method_eap: Refactor

Instead of delayed response packet generation, the
method_eap::process_request_packet() prepares the response packet. This
eliminates the state machine.

Signed-off-by: Simon Rozman <simon@rozman.si>
This commit is contained in:
Simon Rozman 2020-01-29 10:23:49 +01:00
parent 7caa4b12a6
commit 4da7785490
2 changed files with 82 additions and 64 deletions

View File

@ -309,22 +309,29 @@ namespace eap
/// @} /// @}
virtual void get_result(
_In_ EapPeerMethodResultReason reason,
_Inout_ EapPeerMethodResult *pResult);
protected:
///
/// Creates an EAP response packet
///
/// \param[in] eap_type EAP type
/// \param[in] pResponsePacketData Packet data
/// \param[in] dwResponsePacketDataSize \p pResponsePacketData size in bytes
///
void make_response_packet(
_In_ winstd::eap_type_t eap_type,
_In_bytecount_(dwResponsePacketDataSize) const void *pResponsePacketData,
_In_ DWORD dwResponsePacketDataSize);
protected: protected:
const winstd::eap_type_t m_eap_method; ///< EAP method type const winstd::eap_type_t m_eap_method; ///< EAP method type
credentials &m_cred; ///< User credentials credentials &m_cred; ///< User credentials
unsigned char m_id; ///< Request packet ID unsigned char m_id; ///< Request packet ID
EapPeerMethodResultReason m_result; ///< The result the authenticator reported with EAP-Success or EAP-Failure
/// sanitizing_blob m_packet_res; ///< Buffer to hold response packet data
/// Communication phase
///
enum class phase_t {
unknown = -1, ///< Unknown phase
init = 0, ///< Initialize
identity, ///< Send identity
inner, ///< Send inner method response
nak, ///< Send Legacy Nak response
finished, ///< EAP Success packet received
} m_phase; ///< What phase is our communication at?
}; };
/// @} /// @}

View File

@ -204,7 +204,7 @@ eap::method_eap::method_eap(_In_ module &mod, _In_ eap_type_t eap_method, _In_ c
m_eap_method(eap_method), m_eap_method(eap_method),
m_cred(cred), m_cred(cred),
m_id(0), m_id(0),
m_phase(phase_t::unknown), m_result(EapPeerMethodResultUnknown),
method_tunnel(mod, inner) method_tunnel(mod, inner)
{ {
} }
@ -226,7 +226,8 @@ void eap::method_eap::begin_session(
assert(m_inner); assert(m_inner);
m_inner->begin_session(dwFlags, pAttributeArray, hTokenImpersonateUser, std::min<DWORD>(dwMaxSendPacketSize, MAXWORD) - sizeof(EapPacket)); m_inner->begin_session(dwFlags, pAttributeArray, hTokenImpersonateUser, std::min<DWORD>(dwMaxSendPacketSize, MAXWORD) - sizeof(EapPacket));
m_phase = phase_t::init; m_result = EapPeerMethodResultUnknown;
m_packet_res.clear();
} }
@ -256,31 +257,26 @@ EapPeerMethodResponseAction eap::method_eap::process_request_packet(
if ((eap_type_t)hdr->Data[0] == eap_type_t::identity) { if ((eap_type_t)hdr->Data[0] == eap_type_t::identity) {
// EAP Identity. Respond with identity. // EAP Identity. Respond with identity.
m_phase = phase_t::identity; sanitizing_string identity_utf8;
WideCharToMultiByte(CP_UTF8, 0, m_cred.get_identity(), identity_utf8, NULL, NULL);
make_response_packet(eap_type_t::identity, identity_utf8.c_str(), (DWORD)(sizeof(char)*identity_utf8.length()));
return EapPeerMethodResponseActionSend; return EapPeerMethodResponseActionSend;
} else if ((eap_type_t)hdr->Data[0] == m_eap_method) { } else if ((eap_type_t)hdr->Data[0] == m_eap_method) {
// Process the data with underlying method. // Process the data with underlying method.
m_phase = phase_t::inner; m_packet_res.clear();
return method_tunnel::process_request_packet(hdr->Data + 1, size_packet - sizeof(EapPacket)); return method_tunnel::process_request_packet(hdr->Data + 1, size_packet - sizeof(EapPacket));
} else { } else {
// Unsupported EAP method. Respond with Legacy Nak. // Unsupported EAP method. Respond with Legacy Nak suggesting our EAP method to continue.
m_phase = phase_t::nak; make_response_packet(eap_type_t::nak, &m_eap_method, sizeof(eap_type_t));
return EapPeerMethodResponseActionSend; return EapPeerMethodResponseActionSend;
} }
// Check EAP Success/Failure packets for inner methods. // Check EAP Success/Failure packets for inner methods.
case EapCodeSuccess: case EapCodeSuccess:
assert(size_packet == 4);
if (m_phase == phase_t::init) {
// Discard "canned" success packet.
return EapPeerMethodResponseActionDiscard;
}
m_phase = phase_t::finished;
return EapPeerMethodResponseActionResult;
case EapCodeFailure: case EapCodeFailure:
assert(size_packet == 4); assert(size_packet == 4);
throw invalid_argument(string_printf(__FUNCTION__ " EAP Failure packet received.")); m_result = (EapPeerMethodResultReason)(hdr->Code - EapCodeSuccess + EapPeerMethodResultSuccess);
return EapPeerMethodResponseActionResult;
default: default:
throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Unknown EAP packet received (expected: %u, received: %u).", EapCodeRequest, (int)hdr->Code)); throw win_runtime_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, string_printf(__FUNCTION__ " Unknown EAP packet received (expected: %u, received: %u).", EapCodeRequest, (int)hdr->Code));
@ -294,55 +290,70 @@ void eap::method_eap::get_response_packet(
{ {
assert(size_max >= sizeof(EapPacket)); // We should be able to respond with at least an EAP packet header. assert(size_max >= sizeof(EapPacket)); // We should be able to respond with at least an EAP packet header.
if (size_max > MAXWORD) size_max = MAXWORD; // EAP packets maximum size is 64kB. if (size_max > MAXWORD) size_max = MAXWORD; // EAP packets maximum size is 64kB.
packet.reserve(size_max); // To avoid reallocation when inserting EAP packet header later.
// Prepare EAP packet header. if (m_packet_res.empty()) {
EapPacket hdr;
hdr.Code = (BYTE)EapCodeResponse;
hdr.Id = m_id;
switch (m_phase) {
case phase_t::identity: {
hdr.Data[0] = (BYTE)eap_type_t::identity;
// Convert identity to UTF-8.
sanitizing_string identity_utf8;
WideCharToMultiByte(CP_UTF8, 0, m_cred.get_identity(), identity_utf8, NULL, NULL);
packet.assign(identity_utf8.cbegin(), identity_utf8.cend());
break;
}
case phase_t::inner:
hdr.Data[0] = (BYTE)m_eap_method;
packet.reserve(size_max); // To avoid reallocation when inserting EAP packet header later.
// Get data from underlying method. // Get data from underlying method.
method_tunnel::get_response_packet(packet, size_max - sizeof(EapPacket)); method_tunnel::get_response_packet(packet, size_max - sizeof(EapPacket));
break;
case phase_t::nak: { size_t size_packet = sizeof(EapPacket) + packet.size();
// Respond with Legacy Nak suggesting our EAP method to continue.
hdr.Data[0] = (BYTE)eap_type_t::nak;
// Check packet size. We will suggest one EAP method alone, so we need one byte for data.
size_t size_packet = sizeof(EapPacket) + 1;
if (size_packet > size_max) if (size_packet > size_max)
throw invalid_argument(string_printf(__FUNCTION__ " This method does not support packet fragmentation, but the data size is too big to fit in one packet (packet: %zu, maximum: %u).", size_packet, size_max)); throw invalid_argument(string_printf(__FUNCTION__ " This method does not support packet fragmentation, but the data size is too big to fit in one packet (packet: %zu, maximum: %u).", size_packet, size_max));
packet.reserve(size_packet); // To avoid reallocation when inserting EAP packet header later.
// Data of Legacy Nak packet is a list of supported EAP types: our method alone. EapPacket hdr;
packet.assign(1, (unsigned char)m_eap_method); hdr.Code = (BYTE)EapCodeResponse;
break; hdr.Id = m_id;
assert(size_packet <= MAXWORD); // Packets spanning over 64kB are not supported.
*reinterpret_cast<unsigned short*>(hdr.Length) = htons((unsigned short)size_packet);
hdr.Data[0] = (BYTE)m_eap_method;
// Insert EAP packet header before data.
packet.insert(packet.begin(),
reinterpret_cast<const unsigned char*>(&hdr),
reinterpret_cast<const unsigned char*>(&hdr + 1));
} else {
// We have a response packet ready.
size_t size_packet = m_packet_res.size();
if (size_packet > size_max)
throw invalid_argument(string_printf(__FUNCTION__ " This method does not support packet fragmentation, but the data size is too big to fit in one packet (packet: %zu, maximum: %u).", size_packet, size_max));
packet.assign(m_packet_res.cbegin(), m_packet_res.cend());
} }
}
default:
throw invalid_argument(string_printf(__FUNCTION__ " Unknown phase (phase %u).", m_phase)); void eap::method_eap::get_result(
_In_ EapPeerMethodResultReason reason,
_Inout_ EapPeerMethodResult *pResult)
{
switch (m_result) {
case EapPeerMethodResultSuccess:
case EapPeerMethodResultFailure: return method_tunnel::get_result(m_result, pResult);
default : return method_tunnel::get_result(reason , pResult);
} }
}
size_t size_packet = packet.size() + sizeof(EapPacket);
void eap::method_eap::make_response_packet(
_In_ eap_type_t eap_type,
_In_bytecount_(dwResponsePacketDataSize) const void *pResponsePacketData,
_In_ DWORD dwResponsePacketDataSize)
{
assert(pResponsePacketData || !dwResponsePacketDataSize);
size_t size_packet = sizeof(EapPacket) + dwResponsePacketDataSize;
EapPacket hdr;
hdr.Code = (BYTE)EapCodeResponse;
hdr.Id = m_id;
assert(size_packet <= MAXWORD); // Packets spanning over 64kB are not supported. assert(size_packet <= MAXWORD); // Packets spanning over 64kB are not supported.
*reinterpret_cast<unsigned short*>(hdr.Length) = htons((unsigned short)size_packet); *reinterpret_cast<unsigned short*>(hdr.Length) = htons((unsigned short)size_packet);
hdr.Data[0] = (BYTE)eap_type;
// Insert EAP packet header before data. m_packet_res.reserve(size_packet);
packet.insert(packet.begin(), reinterpret_cast<const unsigned char*>(&hdr), reinterpret_cast<const unsigned char*>(&hdr + 1)); m_packet_res.assign(
reinterpret_cast<unsigned char*>(&hdr),
reinterpret_cast<unsigned char*>(&hdr + 1));
m_packet_res.insert(m_packet_res.cend(),
reinterpret_cast<const unsigned char*>(pResponsePacketData),
reinterpret_cast<const unsigned char*>(pResponsePacketData) + dwResponsePacketDataSize);
} }