xref: /openbsd-src/lib/libradius/radius_mppe.c (revision 0eaf192d8f98a1706afb2186171b5fb45b160397)
1*0eaf192dSyasuoka /*	$OpenBSD: radius_mppe.c,v 1.1 2015/07/20 23:52:29 yasuoka Exp $ */
2*0eaf192dSyasuoka 
3*0eaf192dSyasuoka /*-
4*0eaf192dSyasuoka  * Copyright (c) 2013 Internet Initiative Japan Inc.
5*0eaf192dSyasuoka  * All rights reserved.
6*0eaf192dSyasuoka  *
7*0eaf192dSyasuoka  * Redistribution and use in source and binary forms, with or without
8*0eaf192dSyasuoka  * modification, are permitted provided that the following conditions
9*0eaf192dSyasuoka  * are met:
10*0eaf192dSyasuoka  * 1. Redistributions of source code must retain the above copyright
11*0eaf192dSyasuoka  *    notice, this list of conditions and the following disclaimer.
12*0eaf192dSyasuoka  * 2. Redistributions in binary form must reproduce the above copyright
13*0eaf192dSyasuoka  *    notice, this list of conditions and the following disclaimer in the
14*0eaf192dSyasuoka  *    documentation and/or other materials provided with the distribution.
15*0eaf192dSyasuoka  *
16*0eaf192dSyasuoka  * THIS SOFTWARE IS PROVIDED BY THE"AUTHOR" AND CONTRIBUTORS AS IS'' AND
17*0eaf192dSyasuoka  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18*0eaf192dSyasuoka  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19*0eaf192dSyasuoka  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20*0eaf192dSyasuoka  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21*0eaf192dSyasuoka  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22*0eaf192dSyasuoka  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23*0eaf192dSyasuoka  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24*0eaf192dSyasuoka  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25*0eaf192dSyasuoka  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26*0eaf192dSyasuoka  * SUCH DAMAGE.
27*0eaf192dSyasuoka  */
28*0eaf192dSyasuoka 
29*0eaf192dSyasuoka #include <sys/types.h>
30*0eaf192dSyasuoka #include <sys/socket.h>
31*0eaf192dSyasuoka #include <netinet/in.h>
32*0eaf192dSyasuoka 
33*0eaf192dSyasuoka #include <stdbool.h>
34*0eaf192dSyasuoka #include <stdio.h>
35*0eaf192dSyasuoka #include <stdlib.h>
36*0eaf192dSyasuoka #include <string.h>
37*0eaf192dSyasuoka 
38*0eaf192dSyasuoka #include <openssl/md5.h>
39*0eaf192dSyasuoka 
40*0eaf192dSyasuoka #include "radius.h"
41*0eaf192dSyasuoka 
42*0eaf192dSyasuoka #include "radius_local.h"
43*0eaf192dSyasuoka 
44*0eaf192dSyasuoka int
radius_encrypt_mppe_key_attr(void * cipher,size_t * clen,const void * plain,size_t plen,const void * ra,const char * secret)45*0eaf192dSyasuoka radius_encrypt_mppe_key_attr(void *cipher, size_t * clen, const void *plain,
46*0eaf192dSyasuoka     size_t plen, const void *ra, const char *secret)
47*0eaf192dSyasuoka {
48*0eaf192dSyasuoka 	size_t		 slen = strlen(secret);
49*0eaf192dSyasuoka 	uint8_t		 b[16], plain0[256], *p, *c;
50*0eaf192dSyasuoka 	size_t		 off;
51*0eaf192dSyasuoka 	MD5_CTX		 ctx;
52*0eaf192dSyasuoka 	unsigned int	 i;
53*0eaf192dSyasuoka 	uint16_t	 salt;
54*0eaf192dSyasuoka 
55*0eaf192dSyasuoka 	if (plen > 239)
56*0eaf192dSyasuoka 		return (-1);
57*0eaf192dSyasuoka 	if (*clen < ROUNDUP(plen + 1, 16) + 2)
58*0eaf192dSyasuoka 		return (-1);
59*0eaf192dSyasuoka 
60*0eaf192dSyasuoka 	salt = arc4random();
61*0eaf192dSyasuoka 	plain0[0] = plen;
62*0eaf192dSyasuoka 	memcpy(plain0 + 1, plain, plen);
63*0eaf192dSyasuoka 	memset(plain0 + 1 + plen, 0, ROUNDUP(plen + 1, 16) - (plen + 1));
64*0eaf192dSyasuoka 
65*0eaf192dSyasuoka 	*clen = ROUNDUP(plen + 1, 16) + 2;
66*0eaf192dSyasuoka 	memcpy(cipher, &salt, 2);
67*0eaf192dSyasuoka 	for (off = 0; off < *clen - 2; off += 16) {
68*0eaf192dSyasuoka 		c = ((uint8_t *)cipher) + 2 + off;
69*0eaf192dSyasuoka 		p = ((uint8_t *)plain0) + off;
70*0eaf192dSyasuoka 		MD5_Init(&ctx);
71*0eaf192dSyasuoka 		MD5_Update(&ctx, secret, slen);
72*0eaf192dSyasuoka 		if (off == 0) {
73*0eaf192dSyasuoka 			MD5_Update(&ctx, ra, 16);
74*0eaf192dSyasuoka 			MD5_Update(&ctx, cipher, 2);
75*0eaf192dSyasuoka 		} else
76*0eaf192dSyasuoka 			MD5_Update(&ctx, c - 16, 16);
77*0eaf192dSyasuoka 		MD5_Final(b, &ctx);
78*0eaf192dSyasuoka 		for (i = 0; i < 16; i++)
79*0eaf192dSyasuoka 			c[i] = p[i] ^ b[i];
80*0eaf192dSyasuoka 	}
81*0eaf192dSyasuoka 
82*0eaf192dSyasuoka 	return (0);
83*0eaf192dSyasuoka }
84*0eaf192dSyasuoka 
85*0eaf192dSyasuoka int
radius_decrypt_mppe_key_attr(void * plain,size_t * plen,const void * cipher,size_t clen,const void * ra,const char * secret)86*0eaf192dSyasuoka radius_decrypt_mppe_key_attr(void *plain, size_t * plen, const void *cipher,
87*0eaf192dSyasuoka     size_t clen, const void *ra, const char *secret)
88*0eaf192dSyasuoka {
89*0eaf192dSyasuoka 	size_t		 slen = strlen(secret);
90*0eaf192dSyasuoka 	uint8_t		 b[16], plain0[256], *p, *c;
91*0eaf192dSyasuoka 	size_t		 off;
92*0eaf192dSyasuoka 	MD5_CTX		 ctx;
93*0eaf192dSyasuoka 	unsigned int	 i;
94*0eaf192dSyasuoka 
95*0eaf192dSyasuoka 	if (clen < 18 || clen > 255)
96*0eaf192dSyasuoka 		return (-1);
97*0eaf192dSyasuoka 	if ((clen - 2) % 16 != 0)
98*0eaf192dSyasuoka 		return (-1);
99*0eaf192dSyasuoka 	if (*plen < clen - 3)
100*0eaf192dSyasuoka 		return (-1);
101*0eaf192dSyasuoka 
102*0eaf192dSyasuoka 	for (off = 0; off < clen - 2; off += 16) {
103*0eaf192dSyasuoka 		c = ((uint8_t *)cipher) + 2 + off;
104*0eaf192dSyasuoka 		p = ((uint8_t *)plain0) + off;
105*0eaf192dSyasuoka 		MD5_Init(&ctx);
106*0eaf192dSyasuoka 		MD5_Update(&ctx, secret, slen);
107*0eaf192dSyasuoka 		if (off == 0) {
108*0eaf192dSyasuoka 			MD5_Update(&ctx, ra, 16);
109*0eaf192dSyasuoka 			MD5_Update(&ctx, cipher, 2);
110*0eaf192dSyasuoka 		} else
111*0eaf192dSyasuoka 			MD5_Update(&ctx, c - 16, 16);
112*0eaf192dSyasuoka 		MD5_Final(b, &ctx);
113*0eaf192dSyasuoka 		for (i = 0; i < 16; i++)
114*0eaf192dSyasuoka 			p[i] = c[i] ^ b[i];
115*0eaf192dSyasuoka 	}
116*0eaf192dSyasuoka 
117*0eaf192dSyasuoka 	if (plain0[0] > clen - 3)
118*0eaf192dSyasuoka 		return (-1);
119*0eaf192dSyasuoka 	*plen = plain0[0];
120*0eaf192dSyasuoka 	memcpy(plain, plain0 + 1, *plen);
121*0eaf192dSyasuoka 
122*0eaf192dSyasuoka 	return (0);
123*0eaf192dSyasuoka }
124*0eaf192dSyasuoka 
125*0eaf192dSyasuoka static int
radius_get_mppe_key_attr(const RADIUS_PACKET * packet,uint8_t vtype,void * buf,size_t * len,const char * secret)126*0eaf192dSyasuoka radius_get_mppe_key_attr(const RADIUS_PACKET * packet, uint8_t vtype,
127*0eaf192dSyasuoka     void *buf, size_t * len, const char *secret)
128*0eaf192dSyasuoka {
129*0eaf192dSyasuoka 	uint8_t	 cipher[256];
130*0eaf192dSyasuoka 	size_t	 clen = sizeof(cipher);
131*0eaf192dSyasuoka 
132*0eaf192dSyasuoka 	if (radius_get_vs_raw_attr(packet, RADIUS_VENDOR_MICROSOFT, vtype,
133*0eaf192dSyasuoka 	    cipher, &clen) != 0)
134*0eaf192dSyasuoka 		return (-1);
135*0eaf192dSyasuoka 	if (radius_decrypt_mppe_key_attr(buf, len, cipher, clen,
136*0eaf192dSyasuoka 		radius_get_request_authenticator_retval(packet), secret) != 0)
137*0eaf192dSyasuoka 		return (-1);
138*0eaf192dSyasuoka 	return (0);
139*0eaf192dSyasuoka }
140*0eaf192dSyasuoka 
141*0eaf192dSyasuoka static int
radius_put_mppe_key_attr(RADIUS_PACKET * packet,uint8_t vtype,const void * buf,size_t len,const char * secret)142*0eaf192dSyasuoka radius_put_mppe_key_attr(RADIUS_PACKET * packet, uint8_t vtype,
143*0eaf192dSyasuoka     const void *buf, size_t len, const char *secret)
144*0eaf192dSyasuoka {
145*0eaf192dSyasuoka 	uint8_t		 cipher[256];
146*0eaf192dSyasuoka 	size_t		 clen = sizeof(cipher);
147*0eaf192dSyasuoka 
148*0eaf192dSyasuoka 	if (radius_encrypt_mppe_key_attr(cipher, &clen, buf, len,
149*0eaf192dSyasuoka 		radius_get_request_authenticator_retval(packet), secret) != 0)
150*0eaf192dSyasuoka 		return (-1);
151*0eaf192dSyasuoka 	if (radius_put_vs_raw_attr(packet, RADIUS_VENDOR_MICROSOFT, vtype,
152*0eaf192dSyasuoka 	    cipher, clen) != 0)
153*0eaf192dSyasuoka 		return (-1);
154*0eaf192dSyasuoka 
155*0eaf192dSyasuoka 	return (0);
156*0eaf192dSyasuoka }
157*0eaf192dSyasuoka 
158*0eaf192dSyasuoka int
radius_get_mppe_send_key_attr(const RADIUS_PACKET * packet,void * buf,size_t * len,const char * secret)159*0eaf192dSyasuoka radius_get_mppe_send_key_attr(const RADIUS_PACKET * packet, void *buf,
160*0eaf192dSyasuoka     size_t * len, const char *secret)
161*0eaf192dSyasuoka {
162*0eaf192dSyasuoka 	return (radius_get_mppe_key_attr(packet, RADIUS_VTYPE_MPPE_SEND_KEY,
163*0eaf192dSyasuoka 	    buf, len, secret));
164*0eaf192dSyasuoka }
165*0eaf192dSyasuoka 
166*0eaf192dSyasuoka int
radius_put_mppe_send_key_attr(RADIUS_PACKET * packet,const void * buf,size_t len,const char * secret)167*0eaf192dSyasuoka radius_put_mppe_send_key_attr(RADIUS_PACKET * packet, const void *buf,
168*0eaf192dSyasuoka     size_t len, const char *secret)
169*0eaf192dSyasuoka {
170*0eaf192dSyasuoka 	return (radius_put_mppe_key_attr(packet, RADIUS_VTYPE_MPPE_SEND_KEY,
171*0eaf192dSyasuoka 	    buf, len, secret));
172*0eaf192dSyasuoka }
173*0eaf192dSyasuoka 
174*0eaf192dSyasuoka int
radius_get_mppe_recv_key_attr(const RADIUS_PACKET * packet,void * buf,size_t * len,const char * secret)175*0eaf192dSyasuoka radius_get_mppe_recv_key_attr(const RADIUS_PACKET * packet, void *buf,
176*0eaf192dSyasuoka     size_t * len, const char *secret)
177*0eaf192dSyasuoka {
178*0eaf192dSyasuoka 	return (radius_get_mppe_key_attr(packet, RADIUS_VTYPE_MPPE_RECV_KEY,
179*0eaf192dSyasuoka 	    buf, len, secret));
180*0eaf192dSyasuoka }
181*0eaf192dSyasuoka 
182*0eaf192dSyasuoka int
radius_put_mppe_recv_key_attr(RADIUS_PACKET * packet,const void * buf,size_t len,const char * secret)183*0eaf192dSyasuoka radius_put_mppe_recv_key_attr(RADIUS_PACKET * packet, const void *buf,
184*0eaf192dSyasuoka     size_t len, const char *secret)
185*0eaf192dSyasuoka {
186*0eaf192dSyasuoka 	return (radius_put_mppe_key_attr(packet, RADIUS_VTYPE_MPPE_RECV_KEY,
187*0eaf192dSyasuoka 	    buf, len, secret));
188*0eaf192dSyasuoka }
189