password-scheme.c revision b193066823000095cae0781445fe9234c7c01366
45312f52ff3a3d4c137447be4c7556500c2f8bf2Timo Sirainen/* Copyright (C) 2003 Timo Sirainen */
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char salt_chars[] =
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenint password_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen const struct password_scheme *s;
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen return s->password_verify(plaintext, password, user);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenconst char *password_list_schemes(const struct password_scheme **listptr)
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenconst char *password_get_scheme(const char **password)
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen const char *p, *scheme;
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen /* skip the salt */
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen /* stop at next '$' */
3b49aee9ced3b0370a3be396aca53acd5f21418cTimo Sirainen return "MD5";
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen /* LDAP's RFC2307 specifies the MD5 scheme for what we call LDAP-MD5.
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen We can detect this case - base64 doesn't use '$'. */
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenconst char *password_generate(const char *plaintext, const char *user,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen const struct password_scheme *s;
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainenstatic bool crypt_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen return strcmp(mycrypt(plaintext, password), password) == 0;
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainenstatic const char *crypt_generate(const char *plaintext,
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen salt[0] = salt_chars[salt[0] % (sizeof(salt_chars)-1)];
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen salt[1] = salt_chars[salt[1] % (sizeof(salt_chars)-1)];
c9dea5c23355dea35c6fa423de69f6507852efe4Timo Sirainenstatic bool md5_verify(const char *plaintext, const char *password,
7a24bdc1a5e2d5368c2569b4852192f2bdb5a31fTimo Sirainen const char *str;
7a24bdc1a5e2d5368c2569b4852192f2bdb5a31fTimo Sirainen str = password_generate_md5_crypt(plaintext, password);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *md5_generate(const char *plaintext,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen for (i = 0; i < 8; i++)
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen salt[i] = salt_chars[salt[i] % (sizeof(salt_chars)-1)];
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen return password_generate_md5_crypt(plaintext, salt);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *sha1_generate(const char *plaintext,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen sha1_get_digest(plaintext, strlen(plaintext), digest);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(digest)+1));
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const void *
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenpassword_decode(const char *password, unsigned int result_len)
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen /* hex-encoded */
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen buf = buffer_create_static_hard(pool_datastack_create(),
1d2b188f0eedc3cab6e27ceac5425a037f38042eTimo Sirainen /* base64-encoded */
939a0d82523538b2de38a02bc9f790a67b7ebf47Timo Sirainen buf = buffer_create_static_hard(pool_datastack_create(),
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen if (base64_decode(password, len, NULL, buf) < 0)
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen return buf->used != result_len ? NULL : buf->data;
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic bool sha1_verify(const char *plaintext, const char *password,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen sha1_get_digest(plaintext, strlen(plaintext), sha1_digest);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen data = password_decode(password, SHA1_RESULTLEN);
1d2b188f0eedc3cab6e27ceac5425a037f38042eTimo Sirainen i_error("sha1_verify(%s): Invalid password encoding", user);
939a0d82523538b2de38a02bc9f790a67b7ebf47Timo Sirainen return memcmp(sha1_digest, data, SHA1_RESULTLEN) == 0;
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *ssha_generate(const char *plaintext,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen unsigned char *salt = &ssha_digest[SHA1_RESULTLEN];
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen sha1_loop(&ctx, plaintext, strlen(plaintext));
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(ssha_digest))+1);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen base64_encode(ssha_digest, sizeof(ssha_digest), str);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic bool ssha_verify(const char *plaintext, const char *password,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen /* format: base64-encoded MD5 hash and salt */
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen buf = buffer_create_static_hard(pool_datastack_create(),
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen if (base64_decode(password, password_len, NULL, buf) < 0) {
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen i_error("ssha_verify(%s): failed decoding SSHA base64", user);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen i_error("ssha_verify(%s): invalid SSHA base64 decode", user);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen sha1_loop(&ctx, plaintext, strlen(plaintext));
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen sha1_loop(&ctx, &data[SHA1_RESULTLEN], size-SHA1_RESULTLEN);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen return memcmp(sha1_digest, data, SHA1_RESULTLEN) == 0;
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *smd5_generate(const char *plaintext,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen unsigned char *salt = &smd5_digest[MD5_RESULTLEN];
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen md5_update(&ctx, plaintext, strlen(plaintext));
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(smd5_digest))+1);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen base64_encode(smd5_digest, sizeof(smd5_digest), str);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic bool smd5_verify(const char *plaintext, const char *password,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen /* format: base64-encoded MD5 hash and salt */
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen buf = buffer_create_static_hard(pool_datastack_create(),
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen if (base64_decode(password, password_len, NULL, buf) < 0) {
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen i_error("smd5_verify(%s): failed decoding SMD5 base64", user);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen i_error("smd5_verify(%s): invalid SMD5 base64 decode", user);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen md5_update(&ctx, plaintext, strlen(plaintext));
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen md5_update(&ctx, &data[MD5_RESULTLEN], size-MD5_RESULTLEN);
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen return memcmp(md5_digest, data, MD5_RESULTLEN) == 0;
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic bool plain_verify(const char *plaintext, const char *password,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *plain_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool hmac_md5_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen return strcmp(password_generate_cram_md5(plaintext), password) == 0;
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char *hmac_md5_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool digest_md5_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen /* user:realm:passwd */
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen str = t_strconcat(t_strcut(user, '@'), ":", realm, ":",
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char *digest_md5_generate(const char *plaintext, const char *user)
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen i_fatal("digest_md5_generate(): username not given");
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen /* user:realm:passwd */
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen str = t_strconcat(t_strcut(user, '@'), ":", realm, ":",
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool plain_md4_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen md4_get_digest(plaintext, strlen(plaintext), digest);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen data = password_decode(password, MD4_RESULTLEN);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen i_error("plain_md4_verify(%s): Invalid password encoding",
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen return memcmp(digest, data, MD4_RESULTLEN) == 0;
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char *plain_md4_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen md4_get_digest(plaintext, strlen(plaintext), digest);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool plain_md5_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen md5_get_digest(plaintext, strlen(plaintext), digest);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen data = password_decode(password, MD5_RESULTLEN);
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen i_error("plain_md5_verify(%s): Invalid password encoding",
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen return memcmp(digest, data, MD5_RESULTLEN) == 0;
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainenstatic const char *plain_md5_generate(const char *plaintext,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen md5_get_digest(plaintext, strlen(plaintext), digest);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char *ldap_md5_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen md5_get_digest(plaintext, strlen(plaintext), digest);
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen str = t_str_new(MAX_BASE64_ENCODED_SIZE(sizeof(digest)+1));
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool lm_verify(const char *plaintext, const char *password,
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen return strcasecmp(password, password_generate_lm(plaintext)) == 0;
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainenstatic const char *lm_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool ntlm_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen return strcasecmp(password, password_generate_ntlm(plaintext)) == 0;
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const char *ntlm_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic bool rpa_verify(const char *plaintext, const char *password,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen return strcasecmp(password, password_generate_rpa(plaintext)) == 0;
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainenstatic const char *rpa_generate(const char *plaintext,
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainenstatic const struct password_scheme default_schemes[] = {
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen { "CLEARTEXT", plain_verify, plain_generate },
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen { "HMAC-MD5", hmac_md5_verify, hmac_md5_generate },
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen { "DIGEST-MD5", digest_md5_verify, digest_md5_generate },
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen { "PLAIN-MD4", plain_md4_verify, plain_md4_generate },
24e5e4526d8f5cbc056ab97fd0d154d0936d7a5eTimo Sirainen { "PLAIN-MD5", plain_md5_verify, plain_md5_generate },
4ece61edd7c266a4b8f3b290a7f0a3cb3d13ca0fTimo Sirainen { "LDAP-MD5", plain_md5_verify, ldap_md5_generate },
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen static const struct password_scheme null_scheme = { NULL, NULL, NULL };
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen const struct password_scheme *s;
e3736b5d480878031c386ac55d201fcf08e68766Timo Sirainen schemes_buf = buffer_create_dynamic(default_pool, 128);
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen for (s = default_schemes; s->name != NULL; s++)
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen scheme_modules = module_dir_load(AUTH_MODULE_DIR"/password",
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen for (mod = scheme_modules; mod != NULL; mod = mod->next) {
dee43975a70bcdb9dc83d34d6a2b177d37bb7194Timo Sirainen symbol = t_strconcat(mod->name, "_scheme", NULL);