1
0

sha_pwd.c 9.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257
  1. /** BEGIN COPYRIGHT BLOCK
  2. * This Program is free software; you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation; version 2 of the License.
  5. *
  6. * This Program is distributed in the hope that it will be useful, but WITHOUT
  7. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  8. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
  9. *
  10. * You should have received a copy of the GNU General Public License along with
  11. * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
  12. * Place, Suite 330, Boston, MA 02111-1307 USA.
  13. *
  14. * In addition, as a special exception, Red Hat, Inc. gives You the additional
  15. * right to link the code of this Program with code not covered under the GNU
  16. * General Public License ("Non-GPL Code") and to distribute linked combinations
  17. * including the two, subject to the limitations in this paragraph. Non-GPL Code
  18. * permitted under this exception must only link to the code of this Program
  19. * through those well defined interfaces identified in the file named EXCEPTION
  20. * found in the source code files (the "Approved Interfaces"). The files of
  21. * Non-GPL Code may instantiate templates or use macros or inline functions from
  22. * the Approved Interfaces without causing the resulting work to be covered by
  23. * the GNU General Public License. Only Red Hat, Inc. may make changes or
  24. * additions to the list of Approved Interfaces. You must obey the GNU General
  25. * Public License in all respects for all of the Program code and other code used
  26. * in conjunction with the Program except the Non-GPL Code covered by this
  27. * exception. If you modify this file, you may extend this exception to your
  28. * version of the file, but you are not obligated to do so. If you do not wish to
  29. * provide this exception without modification, you must delete this exception
  30. * statement from your version and license this file solely under the GPL without
  31. * exception.
  32. *
  33. *
  34. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  35. * Copyright (C) 2005 Red Hat, Inc.
  36. * All rights reserved.
  37. * END COPYRIGHT BLOCK **/
  38. #ifdef HAVE_CONFIG_H
  39. # include <config.h>
  40. #endif
  41. /*
  42. * slapd hashed password routines
  43. *
  44. */
  45. #include <stdio.h>
  46. #include <string.h>
  47. #include <sys/types.h>
  48. #include "pwdstorage.h"
  49. #include <sechash.h>
  50. #define SHA_SALT_LENGTH 8 /* number of bytes of data in salt */
  51. #define NOT_FIRST_TIME (time_t)1 /* not the first logon */
  52. static char *hasherrmsg = "pw_cmp: %s userPassword \"%s\" is the wrong length or is not properly encoded BASE64\n";
  53. static char *plugin_name = "NSPwdStoragePlugin";
  54. #define DS40B1_SALTED_SHA_LENGTH 18
  55. /* Directory Server 4.0 Beta 1 implemented a scheme that stored
  56. * 8 bytes of salt plus the first 10 bytes of the SHA-1 digest.
  57. * It's obsolescent now, but we still handle such stored values.
  58. */
  59. int
  60. sha_pw_cmp (char *userpwd, char *dbpwd, unsigned int shaLen )
  61. {
  62. /*
  63. * SHA passwords are stored in the database as shaLen bytes of
  64. * hash, followed by zero or more bytes of salt, all BASE64 encoded.
  65. */
  66. int result = 1; /* failure */
  67. unsigned char userhash[MAX_SHA_HASH_SIZE];
  68. unsigned char quick_dbhash[MAX_SHA_HASH_SIZE + SHA_SALT_LENGTH + 3];
  69. unsigned char *dbhash = quick_dbhash;
  70. struct berval salt;
  71. int hash_len; /* must be a signed valued -- see below */
  72. unsigned int secOID;
  73. char *schemeName;
  74. /* Determine which algorithm we're using */
  75. switch (shaLen) {
  76. case SHA1_LENGTH:
  77. schemeName = SHA1_SCHEME_NAME;
  78. secOID = SEC_OID_SHA1;
  79. break;
  80. case SHA256_LENGTH:
  81. schemeName = SHA256_SCHEME_NAME;
  82. secOID = SEC_OID_SHA256;
  83. break;
  84. case SHA384_LENGTH:
  85. schemeName = SHA384_SCHEME_NAME;
  86. secOID = SEC_OID_SHA384;
  87. break;
  88. case SHA512_LENGTH:
  89. schemeName = SHA512_SCHEME_NAME;
  90. secOID = SEC_OID_SHA512;
  91. break;
  92. default:
  93. /* An unknown shaLen was passed in. We shouldn't get here. */
  94. goto loser;
  95. }
  96. /*
  97. * Decode hash stored in database.
  98. *
  99. * Note that ldif_base64_decode() returns a value less than zero to
  100. * indicate that a decoding error occurred, so it is critical that
  101. * hash_len be a signed value.
  102. */
  103. hash_len = (((strlen(dbpwd) + 3) / 4) * 3); /* maybe less */
  104. if ( hash_len > sizeof(quick_dbhash) ) { /* get more space: */
  105. dbhash = (unsigned char*) slapi_ch_malloc( hash_len );
  106. if ( dbhash == NULL ) goto loser;
  107. }
  108. hash_len = ldif_base64_decode( dbpwd, dbhash );
  109. if (hash_len < 0) {
  110. slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, hasherrmsg, schemeName, dbpwd );
  111. goto loser;
  112. } else if ( hash_len >= shaLen ) {
  113. salt.bv_val = (void*)(dbhash + shaLen);
  114. salt.bv_len = hash_len - shaLen;
  115. } else if ( hash_len == DS40B1_SALTED_SHA_LENGTH ) {
  116. salt.bv_val = (void*)dbhash;
  117. salt.bv_len = 8;
  118. } else { /* unsupported, invalid BASE64 (hash_len < 0), or similar */
  119. slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, hasherrmsg, schemeName, dbpwd );
  120. goto loser;
  121. }
  122. /* hash the user's key */
  123. if ( sha_salted_hash( userhash, userpwd, &salt, secOID ) != SECSuccess ) {
  124. slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "sha_pw_cmp: sha_salted_hash() failed\n");
  125. goto loser;
  126. }
  127. /* the proof is in the comparison... */
  128. result = ( hash_len == DS40B1_SALTED_SHA_LENGTH ) ?
  129. ( memcmp( userhash, dbhash + 8, hash_len - 8 )) :
  130. ( memcmp( userhash, dbhash, shaLen ));
  131. loser:
  132. if ( dbhash && dbhash != quick_dbhash ) slapi_ch_free( (void**)&dbhash );
  133. return result;
  134. }
  135. char *
  136. sha_pw_enc( char *pwd, unsigned int shaLen )
  137. {
  138. unsigned char hash[MAX_SHA_HASH_SIZE];
  139. char *enc;
  140. char *schemeName;
  141. unsigned int schemeNameLen;
  142. unsigned int secOID;
  143. /* Determine which algorithm we're using */
  144. switch (shaLen) {
  145. case SHA1_LENGTH:
  146. schemeName = SHA1_SCHEME_NAME;
  147. schemeNameLen = SHA1_NAME_LEN;
  148. secOID = SEC_OID_SHA1;
  149. break;
  150. case SHA256_LENGTH:
  151. schemeName = SHA256_SCHEME_NAME;
  152. schemeNameLen = SHA256_NAME_LEN;
  153. secOID = SEC_OID_SHA256;
  154. break;
  155. case SHA384_LENGTH:
  156. schemeName = SHA384_SCHEME_NAME;
  157. schemeNameLen = SHA384_NAME_LEN;
  158. secOID = SEC_OID_SHA384;
  159. break;
  160. case SHA512_LENGTH:
  161. schemeName = SHA512_SCHEME_NAME;
  162. schemeNameLen = SHA512_NAME_LEN;
  163. secOID = SEC_OID_SHA512;
  164. break;
  165. default:
  166. /* An unknown shaLen was passed in. We shouldn't get here. */
  167. return( NULL );
  168. }
  169. /* hash the user's key */
  170. if ( sha_salted_hash( hash, pwd, NULL, secOID ) != SECSuccess ) {
  171. return( NULL );
  172. }
  173. if (( enc = slapi_ch_malloc( 3 + schemeNameLen +
  174. LDIF_BASE64_LEN( shaLen ))) == NULL ) {
  175. return( NULL );
  176. }
  177. sprintf( enc, "%c%s%c", PWD_HASH_PREFIX_START, schemeName,
  178. PWD_HASH_PREFIX_END );
  179. (void)ldif_base64_encode( hash, enc + 2 + schemeNameLen,
  180. shaLen, -1 );
  181. return( enc );
  182. }
  183. /*
  184. * Wrapper password comparison functions
  185. */
  186. int
  187. sha1_pw_cmp (char *userpwd, char *dbpwd )
  188. {
  189. return sha_pw_cmp( userpwd, dbpwd, SHA1_LENGTH );
  190. }
  191. int
  192. sha256_pw_cmp (char *userpwd, char *dbpwd )
  193. {
  194. return sha_pw_cmp( userpwd, dbpwd, SHA256_LENGTH );
  195. }
  196. int
  197. sha384_pw_cmp (char *userpwd, char *dbpwd )
  198. {
  199. return sha_pw_cmp( userpwd, dbpwd, SHA384_LENGTH );
  200. }
  201. int
  202. sha512_pw_cmp (char *userpwd, char *dbpwd )
  203. {
  204. return sha_pw_cmp( userpwd, dbpwd, SHA512_LENGTH );
  205. }
  206. /*
  207. * Wrapper password encryption functions
  208. */
  209. char *
  210. sha1_pw_enc( char *pwd )
  211. {
  212. return sha_pw_enc( pwd, SHA1_LENGTH );
  213. }
  214. char *
  215. sha256_pw_enc( char *pwd )
  216. {
  217. return sha_pw_enc( pwd, SHA256_LENGTH );
  218. }
  219. char *
  220. sha384_pw_enc( char *pwd )
  221. {
  222. return sha_pw_enc( pwd, SHA384_LENGTH );
  223. }
  224. char *
  225. sha512_pw_enc( char *pwd )
  226. {
  227. return sha_pw_enc( pwd, SHA512_LENGTH );
  228. }