Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 1 | /* |
| 2 | * MSCHAPV2 (RFC 2759) |
| 3 | * Copyright (c) 2004-2008, Jouni Malinen <j@w1.fi> |
| 4 | * |
Dmitry Shmidt | c5ec7f5 | 2012-03-06 16:33:24 -0800 | [diff] [blame] | 5 | * This software may be distributed under the terms of the BSD license. |
| 6 | * See README for more details. |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 7 | */ |
| 8 | |
| 9 | #include "includes.h" |
| 10 | |
| 11 | #include "common.h" |
| 12 | #include "crypto/ms_funcs.h" |
| 13 | #include "mschapv2.h" |
| 14 | |
| 15 | const u8 * mschapv2_remove_domain(const u8 *username, size_t *len) |
| 16 | { |
| 17 | size_t i; |
| 18 | |
| 19 | /* |
| 20 | * MSCHAPv2 does not include optional domain name in the |
| 21 | * challenge-response calculation, so remove domain prefix |
| 22 | * (if present). |
| 23 | */ |
| 24 | |
| 25 | for (i = 0; i < *len; i++) { |
| 26 | if (username[i] == '\\') { |
| 27 | *len -= i + 1; |
| 28 | return username + i + 1; |
| 29 | } |
| 30 | } |
| 31 | |
| 32 | return username; |
| 33 | } |
| 34 | |
| 35 | |
| 36 | int mschapv2_derive_response(const u8 *identity, size_t identity_len, |
| 37 | const u8 *password, size_t password_len, |
| 38 | int pwhash, |
| 39 | const u8 *auth_challenge, |
| 40 | const u8 *peer_challenge, |
| 41 | u8 *nt_response, u8 *auth_response, |
| 42 | u8 *master_key) |
| 43 | { |
| 44 | const u8 *username; |
| 45 | size_t username_len; |
| 46 | u8 password_hash[16], password_hash_hash[16]; |
| 47 | |
| 48 | wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Identity", |
| 49 | identity, identity_len); |
| 50 | username_len = identity_len; |
| 51 | username = mschapv2_remove_domain(identity, &username_len); |
| 52 | wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: Username", |
| 53 | username, username_len); |
| 54 | |
| 55 | wpa_hexdump(MSG_DEBUG, "MSCHAPV2: auth_challenge", |
| 56 | auth_challenge, MSCHAPV2_CHAL_LEN); |
| 57 | wpa_hexdump(MSG_DEBUG, "MSCHAPV2: peer_challenge", |
| 58 | peer_challenge, MSCHAPV2_CHAL_LEN); |
| 59 | wpa_hexdump_ascii(MSG_DEBUG, "MSCHAPV2: username", |
| 60 | username, username_len); |
| 61 | /* Authenticator response is not really needed yet, but calculate it |
| 62 | * here so that challenges need not be saved. */ |
| 63 | if (pwhash) { |
| 64 | wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: password hash", |
| 65 | password, password_len); |
Dmitry Shmidt | 61d9df3 | 2012-08-29 16:22:06 -0700 | [diff] [blame^] | 66 | if (generate_nt_response_pwhash(auth_challenge, peer_challenge, |
| 67 | username, username_len, |
| 68 | password, nt_response) || |
| 69 | generate_authenticator_response_pwhash( |
| 70 | password, peer_challenge, auth_challenge, |
| 71 | username, username_len, nt_response, |
| 72 | auth_response)) |
| 73 | return -1; |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 74 | } else { |
| 75 | wpa_hexdump_ascii_key(MSG_DEBUG, "MSCHAPV2: password", |
| 76 | password, password_len); |
Dmitry Shmidt | 61d9df3 | 2012-08-29 16:22:06 -0700 | [diff] [blame^] | 77 | if (generate_nt_response(auth_challenge, peer_challenge, |
| 78 | username, username_len, |
| 79 | password, password_len, |
| 80 | nt_response) || |
| 81 | generate_authenticator_response(password, password_len, |
| 82 | peer_challenge, |
| 83 | auth_challenge, |
| 84 | username, username_len, |
| 85 | nt_response, |
| 86 | auth_response)) |
| 87 | return -1; |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 88 | } |
| 89 | wpa_hexdump(MSG_DEBUG, "MSCHAPV2: NT Response", |
| 90 | nt_response, MSCHAPV2_NT_RESPONSE_LEN); |
| 91 | wpa_hexdump(MSG_DEBUG, "MSCHAPV2: Auth Response", |
| 92 | auth_response, MSCHAPV2_AUTH_RESPONSE_LEN); |
| 93 | |
| 94 | /* Generate master_key here since we have the needed data available. */ |
| 95 | if (pwhash) { |
| 96 | if (hash_nt_password_hash(password, password_hash_hash)) |
| 97 | return -1; |
| 98 | } else { |
| 99 | if (nt_password_hash(password, password_len, password_hash) || |
| 100 | hash_nt_password_hash(password_hash, password_hash_hash)) |
| 101 | return -1; |
| 102 | } |
Dmitry Shmidt | 61d9df3 | 2012-08-29 16:22:06 -0700 | [diff] [blame^] | 103 | if (get_master_key(password_hash_hash, nt_response, master_key)) |
| 104 | return -1; |
Dmitry Shmidt | 8d520ff | 2011-05-09 14:06:53 -0700 | [diff] [blame] | 105 | wpa_hexdump_key(MSG_DEBUG, "MSCHAPV2: Master Key", |
| 106 | master_key, MSCHAPV2_MASTER_KEY_LEN); |
| 107 | |
| 108 | return 0; |
| 109 | } |
| 110 | |
| 111 | |
| 112 | int mschapv2_verify_auth_response(const u8 *auth_response, |
| 113 | const u8 *buf, size_t buf_len) |
| 114 | { |
| 115 | u8 recv_response[MSCHAPV2_AUTH_RESPONSE_LEN]; |
| 116 | if (buf_len < 2 + 2 * MSCHAPV2_AUTH_RESPONSE_LEN || |
| 117 | buf[0] != 'S' || buf[1] != '=' || |
| 118 | hexstr2bin((char *) (buf + 2), recv_response, |
| 119 | MSCHAPV2_AUTH_RESPONSE_LEN) || |
| 120 | os_memcmp(auth_response, recv_response, |
| 121 | MSCHAPV2_AUTH_RESPONSE_LEN) != 0) |
| 122 | return -1; |
| 123 | return 0; |
| 124 | } |