openldap/libraries/liblutil/passwd.c

151 lines
3.6 KiB
C
Raw Normal View History

1998-11-07 06:04:14 +08:00
/*
* lutil_password(credentials, password)
*
* Returns true if user supplied credentials matches
* the stored password.
*
* Due to the use of the crypt(3) function
* this routine is NOT thread-safe.
*/
#include "portable.h"
#include <stdlib.h>
1998-11-07 06:04:14 +08:00
#include <ac/string.h>
#include <ac/unistd.h>
#include "lutil_md5.h"
#include "lutil_sha1.h"
#include "lutil.h"
/*
* Return 0 if creds are good.
1998-11-07 06:04:14 +08:00
*/
int
lutil_passwd(
const char *cred,
const char *passwd)
{
if (cred == NULL || passwd == NULL) {
return -1;
1998-11-07 06:04:14 +08:00
}
if (strncasecmp(passwd, "{MD5}", sizeof("{MD5}") - 1) == 0 ) {
lutil_MD5_CTX MD5context;
unsigned char MD5digest[16];
char base64digest[25]; /* ceiling(sizeof(input)/3) * 4 + 1 */
1998-11-07 06:04:14 +08:00
const char *p = passwd + (sizeof("{MD5}") - 1);
lutil_MD5Init(&MD5context);
lutil_MD5Update(&MD5context,
1998-11-23 09:46:32 +08:00
(const unsigned char *)cred, strlen(cred));
lutil_MD5Final(MD5digest, &MD5context);
1998-11-07 06:04:14 +08:00
if ( lutil_b64_ntop(MD5digest, sizeof(MD5digest),
1998-11-07 06:04:14 +08:00
base64digest, sizeof(base64digest)) < 0)
{
return ( 1 );
}
return( strcmp(p, base64digest) );
1998-11-07 06:04:14 +08:00
} else if (strncasecmp(passwd, "{SHA}",sizeof("{SHA}") - 1) == 0 ) {
lutil_SHA1_CTX SHA1context;
1998-11-07 06:04:14 +08:00
unsigned char SHA1digest[20];
char base64digest[29]; /* ceiling(sizeof(input)/3) * 4 + 1 */
const char *p = passwd + (sizeof("{SHA}") - 1);
lutil_SHA1Init(&SHA1context);
lutil_SHA1Update(&SHA1context,
1998-11-23 09:46:32 +08:00
(const unsigned char *) cred, strlen(cred));
lutil_SHA1Final(SHA1digest, &SHA1context);
1998-11-07 06:04:14 +08:00
if (lutil_b64_ntop(SHA1digest, sizeof(SHA1digest),
1998-11-07 06:04:14 +08:00
base64digest, sizeof(base64digest)) < 0)
{
return ( 1 );
1998-11-07 06:04:14 +08:00
}
return( strcmp(p, base64digest) );
} else if (strncasecmp(passwd, "{SSHA}", sizeof("{SSHA}") - 1) == 0) {
lutil_SHA1_CTX SHA1context;
unsigned char SHA1digest[20];
const char *p = passwd + (sizeof("{SSHA}") - 1);
int pw_len = strlen(p);
int rc;
unsigned char *orig_pass = NULL;
/* base64 un-encode password */
orig_pass = (unsigned char *)malloc((size_t)(pw_len * 0.75 + 1));
if ((rc = lutil_b64_pton(p, orig_pass, pw_len)) < 0)
{
free(orig_pass);
return ( 1 );
}
/* hash credentials with salt */
lutil_SHA1Init(&SHA1context);
lutil_SHA1Update(&SHA1context,
(const unsigned char *) cred, strlen(cred));
lutil_SHA1Update(&SHA1context,
(const unsigned char *) orig_pass + sizeof(SHA1digest),
rc - sizeof(SHA1digest));
lutil_SHA1Final(SHA1digest, &SHA1context);
/* compare */
rc = strncmp((char *)orig_pass, (char *)SHA1digest, sizeof(SHA1digest));
free(orig_pass);
return(rc);
} else if (strncasecmp(passwd, "{SMD5}", sizeof("{SMD5}") - 1) == 0) {
lutil_MD5_CTX MD5context;
unsigned char MD5digest[16];
const char *p = passwd + (sizeof("{SMD5}") - 1);
int pw_len = strlen(p);
int rc;
unsigned char *orig_pass = NULL;
/* base64 un-encode password */
orig_pass = (unsigned char *)malloc((size_t)(pw_len * 0.75 + 1));
if ((rc = lutil_b64_pton(p, orig_pass, pw_len)) < 0)
{
free(orig_pass);
return ( 1 );
}
/* hash credentials with salt */
lutil_MD5Init(&MD5context);
lutil_MD5Update(&MD5context,
(const unsigned char *) cred, strlen(cred));
lutil_MD5Update(&MD5context,
(const unsigned char *) orig_pass + sizeof(MD5digest),
rc - sizeof(MD5digest));
lutil_MD5Final(MD5digest, &MD5context);
/* compare */
rc = strncmp((char *)orig_pass, (char *)MD5digest, sizeof(MD5digest));
free(orig_pass);
return ( rc );
#ifdef SLAPD_CRYPT
} else if (strncasecmp(passwd, "{CRYPT}", sizeof("{CRYPT}") - 1) == 0 ) {
const char *p = passwd + (sizeof("{CRYPT}") - 1);
return( strcmp(p, crypt(cred, p)) );
#endif
1998-11-07 06:04:14 +08:00
}
#ifdef SLAPD_CLEARTEXT
return( strcmp(passwd, cred) );
#else
return( 1 );
#endif
1998-11-07 06:04:14 +08:00
}