDUMP },
  213. };
  214. #define RADIUS_ATTRS ARRAY_SIZE(radius_attrs)
  215. static struct radius_attr_type *radius_get_attr_type(u8 type)
  216. {
  217. size_t i;
  218. for (i = 0; i < RADIUS_ATTRS; i++) {
  219. if (type == radius_attrs[i].type)
  220. return &radius_attrs[i];
  221. }
  222. return NULL;
  223. }
  224. static void radius_msg_dump_attr(struct radius_attr_hdr *hdr)
  225. {
  226. struct radius_attr_type *attr;
  227. int len;
  228. unsigned char *pos;
  229. char buf[1000];
  230. attr = radius_get_attr_type(hdr->type);
  231. wpa_printf(MSG_INFO, " Attribute %d (%s) length=%d",
  232. hdr->type, attr ? attr->name : "?Unknown?", hdr->length);
  233. if (attr == NULL || hdr->length < sizeof(struct radius_attr_hdr))
  234. return;
  235. len = hdr->length - sizeof(struct radius_attr_hdr);
  236. pos = (unsigned char *) (hdr + 1);
  237. switch (attr->data_type) {
  238. case RADIUS_ATTR_TEXT:
  239. printf_encode(buf, sizeof(buf), pos, len);
  240. wpa_printf(MSG_INFO, " Value: '%s'", buf);
  241. break;
  242. case RADIUS_ATTR_IP:
  243. if (len == 4) {
  244. struct in_addr addr;
  245. os_memcpy(&addr, pos, 4);
  246. wpa_printf(MSG_INFO, " Value: %s",
  247. inet_ntoa(addr));
  248. } else {
  249. wpa_printf(MSG_INFO, " Invalid IP address length %d",
  250. len);
  251. }
  252. break;
  253. #ifdef CONFIG_IPV6
  254. case RADIUS_ATTR_IPV6:
  255. if (len == 16) {
  256. const char *atxt;
  257. struct in6_addr *addr = (struct in6_addr *) pos;
  258. atxt = inet_ntop(AF_INET6, addr, buf, sizeof(buf));
  259. wpa_printf(MSG_INFO, " Value: %s",
  260. atxt ? atxt : "?");
  261. } else {
  262. wpa_printf(MSG_INFO, " Invalid IPv6 address length %d",
  263. len);
  264. }
  265. break;
  266. #endif /* CONFIG_IPV6 */
  267. case RADIUS_ATTR_HEXDUMP:
  268. case RADIUS_ATTR_UNDIST:
  269. wpa_snprintf_hex(buf, sizeof(buf), pos, len);
  270. wpa_printf(MSG_INFO, " Value: %s", buf);
  271. break;
  272. case RADIUS_ATTR_INT32:
  273. if (len == 4)
  274. wpa_printf(MSG_INFO, " Value: %u",
  275. WPA_GET_BE32(pos));
  276. else
  277. wpa_printf(MSG_INFO, " Invalid INT32 length %d",
  278. len);
  279. break;
  280. default:
  281. break;
  282. }
  283. }
  284. void radius_msg_dump(struct radius_msg *msg)
  285. {
  286. size_t i;
  287. wpa_printf(MSG_INFO, "RADIUS message: code=%d (%s) identifier=%d length=%d",
  288. msg->hdr->code, radius_code_string(msg->hdr->code),
  289. msg->hdr->identifier, be_to_host16(msg->hdr->length));
  290. for (i = 0; i < msg->attr_used; i++) {
  291. struct radius_attr_hdr *attr = radius_get_attr_hdr(msg, i);
  292. radius_msg_dump_attr(attr);
  293. }
  294. }
  295. int radius_msg_finish(struct radius_msg *msg, const u8 *secret,
  296. size_t secret_len)
  297. {
  298. if (secret) {
  299. u8 auth[MD5_MAC_LEN];
  300. struct radius_attr_hdr *attr;
  301. os_memset(auth, 0, MD5_MAC_LEN);
  302. attr = radius_msg_add_attr(msg,
  303. RADIUS_ATTR_MESSAGE_AUTHENTICATOR,
  304. auth, MD5_MAC_LEN);
  305. if (attr == NULL) {
  306. wpa_printf(MSG_WARNING, "RADIUS: Could not add "
  307. "Message-Authenticator");
  308. return -1;
  309. }
  310. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  311. hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
  312. wpabuf_len(msg->buf), (u8 *) (attr + 1));
  313. } else
  314. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  315. if (wpabuf_len(msg->buf) > 0xffff) {
  316. wpa_printf(MSG_WARNING, "RADIUS: Too long message (%lu)",
  317. (unsigned long) wpabuf_len(msg->buf));
  318. return -1;
  319. }
  320. return 0;
  321. }
  322. int radius_msg_finish_srv(struct radius_msg *msg, const u8 *secret,
  323. size_t secret_len, const u8 *req_authenticator)
  324. {
  325. u8 auth[MD5_MAC_LEN];
  326. struct radius_attr_hdr *attr;
  327. const u8 *addr[4];
  328. size_t len[4];
  329. os_memset(auth, 0, MD5_MAC_LEN);
  330. attr = radius_msg_add_attr(msg, RADIUS_ATTR_MESSAGE_AUTHENTICATOR,
  331. auth, MD5_MAC_LEN);
  332. if (attr == NULL) {
  333. wpa_printf(MSG_ERROR, "WARNING: Could not add Message-Authenticator");
  334. return -1;
  335. }
  336. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  337. os_memcpy(msg->hdr->authenticator, req_authenticator,
  338. sizeof(msg->hdr->authenticator));
  339. hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
  340. wpabuf_len(msg->buf), (u8 *) (attr + 1));
  341. /* ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) */
  342. addr[0] = (u8 *) msg->hdr;
  343. len[0] = 1 + 1 + 2;
  344. addr[1] = req_authenticator;
  345. len[1] = MD5_MAC_LEN;
  346. addr[2] = wpabuf_head_u8(msg->buf) + sizeof(struct radius_hdr);
  347. len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
  348. addr[3] = secret;
  349. len[3] = secret_len;
  350. md5_vector(4, addr, len, msg->hdr->authenticator);
  351. if (wpabuf_len(msg->buf) > 0xffff) {
  352. wpa_printf(MSG_WARNING, "RADIUS: Too long message (%lu)",
  353. (unsigned long) wpabuf_len(msg->buf));
  354. return -1;
  355. }
  356. return 0;
  357. }
  358. int radius_msg_finish_das_resp(struct radius_msg *msg, const u8 *secret,
  359. size_t secret_len,
  360. const struct radius_hdr *req_hdr)
  361. {
  362. const u8 *addr[2];
  363. size_t len[2];
  364. u8 auth[MD5_MAC_LEN];
  365. struct radius_attr_hdr *attr;
  366. os_memset(auth, 0, MD5_MAC_LEN);
  367. attr = radius_msg_add_attr(msg, RADIUS_ATTR_MESSAGE_AUTHENTICATOR,
  368. auth, MD5_MAC_LEN);
  369. if (attr == NULL) {
  370. wpa_printf(MSG_WARNING, "Could not add Message-Authenticator");
  371. return -1;
  372. }
  373. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  374. os_memcpy(msg->hdr->authenticator, req_hdr->authenticator, 16);
  375. hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
  376. wpabuf_len(msg->buf), (u8 *) (attr + 1));
  377. /* ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) */
  378. addr[0] = wpabuf_head_u8(msg->buf);
  379. len[0] = wpabuf_len(msg->buf);
  380. addr[1] = secret;
  381. len[1] = secret_len;
  382. if (md5_vector(2, addr, len, msg->hdr->authenticator) < 0)
  383. return -1;
  384. if (wpabuf_len(msg->buf) > 0xffff) {
  385. wpa_printf(MSG_WARNING, "RADIUS: Too long message (%lu)",
  386. (unsigned long) wpabuf_len(msg->buf));
  387. return -1;
  388. }
  389. return 0;
  390. }
  391. void radius_msg_finish_acct(struct radius_msg *msg, const u8 *secret,
  392. size_t secret_len)
  393. {
  394. const u8 *addr[2];
  395. size_t len[2];
  396. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  397. os_memset(msg->hdr->authenticator, 0, MD5_MAC_LEN);
  398. addr[0] = wpabuf_head(msg->buf);
  399. len[0] = wpabuf_len(msg->buf);
  400. addr[1] = secret;
  401. len[1] = secret_len;
  402. md5_vector(2, addr, len, msg->hdr->authenticator);
  403. if (wpabuf_len(msg->buf) > 0xffff) {
  404. wpa_printf(MSG_WARNING, "RADIUS: Too long messages (%lu)",
  405. (unsigned long) wpabuf_len(msg->buf));
  406. }
  407. }
  408. void radius_msg_finish_acct_resp(struct radius_msg *msg, const u8 *secret,
  409. size_t secret_len, const u8 *req_authenticator)
  410. {
  411. const u8 *addr[2];
  412. size_t len[2];
  413. msg->hdr->length = host_to_be16(wpabuf_len(msg->buf));
  414. os_memcpy(msg->hdr->authenticator, req_authenticator, MD5_MAC_LEN);
  415. addr[0] = wpabuf_head(msg->buf);
  416. len[0] = wpabuf_len(msg->buf);
  417. addr[1] = secret;
  418. len[1] = secret_len;
  419. md5_vector(2, addr, len, msg->hdr->authenticator);
  420. if (wpabuf_len(msg->buf) > 0xffff) {
  421. wpa_printf(MSG_WARNING, "RADIUS: Too long messages (%lu)",
  422. (unsigned long) wpabuf_len(msg->buf));
  423. }
  424. }
  425. int radius_msg_verify_acct_req(struct radius_msg *msg, const u8 *secret,
  426. size_t secret_len)
  427. {
  428. const u8 *addr[4];
  429. size_t len[4];
  430. u8 zero[MD5_MAC_LEN];
  431. u8 hash[MD5_MAC_LEN];
  432. os_memset(zero, 0, sizeof(zero));
  433. addr[0] = (u8 *) msg->hdr;
  434. len[0] = sizeof(struct radius_hdr) - MD5_MAC_LEN;
  435. addr[1] = zero;
  436. len[1] = MD5_MAC_LEN;
  437. addr[2] = (u8 *) (msg->hdr + 1);
  438. len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
  439. addr[3] = secret;
  440. len[3] = secret_len;
  441. md5_vector(4, addr, len, hash);
  442. return os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0;
  443. }
  444. int radius_msg_verify_das_req(struct radius_msg *msg, const u8 *secret,
  445. size_t secret_len)
  446. {
  447. const u8 *addr[4];
  448. size_t len[4];
  449. u8 zero[MD5_MAC_LEN];
  450. u8 hash[MD5_MAC_LEN];
  451. u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN];
  452. u8 orig_authenticator[16];
  453. struct radius_attr_hdr *attr = NULL, *tmp;
  454. size_t i;
  455. os_memset(zero, 0, sizeof(zero));
  456. addr[0] = (u8 *) msg->hdr;
  457. len[0] = sizeof(struct radius_hdr) - MD5_MAC_LEN;
  458. addr[1] = zero;
  459. len[1] = MD5_MAC_LEN;
  460. addr[2] = (u8 *) (msg->hdr + 1);
  461. len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
  462. addr[3] = secret;
  463. len[3] = secret_len;
  464. md5_vector(4, addr, len, hash);
  465. if (os_memcmp_const(msg->hdr->authenticator, hash, MD5_MAC_LEN) != 0)
  466. return 1;
  467. for (i = 0; i < msg->attr_used; i++) {
  468. tmp = radius_get_attr_hdr(msg, i);
  469. if (tmp->type == RADIUS_ATTR_MESSAGE_AUTHENTICATOR) {
  470. if (attr != NULL) {
  471. wpa_printf(MSG_WARNING, "Multiple "
  472. "Message-Authenticator attributes "
  473. "in RADIUS message");
  474. return 1;
  475. }
  476. attr = tmp;
  477. }
  478. }
  479. if (attr == NULL) {
  480. /* Message-Authenticator is MAY; not required */
  481. return 0;
  482. }
  483. os_memcpy(orig, attr + 1, MD5_MAC_LEN);
  484. os_memset(attr + 1, 0, MD5_MAC_LEN);
  485. os_memcpy(orig_authenticator, msg->hdr->authenticator,
  486. sizeof(orig_authenticator));
  487. os_memset(msg->hdr->authenticator, 0,
  488. sizeof(msg->hdr->authenticator));
  489. hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
  490. wpabuf_len(msg->buf), auth);
  491. os_memcpy(attr + 1, orig, MD5_MAC_LEN);
  492. os_memcpy(msg->hdr->authenticator, orig_authenticator,
  493. sizeof(orig_authenticator));
  494. return os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0;
  495. }
  496. static int radius_msg_add_attr_to_array(struct radius_msg *msg,
  497. struct radius_attr_hdr *attr)
  498. {
  499. if (msg->attr_used >= msg->attr_size) {
  500. size_t *nattr_pos;
  501. int nlen = msg->attr_size * 2;
  502. nattr_pos = os_realloc_array(msg->attr_pos, nlen,
  503. sizeof(*msg->attr_pos));
  504. if (nattr_pos == NULL)
  505. return -1;
  506. msg->attr_pos = nattr_pos;
  507. msg->attr_size = nlen;
  508. }
  509. msg->attr_pos[msg->attr_used++] =
  510. (unsigned char *) attr - wpabuf_head_u8(msg->buf);
  511. return 0;
  512. }
  513. struct radius_attr_hdr *radius_msg_add_attr(struct radius_msg *msg, u8 type,
  514. const u8 *data, size_t data_len)
  515. {
  516. size_t buf_needed;
  517. struct radius_attr_hdr *attr;
  518. if (data_len > RADIUS_MAX_ATTR_LEN) {
  519. wpa_printf(MSG_ERROR, "radius_msg_add_attr: too long attribute (%lu bytes)",
  520. (unsigned long) data_len);
  521. return NULL;
  522. }
  523. buf_needed = sizeof(*attr) + data_len;
  524. if (wpabuf_tailroom(msg->buf) < buf_needed) {
  525. /* allocate more space for message buffer */
  526. if (wpabuf_resize(&msg->buf, buf_needed) < 0)
  527. return NULL;
  528. msg->hdr = wpabuf_mhead(msg->buf);
  529. }
  530. attr = wpabuf_put(msg->buf, sizeof(struct radius_attr_hdr));
  531. attr->type = type;
  532. attr->length = sizeof(*attr) + data_len;
  533. wpabuf_put_data(msg->buf, data, data_len);
  534. if (radius_msg_add_attr_to_array(msg, attr))
  535. return NULL;
  536. return attr;
  537. }
  538. /**
  539. * radius_msg_parse - Parse a RADIUS message
  540. * @data: RADIUS message to be parsed
  541. * @len: Length of data buffer in octets
  542. * Returns: Parsed RADIUS message or %NULL on failure
  543. *
  544. * This parses a RADIUS message and makes a copy of its data. The caller is
  545. * responsible for freeing the returned data with radius_msg_free().
  546. */
  547. struct radius_msg * radius_msg_parse(const u8 *data, size_t len)
  548. {
  549. struct radius_msg *msg;
  550. struct radius_hdr *hdr;
  551. struct radius_attr_hdr *attr;
  552. size_t msg_len;
  553. unsigned char *pos, *end;
  554. if (data == NULL || len < sizeof(*hdr))
  555. return NULL;
  556. hdr = (struct radius_hdr *) data;
  557. msg_len = be_to_host16(hdr->length);
  558. if (msg_len < sizeof(*hdr) || msg_len > len) {
  559. wpa_printf(MSG_INFO, "RADIUS: Invalid message length");
  560. return NULL;
  561. }
  562. if (msg_len < len) {
  563. wpa_printf(MSG_DEBUG, "RADIUS: Ignored %lu extra bytes after "
  564. "RADIUS message", (unsigned long) len - msg_len);
  565. }
  566. msg = os_zalloc(sizeof(*msg));
  567. if (msg == NULL)
  568. return NULL;
  569. msg->buf = wpabuf_alloc_copy(data, msg_len);
  570. if (msg->buf == NULL || radius_msg_initialize(msg)) {
  571. radius_msg_free(msg);
  572. return NULL;
  573. }
  574. msg->hdr = wpabuf_mhead(msg->buf);
  575. /* parse attributes */
  576. pos = wpabuf_mhead_u8(msg->buf) + sizeof(struct radius_hdr);
  577. end = wpabuf_mhead_u8(msg->buf) + wpabuf_len(msg->buf);
  578. while (pos < end) {
  579. if ((size_t) (end - pos) < sizeof(*attr))
  580. goto fail;
  581. attr = (struct radius_attr_hdr *) pos;
  582. if (pos + attr->length > end || attr->length < sizeof(*attr))
  583. goto fail;
  584. /* TODO: check that attr->length is suitable for attr->type */
  585. if (radius_msg_add_attr_to_array(msg, attr))
  586. goto fail;
  587. pos += attr->length;
  588. }
  589. return msg;
  590. fail:
  591. radius_msg_free(msg);
  592. return NULL;
  593. }
  594. int radius_msg_add_eap(struct radius_msg *msg, const u8 *data, size_t data_len)
  595. {
  596. const u8 *pos = data;
  597. size_t left = data_len;
  598. while (left > 0) {
  599. int len;
  600. if (left > RADIUS_MAX_ATTR_LEN)
  601. len = RADIUS_MAX_ATTR_LEN;
  602. else
  603. len = left;
  604. if (!radius_msg_add_attr(msg, RADIUS_ATTR_EAP_MESSAGE,
  605. pos, len))
  606. return 0;
  607. pos += len;
  608. left -= len;
  609. }
  610. return 1;
  611. }
  612. struct wpabuf * radius_msg_get_eap(struct radius_msg *msg)
  613. {
  614. struct wpabuf *eap;
  615. size_t len, i;
  616. struct radius_attr_hdr *attr;
  617. if (msg == NULL)
  618. return NULL;
  619. len = 0;
  620. for (i = 0; i < msg->attr_used; i++) {
  621. attr = radius_get_attr_hdr(msg, i);
  622. if (attr->type == RADIUS_ATTR_EAP_MESSAGE &&
  623. attr->length > sizeof(struct radius_attr_hdr))
  624. len += attr->length - sizeof(struct radius_attr_hdr);
  625. }
  626. if (len == 0)
  627. return NULL;
  628. eap = wpabuf_alloc(len);
  629. if (eap == NULL)
  630. return NULL;
  631. for (i = 0; i < msg->attr_used; i++) {
  632. attr = radius_get_attr_hdr(msg, i);
  633. if (attr->type == RADIUS_ATTR_EAP_MESSAGE &&
  634. attr->length > sizeof(struct radius_attr_hdr)) {
  635. int flen = attr->length - sizeof(*attr);
  636. wpabuf_put_data(eap, attr + 1, flen);
  637. }
  638. }
  639. return eap;
  640. }
  641. int radius_msg_verify_msg_auth(struct radius_msg *msg, const u8 *secret,
  642. size_t secret_len, const u8 *req_auth)
  643. {
  644. u8 auth[MD5_MAC_LEN], orig[MD5_MAC_LEN];
  645. u8 orig_authenticator[16];
  646. struct radius_attr_hdr *attr = NULL, *tmp;
  647. size_t i;
  648. for (i = 0; i < msg->attr_used; i++) {
  649. tmp = radius_get_attr_hdr(msg, i);
  650. if (tmp->type == RADIUS_ATTR_MESSAGE_AUTHENTICATOR) {
  651. if (attr != NULL) {
  652. wpa_printf(MSG_INFO, "Multiple Message-Authenticator attributes in RADIUS message");
  653. return 1;
  654. }
  655. attr = tmp;
  656. }
  657. }
  658. if (attr == NULL) {
  659. wpa_printf(MSG_INFO, "No Message-Authenticator attribute found");
  660. return 1;
  661. }
  662. os_memcpy(orig, attr + 1, MD5_MAC_LEN);
  663. os_memset(attr + 1, 0, MD5_MAC_LEN);
  664. if (req_auth) {
  665. os_memcpy(orig_authenticator, msg->hdr->authenticator,
  666. sizeof(orig_authenticator));
  667. os_memcpy(msg->hdr->authenticator, req_auth,
  668. sizeof(msg->hdr->authenticator));
  669. }
  670. hmac_md5(secret, secret_len, wpabuf_head(msg->buf),
  671. wpabuf_len(msg->buf), auth);
  672. os_memcpy(attr + 1, orig, MD5_MAC_LEN);
  673. if (req_auth) {
  674. os_memcpy(msg->hdr->authenticator, orig_authenticator,
  675. sizeof(orig_authenticator));
  676. }
  677. if (os_memcmp_const(orig, auth, MD5_MAC_LEN) != 0) {
  678. wpa_printf(MSG_INFO, "Invalid Message-Authenticator!");
  679. return 1;
  680. }
  681. return 0;
  682. }
  683. int radius_msg_verify(struct radius_msg *msg, const u8 *secret,
  684. size_t secret_len, struct radius_msg *sent_msg, int auth)
  685. {
  686. const u8 *addr[4];
  687. size_t len[4];
  688. u8 hash[MD5_MAC_LEN];
  689. if (sent_msg == NULL) {
  690. wpa_printf(MSG_INFO, "No matching Access-Request message found");
  691. return 1;
  692. }
  693. if (auth &&
  694. radius_msg_verify_msg_auth(msg, secret, secret_len,
  695. sent_msg->hdr->authenticator)) {
  696. return 1;
  697. }
  698. /* ResponseAuth = MD5(Code+ID+Length+RequestAuth+Attributes+Secret) */
  699. addr[0] = (u8 *) msg->hdr;
  700. len[0] = 1 + 1 + 2;
  701. addr[1] = sent_msg->hdr->authenticator;
  702. len[1] = MD5_MAC_LEN;
  703. addr[2] = wpabuf_head_u8(msg->buf) + sizeof(struct radius_hdr);
  704. len[2] = wpabuf_len(msg->buf) - sizeof(struct radius_hdr);
  705. addr[3] = secret;
  706. len[3] = secret_len;
  707. md5_vector(4, addr, len, hash);
  708. if (os_memcmp_const(hash, msg->hdr->authenticator, MD5_MAC_LEN) != 0) {
  709. wpa_printf(MSG_INFO, "Response Authenticator invalid!");
  710. return 1;
  711. }
  712. return 0;
  713. }
  714. int radius_msg_copy_attr(struct radius_msg *dst, struct radius_msg *src,
  715. u8 type)
  716. {
  717. struct radius_attr_hdr *attr;
  718. size_t i;
  719. int count = 0;
  720. for (i = 0; i < src->attr_used; i++) {
  721. attr = radius_get_attr_hdr(src, i);
  722. if (attr->type == type && attr->length >= sizeof(*attr)) {
  723. if (!radius_msg_add_attr(dst, type, (u8 *) (attr + 1),
  724. attr->length - sizeof(*attr)))
  725. return -1;
  726. count++;
  727. }
  728. }
  729. return count;
  730. }
  731. /* Create Request Authenticator. The value should be unique over the lifetime
  732. * of the shared secret between authenticator and authentication server.
  733. * Use one-way MD5 hash calculated from current timestamp and some data given
  734. * by the caller. */
  735. void radius_msg_make_authenticator(struct radius_msg *msg,
  736. const u8 *data, size_t len)
  737. {
  738. struct os_time tv;
  739. long int l;
  740. const u8 *addr[3];
  741. size_t elen[3];
  742. os_get_time(&tv);
  743. l = os_random();
  744. addr[0] = (u8 *) &tv;
  745. elen[0] = sizeof(tv);
  746. addr[1] = data;
  747. elen[1] = len;
  748. addr[2] = (u8 *) &l;
  749. elen[2] = sizeof(l);
  750. md5_vector(3, addr, elen, msg->hdr->authenticator);
  751. }
  752. /* Get Vendor-specific RADIUS Attribute from a parsed RADIUS message.
  753. * Returns the Attribute payload and sets alen to indicate the length of the
  754. * payload if a vendor attribute with subtype is found, otherwise returns NULL.
  755. * The returned payload is allocated with os_malloc() and caller must free it
  756. * by calling os_free().
  757. */
  758. static u8 *radius_msg_get_vendor_attr(struct radius_msg *msg, u32 vendor,
  759. u8 subtype, size_t *alen)
  760. {
  761. u8 *data, *pos;
  762. size_t i, len;
  763. if (msg == NULL)
  764. return NULL;
  765. for (i = 0; i < msg->attr_used; i++) {
  766. struct radius_attr_hdr *attr = radius_get_attr_hdr(msg, i);
  767. size_t left;
  768. u32 vendor_id;
  769. struct radius_attr_vendor *vhdr;
  770. if (attr->type != RADIUS_ATTR_VENDOR_SPECIFIC ||
  771. attr->length < sizeof(*attr))
  772. continue;
  773. left = attr->length - sizeof(*attr);
  774. if (left < 4)
  775. continue;
  776. pos = (u8 *) (attr + 1);
  777. os_memcpy(&vendor_id, pos, 4);
  778. pos += 4;
  779. left -= 4;
  780. if (ntohl(vendor_id) != vendor)
  781. continue;
  782. while (left >= sizeof(*vhdr)) {
  783. vhdr = (struct radius_attr_vendor *) pos;
  784. if (vhdr->vendor_length > left ||
  785. vhdr->vendor_length < sizeof(*vhdr)) {
  786. left = 0;
  787. break;
  788. }
  789. if (vhdr->vendor_type != subtype) {
  790. pos += vhdr->vendor_length;
  791. left -= vhdr->vendor_length;
  792. continue;
  793. }
  794. len = vhdr->vendor_length - sizeof(*vhdr);
  795. data = os_malloc(len);
  796. if (data == NULL)
  797. return NULL;
  798. os_memcpy(data, pos + sizeof(*vhdr), len);
  799. if (alen)
  800. *alen = len;
  801. return data;
  802. }
  803. }
  804. return NULL;
  805. }
  806. static u8 * decrypt_ms_key(const u8 *key, size_t len,
  807. const u8 *req_authenticator,
  808. const u8 *secret, size_t secret_len, size_t *reslen)
  809. {
  810. u8 *plain, *ppos, *res;
  811. const u8 *pos;
  812. size_t left, plen;
  813. u8 hash[MD5_MAC_LEN];
  814. int i, first = 1;
  815. const u8 *addr[3];
  816. size_t elen[3];
  817. /* key: 16-bit salt followed by encrypted key info */
  818. if (len < 2 + 16)
  819. return NULL;
  820. pos = key + 2;
  821. left = len - 2;
  822. if (left % 16) {
  823. wpa_printf(MSG_INFO, "Invalid ms key len %lu",
  824. (unsigned long) left);
  825. return NULL;
  826. }
  827. plen = left;
  828. ppos = plain = os_malloc(plen);
  829. if (plain == NULL)
  830. return NULL;
  831. plain[0] = 0;
  832. while (left > 0) {
  833. /* b(1) = MD5(Secret + Request-Authenticator + Salt)
  834. * b(i) = MD5(Secret + c(i - 1)) for i > 1 */
  835. addr[0] = secret;
  836. elen[0] = secret_len;
  837. if (first) {
  838. addr[1] = req_authenticator;
  839. elen[1] = MD5_MAC_LEN;
  840. addr[2] = key;
  841. elen[2] = 2; /* Salt */
  842. } else {
  843. addr[1] = pos - MD5_MAC_LEN;
  844. elen[1] = MD5_MAC_LEN;
  845. }
  846. md5_vector(first ? 3 : 2, addr, elen, hash);
  847. first = 0;
  848. for (i = 0; i < MD5_MAC_LEN; i++)
  849. *ppos++ = *pos++ ^ hash[i];
  850. left -= MD5_MAC_LEN;
  851. }
  852. if (plain[0] == 0 || plain[0] > plen - 1) {
  853. wpa_printf(MSG_INFO, "Failed to decrypt MPPE key");
  854. os_free(plain);
  855. return NULL;
  856. }
  857. res = os_malloc(plain[0]);
  858. if (res == NULL) {
  859. os_free(plain);
  860. return NULL;
  861. }
  862. os_memcpy(res, plain + 1, plain[0]);
  863. if (reslen)
  864. *reslen = plain[0];
  865. os_free(plain);
  866. return res;
  867. }
  868. static void encrypt_ms_key(const u8 *key, size_t key_len, u16 salt,
  869. const u8 *req_authenticator,
  870. const u8 *secret, size_t secret_len,
  871. u8 *ebuf, size_t *elen)
  872. {
  873. int i, len, first = 1;
  874. u8 hash[MD5_MAC_LEN], saltbuf[2], *pos;
  875. const u8 *addr[3];
  876. size_t _len[3];
  877. WPA_PUT_BE16(saltbuf, salt);
  878. len = 1 + key_len;
  879. if (len & 0x0f) {
  880. len = (len & 0xf0) + 16;
  881. }
  882. os_memset(ebuf, 0, len);
  883. ebuf[0] = key_len;
  884. os_memcpy(ebuf + 1, key, key_len);
  885. *elen = len;
  886. pos = ebuf;
  887. while (len > 0) {
  888. /* b(1) = MD5(Secret + Request-Authenticator + Salt)
  889. * b(i) = MD5(Secret + c(i - 1)) for i > 1 */
  890. addr[0] = secret;
  891. _len[0] = secret_len;
  892. if (first) {
  893. addr[1] = req_authenticator;
  894. _len[1] = MD5_MAC_LEN;
  895. addr[2] = saltbuf;
  896. _len[2] = sizeof(saltbuf);
  897. } else {
  898. addr[1] = pos - MD5_MAC_LEN;
  899. _len[1] = MD5_MAC_LEN;
  900. }
  901. md5_vector(first ? 3 : 2, addr, _len, hash);
  902. first = 0;
  903. for (i = 0; i < MD5_MAC_LEN; i++)
  904. *pos++ ^= hash[i];
  905. len -= MD5_MAC_LEN;
  906. }
  907. }
  908. struct radius_ms_mppe_keys *
  909. radius_msg_get_ms_keys(struct radius_msg *msg, struct radius_msg *sent_msg,
  910. const u8 *secret, size_t secret_len)
  911. {
  912. u8 *key;
  913. size_t keylen;
  914. struct radius_ms_mppe_keys *keys;
  915. if (msg == NULL || sent_msg == NULL)
  916. return NULL;
  917. keys = os_zalloc(sizeof(*keys));
  918. if (keys == NULL)
  919. return NULL;
  920. key = radius_msg_get_vendor_attr(msg, RADIUS_VENDOR_ID_MICROSOFT,
  921. RADIUS_VENDOR_ATTR_MS_MPPE_SEND_KEY,
  922. &keylen);
  923. if (key) {
  924. keys->send = decrypt_ms_key(key, keylen,
  925. sent_msg->hdr->authenticator,
  926. secret, secret_len,
  927. &keys->send_len);
  928. os_free(key);
  929. }
  930. key = radius_msg_get_vendor_attr(msg, RADIUS_VENDOR_ID_MICROSOFT,
  931. RADIUS_VENDOR_ATTR_MS_MPPE_RECV_KEY,
  932. &keylen);
  933. if (key) {
  934. keys->recv = decrypt_ms_key(key, keylen,
  935. sent_msg->hdr->authenticator,
  936. secret, secret_len,
  937. &keys->recv_len);
  938. os_free(key);
  939. }
  940. return keys;
  941. }
  942. struct radius_ms_mppe_keys *
  943. radius_msg_get_cisco_keys(struct radius_msg *msg, struct radius_msg *sent_msg,
  944. const u8 *secret, size_t secret_len)
  945. {
  946. u8 *key;
  947. size_t keylen;
  948. struct radius_ms_mppe_keys *keys;
  949. if (msg == NULL || sent_msg == NULL)
  950. return NULL;
  951. keys = os_zalloc(sizeof(*keys));
  952. if (keys == NULL)
  953. return NULL;
  954. key = radius_msg_get_vendor_attr(msg, RADIUS_VENDOR_ID_CISCO,
  955. RADIUS_CISCO_AV_PAIR, &keylen);
  956. if (key && keylen == 51 &&
  957. os_memcmp(key, "leap:session-key=", 17) == 0) {
  958. keys->recv = decrypt_ms_key(key + 17, keylen - 17,
  959. sent_msg->hdr->authenticator,
  960. secret, secret_len,
  961. &keys->recv_len);
  962. }
  963. os_free(key);
  964. return keys;
  965. }
  966. int radius_msg_add_mppe_keys(struct radius_msg *msg,
  967. const u8 *req_authenticator,
  968. const u8 *secret, size_t secret_len,
  969. const u8 *send_key, size_t send_key_len,
  970. const u8 *recv_key, size_t recv_key_len)
  971. {
  972. struct radius_attr_hdr *attr;
  973. u32 vendor_id = htonl(RADIUS_VENDOR_ID_MICROSOFT);
  974. u8 *buf;
  975. struct radius_attr_vendor *vhdr;
  976. u8 *pos;
  977. size_t elen;
  978. int hlen;
  979. u16 salt;
  980. hlen = sizeof(vendor_id) + sizeof(*vhdr) + 2;
  981. /* MS-MPPE-Send-Key */
  982. buf = os_malloc(hlen + send_key_len + 16);
  983. if (buf == NULL) {
  984. return 0;
  985. }
  986. pos = buf;
  987. os_memcpy(pos, &vendor_id, sizeof(vendor_id));
  988. pos += sizeof(vendor_id);
  989. vhdr = (struct radius_attr_vendor *) pos;
  990. vhdr->vendor_type = RADIUS_VENDOR_ATTR_MS_MPPE_SEND_KEY;
  991. pos = (u8 *) (vhdr + 1);
  992. salt = os_random() | 0x8000;
  993. WPA_PUT_BE16(pos, salt);
  994. pos += 2;
  995. encrypt_ms_key(send_key, send_key_len, salt, req_authenticator, secret,
  996. secret_len, pos, &elen);
  997. vhdr->vendor_length = hlen + elen - sizeof(vendor_id);
  998. attr = radius_msg_add_attr(msg, RADIUS_ATTR_VENDOR_SPECIFIC,
  999. buf, hlen + elen);
  1000. os_free(buf);
  1001. if (attr == NULL) {
  1002. return 0;
  1003. }
  1004. /* MS-MPPE-Recv-Key */
  1005. buf = os_malloc(hlen + send_key_len + 16);
  1006. if (buf == NULL) {
  1007. return 0;
  1008. }
  1009. pos = buf;
  1010. os_memcpy(pos, &vendor_id, sizeof(vendor_id));
  1011. pos += sizeof(vendor_id);
  1012. vhdr = (struct radius_attr_vendor *) pos;
  1013. vhdr->vendor_type = RADIUS_VENDOR_ATTR_MS_MPPE_RECV_KEY;
  1014. pos = (u8 *) (vhdr + 1);
  1015. salt ^= 1;
  1016. WPA_PUT_BE16(pos, salt);
  1017. pos += 2;
  1018. encrypt_ms_key(recv_key, recv_key_len, salt, req_authenticator, secret,
  1019. secret_len, pos, &elen);
  1020. vhdr->vendor_length = hlen + elen - sizeof(vendor_id);
  1021. attr = radius_msg_add_attr(msg, RADIUS_ATTR_VENDOR_SPECIFIC,
  1022. buf, hlen + elen);
  1023. os_free(buf);
  1024. if (attr == NULL) {
  1025. return 0;
  1026. }
  1027. return 1;
  1028. }
  1029. int radius_msg_add_wfa(struct radius_msg *msg, u8 subtype, const u8 *data,
  1030. size_t len)
  1031. {
  1032. struct radius_attr_hdr *attr;
  1033. u8 *buf, *pos;
  1034. size_t alen;
  1035. alen = 4 + 2 + len;
  1036. buf = os_malloc(alen);
  1037. if (buf == NULL)
  1038. return 0;
  1039. pos = buf;
  1040. WPA_PUT_BE32(pos, RADIUS_VENDOR_ID_WFA);
  1041. pos += 4;
  1042. *pos++ = subtype;
  1043. *pos++ = 2 + len;
  1044. os_memcpy(pos, data, len);
  1045. attr = radius_msg_add_attr(msg, RADIUS_ATTR_VENDOR_SPECIFIC,
  1046. buf, alen);
  1047. os_free(buf);
  1048. if (attr == NULL)
  1049. return 0;
  1050. return 1;
  1051. }
  1052. int radius_user_password_hide(struct radius_msg *msg,
  1053. const u8 *data, size_t data_len,
  1054. const u8 *secret, size_t secret_len,
  1055. u8 *buf, size_t buf_len)
  1056. {
  1057. size_t padlen, i, pos;
  1058. const u8 *addr[2];
  1059. size_t len[2];
  1060. u8 hash[16];
  1061. if (data_len + 16 > buf_len)
  1062. return -1;
  1063. os_memcpy(buf, data, data_len);
  1064. padlen = data_len % 16;
  1065. if (padlen && data_len < buf_len) {
  1066. padlen = 16 - padlen;
  1067. os_memset(buf + data_len, 0, padlen);
  1068. buf_len = data_len + padlen;
  1069. } else {
  1070. buf_len = data_len;
  1071. }
  1072. addr[0] = secret;
  1073. len[0] = secret_len;
  1074. addr[1] = msg->hdr->authenticator;
  1075. len[1] = 16;
  1076. md5_vector(2, addr, len, hash);
  1077. for (i = 0; i < 16; i++)
  1078. buf[i] ^= hash[i];
  1079. pos = 16;
  1080. while (pos < buf_len) {
  1081. addr[0] = secret;
  1082. len[0] = secret_len;
  1083. addr[1] = &buf[pos - 16];
  1084. len[1] = 16;
  1085. md5_vector(2, addr, len, hash);
  1086. for (i = 0; i < 16; i++)
  1087. buf[pos + i] ^= hash[i];
  1088. pos += 16;
  1089. }
  1090. return buf_len;
  1091. }
  1092. /* Add User-Password attribute to a RADIUS message and encrypt it as specified
  1093. * in RFC 2865, Chap. 5.2 */
  1094. struct radius_attr_hdr *
  1095. radius_msg_add_attr_user_password(struct radius_msg *msg,
  1096. const u8 *data, size_t data_len,
  1097. const u8 *secret, size_t secret_len)
  1098. {
  1099. u8 buf[128];
  1100. int res;
  1101. res = radius_user_password_hide(msg, data, data_len,
  1102. secret, secret_len, buf, sizeof(buf));
  1103. if (res < 0)
  1104. return NULL;
  1105. return radius_msg_add_attr(msg, RADIUS_ATTR_USER_PASSWORD,
  1106. buf, res);
  1107. }
  1108. int radius_msg_get_attr(struct radius_msg *msg, u8 type, u8 *buf, size_t len)
  1109. {
  1110. struct radius_attr_hdr *attr = NULL, *tmp;
  1111. size_t i, dlen;
  1112. for (i = 0; i < msg->attr_used; i++) {
  1113. tmp = radius_get_attr_hdr(msg, i);
  1114. if (tmp->type == type) {
  1115. attr = tmp;
  1116. break;
  1117. }
  1118. }
  1119. if (!attr || attr->length < sizeof(*attr))
  1120. return -1;
  1121. dlen = attr->length - sizeof(*attr);
  1122. if (buf)
  1123. os_memcpy(buf, (attr + 1), dlen > len ? len : dlen);
  1124. return dlen;
  1125. }
  1126. int radius_msg_get_attr_ptr(struct radius_msg *msg, u8 type, u8 **buf,
  1127. size_t *len, const u8 *start)
  1128. {
  1129. size_t i;
  1130. struct radius_attr_hdr *attr = NULL, *tmp;
  1131. for (i = 0; i < msg->attr_used; i++) {
  1132. tmp = radius_get_attr_hdr(msg, i);
  1133. if (tmp->type == type &&
  1134. (start == NULL || (u8 *) tmp > start)) {
  1135. attr = tmp;
  1136. break;
  1137. }
  1138. }
  1139. if (!attr || attr->length < sizeof(*attr))
  1140. return -1;
  1141. *buf = (u8 *) (attr + 1);
  1142. *len = attr->length - sizeof(*attr);
  1143. return 0;
  1144. }
  1145. int radius_msg_count_attr(struct radius_msg *msg, u8 type, int min_len)
  1146. {
  1147. size_t i;
  1148. int count;
  1149. for (count = 0, i = 0; i < msg->attr_used; i++) {
  1150. struct radius_attr_hdr *attr = radius_get_attr_hdr(msg, i);
  1151. if (attr->type == type &&
  1152. attr->length >= sizeof(struct radius_attr_hdr) + min_len)
  1153. count++;
  1154. }
  1155. return count;
  1156. }
  1157. struct radius_tunnel_attrs {
  1158. int tag_used;
  1159. int type; /* Tunnel-Type */
  1160. int medium_type; /* Tunnel-Medium-Type */
  1161. int vlanid;
  1162. };
  1163. /**
  1164. * radius_msg_get_vlanid - Parse RADIUS attributes for VLAN tunnel information
  1165. * @msg: RADIUS message
  1166. * Returns: VLAN ID for the first tunnel configuration of -1 if none is found
  1167. */
  1168. int radius_msg_get_vlanid(struct radius_msg *msg)
  1169. {
  1170. struct radius_tunnel_attrs tunnel[RADIUS_TUNNEL_TAGS], *tun;
  1171. size_t i;
  1172. struct radius_attr_hdr *attr = NULL;
  1173. const u8 *data;
  1174. char buf[10];
  1175. size_t dlen;
  1176. os_memset(&tunnel, 0, sizeof(tunnel));
  1177. for (i = 0; i < msg->attr_used; i++) {
  1178. attr = radius_get_attr_hdr(msg, i);
  1179. if (attr->length < sizeof(*attr))
  1180. return -1;
  1181. data = (const u8 *) (attr + 1);
  1182. dlen = attr->length - sizeof(*attr);
  1183. if (attr->length < 3)
  1184. continue;
  1185. if (data[0] >= RADIUS_TUNNEL_TAGS)
  1186. tun = &tunnel[0];
  1187. else
  1188. tun = &tunnel[data[0]];
  1189. switch (attr->type) {
  1190. case RADIUS_ATTR_TUNNEL_TYPE:
  1191. if (attr->length != 6)
  1192. break;
  1193. tun->tag_used++;
  1194. tun->type = WPA_GET_BE24(data + 1);
  1195. break;
  1196. case RADIUS_ATTR_TUNNEL_MEDIUM_TYPE:
  1197. if (attr->length != 6)
  1198. break;
  1199. tun->tag_used++;
  1200. tun->medium_type = WPA_GET_BE24(data + 1);
  1201. break;
  1202. case RADIUS_ATTR_TUNNEL_PRIVATE_GROUP_ID:
  1203. if (data[0] < RADIUS_TUNNEL_TAGS) {
  1204. data++;
  1205. dlen--;
  1206. }
  1207. if (dlen >= sizeof(buf))
  1208. break;
  1209. os_memcpy(buf, data, dlen);
  1210. buf[dlen] = '\0';
  1211. tun->tag_used++;
  1212. tun->vlanid = atoi(buf);
  1213. break;
  1214. }
  1215. }
  1216. for (i = 0; i < RADIUS_TUNNEL_TAGS; i++) {
  1217. tun = &tunnel[i];
  1218. if (tun->tag_used &&
  1219. tun->type == RADIUS_TUNNEL_TYPE_VLAN &&
  1220. tun->medium_type == RADIUS_TUNNEL_MEDIUM_TYPE_802 &&
  1221. tun->vlanid > 0)
  1222. return tun->vlanid;
  1223. }
  1224. return -1;
  1225. }
  1226. /**
  1227. * radius_msg_get_tunnel_password - Parse RADIUS attribute Tunnel-Password
  1228. * @msg: Received RADIUS message
  1229. * @keylen: Length of returned password
  1230. * @secret: RADIUS shared secret
  1231. * @secret_len: Length of secret
  1232. * @sent_msg: Sent RADIUS message
  1233. * @n: Number of password attribute to return (starting with 0)
  1234. * Returns: Pointer to n-th password (free with os_free) or %NULL
  1235. */
  1236. char * radius_msg_get_tunnel_password(struct radius_msg *msg, int *keylen,
  1237. const u8 *secret, size_t secret_len,
  1238. struct radius_msg *sent_msg, size_t n)
  1239. {
  1240. u8 *buf = NULL;
  1241. size_t buflen;
  1242. const u8 *salt;
  1243. u8 *str;
  1244. const u8 *addr[3];
  1245. size_t len[3];
  1246. u8 hash[16];
  1247. u8 *pos;
  1248. size_t i, j = 0;
  1249. struct radius_attr_hdr *attr;
  1250. const u8 *data;
  1251. size_t dlen;
  1252. const u8 *fdata = NULL; /* points to found item */
  1253. size_t fdlen = -1;
  1254. char *ret = NULL;
  1255. /* find n-th valid Tunnel-Password attribute */
  1256. for (i = 0; i < msg->attr_used; i++) {
  1257. attr = radius_get_attr_hdr(msg, i);
  1258. if (attr == NULL ||
  1259. attr->type != RADIUS_ATTR_TUNNEL_PASSWORD) {
  1260. continue;
  1261. }
  1262. if (attr->length <= 5)
  1263. continue;
  1264. data = (const u8 *) (attr + 1);
  1265. dlen = attr->length - sizeof(*attr);
  1266. if (dlen <= 3 || dlen % 16 != 3)
  1267. continue;
  1268. j++;
  1269. if (j <= n)
  1270. continue;
  1271. fdata = data;
  1272. fdlen = dlen;
  1273. break;
  1274. }
  1275. if (fdata == NULL)
  1276. goto out;
  1277. /* alloc writable memory for decryption */
  1278. buf = os_malloc(fdlen);
  1279. if (buf == NULL)
  1280. goto out;
  1281. os_memcpy(buf, fdata, fdlen);
  1282. buflen = fdlen;
  1283. /* init pointers */
  1284. salt = buf + 1;
  1285. str = buf + 3;
  1286. /* decrypt blocks */
  1287. pos = buf + buflen - 16; /* last block */
  1288. while (pos >= str + 16) { /* all but the first block */
  1289. addr[0] = secret;
  1290. len[0] = secret_len;
  1291. addr[1] = pos - 16;
  1292. len[1] = 16;
  1293. md5_vector(2, addr, len, hash);
  1294. for (i = 0; i < 16; i++)
  1295. pos[i] ^= hash[i];
  1296. pos -= 16;
  1297. }
  1298. /* decrypt first block */
  1299. if (str != pos)
  1300. goto out;
  1301. addr[0] = secret;
  1302. len[0] = secret_len;
  1303. addr[1] = sent_msg->hdr->authenticator;
  1304. len[1] = 16;
  1305. addr[2] = salt;
  1306. len[2] = 2;
  1307. md5_vector(3, addr, len, hash);
  1308. for (i = 0; i < 16; i++)
  1309. pos[i] ^= hash[i];
  1310. /* derive plaintext length from first subfield */
  1311. *keylen = (unsigned char) str[0];
  1312. if ((u8 *) (str + *keylen) >= (u8 *) (buf + buflen)) {
  1313. /* decryption error - invalid key length */
  1314. goto out;
  1315. }
  1316. if (*keylen == 0) {
  1317. /* empty password */
  1318. goto out;
  1319. }
  1320. /* copy passphrase into new buffer */
  1321. ret = os_malloc(*keylen);
  1322. if (ret)
  1323. os_memcpy(ret, str + 1, *keylen);
  1324. out:
  1325. /* return new buffer */
  1326. os_free(buf);
  1327. return ret;
  1328. }
  1329. void radius_free_class(struct radius_class_data *c)
  1330. {
  1331. size_t i;
  1332. if (c == NULL)
  1333. return;
  1334. for (i = 0; i < c->count; i++)
  1335. os_free(c->attr[i].data);
  1336. os_free(c->attr);
  1337. c->attr = NULL;
  1338. c->count = 0;
  1339. }
  1340. int radius_copy_class(struct radius_class_data *dst,
  1341. const struct radius_class_data *src)
  1342. {
  1343. size_t i;
  1344. if (src->attr == NULL)
  1345. return 0;
  1346. dst->attr = os_calloc(src->count, sizeof(struct radius_attr_data));
  1347. if (dst->attr == NULL)
  1348. return -1;
  1349. dst->count = 0;
  1350. for (i = 0; i < src->count; i++) {
  1351. dst->attr[i].data = os_malloc(src->attr[i].len);
  1352. if (dst->attr[i].data == NULL)
  1353. break;
  1354. dst->count++;
  1355. os_memcpy(dst->attr[i].data, src->attr[i].data,
  1356. src->attr[i].len);
  1357. dst->attr[i].len = src->attr[i].len;
  1358. }
  1359. return 0;
  1360. }
  1361. u8 radius_msg_find_unlisted_attr(struct radius_msg *msg, u8 *attrs)
  1362. {
  1363. size_t i, j;
  1364. struct radius_attr_hdr *attr;
  1365. for (i = 0; i < msg->attr_used; i++) {
  1366. attr = radius_get_attr_hdr(msg, i);
  1367. for (j = 0; attrs[j]; j++) {
  1368. if (attr->type == attrs[j])
  1369. break;
  1370. }
  1371. if (attrs[j] == 0)
  1372. return attr->type; /* unlisted attr */
  1373. }
  1374. return 0;
  1375. }