src/server/daemon/keyfile_auth.c

Mon, 24 Aug 2020 12:50:16 +0200

author
Olaf Wintermann <olaf.wintermann@gmail.com>
date
Mon, 24 Aug 2020 12:50:16 +0200
branch
config
changeset 255
b5d15a4a19f5
parent 174
8f2a834d1d68
child 261
f2c772336ecd
permissions
-rw-r--r--

refactor configuration loading mechanism

/*
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS HEADER.
 *
 * Copyright 2013 Olaf Wintermann. All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 *   1. Redistributions of source code must retain the above copyright
 *      notice, this list of conditions and the following disclaimer.
 *
 *   2. Redistributions in binary form must reproduce the above copyright
 *      notice, this list of conditions and the following disclaimer in the
 *      documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#include <openssl/sha.h>
#if defined(__sun) && defined(__SunOS_5_10)
#include <sha2.h>
#define SHA256_Init     SHA256Init
#define SHA256_Update   SHA256Update
#define SHA256_Final    SHA256Final
#endif

#include "../util/atomic.h"
#include "../util/util.h"

#include "keyfile_auth.h"

Keyfile* keyfile_new(UcxAllocator *a) {
    Keyfile *keyfile = alcalloc(a, 1, sizeof(Keyfile));
    if(!keyfile) {
        return NULL;
    }
    keyfile->authdb.get_user = keyfile_get_user;
    keyfile->authdb.use_cache = 0;
    keyfile->users = ucx_map_new_a(a, 16);
    return keyfile;
}

int keyfile_add_user(
        Keyfile *keyfile,
        sstr_t name,
        enum KeyfileHashType hash_type,
        sstr_t hash,
        sstr_t *groups,
        size_t ngroups)
{
    UcxAllocator *a = keyfile->users->allocator;
    
    if(hash.length < 12) {
        // hash too short
        // TODO: log
        return -1;
    }
    
    KeyfileUser *user = almalloc(a, sizeof(KeyfileUser));
    user->user.name = sstrdup_a(a, name).ptr;
    user->user.uid = -1;
    user->user.gid = -1;
    user->user.verify_password = keyfile_user_verify_password;
    user->user.check_group = keyfile_user_check_group;
    user->user.free = keyfile_user_free;
    
    user->hash_type = hash_type;
    user->hash = almalloc(a, hash.length + 1);
    
    if(!user->user.name || !user->hash) {
        return -1;
    }
    
    user->hashlen = util_base64decode(hash.ptr, hash.length, user->hash);
    
    if(ngroups > 0) {
        user->groups = alcalloc(a, ngroups, sizeof(sstr_t));
        if(!user->groups) {
            return -1;
        }
        for(int i=0;i<ngroups;i++) {
            user->groups[i] = sstrdup(groups[i]);
        }
        
    } else {
        user->groups = NULL;
    }
    
    // add to keyfile
    return ucx_map_sstr_put(keyfile->users, name, user);
}

// authdb functions

User* keyfile_get_user(AuthDB *db, char *user) {
    Keyfile *keyfile = (Keyfile*)db;
    return ucx_map_cstr_get(keyfile->users, user);
}

int keyfile_user_verify_password(User *user, char *password) {
    KeyfileUser *usr = (KeyfileUser*)user;
    return ssha_verify(usr, password);
}

int keyfile_user_check_group(User *user, char *group) {
    KeyfileUser *usr = (KeyfileUser*)user;
    sstr_t grp = sstr(group);
    for(int i=0;i<usr->numgroups;i++) {
        if(!sstrcmp(usr->groups[i], grp)) {
            return 1;
        }
    }
    return 0;
}

void keyfile_user_free(User *user) {
    // don't free, it will be freed by keyfile_unref
}


int ssha_verify(KeyfileUser *user, char *password) {
    /*
     * SSHA: SHA(pw + salt) + salt
     * user->hash is already base64 decoded
     */
    
    size_t hlen;
    switch(user->hash_type) {
        case KEYFILE_SSHA: hlen = 20; break;
        case KEYFILE_SSHA256: hlen = 32; break;
        case KEYFILE_SSHA512: hlen = 64; break;
    }
    
    char *salt = user->hash + hlen;
    size_t saltlen = user->hashlen - hlen;
    
    size_t pwlen = strlen(password); 
    
    unsigned char pwhash[64];
    switch(user->hash_type) {
        case KEYFILE_SSHA: {
            SHA_CTX ctx;
            SHA1_Init(&ctx);
            SHA1_Update(&ctx, password, pwlen);
            SHA1_Update(&ctx, salt, saltlen);
            SHA1_Final(pwhash, &ctx);
            break;
        }
        case KEYFILE_SSHA256: {
            SHA256_CTX ctx;
            SHA256_Init(&ctx);
            SHA256_Update(&ctx, password, pwlen);
            SHA256_Update(&ctx, salt, saltlen);
            SHA256_Final(pwhash, &ctx);
            break;
        }
        case KEYFILE_SSHA512: {
            SHA512_CTX ctx;
            SHA512_Init(&ctx);
            SHA512_Update(&ctx, password, pwlen);
            SHA512_Update(&ctx, salt, saltlen);
            SHA512_Final(pwhash, &ctx);
            break;
        }
    }
    
    if(!memcmp(user->hash, pwhash, hlen)) {
        return 1;
    } else {
        return 0;
    }
}

mercurial