Bonjour/Zerconf library

Dependencies:   mbed

Committer:
dirkx
Date:
Sat Aug 14 15:54:31 2010 +0000
Revision:
5:8e53abda9900
Parent:
0:355018f44c9f

        

Who changed what in which revision?

UserRevisionLine numberNew contents of line
dirkx 0:355018f44c9f 1 /*** WARNING - THIS HAS NEVER BEEN FINISHED ***/
dirkx 0:355018f44c9f 2 /*****************************************************************************
dirkx 0:355018f44c9f 3 * chap.c - Network Challenge Handshake Authentication Protocol program file.
dirkx 0:355018f44c9f 4 *
dirkx 0:355018f44c9f 5 * Copyright (c) 2003 by Marc Boucher, Services Informatiques (MBSI) inc.
dirkx 0:355018f44c9f 6 * portions Copyright (c) 1997 by Global Election Systems Inc.
dirkx 0:355018f44c9f 7 *
dirkx 0:355018f44c9f 8 * The authors hereby grant permission to use, copy, modify, distribute,
dirkx 0:355018f44c9f 9 * and license this software and its documentation for any purpose, provided
dirkx 0:355018f44c9f 10 * that existing copyright notices are retained in all copies and that this
dirkx 0:355018f44c9f 11 * notice and the following disclaimer are included verbatim in any
dirkx 0:355018f44c9f 12 * distributions. No written agreement, license, or royalty fee is required
dirkx 0:355018f44c9f 13 * for any of the authorized uses.
dirkx 0:355018f44c9f 14 *
dirkx 0:355018f44c9f 15 * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS *AS IS* AND ANY EXPRESS OR
dirkx 0:355018f44c9f 16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
dirkx 0:355018f44c9f 17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
dirkx 0:355018f44c9f 18 * IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
dirkx 0:355018f44c9f 19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
dirkx 0:355018f44c9f 20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
dirkx 0:355018f44c9f 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
dirkx 0:355018f44c9f 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
dirkx 0:355018f44c9f 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
dirkx 0:355018f44c9f 24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
dirkx 0:355018f44c9f 25 *
dirkx 0:355018f44c9f 26 ******************************************************************************
dirkx 0:355018f44c9f 27 * REVISION HISTORY
dirkx 0:355018f44c9f 28 *
dirkx 0:355018f44c9f 29 * 03-01-01 Marc Boucher <marc@mbsi.ca>
dirkx 0:355018f44c9f 30 * Ported to lwIP.
dirkx 0:355018f44c9f 31 * 97-12-04 Guy Lancaster <lancasterg@acm.org>, Global Election Systems Inc.
dirkx 0:355018f44c9f 32 * Original based on BSD chap.c.
dirkx 0:355018f44c9f 33 *****************************************************************************/
dirkx 0:355018f44c9f 34 /*
dirkx 0:355018f44c9f 35 * chap.c - Challenge Handshake Authentication Protocol.
dirkx 0:355018f44c9f 36 *
dirkx 0:355018f44c9f 37 * Copyright (c) 1993 The Australian National University.
dirkx 0:355018f44c9f 38 * All rights reserved.
dirkx 0:355018f44c9f 39 *
dirkx 0:355018f44c9f 40 * Redistribution and use in source and binary forms are permitted
dirkx 0:355018f44c9f 41 * provided that the above copyright notice and this paragraph are
dirkx 0:355018f44c9f 42 * duplicated in all such forms and that any documentation,
dirkx 0:355018f44c9f 43 * advertising materials, and other materials related to such
dirkx 0:355018f44c9f 44 * distribution and use acknowledge that the software was developed
dirkx 0:355018f44c9f 45 * by the Australian National University. The name of the University
dirkx 0:355018f44c9f 46 * may not be used to endorse or promote products derived from this
dirkx 0:355018f44c9f 47 * software without specific prior written permission.
dirkx 0:355018f44c9f 48 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
dirkx 0:355018f44c9f 49 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
dirkx 0:355018f44c9f 50 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
dirkx 0:355018f44c9f 51 *
dirkx 0:355018f44c9f 52 * Copyright (c) 1991 Gregory M. Christy.
dirkx 0:355018f44c9f 53 * All rights reserved.
dirkx 0:355018f44c9f 54 *
dirkx 0:355018f44c9f 55 * Redistribution and use in source and binary forms are permitted
dirkx 0:355018f44c9f 56 * provided that the above copyright notice and this paragraph are
dirkx 0:355018f44c9f 57 * duplicated in all such forms and that any documentation,
dirkx 0:355018f44c9f 58 * advertising materials, and other materials related to such
dirkx 0:355018f44c9f 59 * distribution and use acknowledge that the software was developed
dirkx 0:355018f44c9f 60 * by Gregory M. Christy. The name of the author may not be used to
dirkx 0:355018f44c9f 61 * endorse or promote products derived from this software without
dirkx 0:355018f44c9f 62 * specific prior written permission.
dirkx 0:355018f44c9f 63 *
dirkx 0:355018f44c9f 64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
dirkx 0:355018f44c9f 65 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
dirkx 0:355018f44c9f 66 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
dirkx 0:355018f44c9f 67 */
dirkx 0:355018f44c9f 68
dirkx 0:355018f44c9f 69 #include "lwip/opt.h"
dirkx 0:355018f44c9f 70
dirkx 0:355018f44c9f 71 #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
dirkx 0:355018f44c9f 72
dirkx 0:355018f44c9f 73 #if CHAP_SUPPORT /* don't build if not configured for use in lwipopts.h */
dirkx 0:355018f44c9f 74
dirkx 0:355018f44c9f 75 #include "ppp.h"
dirkx 0:355018f44c9f 76 #include "pppdebug.h"
dirkx 0:355018f44c9f 77
dirkx 0:355018f44c9f 78 #include "magic.h"
dirkx 0:355018f44c9f 79 #include "randm.h"
dirkx 0:355018f44c9f 80 #include "auth.h"
dirkx 0:355018f44c9f 81 #include "md5.h"
dirkx 0:355018f44c9f 82 #include "chap.h"
dirkx 0:355018f44c9f 83 #include "chpms.h"
dirkx 0:355018f44c9f 84
dirkx 0:355018f44c9f 85 #include <string.h>
dirkx 0:355018f44c9f 86
dirkx 0:355018f44c9f 87 #if 0 /* UNUSED */
dirkx 0:355018f44c9f 88 /*
dirkx 0:355018f44c9f 89 * Command-line options.
dirkx 0:355018f44c9f 90 */
dirkx 0:355018f44c9f 91 static option_t chap_option_list[] = {
dirkx 0:355018f44c9f 92 { "chap-restart", o_int, &chap[0].timeouttime,
dirkx 0:355018f44c9f 93 "Set timeout for CHAP" },
dirkx 0:355018f44c9f 94 { "chap-max-challenge", o_int, &chap[0].max_transmits,
dirkx 0:355018f44c9f 95 "Set max #xmits for challenge" },
dirkx 0:355018f44c9f 96 { "chap-interval", o_int, &chap[0].chal_interval,
dirkx 0:355018f44c9f 97 "Set interval for rechallenge" },
dirkx 0:355018f44c9f 98 #ifdef MSLANMAN
dirkx 0:355018f44c9f 99 { "ms-lanman", o_bool, &ms_lanman,
dirkx 0:355018f44c9f 100 "Use LanMan passwd when using MS-CHAP", 1 },
dirkx 0:355018f44c9f 101 #endif
dirkx 0:355018f44c9f 102 { NULL }
dirkx 0:355018f44c9f 103 };
dirkx 0:355018f44c9f 104 #endif /* UNUSED */
dirkx 0:355018f44c9f 105
dirkx 0:355018f44c9f 106 /*
dirkx 0:355018f44c9f 107 * Protocol entry points.
dirkx 0:355018f44c9f 108 */
dirkx 0:355018f44c9f 109 static void ChapInit (int);
dirkx 0:355018f44c9f 110 static void ChapLowerUp (int);
dirkx 0:355018f44c9f 111 static void ChapLowerDown (int);
dirkx 0:355018f44c9f 112 static void ChapInput (int, u_char *, int);
dirkx 0:355018f44c9f 113 static void ChapProtocolReject (int);
dirkx 0:355018f44c9f 114 #if PPP_ADDITIONAL_CALLBACKS
dirkx 0:355018f44c9f 115 static int ChapPrintPkt (u_char *, int, void (*) (void *, char *, ...), void *);
dirkx 0:355018f44c9f 116 #endif
dirkx 0:355018f44c9f 117
dirkx 0:355018f44c9f 118 struct protent chap_protent = {
dirkx 0:355018f44c9f 119 PPP_CHAP,
dirkx 0:355018f44c9f 120 ChapInit,
dirkx 0:355018f44c9f 121 ChapInput,
dirkx 0:355018f44c9f 122 ChapProtocolReject,
dirkx 0:355018f44c9f 123 ChapLowerUp,
dirkx 0:355018f44c9f 124 ChapLowerDown,
dirkx 0:355018f44c9f 125 NULL,
dirkx 0:355018f44c9f 126 NULL,
dirkx 0:355018f44c9f 127 #if PPP_ADDITIONAL_CALLBACKS
dirkx 0:355018f44c9f 128 ChapPrintPkt,
dirkx 0:355018f44c9f 129 NULL,
dirkx 0:355018f44c9f 130 #endif /* PPP_ADDITIONAL_CALLBACKS */
dirkx 0:355018f44c9f 131 1,
dirkx 0:355018f44c9f 132 "CHAP",
dirkx 0:355018f44c9f 133 #if PPP_ADDITIONAL_CALLBACKS
dirkx 0:355018f44c9f 134 NULL,
dirkx 0:355018f44c9f 135 NULL,
dirkx 0:355018f44c9f 136 NULL
dirkx 0:355018f44c9f 137 #endif /* PPP_ADDITIONAL_CALLBACKS */
dirkx 0:355018f44c9f 138 };
dirkx 0:355018f44c9f 139
dirkx 0:355018f44c9f 140 chap_state chap[NUM_PPP]; /* CHAP state; one for each unit */
dirkx 0:355018f44c9f 141
dirkx 0:355018f44c9f 142 static void ChapChallengeTimeout (void *);
dirkx 0:355018f44c9f 143 static void ChapResponseTimeout (void *);
dirkx 0:355018f44c9f 144 static void ChapReceiveChallenge (chap_state *, u_char *, u_char, int);
dirkx 0:355018f44c9f 145 static void ChapRechallenge (void *);
dirkx 0:355018f44c9f 146 static void ChapReceiveResponse (chap_state *, u_char *, int, int);
dirkx 0:355018f44c9f 147 static void ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len);
dirkx 0:355018f44c9f 148 static void ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len);
dirkx 0:355018f44c9f 149 static void ChapSendStatus (chap_state *, int);
dirkx 0:355018f44c9f 150 static void ChapSendChallenge (chap_state *);
dirkx 0:355018f44c9f 151 static void ChapSendResponse (chap_state *);
dirkx 0:355018f44c9f 152 static void ChapGenChallenge (chap_state *);
dirkx 0:355018f44c9f 153
dirkx 0:355018f44c9f 154 /*
dirkx 0:355018f44c9f 155 * ChapInit - Initialize a CHAP unit.
dirkx 0:355018f44c9f 156 */
dirkx 0:355018f44c9f 157 static void
dirkx 0:355018f44c9f 158 ChapInit(int unit)
dirkx 0:355018f44c9f 159 {
dirkx 0:355018f44c9f 160 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 161
dirkx 0:355018f44c9f 162 BZERO(cstate, sizeof(*cstate));
dirkx 0:355018f44c9f 163 cstate->unit = unit;
dirkx 0:355018f44c9f 164 cstate->clientstate = CHAPCS_INITIAL;
dirkx 0:355018f44c9f 165 cstate->serverstate = CHAPSS_INITIAL;
dirkx 0:355018f44c9f 166 cstate->timeouttime = CHAP_DEFTIMEOUT;
dirkx 0:355018f44c9f 167 cstate->max_transmits = CHAP_DEFTRANSMITS;
dirkx 0:355018f44c9f 168 /* random number generator is initialized in magic_init */
dirkx 0:355018f44c9f 169 }
dirkx 0:355018f44c9f 170
dirkx 0:355018f44c9f 171
dirkx 0:355018f44c9f 172 /*
dirkx 0:355018f44c9f 173 * ChapAuthWithPeer - Authenticate us with our peer (start client).
dirkx 0:355018f44c9f 174 *
dirkx 0:355018f44c9f 175 */
dirkx 0:355018f44c9f 176 void
dirkx 0:355018f44c9f 177 ChapAuthWithPeer(int unit, char *our_name, u_char digest)
dirkx 0:355018f44c9f 178 {
dirkx 0:355018f44c9f 179 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 180
dirkx 0:355018f44c9f 181 cstate->resp_name = our_name;
dirkx 0:355018f44c9f 182 cstate->resp_type = digest;
dirkx 0:355018f44c9f 183
dirkx 0:355018f44c9f 184 if (cstate->clientstate == CHAPCS_INITIAL ||
dirkx 0:355018f44c9f 185 cstate->clientstate == CHAPCS_PENDING) {
dirkx 0:355018f44c9f 186 /* lower layer isn't up - wait until later */
dirkx 0:355018f44c9f 187 cstate->clientstate = CHAPCS_PENDING;
dirkx 0:355018f44c9f 188 return;
dirkx 0:355018f44c9f 189 }
dirkx 0:355018f44c9f 190
dirkx 0:355018f44c9f 191 /*
dirkx 0:355018f44c9f 192 * We get here as a result of LCP coming up.
dirkx 0:355018f44c9f 193 * So even if CHAP was open before, we will
dirkx 0:355018f44c9f 194 * have to re-authenticate ourselves.
dirkx 0:355018f44c9f 195 */
dirkx 0:355018f44c9f 196 cstate->clientstate = CHAPCS_LISTEN;
dirkx 0:355018f44c9f 197 }
dirkx 0:355018f44c9f 198
dirkx 0:355018f44c9f 199
dirkx 0:355018f44c9f 200 /*
dirkx 0:355018f44c9f 201 * ChapAuthPeer - Authenticate our peer (start server).
dirkx 0:355018f44c9f 202 */
dirkx 0:355018f44c9f 203 void
dirkx 0:355018f44c9f 204 ChapAuthPeer(int unit, char *our_name, u_char digest)
dirkx 0:355018f44c9f 205 {
dirkx 0:355018f44c9f 206 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 207
dirkx 0:355018f44c9f 208 cstate->chal_name = our_name;
dirkx 0:355018f44c9f 209 cstate->chal_type = digest;
dirkx 0:355018f44c9f 210
dirkx 0:355018f44c9f 211 if (cstate->serverstate == CHAPSS_INITIAL ||
dirkx 0:355018f44c9f 212 cstate->serverstate == CHAPSS_PENDING) {
dirkx 0:355018f44c9f 213 /* lower layer isn't up - wait until later */
dirkx 0:355018f44c9f 214 cstate->serverstate = CHAPSS_PENDING;
dirkx 0:355018f44c9f 215 return;
dirkx 0:355018f44c9f 216 }
dirkx 0:355018f44c9f 217
dirkx 0:355018f44c9f 218 ChapGenChallenge(cstate);
dirkx 0:355018f44c9f 219 ChapSendChallenge(cstate); /* crank it up dude! */
dirkx 0:355018f44c9f 220 cstate->serverstate = CHAPSS_INITIAL_CHAL;
dirkx 0:355018f44c9f 221 }
dirkx 0:355018f44c9f 222
dirkx 0:355018f44c9f 223
dirkx 0:355018f44c9f 224 /*
dirkx 0:355018f44c9f 225 * ChapChallengeTimeout - Timeout expired on sending challenge.
dirkx 0:355018f44c9f 226 */
dirkx 0:355018f44c9f 227 static void
dirkx 0:355018f44c9f 228 ChapChallengeTimeout(void *arg)
dirkx 0:355018f44c9f 229 {
dirkx 0:355018f44c9f 230 chap_state *cstate = (chap_state *) arg;
dirkx 0:355018f44c9f 231
dirkx 0:355018f44c9f 232 /* if we aren't sending challenges, don't worry. then again we */
dirkx 0:355018f44c9f 233 /* probably shouldn't be here either */
dirkx 0:355018f44c9f 234 if (cstate->serverstate != CHAPSS_INITIAL_CHAL &&
dirkx 0:355018f44c9f 235 cstate->serverstate != CHAPSS_RECHALLENGE) {
dirkx 0:355018f44c9f 236 return;
dirkx 0:355018f44c9f 237 }
dirkx 0:355018f44c9f 238
dirkx 0:355018f44c9f 239 if (cstate->chal_transmits >= cstate->max_transmits) {
dirkx 0:355018f44c9f 240 /* give up on peer */
dirkx 0:355018f44c9f 241 CHAPDEBUG(LOG_ERR, ("Peer failed to respond to CHAP challenge\n"));
dirkx 0:355018f44c9f 242 cstate->serverstate = CHAPSS_BADAUTH;
dirkx 0:355018f44c9f 243 auth_peer_fail(cstate->unit, PPP_CHAP);
dirkx 0:355018f44c9f 244 return;
dirkx 0:355018f44c9f 245 }
dirkx 0:355018f44c9f 246
dirkx 0:355018f44c9f 247 ChapSendChallenge(cstate); /* Re-send challenge */
dirkx 0:355018f44c9f 248 }
dirkx 0:355018f44c9f 249
dirkx 0:355018f44c9f 250
dirkx 0:355018f44c9f 251 /*
dirkx 0:355018f44c9f 252 * ChapResponseTimeout - Timeout expired on sending response.
dirkx 0:355018f44c9f 253 */
dirkx 0:355018f44c9f 254 static void
dirkx 0:355018f44c9f 255 ChapResponseTimeout(void *arg)
dirkx 0:355018f44c9f 256 {
dirkx 0:355018f44c9f 257 chap_state *cstate = (chap_state *) arg;
dirkx 0:355018f44c9f 258
dirkx 0:355018f44c9f 259 /* if we aren't sending a response, don't worry. */
dirkx 0:355018f44c9f 260 if (cstate->clientstate != CHAPCS_RESPONSE) {
dirkx 0:355018f44c9f 261 return;
dirkx 0:355018f44c9f 262 }
dirkx 0:355018f44c9f 263
dirkx 0:355018f44c9f 264 ChapSendResponse(cstate); /* re-send response */
dirkx 0:355018f44c9f 265 }
dirkx 0:355018f44c9f 266
dirkx 0:355018f44c9f 267
dirkx 0:355018f44c9f 268 /*
dirkx 0:355018f44c9f 269 * ChapRechallenge - Time to challenge the peer again.
dirkx 0:355018f44c9f 270 */
dirkx 0:355018f44c9f 271 static void
dirkx 0:355018f44c9f 272 ChapRechallenge(void *arg)
dirkx 0:355018f44c9f 273 {
dirkx 0:355018f44c9f 274 chap_state *cstate = (chap_state *) arg;
dirkx 0:355018f44c9f 275
dirkx 0:355018f44c9f 276 /* if we aren't sending a response, don't worry. */
dirkx 0:355018f44c9f 277 if (cstate->serverstate != CHAPSS_OPEN) {
dirkx 0:355018f44c9f 278 return;
dirkx 0:355018f44c9f 279 }
dirkx 0:355018f44c9f 280
dirkx 0:355018f44c9f 281 ChapGenChallenge(cstate);
dirkx 0:355018f44c9f 282 ChapSendChallenge(cstate);
dirkx 0:355018f44c9f 283 cstate->serverstate = CHAPSS_RECHALLENGE;
dirkx 0:355018f44c9f 284 }
dirkx 0:355018f44c9f 285
dirkx 0:355018f44c9f 286
dirkx 0:355018f44c9f 287 /*
dirkx 0:355018f44c9f 288 * ChapLowerUp - The lower layer is up.
dirkx 0:355018f44c9f 289 *
dirkx 0:355018f44c9f 290 * Start up if we have pending requests.
dirkx 0:355018f44c9f 291 */
dirkx 0:355018f44c9f 292 static void
dirkx 0:355018f44c9f 293 ChapLowerUp(int unit)
dirkx 0:355018f44c9f 294 {
dirkx 0:355018f44c9f 295 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 296
dirkx 0:355018f44c9f 297 if (cstate->clientstate == CHAPCS_INITIAL) {
dirkx 0:355018f44c9f 298 cstate->clientstate = CHAPCS_CLOSED;
dirkx 0:355018f44c9f 299 } else if (cstate->clientstate == CHAPCS_PENDING) {
dirkx 0:355018f44c9f 300 cstate->clientstate = CHAPCS_LISTEN;
dirkx 0:355018f44c9f 301 }
dirkx 0:355018f44c9f 302
dirkx 0:355018f44c9f 303 if (cstate->serverstate == CHAPSS_INITIAL) {
dirkx 0:355018f44c9f 304 cstate->serverstate = CHAPSS_CLOSED;
dirkx 0:355018f44c9f 305 } else if (cstate->serverstate == CHAPSS_PENDING) {
dirkx 0:355018f44c9f 306 ChapGenChallenge(cstate);
dirkx 0:355018f44c9f 307 ChapSendChallenge(cstate);
dirkx 0:355018f44c9f 308 cstate->serverstate = CHAPSS_INITIAL_CHAL;
dirkx 0:355018f44c9f 309 }
dirkx 0:355018f44c9f 310 }
dirkx 0:355018f44c9f 311
dirkx 0:355018f44c9f 312
dirkx 0:355018f44c9f 313 /*
dirkx 0:355018f44c9f 314 * ChapLowerDown - The lower layer is down.
dirkx 0:355018f44c9f 315 *
dirkx 0:355018f44c9f 316 * Cancel all timeouts.
dirkx 0:355018f44c9f 317 */
dirkx 0:355018f44c9f 318 static void
dirkx 0:355018f44c9f 319 ChapLowerDown(int unit)
dirkx 0:355018f44c9f 320 {
dirkx 0:355018f44c9f 321 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 322
dirkx 0:355018f44c9f 323 /* Timeout(s) pending? Cancel if so. */
dirkx 0:355018f44c9f 324 if (cstate->serverstate == CHAPSS_INITIAL_CHAL ||
dirkx 0:355018f44c9f 325 cstate->serverstate == CHAPSS_RECHALLENGE) {
dirkx 0:355018f44c9f 326 UNTIMEOUT(ChapChallengeTimeout, cstate);
dirkx 0:355018f44c9f 327 } else if (cstate->serverstate == CHAPSS_OPEN
dirkx 0:355018f44c9f 328 && cstate->chal_interval != 0) {
dirkx 0:355018f44c9f 329 UNTIMEOUT(ChapRechallenge, cstate);
dirkx 0:355018f44c9f 330 }
dirkx 0:355018f44c9f 331 if (cstate->clientstate == CHAPCS_RESPONSE) {
dirkx 0:355018f44c9f 332 UNTIMEOUT(ChapResponseTimeout, cstate);
dirkx 0:355018f44c9f 333 }
dirkx 0:355018f44c9f 334 cstate->clientstate = CHAPCS_INITIAL;
dirkx 0:355018f44c9f 335 cstate->serverstate = CHAPSS_INITIAL;
dirkx 0:355018f44c9f 336 }
dirkx 0:355018f44c9f 337
dirkx 0:355018f44c9f 338
dirkx 0:355018f44c9f 339 /*
dirkx 0:355018f44c9f 340 * ChapProtocolReject - Peer doesn't grok CHAP.
dirkx 0:355018f44c9f 341 */
dirkx 0:355018f44c9f 342 static void
dirkx 0:355018f44c9f 343 ChapProtocolReject(int unit)
dirkx 0:355018f44c9f 344 {
dirkx 0:355018f44c9f 345 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 346
dirkx 0:355018f44c9f 347 if (cstate->serverstate != CHAPSS_INITIAL &&
dirkx 0:355018f44c9f 348 cstate->serverstate != CHAPSS_CLOSED) {
dirkx 0:355018f44c9f 349 auth_peer_fail(unit, PPP_CHAP);
dirkx 0:355018f44c9f 350 }
dirkx 0:355018f44c9f 351 if (cstate->clientstate != CHAPCS_INITIAL &&
dirkx 0:355018f44c9f 352 cstate->clientstate != CHAPCS_CLOSED) {
dirkx 0:355018f44c9f 353 auth_withpeer_fail(unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
dirkx 0:355018f44c9f 354 }
dirkx 0:355018f44c9f 355 ChapLowerDown(unit); /* shutdown chap */
dirkx 0:355018f44c9f 356 }
dirkx 0:355018f44c9f 357
dirkx 0:355018f44c9f 358
dirkx 0:355018f44c9f 359 /*
dirkx 0:355018f44c9f 360 * ChapInput - Input CHAP packet.
dirkx 0:355018f44c9f 361 */
dirkx 0:355018f44c9f 362 static void
dirkx 0:355018f44c9f 363 ChapInput(int unit, u_char *inpacket, int packet_len)
dirkx 0:355018f44c9f 364 {
dirkx 0:355018f44c9f 365 chap_state *cstate = &chap[unit];
dirkx 0:355018f44c9f 366 u_char *inp;
dirkx 0:355018f44c9f 367 u_char code, id;
dirkx 0:355018f44c9f 368 int len;
dirkx 0:355018f44c9f 369
dirkx 0:355018f44c9f 370 /*
dirkx 0:355018f44c9f 371 * Parse header (code, id and length).
dirkx 0:355018f44c9f 372 * If packet too short, drop it.
dirkx 0:355018f44c9f 373 */
dirkx 0:355018f44c9f 374 inp = inpacket;
dirkx 0:355018f44c9f 375 if (packet_len < CHAP_HEADERLEN) {
dirkx 0:355018f44c9f 376 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short header.\n"));
dirkx 0:355018f44c9f 377 return;
dirkx 0:355018f44c9f 378 }
dirkx 0:355018f44c9f 379 GETCHAR(code, inp);
dirkx 0:355018f44c9f 380 GETCHAR(id, inp);
dirkx 0:355018f44c9f 381 GETSHORT(len, inp);
dirkx 0:355018f44c9f 382 if (len < CHAP_HEADERLEN) {
dirkx 0:355018f44c9f 383 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd illegal length.\n"));
dirkx 0:355018f44c9f 384 return;
dirkx 0:355018f44c9f 385 }
dirkx 0:355018f44c9f 386 if (len > packet_len) {
dirkx 0:355018f44c9f 387 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short packet.\n"));
dirkx 0:355018f44c9f 388 return;
dirkx 0:355018f44c9f 389 }
dirkx 0:355018f44c9f 390 len -= CHAP_HEADERLEN;
dirkx 0:355018f44c9f 391
dirkx 0:355018f44c9f 392 /*
dirkx 0:355018f44c9f 393 * Action depends on code (as in fact it usually does :-).
dirkx 0:355018f44c9f 394 */
dirkx 0:355018f44c9f 395 switch (code) {
dirkx 0:355018f44c9f 396 case CHAP_CHALLENGE:
dirkx 0:355018f44c9f 397 ChapReceiveChallenge(cstate, inp, id, len);
dirkx 0:355018f44c9f 398 break;
dirkx 0:355018f44c9f 399
dirkx 0:355018f44c9f 400 case CHAP_RESPONSE:
dirkx 0:355018f44c9f 401 ChapReceiveResponse(cstate, inp, id, len);
dirkx 0:355018f44c9f 402 break;
dirkx 0:355018f44c9f 403
dirkx 0:355018f44c9f 404 case CHAP_FAILURE:
dirkx 0:355018f44c9f 405 ChapReceiveFailure(cstate, inp, id, len);
dirkx 0:355018f44c9f 406 break;
dirkx 0:355018f44c9f 407
dirkx 0:355018f44c9f 408 case CHAP_SUCCESS:
dirkx 0:355018f44c9f 409 ChapReceiveSuccess(cstate, inp, id, len);
dirkx 0:355018f44c9f 410 break;
dirkx 0:355018f44c9f 411
dirkx 0:355018f44c9f 412 default: /* Need code reject? */
dirkx 0:355018f44c9f 413 CHAPDEBUG(LOG_WARNING, ("Unknown CHAP code (%d) received.\n", code));
dirkx 0:355018f44c9f 414 break;
dirkx 0:355018f44c9f 415 }
dirkx 0:355018f44c9f 416 }
dirkx 0:355018f44c9f 417
dirkx 0:355018f44c9f 418
dirkx 0:355018f44c9f 419 /*
dirkx 0:355018f44c9f 420 * ChapReceiveChallenge - Receive Challenge and send Response.
dirkx 0:355018f44c9f 421 */
dirkx 0:355018f44c9f 422 static void
dirkx 0:355018f44c9f 423 ChapReceiveChallenge(chap_state *cstate, u_char *inp, u_char id, int len)
dirkx 0:355018f44c9f 424 {
dirkx 0:355018f44c9f 425 int rchallenge_len;
dirkx 0:355018f44c9f 426 u_char *rchallenge;
dirkx 0:355018f44c9f 427 int secret_len;
dirkx 0:355018f44c9f 428 char secret[MAXSECRETLEN];
dirkx 0:355018f44c9f 429 char rhostname[256];
dirkx 0:355018f44c9f 430 MD5_CTX mdContext;
dirkx 0:355018f44c9f 431 u_char hash[MD5_SIGNATURE_SIZE];
dirkx 0:355018f44c9f 432
dirkx 0:355018f44c9f 433 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: Rcvd id %d.\n", id));
dirkx 0:355018f44c9f 434 if (cstate->clientstate == CHAPCS_CLOSED ||
dirkx 0:355018f44c9f 435 cstate->clientstate == CHAPCS_PENDING) {
dirkx 0:355018f44c9f 436 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: in state %d\n",
dirkx 0:355018f44c9f 437 cstate->clientstate));
dirkx 0:355018f44c9f 438 return;
dirkx 0:355018f44c9f 439 }
dirkx 0:355018f44c9f 440
dirkx 0:355018f44c9f 441 if (len < 2) {
dirkx 0:355018f44c9f 442 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
dirkx 0:355018f44c9f 443 return;
dirkx 0:355018f44c9f 444 }
dirkx 0:355018f44c9f 445
dirkx 0:355018f44c9f 446 GETCHAR(rchallenge_len, inp);
dirkx 0:355018f44c9f 447 len -= sizeof (u_char) + rchallenge_len; /* now name field length */
dirkx 0:355018f44c9f 448 if (len < 0) {
dirkx 0:355018f44c9f 449 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
dirkx 0:355018f44c9f 450 return;
dirkx 0:355018f44c9f 451 }
dirkx 0:355018f44c9f 452 rchallenge = inp;
dirkx 0:355018f44c9f 453 INCPTR(rchallenge_len, inp);
dirkx 0:355018f44c9f 454
dirkx 0:355018f44c9f 455 if (len >= (int)sizeof(rhostname)) {
dirkx 0:355018f44c9f 456 len = sizeof(rhostname) - 1;
dirkx 0:355018f44c9f 457 }
dirkx 0:355018f44c9f 458 BCOPY(inp, rhostname, len);
dirkx 0:355018f44c9f 459 rhostname[len] = '\000';
dirkx 0:355018f44c9f 460
dirkx 0:355018f44c9f 461 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: received name field '%s'\n",
dirkx 0:355018f44c9f 462 rhostname));
dirkx 0:355018f44c9f 463
dirkx 0:355018f44c9f 464 /* Microsoft doesn't send their name back in the PPP packet */
dirkx 0:355018f44c9f 465 if (ppp_settings.remote_name[0] != 0 && (ppp_settings.explicit_remote || rhostname[0] == 0)) {
dirkx 0:355018f44c9f 466 strncpy(rhostname, ppp_settings.remote_name, sizeof(rhostname));
dirkx 0:355018f44c9f 467 rhostname[sizeof(rhostname) - 1] = 0;
dirkx 0:355018f44c9f 468 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: using '%s' as remote name\n",
dirkx 0:355018f44c9f 469 rhostname));
dirkx 0:355018f44c9f 470 }
dirkx 0:355018f44c9f 471
dirkx 0:355018f44c9f 472 /* get secret for authenticating ourselves with the specified host */
dirkx 0:355018f44c9f 473 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
dirkx 0:355018f44c9f 474 secret, &secret_len, 0)) {
dirkx 0:355018f44c9f 475 secret_len = 0; /* assume null secret if can't find one */
dirkx 0:355018f44c9f 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
dirkx 0:355018f44c9f 477 rhostname));
dirkx 0:355018f44c9f 478 }
dirkx 0:355018f44c9f 479
dirkx 0:355018f44c9f 480 /* cancel response send timeout if necessary */
dirkx 0:355018f44c9f 481 if (cstate->clientstate == CHAPCS_RESPONSE) {
dirkx 0:355018f44c9f 482 UNTIMEOUT(ChapResponseTimeout, cstate);
dirkx 0:355018f44c9f 483 }
dirkx 0:355018f44c9f 484
dirkx 0:355018f44c9f 485 cstate->resp_id = id;
dirkx 0:355018f44c9f 486 cstate->resp_transmits = 0;
dirkx 0:355018f44c9f 487
dirkx 0:355018f44c9f 488 /* generate MD based on negotiated type */
dirkx 0:355018f44c9f 489 switch (cstate->resp_type) {
dirkx 0:355018f44c9f 490
dirkx 0:355018f44c9f 491 case CHAP_DIGEST_MD5:
dirkx 0:355018f44c9f 492 MD5Init(&mdContext);
dirkx 0:355018f44c9f 493 MD5Update(&mdContext, &cstate->resp_id, 1);
dirkx 0:355018f44c9f 494 MD5Update(&mdContext, (u_char*)secret, secret_len);
dirkx 0:355018f44c9f 495 MD5Update(&mdContext, rchallenge, rchallenge_len);
dirkx 0:355018f44c9f 496 MD5Final(hash, &mdContext);
dirkx 0:355018f44c9f 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE);
dirkx 0:355018f44c9f 498 cstate->resp_length = MD5_SIGNATURE_SIZE;
dirkx 0:355018f44c9f 499 break;
dirkx 0:355018f44c9f 500
dirkx 0:355018f44c9f 501 #if MSCHAP_SUPPORT
dirkx 0:355018f44c9f 502 case CHAP_MICROSOFT:
dirkx 0:355018f44c9f 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
dirkx 0:355018f44c9f 504 break;
dirkx 0:355018f44c9f 505 #endif
dirkx 0:355018f44c9f 506
dirkx 0:355018f44c9f 507 default:
dirkx 0:355018f44c9f 508 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->resp_type));
dirkx 0:355018f44c9f 509 return;
dirkx 0:355018f44c9f 510 }
dirkx 0:355018f44c9f 511
dirkx 0:355018f44c9f 512 BZERO(secret, sizeof(secret));
dirkx 0:355018f44c9f 513 ChapSendResponse(cstate);
dirkx 0:355018f44c9f 514 }
dirkx 0:355018f44c9f 515
dirkx 0:355018f44c9f 516
dirkx 0:355018f44c9f 517 /*
dirkx 0:355018f44c9f 518 * ChapReceiveResponse - Receive and process response.
dirkx 0:355018f44c9f 519 */
dirkx 0:355018f44c9f 520 static void
dirkx 0:355018f44c9f 521 ChapReceiveResponse(chap_state *cstate, u_char *inp, int id, int len)
dirkx 0:355018f44c9f 522 {
dirkx 0:355018f44c9f 523 u_char *remmd, remmd_len;
dirkx 0:355018f44c9f 524 int secret_len, old_state;
dirkx 0:355018f44c9f 525 int code;
dirkx 0:355018f44c9f 526 char rhostname[256];
dirkx 0:355018f44c9f 527 MD5_CTX mdContext;
dirkx 0:355018f44c9f 528 char secret[MAXSECRETLEN];
dirkx 0:355018f44c9f 529 u_char hash[MD5_SIGNATURE_SIZE];
dirkx 0:355018f44c9f 530
dirkx 0:355018f44c9f 531 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: Rcvd id %d.\n", id));
dirkx 0:355018f44c9f 532
dirkx 0:355018f44c9f 533 if (cstate->serverstate == CHAPSS_CLOSED ||
dirkx 0:355018f44c9f 534 cstate->serverstate == CHAPSS_PENDING) {
dirkx 0:355018f44c9f 535 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: in state %d\n",
dirkx 0:355018f44c9f 536 cstate->serverstate));
dirkx 0:355018f44c9f 537 return;
dirkx 0:355018f44c9f 538 }
dirkx 0:355018f44c9f 539
dirkx 0:355018f44c9f 540 if (id != cstate->chal_id) {
dirkx 0:355018f44c9f 541 return; /* doesn't match ID of last challenge */
dirkx 0:355018f44c9f 542 }
dirkx 0:355018f44c9f 543
dirkx 0:355018f44c9f 544 /*
dirkx 0:355018f44c9f 545 * If we have received a duplicate or bogus Response,
dirkx 0:355018f44c9f 546 * we have to send the same answer (Success/Failure)
dirkx 0:355018f44c9f 547 * as we did for the first Response we saw.
dirkx 0:355018f44c9f 548 */
dirkx 0:355018f44c9f 549 if (cstate->serverstate == CHAPSS_OPEN) {
dirkx 0:355018f44c9f 550 ChapSendStatus(cstate, CHAP_SUCCESS);
dirkx 0:355018f44c9f 551 return;
dirkx 0:355018f44c9f 552 }
dirkx 0:355018f44c9f 553 if (cstate->serverstate == CHAPSS_BADAUTH) {
dirkx 0:355018f44c9f 554 ChapSendStatus(cstate, CHAP_FAILURE);
dirkx 0:355018f44c9f 555 return;
dirkx 0:355018f44c9f 556 }
dirkx 0:355018f44c9f 557
dirkx 0:355018f44c9f 558 if (len < 2) {
dirkx 0:355018f44c9f 559 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
dirkx 0:355018f44c9f 560 return;
dirkx 0:355018f44c9f 561 }
dirkx 0:355018f44c9f 562 GETCHAR(remmd_len, inp); /* get length of MD */
dirkx 0:355018f44c9f 563 remmd = inp; /* get pointer to MD */
dirkx 0:355018f44c9f 564 INCPTR(remmd_len, inp);
dirkx 0:355018f44c9f 565
dirkx 0:355018f44c9f 566 len -= sizeof (u_char) + remmd_len;
dirkx 0:355018f44c9f 567 if (len < 0) {
dirkx 0:355018f44c9f 568 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
dirkx 0:355018f44c9f 569 return;
dirkx 0:355018f44c9f 570 }
dirkx 0:355018f44c9f 571
dirkx 0:355018f44c9f 572 UNTIMEOUT(ChapChallengeTimeout, cstate);
dirkx 0:355018f44c9f 573
dirkx 0:355018f44c9f 574 if (len >= (int)sizeof(rhostname)) {
dirkx 0:355018f44c9f 575 len = sizeof(rhostname) - 1;
dirkx 0:355018f44c9f 576 }
dirkx 0:355018f44c9f 577 BCOPY(inp, rhostname, len);
dirkx 0:355018f44c9f 578 rhostname[len] = '\000';
dirkx 0:355018f44c9f 579
dirkx 0:355018f44c9f 580 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: received name field: %s\n",
dirkx 0:355018f44c9f 581 rhostname));
dirkx 0:355018f44c9f 582
dirkx 0:355018f44c9f 583 /*
dirkx 0:355018f44c9f 584 * Get secret for authenticating them with us,
dirkx 0:355018f44c9f 585 * do the hash ourselves, and compare the result.
dirkx 0:355018f44c9f 586 */
dirkx 0:355018f44c9f 587 code = CHAP_FAILURE;
dirkx 0:355018f44c9f 588 if (!get_secret(cstate->unit, rhostname, cstate->chal_name,
dirkx 0:355018f44c9f 589 secret, &secret_len, 1)) {
dirkx 0:355018f44c9f 590 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating %s\n",
dirkx 0:355018f44c9f 591 rhostname));
dirkx 0:355018f44c9f 592 } else {
dirkx 0:355018f44c9f 593 /* generate MD based on negotiated type */
dirkx 0:355018f44c9f 594 switch (cstate->chal_type) {
dirkx 0:355018f44c9f 595
dirkx 0:355018f44c9f 596 case CHAP_DIGEST_MD5: /* only MD5 is defined for now */
dirkx 0:355018f44c9f 597 if (remmd_len != MD5_SIGNATURE_SIZE) {
dirkx 0:355018f44c9f 598 break; /* it's not even the right length */
dirkx 0:355018f44c9f 599 }
dirkx 0:355018f44c9f 600 MD5Init(&mdContext);
dirkx 0:355018f44c9f 601 MD5Update(&mdContext, &cstate->chal_id, 1);
dirkx 0:355018f44c9f 602 MD5Update(&mdContext, (u_char*)secret, secret_len);
dirkx 0:355018f44c9f 603 MD5Update(&mdContext, cstate->challenge, cstate->chal_len);
dirkx 0:355018f44c9f 604 MD5Final(hash, &mdContext);
dirkx 0:355018f44c9f 605
dirkx 0:355018f44c9f 606 /* compare local and remote MDs and send the appropriate status */
dirkx 0:355018f44c9f 607 if (memcmp (hash, remmd, MD5_SIGNATURE_SIZE) == 0) {
dirkx 0:355018f44c9f 608 code = CHAP_SUCCESS; /* they are the same! */
dirkx 0:355018f44c9f 609 }
dirkx 0:355018f44c9f 610 break;
dirkx 0:355018f44c9f 611
dirkx 0:355018f44c9f 612 default:
dirkx 0:355018f44c9f 613 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->chal_type));
dirkx 0:355018f44c9f 614 }
dirkx 0:355018f44c9f 615 }
dirkx 0:355018f44c9f 616
dirkx 0:355018f44c9f 617 BZERO(secret, sizeof(secret));
dirkx 0:355018f44c9f 618 ChapSendStatus(cstate, code);
dirkx 0:355018f44c9f 619
dirkx 0:355018f44c9f 620 if (code == CHAP_SUCCESS) {
dirkx 0:355018f44c9f 621 old_state = cstate->serverstate;
dirkx 0:355018f44c9f 622 cstate->serverstate = CHAPSS_OPEN;
dirkx 0:355018f44c9f 623 if (old_state == CHAPSS_INITIAL_CHAL) {
dirkx 0:355018f44c9f 624 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
dirkx 0:355018f44c9f 625 }
dirkx 0:355018f44c9f 626 if (cstate->chal_interval != 0) {
dirkx 0:355018f44c9f 627 TIMEOUT(ChapRechallenge, cstate, cstate->chal_interval);
dirkx 0:355018f44c9f 628 }
dirkx 0:355018f44c9f 629 } else {
dirkx 0:355018f44c9f 630 CHAPDEBUG(LOG_ERR, ("CHAP peer authentication failed\n"));
dirkx 0:355018f44c9f 631 cstate->serverstate = CHAPSS_BADAUTH;
dirkx 0:355018f44c9f 632 auth_peer_fail(cstate->unit, PPP_CHAP);
dirkx 0:355018f44c9f 633 }
dirkx 0:355018f44c9f 634 }
dirkx 0:355018f44c9f 635
dirkx 0:355018f44c9f 636 /*
dirkx 0:355018f44c9f 637 * ChapReceiveSuccess - Receive Success
dirkx 0:355018f44c9f 638 */
dirkx 0:355018f44c9f 639 static void
dirkx 0:355018f44c9f 640 ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len)
dirkx 0:355018f44c9f 641 {
dirkx 0:355018f44c9f 642 LWIP_UNUSED_ARG(id);
dirkx 0:355018f44c9f 643 LWIP_UNUSED_ARG(inp);
dirkx 0:355018f44c9f 644
dirkx 0:355018f44c9f 645 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: Rcvd id %d.\n", id));
dirkx 0:355018f44c9f 646
dirkx 0:355018f44c9f 647 if (cstate->clientstate == CHAPCS_OPEN) {
dirkx 0:355018f44c9f 648 /* presumably an answer to a duplicate response */
dirkx 0:355018f44c9f 649 return;
dirkx 0:355018f44c9f 650 }
dirkx 0:355018f44c9f 651
dirkx 0:355018f44c9f 652 if (cstate->clientstate != CHAPCS_RESPONSE) {
dirkx 0:355018f44c9f 653 /* don't know what this is */
dirkx 0:355018f44c9f 654 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: in state %d\n",
dirkx 0:355018f44c9f 655 cstate->clientstate));
dirkx 0:355018f44c9f 656 return;
dirkx 0:355018f44c9f 657 }
dirkx 0:355018f44c9f 658
dirkx 0:355018f44c9f 659 UNTIMEOUT(ChapResponseTimeout, cstate);
dirkx 0:355018f44c9f 660
dirkx 0:355018f44c9f 661 /*
dirkx 0:355018f44c9f 662 * Print message.
dirkx 0:355018f44c9f 663 */
dirkx 0:355018f44c9f 664 if (len > 0) {
dirkx 0:355018f44c9f 665 PRINTMSG(inp, len);
dirkx 0:355018f44c9f 666 }
dirkx 0:355018f44c9f 667
dirkx 0:355018f44c9f 668 cstate->clientstate = CHAPCS_OPEN;
dirkx 0:355018f44c9f 669
dirkx 0:355018f44c9f 670 auth_withpeer_success(cstate->unit, PPP_CHAP);
dirkx 0:355018f44c9f 671 }
dirkx 0:355018f44c9f 672
dirkx 0:355018f44c9f 673
dirkx 0:355018f44c9f 674 /*
dirkx 0:355018f44c9f 675 * ChapReceiveFailure - Receive failure.
dirkx 0:355018f44c9f 676 */
dirkx 0:355018f44c9f 677 static void
dirkx 0:355018f44c9f 678 ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len)
dirkx 0:355018f44c9f 679 {
dirkx 0:355018f44c9f 680 LWIP_UNUSED_ARG(id);
dirkx 0:355018f44c9f 681 LWIP_UNUSED_ARG(inp);
dirkx 0:355018f44c9f 682
dirkx 0:355018f44c9f 683 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: Rcvd id %d.\n", id));
dirkx 0:355018f44c9f 684
dirkx 0:355018f44c9f 685 if (cstate->clientstate != CHAPCS_RESPONSE) {
dirkx 0:355018f44c9f 686 /* don't know what this is */
dirkx 0:355018f44c9f 687 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: in state %d\n",
dirkx 0:355018f44c9f 688 cstate->clientstate));
dirkx 0:355018f44c9f 689 return;
dirkx 0:355018f44c9f 690 }
dirkx 0:355018f44c9f 691
dirkx 0:355018f44c9f 692 UNTIMEOUT(ChapResponseTimeout, cstate);
dirkx 0:355018f44c9f 693
dirkx 0:355018f44c9f 694 /*
dirkx 0:355018f44c9f 695 * Print message.
dirkx 0:355018f44c9f 696 */
dirkx 0:355018f44c9f 697 if (len > 0) {
dirkx 0:355018f44c9f 698 PRINTMSG(inp, len);
dirkx 0:355018f44c9f 699 }
dirkx 0:355018f44c9f 700
dirkx 0:355018f44c9f 701 CHAPDEBUG(LOG_ERR, ("CHAP authentication failed\n"));
dirkx 0:355018f44c9f 702 auth_withpeer_fail(cstate->unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
dirkx 0:355018f44c9f 703 }
dirkx 0:355018f44c9f 704
dirkx 0:355018f44c9f 705
dirkx 0:355018f44c9f 706 /*
dirkx 0:355018f44c9f 707 * ChapSendChallenge - Send an Authenticate challenge.
dirkx 0:355018f44c9f 708 */
dirkx 0:355018f44c9f 709 static void
dirkx 0:355018f44c9f 710 ChapSendChallenge(chap_state *cstate)
dirkx 0:355018f44c9f 711 {
dirkx 0:355018f44c9f 712 u_char *outp;
dirkx 0:355018f44c9f 713 int chal_len, name_len;
dirkx 0:355018f44c9f 714 int outlen;
dirkx 0:355018f44c9f 715
dirkx 0:355018f44c9f 716 chal_len = cstate->chal_len;
dirkx 0:355018f44c9f 717 name_len = (int)strlen(cstate->chal_name);
dirkx 0:355018f44c9f 718 outlen = CHAP_HEADERLEN + sizeof (u_char) + chal_len + name_len;
dirkx 0:355018f44c9f 719 outp = outpacket_buf[cstate->unit];
dirkx 0:355018f44c9f 720
dirkx 0:355018f44c9f 721 MAKEHEADER(outp, PPP_CHAP); /* paste in a CHAP header */
dirkx 0:355018f44c9f 722
dirkx 0:355018f44c9f 723 PUTCHAR(CHAP_CHALLENGE, outp);
dirkx 0:355018f44c9f 724 PUTCHAR(cstate->chal_id, outp);
dirkx 0:355018f44c9f 725 PUTSHORT(outlen, outp);
dirkx 0:355018f44c9f 726
dirkx 0:355018f44c9f 727 PUTCHAR(chal_len, outp); /* put length of challenge */
dirkx 0:355018f44c9f 728 BCOPY(cstate->challenge, outp, chal_len);
dirkx 0:355018f44c9f 729 INCPTR(chal_len, outp);
dirkx 0:355018f44c9f 730
dirkx 0:355018f44c9f 731 BCOPY(cstate->chal_name, outp, name_len); /* append hostname */
dirkx 0:355018f44c9f 732
dirkx 0:355018f44c9f 733 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
dirkx 0:355018f44c9f 734
dirkx 0:355018f44c9f 735 CHAPDEBUG(LOG_INFO, ("ChapSendChallenge: Sent id %d.\n", cstate->chal_id));
dirkx 0:355018f44c9f 736
dirkx 0:355018f44c9f 737 TIMEOUT(ChapChallengeTimeout, cstate, cstate->timeouttime);
dirkx 0:355018f44c9f 738 ++cstate->chal_transmits;
dirkx 0:355018f44c9f 739 }
dirkx 0:355018f44c9f 740
dirkx 0:355018f44c9f 741
dirkx 0:355018f44c9f 742 /*
dirkx 0:355018f44c9f 743 * ChapSendStatus - Send a status response (ack or nak).
dirkx 0:355018f44c9f 744 */
dirkx 0:355018f44c9f 745 static void
dirkx 0:355018f44c9f 746 ChapSendStatus(chap_state *cstate, int code)
dirkx 0:355018f44c9f 747 {
dirkx 0:355018f44c9f 748 u_char *outp;
dirkx 0:355018f44c9f 749 int outlen, msglen;
dirkx 0:355018f44c9f 750 char msg[256]; /* @todo: this can be a char*, no strcpy needed */
dirkx 0:355018f44c9f 751
dirkx 0:355018f44c9f 752 if (code == CHAP_SUCCESS) {
dirkx 0:355018f44c9f 753 strcpy(msg, "Welcome!");
dirkx 0:355018f44c9f 754 } else {
dirkx 0:355018f44c9f 755 strcpy(msg, "I don't like you. Go 'way.");
dirkx 0:355018f44c9f 756 }
dirkx 0:355018f44c9f 757 msglen = (int)strlen(msg);
dirkx 0:355018f44c9f 758
dirkx 0:355018f44c9f 759 outlen = CHAP_HEADERLEN + msglen;
dirkx 0:355018f44c9f 760 outp = outpacket_buf[cstate->unit];
dirkx 0:355018f44c9f 761
dirkx 0:355018f44c9f 762 MAKEHEADER(outp, PPP_CHAP); /* paste in a header */
dirkx 0:355018f44c9f 763
dirkx 0:355018f44c9f 764 PUTCHAR(code, outp);
dirkx 0:355018f44c9f 765 PUTCHAR(cstate->chal_id, outp);
dirkx 0:355018f44c9f 766 PUTSHORT(outlen, outp);
dirkx 0:355018f44c9f 767 BCOPY(msg, outp, msglen);
dirkx 0:355018f44c9f 768 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
dirkx 0:355018f44c9f 769
dirkx 0:355018f44c9f 770 CHAPDEBUG(LOG_INFO, ("ChapSendStatus: Sent code %d, id %d.\n", code,
dirkx 0:355018f44c9f 771 cstate->chal_id));
dirkx 0:355018f44c9f 772 }
dirkx 0:355018f44c9f 773
dirkx 0:355018f44c9f 774 /*
dirkx 0:355018f44c9f 775 * ChapGenChallenge is used to generate a pseudo-random challenge string of
dirkx 0:355018f44c9f 776 * a pseudo-random length between min_len and max_len. The challenge
dirkx 0:355018f44c9f 777 * string and its length are stored in *cstate, and various other fields of
dirkx 0:355018f44c9f 778 * *cstate are initialized.
dirkx 0:355018f44c9f 779 */
dirkx 0:355018f44c9f 780
dirkx 0:355018f44c9f 781 static void
dirkx 0:355018f44c9f 782 ChapGenChallenge(chap_state *cstate)
dirkx 0:355018f44c9f 783 {
dirkx 0:355018f44c9f 784 int chal_len;
dirkx 0:355018f44c9f 785 u_char *ptr = cstate->challenge;
dirkx 0:355018f44c9f 786 int i;
dirkx 0:355018f44c9f 787
dirkx 0:355018f44c9f 788 /* pick a random challenge length between MIN_CHALLENGE_LENGTH and
dirkx 0:355018f44c9f 789 MAX_CHALLENGE_LENGTH */
dirkx 0:355018f44c9f 790 chal_len = (unsigned)
dirkx 0:355018f44c9f 791 ((((magic() >> 16) *
dirkx 0:355018f44c9f 792 (MAX_CHALLENGE_LENGTH - MIN_CHALLENGE_LENGTH)) >> 16)
dirkx 0:355018f44c9f 793 + MIN_CHALLENGE_LENGTH);
dirkx 0:355018f44c9f 794 LWIP_ASSERT("chal_len <= 0xff", chal_len <= 0xffff);
dirkx 0:355018f44c9f 795 cstate->chal_len = (u_char)chal_len;
dirkx 0:355018f44c9f 796 cstate->chal_id = ++cstate->id;
dirkx 0:355018f44c9f 797 cstate->chal_transmits = 0;
dirkx 0:355018f44c9f 798
dirkx 0:355018f44c9f 799 /* generate a random string */
dirkx 0:355018f44c9f 800 for (i = 0; i < chal_len; i++ ) {
dirkx 0:355018f44c9f 801 *ptr++ = (char) (magic() & 0xff);
dirkx 0:355018f44c9f 802 }
dirkx 0:355018f44c9f 803 }
dirkx 0:355018f44c9f 804
dirkx 0:355018f44c9f 805 /*
dirkx 0:355018f44c9f 806 * ChapSendResponse - send a response packet with values as specified
dirkx 0:355018f44c9f 807 * in *cstate.
dirkx 0:355018f44c9f 808 */
dirkx 0:355018f44c9f 809 /* ARGSUSED */
dirkx 0:355018f44c9f 810 static void
dirkx 0:355018f44c9f 811 ChapSendResponse(chap_state *cstate)
dirkx 0:355018f44c9f 812 {
dirkx 0:355018f44c9f 813 u_char *outp;
dirkx 0:355018f44c9f 814 int outlen, md_len, name_len;
dirkx 0:355018f44c9f 815
dirkx 0:355018f44c9f 816 md_len = cstate->resp_length;
dirkx 0:355018f44c9f 817 name_len = (int)strlen(cstate->resp_name);
dirkx 0:355018f44c9f 818 outlen = CHAP_HEADERLEN + sizeof (u_char) + md_len + name_len;
dirkx 0:355018f44c9f 819 outp = outpacket_buf[cstate->unit];
dirkx 0:355018f44c9f 820
dirkx 0:355018f44c9f 821 MAKEHEADER(outp, PPP_CHAP);
dirkx 0:355018f44c9f 822
dirkx 0:355018f44c9f 823 PUTCHAR(CHAP_RESPONSE, outp); /* we are a response */
dirkx 0:355018f44c9f 824 PUTCHAR(cstate->resp_id, outp); /* copy id from challenge packet */
dirkx 0:355018f44c9f 825 PUTSHORT(outlen, outp); /* packet length */
dirkx 0:355018f44c9f 826
dirkx 0:355018f44c9f 827 PUTCHAR(md_len, outp); /* length of MD */
dirkx 0:355018f44c9f 828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */
dirkx 0:355018f44c9f 829 INCPTR(md_len, outp);
dirkx 0:355018f44c9f 830
dirkx 0:355018f44c9f 831 BCOPY(cstate->resp_name, outp, name_len); /* append our name */
dirkx 0:355018f44c9f 832
dirkx 0:355018f44c9f 833 /* send the packet */
dirkx 0:355018f44c9f 834 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
dirkx 0:355018f44c9f 835
dirkx 0:355018f44c9f 836 cstate->clientstate = CHAPCS_RESPONSE;
dirkx 0:355018f44c9f 837 TIMEOUT(ChapResponseTimeout, cstate, cstate->timeouttime);
dirkx 0:355018f44c9f 838 ++cstate->resp_transmits;
dirkx 0:355018f44c9f 839 }
dirkx 0:355018f44c9f 840
dirkx 0:355018f44c9f 841 #if PPP_ADDITIONAL_CALLBACKS
dirkx 0:355018f44c9f 842 static char *ChapCodenames[] = {
dirkx 0:355018f44c9f 843 "Challenge", "Response", "Success", "Failure"
dirkx 0:355018f44c9f 844 };
dirkx 0:355018f44c9f 845 /*
dirkx 0:355018f44c9f 846 * ChapPrintPkt - print the contents of a CHAP packet.
dirkx 0:355018f44c9f 847 */
dirkx 0:355018f44c9f 848 static int
dirkx 0:355018f44c9f 849 ChapPrintPkt( u_char *p, int plen, void (*printer) (void *, char *, ...), void *arg)
dirkx 0:355018f44c9f 850 {
dirkx 0:355018f44c9f 851 int code, id, len;
dirkx 0:355018f44c9f 852 int clen, nlen;
dirkx 0:355018f44c9f 853 u_char x;
dirkx 0:355018f44c9f 854
dirkx 0:355018f44c9f 855 if (plen < CHAP_HEADERLEN) {
dirkx 0:355018f44c9f 856 return 0;
dirkx 0:355018f44c9f 857 }
dirkx 0:355018f44c9f 858 GETCHAR(code, p);
dirkx 0:355018f44c9f 859 GETCHAR(id, p);
dirkx 0:355018f44c9f 860 GETSHORT(len, p);
dirkx 0:355018f44c9f 861 if (len < CHAP_HEADERLEN || len > plen) {
dirkx 0:355018f44c9f 862 return 0;
dirkx 0:355018f44c9f 863 }
dirkx 0:355018f44c9f 864
dirkx 0:355018f44c9f 865 if (code >= 1 && code <= sizeof(ChapCodenames) / sizeof(char *)) {
dirkx 0:355018f44c9f 866 printer(arg, " %s", ChapCodenames[code-1]);
dirkx 0:355018f44c9f 867 } else {
dirkx 0:355018f44c9f 868 printer(arg, " code=0x%x", code);
dirkx 0:355018f44c9f 869 }
dirkx 0:355018f44c9f 870 printer(arg, " id=0x%x", id);
dirkx 0:355018f44c9f 871 len -= CHAP_HEADERLEN;
dirkx 0:355018f44c9f 872 switch (code) {
dirkx 0:355018f44c9f 873 case CHAP_CHALLENGE:
dirkx 0:355018f44c9f 874 case CHAP_RESPONSE:
dirkx 0:355018f44c9f 875 if (len < 1) {
dirkx 0:355018f44c9f 876 break;
dirkx 0:355018f44c9f 877 }
dirkx 0:355018f44c9f 878 clen = p[0];
dirkx 0:355018f44c9f 879 if (len < clen + 1) {
dirkx 0:355018f44c9f 880 break;
dirkx 0:355018f44c9f 881 }
dirkx 0:355018f44c9f 882 ++p;
dirkx 0:355018f44c9f 883 nlen = len - clen - 1;
dirkx 0:355018f44c9f 884 printer(arg, " <");
dirkx 0:355018f44c9f 885 for (; clen > 0; --clen) {
dirkx 0:355018f44c9f 886 GETCHAR(x, p);
dirkx 0:355018f44c9f 887 printer(arg, "%.2x", x);
dirkx 0:355018f44c9f 888 }
dirkx 0:355018f44c9f 889 printer(arg, ">, name = %.*Z", nlen, p);
dirkx 0:355018f44c9f 890 break;
dirkx 0:355018f44c9f 891 case CHAP_FAILURE:
dirkx 0:355018f44c9f 892 case CHAP_SUCCESS:
dirkx 0:355018f44c9f 893 printer(arg, " %.*Z", len, p);
dirkx 0:355018f44c9f 894 break;
dirkx 0:355018f44c9f 895 default:
dirkx 0:355018f44c9f 896 for (clen = len; clen > 0; --clen) {
dirkx 0:355018f44c9f 897 GETCHAR(x, p);
dirkx 0:355018f44c9f 898 printer(arg, " %.2x", x);
dirkx 0:355018f44c9f 899 }
dirkx 0:355018f44c9f 900 }
dirkx 0:355018f44c9f 901
dirkx 0:355018f44c9f 902 return len + CHAP_HEADERLEN;
dirkx 0:355018f44c9f 903 }
dirkx 0:355018f44c9f 904 #endif /* PPP_ADDITIONAL_CALLBACKS */
dirkx 0:355018f44c9f 905
dirkx 0:355018f44c9f 906 #endif /* CHAP_SUPPORT */
dirkx 0:355018f44c9f 907
dirkx 0:355018f44c9f 908 #endif /* PPP_SUPPORT */