2 * Copyright (C) 2010 Andreas Steffen
3 * Copyright (C) 2010 HSR Hochschule fuer Technik Rapperswil
5 * This program is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2 of the License, or (at your
8 * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>.
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
12 * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
16 #include "eap_ttls_peer.h"
17 #include "eap_ttls_avp.h"
21 #include <radius_message.h>
22 #include <sa/eap/eap_method.h>
24 typedef struct private_eap_ttls_peer_t private_eap_ttls_peer_t
;
27 * Private data of an eap_ttls_peer_t object.
29 struct private_eap_ttls_peer_t
{
32 * Public eap_ttls_peer_t interface.
34 eap_ttls_peer_t
public;
39 identification_t
*server
;
44 identification_t
*peer
;
47 * Current EAP-TTLS state
52 * Current phase 2 EAP method
57 * Pending outbound EAP message
67 METHOD(tls_application_t
, process
, status_t
,
68 private_eap_ttls_peer_t
*this, bio_reader_t
*reader
)
70 chunk_t avp_data
= chunk_empty
;
71 chunk_t eap_data
= chunk_empty
;
77 eap_type_t type
, received_type
;
78 u_int32_t vendor
, received_vendor
;
81 bool concatenated
= FALSE
;
85 status
= this->avp
->process(this->avp
, reader
, &avp_data
);
91 DBG1(DBG_IKE
, "need more AVP data");
98 if (eap_data
.len
== 0)
100 if (avp_data
.len
< 4)
102 DBG1(DBG_IKE
, "AVP size to small to contain EAP header");
103 chunk_free(&avp_data
);
106 pkt
= (eap_packet_t
*)avp_data
.ptr
;
107 eap_len
= untoh16(&pkt
->length
);
109 if (eap_len
<= avp_data
.len
)
111 /* standard: EAP packet contained in a single AVP */
115 else if (avp_data
.len
== MAX_RADIUS_ATTRIBUTE_SIZE
)
117 /* non-standard: EAP packet segmented into multiple AVPs */
118 eap_data
= chunk_alloc(eap_len
);
123 DBG1(DBG_IKE
, "non-radius segmentation of EAP packet into AVPs");
124 chunk_free(&avp_data
);
129 if (avp_data
.len
> eap_data
.len
- eap_pos
)
131 DBG1(DBG_IKE
, "AVP size to large to fit into EAP packet");
132 chunk_free(&avp_data
);
133 chunk_free(&eap_data
);
136 memcpy(eap_data
.ptr
+ eap_pos
, avp_data
.ptr
, avp_data
.len
);
137 eap_pos
+= avp_data
.len
;
138 chunk_free(&avp_data
);
140 while (eap_pos
< eap_data
.len
);
142 in
= eap_payload_create_data(eap_data
);
143 chunk_free(&eap_data
);
144 payload
= (payload_t
*)in
;
146 if (payload
->verify(payload
) != SUCCESS
)
151 code
= in
->get_code(in
);
152 received_type
= in
->get_type(in
, &received_vendor
);
153 DBG1(DBG_IKE
, "received tunneled EAP-TTLS AVP%s [EAP/%N/%N]",
154 concatenated ?
"s" : "",
155 eap_code_short_names
, code
,
156 eap_type_short_names
, received_type
);
157 if (code
!= EAP_REQUEST
)
159 DBG1(DBG_IKE
, "%N expected", eap_code_names
, EAP_REQUEST
);
164 /* yet another phase2 authentication? */
167 type
= this->method
->get_type(this->method
, &vendor
);
169 if (type
!= received_type
|| vendor
!= received_vendor
)
171 this->method
->destroy(this->method
);
176 if (this->method
== NULL
)
180 DBG1(DBG_IKE
, "server requested vendor specific EAP method %d-%d "
181 "(id 0x%02X)", received_type
, received_vendor
,
182 in
->get_identifier(in
));
186 DBG1(DBG_IKE
, "server requested %N authentication (id 0x%02X)",
187 eap_type_names
, received_type
, in
->get_identifier(in
));
189 this->method
= charon
->eap
->create_instance(charon
->eap
,
190 received_type
, received_vendor
,
191 EAP_PEER
, this->server
, this->peer
);
194 DBG1(DBG_IKE
, "EAP method not supported");
195 this->out
= eap_payload_create_nak(in
->get_identifier(in
));
199 type
= this->method
->get_type(this->method
, &vendor
);
200 this->start_phase2
= FALSE
;
203 status
= this->method
->process(this->method
, in
, &this->out
);
209 this->method
->destroy(this->method
);
211 /* fall through to NEED_MORE */
218 DBG1(DBG_IKE
, "vendor specific EAP method %d-%d failed",
223 DBG1(DBG_IKE
, "%N method failed", eap_type_names
, type
);
229 METHOD(tls_application_t
, build
, status_t
,
230 private_eap_ttls_peer_t
*this, bio_writer_t
*writer
)
237 if (this->method
== NULL
&& this->start_phase2
)
239 /* generate an EAP Identity response */
240 this->method
= charon
->eap
->create_instance(charon
->eap
, EAP_IDENTITY
,
241 0, EAP_PEER
, this->server
, this->peer
);
242 if (this->method
== NULL
)
244 DBG1(DBG_IKE
, "EAP_IDENTITY method not available");
247 this->method
->process(this->method
, NULL
, &this->out
);
248 this->method
->destroy(this->method
);
250 this->start_phase2
= FALSE
;
255 code
= this->out
->get_code(this->out
);
256 type
= this->out
->get_type(this->out
, &vendor
);
257 DBG1(DBG_IKE
, "sending tunneled EAP-TTLS AVP [EAP/%N/%N]",
258 eap_code_short_names
, code
, eap_type_short_names
, type
);
260 /* get the raw EAP message data */
261 data
= this->out
->get_data(this->out
);
262 this->avp
->build(this->avp
, writer
, data
);
264 this->out
->destroy(this->out
);
267 return INVALID_STATE
;
270 METHOD(tls_application_t
, destroy
, void,
271 private_eap_ttls_peer_t
*this)
273 this->server
->destroy(this->server
);
274 this->peer
->destroy(this->peer
);
275 DESTROY_IF(this->method
);
276 DESTROY_IF(this->out
);
277 this->avp
->destroy(this->avp
);
284 eap_ttls_peer_t
*eap_ttls_peer_create(identification_t
*server
,
285 identification_t
*peer
)
287 private_eap_ttls_peer_t
*this;
297 .server
= server
->clone(server
),
298 .peer
= peer
->clone(peer
),
299 .start_phase2
= TRUE
,
300 .avp
= eap_ttls_avp_create(),
303 return &this->public;