sha_pwd.c 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143
  1. /** BEGIN COPYRIGHT BLOCK
  2. * This Program is free software; you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation; version 2 of the License.
  5. *
  6. * This Program is distributed in the hope that it will be useful, but WITHOUT
  7. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  8. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
  9. *
  10. * You should have received a copy of the GNU General Public License along with
  11. * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
  12. * Place, Suite 330, Boston, MA 02111-1307 USA.
  13. *
  14. * In addition, as a special exception, Red Hat, Inc. gives You the additional
  15. * right to link the code of this Program with code not covered under the GNU
  16. * General Public License ("Non-GPL Code") and to distribute linked combinations
  17. * including the two, subject to the limitations in this paragraph. Non-GPL Code
  18. * permitted under this exception must only link to the code of this Program
  19. * through those well defined interfaces identified in the file named EXCEPTION
  20. * found in the source code files (the "Approved Interfaces"). The files of
  21. * Non-GPL Code may instantiate templates or use macros or inline functions from
  22. * the Approved Interfaces without causing the resulting work to be covered by
  23. * the GNU General Public License. Only Red Hat, Inc. may make changes or
  24. * additions to the list of Approved Interfaces. You must obey the GNU General
  25. * Public License in all respects for all of the Program code and other code used
  26. * in conjunction with the Program except the Non-GPL Code covered by this
  27. * exception. If you modify this file, you may extend this exception to your
  28. * version of the file, but you are not obligated to do so. If you do not wish to
  29. * provide this exception without modification, you must delete this exception
  30. * statement from your version and license this file solely under the GPL without
  31. * exception.
  32. *
  33. *
  34. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  35. * Copyright (C) 2005 Red Hat, Inc.
  36. * All rights reserved.
  37. * END COPYRIGHT BLOCK **/
  38. /*
  39. * slapd hashed password routines
  40. *
  41. */
  42. #include <stdio.h>
  43. #include <string.h>
  44. #include <sys/types.h>
  45. #include "pwdstorage.h"
  46. #if defined(NET_SSL)
  47. #include <sechash.h>
  48. #endif /* NET_SSL */
  49. #define SHA1_SALT_LENGTH 8 /* number of bytes of data in salt */
  50. #define NOT_FIRST_TIME (time_t)1 /* not the first logon */
  51. static char *hasherrmsg = "pw_cmp: %s userPassword \"%s\" is the wrong length or is not properly encoded BASE64\n";
  52. static char *plugin_name = "NSPwdStoragePlugin";
  53. #define DS40B1_SALTED_SHA_LENGTH 18
  54. /* Directory Server 4.0 Beta 1 implemented a scheme that stored
  55. * 8 bytes of salt plus the first 10 bytes of the SHA-1 digest.
  56. * It's obsolescent now, but we still handle such stored values.
  57. */
  58. int
  59. sha1_pw_cmp (char *userpwd, char *dbpwd )
  60. {
  61. /*
  62. * SHA1 passwords are stored in the database as SHA1_LENGTH bytes of
  63. * hash, followed by zero or more bytes of salt, all BASE64 encoded.
  64. */
  65. int result = 1; /* failure */
  66. unsigned char userhash[SHA1_LENGTH];
  67. unsigned char quick_dbhash[SHA1_LENGTH + SHA1_SALT_LENGTH + 3];
  68. unsigned char *dbhash = quick_dbhash;
  69. struct berval salt;
  70. int hash_len; /* must be a signed valued -- see below */
  71. /*
  72. * Decode hash stored in database.
  73. *
  74. * Note that ldif_base64_decode() returns a value less than zero to
  75. * indicate that a decoding error occurred, so it is critical that
  76. * hash_len be a signed value.
  77. */
  78. hash_len = (((strlen(dbpwd) + 3) / 4) * 3); /* maybe less */
  79. if ( hash_len > sizeof(quick_dbhash) ) { /* get more space: */
  80. dbhash = (unsigned char*) slapi_ch_malloc( hash_len );
  81. if ( dbhash == NULL ) goto loser;
  82. }
  83. hash_len = ldif_base64_decode( dbpwd, dbhash );
  84. if ( hash_len >= SHA1_LENGTH ) {
  85. salt.bv_val = (void*)(dbhash + SHA1_LENGTH);
  86. salt.bv_len = hash_len - SHA1_LENGTH;
  87. } else if ( hash_len == DS40B1_SALTED_SHA_LENGTH ) {
  88. salt.bv_val = (void*)dbhash;
  89. salt.bv_len = 8;
  90. } else { /* unsupported, invalid BASE64 (hash_len < 0), or similar */
  91. slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, hasherrmsg, SHA1_SCHEME_NAME, dbpwd );
  92. goto loser;
  93. }
  94. /* SHA1 hash the user's key */
  95. if ( sha1_salted_hash( userhash, userpwd, &salt ) != SECSuccess ) {
  96. slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "sha1_pw_cmp: SHA1_Hash() failed\n");
  97. goto loser;
  98. }
  99. /* the proof is in the comparison... */
  100. result = ( hash_len == DS40B1_SALTED_SHA_LENGTH ) ?
  101. ( memcmp( userhash, dbhash + 8, hash_len - 8 )) :
  102. ( memcmp( userhash, dbhash, SHA1_LENGTH ));
  103. loser:
  104. if ( dbhash && dbhash != quick_dbhash ) slapi_ch_free( (void**)&dbhash );
  105. return result;
  106. }
  107. char *
  108. sha1_pw_enc( char *pwd )
  109. {
  110. unsigned char hash[ SHA1_LENGTH ];
  111. char *enc;
  112. /* SHA1 hash the user's key */
  113. if ( sha1_salted_hash( hash, pwd, NULL ) != SECSuccess ) {
  114. return( NULL );
  115. }
  116. if (( enc = slapi_ch_malloc( 3 + SHA1_NAME_LEN +
  117. LDIF_BASE64_LEN( SHA1_LENGTH ))) == NULL ) {
  118. return( NULL );
  119. }
  120. sprintf( enc, "%c%s%c", PWD_HASH_PREFIX_START, SHA1_SCHEME_NAME,
  121. PWD_HASH_PREFIX_END );
  122. (void)ldif_base64_encode( hash, enc + 2 + SHA1_NAME_LEN,
  123. SHA1_LENGTH, -1 );
  124. return( enc );
  125. }