This library is stripped down version of NetServices library. HTTP server and client function is NOT supported.

Dependents:   imu-daq-eth

Committer:
idinor
Date:
Wed Jul 20 11:45:39 2011 +0000
Revision:
0:dcf3c92487ca

        

Who changed what in which revision?

UserRevisionLine numberNew contents of line
idinor 0:dcf3c92487ca 1 /*** WARNING - THIS HAS NEVER BEEN FINISHED ***/
idinor 0:dcf3c92487ca 2 /*****************************************************************************
idinor 0:dcf3c92487ca 3 * chap.c - Network Challenge Handshake Authentication Protocol program file.
idinor 0:dcf3c92487ca 4 *
idinor 0:dcf3c92487ca 5 * Copyright (c) 2003 by Marc Boucher, Services Informatiques (MBSI) inc.
idinor 0:dcf3c92487ca 6 * portions Copyright (c) 1997 by Global Election Systems Inc.
idinor 0:dcf3c92487ca 7 *
idinor 0:dcf3c92487ca 8 * The authors hereby grant permission to use, copy, modify, distribute,
idinor 0:dcf3c92487ca 9 * and license this software and its documentation for any purpose, provided
idinor 0:dcf3c92487ca 10 * that existing copyright notices are retained in all copies and that this
idinor 0:dcf3c92487ca 11 * notice and the following disclaimer are included verbatim in any
idinor 0:dcf3c92487ca 12 * distributions. No written agreement, license, or royalty fee is required
idinor 0:dcf3c92487ca 13 * for any of the authorized uses.
idinor 0:dcf3c92487ca 14 *
idinor 0:dcf3c92487ca 15 * THIS SOFTWARE IS PROVIDED BY THE CONTRIBUTORS *AS IS* AND ANY EXPRESS OR
idinor 0:dcf3c92487ca 16 * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
idinor 0:dcf3c92487ca 17 * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
idinor 0:dcf3c92487ca 18 * IN NO EVENT SHALL THE CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
idinor 0:dcf3c92487ca 19 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
idinor 0:dcf3c92487ca 20 * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
idinor 0:dcf3c92487ca 21 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
idinor 0:dcf3c92487ca 22 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
idinor 0:dcf3c92487ca 23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
idinor 0:dcf3c92487ca 24 * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
idinor 0:dcf3c92487ca 25 *
idinor 0:dcf3c92487ca 26 ******************************************************************************
idinor 0:dcf3c92487ca 27 * REVISION HISTORY
idinor 0:dcf3c92487ca 28 *
idinor 0:dcf3c92487ca 29 * 03-01-01 Marc Boucher <marc@mbsi.ca>
idinor 0:dcf3c92487ca 30 * Ported to lwIP.
idinor 0:dcf3c92487ca 31 * 97-12-04 Guy Lancaster <lancasterg@acm.org>, Global Election Systems Inc.
idinor 0:dcf3c92487ca 32 * Original based on BSD chap.c.
idinor 0:dcf3c92487ca 33 *****************************************************************************/
idinor 0:dcf3c92487ca 34 /*
idinor 0:dcf3c92487ca 35 * chap.c - Challenge Handshake Authentication Protocol.
idinor 0:dcf3c92487ca 36 *
idinor 0:dcf3c92487ca 37 * Copyright (c) 1993 The Australian National University.
idinor 0:dcf3c92487ca 38 * All rights reserved.
idinor 0:dcf3c92487ca 39 *
idinor 0:dcf3c92487ca 40 * Redistribution and use in source and binary forms are permitted
idinor 0:dcf3c92487ca 41 * provided that the above copyright notice and this paragraph are
idinor 0:dcf3c92487ca 42 * duplicated in all such forms and that any documentation,
idinor 0:dcf3c92487ca 43 * advertising materials, and other materials related to such
idinor 0:dcf3c92487ca 44 * distribution and use acknowledge that the software was developed
idinor 0:dcf3c92487ca 45 * by the Australian National University. The name of the University
idinor 0:dcf3c92487ca 46 * may not be used to endorse or promote products derived from this
idinor 0:dcf3c92487ca 47 * software without specific prior written permission.
idinor 0:dcf3c92487ca 48 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
idinor 0:dcf3c92487ca 49 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
idinor 0:dcf3c92487ca 50 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
idinor 0:dcf3c92487ca 51 *
idinor 0:dcf3c92487ca 52 * Copyright (c) 1991 Gregory M. Christy.
idinor 0:dcf3c92487ca 53 * All rights reserved.
idinor 0:dcf3c92487ca 54 *
idinor 0:dcf3c92487ca 55 * Redistribution and use in source and binary forms are permitted
idinor 0:dcf3c92487ca 56 * provided that the above copyright notice and this paragraph are
idinor 0:dcf3c92487ca 57 * duplicated in all such forms and that any documentation,
idinor 0:dcf3c92487ca 58 * advertising materials, and other materials related to such
idinor 0:dcf3c92487ca 59 * distribution and use acknowledge that the software was developed
idinor 0:dcf3c92487ca 60 * by Gregory M. Christy. The name of the author may not be used to
idinor 0:dcf3c92487ca 61 * endorse or promote products derived from this software without
idinor 0:dcf3c92487ca 62 * specific prior written permission.
idinor 0:dcf3c92487ca 63 *
idinor 0:dcf3c92487ca 64 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
idinor 0:dcf3c92487ca 65 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
idinor 0:dcf3c92487ca 66 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
idinor 0:dcf3c92487ca 67 */
idinor 0:dcf3c92487ca 68
idinor 0:dcf3c92487ca 69 #include "lwip/opt.h"
idinor 0:dcf3c92487ca 70
idinor 0:dcf3c92487ca 71 #if PPP_SUPPORT /* don't build if not configured for use in lwipopts.h */
idinor 0:dcf3c92487ca 72
idinor 0:dcf3c92487ca 73 #if CHAP_SUPPORT /* don't build if not configured for use in lwipopts.h */
idinor 0:dcf3c92487ca 74
idinor 0:dcf3c92487ca 75 #include "ppp.h"
idinor 0:dcf3c92487ca 76 #include "pppdebug.h"
idinor 0:dcf3c92487ca 77
idinor 0:dcf3c92487ca 78 #include "magic.h"
idinor 0:dcf3c92487ca 79 #include "randm.h"
idinor 0:dcf3c92487ca 80 #include "auth.h"
idinor 0:dcf3c92487ca 81 #include "md5.h"
idinor 0:dcf3c92487ca 82 #include "chap.h"
idinor 0:dcf3c92487ca 83 #include "chpms.h"
idinor 0:dcf3c92487ca 84
idinor 0:dcf3c92487ca 85 #include <string.h>
idinor 0:dcf3c92487ca 86
idinor 0:dcf3c92487ca 87 #if 0 /* UNUSED */
idinor 0:dcf3c92487ca 88 /*
idinor 0:dcf3c92487ca 89 * Command-line options.
idinor 0:dcf3c92487ca 90 */
idinor 0:dcf3c92487ca 91 static option_t chap_option_list[] = {
idinor 0:dcf3c92487ca 92 { "chap-restart", o_int, &chap[0].timeouttime,
idinor 0:dcf3c92487ca 93 "Set timeout for CHAP" },
idinor 0:dcf3c92487ca 94 { "chap-max-challenge", o_int, &chap[0].max_transmits,
idinor 0:dcf3c92487ca 95 "Set max #xmits for challenge" },
idinor 0:dcf3c92487ca 96 { "chap-interval", o_int, &chap[0].chal_interval,
idinor 0:dcf3c92487ca 97 "Set interval for rechallenge" },
idinor 0:dcf3c92487ca 98 #ifdef MSLANMAN
idinor 0:dcf3c92487ca 99 { "ms-lanman", o_bool, &ms_lanman,
idinor 0:dcf3c92487ca 100 "Use LanMan passwd when using MS-CHAP", 1 },
idinor 0:dcf3c92487ca 101 #endif
idinor 0:dcf3c92487ca 102 { NULL }
idinor 0:dcf3c92487ca 103 };
idinor 0:dcf3c92487ca 104 #endif /* UNUSED */
idinor 0:dcf3c92487ca 105
idinor 0:dcf3c92487ca 106 /*
idinor 0:dcf3c92487ca 107 * Protocol entry points.
idinor 0:dcf3c92487ca 108 */
idinor 0:dcf3c92487ca 109 static void ChapInit (int);
idinor 0:dcf3c92487ca 110 static void ChapLowerUp (int);
idinor 0:dcf3c92487ca 111 static void ChapLowerDown (int);
idinor 0:dcf3c92487ca 112 static void ChapInput (int, u_char *, int);
idinor 0:dcf3c92487ca 113 static void ChapProtocolReject (int);
idinor 0:dcf3c92487ca 114 #if PPP_ADDITIONAL_CALLBACKS
idinor 0:dcf3c92487ca 115 static int ChapPrintPkt (u_char *, int, void (*) (void *, char *, ...), void *);
idinor 0:dcf3c92487ca 116 #endif
idinor 0:dcf3c92487ca 117
idinor 0:dcf3c92487ca 118 struct protent chap_protent = {
idinor 0:dcf3c92487ca 119 PPP_CHAP,
idinor 0:dcf3c92487ca 120 ChapInit,
idinor 0:dcf3c92487ca 121 ChapInput,
idinor 0:dcf3c92487ca 122 ChapProtocolReject,
idinor 0:dcf3c92487ca 123 ChapLowerUp,
idinor 0:dcf3c92487ca 124 ChapLowerDown,
idinor 0:dcf3c92487ca 125 NULL,
idinor 0:dcf3c92487ca 126 NULL,
idinor 0:dcf3c92487ca 127 #if PPP_ADDITIONAL_CALLBACKS
idinor 0:dcf3c92487ca 128 ChapPrintPkt,
idinor 0:dcf3c92487ca 129 NULL,
idinor 0:dcf3c92487ca 130 #endif /* PPP_ADDITIONAL_CALLBACKS */
idinor 0:dcf3c92487ca 131 1,
idinor 0:dcf3c92487ca 132 "CHAP",
idinor 0:dcf3c92487ca 133 #if PPP_ADDITIONAL_CALLBACKS
idinor 0:dcf3c92487ca 134 NULL,
idinor 0:dcf3c92487ca 135 NULL,
idinor 0:dcf3c92487ca 136 NULL
idinor 0:dcf3c92487ca 137 #endif /* PPP_ADDITIONAL_CALLBACKS */
idinor 0:dcf3c92487ca 138 };
idinor 0:dcf3c92487ca 139
idinor 0:dcf3c92487ca 140 chap_state chap[NUM_PPP]; /* CHAP state; one for each unit */
idinor 0:dcf3c92487ca 141
idinor 0:dcf3c92487ca 142 static void ChapChallengeTimeout (void *);
idinor 0:dcf3c92487ca 143 static void ChapResponseTimeout (void *);
idinor 0:dcf3c92487ca 144 static void ChapReceiveChallenge (chap_state *, u_char *, u_char, int);
idinor 0:dcf3c92487ca 145 static void ChapRechallenge (void *);
idinor 0:dcf3c92487ca 146 static void ChapReceiveResponse (chap_state *, u_char *, int, int);
idinor 0:dcf3c92487ca 147 static void ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len);
idinor 0:dcf3c92487ca 148 static void ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len);
idinor 0:dcf3c92487ca 149 static void ChapSendStatus (chap_state *, int);
idinor 0:dcf3c92487ca 150 static void ChapSendChallenge (chap_state *);
idinor 0:dcf3c92487ca 151 static void ChapSendResponse (chap_state *);
idinor 0:dcf3c92487ca 152 static void ChapGenChallenge (chap_state *);
idinor 0:dcf3c92487ca 153
idinor 0:dcf3c92487ca 154 /*
idinor 0:dcf3c92487ca 155 * ChapInit - Initialize a CHAP unit.
idinor 0:dcf3c92487ca 156 */
idinor 0:dcf3c92487ca 157 static void
idinor 0:dcf3c92487ca 158 ChapInit(int unit)
idinor 0:dcf3c92487ca 159 {
idinor 0:dcf3c92487ca 160 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 161
idinor 0:dcf3c92487ca 162 BZERO(cstate, sizeof(*cstate));
idinor 0:dcf3c92487ca 163 cstate->unit = unit;
idinor 0:dcf3c92487ca 164 cstate->clientstate = CHAPCS_INITIAL;
idinor 0:dcf3c92487ca 165 cstate->serverstate = CHAPSS_INITIAL;
idinor 0:dcf3c92487ca 166 cstate->timeouttime = CHAP_DEFTIMEOUT;
idinor 0:dcf3c92487ca 167 cstate->max_transmits = CHAP_DEFTRANSMITS;
idinor 0:dcf3c92487ca 168 /* random number generator is initialized in magic_init */
idinor 0:dcf3c92487ca 169 }
idinor 0:dcf3c92487ca 170
idinor 0:dcf3c92487ca 171
idinor 0:dcf3c92487ca 172 /*
idinor 0:dcf3c92487ca 173 * ChapAuthWithPeer - Authenticate us with our peer (start client).
idinor 0:dcf3c92487ca 174 *
idinor 0:dcf3c92487ca 175 */
idinor 0:dcf3c92487ca 176 void
idinor 0:dcf3c92487ca 177 ChapAuthWithPeer(int unit, char *our_name, u_char digest)
idinor 0:dcf3c92487ca 178 {
idinor 0:dcf3c92487ca 179 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 180
idinor 0:dcf3c92487ca 181 cstate->resp_name = our_name;
idinor 0:dcf3c92487ca 182 cstate->resp_type = digest;
idinor 0:dcf3c92487ca 183
idinor 0:dcf3c92487ca 184 if (cstate->clientstate == CHAPCS_INITIAL ||
idinor 0:dcf3c92487ca 185 cstate->clientstate == CHAPCS_PENDING) {
idinor 0:dcf3c92487ca 186 /* lower layer isn't up - wait until later */
idinor 0:dcf3c92487ca 187 cstate->clientstate = CHAPCS_PENDING;
idinor 0:dcf3c92487ca 188 return;
idinor 0:dcf3c92487ca 189 }
idinor 0:dcf3c92487ca 190
idinor 0:dcf3c92487ca 191 /*
idinor 0:dcf3c92487ca 192 * We get here as a result of LCP coming up.
idinor 0:dcf3c92487ca 193 * So even if CHAP was open before, we will
idinor 0:dcf3c92487ca 194 * have to re-authenticate ourselves.
idinor 0:dcf3c92487ca 195 */
idinor 0:dcf3c92487ca 196 cstate->clientstate = CHAPCS_LISTEN;
idinor 0:dcf3c92487ca 197 }
idinor 0:dcf3c92487ca 198
idinor 0:dcf3c92487ca 199
idinor 0:dcf3c92487ca 200 /*
idinor 0:dcf3c92487ca 201 * ChapAuthPeer - Authenticate our peer (start server).
idinor 0:dcf3c92487ca 202 */
idinor 0:dcf3c92487ca 203 void
idinor 0:dcf3c92487ca 204 ChapAuthPeer(int unit, char *our_name, u_char digest)
idinor 0:dcf3c92487ca 205 {
idinor 0:dcf3c92487ca 206 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 207
idinor 0:dcf3c92487ca 208 cstate->chal_name = our_name;
idinor 0:dcf3c92487ca 209 cstate->chal_type = digest;
idinor 0:dcf3c92487ca 210
idinor 0:dcf3c92487ca 211 if (cstate->serverstate == CHAPSS_INITIAL ||
idinor 0:dcf3c92487ca 212 cstate->serverstate == CHAPSS_PENDING) {
idinor 0:dcf3c92487ca 213 /* lower layer isn't up - wait until later */
idinor 0:dcf3c92487ca 214 cstate->serverstate = CHAPSS_PENDING;
idinor 0:dcf3c92487ca 215 return;
idinor 0:dcf3c92487ca 216 }
idinor 0:dcf3c92487ca 217
idinor 0:dcf3c92487ca 218 ChapGenChallenge(cstate);
idinor 0:dcf3c92487ca 219 ChapSendChallenge(cstate); /* crank it up dude! */
idinor 0:dcf3c92487ca 220 cstate->serverstate = CHAPSS_INITIAL_CHAL;
idinor 0:dcf3c92487ca 221 }
idinor 0:dcf3c92487ca 222
idinor 0:dcf3c92487ca 223
idinor 0:dcf3c92487ca 224 /*
idinor 0:dcf3c92487ca 225 * ChapChallengeTimeout - Timeout expired on sending challenge.
idinor 0:dcf3c92487ca 226 */
idinor 0:dcf3c92487ca 227 static void
idinor 0:dcf3c92487ca 228 ChapChallengeTimeout(void *arg)
idinor 0:dcf3c92487ca 229 {
idinor 0:dcf3c92487ca 230 chap_state *cstate = (chap_state *) arg;
idinor 0:dcf3c92487ca 231
idinor 0:dcf3c92487ca 232 /* if we aren't sending challenges, don't worry. then again we */
idinor 0:dcf3c92487ca 233 /* probably shouldn't be here either */
idinor 0:dcf3c92487ca 234 if (cstate->serverstate != CHAPSS_INITIAL_CHAL &&
idinor 0:dcf3c92487ca 235 cstate->serverstate != CHAPSS_RECHALLENGE) {
idinor 0:dcf3c92487ca 236 return;
idinor 0:dcf3c92487ca 237 }
idinor 0:dcf3c92487ca 238
idinor 0:dcf3c92487ca 239 if (cstate->chal_transmits >= cstate->max_transmits) {
idinor 0:dcf3c92487ca 240 /* give up on peer */
idinor 0:dcf3c92487ca 241 CHAPDEBUG(LOG_ERR, ("Peer failed to respond to CHAP challenge\n"));
idinor 0:dcf3c92487ca 242 cstate->serverstate = CHAPSS_BADAUTH;
idinor 0:dcf3c92487ca 243 auth_peer_fail(cstate->unit, PPP_CHAP);
idinor 0:dcf3c92487ca 244 return;
idinor 0:dcf3c92487ca 245 }
idinor 0:dcf3c92487ca 246
idinor 0:dcf3c92487ca 247 ChapSendChallenge(cstate); /* Re-send challenge */
idinor 0:dcf3c92487ca 248 }
idinor 0:dcf3c92487ca 249
idinor 0:dcf3c92487ca 250
idinor 0:dcf3c92487ca 251 /*
idinor 0:dcf3c92487ca 252 * ChapResponseTimeout - Timeout expired on sending response.
idinor 0:dcf3c92487ca 253 */
idinor 0:dcf3c92487ca 254 static void
idinor 0:dcf3c92487ca 255 ChapResponseTimeout(void *arg)
idinor 0:dcf3c92487ca 256 {
idinor 0:dcf3c92487ca 257 chap_state *cstate = (chap_state *) arg;
idinor 0:dcf3c92487ca 258
idinor 0:dcf3c92487ca 259 /* if we aren't sending a response, don't worry. */
idinor 0:dcf3c92487ca 260 if (cstate->clientstate != CHAPCS_RESPONSE) {
idinor 0:dcf3c92487ca 261 return;
idinor 0:dcf3c92487ca 262 }
idinor 0:dcf3c92487ca 263
idinor 0:dcf3c92487ca 264 ChapSendResponse(cstate); /* re-send response */
idinor 0:dcf3c92487ca 265 }
idinor 0:dcf3c92487ca 266
idinor 0:dcf3c92487ca 267
idinor 0:dcf3c92487ca 268 /*
idinor 0:dcf3c92487ca 269 * ChapRechallenge - Time to challenge the peer again.
idinor 0:dcf3c92487ca 270 */
idinor 0:dcf3c92487ca 271 static void
idinor 0:dcf3c92487ca 272 ChapRechallenge(void *arg)
idinor 0:dcf3c92487ca 273 {
idinor 0:dcf3c92487ca 274 chap_state *cstate = (chap_state *) arg;
idinor 0:dcf3c92487ca 275
idinor 0:dcf3c92487ca 276 /* if we aren't sending a response, don't worry. */
idinor 0:dcf3c92487ca 277 if (cstate->serverstate != CHAPSS_OPEN) {
idinor 0:dcf3c92487ca 278 return;
idinor 0:dcf3c92487ca 279 }
idinor 0:dcf3c92487ca 280
idinor 0:dcf3c92487ca 281 ChapGenChallenge(cstate);
idinor 0:dcf3c92487ca 282 ChapSendChallenge(cstate);
idinor 0:dcf3c92487ca 283 cstate->serverstate = CHAPSS_RECHALLENGE;
idinor 0:dcf3c92487ca 284 }
idinor 0:dcf3c92487ca 285
idinor 0:dcf3c92487ca 286
idinor 0:dcf3c92487ca 287 /*
idinor 0:dcf3c92487ca 288 * ChapLowerUp - The lower layer is up.
idinor 0:dcf3c92487ca 289 *
idinor 0:dcf3c92487ca 290 * Start up if we have pending requests.
idinor 0:dcf3c92487ca 291 */
idinor 0:dcf3c92487ca 292 static void
idinor 0:dcf3c92487ca 293 ChapLowerUp(int unit)
idinor 0:dcf3c92487ca 294 {
idinor 0:dcf3c92487ca 295 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 296
idinor 0:dcf3c92487ca 297 if (cstate->clientstate == CHAPCS_INITIAL) {
idinor 0:dcf3c92487ca 298 cstate->clientstate = CHAPCS_CLOSED;
idinor 0:dcf3c92487ca 299 } else if (cstate->clientstate == CHAPCS_PENDING) {
idinor 0:dcf3c92487ca 300 cstate->clientstate = CHAPCS_LISTEN;
idinor 0:dcf3c92487ca 301 }
idinor 0:dcf3c92487ca 302
idinor 0:dcf3c92487ca 303 if (cstate->serverstate == CHAPSS_INITIAL) {
idinor 0:dcf3c92487ca 304 cstate->serverstate = CHAPSS_CLOSED;
idinor 0:dcf3c92487ca 305 } else if (cstate->serverstate == CHAPSS_PENDING) {
idinor 0:dcf3c92487ca 306 ChapGenChallenge(cstate);
idinor 0:dcf3c92487ca 307 ChapSendChallenge(cstate);
idinor 0:dcf3c92487ca 308 cstate->serverstate = CHAPSS_INITIAL_CHAL;
idinor 0:dcf3c92487ca 309 }
idinor 0:dcf3c92487ca 310 }
idinor 0:dcf3c92487ca 311
idinor 0:dcf3c92487ca 312
idinor 0:dcf3c92487ca 313 /*
idinor 0:dcf3c92487ca 314 * ChapLowerDown - The lower layer is down.
idinor 0:dcf3c92487ca 315 *
idinor 0:dcf3c92487ca 316 * Cancel all timeouts.
idinor 0:dcf3c92487ca 317 */
idinor 0:dcf3c92487ca 318 static void
idinor 0:dcf3c92487ca 319 ChapLowerDown(int unit)
idinor 0:dcf3c92487ca 320 {
idinor 0:dcf3c92487ca 321 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 322
idinor 0:dcf3c92487ca 323 /* Timeout(s) pending? Cancel if so. */
idinor 0:dcf3c92487ca 324 if (cstate->serverstate == CHAPSS_INITIAL_CHAL ||
idinor 0:dcf3c92487ca 325 cstate->serverstate == CHAPSS_RECHALLENGE) {
idinor 0:dcf3c92487ca 326 UNTIMEOUT(ChapChallengeTimeout, cstate);
idinor 0:dcf3c92487ca 327 } else if (cstate->serverstate == CHAPSS_OPEN
idinor 0:dcf3c92487ca 328 && cstate->chal_interval != 0) {
idinor 0:dcf3c92487ca 329 UNTIMEOUT(ChapRechallenge, cstate);
idinor 0:dcf3c92487ca 330 }
idinor 0:dcf3c92487ca 331 if (cstate->clientstate == CHAPCS_RESPONSE) {
idinor 0:dcf3c92487ca 332 UNTIMEOUT(ChapResponseTimeout, cstate);
idinor 0:dcf3c92487ca 333 }
idinor 0:dcf3c92487ca 334 cstate->clientstate = CHAPCS_INITIAL;
idinor 0:dcf3c92487ca 335 cstate->serverstate = CHAPSS_INITIAL;
idinor 0:dcf3c92487ca 336 }
idinor 0:dcf3c92487ca 337
idinor 0:dcf3c92487ca 338
idinor 0:dcf3c92487ca 339 /*
idinor 0:dcf3c92487ca 340 * ChapProtocolReject - Peer doesn't grok CHAP.
idinor 0:dcf3c92487ca 341 */
idinor 0:dcf3c92487ca 342 static void
idinor 0:dcf3c92487ca 343 ChapProtocolReject(int unit)
idinor 0:dcf3c92487ca 344 {
idinor 0:dcf3c92487ca 345 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 346
idinor 0:dcf3c92487ca 347 if (cstate->serverstate != CHAPSS_INITIAL &&
idinor 0:dcf3c92487ca 348 cstate->serverstate != CHAPSS_CLOSED) {
idinor 0:dcf3c92487ca 349 auth_peer_fail(unit, PPP_CHAP);
idinor 0:dcf3c92487ca 350 }
idinor 0:dcf3c92487ca 351 if (cstate->clientstate != CHAPCS_INITIAL &&
idinor 0:dcf3c92487ca 352 cstate->clientstate != CHAPCS_CLOSED) {
idinor 0:dcf3c92487ca 353 auth_withpeer_fail(unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
idinor 0:dcf3c92487ca 354 }
idinor 0:dcf3c92487ca 355 ChapLowerDown(unit); /* shutdown chap */
idinor 0:dcf3c92487ca 356 }
idinor 0:dcf3c92487ca 357
idinor 0:dcf3c92487ca 358
idinor 0:dcf3c92487ca 359 /*
idinor 0:dcf3c92487ca 360 * ChapInput - Input CHAP packet.
idinor 0:dcf3c92487ca 361 */
idinor 0:dcf3c92487ca 362 static void
idinor 0:dcf3c92487ca 363 ChapInput(int unit, u_char *inpacket, int packet_len)
idinor 0:dcf3c92487ca 364 {
idinor 0:dcf3c92487ca 365 chap_state *cstate = &chap[unit];
idinor 0:dcf3c92487ca 366 u_char *inp;
idinor 0:dcf3c92487ca 367 u_char code, id;
idinor 0:dcf3c92487ca 368 int len;
idinor 0:dcf3c92487ca 369
idinor 0:dcf3c92487ca 370 /*
idinor 0:dcf3c92487ca 371 * Parse header (code, id and length).
idinor 0:dcf3c92487ca 372 * If packet too short, drop it.
idinor 0:dcf3c92487ca 373 */
idinor 0:dcf3c92487ca 374 inp = inpacket;
idinor 0:dcf3c92487ca 375 if (packet_len < CHAP_HEADERLEN) {
idinor 0:dcf3c92487ca 376 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short header.\n"));
idinor 0:dcf3c92487ca 377 return;
idinor 0:dcf3c92487ca 378 }
idinor 0:dcf3c92487ca 379 GETCHAR(code, inp);
idinor 0:dcf3c92487ca 380 GETCHAR(id, inp);
idinor 0:dcf3c92487ca 381 GETSHORT(len, inp);
idinor 0:dcf3c92487ca 382 if (len < CHAP_HEADERLEN) {
idinor 0:dcf3c92487ca 383 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd illegal length.\n"));
idinor 0:dcf3c92487ca 384 return;
idinor 0:dcf3c92487ca 385 }
idinor 0:dcf3c92487ca 386 if (len > packet_len) {
idinor 0:dcf3c92487ca 387 CHAPDEBUG(LOG_INFO, ("ChapInput: rcvd short packet.\n"));
idinor 0:dcf3c92487ca 388 return;
idinor 0:dcf3c92487ca 389 }
idinor 0:dcf3c92487ca 390 len -= CHAP_HEADERLEN;
idinor 0:dcf3c92487ca 391
idinor 0:dcf3c92487ca 392 /*
idinor 0:dcf3c92487ca 393 * Action depends on code (as in fact it usually does :-).
idinor 0:dcf3c92487ca 394 */
idinor 0:dcf3c92487ca 395 switch (code) {
idinor 0:dcf3c92487ca 396 case CHAP_CHALLENGE:
idinor 0:dcf3c92487ca 397 ChapReceiveChallenge(cstate, inp, id, len);
idinor 0:dcf3c92487ca 398 break;
idinor 0:dcf3c92487ca 399
idinor 0:dcf3c92487ca 400 case CHAP_RESPONSE:
idinor 0:dcf3c92487ca 401 ChapReceiveResponse(cstate, inp, id, len);
idinor 0:dcf3c92487ca 402 break;
idinor 0:dcf3c92487ca 403
idinor 0:dcf3c92487ca 404 case CHAP_FAILURE:
idinor 0:dcf3c92487ca 405 ChapReceiveFailure(cstate, inp, id, len);
idinor 0:dcf3c92487ca 406 break;
idinor 0:dcf3c92487ca 407
idinor 0:dcf3c92487ca 408 case CHAP_SUCCESS:
idinor 0:dcf3c92487ca 409 ChapReceiveSuccess(cstate, inp, id, len);
idinor 0:dcf3c92487ca 410 break;
idinor 0:dcf3c92487ca 411
idinor 0:dcf3c92487ca 412 default: /* Need code reject? */
idinor 0:dcf3c92487ca 413 CHAPDEBUG(LOG_WARNING, ("Unknown CHAP code (%d) received.\n", code));
idinor 0:dcf3c92487ca 414 break;
idinor 0:dcf3c92487ca 415 }
idinor 0:dcf3c92487ca 416 }
idinor 0:dcf3c92487ca 417
idinor 0:dcf3c92487ca 418
idinor 0:dcf3c92487ca 419 /*
idinor 0:dcf3c92487ca 420 * ChapReceiveChallenge - Receive Challenge and send Response.
idinor 0:dcf3c92487ca 421 */
idinor 0:dcf3c92487ca 422 static void
idinor 0:dcf3c92487ca 423 ChapReceiveChallenge(chap_state *cstate, u_char *inp, u_char id, int len)
idinor 0:dcf3c92487ca 424 {
idinor 0:dcf3c92487ca 425 int rchallenge_len;
idinor 0:dcf3c92487ca 426 u_char *rchallenge;
idinor 0:dcf3c92487ca 427 int secret_len;
idinor 0:dcf3c92487ca 428 char secret[MAXSECRETLEN];
idinor 0:dcf3c92487ca 429 char rhostname[256];
idinor 0:dcf3c92487ca 430 MD5_CTX mdContext;
idinor 0:dcf3c92487ca 431 u_char hash[MD5_SIGNATURE_SIZE];
idinor 0:dcf3c92487ca 432
idinor 0:dcf3c92487ca 433 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: Rcvd id %d.\n", id));
idinor 0:dcf3c92487ca 434 if (cstate->clientstate == CHAPCS_CLOSED ||
idinor 0:dcf3c92487ca 435 cstate->clientstate == CHAPCS_PENDING) {
idinor 0:dcf3c92487ca 436 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: in state %d\n",
idinor 0:dcf3c92487ca 437 cstate->clientstate));
idinor 0:dcf3c92487ca 438 return;
idinor 0:dcf3c92487ca 439 }
idinor 0:dcf3c92487ca 440
idinor 0:dcf3c92487ca 441 if (len < 2) {
idinor 0:dcf3c92487ca 442 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
idinor 0:dcf3c92487ca 443 return;
idinor 0:dcf3c92487ca 444 }
idinor 0:dcf3c92487ca 445
idinor 0:dcf3c92487ca 446 GETCHAR(rchallenge_len, inp);
idinor 0:dcf3c92487ca 447 len -= sizeof (u_char) + rchallenge_len; /* now name field length */
idinor 0:dcf3c92487ca 448 if (len < 0) {
idinor 0:dcf3c92487ca 449 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: rcvd short packet.\n"));
idinor 0:dcf3c92487ca 450 return;
idinor 0:dcf3c92487ca 451 }
idinor 0:dcf3c92487ca 452 rchallenge = inp;
idinor 0:dcf3c92487ca 453 INCPTR(rchallenge_len, inp);
idinor 0:dcf3c92487ca 454
idinor 0:dcf3c92487ca 455 if (len >= (int)sizeof(rhostname)) {
idinor 0:dcf3c92487ca 456 len = sizeof(rhostname) - 1;
idinor 0:dcf3c92487ca 457 }
idinor 0:dcf3c92487ca 458 BCOPY(inp, rhostname, len);
idinor 0:dcf3c92487ca 459 rhostname[len] = '\000';
idinor 0:dcf3c92487ca 460
idinor 0:dcf3c92487ca 461 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: received name field '%s'\n",
idinor 0:dcf3c92487ca 462 rhostname));
idinor 0:dcf3c92487ca 463
idinor 0:dcf3c92487ca 464 /* Microsoft doesn't send their name back in the PPP packet */
idinor 0:dcf3c92487ca 465 if (ppp_settings.remote_name[0] != 0 && (ppp_settings.explicit_remote || rhostname[0] == 0)) {
idinor 0:dcf3c92487ca 466 strncpy(rhostname, ppp_settings.remote_name, sizeof(rhostname));
idinor 0:dcf3c92487ca 467 rhostname[sizeof(rhostname) - 1] = 0;
idinor 0:dcf3c92487ca 468 CHAPDEBUG(LOG_INFO, ("ChapReceiveChallenge: using '%s' as remote name\n",
idinor 0:dcf3c92487ca 469 rhostname));
idinor 0:dcf3c92487ca 470 }
idinor 0:dcf3c92487ca 471
idinor 0:dcf3c92487ca 472 /* get secret for authenticating ourselves with the specified host */
idinor 0:dcf3c92487ca 473 if (!get_secret(cstate->unit, cstate->resp_name, rhostname,
idinor 0:dcf3c92487ca 474 secret, &secret_len, 0)) {
idinor 0:dcf3c92487ca 475 secret_len = 0; /* assume null secret if can't find one */
idinor 0:dcf3c92487ca 476 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating us to %s\n",
idinor 0:dcf3c92487ca 477 rhostname));
idinor 0:dcf3c92487ca 478 }
idinor 0:dcf3c92487ca 479
idinor 0:dcf3c92487ca 480 /* cancel response send timeout if necessary */
idinor 0:dcf3c92487ca 481 if (cstate->clientstate == CHAPCS_RESPONSE) {
idinor 0:dcf3c92487ca 482 UNTIMEOUT(ChapResponseTimeout, cstate);
idinor 0:dcf3c92487ca 483 }
idinor 0:dcf3c92487ca 484
idinor 0:dcf3c92487ca 485 cstate->resp_id = id;
idinor 0:dcf3c92487ca 486 cstate->resp_transmits = 0;
idinor 0:dcf3c92487ca 487
idinor 0:dcf3c92487ca 488 /* generate MD based on negotiated type */
idinor 0:dcf3c92487ca 489 switch (cstate->resp_type) {
idinor 0:dcf3c92487ca 490
idinor 0:dcf3c92487ca 491 case CHAP_DIGEST_MD5:
idinor 0:dcf3c92487ca 492 MD5Init(&mdContext);
idinor 0:dcf3c92487ca 493 MD5Update(&mdContext, &cstate->resp_id, 1);
idinor 0:dcf3c92487ca 494 MD5Update(&mdContext, (u_char*)secret, secret_len);
idinor 0:dcf3c92487ca 495 MD5Update(&mdContext, rchallenge, rchallenge_len);
idinor 0:dcf3c92487ca 496 MD5Final(hash, &mdContext);
idinor 0:dcf3c92487ca 497 BCOPY(hash, cstate->response, MD5_SIGNATURE_SIZE);
idinor 0:dcf3c92487ca 498 cstate->resp_length = MD5_SIGNATURE_SIZE;
idinor 0:dcf3c92487ca 499 break;
idinor 0:dcf3c92487ca 500
idinor 0:dcf3c92487ca 501 #if MSCHAP_SUPPORT
idinor 0:dcf3c92487ca 502 case CHAP_MICROSOFT:
idinor 0:dcf3c92487ca 503 ChapMS(cstate, rchallenge, rchallenge_len, secret, secret_len);
idinor 0:dcf3c92487ca 504 break;
idinor 0:dcf3c92487ca 505 #endif
idinor 0:dcf3c92487ca 506
idinor 0:dcf3c92487ca 507 default:
idinor 0:dcf3c92487ca 508 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->resp_type));
idinor 0:dcf3c92487ca 509 return;
idinor 0:dcf3c92487ca 510 }
idinor 0:dcf3c92487ca 511
idinor 0:dcf3c92487ca 512 BZERO(secret, sizeof(secret));
idinor 0:dcf3c92487ca 513 ChapSendResponse(cstate);
idinor 0:dcf3c92487ca 514 }
idinor 0:dcf3c92487ca 515
idinor 0:dcf3c92487ca 516
idinor 0:dcf3c92487ca 517 /*
idinor 0:dcf3c92487ca 518 * ChapReceiveResponse - Receive and process response.
idinor 0:dcf3c92487ca 519 */
idinor 0:dcf3c92487ca 520 static void
idinor 0:dcf3c92487ca 521 ChapReceiveResponse(chap_state *cstate, u_char *inp, int id, int len)
idinor 0:dcf3c92487ca 522 {
idinor 0:dcf3c92487ca 523 u_char *remmd, remmd_len;
idinor 0:dcf3c92487ca 524 int secret_len, old_state;
idinor 0:dcf3c92487ca 525 int code;
idinor 0:dcf3c92487ca 526 char rhostname[256];
idinor 0:dcf3c92487ca 527 MD5_CTX mdContext;
idinor 0:dcf3c92487ca 528 char secret[MAXSECRETLEN];
idinor 0:dcf3c92487ca 529 u_char hash[MD5_SIGNATURE_SIZE];
idinor 0:dcf3c92487ca 530
idinor 0:dcf3c92487ca 531 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: Rcvd id %d.\n", id));
idinor 0:dcf3c92487ca 532
idinor 0:dcf3c92487ca 533 if (cstate->serverstate == CHAPSS_CLOSED ||
idinor 0:dcf3c92487ca 534 cstate->serverstate == CHAPSS_PENDING) {
idinor 0:dcf3c92487ca 535 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: in state %d\n",
idinor 0:dcf3c92487ca 536 cstate->serverstate));
idinor 0:dcf3c92487ca 537 return;
idinor 0:dcf3c92487ca 538 }
idinor 0:dcf3c92487ca 539
idinor 0:dcf3c92487ca 540 if (id != cstate->chal_id) {
idinor 0:dcf3c92487ca 541 return; /* doesn't match ID of last challenge */
idinor 0:dcf3c92487ca 542 }
idinor 0:dcf3c92487ca 543
idinor 0:dcf3c92487ca 544 /*
idinor 0:dcf3c92487ca 545 * If we have received a duplicate or bogus Response,
idinor 0:dcf3c92487ca 546 * we have to send the same answer (Success/Failure)
idinor 0:dcf3c92487ca 547 * as we did for the first Response we saw.
idinor 0:dcf3c92487ca 548 */
idinor 0:dcf3c92487ca 549 if (cstate->serverstate == CHAPSS_OPEN) {
idinor 0:dcf3c92487ca 550 ChapSendStatus(cstate, CHAP_SUCCESS);
idinor 0:dcf3c92487ca 551 return;
idinor 0:dcf3c92487ca 552 }
idinor 0:dcf3c92487ca 553 if (cstate->serverstate == CHAPSS_BADAUTH) {
idinor 0:dcf3c92487ca 554 ChapSendStatus(cstate, CHAP_FAILURE);
idinor 0:dcf3c92487ca 555 return;
idinor 0:dcf3c92487ca 556 }
idinor 0:dcf3c92487ca 557
idinor 0:dcf3c92487ca 558 if (len < 2) {
idinor 0:dcf3c92487ca 559 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
idinor 0:dcf3c92487ca 560 return;
idinor 0:dcf3c92487ca 561 }
idinor 0:dcf3c92487ca 562 GETCHAR(remmd_len, inp); /* get length of MD */
idinor 0:dcf3c92487ca 563 remmd = inp; /* get pointer to MD */
idinor 0:dcf3c92487ca 564 INCPTR(remmd_len, inp);
idinor 0:dcf3c92487ca 565
idinor 0:dcf3c92487ca 566 len -= sizeof (u_char) + remmd_len;
idinor 0:dcf3c92487ca 567 if (len < 0) {
idinor 0:dcf3c92487ca 568 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: rcvd short packet.\n"));
idinor 0:dcf3c92487ca 569 return;
idinor 0:dcf3c92487ca 570 }
idinor 0:dcf3c92487ca 571
idinor 0:dcf3c92487ca 572 UNTIMEOUT(ChapChallengeTimeout, cstate);
idinor 0:dcf3c92487ca 573
idinor 0:dcf3c92487ca 574 if (len >= (int)sizeof(rhostname)) {
idinor 0:dcf3c92487ca 575 len = sizeof(rhostname) - 1;
idinor 0:dcf3c92487ca 576 }
idinor 0:dcf3c92487ca 577 BCOPY(inp, rhostname, len);
idinor 0:dcf3c92487ca 578 rhostname[len] = '\000';
idinor 0:dcf3c92487ca 579
idinor 0:dcf3c92487ca 580 CHAPDEBUG(LOG_INFO, ("ChapReceiveResponse: received name field: %s\n",
idinor 0:dcf3c92487ca 581 rhostname));
idinor 0:dcf3c92487ca 582
idinor 0:dcf3c92487ca 583 /*
idinor 0:dcf3c92487ca 584 * Get secret for authenticating them with us,
idinor 0:dcf3c92487ca 585 * do the hash ourselves, and compare the result.
idinor 0:dcf3c92487ca 586 */
idinor 0:dcf3c92487ca 587 code = CHAP_FAILURE;
idinor 0:dcf3c92487ca 588 if (!get_secret(cstate->unit, rhostname, cstate->chal_name,
idinor 0:dcf3c92487ca 589 secret, &secret_len, 1)) {
idinor 0:dcf3c92487ca 590 CHAPDEBUG(LOG_WARNING, ("No CHAP secret found for authenticating %s\n",
idinor 0:dcf3c92487ca 591 rhostname));
idinor 0:dcf3c92487ca 592 } else {
idinor 0:dcf3c92487ca 593 /* generate MD based on negotiated type */
idinor 0:dcf3c92487ca 594 switch (cstate->chal_type) {
idinor 0:dcf3c92487ca 595
idinor 0:dcf3c92487ca 596 case CHAP_DIGEST_MD5: /* only MD5 is defined for now */
idinor 0:dcf3c92487ca 597 if (remmd_len != MD5_SIGNATURE_SIZE) {
idinor 0:dcf3c92487ca 598 break; /* it's not even the right length */
idinor 0:dcf3c92487ca 599 }
idinor 0:dcf3c92487ca 600 MD5Init(&mdContext);
idinor 0:dcf3c92487ca 601 MD5Update(&mdContext, &cstate->chal_id, 1);
idinor 0:dcf3c92487ca 602 MD5Update(&mdContext, (u_char*)secret, secret_len);
idinor 0:dcf3c92487ca 603 MD5Update(&mdContext, cstate->challenge, cstate->chal_len);
idinor 0:dcf3c92487ca 604 MD5Final(hash, &mdContext);
idinor 0:dcf3c92487ca 605
idinor 0:dcf3c92487ca 606 /* compare local and remote MDs and send the appropriate status */
idinor 0:dcf3c92487ca 607 if (memcmp (hash, remmd, MD5_SIGNATURE_SIZE) == 0) {
idinor 0:dcf3c92487ca 608 code = CHAP_SUCCESS; /* they are the same! */
idinor 0:dcf3c92487ca 609 }
idinor 0:dcf3c92487ca 610 break;
idinor 0:dcf3c92487ca 611
idinor 0:dcf3c92487ca 612 default:
idinor 0:dcf3c92487ca 613 CHAPDEBUG(LOG_INFO, ("unknown digest type %d\n", cstate->chal_type));
idinor 0:dcf3c92487ca 614 }
idinor 0:dcf3c92487ca 615 }
idinor 0:dcf3c92487ca 616
idinor 0:dcf3c92487ca 617 BZERO(secret, sizeof(secret));
idinor 0:dcf3c92487ca 618 ChapSendStatus(cstate, code);
idinor 0:dcf3c92487ca 619
idinor 0:dcf3c92487ca 620 if (code == CHAP_SUCCESS) {
idinor 0:dcf3c92487ca 621 old_state = cstate->serverstate;
idinor 0:dcf3c92487ca 622 cstate->serverstate = CHAPSS_OPEN;
idinor 0:dcf3c92487ca 623 if (old_state == CHAPSS_INITIAL_CHAL) {
idinor 0:dcf3c92487ca 624 auth_peer_success(cstate->unit, PPP_CHAP, rhostname, len);
idinor 0:dcf3c92487ca 625 }
idinor 0:dcf3c92487ca 626 if (cstate->chal_interval != 0) {
idinor 0:dcf3c92487ca 627 TIMEOUT(ChapRechallenge, cstate, cstate->chal_interval);
idinor 0:dcf3c92487ca 628 }
idinor 0:dcf3c92487ca 629 } else {
idinor 0:dcf3c92487ca 630 CHAPDEBUG(LOG_ERR, ("CHAP peer authentication failed\n"));
idinor 0:dcf3c92487ca 631 cstate->serverstate = CHAPSS_BADAUTH;
idinor 0:dcf3c92487ca 632 auth_peer_fail(cstate->unit, PPP_CHAP);
idinor 0:dcf3c92487ca 633 }
idinor 0:dcf3c92487ca 634 }
idinor 0:dcf3c92487ca 635
idinor 0:dcf3c92487ca 636 /*
idinor 0:dcf3c92487ca 637 * ChapReceiveSuccess - Receive Success
idinor 0:dcf3c92487ca 638 */
idinor 0:dcf3c92487ca 639 static void
idinor 0:dcf3c92487ca 640 ChapReceiveSuccess(chap_state *cstate, u_char *inp, u_char id, int len)
idinor 0:dcf3c92487ca 641 {
idinor 0:dcf3c92487ca 642 LWIP_UNUSED_ARG(id);
idinor 0:dcf3c92487ca 643 LWIP_UNUSED_ARG(inp);
idinor 0:dcf3c92487ca 644
idinor 0:dcf3c92487ca 645 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: Rcvd id %d.\n", id));
idinor 0:dcf3c92487ca 646
idinor 0:dcf3c92487ca 647 if (cstate->clientstate == CHAPCS_OPEN) {
idinor 0:dcf3c92487ca 648 /* presumably an answer to a duplicate response */
idinor 0:dcf3c92487ca 649 return;
idinor 0:dcf3c92487ca 650 }
idinor 0:dcf3c92487ca 651
idinor 0:dcf3c92487ca 652 if (cstate->clientstate != CHAPCS_RESPONSE) {
idinor 0:dcf3c92487ca 653 /* don't know what this is */
idinor 0:dcf3c92487ca 654 CHAPDEBUG(LOG_INFO, ("ChapReceiveSuccess: in state %d\n",
idinor 0:dcf3c92487ca 655 cstate->clientstate));
idinor 0:dcf3c92487ca 656 return;
idinor 0:dcf3c92487ca 657 }
idinor 0:dcf3c92487ca 658
idinor 0:dcf3c92487ca 659 UNTIMEOUT(ChapResponseTimeout, cstate);
idinor 0:dcf3c92487ca 660
idinor 0:dcf3c92487ca 661 /*
idinor 0:dcf3c92487ca 662 * Print message.
idinor 0:dcf3c92487ca 663 */
idinor 0:dcf3c92487ca 664 if (len > 0) {
idinor 0:dcf3c92487ca 665 PRINTMSG(inp, len);
idinor 0:dcf3c92487ca 666 }
idinor 0:dcf3c92487ca 667
idinor 0:dcf3c92487ca 668 cstate->clientstate = CHAPCS_OPEN;
idinor 0:dcf3c92487ca 669
idinor 0:dcf3c92487ca 670 auth_withpeer_success(cstate->unit, PPP_CHAP);
idinor 0:dcf3c92487ca 671 }
idinor 0:dcf3c92487ca 672
idinor 0:dcf3c92487ca 673
idinor 0:dcf3c92487ca 674 /*
idinor 0:dcf3c92487ca 675 * ChapReceiveFailure - Receive failure.
idinor 0:dcf3c92487ca 676 */
idinor 0:dcf3c92487ca 677 static void
idinor 0:dcf3c92487ca 678 ChapReceiveFailure(chap_state *cstate, u_char *inp, u_char id, int len)
idinor 0:dcf3c92487ca 679 {
idinor 0:dcf3c92487ca 680 LWIP_UNUSED_ARG(id);
idinor 0:dcf3c92487ca 681 LWIP_UNUSED_ARG(inp);
idinor 0:dcf3c92487ca 682
idinor 0:dcf3c92487ca 683 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: Rcvd id %d.\n", id));
idinor 0:dcf3c92487ca 684
idinor 0:dcf3c92487ca 685 if (cstate->clientstate != CHAPCS_RESPONSE) {
idinor 0:dcf3c92487ca 686 /* don't know what this is */
idinor 0:dcf3c92487ca 687 CHAPDEBUG(LOG_INFO, ("ChapReceiveFailure: in state %d\n",
idinor 0:dcf3c92487ca 688 cstate->clientstate));
idinor 0:dcf3c92487ca 689 return;
idinor 0:dcf3c92487ca 690 }
idinor 0:dcf3c92487ca 691
idinor 0:dcf3c92487ca 692 UNTIMEOUT(ChapResponseTimeout, cstate);
idinor 0:dcf3c92487ca 693
idinor 0:dcf3c92487ca 694 /*
idinor 0:dcf3c92487ca 695 * Print message.
idinor 0:dcf3c92487ca 696 */
idinor 0:dcf3c92487ca 697 if (len > 0) {
idinor 0:dcf3c92487ca 698 PRINTMSG(inp, len);
idinor 0:dcf3c92487ca 699 }
idinor 0:dcf3c92487ca 700
idinor 0:dcf3c92487ca 701 CHAPDEBUG(LOG_ERR, ("CHAP authentication failed\n"));
idinor 0:dcf3c92487ca 702 auth_withpeer_fail(cstate->unit, PPP_CHAP); /* lwip: just sets the PPP error code on this unit to PPPERR_AUTHFAIL */
idinor 0:dcf3c92487ca 703 }
idinor 0:dcf3c92487ca 704
idinor 0:dcf3c92487ca 705
idinor 0:dcf3c92487ca 706 /*
idinor 0:dcf3c92487ca 707 * ChapSendChallenge - Send an Authenticate challenge.
idinor 0:dcf3c92487ca 708 */
idinor 0:dcf3c92487ca 709 static void
idinor 0:dcf3c92487ca 710 ChapSendChallenge(chap_state *cstate)
idinor 0:dcf3c92487ca 711 {
idinor 0:dcf3c92487ca 712 u_char *outp;
idinor 0:dcf3c92487ca 713 int chal_len, name_len;
idinor 0:dcf3c92487ca 714 int outlen;
idinor 0:dcf3c92487ca 715
idinor 0:dcf3c92487ca 716 chal_len = cstate->chal_len;
idinor 0:dcf3c92487ca 717 name_len = (int)strlen(cstate->chal_name);
idinor 0:dcf3c92487ca 718 outlen = CHAP_HEADERLEN + sizeof (u_char) + chal_len + name_len;
idinor 0:dcf3c92487ca 719 outp = outpacket_buf[cstate->unit];
idinor 0:dcf3c92487ca 720
idinor 0:dcf3c92487ca 721 MAKEHEADER(outp, PPP_CHAP); /* paste in a CHAP header */
idinor 0:dcf3c92487ca 722
idinor 0:dcf3c92487ca 723 PUTCHAR(CHAP_CHALLENGE, outp);
idinor 0:dcf3c92487ca 724 PUTCHAR(cstate->chal_id, outp);
idinor 0:dcf3c92487ca 725 PUTSHORT(outlen, outp);
idinor 0:dcf3c92487ca 726
idinor 0:dcf3c92487ca 727 PUTCHAR(chal_len, outp); /* put length of challenge */
idinor 0:dcf3c92487ca 728 BCOPY(cstate->challenge, outp, chal_len);
idinor 0:dcf3c92487ca 729 INCPTR(chal_len, outp);
idinor 0:dcf3c92487ca 730
idinor 0:dcf3c92487ca 731 BCOPY(cstate->chal_name, outp, name_len); /* append hostname */
idinor 0:dcf3c92487ca 732
idinor 0:dcf3c92487ca 733 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
idinor 0:dcf3c92487ca 734
idinor 0:dcf3c92487ca 735 CHAPDEBUG(LOG_INFO, ("ChapSendChallenge: Sent id %d.\n", cstate->chal_id));
idinor 0:dcf3c92487ca 736
idinor 0:dcf3c92487ca 737 TIMEOUT(ChapChallengeTimeout, cstate, cstate->timeouttime);
idinor 0:dcf3c92487ca 738 ++cstate->chal_transmits;
idinor 0:dcf3c92487ca 739 }
idinor 0:dcf3c92487ca 740
idinor 0:dcf3c92487ca 741
idinor 0:dcf3c92487ca 742 /*
idinor 0:dcf3c92487ca 743 * ChapSendStatus - Send a status response (ack or nak).
idinor 0:dcf3c92487ca 744 */
idinor 0:dcf3c92487ca 745 static void
idinor 0:dcf3c92487ca 746 ChapSendStatus(chap_state *cstate, int code)
idinor 0:dcf3c92487ca 747 {
idinor 0:dcf3c92487ca 748 u_char *outp;
idinor 0:dcf3c92487ca 749 int outlen, msglen;
idinor 0:dcf3c92487ca 750 char msg[256]; /* @todo: this can be a char*, no strcpy needed */
idinor 0:dcf3c92487ca 751
idinor 0:dcf3c92487ca 752 if (code == CHAP_SUCCESS) {
idinor 0:dcf3c92487ca 753 strcpy(msg, "Welcome!");
idinor 0:dcf3c92487ca 754 } else {
idinor 0:dcf3c92487ca 755 strcpy(msg, "I don't like you. Go 'way.");
idinor 0:dcf3c92487ca 756 }
idinor 0:dcf3c92487ca 757 msglen = (int)strlen(msg);
idinor 0:dcf3c92487ca 758
idinor 0:dcf3c92487ca 759 outlen = CHAP_HEADERLEN + msglen;
idinor 0:dcf3c92487ca 760 outp = outpacket_buf[cstate->unit];
idinor 0:dcf3c92487ca 761
idinor 0:dcf3c92487ca 762 MAKEHEADER(outp, PPP_CHAP); /* paste in a header */
idinor 0:dcf3c92487ca 763
idinor 0:dcf3c92487ca 764 PUTCHAR(code, outp);
idinor 0:dcf3c92487ca 765 PUTCHAR(cstate->chal_id, outp);
idinor 0:dcf3c92487ca 766 PUTSHORT(outlen, outp);
idinor 0:dcf3c92487ca 767 BCOPY(msg, outp, msglen);
idinor 0:dcf3c92487ca 768 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
idinor 0:dcf3c92487ca 769
idinor 0:dcf3c92487ca 770 CHAPDEBUG(LOG_INFO, ("ChapSendStatus: Sent code %d, id %d.\n", code,
idinor 0:dcf3c92487ca 771 cstate->chal_id));
idinor 0:dcf3c92487ca 772 }
idinor 0:dcf3c92487ca 773
idinor 0:dcf3c92487ca 774 /*
idinor 0:dcf3c92487ca 775 * ChapGenChallenge is used to generate a pseudo-random challenge string of
idinor 0:dcf3c92487ca 776 * a pseudo-random length between min_len and max_len. The challenge
idinor 0:dcf3c92487ca 777 * string and its length are stored in *cstate, and various other fields of
idinor 0:dcf3c92487ca 778 * *cstate are initialized.
idinor 0:dcf3c92487ca 779 */
idinor 0:dcf3c92487ca 780
idinor 0:dcf3c92487ca 781 static void
idinor 0:dcf3c92487ca 782 ChapGenChallenge(chap_state *cstate)
idinor 0:dcf3c92487ca 783 {
idinor 0:dcf3c92487ca 784 int chal_len;
idinor 0:dcf3c92487ca 785 u_char *ptr = cstate->challenge;
idinor 0:dcf3c92487ca 786 int i;
idinor 0:dcf3c92487ca 787
idinor 0:dcf3c92487ca 788 /* pick a random challenge length between MIN_CHALLENGE_LENGTH and
idinor 0:dcf3c92487ca 789 MAX_CHALLENGE_LENGTH */
idinor 0:dcf3c92487ca 790 chal_len = (unsigned)
idinor 0:dcf3c92487ca 791 ((((magic() >> 16) *
idinor 0:dcf3c92487ca 792 (MAX_CHALLENGE_LENGTH - MIN_CHALLENGE_LENGTH)) >> 16)
idinor 0:dcf3c92487ca 793 + MIN_CHALLENGE_LENGTH);
idinor 0:dcf3c92487ca 794 LWIP_ASSERT("chal_len <= 0xff", chal_len <= 0xffff);
idinor 0:dcf3c92487ca 795 cstate->chal_len = (u_char)chal_len;
idinor 0:dcf3c92487ca 796 cstate->chal_id = ++cstate->id;
idinor 0:dcf3c92487ca 797 cstate->chal_transmits = 0;
idinor 0:dcf3c92487ca 798
idinor 0:dcf3c92487ca 799 /* generate a random string */
idinor 0:dcf3c92487ca 800 for (i = 0; i < chal_len; i++ ) {
idinor 0:dcf3c92487ca 801 *ptr++ = (char) (magic() & 0xff);
idinor 0:dcf3c92487ca 802 }
idinor 0:dcf3c92487ca 803 }
idinor 0:dcf3c92487ca 804
idinor 0:dcf3c92487ca 805 /*
idinor 0:dcf3c92487ca 806 * ChapSendResponse - send a response packet with values as specified
idinor 0:dcf3c92487ca 807 * in *cstate.
idinor 0:dcf3c92487ca 808 */
idinor 0:dcf3c92487ca 809 /* ARGSUSED */
idinor 0:dcf3c92487ca 810 static void
idinor 0:dcf3c92487ca 811 ChapSendResponse(chap_state *cstate)
idinor 0:dcf3c92487ca 812 {
idinor 0:dcf3c92487ca 813 u_char *outp;
idinor 0:dcf3c92487ca 814 int outlen, md_len, name_len;
idinor 0:dcf3c92487ca 815
idinor 0:dcf3c92487ca 816 md_len = cstate->resp_length;
idinor 0:dcf3c92487ca 817 name_len = (int)strlen(cstate->resp_name);
idinor 0:dcf3c92487ca 818 outlen = CHAP_HEADERLEN + sizeof (u_char) + md_len + name_len;
idinor 0:dcf3c92487ca 819 outp = outpacket_buf[cstate->unit];
idinor 0:dcf3c92487ca 820
idinor 0:dcf3c92487ca 821 MAKEHEADER(outp, PPP_CHAP);
idinor 0:dcf3c92487ca 822
idinor 0:dcf3c92487ca 823 PUTCHAR(CHAP_RESPONSE, outp); /* we are a response */
idinor 0:dcf3c92487ca 824 PUTCHAR(cstate->resp_id, outp); /* copy id from challenge packet */
idinor 0:dcf3c92487ca 825 PUTSHORT(outlen, outp); /* packet length */
idinor 0:dcf3c92487ca 826
idinor 0:dcf3c92487ca 827 PUTCHAR(md_len, outp); /* length of MD */
idinor 0:dcf3c92487ca 828 BCOPY(cstate->response, outp, md_len); /* copy MD to buffer */
idinor 0:dcf3c92487ca 829 INCPTR(md_len, outp);
idinor 0:dcf3c92487ca 830
idinor 0:dcf3c92487ca 831 BCOPY(cstate->resp_name, outp, name_len); /* append our name */
idinor 0:dcf3c92487ca 832
idinor 0:dcf3c92487ca 833 /* send the packet */
idinor 0:dcf3c92487ca 834 pppWrite(cstate->unit, outpacket_buf[cstate->unit], outlen + PPP_HDRLEN);
idinor 0:dcf3c92487ca 835
idinor 0:dcf3c92487ca 836 cstate->clientstate = CHAPCS_RESPONSE;
idinor 0:dcf3c92487ca 837 TIMEOUT(ChapResponseTimeout, cstate, cstate->timeouttime);
idinor 0:dcf3c92487ca 838 ++cstate->resp_transmits;
idinor 0:dcf3c92487ca 839 }
idinor 0:dcf3c92487ca 840
idinor 0:dcf3c92487ca 841 #if PPP_ADDITIONAL_CALLBACKS
idinor 0:dcf3c92487ca 842 static char *ChapCodenames[] = {
idinor 0:dcf3c92487ca 843 "Challenge", "Response", "Success", "Failure"
idinor 0:dcf3c92487ca 844 };
idinor 0:dcf3c92487ca 845 /*
idinor 0:dcf3c92487ca 846 * ChapPrintPkt - print the contents of a CHAP packet.
idinor 0:dcf3c92487ca 847 */
idinor 0:dcf3c92487ca 848 static int
idinor 0:dcf3c92487ca 849 ChapPrintPkt( u_char *p, int plen, void (*printer) (void *, char *, ...), void *arg)
idinor 0:dcf3c92487ca 850 {
idinor 0:dcf3c92487ca 851 int code, id, len;
idinor 0:dcf3c92487ca 852 int clen, nlen;
idinor 0:dcf3c92487ca 853 u_char x;
idinor 0:dcf3c92487ca 854
idinor 0:dcf3c92487ca 855 if (plen < CHAP_HEADERLEN) {
idinor 0:dcf3c92487ca 856 return 0;
idinor 0:dcf3c92487ca 857 }
idinor 0:dcf3c92487ca 858 GETCHAR(code, p);
idinor 0:dcf3c92487ca 859 GETCHAR(id, p);
idinor 0:dcf3c92487ca 860 GETSHORT(len, p);
idinor 0:dcf3c92487ca 861 if (len < CHAP_HEADERLEN || len > plen) {
idinor 0:dcf3c92487ca 862 return 0;
idinor 0:dcf3c92487ca 863 }
idinor 0:dcf3c92487ca 864
idinor 0:dcf3c92487ca 865 if (code >= 1 && code <= sizeof(ChapCodenames) / sizeof(char *)) {
idinor 0:dcf3c92487ca 866 printer(arg, " %s", ChapCodenames[code-1]);
idinor 0:dcf3c92487ca 867 } else {
idinor 0:dcf3c92487ca 868 printer(arg, " code=0x%x", code);
idinor 0:dcf3c92487ca 869 }
idinor 0:dcf3c92487ca 870 printer(arg, " id=0x%x", id);
idinor 0:dcf3c92487ca 871 len -= CHAP_HEADERLEN;
idinor 0:dcf3c92487ca 872 switch (code) {
idinor 0:dcf3c92487ca 873 case CHAP_CHALLENGE:
idinor 0:dcf3c92487ca 874 case CHAP_RESPONSE:
idinor 0:dcf3c92487ca 875 if (len < 1) {
idinor 0:dcf3c92487ca 876 break;
idinor 0:dcf3c92487ca 877 }
idinor 0:dcf3c92487ca 878 clen = p[0];
idinor 0:dcf3c92487ca 879 if (len < clen + 1) {
idinor 0:dcf3c92487ca 880 break;
idinor 0:dcf3c92487ca 881 }
idinor 0:dcf3c92487ca 882 ++p;
idinor 0:dcf3c92487ca 883 nlen = len - clen - 1;
idinor 0:dcf3c92487ca 884 printer(arg, " <");
idinor 0:dcf3c92487ca 885 for (; clen > 0; --clen) {
idinor 0:dcf3c92487ca 886 GETCHAR(x, p);
idinor 0:dcf3c92487ca 887 printer(arg, "%.2x", x);
idinor 0:dcf3c92487ca 888 }
idinor 0:dcf3c92487ca 889 printer(arg, ">, name = %.*Z", nlen, p);
idinor 0:dcf3c92487ca 890 break;
idinor 0:dcf3c92487ca 891 case CHAP_FAILURE:
idinor 0:dcf3c92487ca 892 case CHAP_SUCCESS:
idinor 0:dcf3c92487ca 893 printer(arg, " %.*Z", len, p);
idinor 0:dcf3c92487ca 894 break;
idinor 0:dcf3c92487ca 895 default:
idinor 0:dcf3c92487ca 896 for (clen = len; clen > 0; --clen) {
idinor 0:dcf3c92487ca 897 GETCHAR(x, p);
idinor 0:dcf3c92487ca 898 printer(arg, " %.2x", x);
idinor 0:dcf3c92487ca 899 }
idinor 0:dcf3c92487ca 900 }
idinor 0:dcf3c92487ca 901
idinor 0:dcf3c92487ca 902 return len + CHAP_HEADERLEN;
idinor 0:dcf3c92487ca 903 }
idinor 0:dcf3c92487ca 904 #endif /* PPP_ADDITIONAL_CALLBACKS */
idinor 0:dcf3c92487ca 905
idinor 0:dcf3c92487ca 906 #endif /* CHAP_SUPPORT */
idinor 0:dcf3c92487ca 907
idinor 0:dcf3c92487ca 908 #endif /* PPP_SUPPORT */