xref: /nrf52832-nimble/rt-thread/components/net/lwip-2.0.2/src/netif/ppp/chap-md5.c (revision 104654410c56c573564690304ae786df310c91fc)
1*10465441SEvalZero /*
2*10465441SEvalZero  * chap-md5.c - New CHAP/MD5 implementation.
3*10465441SEvalZero  *
4*10465441SEvalZero  * Copyright (c) 2003 Paul Mackerras. All rights reserved.
5*10465441SEvalZero  *
6*10465441SEvalZero  * Redistribution and use in source and binary forms, with or without
7*10465441SEvalZero  * modification, are permitted provided that the following conditions
8*10465441SEvalZero  * are met:
9*10465441SEvalZero  *
10*10465441SEvalZero  * 1. Redistributions of source code must retain the above copyright
11*10465441SEvalZero  *    notice, this list of conditions and the following disclaimer.
12*10465441SEvalZero  *
13*10465441SEvalZero  * 2. The name(s) of the authors of this software must not be used to
14*10465441SEvalZero  *    endorse or promote products derived from this software without
15*10465441SEvalZero  *    prior written permission.
16*10465441SEvalZero  *
17*10465441SEvalZero  * 3. Redistributions of any form whatsoever must retain the following
18*10465441SEvalZero  *    acknowledgment:
19*10465441SEvalZero  *    "This product includes software developed by Paul Mackerras
20*10465441SEvalZero  *     <[email protected]>".
21*10465441SEvalZero  *
22*10465441SEvalZero  * THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO
23*10465441SEvalZero  * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
24*10465441SEvalZero  * AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY
25*10465441SEvalZero  * SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
26*10465441SEvalZero  * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
27*10465441SEvalZero  * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
28*10465441SEvalZero  * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
29*10465441SEvalZero  */
30*10465441SEvalZero 
31*10465441SEvalZero #include "netif/ppp/ppp_opts.h"
32*10465441SEvalZero #if PPP_SUPPORT && CHAP_SUPPORT  /* don't build if not configured for use in lwipopts.h */
33*10465441SEvalZero 
34*10465441SEvalZero #if 0 /* UNUSED */
35*10465441SEvalZero #include <stdlib.h>
36*10465441SEvalZero #include <string.h>
37*10465441SEvalZero #endif /* UNUSED */
38*10465441SEvalZero 
39*10465441SEvalZero #include "netif/ppp/ppp_impl.h"
40*10465441SEvalZero 
41*10465441SEvalZero #include "netif/ppp/chap-new.h"
42*10465441SEvalZero #include "netif/ppp/chap-md5.h"
43*10465441SEvalZero #include "netif/ppp/magic.h"
44*10465441SEvalZero #include "netif/ppp/pppcrypt.h"
45*10465441SEvalZero 
46*10465441SEvalZero #define MD5_HASH_SIZE		16
47*10465441SEvalZero #define MD5_MIN_CHALLENGE	17
48*10465441SEvalZero #define MD5_MAX_CHALLENGE	24
49*10465441SEvalZero #define MD5_MIN_MAX_POWER_OF_TWO_CHALLENGE     3   /* 2^3-1 = 7, 17+7 = 24 */
50*10465441SEvalZero 
51*10465441SEvalZero #if PPP_SERVER
chap_md5_generate_challenge(ppp_pcb * pcb,unsigned char * cp)52*10465441SEvalZero static void chap_md5_generate_challenge(ppp_pcb *pcb, unsigned char *cp) {
53*10465441SEvalZero 	int clen;
54*10465441SEvalZero 	LWIP_UNUSED_ARG(pcb);
55*10465441SEvalZero 
56*10465441SEvalZero 	clen = MD5_MIN_CHALLENGE + magic_pow(MD5_MIN_MAX_POWER_OF_TWO_CHALLENGE);
57*10465441SEvalZero 	*cp++ = clen;
58*10465441SEvalZero 	magic_random_bytes(cp, clen);
59*10465441SEvalZero }
60*10465441SEvalZero 
chap_md5_verify_response(ppp_pcb * pcb,int id,const char * name,const unsigned char * secret,int secret_len,const unsigned char * challenge,const unsigned char * response,char * message,int message_space)61*10465441SEvalZero static int chap_md5_verify_response(ppp_pcb *pcb, int id, const char *name,
62*10465441SEvalZero 			 const unsigned char *secret, int secret_len,
63*10465441SEvalZero 			 const unsigned char *challenge, const unsigned char *response,
64*10465441SEvalZero 			 char *message, int message_space) {
65*10465441SEvalZero 	lwip_md5_context ctx;
66*10465441SEvalZero 	unsigned char idbyte = id;
67*10465441SEvalZero 	unsigned char hash[MD5_HASH_SIZE];
68*10465441SEvalZero 	int challenge_len, response_len;
69*10465441SEvalZero 	LWIP_UNUSED_ARG(name);
70*10465441SEvalZero 	LWIP_UNUSED_ARG(pcb);
71*10465441SEvalZero 
72*10465441SEvalZero 	challenge_len = *challenge++;
73*10465441SEvalZero 	response_len = *response++;
74*10465441SEvalZero 	if (response_len == MD5_HASH_SIZE) {
75*10465441SEvalZero 		/* Generate hash of ID, secret, challenge */
76*10465441SEvalZero 		lwip_md5_init(&ctx);
77*10465441SEvalZero 		lwip_md5_starts(&ctx);
78*10465441SEvalZero 		lwip_md5_update(&ctx, &idbyte, 1);
79*10465441SEvalZero 		lwip_md5_update(&ctx, secret, secret_len);
80*10465441SEvalZero 		lwip_md5_update(&ctx, challenge, challenge_len);
81*10465441SEvalZero 		lwip_md5_finish(&ctx, hash);
82*10465441SEvalZero 		lwip_md5_free(&ctx);
83*10465441SEvalZero 
84*10465441SEvalZero 		/* Test if our hash matches the peer's response */
85*10465441SEvalZero 		if (memcmp(hash, response, MD5_HASH_SIZE) == 0) {
86*10465441SEvalZero 			ppp_slprintf(message, message_space, "Access granted");
87*10465441SEvalZero 			return 1;
88*10465441SEvalZero 		}
89*10465441SEvalZero 	}
90*10465441SEvalZero 	ppp_slprintf(message, message_space, "Access denied");
91*10465441SEvalZero 	return 0;
92*10465441SEvalZero }
93*10465441SEvalZero #endif /* PPP_SERVER */
94*10465441SEvalZero 
chap_md5_make_response(ppp_pcb * pcb,unsigned char * response,int id,const char * our_name,const unsigned char * challenge,const char * secret,int secret_len,unsigned char * private_)95*10465441SEvalZero static void chap_md5_make_response(ppp_pcb *pcb, unsigned char *response, int id, const char *our_name,
96*10465441SEvalZero 		       const unsigned char *challenge, const char *secret, int secret_len,
97*10465441SEvalZero 		       unsigned char *private_) {
98*10465441SEvalZero 	lwip_md5_context ctx;
99*10465441SEvalZero 	unsigned char idbyte = id;
100*10465441SEvalZero 	int challenge_len = *challenge++;
101*10465441SEvalZero 	LWIP_UNUSED_ARG(our_name);
102*10465441SEvalZero 	LWIP_UNUSED_ARG(private_);
103*10465441SEvalZero 	LWIP_UNUSED_ARG(pcb);
104*10465441SEvalZero 
105*10465441SEvalZero 	lwip_md5_init(&ctx);
106*10465441SEvalZero 	lwip_md5_starts(&ctx);
107*10465441SEvalZero 	lwip_md5_update(&ctx, &idbyte, 1);
108*10465441SEvalZero 	lwip_md5_update(&ctx, (const u_char *)secret, secret_len);
109*10465441SEvalZero 	lwip_md5_update(&ctx, challenge, challenge_len);
110*10465441SEvalZero 	lwip_md5_finish(&ctx, &response[1]);
111*10465441SEvalZero 	lwip_md5_free(&ctx);
112*10465441SEvalZero 	response[0] = MD5_HASH_SIZE;
113*10465441SEvalZero }
114*10465441SEvalZero 
115*10465441SEvalZero const struct chap_digest_type md5_digest = {
116*10465441SEvalZero 	CHAP_MD5,		/* code */
117*10465441SEvalZero #if PPP_SERVER
118*10465441SEvalZero 	chap_md5_generate_challenge,
119*10465441SEvalZero 	chap_md5_verify_response,
120*10465441SEvalZero #endif /* PPP_SERVER */
121*10465441SEvalZero 	chap_md5_make_response,
122*10465441SEvalZero 	NULL,			/* check_success */
123*10465441SEvalZero 	NULL,			/* handle_failure */
124*10465441SEvalZero };
125*10465441SEvalZero 
126*10465441SEvalZero #endif /* PPP_SUPPORT && CHAP_SUPPORT */
127