[BACK]Return to radius_userpass.c CVS log [TXT][DIR] Up to [local] / src / lib / libradius

File: [local] / src / lib / libradius / radius_userpass.c (download)

Revision 1.2, Sat Jul 8 08:53:26 2023 UTC (11 months ago) by yasuoka
Branch: MAIN
CVS Tags: OPENBSD_7_5_BASE, OPENBSD_7_5, OPENBSD_7_4_BASE, OPENBSD_7_4, HEAD
Changes since 1.1: +1 -7 lines

Tidy up #include lines.

/*	$OpenBSD: radius_userpass.c,v 1.2 2023/07/08 08:53:26 yasuoka Exp $ */

/*-
 * Copyright (c) 2013 Internet Initiative Japan Inc.
 * All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions
 * are met:
 * 1. Redistributions of source code must retain the above copyright
 *    notice, this list of conditions and the following disclaimer.
 * 2. Redistributions in binary form must reproduce the above copyright
 *    notice, this list of conditions and the following disclaimer in the
 *    documentation and/or other materials provided with the distribution.
 *
 * THIS SOFTWARE IS PROVIDED BY THE"AUTHOR" AND CONTRIBUTORS AS IS'' AND
 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
 * SUCH DAMAGE.
 */

#include <stdio.h>
#include <string.h>

#include <openssl/md5.h>

#include "radius.h"

#include "radius_local.h"

int
radius_encrypt_user_password_attr(void *cipher, size_t * clen,
    const char *plain, const void *ra, const char *secret)
{
	size_t		 plen = strlen(plain);
	size_t		 slen = strlen(secret);
	char		 b[16], p[16], *c;
	size_t		 off;
	MD5_CTX		 ctx;
	unsigned int	 i;

	if (*clen < ROUNDUP(plen, 16))
		return (-1);

	for (off = 0; off < plen; off += sizeof(p)) {
		c = ((char *)cipher) + off;
		memset(p, 0, sizeof(p));
		strncpy(p, plain + off, sizeof(p));	/* not strlcpy() */
		MD5_Init(&ctx);
		MD5_Update(&ctx, secret, slen);
		if (off == 0)
			MD5_Update(&ctx, ra, 16);
		else
			MD5_Update(&ctx, c - 16, 16);
		MD5_Final(b, &ctx);
		for (i = 0; i < 16; i++)
			c[i] = p[i] ^ b[i];
	}

	*clen = off;
	return (0);
}

int
radius_decrypt_user_password_attr(char *plain, size_t plen, const void *cipher,
    size_t clen, const void *ra, const char *secret)
{
	size_t slen = strlen(secret);
	char b[16];
	size_t off;
	char *p, *c;
	MD5_CTX ctx;
	unsigned int i;

	if (clen % 16 != 0)
		return (-1);
	if (plen < clen + 1)
		return (-1);

	for (off = 0; off < clen; off += 16) {
		c = ((char *)cipher) + off;
		p = plain + off;
		MD5_Init(&ctx);
		MD5_Update(&ctx, secret, slen);
		if (off == 0)
			MD5_Update(&ctx, ra, 16);
		else
			MD5_Update(&ctx, c - 16, 16);
		MD5_Final(b, &ctx);
		for (i = 0; i < 16; i++)
			p[i] = c[i] ^ b[i];
	}

	p = memchr(plain, '\0', off);
	if (p == NULL)
		plain[off] = '\0';
	else {
		/* memcspn() does not exist... */
		for (p++; p < plain + off; p++) {
			if (*p != '\0')
				return (-1);
		}
	}

	return (0);
}

int
radius_get_user_password_attr(const RADIUS_PACKET * packet, char *buf,
    size_t len, const char *secret)
{
	char	 cipher[256];
	size_t	 clen = sizeof(cipher);

	if (radius_get_raw_attr(packet, RADIUS_TYPE_USER_PASSWORD, cipher,
	    &clen) != 0)
		return (-1);
	if (radius_decrypt_user_password_attr(buf, len, cipher, clen,
	    radius_get_authenticator_retval(packet), secret) != 0)
		return (-1);

	return (0);
}

int
radius_put_user_password_attr(RADIUS_PACKET * packet, const char *buf,
    const char *secret)
{
	char	 cipher[256];
	size_t	 clen = sizeof(cipher);

	if (radius_encrypt_user_password_attr(cipher, &clen, buf,
	    radius_get_authenticator_retval(packet), secret) != 0)
		return (-1);
	if (radius_put_raw_attr(packet, RADIUS_TYPE_USER_PASSWORD, cipher,
	    clen) != 0)
		return (-1);

	return (0);
}