mirror of
https://git.openldap.org/openldap/openldap.git
synced 2025-02-05 13:40:08 +08:00
142 lines
4.6 KiB
C
142 lines
4.6 KiB
C
/* $OpenLDAP$ */
|
|
#include <lber.h>
|
|
#include <lber_pvt.h> // Required for BER_BVC
|
|
#include <ac/string.h> // Required for BER_BVC dep
|
|
#include "lutil.h"
|
|
#include <stdint.h>
|
|
#include <string.h> /* memcpy()/memset() or bcopy()/bzero() */
|
|
#include <assert.h> /* assert() */
|
|
#include "sha2.h"
|
|
|
|
#ifdef SLAPD_SHA2_DEBUG
|
|
#include <stdio.h>
|
|
#endif
|
|
|
|
char * sha256_hex_hash(const char * passwd) {
|
|
|
|
SHA256_CTX ct;
|
|
unsigned char hash[SHA256_DIGEST_LENGTH];
|
|
static char real_hash[LUTIL_BASE64_ENCODE_LEN(SHA256_DIGEST_LENGTH)+1]; // extra char for \0
|
|
|
|
SHA256_Init(&ct);
|
|
SHA256_Update(&ct, (const uint8_t*)passwd, strlen(passwd));
|
|
SHA256_Final(hash, &ct);
|
|
|
|
/* base64 encode it */
|
|
lutil_b64_ntop(
|
|
hash,
|
|
SHA256_DIGEST_LENGTH,
|
|
real_hash,
|
|
LUTIL_BASE64_ENCODE_LEN(SHA256_DIGEST_LENGTH)+1
|
|
);
|
|
|
|
return real_hash;
|
|
}
|
|
|
|
|
|
char * sha384_hex_hash(const char * passwd) {
|
|
|
|
SHA384_CTX ct;
|
|
unsigned char hash[SHA384_DIGEST_LENGTH];
|
|
static char real_hash[LUTIL_BASE64_ENCODE_LEN(SHA384_DIGEST_LENGTH)+1]; // extra char for \0
|
|
|
|
SHA384_Init(&ct);
|
|
SHA384_Update(&ct, (const uint8_t*)passwd, strlen(passwd));
|
|
SHA384_Final(hash, &ct);
|
|
|
|
/* base64 encode it */
|
|
lutil_b64_ntop(
|
|
hash,
|
|
SHA384_DIGEST_LENGTH,
|
|
real_hash,
|
|
LUTIL_BASE64_ENCODE_LEN(SHA384_DIGEST_LENGTH)+1
|
|
);
|
|
|
|
return real_hash;
|
|
}
|
|
|
|
char * sha512_hex_hash(const char * passwd) {
|
|
|
|
SHA512_CTX ct;
|
|
unsigned char hash[SHA512_DIGEST_LENGTH];
|
|
static char real_hash[LUTIL_BASE64_ENCODE_LEN(SHA512_DIGEST_LENGTH)+1]; // extra char for \0
|
|
|
|
SHA512_Init(&ct);
|
|
SHA512_Update(&ct, (const uint8_t*)passwd, strlen(passwd));
|
|
SHA512_Final(hash, &ct);
|
|
|
|
/* base64 encode it */
|
|
lutil_b64_ntop(
|
|
hash,
|
|
SHA512_DIGEST_LENGTH,
|
|
real_hash,
|
|
LUTIL_BASE64_ENCODE_LEN(SHA512_DIGEST_LENGTH)+1
|
|
);
|
|
|
|
return real_hash;
|
|
}
|
|
|
|
static int chk_sha256(
|
|
const struct berval *scheme, // Scheme of hashed reference password
|
|
const struct berval *passwd, // Hashed reference password to check against
|
|
const struct berval *cred, // user-supplied password to check
|
|
const char **text )
|
|
{
|
|
#ifdef SLAPD_SHA2_DEBUG
|
|
fprintf(stderr, "Validating password\n");
|
|
fprintf(stderr, " Password to validate: %s\n", cred->bv_val);
|
|
fprintf(stderr, " Hashes to: %s\n", sha256_hex_hash(cred->bv_val));
|
|
fprintf(stderr, " Stored password scheme: %s\n", scheme->bv_val);
|
|
fprintf(stderr, " Stored password value: %s\n", passwd->bv_val);
|
|
fprintf(stderr, " -> Passwords %s\n", strcmp(sha256_hex_hash(cred->bv_val), passwd->bv_val) == 0 ? "match" : "do not match");
|
|
#endif
|
|
return (strcmp(sha256_hex_hash(cred->bv_val), passwd->bv_val));
|
|
}
|
|
|
|
static int chk_sha384(
|
|
const struct berval *scheme, // Scheme of hashed reference password
|
|
const struct berval *passwd, // Hashed reference password to check against
|
|
const struct berval *cred, // user-supplied password to check
|
|
const char **text )
|
|
{
|
|
#ifdef SLAPD_SHA2_DEBUG
|
|
fprintf(stderr, "Validating password\n");
|
|
fprintf(stderr, " Password to validate: %s\n", cred->bv_val);
|
|
fprintf(stderr, " Hashes to: %s\n", sha384_hex_hash(cred->bv_val));
|
|
fprintf(stderr, " Stored password scheme: %s\n", scheme->bv_val);
|
|
fprintf(stderr, " Stored password value: %s\n", passwd->bv_val);
|
|
fprintf(stderr, " -> Passwords %s\n", strcmp(sha384_hex_hash(cred->bv_val), passwd->bv_val) == 0 ? "match" : "do not match");
|
|
#endif
|
|
return (strcmp(sha384_hex_hash(cred->bv_val), passwd->bv_val));
|
|
}
|
|
|
|
static int chk_sha512(
|
|
const struct berval *scheme, // Scheme of hashed reference password
|
|
const struct berval *passwd, // Hashed reference password to check against
|
|
const struct berval *cred, // user-supplied password to check
|
|
const char **text )
|
|
{
|
|
#ifdef SLAPD_SHA2_DEBUG
|
|
fprintf(stderr, " Password to validate: %s\n", cred->bv_val);
|
|
fprintf(stderr, " Hashes to: %s\n", sha512_hex_hash(cred->bv_val));
|
|
fprintf(stderr, " Stored password scheme: %s\n", scheme->bv_val);
|
|
fprintf(stderr, " Stored password value: %s\n", passwd->bv_val);
|
|
fprintf(stderr, " -> Passwords %s\n", strcmp(sha512_hex_hash(cred->bv_val), passwd->bv_val) == 0 ? "match" : "do not match");
|
|
#endif
|
|
return (strcmp(sha512_hex_hash(cred->bv_val), passwd->bv_val));
|
|
}
|
|
|
|
const struct berval sha256scheme = BER_BVC("{SHA256}");
|
|
const struct berval sha384scheme = BER_BVC("{SHA384}");
|
|
const struct berval sha512scheme = BER_BVC("{SHA512}");
|
|
|
|
int init_module(int argc, char *argv[]) {
|
|
int result = 0;
|
|
result = lutil_passwd_add( (struct berval *)&sha256scheme, chk_sha256, NULL );
|
|
if (result != 0) return result;
|
|
result = lutil_passwd_add( (struct berval *)&sha384scheme, chk_sha384, NULL );
|
|
if (result != 0) return result;
|
|
result = lutil_passwd_add( (struct berval *)&sha512scheme, chk_sha512, NULL );
|
|
return result;
|
|
}
|