summaryrefslogtreecommitdiff
path: root/src/charon/sa/authenticators/eap_authenticator.c
diff options
context:
space:
mode:
authorRene Mayrhofer <rene@mayrhofer.eu.org>2010-05-27 15:43:45 +0000
committerRene Mayrhofer <rene@mayrhofer.eu.org>2010-05-27 15:43:45 +0000
commit6c2828d075efdfc02348369149b4347447857c8c (patch)
tree6c9ec7c9f342792e5eb2c2973daa7bbbeb45362e /src/charon/sa/authenticators/eap_authenticator.c
parentcc7f376e575482c9a4866a4bd0c1f470394d740b (diff)
downloadvyos-strongswan-6c2828d075efdfc02348369149b4347447857c8c.tar.gz
vyos-strongswan-6c2828d075efdfc02348369149b4347447857c8c.zip
Remove leftovers after source code restructuring.
Diffstat (limited to 'src/charon/sa/authenticators/eap_authenticator.c')
-rw-r--r--src/charon/sa/authenticators/eap_authenticator.c705
1 files changed, 0 insertions, 705 deletions
diff --git a/src/charon/sa/authenticators/eap_authenticator.c b/src/charon/sa/authenticators/eap_authenticator.c
deleted file mode 100644
index 16911050a..000000000
--- a/src/charon/sa/authenticators/eap_authenticator.c
+++ /dev/null
@@ -1,705 +0,0 @@
-/*
- * Copyright (C) 2006-2009 Martin Willi
- * Hochschule fuer Technik Rapperswil
- *
- * This program is free software; you can redistribute it and/or modify it
- * under the terms of the GNU General Public License as published by the
- * Free Software Foundation; either version 2 of the License, or (at your
- * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
- *
- * This program is distributed in the hope that it will be useful, but
- * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
- * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
- * for more details.
- */
-
-#include "eap_authenticator.h"
-
-#include <daemon.h>
-#include <sa/authenticators/eap/eap_method.h>
-#include <encoding/payloads/auth_payload.h>
-#include <encoding/payloads/eap_payload.h>
-
-typedef struct private_eap_authenticator_t private_eap_authenticator_t;
-
-/**
- * Private data of an eap_authenticator_t object.
- */
-struct private_eap_authenticator_t {
-
- /**
- * Public authenticator_t interface.
- */
- eap_authenticator_t public;
-
- /**
- * Assigned IKE_SA
- */
- ike_sa_t *ike_sa;
-
- /**
- * others nonce to include in AUTH calculation
- */
- chunk_t received_nonce;
-
- /**
- * our nonce to include in AUTH calculation
- */
- chunk_t sent_nonce;
-
- /**
- * others IKE_SA_INIT message data to include in AUTH calculation
- */
- chunk_t received_init;
-
- /**
- * our IKE_SA_INIT message data to include in AUTH calculation
- */
- chunk_t sent_init;
-
- /**
- * Current EAP method processing
- */
- eap_method_t *method;
-
- /**
- * MSK used to build and verify auth payload
- */
- chunk_t msk;
-
- /**
- * EAP authentication method completed successfully
- */
- bool eap_complete;
-
- /**
- * Set if we require mutual EAP due EAP-only authentication
- */
- bool require_mutual;
-
- /**
- * authentication payload verified successfully
- */
- bool auth_complete;
-
- /**
- * generated EAP payload
- */
- eap_payload_t *eap_payload;
-
- /**
- * EAP identity of peer
- */
- identification_t *eap_identity;
-};
-
-/**
- * load an EAP method
- */
-static eap_method_t *load_method(private_eap_authenticator_t *this,
- eap_type_t type, u_int32_t vendor, eap_role_t role)
-{
- identification_t *server, *peer;
-
- if (role == EAP_SERVER)
- {
- server = this->ike_sa->get_my_id(this->ike_sa);
- peer = this->ike_sa->get_other_id(this->ike_sa);
- }
- else
- {
- server = this->ike_sa->get_other_id(this->ike_sa);
- peer = this->ike_sa->get_my_id(this->ike_sa);
- }
- if (this->eap_identity)
- {
- peer = this->eap_identity;
- }
- return charon->eap->create_instance(charon->eap, type, vendor,
- role, server, peer);
-}
-
-/**
- * Initiate EAP conversation as server
- */
-static eap_payload_t* server_initiate_eap(private_eap_authenticator_t *this,
- bool do_identity)
-{
- auth_cfg_t *auth;
- eap_type_t type;
- identification_t *id;
- u_int32_t vendor;
- eap_payload_t *out;
- char *action;
-
- auth = this->ike_sa->get_auth_cfg(this->ike_sa, FALSE);
-
- /* initiate EAP-Identity exchange if required */
- if (!this->eap_identity && do_identity)
- {
- id = auth->get(auth, AUTH_RULE_EAP_IDENTITY);
- if (id)
- {
- this->method = load_method(this, EAP_IDENTITY, 0, EAP_SERVER);
- if (this->method)
- {
- if (this->method->initiate(this->method, &out) == NEED_MORE)
- {
- DBG1(DBG_IKE, "initiating EAP-Identity request");
- return out;
- }
- this->method->destroy(this->method);
- }
- DBG1(DBG_IKE, "EAP-Identity request configured, but not supported");
- }
- }
- /* invoke real EAP method */
- type = (uintptr_t)auth->get(auth, AUTH_RULE_EAP_TYPE);
- vendor = (uintptr_t)auth->get(auth, AUTH_RULE_EAP_VENDOR);
- action = "loading";
- this->method = load_method(this, type, vendor, EAP_SERVER);
- if (this->method)
- {
- action = "initiating";
- if (this->method->initiate(this->method, &out) == NEED_MORE)
- {
- if (vendor)
- {
- DBG1(DBG_IKE, "initiating EAP vendor type %d-%d method",
- type, vendor);
- }
- else
- {
- DBG1(DBG_IKE, "initiating %N method", eap_type_names, type);
- }
- return out;
- }
- }
- if (vendor)
- {
- DBG1(DBG_IKE, "%s EAP vendor type %d-%d method failed",
- action, type, vendor);
- }
- else
- {
- DBG1(DBG_IKE, "%s %N method failed", action, eap_type_names, type);
- }
- return eap_payload_create_code(EAP_FAILURE, 0);
-}
-
-/**
- * Replace the existing EAP-Identity in other auth config
- */
-static void replace_eap_identity(private_eap_authenticator_t *this)
-{
- enumerator_t *enumerator;
- auth_rule_t rule;
- auth_cfg_t *cfg;
- void *ptr;
-
- cfg = this->ike_sa->get_auth_cfg(this->ike_sa, FALSE);
- enumerator = cfg->create_enumerator(cfg);
- while (enumerator->enumerate(enumerator, &rule, &ptr))
- {
- if (rule == AUTH_RULE_EAP_IDENTITY)
- {
- cfg->replace(cfg, enumerator, AUTH_RULE_EAP_IDENTITY,
- this->eap_identity->clone(this->eap_identity));
- break;
- }
- }
- enumerator->destroy(enumerator);
-}
-
-/**
- * Handle EAP exchange as server
- */
-static eap_payload_t* server_process_eap(private_eap_authenticator_t *this,
- eap_payload_t *in)
-{
- eap_type_t type, received_type;
- u_int32_t vendor, received_vendor;
- eap_payload_t *out;
- auth_cfg_t *cfg;
-
- if (in->get_code(in) != EAP_RESPONSE)
- {
- DBG1(DBG_IKE, "received %N, sending %N",
- eap_code_names, in->get_code(in), eap_code_names, EAP_FAILURE);
- return eap_payload_create_code(EAP_FAILURE, in->get_identifier(in));
- }
-
- type = this->method->get_type(this->method, &vendor);
- received_type = in->get_type(in, &received_vendor);
- if (type != received_type || vendor != received_vendor)
- {
- if (received_vendor == 0 && received_type == EAP_NAK)
- {
- DBG1(DBG_IKE, "received %N, sending %N",
- eap_type_names, EAP_NAK, eap_code_names, EAP_FAILURE);
- }
- else
- {
- DBG1(DBG_IKE, "received invalid EAP response, sending %N",
- eap_code_names, EAP_FAILURE);
- }
- return eap_payload_create_code(EAP_FAILURE, in->get_identifier(in));
- }
-
- switch (this->method->process(this->method, in, &out))
- {
- case NEED_MORE:
- return out;
- case SUCCESS:
- if (type == EAP_IDENTITY)
- {
- chunk_t data;
-
- if (this->method->get_msk(this->method, &data) == SUCCESS)
- {
- this->eap_identity = identification_create_from_data(data);
- DBG1(DBG_IKE, "received EAP identity '%Y'",
- this->eap_identity);
- replace_eap_identity(this);
- }
- /* restart EAP exchange, but with real method */
- this->method->destroy(this->method);
- return server_initiate_eap(this, FALSE);
- }
- if (this->method->get_msk(this->method, &this->msk) == SUCCESS)
- {
- this->msk = chunk_clone(this->msk);
- }
- if (vendor)
- {
- DBG1(DBG_IKE, "EAP vendor specific method %d-%d succeeded, "
- "%sMSK established", type, vendor,
- this->msk.ptr ? "" : "no ");
- }
- else
- {
- DBG1(DBG_IKE, "EAP method %N succeeded, %sMSK established",
- eap_type_names, type, this->msk.ptr ? "" : "no ");
- }
- this->ike_sa->set_condition(this->ike_sa, COND_EAP_AUTHENTICATED,
- TRUE);
- cfg = this->ike_sa->get_auth_cfg(this->ike_sa, FALSE);
- cfg->add(cfg, AUTH_RULE_EAP_TYPE, type);
- if (vendor)
- {
- cfg->add(cfg, AUTH_RULE_EAP_VENDOR, vendor);
- }
- this->eap_complete = TRUE;
- return eap_payload_create_code(EAP_SUCCESS, in->get_identifier(in));
- case FAILED:
- default:
- if (vendor)
- {
- DBG1(DBG_IKE, "EAP vendor specific method %d-%d failed for "
- "peer %Y", type, vendor,
- this->ike_sa->get_other_id(this->ike_sa));
- }
- else
- {
- DBG1(DBG_IKE, "EAP method %N failed for peer %Y",
- eap_type_names, type,
- this->ike_sa->get_other_id(this->ike_sa));
- }
- return eap_payload_create_code(EAP_FAILURE, in->get_identifier(in));
- }
-}
-
-/**
- * Processing method for a peer
- */
-static eap_payload_t* client_process_eap(private_eap_authenticator_t *this,
- eap_payload_t *in)
-{
- eap_type_t type;
- u_int32_t vendor;
- auth_cfg_t *auth;
- eap_payload_t *out;
- identification_t *id;
-
- type = in->get_type(in, &vendor);
-
- if (!vendor && type == EAP_IDENTITY)
- {
- DESTROY_IF(this->eap_identity);
- auth = this->ike_sa->get_auth_cfg(this->ike_sa, TRUE);
- id = auth->get(auth, AUTH_RULE_EAP_IDENTITY);
- if (!id || id->get_type(id) == ID_ANY)
- {
- id = this->ike_sa->get_my_id(this->ike_sa);
- }
- DBG1(DBG_IKE, "server requested %N, sending '%Y'",
- eap_type_names, type, id);
- this->eap_identity = id->clone(id);
-
- this->method = load_method(this, type, vendor, EAP_PEER);
- if (this->method)
- {
- if (this->method->process(this->method, in, &out) == SUCCESS)
- {
- this->method->destroy(this->method);
- this->method = NULL;
- return out;
- }
- this->method->destroy(this->method);
- this->method = NULL;
- }
- DBG1(DBG_IKE, "%N not supported, sending EAP_NAK",
- eap_type_names, type);
- return eap_payload_create_nak(in->get_identifier(in));
- }
- if (this->method == NULL)
- {
- if (vendor)
- {
- DBG1(DBG_IKE, "server requested vendor specific EAP method %d-%d",
- type, vendor);
- }
- else
- {
- DBG1(DBG_IKE, "server requested %N authentication",
- eap_type_names, type);
- }
- this->method = load_method(this, type, vendor, EAP_PEER);
- if (!this->method)
- {
- DBG1(DBG_IKE, "EAP method not supported, sending EAP_NAK");
- return eap_payload_create_nak(in->get_identifier(in));
- }
- }
-
- type = this->method->get_type(this->method, &vendor);
-
- if (this->method->process(this->method, in, &out) == NEED_MORE)
- { /* client methods should never return SUCCESS */
- return out;
- }
-
- if (vendor)
- {
- DBG1(DBG_IKE, "vendor specific EAP method %d-%d failed", type, vendor);
- }
- else
- {
- DBG1(DBG_IKE, "%N method failed", eap_type_names, type);
- }
- return NULL;
-}
-
-/**
- * Verify AUTH payload
- */
-static bool verify_auth(private_eap_authenticator_t *this, message_t *message,
- chunk_t nonce, chunk_t init)
-{
- auth_payload_t *auth_payload;
- chunk_t auth_data, recv_auth_data;
- identification_t *other_id;
- auth_cfg_t *auth;
- keymat_t *keymat;
-
- auth_payload = (auth_payload_t*)message->get_payload(message,
- AUTHENTICATION);
- if (!auth_payload)
- {
- DBG1(DBG_IKE, "AUTH payload missing");
- return FALSE;
- }
- other_id = this->ike_sa->get_other_id(this->ike_sa);
- keymat = this->ike_sa->get_keymat(this->ike_sa);
- auth_data = keymat->get_psk_sig(keymat, TRUE, init, nonce,
- this->msk, other_id);
- recv_auth_data = auth_payload->get_data(auth_payload);
- if (!auth_data.len || !chunk_equals(auth_data, recv_auth_data))
- {
- DBG1(DBG_IKE, "verification of AUTH payload with%s EAP MSK failed",
- this->msk.ptr ? "" : "out");
- chunk_free(&auth_data);
- return FALSE;
- }
- chunk_free(&auth_data);
-
- DBG1(DBG_IKE, "authentication of '%Y' with %N successful",
- other_id, auth_class_names, AUTH_CLASS_EAP);
- this->auth_complete = TRUE;
- auth = this->ike_sa->get_auth_cfg(this->ike_sa, FALSE);
- auth->add(auth, AUTH_RULE_AUTH_CLASS, AUTH_CLASS_EAP);
- return TRUE;
-}
-
-/**
- * Build AUTH payload
- */
-static void build_auth(private_eap_authenticator_t *this, message_t *message,
- chunk_t nonce, chunk_t init)
-{
- auth_payload_t *auth_payload;
- identification_t *my_id;
- chunk_t auth_data;
- keymat_t *keymat;
-
- my_id = this->ike_sa->get_my_id(this->ike_sa);
- keymat = this->ike_sa->get_keymat(this->ike_sa);
-
- DBG1(DBG_IKE, "authentication of '%Y' (myself) with %N",
- my_id, auth_class_names, AUTH_CLASS_EAP);
-
- auth_data = keymat->get_psk_sig(keymat, FALSE, init, nonce, this->msk, my_id);
- auth_payload = auth_payload_create();
- auth_payload->set_auth_method(auth_payload, AUTH_PSK);
- auth_payload->set_data(auth_payload, auth_data);
- message->add_payload(message, (payload_t*)auth_payload);
- chunk_free(&auth_data);
-}
-
-/**
- * Implementation of authenticator_t.process for a server
- */
-static status_t process_server(private_eap_authenticator_t *this,
- message_t *message)
-{
- eap_payload_t *eap_payload;
-
- if (this->eap_complete)
- {
- if (!verify_auth(this, message, this->sent_nonce, this->received_init))
- {
- return FAILED;
- }
- return NEED_MORE;
- }
-
- if (!this->method)
- {
- this->eap_payload = server_initiate_eap(this, TRUE);
- }
- else
- {
- eap_payload = (eap_payload_t*)message->get_payload(message,
- EXTENSIBLE_AUTHENTICATION);
- if (!eap_payload)
- {
- return FAILED;
- }
- this->eap_payload = server_process_eap(this, eap_payload);
- }
- return NEED_MORE;
-}
-
-/**
- * Implementation of authenticator_t.build for a server
- */
-static status_t build_server(private_eap_authenticator_t *this,
- message_t *message)
-{
- if (this->eap_payload)
- {
- eap_code_t code;
-
- code = this->eap_payload->get_code(this->eap_payload);
- message->add_payload(message, (payload_t*)this->eap_payload);
- this->eap_payload = NULL;
- if (code == EAP_FAILURE)
- {
- return FAILED;
- }
- return NEED_MORE;
- }
- if (this->eap_complete && this->auth_complete)
- {
- build_auth(this, message, this->received_nonce, this->sent_init);
- return SUCCESS;
- }
- return FAILED;
-}
-
-/**
- * Implementation of authenticator_t.process for a client
- */
-static status_t process_client(private_eap_authenticator_t *this,
- message_t *message)
-{
- eap_payload_t *eap_payload;
-
- if (this->eap_complete)
- {
- if (!verify_auth(this, message, this->sent_nonce, this->received_init))
- {
- return FAILED;
- }
- if (this->require_mutual && !this->method->is_mutual(this->method))
- { /* we require mutual authentication due to EAP-only */
- u_int32_t vendor;
-
- DBG1(DBG_IKE, "EAP-only authentication requires a mutual and "
- "MSK deriving EAP method, but %N is not",
- eap_type_names, this->method->get_type(this->method, &vendor));
- return FAILED;
- }
- return SUCCESS;
- }
-
- eap_payload = (eap_payload_t*)message->get_payload(message,
- EXTENSIBLE_AUTHENTICATION);
- if (eap_payload)
- {
- switch (eap_payload->get_code(eap_payload))
- {
- case EAP_REQUEST:
- {
- this->eap_payload = client_process_eap(this, eap_payload);
- if (this->eap_payload)
- {
- return NEED_MORE;
- }
- return FAILED;
- }
- case EAP_SUCCESS:
- {
- eap_type_t type;
- u_int32_t vendor;
- auth_cfg_t *cfg;
-
- if (this->method->get_msk(this->method, &this->msk) == SUCCESS)
- {
- this->msk = chunk_clone(this->msk);
- }
- type = this->method->get_type(this->method, &vendor);
- if (vendor)
- {
- DBG1(DBG_IKE, "EAP vendor specific method %d-%d succeeded, "
- "%sMSK established", type, vendor,
- this->msk.ptr ? "" : "no ");
- }
- else
- {
- DBG1(DBG_IKE, "EAP method %N succeeded, %sMSK established",
- eap_type_names, type, this->msk.ptr ? "" : "no ");
- }
- cfg = this->ike_sa->get_auth_cfg(this->ike_sa, TRUE);
- cfg->add(cfg, AUTH_RULE_EAP_TYPE, type);
- if (vendor)
- {
- cfg->add(cfg, AUTH_RULE_EAP_VENDOR, vendor);
- }
- this->eap_complete = TRUE;
- return NEED_MORE;
- }
- case EAP_FAILURE:
- default:
- {
- DBG1(DBG_IKE, "received %N, EAP authentication failed",
- eap_code_names, eap_payload->get_code(eap_payload));
- return FAILED;
- }
- }
- }
- return FAILED;
-}
-
-/**
- * Implementation of authenticator_t.build for a client
- */
-static status_t build_client(private_eap_authenticator_t *this,
- message_t *message)
-{
- if (this->eap_payload)
- {
- message->add_payload(message, (payload_t*)this->eap_payload);
- this->eap_payload = NULL;
- return NEED_MORE;
- }
- if (this->eap_complete)
- {
- build_auth(this, message, this->received_nonce, this->sent_init);
- return NEED_MORE;
- }
- return NEED_MORE;
-}
-
-/**
- * Implementation of authenticator_t.is_mutual.
- */
-static bool is_mutual(private_eap_authenticator_t *this)
-{
- /* we don't know yet, but insist on it after EAP is complete */
- this->require_mutual = TRUE;
- return TRUE;
-}
-
-/**
- * Implementation of authenticator_t.destroy.
- */
-static void destroy(private_eap_authenticator_t *this)
-{
- DESTROY_IF(this->method);
- DESTROY_IF(this->eap_payload);
- DESTROY_IF(this->eap_identity);
- chunk_free(&this->msk);
- free(this);
-}
-
-/*
- * Described in header.
- */
-eap_authenticator_t *eap_authenticator_create_builder(ike_sa_t *ike_sa,
- chunk_t received_nonce, chunk_t sent_nonce,
- chunk_t received_init, chunk_t sent_init)
-{
- private_eap_authenticator_t *this = malloc_thing(private_eap_authenticator_t);
-
- this->public.authenticator.build = (status_t(*)(authenticator_t*, message_t *message))build_client;
- this->public.authenticator.process = (status_t(*)(authenticator_t*, message_t *message))process_client;
- this->public.authenticator.is_mutual = (bool(*)(authenticator_t*))is_mutual;
- this->public.authenticator.destroy = (void(*)(authenticator_t*))destroy;
-
- this->ike_sa = ike_sa;
- this->received_init = received_init;
- this->received_nonce = received_nonce;
- this->sent_init = sent_init;
- this->sent_nonce = sent_nonce;
- this->msk = chunk_empty;
- this->method = NULL;
- this->eap_payload = NULL;
- this->eap_complete = FALSE;
- this->auth_complete = FALSE;
- this->eap_identity = NULL;
- this->require_mutual = FALSE;
-
- return &this->public;
-}
-
-/*
- * Described in header.
- */
-eap_authenticator_t *eap_authenticator_create_verifier(ike_sa_t *ike_sa,
- chunk_t received_nonce, chunk_t sent_nonce,
- chunk_t received_init, chunk_t sent_init)
-{
- private_eap_authenticator_t *this = malloc_thing(private_eap_authenticator_t);
-
- this->public.authenticator.build = (status_t(*)(authenticator_t*, message_t *messageh))build_server;
- this->public.authenticator.process = (status_t(*)(authenticator_t*, message_t *message))process_server;
- this->public.authenticator.is_mutual = (bool(*)(authenticator_t*))is_mutual;
- this->public.authenticator.destroy = (void(*)(authenticator_t*))destroy;
-
- this->ike_sa = ike_sa;
- this->received_init = received_init;
- this->received_nonce = received_nonce;
- this->sent_init = sent_init;
- this->sent_nonce = sent_nonce;
- this->msk = chunk_empty;
- this->method = NULL;
- this->eap_payload = NULL;
- this->eap_complete = FALSE;
- this->auth_complete = FALSE;
- this->eap_identity = NULL;
- this->require_mutual = FALSE;
-
- return &this->public;
-}
-