ssha_pwd.c 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202
  1. /** BEGIN COPYRIGHT BLOCK
  2. * This Program is free software; you can redistribute it and/or modify it under
  3. * the terms of the GNU General Public License as published by the Free Software
  4. * Foundation; version 2 of the License.
  5. *
  6. * This Program is distributed in the hope that it will be useful, but WITHOUT
  7. * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
  8. * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
  9. *
  10. * You should have received a copy of the GNU General Public License along with
  11. * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
  12. * Place, Suite 330, Boston, MA 02111-1307 USA.
  13. *
  14. * In addition, as a special exception, Red Hat, Inc. gives You the additional
  15. * right to link the code of this Program with code not covered under the GNU
  16. * General Public License ("Non-GPL Code") and to distribute linked combinations
  17. * including the two, subject to the limitations in this paragraph. Non-GPL Code
  18. * permitted under this exception must only link to the code of this Program
  19. * through those well defined interfaces identified in the file named EXCEPTION
  20. * found in the source code files (the "Approved Interfaces"). The files of
  21. * Non-GPL Code may instantiate templates or use macros or inline functions from
  22. * the Approved Interfaces without causing the resulting work to be covered by
  23. * the GNU General Public License. Only Red Hat, Inc. may make changes or
  24. * additions to the list of Approved Interfaces. You must obey the GNU General
  25. * Public License in all respects for all of the Program code and other code used
  26. * in conjunction with the Program except the Non-GPL Code covered by this
  27. * exception. If you modify this file, you may extend this exception to your
  28. * version of the file, but you are not obligated to do so. If you do not wish to
  29. * provide this exception without modification, you must delete this exception
  30. * statement from your version and license this file solely under the GPL without
  31. * exception.
  32. *
  33. *
  34. * Copyright (C) 2001 Sun Microsystems, Inc. Used by permission.
  35. * Copyright (C) 2005 Red Hat, Inc.
  36. * All rights reserved.
  37. * END COPYRIGHT BLOCK **/
  38. #ifdef HAVE_CONFIG_H
  39. # include <config.h>
  40. #endif
  41. /*
  42. * slapd hashed password routines
  43. *
  44. */
  45. #include <stdio.h>
  46. #include <string.h>
  47. #include <sys/types.h>
  48. #include "pwdstorage.h"
  49. #include "prtime.h"
  50. #include "prlong.h"
  51. #include <pk11func.h>
  52. #include <pk11pqg.h>
  53. #define SHA_SALT_LENGTH 8 /* number of bytes of data in salt */
  54. SECStatus
  55. sha_salted_hash(char *hash_out, const char *pwd, struct berval *salt, unsigned int secOID)
  56. {
  57. PK11Context *ctx;
  58. unsigned int outLen;
  59. unsigned int shaLen;
  60. SECStatus rc;
  61. switch (secOID) {
  62. case SEC_OID_SHA1:
  63. shaLen = SHA1_LENGTH;
  64. break;
  65. case SEC_OID_SHA256:
  66. shaLen = SHA256_LENGTH;
  67. break;
  68. case SEC_OID_SHA384:
  69. shaLen = SHA384_LENGTH;
  70. break;
  71. case SEC_OID_SHA512:
  72. shaLen = SHA512_LENGTH;
  73. break;
  74. default:
  75. /* An unknown secOID was passed in. We shouldn't get here. */
  76. rc = SECFailure;
  77. return rc;
  78. }
  79. if (salt && salt->bv_len) {
  80. ctx = PK11_CreateDigestContext(secOID);
  81. if (ctx == NULL) {
  82. rc = SECFailure;
  83. } else {
  84. PK11_DigestBegin(ctx);
  85. PK11_DigestOp(ctx, (unsigned char*)pwd, strlen(pwd));
  86. PK11_DigestOp(ctx, (unsigned char*)(salt->bv_val), salt->bv_len);
  87. PK11_DigestFinal(ctx, (unsigned char*)hash_out, &outLen, shaLen);
  88. PK11_DestroyContext(ctx, 1);
  89. if (outLen == shaLen)
  90. rc = SECSuccess;
  91. else
  92. rc = SECFailure;
  93. }
  94. }
  95. else {
  96. /*backward compatibility*/
  97. rc = PK11_HashBuf(secOID, (unsigned char*)hash_out, (unsigned char *)pwd, strlen(pwd));
  98. }
  99. return rc;
  100. }
  101. char *
  102. salted_sha_pw_enc( const char *pwd, unsigned int shaLen )
  103. {
  104. char hash[ MAX_SHA_HASH_SIZE + SHA_SALT_LENGTH ];
  105. char *salt = hash + shaLen;
  106. struct berval saltval;
  107. char *enc;
  108. size_t encsize;
  109. char *schemeName;
  110. unsigned int schemeNameLen;
  111. unsigned int secOID;
  112. /* Determine which algorithm we're using */
  113. switch (shaLen) {
  114. case SHA1_LENGTH:
  115. schemeName = SALTED_SHA1_SCHEME_NAME;
  116. schemeNameLen = SALTED_SHA1_NAME_LEN;
  117. secOID = SEC_OID_SHA1;
  118. break;
  119. case SHA256_LENGTH:
  120. schemeName = SALTED_SHA256_SCHEME_NAME;
  121. schemeNameLen = SALTED_SHA256_NAME_LEN;
  122. secOID = SEC_OID_SHA256;
  123. break;
  124. case SHA384_LENGTH:
  125. schemeName = SALTED_SHA384_SCHEME_NAME;
  126. schemeNameLen = SALTED_SHA384_NAME_LEN;
  127. secOID = SEC_OID_SHA384;
  128. break;
  129. case SHA512_LENGTH:
  130. schemeName = SALTED_SHA512_SCHEME_NAME;
  131. schemeNameLen = SALTED_SHA512_NAME_LEN;
  132. secOID = SEC_OID_SHA512;
  133. break;
  134. default:
  135. /* An unknown shaLen was passed in. We shouldn't get here. */
  136. return( NULL );
  137. }
  138. memset(hash, 0, sizeof(hash));
  139. saltval.bv_val = (void*)salt;
  140. saltval.bv_len = SHA_SALT_LENGTH;
  141. /* generate a new random salt */
  142. slapi_rand_array( salt, SHA_SALT_LENGTH );
  143. /* hash the user's key */
  144. if ( sha_salted_hash( hash, pwd, &saltval, secOID ) != SECSuccess ) {
  145. return( NULL );
  146. }
  147. encsize = 3 + schemeNameLen +
  148. LDIF_BASE64_LEN(shaLen + SHA_SALT_LENGTH);
  149. if ( ( enc = slapi_ch_calloc( encsize, sizeof(char) ) ) == NULL ) {
  150. return( NULL );
  151. }
  152. sprintf( enc, "%c%s%c", PWD_HASH_PREFIX_START, schemeName,
  153. PWD_HASH_PREFIX_END );
  154. (void)PL_Base64Encode( hash, (shaLen + SHA_SALT_LENGTH), enc + 2 + schemeNameLen );
  155. PR_ASSERT(0 == enc[encsize-1]); /* must be null terminated */
  156. return( enc );
  157. }
  158. /*
  159. * Wrapper functions for password encoding
  160. */
  161. char *
  162. salted_sha1_pw_enc( const char *pwd )
  163. {
  164. return salted_sha_pw_enc( pwd, SHA1_LENGTH );
  165. }
  166. char *
  167. salted_sha256_pw_enc( const char *pwd )
  168. {
  169. return salted_sha_pw_enc( pwd, SHA256_LENGTH );
  170. }
  171. char *
  172. salted_sha384_pw_enc( const char *pwd )
  173. {
  174. return salted_sha_pw_enc( pwd, SHA384_LENGTH );
  175. }
  176. char *
  177. salted_sha512_pw_enc( const char *pwd )
  178. {
  179. return salted_sha_pw_enc( pwd, SHA512_LENGTH );
  180. }