1 /*-
2 * Copyright (c) 2005-2008 Daniel Braniss <danny@cs.huji.ac.il>
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 *
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24 * SUCH DAMAGE.
25 *
26 */
27
28 /*
29 | $Id: auth_subr.c,v 2.2 2007/06/01 08:09:37 danny Exp $
30 */
31
32 #include <sys/param.h>
33 #include <sys/types.h>
34 #include <sys/socket.h>
35 #include <sys/sysctl.h>
36
37 #include <netinet/in.h>
38 #include <netinet/tcp.h>
39 #include <arpa/inet.h>
40 #include <unistd.h>
41 #include <stdlib.h>
42 #include <stdio.h>
43 #include <string.h>
44 #include <fcntl.h>
45
46 #include <openssl/md5.h>
47 #include <openssl/sha.h>
48
49 #include "iscsi.h"
50 #include "iscontrol.h"
51
52 static int
chapMD5(char id,char * cp,char * chapSecret,unsigned char * digest)53 chapMD5(char id, char *cp, char *chapSecret, unsigned char *digest)
54 {
55 MD5_CTX ctx;
56 char *tmp;
57 int len;
58
59 debug_called(3);
60
61 MD5_Init(&ctx);
62
63 MD5_Update(&ctx, &id, 1);
64
65 if((len = str2bin(chapSecret, &tmp)) == 0) {
66 // print error
67 return -1;
68 }
69 MD5_Update(&ctx, tmp, len);
70 free(tmp);
71
72 if((len = str2bin(cp, &tmp)) == 0) {
73 // print error
74 return -1;
75 }
76 MD5_Update(&ctx, tmp, len);
77 free(tmp);
78
79 MD5_Final(digest, &ctx);
80
81
82 return 0;
83 }
84
85 static int
chapSHA1(char id,char * cp,char * chapSecret,unsigned char * digest)86 chapSHA1(char id, char *cp, char *chapSecret, unsigned char *digest)
87 {
88 SHA_CTX ctx;
89 char *tmp;
90 int len;
91
92 debug_called(3);
93
94 SHA1_Init(&ctx);
95
96 SHA1_Update(&ctx, &id, 1);
97
98 if((len = str2bin(chapSecret, &tmp)) == 0) {
99 // print error
100 return -1;
101 }
102 SHA1_Update(&ctx, tmp, len);
103 free(tmp);
104
105 if((len = str2bin(cp, &tmp)) == 0) {
106 // print error
107 return -1;
108 }
109 SHA1_Update(&ctx, tmp, len);
110 free(tmp);
111
112 SHA1_Final(digest, &ctx);
113
114 return 0;
115
116 }
117 /*
118 | the input text format can be anything that the rfc3270 defines
119 | (see section 5.1 and str2bin)
120 | digest length for md5 is 128bits, and for sha1 is 160bits.
121 | digest is an ASCII string which represents the bits in
122 | hexadecimal or base64 according to the challenge(cp) format
123 */
124 char *
chapDigest(char * ap,char id,char * cp,char * chapSecret)125 chapDigest(char *ap, char id, char *cp, char *chapSecret)
126 {
127 int len;
128 unsigned char digest[20];
129 char encoding[3];
130
131 debug_called(3);
132
133 len = 0;
134 if(strcmp(ap, "5") == 0 && chapMD5(id, cp, chapSecret, digest) == 0)
135 len = 16;
136 else
137 if(strcmp(ap, "7") == 0 && chapSHA1(id, cp, chapSecret, digest) == 0)
138 len = 20;
139
140 if(len) {
141 sprintf(encoding, "%.2s", cp);
142 return bin2str(encoding, digest, len);
143 }
144
145 return NULL;
146 }
147
148 char *
genChapChallenge(char * encoding,size_t len)149 genChapChallenge(char *encoding, size_t len)
150 {
151 int fd;
152 unsigned char tmp[1024];
153
154 if(len > sizeof(tmp))
155 return NULL;
156
157 if((fd = open("/dev/random", O_RDONLY)) != -1) {
158 read(fd, tmp, len);
159 close(fd);
160 return bin2str(encoding, tmp, len);
161 }
162 perror("/dev/random");
163 // make up something ...
164 return NULL;
165 }
166
167 #ifdef TEST_AUTH
168 static void
puke(char * str,unsigned char * dg,int len)169 puke(char *str, unsigned char *dg, int len)
170 {
171 printf("%3d] %s\n 0x", len, str);
172 while(len-- > 0)
173 printf("%02x", *dg++);
174 printf("\n");
175 }
176
main(int cc,char ** vv)177 main(int cc, char **vv)
178 {
179 char *p, *ap, *ip, *cp, *chapSecret, *digest;
180 int len;
181
182 #if 0
183 ap = "5";
184 chapSecret = "0xa5aff013dd839b1edd31ee73a1df0b1b";
185 // chapSecret = "abcdefghijklmnop";
186 len = str2bin(chapSecret, &cp);
187 puke(chapSecret, cp, len);
188
189 ip = "238";
190 cp = "0xbd456029";
191
192
193 if((digest = chapDigest(ap, ip, cp, chapSecret)) != NULL) {
194 len = str2bin(digest, &cp);
195 puke(digest, cp, len);
196 }
197 #else
198 printf("%d] %s\n", 24, genChallenge("0X", 24));
199 #endif
200 }
201 #endif
202