dsalib_pw.c 5.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169
  1. /** BEGIN COPYRIGHT BLOCK
  2. * This Program is free software; you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation; version 2 of the License.
  5. *
  6. * This Program is distributed in the hope that it will be useful, but WITHOUT
  7. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  8. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
  9. *
  10. * You should have received a copy of the GNU General Public License along with
  11. * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
  12. * Place, Suite 330, Boston, MA 02111-1307 USA.
  13. *
  14. * In addition, as a special exception, Red Hat, Inc. gives You the additional
  15. * right to link the code of this Program with code not covered under the GNU
  16. * General Public License ("Non-GPL Code") and to distribute linked combinations
  17. * including the two, subject to the limitations in this paragraph. Non-GPL Code
  18. * permitted under this exception must only link to the code of this Program
  19. * through those well defined interfaces identified in the file named EXCEPTION
  20. * found in the source code files (the "Approved Interfaces"). The files of
  21. * Non-GPL Code may instantiate templates or use macros or inline functions from
  22. * the Approved Interfaces without causing the resulting work to be covered by
  23. * the GNU General Public License. Only Red Hat, Inc. may make changes or
  24. * additions to the list of Approved Interfaces. You must obey the GNU General
  25. * Public License in all respects for all of the Program code and other code used
  26. * in conjunction with the Program except the Non-GPL Code covered by this
  27. * exception. If you modify this file, you may extend this exception to your
  28. * version of the file, but you are not obligated to do so. If you do not wish to
  29. * provide this exception without modification, you must delete this exception
  30. * statement from your version and license this file solely under the GPL without
  31. * exception.
  32. *
  33. *
  34. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  35. * Copyright (C) 2005 Red Hat, Inc.
  36. * All rights reserved.
  37. * END COPYRIGHT BLOCK **/
  38. #ifdef HAVE_CONFIG_H
  39. # include <config.h>
  40. #endif
  41. /*
  42. * Adjust password policy management related variables.
  43. *
  44. * Valerie Chu
  45. */
  46. #include <stdio.h>
  47. #include <string.h>
  48. #include <stdlib.h>
  49. #include <ctype.h>
  50. #include <sys/types.h>
  51. #include "ldap.h"
  52. #include "ldif.h"
  53. #include "sechash.h"
  54. #include "dsalib.h"
  55. #include "dsalib_pw.h"
  56. #include "prtime.h"
  57. #include "prlong.h"
  58. #include "prmem.h"
  59. #include <pk11func.h>
  60. #include <pk11pqg.h>
  61. #define SHA1_SALT_LENGTH 8 /* number of bytes of data in salt */
  62. #define PWD_HASH_PREFIX_START '{'
  63. #define PWD_HASH_PREFIX_END '}'
  64. #define SALTED_SHA1_SCHEME_NAME "SSHA"
  65. #define SALTED_SHA1_NAME_LEN 4
  66. /*
  67. WARNING: The following code is blatantly copied from the server
  68. pwdstorage ssha_pwd.c plugin. It would be nice to share this
  69. code with the server. The problem is that the server wants to
  70. use slapi_ch_malloc to allocate the memory for the returned
  71. password - this function is not available outside the server
  72. (as in the setup programs that also want to hash the password)
  73. We need to figure out a way to put this code into a library
  74. in such a way that the memory allocation functions to use
  75. can be passed in or set beforehand.
  76. */
  77. static void
  78. ssha_rand_array(void *randx, size_t len)
  79. {
  80. PK11_RandomUpdate(randx, len);
  81. PK11_GenerateRandom((unsigned char *)randx, (int)len);
  82. }
  83. /*
  84. * A salted SHA1 hash
  85. * if salt is null, no salt is used (this is for backward compatibility)
  86. */
  87. SECStatus
  88. sha1_salted_hash(unsigned char *hash_out, char *pwd, struct berval *salt)
  89. {
  90. PK11Context *ctx;
  91. unsigned int outLen;
  92. SECStatus rc;
  93. if (salt && salt->bv_len) {
  94. ctx = PK11_CreateDigestContext(SEC_OID_SHA1);
  95. if (ctx == NULL) {
  96. rc = SECFailure;
  97. }
  98. else {
  99. PK11_DigestBegin(ctx);
  100. PK11_DigestOp(ctx, (unsigned char*)pwd, strlen(pwd));
  101. PK11_DigestOp(ctx, (unsigned char*)(salt->bv_val), salt->bv_len);
  102. PK11_DigestFinal(ctx, hash_out, &outLen, SHA1_LENGTH);
  103. PK11_DestroyContext(ctx, 1);
  104. if (outLen == SHA1_LENGTH)
  105. rc = SECSuccess;
  106. else
  107. rc = SECFailure;
  108. }
  109. }
  110. else {
  111. /*backward compatibility*/
  112. rc = PK11_HashBuf(SEC_OID_SHA1, hash_out, (unsigned char *)pwd, strlen(pwd));
  113. }
  114. return rc;
  115. }
  116. char *
  117. salted_sha1_pw_enc( char *pwd )
  118. {
  119. unsigned char hash[ SHA1_LENGTH + SHA1_SALT_LENGTH ];
  120. unsigned char *salt = hash + SHA1_LENGTH;
  121. struct berval saltval;
  122. char *enc;
  123. saltval.bv_val = (void*)salt;
  124. saltval.bv_len = SHA1_SALT_LENGTH;
  125. /* generate a new random salt */
  126. /* Note: the uninitialized salt array provides a little extra entropy
  127. * to the random array generation, but it is not really needed since
  128. * PK11_GenerateRandom takes care of seeding. In any case, it doesn't
  129. * hurt. */
  130. ssha_rand_array( salt, SHA1_SALT_LENGTH );
  131. /* SHA1 hash the user's key */
  132. if ( sha1_salted_hash( hash, pwd, &saltval ) != SECSuccess ) {
  133. return( NULL );
  134. }
  135. if (( enc = PR_Malloc( 3 + SALTED_SHA1_NAME_LEN +
  136. LDIF_BASE64_LEN(sizeof(hash)))) == NULL ) {
  137. return( NULL );
  138. }
  139. sprintf( enc, "%c%s%c", PWD_HASH_PREFIX_START, SALTED_SHA1_SCHEME_NAME,
  140. PWD_HASH_PREFIX_END );
  141. (void)ldif_base64_encode( hash, enc + 2 + SALTED_SHA1_NAME_LEN,
  142. sizeof(hash), -1 );
  143. return( enc );
  144. }
  145. DS_EXPORT_SYMBOL char *
  146. ds_salted_sha1_pw_enc (char* pwd)
  147. {
  148. return( salted_sha1_pw_enc(pwd) );
  149. }