2 * rlm_eap_leap.c Handles that are called from eap
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 * Copyright 2003 Alan DeKok <aland@freeradius.org>
21 * Copyright 2006 The FreeRADIUS server project
24 #include <freeradius-devel/ident.h>
34 * send an initial eap-leap request
35 * ie access challenge to the user/peer.
37 * Frame eap reply packet.
38 * len = header + type + leap_typedata
39 * leap_typedata = value_size + value
41 static int leap_initiate(UNUSED void *instance, EAP_HANDLER *handler)
43 leap_session_t *session;
46 DEBUG2(" rlm_eap_leap: Stage 2");
49 * LEAP requires a User-Name attribute
51 if (!handler->request->username) {
52 DEBUG2(" rlm_eap_leap: User-Name is required for EAP-LEAP authentication.");
56 reply = eapleap_initiate(handler->eap_ds, handler->request->username);
60 eapleap_compose(handler->eap_ds, reply);
62 handler->opaque = malloc(sizeof(leap_session_t));
63 if (!handler->opaque) {
64 radlog(L_ERR, "rlm_eap_leap: Out of memory");
70 * Remember which stage we're in, and which challenge
71 * we sent to the AP. The later stages will take care
72 * of filling in the peer response.
74 session = (leap_session_t *) handler->opaque;
75 handler->free_opaque = free; /* just malloc'd memory */
77 session->stage = 4; /* the next stage we're in */
78 memcpy(session->peer_challenge, reply->challenge, reply->count);
80 DEBUG2(" rlm_eap_leap: Successfully initiated");
83 * The next stage to process the packet.
85 handler->stage = AUTHENTICATE;
91 static int leap_authenticate(UNUSED void *instance, EAP_HANDLER *handler)
94 leap_session_t *session;
99 if (!handler->opaque) {
100 radlog(L_ERR, "rlm_eap_leap: Cannot authenticate without LEAP history");
103 session = (leap_session_t *) handler->opaque;
107 * Extract the LEAP packet.
109 if (!(packet = eapleap_extract(handler->eap_ds)))
113 * The password is never sent over the wire.
114 * Always get the configured password, for each user.
116 password = pairfind(handler->request->config_items, PW_CLEARTEXT_PASSWORD, 0, TAG_ANY);
117 if (!password) password = pairfind(handler->request->config_items, PW_NT_PASSWORD, 0, TAG_ANY);
119 DEBUG2("rlm_eap_leap: No Cleartext-Password or NT-Password configured for this user");
120 eapleap_free(&packet);
125 * We've already sent the AP challenge. This packet
126 * should contain the NtChallengeResponse
128 switch (session->stage) {
129 case 4: /* Verify NtChallengeResponse */
130 DEBUG2(" rlm_eap_leap: Stage 4");
131 rcode = eapleap_stage4(packet, password, session);
135 * We send EAP-Success or EAP-Fail, and not
136 * any LEAP packet. So we return here.
139 handler->eap_ds->request->code = PW_EAP_FAILURE;
140 eapleap_free(&packet);
144 handler->eap_ds->request->code = PW_EAP_SUCCESS;
147 * Do this only for Success.
149 handler->eap_ds->request->id = handler->eap_ds->response->id + 1;
150 handler->eap_ds->set_request_id = 1;
153 * LEAP requires a challenge in stage 4, not
154 * an Access-Accept, which is normally returned
155 * by eap_compose() in eap.c, when the EAP reply code
158 handler->request->reply->code = PW_ACCESS_CHALLENGE;
159 eapleap_free(&packet);
163 case 6: /* Issue session key */
164 DEBUG2(" rlm_eap_leap: Stage 6");
165 reply = eapleap_stage6(packet, handler->request,
166 handler->request->username, password,
167 session, &handler->request->reply->vps);
171 * Stages 1, 3, and 5 are requests from the AP.
172 * Stage 2 is handled by initiate()
175 radlog(L_ERR, " rlm_eap_leap: Internal sanity check failed on stage");
179 eapleap_free(&packet);
182 * Process the packet. We don't care about any previous
189 eapleap_compose(handler->eap_ds, reply);
191 eapleap_free(&reply);
196 * The module name should be the only globally exported symbol.
197 * That is, everything else should be 'static'.
199 EAP_TYPE rlm_eap_leap = {
202 leap_initiate, /* Start the initial request, after Identity */
203 NULL, /* authorization */
204 leap_authenticate, /* authentication */