Racelogic / Mbed 2 deprecated VIPS_LTC_RAW_IMU

Dependencies:   BufferedSerial FatFileSystemCpp mbed

Committer:
JamieB
Date:
Tue Nov 16 19:01:34 2021 +0000
Revision:
66:066b16c6c34f
Parent:
22:0dd9c1b5664a
Changed Buffered Serial to Read Raw Serial in RX Interrupt

Who changed what in which revision?

UserRevisionLine numberNew contents of line
AndyA 22:0dd9c1b5664a 1 /*** WARNING - THIS HAS NEVER BEEN FINISHED ***/
AndyA 22:0dd9c1b5664a 2 /*****************************************************************************
AndyA 22:0dd9c1b5664a 3 * chap.c - Network Challenge Handshake Authentication Protocol program file.
AndyA 22:0dd9c1b5664a 4 *
AndyA 22:0dd9c1b5664a 5 * Copyright (c) 2003 by Marc Boucher, Services Informatiques (MBSI) inc.
AndyA 22:0dd9c1b5664a 6 * portions Copyright (c) 1997 by Global Election Systems Inc.
AndyA 22:0dd9c1b5664a 7 *
AndyA 22:0dd9c1b5664a 8 * The authors hereby grant permission to use, copy, modify, distribute,
AndyA 22:0dd9c1b5664a 9 * and license this software and its documentation for any purpose, provided
AndyA 22:0dd9c1b5664a 10 * that existing copyright notices are retained in all copies and that this
AndyA 22:0dd9c1b5664a 11 * notice and the following disclaimer are included verbatim in any
AndyA 22:0dd9c1b5664a 12 * distributions. No written agreement, license, or royalty fee is required
AndyA 22:0dd9c1b5664a 13 * for any of the authorized uses.
AndyA 22:0dd9c1b5664a 14 *
AndyA 22:0dd9c1b5664a 15 * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS *AS IS* AND ANY EXPRESS OR
AndyA 22:0dd9c1b5664a 16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
AndyA 22:0dd9c1b5664a 17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
AndyA 22:0dd9c1b5664a 18 * IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
AndyA 22:0dd9c1b5664a 19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
AndyA 22:0dd9c1b5664a 20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
AndyA 22:0dd9c1b5664a 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
AndyA 22:0dd9c1b5664a 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
AndyA 22:0dd9c1b5664a 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
AndyA 22:0dd9c1b5664a 24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
AndyA 22:0dd9c1b5664a 25 *
AndyA 22:0dd9c1b5664a 26 ******************************************************************************
AndyA 22:0dd9c1b5664a 27 * REVISION HISTORY
AndyA 22:0dd9c1b5664a 28 *
AndyA 22:0dd9c1b5664a 29 * 03-01-01 Marc Boucher <marc@mbsi.ca>
AndyA 22:0dd9c1b5664a 30 * Ported to lwIP.
AndyA 22:0dd9c1b5664a 31 * 97-12-04 Guy Lancaster <lancasterg@acm.org>, Global Election Systems Inc.
AndyA 22:0dd9c1b5664a 32 * Original based on BSD chap.c.
AndyA 22:0dd9c1b5664a 33 *****************************************************************************/
AndyA 22:0dd9c1b5664a 34 /*
AndyA 22:0dd9c1b5664a 35 * chap.c - Challenge Handshake Authentication Protocol.
AndyA 22:0dd9c1b5664a 36 *
AndyA 22:0dd9c1b5664a 37 * Copyright (c) 1993 The Australian National University.
AndyA 22:0dd9c1b5664a 38 * All rights reserved.
AndyA 22:0dd9c1b5664a 39 *
AndyA 22:0dd9c1b5664a 40 * Redistribution and use in source and binary forms are permitted
AndyA 22:0dd9c1b5664a 41 * provided that the above copyright notice and this paragraph are
AndyA 22:0dd9c1b5664a 42 * duplicated in all such forms and that any documentation,
AndyA 22:0dd9c1b5664a 43 * advertising materials, and other materials related to such
AndyA 22:0dd9c1b5664a 44 * distribution and use acknowledge that the software was developed
AndyA 22:0dd9c1b5664a 45 * by the Australian National University. The name of the University
AndyA 22:0dd9c1b5664a 46 * may not be used to endorse or promote products derived from this
AndyA 22:0dd9c1b5664a 47 * software without specific prior written permission.
AndyA 22:0dd9c1b5664a 48 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
AndyA 22:0dd9c1b5664a 49 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
AndyA 22:0dd9c1b5664a 50 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
AndyA 22:0dd9c1b5664a 51 *
AndyA 22:0dd9c1b5664a 52 * Copyright (c) 1991 Gregory M. Christy.
AndyA 22:0dd9c1b5664a 53 * All rights reserved.
AndyA 22:0dd9c1b5664a 54 *
AndyA 22:0dd9c1b5664a 55 * Redistribution and use in source and binary forms are permitted
AndyA 22:0dd9c1b5664a 56 * provided that the above copyright notice and this paragraph are
AndyA 22:0dd9c1b5664a 57 * duplicated in all such forms and that any documentation,
AndyA 22:0dd9c1b5664a 58 * advertising materials, and other materials related to such
AndyA 22:0dd9c1b5664a 59 * distribution and use acknowledge that the software was developed
AndyA 22:0dd9c1b5664a 60 * by Gregory M. Christy. The name of the author may not be used to
AndyA 22:0dd9c1b5664a 61 * endorse or promote products derived from this software without
AndyA 22:0dd9c1b5664a 62 * specific prior written permission.
AndyA 22:0dd9c1b5664a 63 *
AndyA 22:0dd9c1b5664a 64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
AndyA 22:0dd9c1b5664a 65 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
AndyA 22:0dd9c1b5664a 66 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
AndyA 22:0dd9c1b5664a 67 */
AndyA 22:0dd9c1b5664a 68
AndyA 22:0dd9c1b5664a 69 #include "lwip/opt.h"
AndyA 22:0dd9c1b5664a 70
AndyA 22:0dd9c1b5664a 71 #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
AndyA 22:0dd9c1b5664a 72
AndyA 22:0dd9c1b5664a 73 #if CHAP_SUPPORT /* don't build if not configured for use in lwipopts.h */
AndyA 22:0dd9c1b5664a 74
AndyA 22:0dd9c1b5664a 75 #include "ppp.h"
AndyA 22:0dd9c1b5664a 76 #include "pppdebug.h"
AndyA 22:0dd9c1b5664a 77
AndyA 22:0dd9c1b5664a 78 #include "magic.h"
AndyA 22:0dd9c1b5664a 79 #include "randm.h"
AndyA 22:0dd9c1b5664a 80 #include "auth.h"
AndyA 22:0dd9c1b5664a 81 #include "md5.h"
AndyA 22:0dd9c1b5664a 82 #include "chap.h"
AndyA 22:0dd9c1b5664a 83 #include "chpms.h"
AndyA 22:0dd9c1b5664a 84
AndyA 22:0dd9c1b5664a 85 #include <string.h>
AndyA 22:0dd9c1b5664a 86
AndyA 22:0dd9c1b5664a 87 #if 0 /* UNUSED */
AndyA 22:0dd9c1b5664a 88 /*
AndyA 22:0dd9c1b5664a 89 * Command-line options.
AndyA 22:0dd9c1b5664a 90 */
AndyA 22:0dd9c1b5664a 91 static option_t chap_option_list[] = {
AndyA 22:0dd9c1b5664a 92 { "chap-restart", o_int, &chap[0].timeouttime,
AndyA 22:0dd9c1b5664a 93 "Set timeout for CHAP" },
AndyA 22:0dd9c1b5664a 94 { "chap-max-challenge", o_int, &chap[0].max_transmits,
AndyA 22:0dd9c1b5664a 95 "Set max #xmits for challenge" },
AndyA 22:0dd9c1b5664a 96 { "chap-interval", o_int, &chap[0].chal_interval,
AndyA 22:0dd9c1b5664a 97 "Set interval for rechallenge" },
AndyA 22:0dd9c1b5664a 98 #ifdef MSLANMAN
AndyA 22:0dd9c1b5664a 99 { "ms-lanman", o_bool, &ms_lanman,
AndyA 22:0dd9c1b5664a 100 "Use LanMan passwd when using MS-CHAP", 1 },
AndyA 22:0dd9c1b5664a 101 #endif
AndyA 22:0dd9c1b5664a 102 { NULL }
AndyA 22:0dd9c1b5664a 103 };
AndyA 22:0dd9c1b5664a 104 #endif /* UNUSED */
AndyA 22:0dd9c1b5664a 105
AndyA 22:0dd9c1b5664a 106 /*
AndyA 22:0dd9c1b5664a 107 * Protocol entry points.
AndyA 22:0dd9c1b5664a 108 */
AndyA 22:0dd9c1b5664a 109 static void ChapInit (int);
AndyA 22:0dd9c1b5664a 110 static void ChapLowerUp (int);
AndyA 22:0dd9c1b5664a 111 static void ChapLowerDown (int);
AndyA 22:0dd9c1b5664a 112 static void ChapInput (int, u_char *, int);
AndyA 22:0dd9c1b5664a 113 static void ChapProtocolReject (int);
AndyA 22:0dd9c1b5664a 114 #if PPP_ADDITIONAL_CALLBACKS
AndyA 22:0dd9c1b5664a 115 static int ChapPrintPkt (u_char *, int, void (*) (void *, char *, ...), void *);
AndyA 22:0dd9c1b5664a 116 #endif
AndyA 22:0dd9c1b5664a 117
AndyA 22:0dd9c1b5664a 118 struct protent chap_protent = {
AndyA 22:0dd9c1b5664a 119 PPP_CHAP,
AndyA 22:0dd9c1b5664a 120 ChapInit,
AndyA 22:0dd9c1b5664a 121 ChapInput,
AndyA 22:0dd9c1b5664a 122 ChapProtocolReject,
AndyA 22:0dd9c1b5664a 123 ChapLowerUp,
AndyA 22:0dd9c1b5664a 124 ChapLowerDown,
AndyA 22:0dd9c1b5664a 125 NULL,
AndyA 22:0dd9c1b5664a 126 NULL,
AndyA 22:0dd9c1b5664a 127 #if PPP_ADDITIONAL_CALLBACKS
AndyA 22:0dd9c1b5664a 128 ChapPrintPkt,
AndyA 22:0dd9c1b5664a 129 NULL,
AndyA 22:0dd9c1b5664a 130 #endif /* PPP_ADDITIONAL_CALLBACKS */
AndyA 22:0dd9c1b5664a 131 1,
AndyA 22:0dd9c1b5664a 132 "CHAP",
AndyA 22:0dd9c1b5664a 133 #if PPP_ADDITIONAL_CALLBACKS
AndyA 22:0dd9c1b5664a 134 NULL,
AndyA 22:0dd9c1b5664a 135 NULL,
AndyA 22:0dd9c1b5664a 136 NULL
AndyA 22:0dd9c1b5664a 137 #endif /* PPP_ADDITIONAL_CALLBACKS */
AndyA 22:0dd9c1b5664a 138 };
AndyA 22:0dd9c1b5664a 139
AndyA 22:0dd9c1b5664a 140 chap_state chap[NUM_PPP]; /* CHAP state; one for each unit */
AndyA 22:0dd9c1b5664a 141
AndyA 22:0dd9c1b5664a 142 static void ChapChallengeTimeout (void *);
AndyA 22:0dd9c1b5664a 143 static void ChapResponseTimeout (void *);
AndyA 22:0dd9c1b5664a 144 static void ChapReceiveChallenge (chap_state *, u_char *, u_char, int);
AndyA 22:0dd9c1b5664a 145 static void ChapRechallenge (void *);
AndyA 22:0dd9c1b5664a 146 static void ChapReceiveResponse (chap_state *, u_char *, int, int);
AndyA 22:0dd9c1b5664a 147 static void ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len);
AndyA 22:0dd9c1b5664a 148 static void ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len);
AndyA 22:0dd9c1b5664a 149 static void ChapSendStatus (chap_state *, int);
AndyA 22:0dd9c1b5664a 150 static void ChapSendChallenge (chap_state *);
AndyA 22:0dd9c1b5664a 151 static void ChapSendResponse (chap_state *);
AndyA 22:0dd9c1b5664a 152 static void ChapGenChallenge (chap_state *);
AndyA 22:0dd9c1b5664a 153
AndyA 22:0dd9c1b5664a 154 /*
AndyA 22:0dd9c1b5664a 155 * ChapInit - Initialize a CHAP unit.
AndyA 22:0dd9c1b5664a 156 */
AndyA 22:0dd9c1b5664a 157 static void
AndyA 22:0dd9c1b5664a 158 ChapInit(int unit)
AndyA 22:0dd9c1b5664a 159 {
AndyA 22:0dd9c1b5664a 160 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 161
AndyA 22:0dd9c1b5664a 162 BZERO(cstate, sizeof(*cstate));
AndyA 22:0dd9c1b5664a 163 cstate->unit = unit;
AndyA 22:0dd9c1b5664a 164 cstate->clientstate = CHAPCS_INITIAL;
AndyA 22:0dd9c1b5664a 165 cstate->serverstate = CHAPSS_INITIAL;
AndyA 22:0dd9c1b5664a 166 cstate->timeouttime = CHAP_DEFTIMEOUT;
AndyA 22:0dd9c1b5664a 167 cstate->max_transmits = CHAP_DEFTRANSMITS;
AndyA 22:0dd9c1b5664a 168 /* random number generator is initialized in magic_init */
AndyA 22:0dd9c1b5664a 169 }
AndyA 22:0dd9c1b5664a 170
AndyA 22:0dd9c1b5664a 171
AndyA 22:0dd9c1b5664a 172 /*
AndyA 22:0dd9c1b5664a 173 * ChapAuthWithPeer - Authenticate us with our peer (start client).
AndyA 22:0dd9c1b5664a 174 *
AndyA 22:0dd9c1b5664a 175 */
AndyA 22:0dd9c1b5664a 176 void
AndyA 22:0dd9c1b5664a 177 ChapAuthWithPeer(int unit, char *our_name, u_char digest)
AndyA 22:0dd9c1b5664a 178 {
AndyA 22:0dd9c1b5664a 179 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 180
AndyA 22:0dd9c1b5664a 181 cstate->resp_name = our_name;
AndyA 22:0dd9c1b5664a 182 cstate->resp_type = digest;
AndyA 22:0dd9c1b5664a 183
AndyA 22:0dd9c1b5664a 184 if (cstate->clientstate == CHAPCS_INITIAL ||
AndyA 22:0dd9c1b5664a 185 cstate->clientstate == CHAPCS_PENDING) {
AndyA 22:0dd9c1b5664a 186 /* lower layer isn't up - wait until later */
AndyA 22:0dd9c1b5664a 187 cstate->clientstate = CHAPCS_PENDING;
AndyA 22:0dd9c1b5664a 188 return;
AndyA 22:0dd9c1b5664a 189 }
AndyA 22:0dd9c1b5664a 190
AndyA 22:0dd9c1b5664a 191 /*
AndyA 22:0dd9c1b5664a 192 * We get here as a result of LCP coming up.
AndyA 22:0dd9c1b5664a 193 * So even if CHAP was open before, we will
AndyA 22:0dd9c1b5664a 194 * have to re-authenticate ourselves.
AndyA 22:0dd9c1b5664a 195 */
AndyA 22:0dd9c1b5664a 196 cstate->clientstate = CHAPCS_LISTEN;
AndyA 22:0dd9c1b5664a 197 }
AndyA 22:0dd9c1b5664a 198
AndyA 22:0dd9c1b5664a 199
AndyA 22:0dd9c1b5664a 200 /*
AndyA 22:0dd9c1b5664a 201 * ChapAuthPeer - Authenticate our peer (start server).
AndyA 22:0dd9c1b5664a 202 */
AndyA 22:0dd9c1b5664a 203 void
AndyA 22:0dd9c1b5664a 204 ChapAuthPeer(int unit, char *our_name, u_char digest)
AndyA 22:0dd9c1b5664a 205 {
AndyA 22:0dd9c1b5664a 206 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 207
AndyA 22:0dd9c1b5664a 208 cstate->chal_name = our_name;
AndyA 22:0dd9c1b5664a 209 cstate->chal_type = digest;
AndyA 22:0dd9c1b5664a 210
AndyA 22:0dd9c1b5664a 211 if (cstate->serverstate == CHAPSS_INITIAL ||
AndyA 22:0dd9c1b5664a 212 cstate->serverstate == CHAPSS_PENDING) {
AndyA 22:0dd9c1b5664a 213 /* lower layer isn't up - wait until later */
AndyA 22:0dd9c1b5664a 214 cstate->serverstate = CHAPSS_PENDING;
AndyA 22:0dd9c1b5664a 215 return;
AndyA 22:0dd9c1b5664a 216 }
AndyA 22:0dd9c1b5664a 217
AndyA 22:0dd9c1b5664a 218 ChapGenChallenge(cstate);
AndyA 22:0dd9c1b5664a 219 ChapSendChallenge(cstate); /* crank it up dude! */
AndyA 22:0dd9c1b5664a 220 cstate->serverstate = CHAPSS_INITIAL_CHAL;
AndyA 22:0dd9c1b5664a 221 }
AndyA 22:0dd9c1b5664a 222
AndyA 22:0dd9c1b5664a 223
AndyA 22:0dd9c1b5664a 224 /*
AndyA 22:0dd9c1b5664a 225 * ChapChallengeTimeout - Timeout expired on sending challenge.
AndyA 22:0dd9c1b5664a 226 */
AndyA 22:0dd9c1b5664a 227 static void
AndyA 22:0dd9c1b5664a 228 ChapChallengeTimeout(void *arg)
AndyA 22:0dd9c1b5664a 229 {
AndyA 22:0dd9c1b5664a 230 chap_state *cstate = (chap_state *) arg;
AndyA 22:0dd9c1b5664a 231
AndyA 22:0dd9c1b5664a 232 /* if we aren't sending challenges, don't worry. then again we */
AndyA 22:0dd9c1b5664a 233 /* probably shouldn't be here either */
AndyA 22:0dd9c1b5664a 234 if (cstate->serverstate != CHAPSS_INITIAL_CHAL &&
AndyA 22:0dd9c1b5664a 235 cstate->serverstate != CHAPSS_RECHALLENGE) {
AndyA 22:0dd9c1b5664a 236 return;
AndyA 22:0dd9c1b5664a 237 }
AndyA 22:0dd9c1b5664a 238
AndyA 22:0dd9c1b5664a 239 if (cstate->chal_transmits >= cstate->max_transmits) {
AndyA 22:0dd9c1b5664a 240 /* give up on peer */
AndyA 22:0dd9c1b5664a 241 CHAPDEBUG(LOG_ERR, ("Peer failed to respond to CHAP challenge\n"));
AndyA 22:0dd9c1b5664a 242 cstate->serverstate = CHAPSS_BADAUTH;
AndyA 22:0dd9c1b5664a 243 auth_peer_fail(cstate->unit, PPP_CHAP);
AndyA 22:0dd9c1b5664a 244 return;
AndyA 22:0dd9c1b5664a 245 }
AndyA 22:0dd9c1b5664a 246
AndyA 22:0dd9c1b5664a 247 ChapSendChallenge(cstate); /* Re-send challenge */
AndyA 22:0dd9c1b5664a 248 }
AndyA 22:0dd9c1b5664a 249
AndyA 22:0dd9c1b5664a 250
AndyA 22:0dd9c1b5664a 251 /*
AndyA 22:0dd9c1b5664a 252 * ChapResponseTimeout - Timeout expired on sending response.
AndyA 22:0dd9c1b5664a 253 */
AndyA 22:0dd9c1b5664a 254 static void
AndyA 22:0dd9c1b5664a 255 ChapResponseTimeout(void *arg)
AndyA 22:0dd9c1b5664a 256 {
AndyA 22:0dd9c1b5664a 257 chap_state *cstate = (chap_state *) arg;
AndyA 22:0dd9c1b5664a 258
AndyA 22:0dd9c1b5664a 259 /* if we aren't sending a response, don't worry. */
AndyA 22:0dd9c1b5664a 260 if (cstate->clientstate != CHAPCS_RESPONSE) {
AndyA 22:0dd9c1b5664a 261 return;
AndyA 22:0dd9c1b5664a 262 }
AndyA 22:0dd9c1b5664a 263
AndyA 22:0dd9c1b5664a 264 ChapSendResponse(cstate); /* re-send response */
AndyA 22:0dd9c1b5664a 265 }
AndyA 22:0dd9c1b5664a 266
AndyA 22:0dd9c1b5664a 267
AndyA 22:0dd9c1b5664a 268 /*
AndyA 22:0dd9c1b5664a 269 * ChapRechallenge - Time to challenge the peer again.
AndyA 22:0dd9c1b5664a 270 */
AndyA 22:0dd9c1b5664a 271 static void
AndyA 22:0dd9c1b5664a 272 ChapRechallenge(void *arg)
AndyA 22:0dd9c1b5664a 273 {
AndyA 22:0dd9c1b5664a 274 chap_state *cstate = (chap_state *) arg;
AndyA 22:0dd9c1b5664a 275
AndyA 22:0dd9c1b5664a 276 /* if we aren't sending a response, don't worry. */
AndyA 22:0dd9c1b5664a 277 if (cstate->serverstate != CHAPSS_OPEN) {
AndyA 22:0dd9c1b5664a 278 return;
AndyA 22:0dd9c1b5664a 279 }
AndyA 22:0dd9c1b5664a 280
AndyA 22:0dd9c1b5664a 281 ChapGenChallenge(cstate);
AndyA 22:0dd9c1b5664a 282 ChapSendChallenge(cstate);
AndyA 22:0dd9c1b5664a 283 cstate->serverstate = CHAPSS_RECHALLENGE;
AndyA 22:0dd9c1b5664a 284 }
AndyA 22:0dd9c1b5664a 285
AndyA 22:0dd9c1b5664a 286
AndyA 22:0dd9c1b5664a 287 /*
AndyA 22:0dd9c1b5664a 288 * ChapLowerUp - The lower layer is up.
AndyA 22:0dd9c1b5664a 289 *
AndyA 22:0dd9c1b5664a 290 * Start up if we have pending requests.
AndyA 22:0dd9c1b5664a 291 */
AndyA 22:0dd9c1b5664a 292 static void
AndyA 22:0dd9c1b5664a 293 ChapLowerUp(int unit)
AndyA 22:0dd9c1b5664a 294 {
AndyA 22:0dd9c1b5664a 295 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 296
AndyA 22:0dd9c1b5664a 297 if (cstate->clientstate == CHAPCS_INITIAL) {
AndyA 22:0dd9c1b5664a 298 cstate->clientstate = CHAPCS_CLOSED;
AndyA 22:0dd9c1b5664a 299 } else if (cstate->clientstate == CHAPCS_PENDING) {
AndyA 22:0dd9c1b5664a 300 cstate->clientstate = CHAPCS_LISTEN;
AndyA 22:0dd9c1b5664a 301 }
AndyA 22:0dd9c1b5664a 302
AndyA 22:0dd9c1b5664a 303 if (cstate->serverstate == CHAPSS_INITIAL) {
AndyA 22:0dd9c1b5664a 304 cstate->serverstate = CHAPSS_CLOSED;
AndyA 22:0dd9c1b5664a 305 } else if (cstate->serverstate == CHAPSS_PENDING) {
AndyA 22:0dd9c1b5664a 306 ChapGenChallenge(cstate);
AndyA 22:0dd9c1b5664a 307 ChapSendChallenge(cstate);
AndyA 22:0dd9c1b5664a 308 cstate->serverstate = CHAPSS_INITIAL_CHAL;
AndyA 22:0dd9c1b5664a 309 }
AndyA 22:0dd9c1b5664a 310 }
AndyA 22:0dd9c1b5664a 311
AndyA 22:0dd9c1b5664a 312
AndyA 22:0dd9c1b5664a 313 /*
AndyA 22:0dd9c1b5664a 314 * ChapLowerDown - The lower layer is down.
AndyA 22:0dd9c1b5664a 315 *
AndyA 22:0dd9c1b5664a 316 * Cancel all timeouts.
AndyA 22:0dd9c1b5664a 317 */
AndyA 22:0dd9c1b5664a 318 static void
AndyA 22:0dd9c1b5664a 319 ChapLowerDown(int unit)
AndyA 22:0dd9c1b5664a 320 {
AndyA 22:0dd9c1b5664a 321 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 322
AndyA 22:0dd9c1b5664a 323 /* Timeout(s) pending? Cancel if so. */
AndyA 22:0dd9c1b5664a 324 if (cstate->serverstate == CHAPSS_INITIAL_CHAL ||
AndyA 22:0dd9c1b5664a 325 cstate->serverstate == CHAPSS_RECHALLENGE) {
AndyA 22:0dd9c1b5664a 326 UNTIMEOUT(ChapChallengeTimeout, cstate);
AndyA 22:0dd9c1b5664a 327 } else if (cstate->serverstate == CHAPSS_OPEN
AndyA 22:0dd9c1b5664a 328 && cstate->chal_interval != 0) {
AndyA 22:0dd9c1b5664a 329 UNTIMEOUT(ChapRechallenge, cstate);
AndyA 22:0dd9c1b5664a 330 }
AndyA 22:0dd9c1b5664a 331 if (cstate->clientstate == CHAPCS_RESPONSE) {
AndyA 22:0dd9c1b5664a 332 UNTIMEOUT(ChapResponseTimeout, cstate);
AndyA 22:0dd9c1b5664a 333 }
AndyA 22:0dd9c1b5664a 334 cstate->clientstate = CHAPCS_INITIAL;
AndyA 22:0dd9c1b5664a 335 cstate->serverstate = CHAPSS_INITIAL;
AndyA 22:0dd9c1b5664a 336 }
AndyA 22:0dd9c1b5664a 337
AndyA 22:0dd9c1b5664a 338
AndyA 22:0dd9c1b5664a 339 /*
AndyA 22:0dd9c1b5664a 340 * ChapProtocolReject - Peer doesn't grok CHAP.
AndyA 22:0dd9c1b5664a 341 */
AndyA 22:0dd9c1b5664a 342 static void
AndyA 22:0dd9c1b5664a 343 ChapProtocolReject(int unit)
AndyA 22:0dd9c1b5664a 344 {
AndyA 22:0dd9c1b5664a 345 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 346
AndyA 22:0dd9c1b5664a 347 if (cstate->serverstate != CHAPSS_INITIAL &&
AndyA 22:0dd9c1b5664a 348 cstate->serverstate != CHAPSS_CLOSED) {
AndyA 22:0dd9c1b5664a 349 auth_peer_fail(unit, PPP_CHAP);
AndyA 22:0dd9c1b5664a 350 }
AndyA 22:0dd9c1b5664a 351 if (cstate->clientstate != CHAPCS_INITIAL &&
AndyA 22:0dd9c1b5664a 352 cstate->clientstate != CHAPCS_CLOSED) {
AndyA 22:0dd9c1b5664a 353 auth_withpeer_fail(unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
AndyA 22:0dd9c1b5664a 354 }
AndyA 22:0dd9c1b5664a 355 ChapLowerDown(unit); /* shutdown chap */
AndyA 22:0dd9c1b5664a 356 }
AndyA 22:0dd9c1b5664a 357
AndyA 22:0dd9c1b5664a 358
AndyA 22:0dd9c1b5664a 359 /*
AndyA 22:0dd9c1b5664a 360 * ChapInput - Input CHAP packet.
AndyA 22:0dd9c1b5664a 361 */
AndyA 22:0dd9c1b5664a 362 static void
AndyA 22:0dd9c1b5664a 363 ChapInput(int unit, u_char *inpacket, int packet_len)
AndyA 22:0dd9c1b5664a 364 {
AndyA 22:0dd9c1b5664a 365 chap_state *cstate = &chap[unit];
AndyA 22:0dd9c1b5664a 366 u_char *inp;
AndyA 22:0dd9c1b5664a 367 u_char code, id;
AndyA 22:0dd9c1b5664a 368 int len;
AndyA 22:0dd9c1b5664a 369
AndyA 22:0dd9c1b5664a 370 /*
AndyA 22:0dd9c1b5664a 371 * Parse header (code, id and length).
AndyA 22:0dd9c1b5664a 372 * If packet too short, drop it.
AndyA 22:0dd9c1b5664a 373 */
AndyA 22:0dd9c1b5664a 374 inp = inpacket;
AndyA 22:0dd9c1b5664a 375 if (packet_len < CHAP_HEADERLEN) {
AndyA 22:0dd9c1b5664a 376 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short header.\n"));
AndyA 22:0dd9c1b5664a 377 return;
AndyA 22:0dd9c1b5664a 378 }
AndyA 22:0dd9c1b5664a 379 GETCHAR(code, inp);
AndyA 22:0dd9c1b5664a 380 GETCHAR(id, inp);
AndyA 22:0dd9c1b5664a 381 GETSHORT(len, inp);
AndyA 22:0dd9c1b5664a 382 if (len < CHAP_HEADERLEN) {
AndyA 22:0dd9c1b5664a 383 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd illegal length.\n"));
AndyA 22:0dd9c1b5664a 384 return;
AndyA 22:0dd9c1b5664a 385 }
AndyA 22:0dd9c1b5664a 386 if (len > packet_len) {
AndyA 22:0dd9c1b5664a 387 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short packet.\n"));
AndyA 22:0dd9c1b5664a 388 return;
AndyA 22:0dd9c1b5664a 389 }
AndyA 22:0dd9c1b5664a 390 len -= CHAP_HEADERLEN;
AndyA 22:0dd9c1b5664a 391
AndyA 22:0dd9c1b5664a 392 /*
AndyA 22:0dd9c1b5664a 393 * Action depends on code (as in fact it usually does :-).
AndyA 22:0dd9c1b5664a 394 */
AndyA 22:0dd9c1b5664a 395 switch (code) {
AndyA 22:0dd9c1b5664a 396 case CHAP_CHALLENGE:
AndyA 22:0dd9c1b5664a 397 ChapReceiveChallenge(cstate, inp, id, len);
AndyA 22:0dd9c1b5664a 398 break;
AndyA 22:0dd9c1b5664a 399
AndyA 22:0dd9c1b5664a 400 case CHAP_RESPONSE:
AndyA 22:0dd9c1b5664a 401 ChapReceiveResponse(cstate, inp, id, len);
AndyA 22:0dd9c1b5664a 402 break;
AndyA 22:0dd9c1b5664a 403
AndyA 22:0dd9c1b5664a 404 case CHAP_FAILURE:
AndyA 22:0dd9c1b5664a 405 ChapReceiveFailure(cstate, inp, id, len);
AndyA 22:0dd9c1b5664a 406 break;
AndyA 22:0dd9c1b5664a 407
AndyA 22:0dd9c1b5664a 408 case CHAP_SUCCESS:
AndyA 22:0dd9c1b5664a 409 ChapReceiveSuccess(cstate, inp, id, len);
AndyA 22:0dd9c1b5664a 410 break;
AndyA 22:0dd9c1b5664a 411
AndyA 22:0dd9c1b5664a 412 default: /* Need code reject? */
AndyA 22:0dd9c1b5664a 413 CHAPDEBUG(LOG_WARNING, ("Unknown CHAP code (%d) received.\n", code));
AndyA 22:0dd9c1b5664a 414 break;
AndyA 22:0dd9c1b5664a 415 }
AndyA 22:0dd9c1b5664a 416 }
AndyA 22:0dd9c1b5664a 417
AndyA 22:0dd9c1b5664a 418
AndyA 22:0dd9c1b5664a 419 /*
AndyA 22:0dd9c1b5664a 420 * ChapReceiveChallenge - Receive Challenge and send Response.
AndyA 22:0dd9c1b5664a 421 */
AndyA 22:0dd9c1b5664a 422 static void
AndyA 22:0dd9c1b5664a 423 ChapReceiveChallenge(chap_state *cstate, u_char *inp, u_char id, int len)
AndyA 22:0dd9c1b5664a 424 {
AndyA 22:0dd9c1b5664a 425 int rchallenge_len;
AndyA 22:0dd9c1b5664a 426 u_char *rchallenge;
AndyA 22:0dd9c1b5664a 427 int secret_len;
AndyA 22:0dd9c1b5664a 428 char secret[MAXSECRETLEN];
AndyA 22:0dd9c1b5664a 429 char rhostname[256];
AndyA 22:0dd9c1b5664a 430 MD5_CTX mdContext;
AndyA 22:0dd9c1b5664a 431 u_char hash[MD5_SIGNATURE_SIZE];
AndyA 22:0dd9c1b5664a 432
AndyA 22:0dd9c1b5664a 433 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: Rcvd id %d.\n", id));
AndyA 22:0dd9c1b5664a 434 if (cstate->clientstate == CHAPCS_CLOSED ||
AndyA 22:0dd9c1b5664a 435 cstate->clientstate == CHAPCS_PENDING) {
AndyA 22:0dd9c1b5664a 436 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: in state %d\n",
AndyA 22:0dd9c1b5664a 437 cstate->clientstate));
AndyA 22:0dd9c1b5664a 438 return;
AndyA 22:0dd9c1b5664a 439 }
AndyA 22:0dd9c1b5664a 440
AndyA 22:0dd9c1b5664a 441 if (len < 2) {
AndyA 22:0dd9c1b5664a 442 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
AndyA 22:0dd9c1b5664a 443 return;
AndyA 22:0dd9c1b5664a 444 }
AndyA 22:0dd9c1b5664a 445
AndyA 22:0dd9c1b5664a 446 GETCHAR(rchallenge_len, inp);
AndyA 22:0dd9c1b5664a 447 len -= sizeof (u_char) + rchallenge_len; /* now name field length */
AndyA 22:0dd9c1b5664a 448 if (len < 0) {
AndyA 22:0dd9c1b5664a 449 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
AndyA 22:0dd9c1b5664a 450 return;
AndyA 22:0dd9c1b5664a 451 }
AndyA 22:0dd9c1b5664a 452 rchallenge = inp;
AndyA 22:0dd9c1b5664a 453 INCPTR(rchallenge_len, inp);
AndyA 22:0dd9c1b5664a 454
AndyA 22:0dd9c1b5664a 455 if (len >= (int)sizeof(rhostname)) {
AndyA 22:0dd9c1b5664a 456 len = sizeof(rhostname) - 1;
AndyA 22:0dd9c1b5664a 457 }
AndyA 22:0dd9c1b5664a 458 BCOPY(inp, rhostname, len);
AndyA 22:0dd9c1b5664a 459 rhostname[len] = '\000';
AndyA 22:0dd9c1b5664a 460
AndyA 22:0dd9c1b5664a 461 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: received name field '%s'\n",
AndyA 22:0dd9c1b5664a 462 rhostname));
AndyA 22:0dd9c1b5664a 463
AndyA 22:0dd9c1b5664a 464 /* Microsoft doesn't send their name back in the PPP packet */
AndyA 22:0dd9c1b5664a 465 if (ppp_settings.remote_name[0] != 0 && (ppp_settings.explicit_remote || rhostname[0] == 0)) {
AndyA 22:0dd9c1b5664a 466 strncpy(rhostname, ppp_settings.remote_name, sizeof(rhostname));
AndyA 22:0dd9c1b5664a 467 rhostname[sizeof(rhostname) - 1] = 0;
AndyA 22:0dd9c1b5664a 468 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: using '%s' as remote name\n",
AndyA 22:0dd9c1b5664a 469 rhostname));
AndyA 22:0dd9c1b5664a 470 }
AndyA 22:0dd9c1b5664a 471
AndyA 22:0dd9c1b5664a 472 /* get secret for authenticating ourselves with the specified host */
AndyA 22:0dd9c1b5664a 473 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
AndyA 22:0dd9c1b5664a 474 secret, &secret_len, 0)) {
AndyA 22:0dd9c1b5664a 475 secret_len = 0; /* assume null secret if can't find one */
AndyA 22:0dd9c1b5664a 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
AndyA 22:0dd9c1b5664a 477 rhostname));
AndyA 22:0dd9c1b5664a 478 }
AndyA 22:0dd9c1b5664a 479
AndyA 22:0dd9c1b5664a 480 /* cancel response send timeout if necessary */
AndyA 22:0dd9c1b5664a 481 if (cstate->clientstate == CHAPCS_RESPONSE) {
AndyA 22:0dd9c1b5664a 482 UNTIMEOUT(ChapResponseTimeout, cstate);
AndyA 22:0dd9c1b5664a 483 }
AndyA 22:0dd9c1b5664a 484
AndyA 22:0dd9c1b5664a 485 cstate->resp_id = id;
AndyA 22:0dd9c1b5664a 486 cstate->resp_transmits = 0;
AndyA 22:0dd9c1b5664a 487
AndyA 22:0dd9c1b5664a 488 /* generate MD based on negotiated type */
AndyA 22:0dd9c1b5664a 489 switch (cstate->resp_type) {
AndyA 22:0dd9c1b5664a 490
AndyA 22:0dd9c1b5664a 491 case CHAP_DIGEST_MD5:
AndyA 22:0dd9c1b5664a 492 MD5Init(&mdContext);
AndyA 22:0dd9c1b5664a 493 MD5Update(&mdContext, &cstate->resp_id, 1);
AndyA 22:0dd9c1b5664a 494 MD5Update(&mdContext, (u_char*)secret, secret_len);
AndyA 22:0dd9c1b5664a 495 MD5Update(&mdContext, rchallenge, rchallenge_len);
AndyA 22:0dd9c1b5664a 496 MD5Final(hash, &mdContext);
AndyA 22:0dd9c1b5664a 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE);
AndyA 22:0dd9c1b5664a 498 cstate->resp_length = MD5_SIGNATURE_SIZE;
AndyA 22:0dd9c1b5664a 499 break;
AndyA 22:0dd9c1b5664a 500
AndyA 22:0dd9c1b5664a 501 #if MSCHAP_SUPPORT
AndyA 22:0dd9c1b5664a 502 case CHAP_MICROSOFT:
AndyA 22:0dd9c1b5664a 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
AndyA 22:0dd9c1b5664a 504 break;
AndyA 22:0dd9c1b5664a 505 #endif
AndyA 22:0dd9c1b5664a 506
AndyA 22:0dd9c1b5664a 507 default:
AndyA 22:0dd9c1b5664a 508 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->resp_type));
AndyA 22:0dd9c1b5664a 509 return;
AndyA 22:0dd9c1b5664a 510 }
AndyA 22:0dd9c1b5664a 511
AndyA 22:0dd9c1b5664a 512 BZERO(secret, sizeof(secret));
AndyA 22:0dd9c1b5664a 513 ChapSendResponse(cstate);
AndyA 22:0dd9c1b5664a 514 }
AndyA 22:0dd9c1b5664a 515
AndyA 22:0dd9c1b5664a 516
AndyA 22:0dd9c1b5664a 517 /*
AndyA 22:0dd9c1b5664a 518 * ChapReceiveResponse - Receive and process response.
AndyA 22:0dd9c1b5664a 519 */
AndyA 22:0dd9c1b5664a 520 static void
AndyA 22:0dd9c1b5664a 521 ChapReceiveResponse(chap_state *cstate, u_char *inp, int id, int len)
AndyA 22:0dd9c1b5664a 522 {
AndyA 22:0dd9c1b5664a 523 u_char *remmd, remmd_len;
AndyA 22:0dd9c1b5664a 524 int secret_len, old_state;
AndyA 22:0dd9c1b5664a 525 int code;
AndyA 22:0dd9c1b5664a 526 char rhostname[256];
AndyA 22:0dd9c1b5664a 527 MD5_CTX mdContext;
AndyA 22:0dd9c1b5664a 528 char secret[MAXSECRETLEN];
AndyA 22:0dd9c1b5664a 529 u_char hash[MD5_SIGNATURE_SIZE];
AndyA 22:0dd9c1b5664a 530
AndyA 22:0dd9c1b5664a 531 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: Rcvd id %d.\n", id));
AndyA 22:0dd9c1b5664a 532
AndyA 22:0dd9c1b5664a 533 if (cstate->serverstate == CHAPSS_CLOSED ||
AndyA 22:0dd9c1b5664a 534 cstate->serverstate == CHAPSS_PENDING) {
AndyA 22:0dd9c1b5664a 535 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: in state %d\n",
AndyA 22:0dd9c1b5664a 536 cstate->serverstate));
AndyA 22:0dd9c1b5664a 537 return;
AndyA 22:0dd9c1b5664a 538 }
AndyA 22:0dd9c1b5664a 539
AndyA 22:0dd9c1b5664a 540 if (id != cstate->chal_id) {
AndyA 22:0dd9c1b5664a 541 return; /* doesn't match ID of last challenge */
AndyA 22:0dd9c1b5664a 542 }
AndyA 22:0dd9c1b5664a 543
AndyA 22:0dd9c1b5664a 544 /*
AndyA 22:0dd9c1b5664a 545 * If we have received a duplicate or bogus Response,
AndyA 22:0dd9c1b5664a 546 * we have to send the same answer (Success/Failure)
AndyA 22:0dd9c1b5664a 547 * as we did for the first Response we saw.
AndyA 22:0dd9c1b5664a 548 */
AndyA 22:0dd9c1b5664a 549 if (cstate->serverstate == CHAPSS_OPEN) {
AndyA 22:0dd9c1b5664a 550 ChapSendStatus(cstate, CHAP_SUCCESS);
AndyA 22:0dd9c1b5664a 551 return;
AndyA 22:0dd9c1b5664a 552 }
AndyA 22:0dd9c1b5664a 553 if (cstate->serverstate == CHAPSS_BADAUTH) {
AndyA 22:0dd9c1b5664a 554 ChapSendStatus(cstate, CHAP_FAILURE);
AndyA 22:0dd9c1b5664a 555 return;
AndyA 22:0dd9c1b5664a 556 }
AndyA 22:0dd9c1b5664a 557
AndyA 22:0dd9c1b5664a 558 if (len < 2) {
AndyA 22:0dd9c1b5664a 559 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
AndyA 22:0dd9c1b5664a 560 return;
AndyA 22:0dd9c1b5664a 561 }
AndyA 22:0dd9c1b5664a 562 GETCHAR(remmd_len, inp); /* get length of MD */
AndyA 22:0dd9c1b5664a 563 remmd = inp; /* get pointer to MD */
AndyA 22:0dd9c1b5664a 564 INCPTR(remmd_len, inp);
AndyA 22:0dd9c1b5664a 565
AndyA 22:0dd9c1b5664a 566 len -= sizeof (u_char) + remmd_len;
AndyA 22:0dd9c1b5664a 567 if (len < 0) {
AndyA 22:0dd9c1b5664a 568 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
AndyA 22:0dd9c1b5664a 569 return;
AndyA 22:0dd9c1b5664a 570 }
AndyA 22:0dd9c1b5664a 571
AndyA 22:0dd9c1b5664a 572 UNTIMEOUT(ChapChallengeTimeout, cstate);
AndyA 22:0dd9c1b5664a 573
AndyA 22:0dd9c1b5664a 574 if (len >= (int)sizeof(rhostname)) {
AndyA 22:0dd9c1b5664a 575 len = sizeof(rhostname) - 1;
AndyA 22:0dd9c1b5664a 576 }
AndyA 22:0dd9c1b5664a 577 BCOPY(inp, rhostname, len);
AndyA 22:0dd9c1b5664a 578 rhostname[len] = '\000';
AndyA 22:0dd9c1b5664a 579
AndyA 22:0dd9c1b5664a 580 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: received name field: %s\n",
AndyA 22:0dd9c1b5664a 581 rhostname));
AndyA 22:0dd9c1b5664a 582
AndyA 22:0dd9c1b5664a 583 /*
AndyA 22:0dd9c1b5664a 584 * Get secret for authenticating them with us,
AndyA 22:0dd9c1b5664a 585 * do the hash ourselves, and compare the result.
AndyA 22:0dd9c1b5664a 586 */
AndyA 22:0dd9c1b5664a 587 code = CHAP_FAILURE;
AndyA 22:0dd9c1b5664a 588 if (!get_secret(cstate->unit, rhostname, cstate->chal_name,
AndyA 22:0dd9c1b5664a 589 secret, &secret_len, 1)) {
AndyA 22:0dd9c1b5664a 590 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating %s\n",
AndyA 22:0dd9c1b5664a 591 rhostname));
AndyA 22:0dd9c1b5664a 592 } else {
AndyA 22:0dd9c1b5664a 593 /* generate MD based on negotiated type */
AndyA 22:0dd9c1b5664a 594 switch (cstate->chal_type) {
AndyA 22:0dd9c1b5664a 595
AndyA 22:0dd9c1b5664a 596 case CHAP_DIGEST_MD5: /* only MD5 is defined for now */
AndyA 22:0dd9c1b5664a 597 if (remmd_len != MD5_SIGNATURE_SIZE) {
AndyA 22:0dd9c1b5664a 598 break; /* it's not even the right length */
AndyA 22:0dd9c1b5664a 599 }
AndyA 22:0dd9c1b5664a 600 MD5Init(&mdContext);
AndyA 22:0dd9c1b5664a 601 MD5Update(&mdContext, &cstate->chal_id, 1);
AndyA 22:0dd9c1b5664a 602 MD5Update(&mdContext, (u_char*)secret, secret_len);
AndyA 22:0dd9c1b5664a 603 MD5Update(&mdContext, cstate->challenge, cstate->chal_len);
AndyA 22:0dd9c1b5664a 604 MD5Final(hash, &mdContext);
AndyA 22:0dd9c1b5664a 605
AndyA 22:0dd9c1b5664a 606 /* compare local and remote MDs and send the appropriate status */
AndyA 22:0dd9c1b5664a 607 if (memcmp (hash, remmd, MD5_SIGNATURE_SIZE) == 0) {
AndyA 22:0dd9c1b5664a 608 code = CHAP_SUCCESS; /* they are the same! */
AndyA 22:0dd9c1b5664a 609 }
AndyA 22:0dd9c1b5664a 610 break;
AndyA 22:0dd9c1b5664a 611
AndyA 22:0dd9c1b5664a 612 default:
AndyA 22:0dd9c1b5664a 613 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->chal_type));
AndyA 22:0dd9c1b5664a 614 }
AndyA 22:0dd9c1b5664a 615 }
AndyA 22:0dd9c1b5664a 616
AndyA 22:0dd9c1b5664a 617 BZERO(secret, sizeof(secret));
AndyA 22:0dd9c1b5664a 618 ChapSendStatus(cstate, code);
AndyA 22:0dd9c1b5664a 619
AndyA 22:0dd9c1b5664a 620 if (code == CHAP_SUCCESS) {
AndyA 22:0dd9c1b5664a 621 old_state = cstate->serverstate;
AndyA 22:0dd9c1b5664a 622 cstate->serverstate = CHAPSS_OPEN;
AndyA 22:0dd9c1b5664a 623 if (old_state == CHAPSS_INITIAL_CHAL) {
AndyA 22:0dd9c1b5664a 624 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
AndyA 22:0dd9c1b5664a 625 }
AndyA 22:0dd9c1b5664a 626 if (cstate->chal_interval != 0) {
AndyA 22:0dd9c1b5664a 627 TIMEOUT(ChapRechallenge, cstate, cstate->chal_interval);
AndyA 22:0dd9c1b5664a 628 }
AndyA 22:0dd9c1b5664a 629 } else {
AndyA 22:0dd9c1b5664a 630 CHAPDEBUG(LOG_ERR, ("CHAP peer authentication failed\n"));
AndyA 22:0dd9c1b5664a 631 cstate->serverstate = CHAPSS_BADAUTH;
AndyA 22:0dd9c1b5664a 632 auth_peer_fail(cstate->unit, PPP_CHAP);
AndyA 22:0dd9c1b5664a 633 }
AndyA 22:0dd9c1b5664a 634 }
AndyA 22:0dd9c1b5664a 635
AndyA 22:0dd9c1b5664a 636 /*
AndyA 22:0dd9c1b5664a 637 * ChapReceiveSuccess - Receive Success
AndyA 22:0dd9c1b5664a 638 */
AndyA 22:0dd9c1b5664a 639 static void
AndyA 22:0dd9c1b5664a 640 ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len)
AndyA 22:0dd9c1b5664a 641 {
AndyA 22:0dd9c1b5664a 642 LWIP_UNUSED_ARG(id);
AndyA 22:0dd9c1b5664a 643 LWIP_UNUSED_ARG(inp);
AndyA 22:0dd9c1b5664a 644
AndyA 22:0dd9c1b5664a 645 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: Rcvd id %d.\n", id));
AndyA 22:0dd9c1b5664a 646
AndyA 22:0dd9c1b5664a 647 if (cstate->clientstate == CHAPCS_OPEN) {
AndyA 22:0dd9c1b5664a 648 /* presumably an answer to a duplicate response */
AndyA 22:0dd9c1b5664a 649 return;
AndyA 22:0dd9c1b5664a 650 }
AndyA 22:0dd9c1b5664a 651
AndyA 22:0dd9c1b5664a 652 if (cstate->clientstate != CHAPCS_RESPONSE) {
AndyA 22:0dd9c1b5664a 653 /* don't know what this is */
AndyA 22:0dd9c1b5664a 654 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: in state %d\n",
AndyA 22:0dd9c1b5664a 655 cstate->clientstate));
AndyA 22:0dd9c1b5664a 656 return;
AndyA 22:0dd9c1b5664a 657 }
AndyA 22:0dd9c1b5664a 658
AndyA 22:0dd9c1b5664a 659 UNTIMEOUT(ChapResponseTimeout, cstate);
AndyA 22:0dd9c1b5664a 660
AndyA 22:0dd9c1b5664a 661 /*
AndyA 22:0dd9c1b5664a 662 * Print message.
AndyA 22:0dd9c1b5664a 663 */
AndyA 22:0dd9c1b5664a 664 if (len > 0) {
AndyA 22:0dd9c1b5664a 665 PRINTMSG(inp, len);
AndyA 22:0dd9c1b5664a 666 }
AndyA 22:0dd9c1b5664a 667
AndyA 22:0dd9c1b5664a 668 cstate->clientstate = CHAPCS_OPEN;
AndyA 22:0dd9c1b5664a 669
AndyA 22:0dd9c1b5664a 670 auth_withpeer_success(cstate->unit, PPP_CHAP);
AndyA 22:0dd9c1b5664a 671 }
AndyA 22:0dd9c1b5664a 672
AndyA 22:0dd9c1b5664a 673
AndyA 22:0dd9c1b5664a 674 /*
AndyA 22:0dd9c1b5664a 675 * ChapReceiveFailure - Receive failure.
AndyA 22:0dd9c1b5664a 676 */
AndyA 22:0dd9c1b5664a 677 static void
AndyA 22:0dd9c1b5664a 678 ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len)
AndyA 22:0dd9c1b5664a 679 {
AndyA 22:0dd9c1b5664a 680 LWIP_UNUSED_ARG(id);
AndyA 22:0dd9c1b5664a 681 LWIP_UNUSED_ARG(inp);
AndyA 22:0dd9c1b5664a 682
AndyA 22:0dd9c1b5664a 683 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: Rcvd id %d.\n", id));
AndyA 22:0dd9c1b5664a 684
AndyA 22:0dd9c1b5664a 685 if (cstate->clientstate != CHAPCS_RESPONSE) {
AndyA 22:0dd9c1b5664a 686 /* don't know what this is */
AndyA 22:0dd9c1b5664a 687 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: in state %d\n",
AndyA 22:0dd9c1b5664a 688 cstate->clientstate));
AndyA 22:0dd9c1b5664a 689 return;
AndyA 22:0dd9c1b5664a 690 }
AndyA 22:0dd9c1b5664a 691
AndyA 22:0dd9c1b5664a 692 UNTIMEOUT(ChapResponseTimeout, cstate);
AndyA 22:0dd9c1b5664a 693
AndyA 22:0dd9c1b5664a 694 /*
AndyA 22:0dd9c1b5664a 695 * Print message.
AndyA 22:0dd9c1b5664a 696 */
AndyA 22:0dd9c1b5664a 697 if (len > 0) {
AndyA 22:0dd9c1b5664a 698 PRINTMSG(inp, len);
AndyA 22:0dd9c1b5664a 699 }
AndyA 22:0dd9c1b5664a 700
AndyA 22:0dd9c1b5664a 701 CHAPDEBUG(LOG_ERR, ("CHAP authentication failed\n"));
AndyA 22:0dd9c1b5664a 702 auth_withpeer_fail(cstate->unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
AndyA 22:0dd9c1b5664a 703 }
AndyA 22:0dd9c1b5664a 704
AndyA 22:0dd9c1b5664a 705
AndyA 22:0dd9c1b5664a 706 /*
AndyA 22:0dd9c1b5664a 707 * ChapSendChallenge - Send an Authenticate challenge.
AndyA 22:0dd9c1b5664a 708 */
AndyA 22:0dd9c1b5664a 709 static void
AndyA 22:0dd9c1b5664a 710 ChapSendChallenge(chap_state *cstate)
AndyA 22:0dd9c1b5664a 711 {
AndyA 22:0dd9c1b5664a 712 u_char *outp;
AndyA 22:0dd9c1b5664a 713 int chal_len, name_len;
AndyA 22:0dd9c1b5664a 714 int outlen;
AndyA 22:0dd9c1b5664a 715
AndyA 22:0dd9c1b5664a 716 chal_len = cstate->chal_len;
AndyA 22:0dd9c1b5664a 717 name_len = (int)strlen(cstate->chal_name);
AndyA 22:0dd9c1b5664a 718 outlen = CHAP_HEADERLEN + sizeof (u_char) + chal_len + name_len;
AndyA 22:0dd9c1b5664a 719 outp = outpacket_buf[cstate->unit];
AndyA 22:0dd9c1b5664a 720
AndyA 22:0dd9c1b5664a 721 MAKEHEADER(outp, PPP_CHAP); /* paste in a CHAP header */
AndyA 22:0dd9c1b5664a 722
AndyA 22:0dd9c1b5664a 723 PUTCHAR(CHAP_CHALLENGE, outp);
AndyA 22:0dd9c1b5664a 724 PUTCHAR(cstate->chal_id, outp);
AndyA 22:0dd9c1b5664a 725 PUTSHORT(outlen, outp);
AndyA 22:0dd9c1b5664a 726
AndyA 22:0dd9c1b5664a 727 PUTCHAR(chal_len, outp); /* put length of challenge */
AndyA 22:0dd9c1b5664a 728 BCOPY(cstate->challenge, outp, chal_len);
AndyA 22:0dd9c1b5664a 729 INCPTR(chal_len, outp);
AndyA 22:0dd9c1b5664a 730
AndyA 22:0dd9c1b5664a 731 BCOPY(cstate->chal_name, outp, name_len); /* append hostname */
AndyA 22:0dd9c1b5664a 732
AndyA 22:0dd9c1b5664a 733 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
AndyA 22:0dd9c1b5664a 734
AndyA 22:0dd9c1b5664a 735 CHAPDEBUG(LOG_INFO, ("ChapSendChallenge: Sent id %d.\n", cstate->chal_id));
AndyA 22:0dd9c1b5664a 736
AndyA 22:0dd9c1b5664a 737 TIMEOUT(ChapChallengeTimeout, cstate, cstate->timeouttime);
AndyA 22:0dd9c1b5664a 738 ++cstate->chal_transmits;
AndyA 22:0dd9c1b5664a 739 }
AndyA 22:0dd9c1b5664a 740
AndyA 22:0dd9c1b5664a 741
AndyA 22:0dd9c1b5664a 742 /*
AndyA 22:0dd9c1b5664a 743 * ChapSendStatus - Send a status response (ack or nak).
AndyA 22:0dd9c1b5664a 744 */
AndyA 22:0dd9c1b5664a 745 static void
AndyA 22:0dd9c1b5664a 746 ChapSendStatus(chap_state *cstate, int code)
AndyA 22:0dd9c1b5664a 747 {
AndyA 22:0dd9c1b5664a 748 u_char *outp;
AndyA 22:0dd9c1b5664a 749 int outlen, msglen;
AndyA 22:0dd9c1b5664a 750 char msg[256]; /* @todo: this can be a char*, no strcpy needed */
AndyA 22:0dd9c1b5664a 751
AndyA 22:0dd9c1b5664a 752 if (code == CHAP_SUCCESS) {
AndyA 22:0dd9c1b5664a 753 strcpy(msg, "Welcome!");
AndyA 22:0dd9c1b5664a 754 } else {
AndyA 22:0dd9c1b5664a 755 strcpy(msg, "I don't like you. Go 'way.");
AndyA 22:0dd9c1b5664a 756 }
AndyA 22:0dd9c1b5664a 757 msglen = (int)strlen(msg);
AndyA 22:0dd9c1b5664a 758
AndyA 22:0dd9c1b5664a 759 outlen = CHAP_HEADERLEN + msglen;
AndyA 22:0dd9c1b5664a 760 outp = outpacket_buf[cstate->unit];
AndyA 22:0dd9c1b5664a 761
AndyA 22:0dd9c1b5664a 762 MAKEHEADER(outp, PPP_CHAP); /* paste in a header */
AndyA 22:0dd9c1b5664a 763
AndyA 22:0dd9c1b5664a 764 PUTCHAR(code, outp);
AndyA 22:0dd9c1b5664a 765 PUTCHAR(cstate->chal_id, outp);
AndyA 22:0dd9c1b5664a 766 PUTSHORT(outlen, outp);
AndyA 22:0dd9c1b5664a 767 BCOPY(msg, outp, msglen);
AndyA 22:0dd9c1b5664a 768 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
AndyA 22:0dd9c1b5664a 769
AndyA 22:0dd9c1b5664a 770 CHAPDEBUG(LOG_INFO, ("ChapSendStatus: Sent code %d, id %d.\n", code,
AndyA 22:0dd9c1b5664a 771 cstate->chal_id));
AndyA 22:0dd9c1b5664a 772 }
AndyA 22:0dd9c1b5664a 773
AndyA 22:0dd9c1b5664a 774 /*
AndyA 22:0dd9c1b5664a 775 * ChapGenChallenge is used to generate a pseudo-random challenge string of
AndyA 22:0dd9c1b5664a 776 * a pseudo-random length between min_len and max_len. The challenge
AndyA 22:0dd9c1b5664a 777 * string and its length are stored in *cstate, and various other fields of
AndyA 22:0dd9c1b5664a 778 * *cstate are initialized.
AndyA 22:0dd9c1b5664a 779 */
AndyA 22:0dd9c1b5664a 780
AndyA 22:0dd9c1b5664a 781 static void
AndyA 22:0dd9c1b5664a 782 ChapGenChallenge(chap_state *cstate)
AndyA 22:0dd9c1b5664a 783 {
AndyA 22:0dd9c1b5664a 784 int chal_len;
AndyA 22:0dd9c1b5664a 785 u_char *ptr = cstate->challenge;
AndyA 22:0dd9c1b5664a 786 int i;
AndyA 22:0dd9c1b5664a 787
AndyA 22:0dd9c1b5664a 788 /* pick a random challenge length between MIN_CHALLENGE_LENGTH and
AndyA 22:0dd9c1b5664a 789 MAX_CHALLENGE_LENGTH */
AndyA 22:0dd9c1b5664a 790 chal_len = (unsigned)
AndyA 22:0dd9c1b5664a 791 ((((magic() >> 16) *
AndyA 22:0dd9c1b5664a 792 (MAX_CHALLENGE_LENGTH - MIN_CHALLENGE_LENGTH)) >> 16)
AndyA 22:0dd9c1b5664a 793 + MIN_CHALLENGE_LENGTH);
AndyA 22:0dd9c1b5664a 794 LWIP_ASSERT("chal_len <= 0xff", chal_len <= 0xffff);
AndyA 22:0dd9c1b5664a 795 cstate->chal_len = (u_char)chal_len;
AndyA 22:0dd9c1b5664a 796 cstate->chal_id = ++cstate->id;
AndyA 22:0dd9c1b5664a 797 cstate->chal_transmits = 0;
AndyA 22:0dd9c1b5664a 798
AndyA 22:0dd9c1b5664a 799 /* generate a random string */
AndyA 22:0dd9c1b5664a 800 for (i = 0; i < chal_len; i++ ) {
AndyA 22:0dd9c1b5664a 801 *ptr++ = (char) (magic() & 0xff);
AndyA 22:0dd9c1b5664a 802 }
AndyA 22:0dd9c1b5664a 803 }
AndyA 22:0dd9c1b5664a 804
AndyA 22:0dd9c1b5664a 805 /*
AndyA 22:0dd9c1b5664a 806 * ChapSendResponse - send a response packet with values as specified
AndyA 22:0dd9c1b5664a 807 * in *cstate.
AndyA 22:0dd9c1b5664a 808 */
AndyA 22:0dd9c1b5664a 809 /* ARGSUSED */
AndyA 22:0dd9c1b5664a 810 static void
AndyA 22:0dd9c1b5664a 811 ChapSendResponse(chap_state *cstate)
AndyA 22:0dd9c1b5664a 812 {
AndyA 22:0dd9c1b5664a 813 u_char *outp;
AndyA 22:0dd9c1b5664a 814 int outlen, md_len, name_len;
AndyA 22:0dd9c1b5664a 815
AndyA 22:0dd9c1b5664a 816 md_len = cstate->resp_length;
AndyA 22:0dd9c1b5664a 817 name_len = (int)strlen(cstate->resp_name);
AndyA 22:0dd9c1b5664a 818 outlen = CHAP_HEADERLEN + sizeof (u_char) + md_len + name_len;
AndyA 22:0dd9c1b5664a 819 outp = outpacket_buf[cstate->unit];
AndyA 22:0dd9c1b5664a 820
AndyA 22:0dd9c1b5664a 821 MAKEHEADER(outp, PPP_CHAP);
AndyA 22:0dd9c1b5664a 822
AndyA 22:0dd9c1b5664a 823 PUTCHAR(CHAP_RESPONSE, outp); /* we are a response */
AndyA 22:0dd9c1b5664a 824 PUTCHAR(cstate->resp_id, outp); /* copy id from challenge packet */
AndyA 22:0dd9c1b5664a 825 PUTSHORT(outlen, outp); /* packet length */
AndyA 22:0dd9c1b5664a 826
AndyA 22:0dd9c1b5664a 827 PUTCHAR(md_len, outp); /* length of MD */
AndyA 22:0dd9c1b5664a 828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */
AndyA 22:0dd9c1b5664a 829 INCPTR(md_len, outp);
AndyA 22:0dd9c1b5664a 830
AndyA 22:0dd9c1b5664a 831 BCOPY(cstate->resp_name, outp, name_len); /* append our name */
AndyA 22:0dd9c1b5664a 832
AndyA 22:0dd9c1b5664a 833 /* send the packet */
AndyA 22:0dd9c1b5664a 834 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
AndyA 22:0dd9c1b5664a 835
AndyA 22:0dd9c1b5664a 836 cstate->clientstate = CHAPCS_RESPONSE;
AndyA 22:0dd9c1b5664a 837 TIMEOUT(ChapResponseTimeout, cstate, cstate->timeouttime);
AndyA 22:0dd9c1b5664a 838 ++cstate->resp_transmits;
AndyA 22:0dd9c1b5664a 839 }
AndyA 22:0dd9c1b5664a 840
AndyA 22:0dd9c1b5664a 841 #if PPP_ADDITIONAL_CALLBACKS
AndyA 22:0dd9c1b5664a 842 static char *ChapCodenames[] = {
AndyA 22:0dd9c1b5664a 843 "Challenge", "Response", "Success", "Failure"
AndyA 22:0dd9c1b5664a 844 };
AndyA 22:0dd9c1b5664a 845 /*
AndyA 22:0dd9c1b5664a 846 * ChapPrintPkt - print the contents of a CHAP packet.
AndyA 22:0dd9c1b5664a 847 */
AndyA 22:0dd9c1b5664a 848 static int
AndyA 22:0dd9c1b5664a 849 ChapPrintPkt( u_char *p, int plen, void (*printer) (void *, char *, ...), void *arg)
AndyA 22:0dd9c1b5664a 850 {
AndyA 22:0dd9c1b5664a 851 int code, id, len;
AndyA 22:0dd9c1b5664a 852 int clen, nlen;
AndyA 22:0dd9c1b5664a 853 u_char x;
AndyA 22:0dd9c1b5664a 854
AndyA 22:0dd9c1b5664a 855 if (plen < CHAP_HEADERLEN) {
AndyA 22:0dd9c1b5664a 856 return 0;
AndyA 22:0dd9c1b5664a 857 }
AndyA 22:0dd9c1b5664a 858 GETCHAR(code, p);
AndyA 22:0dd9c1b5664a 859 GETCHAR(id, p);
AndyA 22:0dd9c1b5664a 860 GETSHORT(len, p);
AndyA 22:0dd9c1b5664a 861 if (len < CHAP_HEADERLEN || len > plen) {
AndyA 22:0dd9c1b5664a 862 return 0;
AndyA 22:0dd9c1b5664a 863 }
AndyA 22:0dd9c1b5664a 864
AndyA 22:0dd9c1b5664a 865 if (code >= 1 && code <= sizeof(ChapCodenames) / sizeof(char *)) {
AndyA 22:0dd9c1b5664a 866 printer(arg, " %s", ChapCodenames[code-1]);
AndyA 22:0dd9c1b5664a 867 } else {
AndyA 22:0dd9c1b5664a 868 printer(arg, " code=0x%x", code);
AndyA 22:0dd9c1b5664a 869 }
AndyA 22:0dd9c1b5664a 870 printer(arg, " id=0x%x", id);
AndyA 22:0dd9c1b5664a 871 len -= CHAP_HEADERLEN;
AndyA 22:0dd9c1b5664a 872 switch (code) {
AndyA 22:0dd9c1b5664a 873 case CHAP_CHALLENGE:
AndyA 22:0dd9c1b5664a 874 case CHAP_RESPONSE:
AndyA 22:0dd9c1b5664a 875 if (len < 1) {
AndyA 22:0dd9c1b5664a 876 break;
AndyA 22:0dd9c1b5664a 877 }
AndyA 22:0dd9c1b5664a 878 clen = p[0];
AndyA 22:0dd9c1b5664a 879 if (len < clen + 1) {
AndyA 22:0dd9c1b5664a 880 break;
AndyA 22:0dd9c1b5664a 881 }
AndyA 22:0dd9c1b5664a 882 ++p;
AndyA 22:0dd9c1b5664a 883 nlen = len - clen - 1;
AndyA 22:0dd9c1b5664a 884 printer(arg, " <");
AndyA 22:0dd9c1b5664a 885 for (; clen > 0; --clen) {
AndyA 22:0dd9c1b5664a 886 GETCHAR(x, p);
AndyA 22:0dd9c1b5664a 887 printer(arg, "%.2x", x);
AndyA 22:0dd9c1b5664a 888 }
AndyA 22:0dd9c1b5664a 889 printer(arg, ">, name = %.*Z", nlen, p);
AndyA 22:0dd9c1b5664a 890 break;
AndyA 22:0dd9c1b5664a 891 case CHAP_FAILURE:
AndyA 22:0dd9c1b5664a 892 case CHAP_SUCCESS:
AndyA 22:0dd9c1b5664a 893 printer(arg, " %.*Z", len, p);
AndyA 22:0dd9c1b5664a 894 break;
AndyA 22:0dd9c1b5664a 895 default:
AndyA 22:0dd9c1b5664a 896 for (clen = len; clen > 0; --clen) {
AndyA 22:0dd9c1b5664a 897 GETCHAR(x, p);
AndyA 22:0dd9c1b5664a 898 printer(arg, " %.2x", x);
AndyA 22:0dd9c1b5664a 899 }
AndyA 22:0dd9c1b5664a 900 }
AndyA 22:0dd9c1b5664a 901
AndyA 22:0dd9c1b5664a 902 return len + CHAP_HEADERLEN;
AndyA 22:0dd9c1b5664a 903 }
AndyA 22:0dd9c1b5664a 904 #endif /* PPP_ADDITIONAL_CALLBACKS */
AndyA 22:0dd9c1b5664a 905
AndyA 22:0dd9c1b5664a 906 #endif /* CHAP_SUPPORT */
AndyA 22:0dd9c1b5664a 907
AndyA 22:0dd9c1b5664a 908 #endif /* PPP_SUPPORT */