blob: df9f5ab2f7a27ffc5e9bf3292e464e186461a99e [file] [log] [blame]
/*
*
* Wireless daemon for Linux
*
* Copyright (C) 2016-2019 Intel Corporation. All rights reserved.
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation; either
* version 2.1 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
*
*/
#ifdef HAVE_CONFIG_H
#include <config.h>
#endif
#include <stdio.h>
#include <errno.h>
#include <ell/ell.h>
#include "src/missing.h"
#include "src/eap.h"
#include "src/eap-private.h"
struct eap_md5_state {
char *secret;
};
static void eap_md5_free(struct eap_state *eap)
{
struct eap_md5_state *md5 = eap_get_data(eap);
eap_set_data(eap, NULL);
if (md5->secret)
explicit_bzero(md5->secret, strlen(md5->secret));
l_free(md5->secret);
l_free(md5);
}
static void eap_md5_handle_request(struct eap_state *eap,
const uint8_t *pkt, size_t len)
{
struct eap_md5_state *md5 = eap_get_data(eap);
const uint8_t *value;
struct l_checksum *hash;
uint8_t identifier, response[5 + 1 + 16];
if (len < 1 || len < (size_t) pkt[0] + 1 || pkt[0] < 1) {
l_error("EAP-MD5 request too short");
goto err;
}
value = pkt + 1;
hash = l_checksum_new(L_CHECKSUM_MD5);
if (!hash) {
l_error("Can't create the MD5 checksum");
goto err;
}
eap_save_last_id(eap, &identifier);
l_checksum_update(hash, &identifier, 1);
l_checksum_update(hash, md5->secret, strlen(md5->secret));
l_checksum_update(hash, value, pkt[0]);
response[5] = 16;
l_checksum_get_digest(hash, response + 6, 16);
l_checksum_free(hash);
eap_method_respond(eap, response, sizeof(response));
/* We have no choice but to call it a success */
eap_method_success(eap);
return;
err:
eap_method_error(eap);
}
static int eap_md5_check_settings(struct l_settings *settings,
struct l_queue *secrets,
const char *prefix,
struct l_queue **out_missing)
{
const struct eap_secret_info *secret;
char identity_key[72];
char password_key[72];
char password_key_old[72];
L_AUTO_FREE_VAR(char *, identity);
L_AUTO_FREE_VAR(char *, password) = NULL;
snprintf(identity_key, sizeof(identity_key), "%sIdentity", prefix);
snprintf(password_key, sizeof(password_key), "%sPassword", prefix);
identity = l_settings_get_string(settings, "Security", identity_key);
if (!identity) {
secret = l_queue_find(secrets, eap_secret_info_match,
identity_key);
if (secret)
return 0;
eap_append_secret(out_missing, EAP_SECRET_REMOTE_USER_PASSWORD,
identity_key, password_key, NULL,
EAP_CACHE_TEMPORARY);
return 0;
}
password = l_settings_get_string(settings, "Security", password_key);
if (!password) {
snprintf(password_key_old, sizeof(password_key_old),
"%sMD5-Secret", prefix);
password = l_settings_get_string(settings, "Security",
password_key_old);
if (password) {
explicit_bzero(password, strlen(password));
l_warn("Setting '%s' is deprecated, use '%s' instead",
password_key_old, password_key);
return 0;
}
secret = l_queue_find(secrets, eap_secret_info_match,
password_key);
if (secret)
return 0;
eap_append_secret(out_missing, EAP_SECRET_REMOTE_PASSWORD,
password_key, NULL, identity,
EAP_CACHE_TEMPORARY);
} else
explicit_bzero(password, strlen(password));
return 0;
}
static bool eap_md5_load_settings(struct eap_state *eap,
struct l_settings *settings,
const char *prefix)
{
struct eap_md5_state *md5;
char password_key[72];
char *secret;
snprintf(password_key, sizeof(password_key), "%sPassword", prefix);
secret = l_settings_get_string(settings, "Security", password_key);
if (!secret) {
snprintf(password_key, sizeof(password_key), "%sMD5-Secret",
prefix);
secret = l_settings_get_string(settings, "Security",
password_key);
if (!secret)
return false;
}
md5 = l_new(struct eap_md5_state, 1);
md5->secret = secret;
eap_set_data(eap, md5);
return true;
}
static struct eap_method eap_md5 = {
.request_type = EAP_TYPE_MD5_CHALLENGE,
.exports_msk = false,
.name = "MD5",
.free = eap_md5_free,
.handle_request = eap_md5_handle_request,
.check_settings = eap_md5_check_settings,
.load_settings = eap_md5_load_settings,
};
static int eap_md5_init(void)
{
l_debug("");
return eap_register_method(&eap_md5);
}
static void eap_md5_exit(void)
{
l_debug("");
eap_unregister_method(&eap_md5);
}
EAP_METHOD_BUILTIN(eap_md5, eap_md5_init, eap_md5_exit)