eap_server_gpsk.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620
  1. /*
  2. * hostapd / EAP-GPSK (RFC 5433) server
  3. * Copyright (c) 2006-2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/random.h"
  11. #include "eap_server/eap_i.h"
  12. #include "eap_common/eap_gpsk_common.h"
  13. struct eap_gpsk_data {
  14. enum { GPSK_1, GPSK_3, SUCCESS, FAILURE } state;
  15. u8 rand_server[EAP_GPSK_RAND_LEN];
  16. u8 rand_peer[EAP_GPSK_RAND_LEN];
  17. u8 msk[EAP_MSK_LEN];
  18. u8 emsk[EAP_EMSK_LEN];
  19. u8 sk[EAP_GPSK_MAX_SK_LEN];
  20. size_t sk_len;
  21. u8 pk[EAP_GPSK_MAX_PK_LEN];
  22. size_t pk_len;
  23. u8 *id_peer;
  24. size_t id_peer_len;
  25. #define MAX_NUM_CSUITES 2
  26. struct eap_gpsk_csuite csuite_list[MAX_NUM_CSUITES];
  27. size_t csuite_count;
  28. int vendor; /* CSuite/Vendor */
  29. int specifier; /* CSuite/Specifier */
  30. };
  31. static const char * eap_gpsk_state_txt(int state)
  32. {
  33. switch (state) {
  34. case GPSK_1:
  35. return "GPSK-1";
  36. case GPSK_3:
  37. return "GPSK-3";
  38. case SUCCESS:
  39. return "SUCCESS";
  40. case FAILURE:
  41. return "FAILURE";
  42. default:
  43. return "?";
  44. }
  45. }
  46. static void eap_gpsk_state(struct eap_gpsk_data *data, int state)
  47. {
  48. wpa_printf(MSG_DEBUG, "EAP-GPSK: %s -> %s",
  49. eap_gpsk_state_txt(data->state),
  50. eap_gpsk_state_txt(state));
  51. data->state = state;
  52. }
  53. static void * eap_gpsk_init(struct eap_sm *sm)
  54. {
  55. struct eap_gpsk_data *data;
  56. data = os_zalloc(sizeof(*data));
  57. if (data == NULL)
  58. return NULL;
  59. data->state = GPSK_1;
  60. data->csuite_count = 0;
  61. if (eap_gpsk_supported_ciphersuite(EAP_GPSK_VENDOR_IETF,
  62. EAP_GPSK_CIPHER_AES)) {
  63. WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor,
  64. EAP_GPSK_VENDOR_IETF);
  65. WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
  66. EAP_GPSK_CIPHER_AES);
  67. data->csuite_count++;
  68. }
  69. if (eap_gpsk_supported_ciphersuite(EAP_GPSK_VENDOR_IETF,
  70. EAP_GPSK_CIPHER_SHA256)) {
  71. WPA_PUT_BE32(data->csuite_list[data->csuite_count].vendor,
  72. EAP_GPSK_VENDOR_IETF);
  73. WPA_PUT_BE16(data->csuite_list[data->csuite_count].specifier,
  74. EAP_GPSK_CIPHER_SHA256);
  75. data->csuite_count++;
  76. }
  77. return data;
  78. }
  79. static void eap_gpsk_reset(struct eap_sm *sm, void *priv)
  80. {
  81. struct eap_gpsk_data *data = priv;
  82. os_free(data->id_peer);
  83. os_free(data);
  84. }
  85. static struct wpabuf * eap_gpsk_build_gpsk_1(struct eap_sm *sm,
  86. struct eap_gpsk_data *data, u8 id)
  87. {
  88. size_t len;
  89. struct wpabuf *req;
  90. wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-1");
  91. if (random_get_bytes(data->rand_server, EAP_GPSK_RAND_LEN)) {
  92. wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to get random data");
  93. eap_gpsk_state(data, FAILURE);
  94. return NULL;
  95. }
  96. wpa_hexdump(MSG_MSGDUMP, "EAP-GPSK: RAND_Server",
  97. data->rand_server, EAP_GPSK_RAND_LEN);
  98. len = 1 + 2 + sm->server_id_len + EAP_GPSK_RAND_LEN + 2 +
  99. data->csuite_count * sizeof(struct eap_gpsk_csuite);
  100. req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
  101. EAP_CODE_REQUEST, id);
  102. if (req == NULL) {
  103. wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
  104. "for request/GPSK-1");
  105. eap_gpsk_state(data, FAILURE);
  106. return NULL;
  107. }
  108. wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_1);
  109. wpabuf_put_be16(req, sm->server_id_len);
  110. wpabuf_put_data(req, sm->server_id, sm->server_id_len);
  111. wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN);
  112. wpabuf_put_be16(req,
  113. data->csuite_count * sizeof(struct eap_gpsk_csuite));
  114. wpabuf_put_data(req, data->csuite_list,
  115. data->csuite_count * sizeof(struct eap_gpsk_csuite));
  116. return req;
  117. }
  118. static struct wpabuf * eap_gpsk_build_gpsk_3(struct eap_sm *sm,
  119. struct eap_gpsk_data *data, u8 id)
  120. {
  121. u8 *pos, *start;
  122. size_t len, miclen;
  123. struct eap_gpsk_csuite *csuite;
  124. struct wpabuf *req;
  125. wpa_printf(MSG_DEBUG, "EAP-GPSK: Request/GPSK-3");
  126. miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
  127. len = 1 + 2 * EAP_GPSK_RAND_LEN + 2 + sm->server_id_len +
  128. sizeof(struct eap_gpsk_csuite) + 2 + miclen;
  129. req = eap_msg_alloc(EAP_VENDOR_IETF, EAP_TYPE_GPSK, len,
  130. EAP_CODE_REQUEST, id);
  131. if (req == NULL) {
  132. wpa_printf(MSG_ERROR, "EAP-GPSK: Failed to allocate memory "
  133. "for request/GPSK-3");
  134. eap_gpsk_state(data, FAILURE);
  135. return NULL;
  136. }
  137. wpabuf_put_u8(req, EAP_GPSK_OPCODE_GPSK_3);
  138. start = wpabuf_put(req, 0);
  139. wpabuf_put_data(req, data->rand_peer, EAP_GPSK_RAND_LEN);
  140. wpabuf_put_data(req, data->rand_server, EAP_GPSK_RAND_LEN);
  141. wpabuf_put_be16(req, sm->server_id_len);
  142. wpabuf_put_data(req, sm->server_id, sm->server_id_len);
  143. csuite = wpabuf_put(req, sizeof(*csuite));
  144. WPA_PUT_BE32(csuite->vendor, data->vendor);
  145. WPA_PUT_BE16(csuite->specifier, data->specifier);
  146. /* no PD_Payload_2 */
  147. wpabuf_put_be16(req, 0);
  148. pos = wpabuf_put(req, miclen);
  149. if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
  150. data->specifier, start, pos - start, pos) < 0)
  151. {
  152. os_free(req);
  153. eap_gpsk_state(data, FAILURE);
  154. return NULL;
  155. }
  156. return req;
  157. }
  158. static struct wpabuf * eap_gpsk_buildReq(struct eap_sm *sm, void *priv, u8 id)
  159. {
  160. struct eap_gpsk_data *data = priv;
  161. switch (data->state) {
  162. case GPSK_1:
  163. return eap_gpsk_build_gpsk_1(sm, data, id);
  164. case GPSK_3:
  165. return eap_gpsk_build_gpsk_3(sm, data, id);
  166. default:
  167. wpa_printf(MSG_DEBUG, "EAP-GPSK: Unknown state %d in buildReq",
  168. data->state);
  169. break;
  170. }
  171. return NULL;
  172. }
  173. static Boolean eap_gpsk_check(struct eap_sm *sm, void *priv,
  174. struct wpabuf *respData)
  175. {
  176. struct eap_gpsk_data *data = priv;
  177. const u8 *pos;
  178. size_t len;
  179. pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len);
  180. if (pos == NULL || len < 1) {
  181. wpa_printf(MSG_INFO, "EAP-GPSK: Invalid frame");
  182. return TRUE;
  183. }
  184. wpa_printf(MSG_DEBUG, "EAP-GPSK: Received frame: opcode=%d", *pos);
  185. if (data->state == GPSK_1 && *pos == EAP_GPSK_OPCODE_GPSK_2)
  186. return FALSE;
  187. if (data->state == GPSK_3 && *pos == EAP_GPSK_OPCODE_GPSK_4)
  188. return FALSE;
  189. wpa_printf(MSG_INFO, "EAP-GPSK: Unexpected opcode=%d in state=%d",
  190. *pos, data->state);
  191. return TRUE;
  192. }
  193. static void eap_gpsk_process_gpsk_2(struct eap_sm *sm,
  194. struct eap_gpsk_data *data,
  195. const u8 *payload, size_t payloadlen)
  196. {
  197. const u8 *pos, *end;
  198. u16 alen;
  199. const struct eap_gpsk_csuite *csuite;
  200. size_t i, miclen;
  201. u8 mic[EAP_GPSK_MAX_MIC_LEN];
  202. if (data->state != GPSK_1)
  203. return;
  204. wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-2");
  205. pos = payload;
  206. end = payload + payloadlen;
  207. if (end - pos < 2) {
  208. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  209. "ID_Peer length");
  210. eap_gpsk_state(data, FAILURE);
  211. return;
  212. }
  213. alen = WPA_GET_BE16(pos);
  214. pos += 2;
  215. if (end - pos < alen) {
  216. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  217. "ID_Peer");
  218. eap_gpsk_state(data, FAILURE);
  219. return;
  220. }
  221. os_free(data->id_peer);
  222. data->id_peer = os_malloc(alen);
  223. if (data->id_peer == NULL) {
  224. wpa_printf(MSG_DEBUG, "EAP-GPSK: Not enough memory to store "
  225. "%d-octet ID_Peer", alen);
  226. return;
  227. }
  228. os_memcpy(data->id_peer, pos, alen);
  229. data->id_peer_len = alen;
  230. wpa_hexdump_ascii(MSG_DEBUG, "EAP-GPSK: ID_Peer",
  231. data->id_peer, data->id_peer_len);
  232. pos += alen;
  233. if (end - pos < 2) {
  234. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  235. "ID_Server length");
  236. eap_gpsk_state(data, FAILURE);
  237. return;
  238. }
  239. alen = WPA_GET_BE16(pos);
  240. pos += 2;
  241. if (end - pos < alen) {
  242. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  243. "ID_Server");
  244. eap_gpsk_state(data, FAILURE);
  245. return;
  246. }
  247. if (alen != sm->server_id_len ||
  248. os_memcmp(pos, sm->server_id, alen) != 0) {
  249. wpa_printf(MSG_DEBUG, "EAP-GPSK: ID_Server in GPSK-1 and "
  250. "GPSK-2 did not match");
  251. eap_gpsk_state(data, FAILURE);
  252. return;
  253. }
  254. pos += alen;
  255. if (end - pos < EAP_GPSK_RAND_LEN) {
  256. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  257. "RAND_Peer");
  258. eap_gpsk_state(data, FAILURE);
  259. return;
  260. }
  261. os_memcpy(data->rand_peer, pos, EAP_GPSK_RAND_LEN);
  262. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Peer",
  263. data->rand_peer, EAP_GPSK_RAND_LEN);
  264. pos += EAP_GPSK_RAND_LEN;
  265. if (end - pos < EAP_GPSK_RAND_LEN) {
  266. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  267. "RAND_Server");
  268. eap_gpsk_state(data, FAILURE);
  269. return;
  270. }
  271. if (os_memcmp(data->rand_server, pos, EAP_GPSK_RAND_LEN) != 0) {
  272. wpa_printf(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1 and "
  273. "GPSK-2 did not match");
  274. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-1",
  275. data->rand_server, EAP_GPSK_RAND_LEN);
  276. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: RAND_Server in GPSK-2",
  277. pos, EAP_GPSK_RAND_LEN);
  278. eap_gpsk_state(data, FAILURE);
  279. return;
  280. }
  281. pos += EAP_GPSK_RAND_LEN;
  282. if (end - pos < 2) {
  283. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  284. "CSuite_List length");
  285. eap_gpsk_state(data, FAILURE);
  286. return;
  287. }
  288. alen = WPA_GET_BE16(pos);
  289. pos += 2;
  290. if (end - pos < alen) {
  291. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  292. "CSuite_List");
  293. eap_gpsk_state(data, FAILURE);
  294. return;
  295. }
  296. if (alen != data->csuite_count * sizeof(struct eap_gpsk_csuite) ||
  297. os_memcmp(pos, data->csuite_list, alen) != 0) {
  298. wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite_List in GPSK-1 and "
  299. "GPSK-2 did not match");
  300. eap_gpsk_state(data, FAILURE);
  301. return;
  302. }
  303. pos += alen;
  304. if (end - pos < (int) sizeof(*csuite)) {
  305. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  306. "CSuite_Sel");
  307. eap_gpsk_state(data, FAILURE);
  308. return;
  309. }
  310. csuite = (const struct eap_gpsk_csuite *) pos;
  311. for (i = 0; i < data->csuite_count; i++) {
  312. if (os_memcmp(csuite, &data->csuite_list[i], sizeof(*csuite))
  313. == 0)
  314. break;
  315. }
  316. if (i == data->csuite_count) {
  317. wpa_printf(MSG_DEBUG, "EAP-GPSK: Peer selected unsupported "
  318. "ciphersuite %d:%d",
  319. WPA_GET_BE32(csuite->vendor),
  320. WPA_GET_BE16(csuite->specifier));
  321. eap_gpsk_state(data, FAILURE);
  322. return;
  323. }
  324. data->vendor = WPA_GET_BE32(csuite->vendor);
  325. data->specifier = WPA_GET_BE16(csuite->specifier);
  326. wpa_printf(MSG_DEBUG, "EAP-GPSK: CSuite_Sel %d:%d",
  327. data->vendor, data->specifier);
  328. pos += sizeof(*csuite);
  329. if (end - pos < 2) {
  330. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  331. "PD_Payload_1 length");
  332. eap_gpsk_state(data, FAILURE);
  333. return;
  334. }
  335. alen = WPA_GET_BE16(pos);
  336. pos += 2;
  337. if (end - pos < alen) {
  338. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  339. "PD_Payload_1");
  340. eap_gpsk_state(data, FAILURE);
  341. return;
  342. }
  343. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen);
  344. pos += alen;
  345. if (sm->user == NULL || sm->user->password == NULL) {
  346. wpa_printf(MSG_INFO, "EAP-GPSK: No PSK/password configured "
  347. "for the user");
  348. eap_gpsk_state(data, FAILURE);
  349. return;
  350. }
  351. if (eap_gpsk_derive_keys(sm->user->password, sm->user->password_len,
  352. data->vendor, data->specifier,
  353. data->rand_peer, data->rand_server,
  354. data->id_peer, data->id_peer_len,
  355. sm->server_id, sm->server_id_len,
  356. data->msk, data->emsk,
  357. data->sk, &data->sk_len,
  358. data->pk, &data->pk_len) < 0) {
  359. wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to derive keys");
  360. eap_gpsk_state(data, FAILURE);
  361. return;
  362. }
  363. miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
  364. if (end - pos < (int) miclen) {
  365. wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
  366. "(left=%lu miclen=%lu)",
  367. (unsigned long) (end - pos),
  368. (unsigned long) miclen);
  369. eap_gpsk_state(data, FAILURE);
  370. return;
  371. }
  372. if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
  373. data->specifier, payload, pos - payload, mic)
  374. < 0) {
  375. wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
  376. eap_gpsk_state(data, FAILURE);
  377. return;
  378. }
  379. if (os_memcmp(mic, pos, miclen) != 0) {
  380. wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-2");
  381. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
  382. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  383. eap_gpsk_state(data, FAILURE);
  384. return;
  385. }
  386. pos += miclen;
  387. if (pos != end) {
  388. wpa_printf(MSG_DEBUG, "EAP-GPSK: Ignored %lu bytes of extra "
  389. "data in the end of GPSK-2",
  390. (unsigned long) (end - pos));
  391. }
  392. eap_gpsk_state(data, GPSK_3);
  393. }
  394. static void eap_gpsk_process_gpsk_4(struct eap_sm *sm,
  395. struct eap_gpsk_data *data,
  396. const u8 *payload, size_t payloadlen)
  397. {
  398. const u8 *pos, *end;
  399. u16 alen;
  400. size_t miclen;
  401. u8 mic[EAP_GPSK_MAX_MIC_LEN];
  402. if (data->state != GPSK_3)
  403. return;
  404. wpa_printf(MSG_DEBUG, "EAP-GPSK: Received Response/GPSK-4");
  405. pos = payload;
  406. end = payload + payloadlen;
  407. if (end - pos < 2) {
  408. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  409. "PD_Payload_1 length");
  410. eap_gpsk_state(data, FAILURE);
  411. return;
  412. }
  413. alen = WPA_GET_BE16(pos);
  414. pos += 2;
  415. if (end - pos < alen) {
  416. wpa_printf(MSG_DEBUG, "EAP-GPSK: Too short message for "
  417. "PD_Payload_1");
  418. eap_gpsk_state(data, FAILURE);
  419. return;
  420. }
  421. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: PD_Payload_1", pos, alen);
  422. pos += alen;
  423. miclen = eap_gpsk_mic_len(data->vendor, data->specifier);
  424. if (end - pos < (int) miclen) {
  425. wpa_printf(MSG_DEBUG, "EAP-GPSK: Message too short for MIC "
  426. "(left=%lu miclen=%lu)",
  427. (unsigned long) (end - pos),
  428. (unsigned long) miclen);
  429. eap_gpsk_state(data, FAILURE);
  430. return;
  431. }
  432. if (eap_gpsk_compute_mic(data->sk, data->sk_len, data->vendor,
  433. data->specifier, payload, pos - payload, mic)
  434. < 0) {
  435. wpa_printf(MSG_DEBUG, "EAP-GPSK: Failed to compute MIC");
  436. eap_gpsk_state(data, FAILURE);
  437. return;
  438. }
  439. if (os_memcmp(mic, pos, miclen) != 0) {
  440. wpa_printf(MSG_INFO, "EAP-GPSK: Incorrect MIC in GPSK-4");
  441. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Received MIC", pos, miclen);
  442. wpa_hexdump(MSG_DEBUG, "EAP-GPSK: Computed MIC", mic, miclen);
  443. eap_gpsk_state(data, FAILURE);
  444. return;
  445. }
  446. pos += miclen;
  447. if (pos != end) {
  448. wpa_printf(MSG_DEBUG, "EAP-GPSK: Ignored %lu bytes of extra "
  449. "data in the end of GPSK-4",
  450. (unsigned long) (end - pos));
  451. }
  452. eap_gpsk_state(data, SUCCESS);
  453. }
  454. static void eap_gpsk_process(struct eap_sm *sm, void *priv,
  455. struct wpabuf *respData)
  456. {
  457. struct eap_gpsk_data *data = priv;
  458. const u8 *pos;
  459. size_t len;
  460. pos = eap_hdr_validate(EAP_VENDOR_IETF, EAP_TYPE_GPSK, respData, &len);
  461. if (pos == NULL || len < 1)
  462. return;
  463. switch (*pos) {
  464. case EAP_GPSK_OPCODE_GPSK_2:
  465. eap_gpsk_process_gpsk_2(sm, data, pos + 1, len - 1);
  466. break;
  467. case EAP_GPSK_OPCODE_GPSK_4:
  468. eap_gpsk_process_gpsk_4(sm, data, pos + 1, len - 1);
  469. break;
  470. }
  471. }
  472. static Boolean eap_gpsk_isDone(struct eap_sm *sm, void *priv)
  473. {
  474. struct eap_gpsk_data *data = priv;
  475. return data->state == SUCCESS || data->state == FAILURE;
  476. }
  477. static u8 * eap_gpsk_getKey(struct eap_sm *sm, void *priv, size_t *len)
  478. {
  479. struct eap_gpsk_data *data = priv;
  480. u8 *key;
  481. if (data->state != SUCCESS)
  482. return NULL;
  483. key = os_malloc(EAP_MSK_LEN);
  484. if (key == NULL)
  485. return NULL;
  486. os_memcpy(key, data->msk, EAP_MSK_LEN);
  487. *len = EAP_MSK_LEN;
  488. return key;
  489. }
  490. static u8 * eap_gpsk_get_emsk(struct eap_sm *sm, void *priv, size_t *len)
  491. {
  492. struct eap_gpsk_data *data = priv;
  493. u8 *key;
  494. if (data->state != SUCCESS)
  495. return NULL;
  496. key = os_malloc(EAP_EMSK_LEN);
  497. if (key == NULL)
  498. return NULL;
  499. os_memcpy(key, data->emsk, EAP_EMSK_LEN);
  500. *len = EAP_EMSK_LEN;
  501. return key;
  502. }
  503. static Boolean eap_gpsk_isSuccess(struct eap_sm *sm, void *priv)
  504. {
  505. struct eap_gpsk_data *data = priv;
  506. return data->state == SUCCESS;
  507. }
  508. int eap_server_gpsk_register(void)
  509. {
  510. struct eap_method *eap;
  511. int ret;
  512. eap = eap_server_method_alloc(EAP_SERVER_METHOD_INTERFACE_VERSION,
  513. EAP_VENDOR_IETF, EAP_TYPE_GPSK, "GPSK");
  514. if (eap == NULL)
  515. return -1;
  516. eap->init = eap_gpsk_init;
  517. eap->reset = eap_gpsk_reset;
  518. eap->buildReq = eap_gpsk_buildReq;
  519. eap->check = eap_gpsk_check;
  520. eap->process = eap_gpsk_process;
  521. eap->isDone = eap_gpsk_isDone;
  522. eap->getKey = eap_gpsk_getKey;
  523. eap->isSuccess = eap_gpsk_isSuccess;
  524. eap->get_emsk = eap_gpsk_get_emsk;
  525. ret = eap_server_method_register(eap);
  526. if (ret)
  527. eap_server_method_free(eap);
  528. return ret;
  529. }