diff options
Diffstat (limited to 'contrib/wpa_supplicant/eap_otp.c')
| -rw-r--r-- | contrib/wpa_supplicant/eap_otp.c | 113 |
1 files changed, 113 insertions, 0 deletions
diff --git a/contrib/wpa_supplicant/eap_otp.c b/contrib/wpa_supplicant/eap_otp.c new file mode 100644 index 000000000000..e50de636accd --- /dev/null +++ b/contrib/wpa_supplicant/eap_otp.c @@ -0,0 +1,113 @@ +/* + * WPA Supplicant / EAP-OTP (RFC 3748) + * Copyright (c) 2004-2005, Jouni Malinen <jkmaline@cc.hut.fi> + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License version 2 as + * published by the Free Software Foundation. + * + * Alternatively, this software may be distributed under the terms of BSD + * license. + * + * See README and COPYING for more details. + */ + +#include <stdlib.h> +#include <stdio.h> +#include <string.h> + +#include "common.h" +#include "eap_i.h" +#include "wpa_supplicant.h" +#include "config_ssid.h" + + +static void * eap_otp_init(struct eap_sm *sm) +{ + return (void *) 1; +} + + +static void eap_otp_deinit(struct eap_sm *sm, void *priv) +{ +} + + +static u8 * eap_otp_process(struct eap_sm *sm, void *priv, + struct eap_method_ret *ret, + u8 *reqData, size_t reqDataLen, + size_t *respDataLen) +{ + struct wpa_ssid *config = eap_get_config(sm); + struct eap_hdr *req, *resp; + u8 *pos, *password; + size_t password_len, len; + + req = (struct eap_hdr *) reqData; + pos = (u8 *) (req + 1); + if (reqDataLen < sizeof(*req) + 1 || *pos != EAP_TYPE_OTP || + (len = be_to_host16(req->length)) > reqDataLen) { + wpa_printf(MSG_INFO, "EAP-OTP: Invalid frame"); + ret->ignore = TRUE; + return NULL; + } + pos++; + wpa_hexdump_ascii(MSG_MSGDUMP, "EAP-OTP: Request message", + pos, len - sizeof(*req) - 1); + + if (config == NULL || + (config->password == NULL && config->otp == NULL)) { + wpa_printf(MSG_INFO, "EAP-OTP: Password not configured"); + eap_sm_request_otp(sm, config, (char *) pos, + len - sizeof(*req) - 1); + ret->ignore = TRUE; + return NULL; + } + + if (config->otp) { + password = config->otp; + password_len = config->otp_len; + } else { + password = config->password; + password_len = config->password_len; + } + + ret->ignore = FALSE; + + ret->methodState = METHOD_DONE; + ret->decision = DECISION_COND_SUCC; + ret->allowNotifications = FALSE; + + *respDataLen = sizeof(struct eap_hdr) + 1 + password_len; + resp = malloc(*respDataLen); + if (resp == NULL) + return NULL; + resp->code = EAP_CODE_RESPONSE; + resp->identifier = req->identifier; + resp->length = host_to_be16(*respDataLen); + pos = (u8 *) (resp + 1); + *pos++ = EAP_TYPE_OTP; + memcpy(pos, password, password_len); + wpa_hexdump_ascii_key(MSG_MSGDUMP, "EAP-OTP: Response", + password, password_len); + + if (config->otp) { + wpa_printf(MSG_DEBUG, "EAP-OTP: Forgetting used password"); + memset(config->otp, 0, config->otp_len); + free(config->otp); + config->otp = NULL; + config->otp_len = 0; + } + + return (u8 *) resp; +} + + +const struct eap_method eap_method_otp = +{ + .method = EAP_TYPE_OTP, + .name = "OTP", + .init = eap_otp_init, + .deinit = eap_otp_deinit, + .process = eap_otp_process, +}; |
