336 lines
14 KiB
C++
336 lines
14 KiB
C++
/*
|
|
Copyright 2015-2016 Amebis
|
|
Copyright 2016 GÉANT
|
|
|
|
This file is part of GÉANTLink.
|
|
|
|
GÉANTLink is free software: you can redistribute it and/or modify it
|
|
under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
GÉANTLink is distributed in the hope that it will be useful, but
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with GÉANTLink. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
#include "StdAfx.h"
|
|
|
|
using namespace std;
|
|
using namespace winstd;
|
|
|
|
|
|
//////////////////////////////////////////////////////////////////////
|
|
// eap::session_tls
|
|
//////////////////////////////////////////////////////////////////////
|
|
|
|
eap::session_tls::session_tls(_In_ module &mod) :
|
|
m_phase(phase_handshake_start),
|
|
session<credentials_tls, bool, bool>(mod)
|
|
{
|
|
m_packet_req.m_code = (EapCode)0;
|
|
m_packet_req.m_id = 0;
|
|
m_packet_req.m_flags = 0;
|
|
|
|
m_packet_res.m_code = (EapCode)0;
|
|
m_packet_res.m_id = 0;
|
|
m_packet_res.m_flags = 0;
|
|
|
|
memset(m_random_client, 0, sizeof(tls_random_t));
|
|
memset(m_random_server, 0, sizeof(tls_random_t));
|
|
}
|
|
|
|
|
|
eap::session_tls::session_tls(_In_ const session_tls &other) :
|
|
m_phase(other.m_phase),
|
|
m_session_id(other.m_session_id),
|
|
session<credentials_tls, bool, bool>(other)
|
|
{
|
|
m_packet_req.m_code = other.m_packet_req.m_code ;
|
|
m_packet_req.m_id = other.m_packet_req.m_id ;
|
|
m_packet_req.m_flags = other.m_packet_req.m_flags;
|
|
m_packet_req.m_data = other.m_packet_req.m_data ;
|
|
|
|
m_packet_res.m_code = other.m_packet_res.m_code ;
|
|
m_packet_res.m_id = other.m_packet_res.m_id ;
|
|
m_packet_res.m_flags = other.m_packet_res.m_flags;
|
|
m_packet_res.m_data = other.m_packet_res.m_data ;
|
|
|
|
memcpy(m_random_client, other.m_random_client, sizeof(tls_random_t));
|
|
memcpy(m_random_server, other.m_random_server, sizeof(tls_random_t));
|
|
}
|
|
|
|
|
|
eap::session_tls::session_tls(_Inout_ session_tls &&other) :
|
|
m_phase(std::move(other.m_phase)),
|
|
m_session_id(std::move(other.m_session_id)),
|
|
session<credentials_tls, bool, bool>(std::move(other))
|
|
{
|
|
m_packet_req.m_code = std::move(other.m_packet_req.m_code );
|
|
m_packet_req.m_id = std::move(other.m_packet_req.m_id );
|
|
m_packet_req.m_flags = std::move(other.m_packet_req.m_flags);
|
|
m_packet_req.m_data = std::move(other.m_packet_req.m_data );
|
|
|
|
m_packet_res.m_code = std::move(other.m_packet_res.m_code );
|
|
m_packet_res.m_id = std::move(other.m_packet_res.m_id );
|
|
m_packet_res.m_flags = std::move(other.m_packet_res.m_flags);
|
|
m_packet_res.m_data = std::move(other.m_packet_res.m_data );
|
|
|
|
memcpy(m_random_client, other.m_random_client, sizeof(tls_random_t));
|
|
memcpy(m_random_server, other.m_random_server, sizeof(tls_random_t));
|
|
}
|
|
|
|
|
|
eap::session_tls::~session_tls()
|
|
{
|
|
SecureZeroMemory(m_random_client, sizeof(tls_random_t));
|
|
SecureZeroMemory(m_random_server, sizeof(tls_random_t));
|
|
}
|
|
|
|
|
|
eap::session_tls& eap::session_tls::operator=(_In_ const session_tls &other)
|
|
{
|
|
if (this != &other) {
|
|
(session<credentials_tls, bool, bool>&)*this = other;
|
|
m_phase = other.m_phase;
|
|
|
|
m_packet_req.m_code = other.m_packet_req.m_code ;
|
|
m_packet_req.m_id = other.m_packet_req.m_id ;
|
|
m_packet_req.m_flags = other.m_packet_req.m_flags;
|
|
m_packet_req.m_data = other.m_packet_req.m_data ;
|
|
|
|
m_packet_res.m_code = other.m_packet_res.m_code ;
|
|
m_packet_res.m_id = other.m_packet_res.m_id ;
|
|
m_packet_res.m_flags = other.m_packet_res.m_flags;
|
|
m_packet_res.m_data = other.m_packet_res.m_data ;
|
|
|
|
m_session_id = other.m_session_id;
|
|
|
|
memcpy(m_random_client, other.m_random_client, sizeof(tls_random_t));
|
|
memcpy(m_random_server, other.m_random_server, sizeof(tls_random_t));
|
|
}
|
|
|
|
return *this;
|
|
}
|
|
|
|
|
|
eap::session_tls& eap::session_tls::operator=(_Inout_ session_tls &&other)
|
|
{
|
|
if (this != &other) {
|
|
(session<credentials_tls, bool, bool>&)*this = std::move(other);
|
|
m_phase = std::move(other.m_phase);
|
|
|
|
m_packet_req.m_code = std::move(other.m_packet_req.m_code );
|
|
m_packet_req.m_id = std::move(other.m_packet_req.m_id );
|
|
m_packet_req.m_flags = std::move(other.m_packet_req.m_flags);
|
|
m_packet_req.m_data = std::move(other.m_packet_req.m_data );
|
|
|
|
m_packet_res.m_code = std::move(other.m_packet_res.m_code );
|
|
m_packet_res.m_id = std::move(other.m_packet_res.m_id );
|
|
m_packet_res.m_flags = std::move(other.m_packet_res.m_flags);
|
|
m_packet_res.m_data = std::move(other.m_packet_res.m_data );
|
|
|
|
m_session_id = std::move(other.m_session_id);
|
|
|
|
memcpy(m_random_client, other.m_random_client, sizeof(tls_random_t));
|
|
memcpy(m_random_server, other.m_random_server, sizeof(tls_random_t));
|
|
}
|
|
|
|
return *this;
|
|
}
|
|
|
|
|
|
bool eap::session_tls::begin(
|
|
_In_ DWORD dwFlags,
|
|
_In_ const EapAttributes *pAttributeArray,
|
|
_In_ HANDLE hTokenImpersonateUser,
|
|
_In_ DWORD dwMaxSendPacketSize,
|
|
_Out_ EAP_ERROR **ppEapError)
|
|
{
|
|
if (dwMaxSendPacketSize <= 10) {
|
|
*ppEapError = m_module.make_error(ERROR_NOT_SUPPORTED, wstring_printf(_T(__FUNCTION__) _T(" Maximum send packet size too small (expected: >%u, received: %u)."), 10, dwMaxSendPacketSize).c_str());
|
|
return false;
|
|
}
|
|
|
|
return session<credentials_tls, bool, bool>::begin(dwFlags, pAttributeArray, hTokenImpersonateUser, dwMaxSendPacketSize, ppEapError);
|
|
}
|
|
|
|
|
|
bool eap::session_tls::process_request_packet(
|
|
_In_ DWORD dwReceivedPacketSize,
|
|
_In_bytecount_(dwReceivedPacketSize) const EapPacket *pReceivedPacket,
|
|
_Out_ EapPeerMethodOutput *pEapOutput,
|
|
_Out_ EAP_ERROR **ppEapError)
|
|
{
|
|
assert(pReceivedPacket && dwReceivedPacketSize >= 4);
|
|
assert(pEapOutput);
|
|
assert(ppEapError);
|
|
|
|
// Initialize output.
|
|
pEapOutput->fAllowNotifications = TRUE;
|
|
pEapOutput->action = EapPeerMethodResponseActionDiscard;
|
|
|
|
// Is this a valid EAP-TLS packet?
|
|
if (dwReceivedPacketSize < 6) {
|
|
*ppEapError = m_module.make_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, _T(__FUNCTION__) _T(" Packet is too small. EAP-%s packets should be at least 6B."));
|
|
return false;
|
|
}/* else if (pReceivedPacket->Data[0] != eap_type_tls) {
|
|
*ppEapError = m_module.make_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, wstring_printf(_T(__FUNCTION__) _T(" Packet is not EAP-TLS (expected: %u, received: %u)."), eap_type_tls, pReceivedPacket->Data[0]).c_str());
|
|
return false;
|
|
}*/
|
|
|
|
if (pReceivedPacket->Data[1] & tls_flags_more_frag) {
|
|
if (pReceivedPacket->Data[1] & tls_flags_length_incl) {
|
|
// First fragment received.
|
|
if (dwReceivedPacketSize < 10) {
|
|
*ppEapError = m_module.make_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, _T(__FUNCTION__) _T(" Packet is too small. EAP-TLS first fragmented packet should be at least 10B."));
|
|
return false;
|
|
}
|
|
|
|
// Start a new packet.
|
|
m_packet_req.m_code = (EapCode)pReceivedPacket->Code;
|
|
m_packet_req.m_id = pReceivedPacket->Id;
|
|
m_packet_req.m_flags = pReceivedPacket->Data[1];
|
|
m_packet_req.m_data.reserve(*(DWORD*)(pReceivedPacket->Data + 2));
|
|
m_packet_req.m_data.assign(pReceivedPacket->Data + 6, pReceivedPacket->Data + dwReceivedPacketSize - 4);
|
|
} else {
|
|
// Mid fragment received. Append data.
|
|
m_packet_req.m_data.insert(m_packet_req.m_data.end(), pReceivedPacket->Data + 2, pReceivedPacket->Data + dwReceivedPacketSize - 4);
|
|
}
|
|
|
|
// Reply with ACK packet.
|
|
m_packet_res.m_code = EapCodeResponse;
|
|
m_packet_res.m_id = m_packet_req.m_id;
|
|
m_packet_res.m_flags = 0;
|
|
m_packet_res.m_data.clear();
|
|
pEapOutput->action = EapPeerMethodResponseActionSend;
|
|
return true;
|
|
} else if (!m_packet_req.m_data.empty()) {
|
|
// Last fragment received. Append data.
|
|
m_packet_req.m_data.insert(m_packet_req.m_data.end(),
|
|
pReceivedPacket->Data + (!(pReceivedPacket->Data[1] & tls_flags_length_incl) ? 2 : 6), // Should not include "Length" field (by RFC 5281: https://tools.ietf.org/html/rfc5281#section-9.2.2). Tolerate.
|
|
pReceivedPacket->Data + dwReceivedPacketSize - 4);
|
|
}
|
|
|
|
if ( m_packet_req.m_code == EapCodeRequest &&
|
|
m_packet_req.m_id == m_packet_res.m_id &&
|
|
m_packet_req.m_data.empty() &&
|
|
!(m_packet_req.m_flags & (tls_flags_length_incl | tls_flags_more_frag | tls_flags_start)) &&
|
|
(m_packet_res.m_flags & tls_flags_more_frag ))
|
|
{
|
|
// This is an ACK of our fragmented packet response. Send the next fragment.
|
|
m_packet_res.m_id++;
|
|
pEapOutput->action = EapPeerMethodResponseActionSend;
|
|
return true;
|
|
}
|
|
|
|
switch (m_phase) {
|
|
case phase_handshake_start: {
|
|
// Is this an EAP-TLS Start packet?
|
|
if (m_packet_req.m_code != EapCodeRequest) {
|
|
*ppEapError = m_module.make_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, wstring_printf(_T(__FUNCTION__) _T(" Packet is not a request (expected: %x, received: %x)."), EapCodeRequest, m_packet_req.m_code).c_str());
|
|
return false;
|
|
} else if (!(m_packet_req.m_flags & tls_flags_start)) {
|
|
*ppEapError = m_module.make_error(EAP_E_EAPHOST_METHOD_INVALID_PACKET, wstring_printf(_T(__FUNCTION__) _T(" Packet is not EAP-TLS Start (expected: %x, received: %x)."), tls_flags_start, m_packet_req.m_flags).c_str());
|
|
return false;
|
|
}
|
|
|
|
//// Determine minimum EAP-TLS version supported by server and us.
|
|
//version_t ver_remote = (version_t)(m_packet_req.m_flags & tls_flags_ver_mask);
|
|
//m_version = std::min<version_t>(ver_remote, version_0);
|
|
//m_module.log_event(&EAPMETHOD_HANDSHAKE_START1, event_data((DWORD)pReceivedPacket->Data[0]), event_data((unsigned char)m_version), event_data((unsigned char)ver_remote), event_data::blank);
|
|
|
|
// Build response packet.
|
|
m_packet_res.m_code = EapCodeResponse;
|
|
m_packet_res.m_id = m_packet_req.m_id;
|
|
m_packet_res.m_flags = 0;
|
|
|
|
|
|
//if (!m_packet_res.create(EapCodeResponse, pReceivedPacket->Id, eap_type_tls, (BYTE)m_version)) {
|
|
// *ppEapError = m_module.make_error(GetLastError(), _T(__FUNCTION__) _T(" Error creating packet."));
|
|
// return false;
|
|
//}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
*ppEapError = m_module.make_error(ERROR_NOT_SUPPORTED, _T(__FUNCTION__) _T(" Not supported."));
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool eap::session_tls::get_response_packet(
|
|
_Inout_ DWORD *pdwSendPacketSize,
|
|
_Inout_bytecap_(*dwSendPacketSize) EapPacket *pSendPacket,
|
|
_Out_ EAP_ERROR **ppEapError)
|
|
{
|
|
assert(pdwSendPacketSize);
|
|
assert(pSendPacket);
|
|
UNREFERENCED_PARAMETER(ppEapError);
|
|
|
|
DWORD
|
|
size_data = (DWORD)m_packet_res.m_data.size(),
|
|
size_packet = size_data + 6;
|
|
WORD size_packet_limit = (WORD)std::min<DWORD>(m_send_packet_size_max, (WORD)-1);
|
|
BYTE *data_dst;
|
|
|
|
if (!(m_packet_res.m_flags & tls_flags_more_frag)) {
|
|
// Not fragmented.
|
|
if (size_packet <= size_packet_limit) {
|
|
// No need to fragment the packet.
|
|
m_packet_res.m_flags &= ~tls_flags_length_incl; // No need to explicitly include the Length field either.
|
|
data_dst = pSendPacket->Data + 2;
|
|
} else {
|
|
// But it should be fragmented.
|
|
m_packet_res.m_flags |= tls_flags_length_incl | tls_flags_more_frag;
|
|
*(DWORD*)(pSendPacket->Data + 2) = (DWORD)size_packet;
|
|
data_dst = pSendPacket->Data + 6;
|
|
size_data = size_packet_limit - 10;
|
|
size_packet = size_packet_limit;
|
|
}
|
|
} else {
|
|
// Continuing the fragmented packet...
|
|
if (size_packet <= size_packet_limit) {
|
|
// This is the last fragment.
|
|
m_packet_res.m_flags &= ~(tls_flags_length_incl | tls_flags_more_frag);
|
|
} else {
|
|
// This is a mid fragment.
|
|
m_packet_res.m_flags &= ~tls_flags_length_incl;
|
|
size_data = size_packet_limit - 6;
|
|
size_packet = size_packet_limit;
|
|
}
|
|
data_dst = pSendPacket->Data + 2;
|
|
}
|
|
|
|
pSendPacket->Code = (BYTE)m_packet_res.m_code;
|
|
pSendPacket->Id = m_packet_res.m_id;
|
|
*(WORD*)pSendPacket->Length = htons((WORD)size_packet);
|
|
pSendPacket->Data[0] = (BYTE)eap_type_tls;
|
|
pSendPacket->Data[1] = m_packet_res.m_flags;
|
|
memcpy(data_dst, m_packet_res.m_data.data(), size_data);
|
|
m_packet_res.m_data.erase(m_packet_res.m_data.begin(), m_packet_res.m_data.begin() + size_data);
|
|
*pdwSendPacketSize = size_packet;
|
|
return true;
|
|
}
|
|
|
|
|
|
bool eap::session_tls::get_result(
|
|
_In_ EapPeerMethodResultReason reason,
|
|
_Out_ EapPeerMethodResult *ppResult,
|
|
_Out_ EAP_ERROR **ppEapError)
|
|
{
|
|
UNREFERENCED_PARAMETER(reason);
|
|
UNREFERENCED_PARAMETER(ppResult);
|
|
assert(ppEapError);
|
|
|
|
*ppEapError = m_module.make_error(ERROR_NOT_SUPPORTED, _T(__FUNCTION__) _T(" Not supported."));
|
|
return false;
|
|
}
|