eapol/eapol_framework/eapol_common/type/mschapv2/include/eap_type_mschapv2_types.h
author Dremov Kirill (Nokia-D-MSW/Tampere) <kirill.dremov@nokia.com>
Mon, 18 Jan 2010 20:22:35 +0200
changeset 2 1c7bc153c08e
parent 0 c8830336c852
child 26 9abfd4f00d37
permissions -rw-r--r--
Revision: 201001 Kit: 201003

/*
* Copyright (c) 2001-2006 Nokia Corporation and/or its subsidiary(-ies).
* All rights reserved.
* This component and the accompanying materials are made available
* under the terms of the License "Eclipse Public License v1.0"
* which accompanies this distribution, and is available
* at the URL "http://www.eclipse.org/legal/epl-v10.html".
*
* Initial Contributors:
* Nokia Corporation - initial contribution.
*
* Contributors:
*
* Description:  EAP and WLAN authentication protocols.
*
*/

/*
* %version: 27 %
*/

#ifndef _MSCHAPV2_TYPES_H_
#define _MSCHAPV2_TYPES_H_

#include "eap_configuration_field.h"

const u32_t EAP_MSCHAPV2_USERNAME_MAX_SIZE = 512; // 256 unicode-chars
const u32_t EAP_MSCHAPV2_PASSWORD_MAX_SIZE = 512; // 256 unicode-chars

const u32_t EAP_MSCHAPV2_AUTHENTICATOR_RESPONSE_SIZE = 42;
const u32_t EAP_MSCHAPV2_CHALLENGE_HASH_SIZE = 8;
const u32_t EAP_MSCHAPV2_NT_RESPONSE_SIZE = 24;
const u32_t EAP_MSCHAPV2_AUTHENTICATOR_CHALLENGE_SIZE = 16;
const u32_t EAP_MSCHAPV2_PEER_CHALLENGE_SIZE = 16;
const u32_t EAP_MSCHAPV2_IDENT_SIZE = 1;
const u32_t EAP_MSCHAPV2_FLAGS_SIZE = 1;
const u32_t EAP_MSCHAPV2_OPCODE_SIZE = 1;
const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_FLAGS_SIZE = 2;
const u32_t EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE = 8;
const u32_t EAP_MSCHAPV2_MD4_DIGEST_SIZE = 16;
const u32_t EAP_MSCHAPV2_SHA1_DIGEST_SIZE = 20;
const u32_t EAP_MSCHAPV2_DES_KEY_SIZE = 8;
const u32_t EAP_MSCHAPV2_DES_BLOCK_SIZE = 8;

const u32_t EAP_MSCHAPV2_RESPONSE_MESSAGE_SIZE
	= EAP_MSCHAPV2_IDENT_SIZE
	+ EAP_MSCHAPV2_FLAGS_SIZE
	+ EAP_MSCHAPV2_PEER_CHALLENGE_SIZE
	+ EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE
	+ EAP_MSCHAPV2_NT_RESPONSE_SIZE;

const u32_t EAP_MSCHAPV2_PEER_CHALLENGE_OFFSET
	= EAP_MSCHAPV2_IDENT_SIZE
	+ EAP_MSCHAPV2_FLAGS_SIZE;

const u32_t EAP_MSCHAPV2_NT_RESPONSE_OFFSET
	= EAP_MSCHAPV2_PEER_CHALLENGE_OFFSET
	+ EAP_MSCHAPV2_PEER_CHALLENGE_SIZE
	+ EAP_MSCHAPV2_RESERVED_RESPONSE_SIZE;


const u32_t EAP_MSCHAPV2_MASTER_KEY_SIZE = 16;

const u32_t EAP_MSCHAPV2_SUCCESS_REQUEST_MESSAGE_MIN_LENGTH = 42;// "S=<40>"
const u32_t EAP_MSCHAPV2_FAILURE_MIN_SIZE = 48;
const u32_t EAP_MSCHAPV2_FAILURE_REQUEST_SIZE = 67; // "E=eeeeeeeeee R=r C=cccccccccccccccccccccccccccccccc V=vvvvvvvvvv M="
const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_ENCRYPTED_PASSWORD_SIZE = 516;
const u32_t EAP_MSCHAPV2_CHANGE_PASSWORD_ENCRYPTED_HASH_SIZE = 16;
const u32_t EAP_MSCHAPV2_HEADER_SIZE = 4; // OpCode, MS-CHAPv2-ID and MS-Length


const u8_t EAP_MSCHAPV2_MESSAGE_PREFIX[] = " M=";
const u32_t EAP_MSCHAPV2_MESSAGE_PREFIX_SIZE = 3;

const u8_t EAP_MSCHAPV2_IMPLICIT_CHALLENGE_HANDLE_KEY[] = "eap_type_mschapv2_c implicit challenge";

const u8_t EAP_MSCHAPV2_ZERO_CHALLENGE[]
	= { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
		0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, };

typedef struct
{
	u8_t password[EAP_MSCHAPV2_PASSWORD_MAX_SIZE]; // 256 unicode-chars
	u32_t password_length;
} pw_block_s;

enum eap_type_mschapv2_stored_e
{
	eap_type_mschapv2_stored_none,
	eap_type_mschapv2_stored_username,
	eap_type_mschapv2_stored_password,
	eap_type_mschapv2_implicit_challenge,
	eap_type_mschapv2_stored_password_expired_flag,
};


const u32_t TRACE_FLAGS_MSCHAPV2_ERROR = eap_am_tools_c::eap_trace_mask_error;

/**
 *  This is boolean configuration option.
 *  True value of this flag causes client return random
 *  identity on EAP-Response/Identity.
 *  False value causes client return real identity
 *  (IMSI, pseudonym or re-authentication identity)
 *  in EAP-Response/Identity.
 *  Default value is false.
 */
EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_wait_eap_success_packet,
	"EAP_MSCHAPV2_wait_eap_success_packet",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_password_prompt,
	"EAP_MSCHAPV2_password_prompt",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_username,
	"EAP_MSCHAPV2_username",
	eap_configure_type_hex_data,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_password,
	"EAP_MSCHAPV2_password",
	eap_configure_type_hex_data,
	true);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_use_implicit_challenge,
	"EAP_MSCHAPV2_use_implicit_challenge",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_use_EAP_FAST_challenge,
	"EAP_MSCHAPV2_use_EAP_FAST_challenge",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_client_EAP_FAST_challenge,
	"EAP_MSCHAPV2_client_EAP_FAST_challenge",
	eap_configure_type_hex_data,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_server_EAP_FAST_challenge,
	"EAP_MSCHAPV2_server_EAP_FAST_challenge",
	eap_configure_type_hex_data,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_use_EAP_FAST_full_key,
	"EAP_MSCHAPV2_use_EAP_FAST_full_key",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_use_eap_expanded_type,
	"EAP_MSCHAPV2_use_eap_expanded_type",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_do_password_expiration_tests,
	"EAP_MSCHAPV2_do_password_expiration_tests",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_do_wrong_password_tests,
	"EAP_MSCHAPV2_do_wrong_password_tests",
	eap_configure_type_boolean,
	false);

EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPV2_do_asyncronous_completition,
	"EAP_MSCHAPV2_do_asyncronous_completition",
	eap_configure_type_boolean,
	false);

/**
 *  This u32_t configuration value specifies the maximum session validity time in seconds.
 *  Default value is 12 hours in seconds, which is 43200 seconds.
 */
EAP_CONFIGURATION_FIELD(
	cf_str_EAP_MSCHAPv2_max_session_validity_time,
	"EAP_MSCHAPv2_max_session_validity_time",
	eap_configure_type_u32_t,
	false);

/** @} */ // End of group MSCHAPV2_config_options.

//--------------------------------------------------

/// Macro traces payload type and data.
#define EAP_MSCHAPV2_TRACE_PAYLOAD(prefix, payload) \
	{ \
		EAP_TRACE_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT|TRACE_TEST_VECTORS, (EAPL("%s (0x%08x): current payload 0x%04x=%s, data length 0x%04x.\n"), \
			prefix, payload, payload->get_current_payload(), payload->get_payload_AT_string(), payload->get_data_length())); \
		EAP_TRACE_DATA_DEBUG(m_am_tools, TRACE_FLAGS_DEFAULT|TRACE_TEST_VECTORS, (EAPL("payload"), \
			payload, \
			payload->get_payload_length())); \
	}

//--------------------------------------------------


#endif //#if !defined(_MSCHAPV2_TYPES_H_)