>From 2d5e6350805f81d19ce086e779f5712c3e9228ef Mon Sep 17 00:00:00 2001
From: Nathan Kinder <[email protected]>
Date: Mon, 26 Oct 2009 13:08:31 -0700
Subject: [PATCH] BZ 221905 - Add SMD5 password storage support.

This adds SMD5 password storage support to the existing password
storage plug-in.  Add upgrade LDIF has been added to ensure that
this new functionality will be available to servers that are
upgraded from previous versions.
---
 Makefile.am                                        |    3 +
 ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif |    8 +
 ldap/ldif/template-dse.ldif.in                     |    9 +
 ldap/servers/plugins/pwdstorage/pwd_init.c         |   26 +++
 ldap/servers/plugins/pwdstorage/pwd_util.c         |   69 ++++++++
 ldap/servers/plugins/pwdstorage/pwdstorage.h       |    7 +
 ldap/servers/plugins/pwdstorage/sha_pwd.c          |   24 +---
 ldap/servers/plugins/pwdstorage/smd5_pwd.c         |  168 ++++++++++++++++++++
 ldap/servers/plugins/pwdstorage/ssha_pwd.c         |   17 +--
 9 files changed, 292 insertions(+), 39 deletions(-)
 create mode 100644 ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
 create mode 100644 ldap/servers/plugins/pwdstorage/pwd_util.c
 create mode 100644 ldap/servers/plugins/pwdstorage/smd5_pwd.c

diff --git a/Makefile.am b/Makefile.am
index c34e6fe..676b5cf 100644
--- a/Makefile.am
+++ b/Makefile.am
@@ -418,6 +418,7 @@ update_DATA = ldap/admin/src/scripts/exampleupdate.pl \
        ldap/admin/src/scripts/50guidesyntaxplugin.ldif \
        ldap/admin/src/scripts/50linkedattrsplugin.ldif \
        ldap/admin/src/scripts/50usnplugin.ldif \
+       ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif \
        ldap/admin/src/scripts/60upgradeschemafiles.pl \
        ldap/admin/src/scripts/dnaplugindepends.ldif
 
@@ -902,7 +903,9 @@ libpwdstorage_plugin_la_SOURCES = 
ldap/servers/plugins/pwdstorage/clear_pwd.c \
        ldap/servers/plugins/pwdstorage/md5c.c \
        ldap/servers/plugins/pwdstorage/ns-mta-md5_pwd.c \
        ldap/servers/plugins/pwdstorage/pwd_init.c \
+       ldap/servers/plugins/pwdstorage/pwd_util.c \
        ldap/servers/plugins/pwdstorage/sha_pwd.c \
+       ldap/servers/plugins/pwdstorage/smd5_pwd.c \
        ldap/servers/plugins/pwdstorage/ssha_pwd.c
 
 libpwdstorage_plugin_la_CPPFLAGS = $(PLUGIN_CPPFLAGS)
diff --git a/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif 
b/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
new file mode 100644
index 0000000..5375c9f
--- /dev/null
+++ b/ldap/admin/src/scripts/50smd5pwdstorageplugin.ldif
@@ -0,0 +1,8 @@
+dn: cn=SMD5,cn=Password Storage Schemes,cn=plugins,cn=config
+objectclass: top
+objectclass: nsSlapdPlugin
+cn: SMD5
+nsslapd-pluginpath: libpwdstorage-plugin
+nsslapd-plugininitfunc: smd5_pwd_storage_scheme_init
+nsslapd-plugintype: pwdstoragescheme
+nsslapd-pluginenabled: on
diff --git a/ldap/ldif/template-dse.ldif.in b/ldap/ldif/template-dse.ldif.in
index 72708a0..7bcb48a 100644
--- a/ldap/ldif/template-dse.ldif.in
+++ b/ldap/ldif/template-dse.ldif.in
@@ -155,6 +155,15 @@ nsslapd-plugininitfunc: md5_pwd_storage_scheme_init
 nsslapd-plugintype: pwdstoragescheme
 nsslapd-pluginenabled: on
 
+dn: cn=SMD5,cn=Password Storage Schemes,cn=plugins,cn=config
+objectclass: top
+objectclass: nsSlapdPlugin
+cn: SMD5
+nsslapd-pluginpath: libpwdstorage-plugin
+nsslapd-plugininitfunc: smd5_pwd_storage_scheme_init
+nsslapd-plugintype: pwdstoragescheme
+nsslapd-pluginenabled: on
+
 dn: cn=CLEAR,cn=Password Storage Schemes,cn=plugins,cn=config
 objectclass: top
 objectclass: nsSlapdPlugin
diff --git a/ldap/servers/plugins/pwdstorage/pwd_init.c 
b/ldap/servers/plugins/pwdstorage/pwd_init.c
index 6ae2669..1bd24fd 100644
--- a/ldap/servers/plugins/pwdstorage/pwd_init.c
+++ b/ldap/servers/plugins/pwdstorage/pwd_init.c
@@ -73,6 +73,8 @@ static Slapi_PluginDesc ns_mta_md5_pdesc = { 
"NS-MTA-MD5-password-storage-scheme
 
 static Slapi_PluginDesc md5_pdesc = { "md5-password-storage-scheme", VENDOR, 
PACKAGE_VERSION, "MD5 hash algorithm (MD5)" };
 
+static Slapi_PluginDesc smd5_pdesc = { "smd5-password-storage-scheme", VENDOR, 
PACKAGE_VERSION, "Salted MD5 hash algorithm (SMD5)" };
+
 static char *plugin_name = "NSPwdStoragePlugin";
 
 int
@@ -369,3 +371,27 @@ md5_pwd_storage_scheme_init( Slapi_PBlock *pb )
        slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "<= 
md5_pwd_storage_scheme_init %d\n\n", rc );
        return( rc );
 }
+
+int
+smd5_pwd_storage_scheme_init( Slapi_PBlock *pb )
+{
+       int     rc;
+       char *name;
+
+       slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "=> 
smd5_pwd_storage_scheme_init\n" );
+
+       rc = slapi_pblock_set( pb, SLAPI_PLUGIN_VERSION,
+                                                       (void *) 
SLAPI_PLUGIN_VERSION_01 );
+       rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_DESCRIPTION,
+                                                       (void *)&smd5_pdesc );
+       rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_ENC_FN,
+                                                       (void *) smd5_pw_enc );
+       rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_CMP_FN,
+                                                       (void *) smd5_pw_cmp );
+       name = slapi_ch_strdup("SMD5");
+       rc |= slapi_pblock_set( pb, SLAPI_PLUGIN_PWD_STORAGE_SCHEME_NAME,
+                                                       name );
+
+       slapi_log_error( SLAPI_LOG_PLUGIN, plugin_name, "<= 
smd5_pwd_storage_scheme_init %d\n\n", rc );
+       return( rc );
+}
diff --git a/ldap/servers/plugins/pwdstorage/pwd_util.c 
b/ldap/servers/plugins/pwdstorage/pwd_util.c
new file mode 100644
index 0000000..c7b4fda
--- /dev/null
+++ b/ldap/servers/plugins/pwdstorage/pwd_util.c
@@ -0,0 +1,69 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This Program is free software; you can redistribute it and/or modify it 
under
+ * the terms of the GNU General Public License as published by the Free 
Software
+ * Foundation; version 2 of the License.
+ * 
+ * This Program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 
FITNESS
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more 
details.
+ * 
+ * You should have received a copy of the GNU General Public License along with
+ * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
+ * Place, Suite 330, Boston, MA 02111-1307 USA.
+ * 
+ * In addition, as a special exception, Red Hat, Inc. gives You the additional
+ * right to link the code of this Program with code not covered under the GNU
+ * General Public License ("Non-GPL Code") and to distribute linked 
combinations
+ * including the two, subject to the limitations in this paragraph. Non-GPL 
Code
+ * permitted under this exception must only link to the code of this Program
+ * through those well defined interfaces identified in the file named EXCEPTION
+ * found in the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline functions 
from
+ * the Approved Interfaces without causing the resulting work to be covered by
+ * the GNU General Public License. Only Red Hat, Inc. may make changes or
+ * additions to the list of Approved Interfaces. You must obey the GNU General
+ * Public License in all respects for all of the Program code and other code 
used
+ * in conjunction with the Program except the Non-GPL Code covered by this
+ * exception. If you modify this file, you may extend this exception to your
+ * version of the file, but you are not obligated to do so. If you do not wish 
to
+ * provide this exception without modification, you must delete this exception
+ * statement from your version and license this file solely under the GPL 
without
+ * exception. 
+ * 
+ * 
+ * Copyright (C) 2009 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#ifdef HAVE_CONFIG_H
+#  include <config.h>
+#endif
+
+#include <string.h>
+#include "pwdstorage.h"
+
+/*
+ * Utility functions for the Password Storage Scheme plugins.
+ */
+
+/*
+ * calculate the number of bytes the base64 encoded encval
+ * will have when decoded, taking into account padding
+ */
+int
+pwdstorage_base64_decode_len(const char *encval)
+{
+    int len = strlen(encval);
+    if (len && (0 == (len & 3))) {
+        if('=' == encval[len - 1]) {
+            if('=' == encval[len - 2]) {
+                len -= 2;
+            } else {
+                len -= 1;
+            }
+        }
+    }
+
+    return ((len * 3) / 4);
+}
+
diff --git a/ldap/servers/plugins/pwdstorage/pwdstorage.h 
b/ldap/servers/plugins/pwdstorage/pwdstorage.h
index 895ac4e..f43e63e 100644
--- a/ldap/servers/plugins/pwdstorage/pwdstorage.h
+++ b/ldap/servers/plugins/pwdstorage/pwdstorage.h
@@ -80,6 +80,8 @@
 #define CLEARTEXT_NAME_LEN  5
 #define MD5_SCHEME_NAME "MD5"
 #define MD5_NAME_LEN 3
+#define SALTED_MD5_SCHEME_NAME "SMD5"
+#define SALTED_MD5_NAME_LEN 4
 
 SECStatus sha_salted_hash(char *hash_out, const char *pwd, struct berval 
*salt, unsigned int secOID);
 int sha_pw_cmp( const char *userpwd, const char *dbpwd, unsigned int shaLen );
@@ -107,5 +109,10 @@ char *crypt_pw_enc( const char *pwd );
 int ns_mta_md5_pw_cmp( const char *userpwd, const char *dbpwd );
 int md5_pw_cmp( const char *userpwd, const char *dbpwd );
 char *md5_pw_enc( const char *pwd );
+int smd5_pw_cmp( const char *userpwd, const char *dbpwd );
+char *smd5_pw_enc( const char *pwd );
+
+/* Utility functions */
+int pwdstorage_base64_decode_len(const char *encval);
 
 #endif /* _PWDSTORAGE_H */
diff --git a/ldap/servers/plugins/pwdstorage/sha_pwd.c 
b/ldap/servers/plugins/pwdstorage/sha_pwd.c
index ecade7a..d7fb693 100644
--- a/ldap/servers/plugins/pwdstorage/sha_pwd.c
+++ b/ldap/servers/plugins/pwdstorage/sha_pwd.c
@@ -67,28 +67,6 @@ static char *plugin_name = "NSPwdStoragePlugin";
  * It's obsolescent now, but we still handle such stored values.
  */
 
-
-/*
-  calculate the number of bytes the base64 encoded encval
-  will have when decoded, taking into account padding
-*/
-static int
-base64_decode_len(const char *encval)
-{
-    int len = strlen(encval);
-    if (len && (0 == (len & 3))) {
-        if('=' == encval[len - 1]) {
-            if('=' == encval[len - 2]) {
-                len -= 2;
-            } else {
-                len -= 1;
-            }
-        }
-    }
-
-    return ((len * 3) / 4);
-}
-
 int
 sha_pw_cmp (const char *userpwd, const char *dbpwd, unsigned int shaLen )
 {
@@ -132,7 +110,7 @@ sha_pw_cmp (const char *userpwd, const char *dbpwd, 
unsigned int shaLen )
     /*
      * Decode hash stored in database.
      */
-    hash_len = base64_decode_len(dbpwd);
+    hash_len = pwdstorage_base64_decode_len(dbpwd);
     if ( hash_len > sizeof(quick_dbhash) ) { /* get more space: */
         dbhash = (char*) slapi_ch_calloc( hash_len, sizeof(char) );
         if ( dbhash == NULL ) goto loser;
diff --git a/ldap/servers/plugins/pwdstorage/smd5_pwd.c 
b/ldap/servers/plugins/pwdstorage/smd5_pwd.c
new file mode 100644
index 0000000..f7689ed
--- /dev/null
+++ b/ldap/servers/plugins/pwdstorage/smd5_pwd.c
@@ -0,0 +1,168 @@
+/** BEGIN COPYRIGHT BLOCK
+ * This Program is free software; you can redistribute it and/or modify it 
under
+ * the terms of the GNU General Public License as published by the Free 
Software
+ * Foundation; version 2 of the License.
+ * 
+ * This Program is distributed in the hope that it will be useful, but WITHOUT
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 
FITNESS
+ * FOR A PARTICULAR PURPOSE. See the GNU General Public License for more 
details.
+ * 
+ * You should have received a copy of the GNU General Public License along with
+ * this Program; if not, write to the Free Software Foundation, Inc., 59 Temple
+ * Place, Suite 330, Boston, MA 02111-1307 USA.
+ * 
+ * In addition, as a special exception, Red Hat, Inc. gives You the additional
+ * right to link the code of this Program with code not covered under the GNU
+ * General Public License ("Non-GPL Code") and to distribute linked 
combinations
+ * including the two, subject to the limitations in this paragraph. Non-GPL 
Code
+ * permitted under this exception must only link to the code of this Program
+ * through those well defined interfaces identified in the file named EXCEPTION
+ * found in the source code files (the "Approved Interfaces"). The files of
+ * Non-GPL Code may instantiate templates or use macros or inline functions 
from
+ * the Approved Interfaces without causing the resulting work to be covered by
+ * the GNU General Public License. Only Red Hat, Inc. may make changes or
+ * additions to the list of Approved Interfaces. You must obey the GNU General
+ * Public License in all respects for all of the Program code and other code 
used
+ * in conjunction with the Program except the Non-GPL Code covered by this
+ * exception. If you modify this file, you may extend this exception to your
+ * version of the file, but you are not obligated to do so. If you do not wish 
to
+ * provide this exception without modification, you must delete this exception
+ * statement from your version and license this file solely under the GPL 
without
+ * exception. 
+ * 
+ * 
+ * Copyright (C) 2005 Red Hat, Inc.
+ * All rights reserved.
+ * END COPYRIGHT BLOCK **/
+
+#ifdef HAVE_CONFIG_H
+#  include <config.h>
+#endif
+
+/*
+ * Based on MD5 Password Encryption/Comparison routines by David Irving,
+ * Fred Brittain, and Aaron Gagnon --  University of Maine Farmington
+ * Donated to the RedHat Directory Server Project 2005-06-10 
+ */
+
+#include <string.h>
+#include <sys/types.h>
+#include <stdio.h>
+#include <pk11func.h>
+#include <nss.h>
+#include <nssb64.h>
+#include <sechash.h>
+#include "pwdstorage.h"
+
+#define MD5_DEFAULT_SALT_LENGTH 4
+#define MD5_MAX_SALT_LENGTH 16
+#define SALTED_MD5_SUBSYSTEM_NAME "Salted MD5 password hash"
+
+int
+smd5_pw_cmp( const char *userpwd, const char *dbpwd )
+{
+   int rc=-1;
+   PK11Context *ctx=NULL;
+   unsigned int outLen;
+   unsigned char userhash[MD5_LENGTH];
+   int hash_len;
+   unsigned char quick_dbhash[MD5_LENGTH + MD5_DEFAULT_SALT_LENGTH + 1];
+   unsigned char *dbhash = quick_dbhash;
+   struct berval salt;
+   char *hashresult = NULL;
+   SECItem binary_item;
+
+   ctx = PK11_CreateDigestContext(SEC_OID_MD5);
+   if (ctx == NULL) {
+          slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+                                          "Could not create context for digest 
operation for password compare");
+          goto loser;
+   }
+
+   /*
+    * Decode hash stored in database.
+    */
+   hash_len = pwdstorage_base64_decode_len(dbpwd);
+   if ( hash_len >= sizeof(quick_dbhash) ) { /* get more space: */
+      dbhash = (char*) slapi_ch_calloc( hash_len + 1, sizeof(char) );
+      if ( dbhash == NULL ) goto loser;
+   } else {
+      memset( quick_dbhash, 0, sizeof(quick_dbhash) );
+   }
+
+   hashresult = PL_Base64Decode( dbpwd, 0, dbhash );
+   if (NULL == hashresult) {
+      slapi_log_error( SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+            "smd5_pw_cmp: userPassword \"%s\" is the wrong length "
+            "or is not properly encoded BASE64\n", dbpwd );
+      goto loser;
+   }
+
+   salt.bv_val = (void*)(dbhash + MD5_LENGTH); /* salt starts after hash value 
*/
+   salt.bv_len = hash_len - MD5_LENGTH; /* remaining bytes must be salt */
+
+   /* create the hash */
+   memset( userhash, 0, sizeof(userhash) );
+   PK11_DigestBegin(ctx);
+   PK11_DigestOp(ctx, (const unsigned char *)userpwd, strlen(userpwd));
+   PK11_DigestOp(ctx, (unsigned char*)(salt.bv_val), salt.bv_len);
+   PK11_DigestFinal(ctx, userhash, &outLen, sizeof userhash);
+   PK11_DestroyContext(ctx, 1);
+
+   /* Compare everything up to the salt. */
+   rc = memcmp( userhash, dbhash, MD5_LENGTH );
+
+loser:
+   if ( dbhash && dbhash != quick_dbhash ) slapi_ch_free_string( (char 
**)&dbhash );
+   return rc;
+}
+
+char *
+smd5_pw_enc( const char *pwd )
+{
+   char * bver, *enc=NULL;
+   PK11Context *ctx=NULL;
+   unsigned int outLen;
+   unsigned char hash_out[MD5_LENGTH + MD5_DEFAULT_SALT_LENGTH];
+   unsigned char b2a_out[(MD5_LENGTH*2) + (MD5_MAX_SALT_LENGTH*2)]; /* 
conservative */
+   char *salt = hash_out + MD5_LENGTH;
+   struct berval saltval;
+   SECItem binary_item;
+
+   ctx = PK11_CreateDigestContext(SEC_OID_MD5);
+   if (ctx == NULL) {
+          slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+                                          "Could not create context for digest 
operation for password encoding");
+          return NULL;
+   }
+
+   /* prepare the hash output area */
+   memset( hash_out, 0, sizeof(hash_out) );
+
+   /* generate a new random salt */
+   slapi_rand_array( salt, MD5_DEFAULT_SALT_LENGTH );
+   saltval.bv_val = (void*)salt;
+   saltval.bv_len = MD5_DEFAULT_SALT_LENGTH;
+
+   /* create the hash */
+   PK11_DigestBegin(ctx);
+   PK11_DigestOp(ctx, (const unsigned char *)pwd, strlen(pwd));
+   PK11_DigestOp(ctx, (unsigned char*)(saltval.bv_val), saltval.bv_len);
+   PK11_DigestFinal(ctx, hash_out, &outLen, sizeof hash_out);
+   PK11_DestroyContext(ctx, 1);
+
+   /* convert the binary hash to base64 */
+   binary_item.data = hash_out;
+   binary_item.len = outLen + MD5_DEFAULT_SALT_LENGTH;
+   bver = NSSBase64_EncodeItem(NULL, (char *)b2a_out, sizeof b2a_out, 
&binary_item);
+   if (bver) {
+          enc = slapi_ch_smprintf("%c%s%c%s", PWD_HASH_PREFIX_START, 
SALTED_MD5_SCHEME_NAME,
+                                                          PWD_HASH_PREFIX_END, 
bver );
+   } else {
+          slapi_log_error(SLAPI_LOG_PLUGIN, SALTED_MD5_SUBSYSTEM_NAME,
+                                          "Could not base64 encode hashed 
value for password encoding");
+   }
+          
+   return( enc );
+}
+
diff --git a/ldap/servers/plugins/pwdstorage/ssha_pwd.c 
b/ldap/servers/plugins/pwdstorage/ssha_pwd.c
index 6f09d5e..2bd8ef1 100644
--- a/ldap/servers/plugins/pwdstorage/ssha_pwd.c
+++ b/ldap/servers/plugins/pwdstorage/ssha_pwd.c
@@ -58,21 +58,6 @@
 
 #define SHA_SALT_LENGTH    8   /* number of bytes of data in salt */
 
-static void ssha_rand_array(void *randx, size_t len);
-
-
-/* ***************************************************
-       Identical function to slapi_rand_array in util.c, but can't use
-       that here since this module is included in libds_admin, which doesn't
-       link to libslapd.
-   *************************************************** */
-static void
-ssha_rand_array(void *randx, size_t len)
-{
-    PK11_RandomUpdate(randx, len);
-    PK11_GenerateRandom((unsigned char *)randx, (int)len);
-}
-
 SECStatus
 sha_salted_hash(char *hash_out, const char *pwd, struct berval *salt, unsigned 
int secOID)
 {
@@ -168,7 +153,7 @@ salted_sha_pw_enc( const char *pwd, unsigned int shaLen )
     saltval.bv_len = SHA_SALT_LENGTH;
 
     /* generate a new random salt */
-    ssha_rand_array( salt, SHA_SALT_LENGTH );
+    slapi_rand_array( salt, SHA_SALT_LENGTH );
 
     /* hash the user's key */
     if ( sha_salted_hash( hash, pwd, &saltval, secOID ) != SECSuccess ) {
-- 
1.6.2.5

--
389-devel mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/fedora-directory-devel

Reply via email to