2010-09-15 09:51:40 +02:00
|
|
|
/*
|
|
|
|
* EAP server/peer: EAP-pwd shared definitions
|
|
|
|
* Copyright (c) 2009, Dan Harkins <dharkins@lounge.org>
|
|
|
|
*
|
2012-02-11 13:19:26 +01:00
|
|
|
* This software may be distributed under the terms of the BSD license.
|
|
|
|
* See README for more details.
|
2010-09-15 09:51:40 +02:00
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef EAP_PWD_COMMON_H
|
|
|
|
#define EAP_PWD_COMMON_H
|
|
|
|
|
|
|
|
#include <openssl/bn.h>
|
|
|
|
#include <openssl/ec.h>
|
|
|
|
#include <openssl/evp.h>
|
|
|
|
|
|
|
|
/*
|
|
|
|
* definition of a finite cyclic group
|
|
|
|
* TODO: support one based on a prime field
|
|
|
|
*/
|
|
|
|
typedef struct group_definition_ {
|
|
|
|
u16 group_num;
|
|
|
|
EC_GROUP *group;
|
|
|
|
EC_POINT *pwe;
|
|
|
|
BIGNUM *order;
|
|
|
|
BIGNUM *prime;
|
|
|
|
} EAP_PWD_group;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* EAP-pwd header, included on all payloads
|
2011-11-19 15:52:52 +01:00
|
|
|
* L(1 bit) | M(1 bit) | exch(6 bits) | total_length(if L is set)
|
2010-09-15 09:51:40 +02:00
|
|
|
*/
|
2012-02-11 11:46:30 +01:00
|
|
|
#define EAP_PWD_HDR_SIZE 1
|
2010-09-15 09:51:40 +02:00
|
|
|
|
|
|
|
#define EAP_PWD_OPCODE_ID_EXCH 1
|
|
|
|
#define EAP_PWD_OPCODE_COMMIT_EXCH 2
|
|
|
|
#define EAP_PWD_OPCODE_CONFIRM_EXCH 3
|
2012-02-11 11:46:30 +01:00
|
|
|
#define EAP_PWD_GET_LENGTH_BIT(x) ((x) & 0x80)
|
|
|
|
#define EAP_PWD_SET_LENGTH_BIT(x) ((x) |= 0x80)
|
|
|
|
#define EAP_PWD_GET_MORE_BIT(x) ((x) & 0x40)
|
|
|
|
#define EAP_PWD_SET_MORE_BIT(x) ((x) |= 0x40)
|
|
|
|
#define EAP_PWD_GET_EXCHANGE(x) ((x) & 0x3f)
|
|
|
|
#define EAP_PWD_SET_EXCHANGE(x,y) ((x) |= (y))
|
2010-09-15 09:51:40 +02:00
|
|
|
|
|
|
|
/* EAP-pwd-ID payload */
|
|
|
|
struct eap_pwd_id {
|
|
|
|
be16 group_num;
|
|
|
|
u8 random_function;
|
|
|
|
#define EAP_PWD_DEFAULT_RAND_FUNC 1
|
|
|
|
u8 prf;
|
|
|
|
#define EAP_PWD_DEFAULT_PRF 1
|
|
|
|
u8 token[4];
|
|
|
|
u8 prep;
|
|
|
|
#define EAP_PWD_PREP_NONE 0
|
|
|
|
#define EAP_PWD_PREP_MS 1
|
|
|
|
u8 identity[0]; /* length inferred from payload */
|
|
|
|
} STRUCT_PACKED;
|
|
|
|
|
|
|
|
/* common routines */
|
2015-03-28 08:34:30 +01:00
|
|
|
int compute_password_element(EAP_PWD_group *grp, u16 num,
|
|
|
|
const u8 *password, size_t password_len,
|
|
|
|
const u8 *id_server, size_t id_server_len,
|
|
|
|
const u8 *id_peer, size_t id_peer_len,
|
|
|
|
const u8 *token);
|
|
|
|
int compute_keys(EAP_PWD_group *grp, BN_CTX *bnctx, const BIGNUM *k,
|
|
|
|
const BIGNUM *peer_scalar, const BIGNUM *server_scalar,
|
|
|
|
const u8 *confirm_peer, const u8 *confirm_server,
|
|
|
|
const u32 *ciphersuite, u8 *msk, u8 *emsk, u8 *session_id);
|
2012-07-02 21:10:03 +02:00
|
|
|
struct crypto_hash * eap_pwd_h_init(void);
|
|
|
|
void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len);
|
|
|
|
void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest);
|
2010-09-15 09:51:40 +02:00
|
|
|
|
|
|
|
#endif /* EAP_PWD_COMMON_H */
|