f62480f47d11aaf4f6c970ef992b37e0941293cf
[freeradius.git] / src / modules / rlm_eap / types / rlm_eap_leap / rlm_eap_leap.c
1 /*
2  * rlm_eap_leap.c    Handles that are called from eap
3  *
4  * Version:     $Id$
5  *
6  *   This program is free software; you can redistribute it and/or modify
7  *   it under the terms of the GNU General Public License as published by
8  *   the Free Software Foundation; either version 2 of the License, or
9  *   (at your option) any later version.
10  *
11  *   This program is distributed in the hope that it will be useful,
12  *   but WITHOUT ANY WARRANTY; without even the implied warranty of
13  *   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14  *   GNU General Public License for more details.
15  *
16  *   You should have received a copy of the GNU General Public License
17  *   along with this program; if not, write to the Free Software
18  *   Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  *
20  * Copyright 2003 Alan DeKok <aland@freeradius.org>
21  * Copyright 2006 The FreeRADIUS server project
22  */
23
24 #include <freeradius-devel/ident.h>
25 RCSID("$Id$")
26
27 #include <stdio.h>
28 #include <stdlib.h>
29
30 #include "eap_leap.h"
31
32
33 /*
34  * send an initial eap-leap request
35  * ie access challenge to the user/peer.
36
37  * Frame eap reply packet.
38  * len = header + type + leap_typedata
39  * leap_typedata = value_size + value
40  */
41 static int leap_initiate(UNUSED void *instance, EAP_HANDLER *handler)
42 {
43         leap_session_t  *session;
44         LEAP_PACKET     *reply;
45
46         DEBUG2("  rlm_eap_leap: Stage 2");
47
48         /*
49          *      LEAP requires a User-Name attribute
50          */
51         if (!handler->request->username) {
52                 DEBUG2("  rlm_eap_leap: User-Name is required for EAP-LEAP authentication.");
53                 return 0;
54         }
55
56         reply = eapleap_initiate(handler->eap_ds, handler->request->username);
57         if (reply == NULL)
58                 return 0;
59
60         eapleap_compose(handler->eap_ds, reply);
61
62         handler->opaque = malloc(sizeof(leap_session_t));
63         if (!handler->opaque) {
64           radlog(L_ERR, "rlm_eap_leap: Out of memory");
65           eapleap_free(&reply);
66           return 0;
67         }
68
69         /*
70          *      Remember which stage we're in, and which challenge
71          *      we sent to the AP.  The later stages will take care
72          *      of filling in the peer response.
73          */
74         session = (leap_session_t *) handler->opaque;
75         handler->free_opaque = free; /* just malloc'd memory */
76
77         session->stage = 4;     /* the next stage we're in */
78         memcpy(session->peer_challenge, reply->challenge, reply->count);
79
80         DEBUG2("  rlm_eap_leap: Successfully initiated");
81
82         /*
83          *      The next stage to process the packet.
84          */
85         handler->stage = AUTHENTICATE;
86
87         eapleap_free(&reply);
88         return 1;
89 }
90
91 static int leap_authenticate(UNUSED void *instance, EAP_HANDLER *handler)
92 {
93         int             rcode;
94         leap_session_t  *session;
95         LEAP_PACKET     *packet;
96         LEAP_PACKET     *reply;
97         VALUE_PAIR      *password;
98
99         if (!handler->opaque) {
100                 radlog(L_ERR, "rlm_eap_leap: Cannot authenticate without LEAP history");
101                 return 0;
102         }
103         session = (leap_session_t *) handler->opaque;
104         reply = NULL;
105
106         /*
107          *      Extract the LEAP packet.
108          */
109         if (!(packet = eapleap_extract(handler->eap_ds)))
110                 return 0;
111
112         /*
113          *      The password is never sent over the wire.
114          *      Always get the configured password, for each user.
115          */
116         password = pairfind(handler->request->config_items, PW_CLEARTEXT_PASSWORD, 0, TAG_ANY);
117         if (!password) password = pairfind(handler->request->config_items, PW_NT_PASSWORD, 0, TAG_ANY);
118         if (!password) {
119                 DEBUG2("rlm_eap_leap: No Cleartext-Password or NT-Password configured for this user");
120                 eapleap_free(&packet);
121                 return 0;
122         }
123
124         /*
125          *      We've already sent the AP challenge.  This packet
126          *      should contain the NtChallengeResponse
127          */
128         switch (session->stage) {
129         case 4:                 /* Verify NtChallengeResponse */
130                 DEBUG2("  rlm_eap_leap: Stage 4");
131                 rcode = eapleap_stage4(packet, password, session);
132                 session->stage = 6;
133
134                 /*
135                  *      We send EAP-Success or EAP-Fail, and not
136                  *      any LEAP packet.  So we return here.
137                  */
138                 if (!rcode) {
139                         handler->eap_ds->request->code = PW_EAP_FAILURE;
140                         eapleap_free(&packet);
141                         return 0;
142                 }
143
144                 handler->eap_ds->request->code = PW_EAP_SUCCESS;
145
146                 /*
147                  *      Do this only for Success.
148                  */
149                 handler->eap_ds->request->id = handler->eap_ds->response->id + 1;
150                 handler->eap_ds->set_request_id = 1;
151
152                 /*
153                  *      LEAP requires a challenge in stage 4, not
154                  *      an Access-Accept, which is normally returned
155                  *      by eap_compose() in eap.c, when the EAP reply code
156                  *      is EAP_SUCCESS.
157                  */
158                 handler->request->reply->code = PW_ACCESS_CHALLENGE;
159                 eapleap_free(&packet);
160                 return 1;
161                 break;
162
163         case 6:                 /* Issue session key */
164                 DEBUG2("  rlm_eap_leap: Stage 6");
165                 reply = eapleap_stage6(packet, handler->request,
166                                        handler->request->username, password,
167                                        session, &handler->request->reply->vps);
168                 break;
169
170                 /*
171                  *      Stages 1, 3, and 5 are requests from the AP.
172                  *      Stage 2 is handled by initiate()
173                  */
174         default:
175                 radlog(L_ERR, "  rlm_eap_leap: Internal sanity check failed on stage");
176                 break;
177         }
178
179         eapleap_free(&packet);
180
181         /*
182          *      Process the packet.  We don't care about any previous
183          *      EAP packets, as
184          */
185         if (!reply) {
186                 return 0;
187         }
188
189         eapleap_compose(handler->eap_ds, reply);
190
191         eapleap_free(&reply);
192         return 1;
193 }
194
195 /*
196  *      The module name should be the only globally exported symbol.
197  *      That is, everything else should be 'static'.
198  */
199 EAP_TYPE rlm_eap_leap = {
200         "eap_leap",
201         NULL,                   /* attach */
202         leap_initiate,          /* Start the initial request, after Identity */
203         NULL,                   /* authorization */
204         leap_authenticate,      /* authentication */
205         NULL,                   /* detach */
206 };