xref: /minix3/crypto/external/bsd/heimdal/dist/kadmin/random_password.c (revision ebfedea0ce5bbe81e252ddf32d732e40fb633fae)
1*ebfedea0SLionel Sambuc /*	$NetBSD: random_password.c,v 1.1.1.1 2011/04/13 18:14:35 elric Exp $	*/
2*ebfedea0SLionel Sambuc 
3*ebfedea0SLionel Sambuc /*
4*ebfedea0SLionel Sambuc  * Copyright (c) 1998, 1999 Kungliga Tekniska Högskolan
5*ebfedea0SLionel Sambuc  * (Royal Institute of Technology, Stockholm, Sweden).
6*ebfedea0SLionel Sambuc  * All rights reserved.
7*ebfedea0SLionel Sambuc  *
8*ebfedea0SLionel Sambuc  * Redistribution and use in source and binary forms, with or without
9*ebfedea0SLionel Sambuc  * modification, are permitted provided that the following conditions
10*ebfedea0SLionel Sambuc  * are met:
11*ebfedea0SLionel Sambuc  *
12*ebfedea0SLionel Sambuc  * 1. Redistributions of source code must retain the above copyright
13*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer.
14*ebfedea0SLionel Sambuc  *
15*ebfedea0SLionel Sambuc  * 2. Redistributions in binary form must reproduce the above copyright
16*ebfedea0SLionel Sambuc  *    notice, this list of conditions and the following disclaimer in the
17*ebfedea0SLionel Sambuc  *    documentation and/or other materials provided with the distribution.
18*ebfedea0SLionel Sambuc  *
19*ebfedea0SLionel Sambuc  * 3. Neither the name of the Institute nor the names of its contributors
20*ebfedea0SLionel Sambuc  *    may be used to endorse or promote products derived from this software
21*ebfedea0SLionel Sambuc  *    without specific prior written permission.
22*ebfedea0SLionel Sambuc  *
23*ebfedea0SLionel Sambuc  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
24*ebfedea0SLionel Sambuc  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25*ebfedea0SLionel Sambuc  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26*ebfedea0SLionel Sambuc  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
27*ebfedea0SLionel Sambuc  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28*ebfedea0SLionel Sambuc  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29*ebfedea0SLionel Sambuc  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30*ebfedea0SLionel Sambuc  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31*ebfedea0SLionel Sambuc  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32*ebfedea0SLionel Sambuc  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33*ebfedea0SLionel Sambuc  * SUCH DAMAGE.
34*ebfedea0SLionel Sambuc  */
35*ebfedea0SLionel Sambuc 
36*ebfedea0SLionel Sambuc #include "kadmin_locl.h"
37*ebfedea0SLionel Sambuc 
38*ebfedea0SLionel Sambuc /* This file defines some a function that generates a random password,
39*ebfedea0SLionel Sambuc    that can be used when creating a large amount of principals (such
40*ebfedea0SLionel Sambuc    as for a batch of students). Since this is a political matter, you
41*ebfedea0SLionel Sambuc    should think about how secure generated passwords has to be.
42*ebfedea0SLionel Sambuc 
43*ebfedea0SLionel Sambuc    Both methods defined here will give you at least 55 bits of
44*ebfedea0SLionel Sambuc    entropy.
45*ebfedea0SLionel Sambuc    */
46*ebfedea0SLionel Sambuc 
47*ebfedea0SLionel Sambuc /* If you want OTP-style passwords, define OTP_STYLE */
48*ebfedea0SLionel Sambuc 
49*ebfedea0SLionel Sambuc #ifdef OTP_STYLE
50*ebfedea0SLionel Sambuc #include <otp.h>
51*ebfedea0SLionel Sambuc #else
52*ebfedea0SLionel Sambuc static void generate_password(char **pw, int num_classes, ...);
53*ebfedea0SLionel Sambuc #endif
54*ebfedea0SLionel Sambuc 
55*ebfedea0SLionel Sambuc void
random_password(char * pw,size_t len)56*ebfedea0SLionel Sambuc random_password(char *pw, size_t len)
57*ebfedea0SLionel Sambuc {
58*ebfedea0SLionel Sambuc #ifdef OTP_STYLE
59*ebfedea0SLionel Sambuc     {
60*ebfedea0SLionel Sambuc 	OtpKey newkey;
61*ebfedea0SLionel Sambuc 
62*ebfedea0SLionel Sambuc 	krb5_generate_random_block(&newkey, sizeof(newkey));
63*ebfedea0SLionel Sambuc 	otp_print_stddict (newkey, pw, len);
64*ebfedea0SLionel Sambuc 	strlwr(pw);
65*ebfedea0SLionel Sambuc     }
66*ebfedea0SLionel Sambuc #else
67*ebfedea0SLionel Sambuc     char *pass;
68*ebfedea0SLionel Sambuc     generate_password(&pass, 3,
69*ebfedea0SLionel Sambuc 		      "abcdefghijklmnopqrstuvwxyz", 7,
70*ebfedea0SLionel Sambuc 		      "ABCDEFGHIJKLMNOPQRSTUVWXYZ", 2,
71*ebfedea0SLionel Sambuc 		      "@$%&*()-+=:,/<>1234567890", 1);
72*ebfedea0SLionel Sambuc     strlcpy(pw, pass, len);
73*ebfedea0SLionel Sambuc     memset(pass, 0, strlen(pass));
74*ebfedea0SLionel Sambuc     free(pass);
75*ebfedea0SLionel Sambuc #endif
76*ebfedea0SLionel Sambuc }
77*ebfedea0SLionel Sambuc 
78*ebfedea0SLionel Sambuc /* some helper functions */
79*ebfedea0SLionel Sambuc 
80*ebfedea0SLionel Sambuc #ifndef OTP_STYLE
81*ebfedea0SLionel Sambuc /* return a random value in range 0-127 */
82*ebfedea0SLionel Sambuc static int
RND(unsigned char * key,int keylen,int * left)83*ebfedea0SLionel Sambuc RND(unsigned char *key, int keylen, int *left)
84*ebfedea0SLionel Sambuc {
85*ebfedea0SLionel Sambuc     if(*left == 0){
86*ebfedea0SLionel Sambuc 	krb5_generate_random_block(key, keylen);
87*ebfedea0SLionel Sambuc 	*left = keylen;
88*ebfedea0SLionel Sambuc     }
89*ebfedea0SLionel Sambuc     (*left)--;
90*ebfedea0SLionel Sambuc     return ((unsigned char*)key)[*left];
91*ebfedea0SLionel Sambuc }
92*ebfedea0SLionel Sambuc 
93*ebfedea0SLionel Sambuc /* This a helper function that generates a random password with a
94*ebfedea0SLionel Sambuc    number of characters from a set of character classes.
95*ebfedea0SLionel Sambuc 
96*ebfedea0SLionel Sambuc    If there are n classes, and the size of each class is Pi, and the
97*ebfedea0SLionel Sambuc    number of characters from each class is Ni, the number of possible
98*ebfedea0SLionel Sambuc    passwords are (given that the character classes are disjoint):
99*ebfedea0SLionel Sambuc 
100*ebfedea0SLionel Sambuc      n             n
101*ebfedea0SLionel Sambuc    -----        /  ----  \
102*ebfedea0SLionel Sambuc    |   |  Ni    |  \     |
103*ebfedea0SLionel Sambuc    |   | Pi     |   \  Ni| !
104*ebfedea0SLionel Sambuc    |   | ---- * |   /    |
105*ebfedea0SLionel Sambuc    |   | Ni!    |  /___  |
106*ebfedea0SLionel Sambuc     i=1          \  i=1  /
107*ebfedea0SLionel Sambuc 
108*ebfedea0SLionel Sambuc     Since it uses the RND function above, neither the size of each
109*ebfedea0SLionel Sambuc     class, nor the total length of the generated password should be
110*ebfedea0SLionel Sambuc     larger than 127 (without fixing RND).
111*ebfedea0SLionel Sambuc 
112*ebfedea0SLionel Sambuc    */
113*ebfedea0SLionel Sambuc static void
generate_password(char ** pw,int num_classes,...)114*ebfedea0SLionel Sambuc generate_password(char **pw, int num_classes, ...)
115*ebfedea0SLionel Sambuc {
116*ebfedea0SLionel Sambuc     struct {
117*ebfedea0SLionel Sambuc 	const char *str;
118*ebfedea0SLionel Sambuc 	int len;
119*ebfedea0SLionel Sambuc 	int freq;
120*ebfedea0SLionel Sambuc     } *classes;
121*ebfedea0SLionel Sambuc     va_list ap;
122*ebfedea0SLionel Sambuc     int len, i;
123*ebfedea0SLionel Sambuc     unsigned char rbuf[8]; /* random buffer */
124*ebfedea0SLionel Sambuc     int rleft = 0;
125*ebfedea0SLionel Sambuc 
126*ebfedea0SLionel Sambuc     *pw = NULL;
127*ebfedea0SLionel Sambuc 
128*ebfedea0SLionel Sambuc     classes = malloc(num_classes * sizeof(*classes));
129*ebfedea0SLionel Sambuc     if(classes == NULL)
130*ebfedea0SLionel Sambuc 	return;
131*ebfedea0SLionel Sambuc     va_start(ap, num_classes);
132*ebfedea0SLionel Sambuc     len = 0;
133*ebfedea0SLionel Sambuc     for(i = 0; i < num_classes; i++){
134*ebfedea0SLionel Sambuc 	classes[i].str = va_arg(ap, const char*);
135*ebfedea0SLionel Sambuc 	classes[i].len = strlen(classes[i].str);
136*ebfedea0SLionel Sambuc 	classes[i].freq = va_arg(ap, int);
137*ebfedea0SLionel Sambuc 	len += classes[i].freq;
138*ebfedea0SLionel Sambuc     }
139*ebfedea0SLionel Sambuc     va_end(ap);
140*ebfedea0SLionel Sambuc     *pw = malloc(len + 1);
141*ebfedea0SLionel Sambuc     if(*pw == NULL) {
142*ebfedea0SLionel Sambuc 	free(classes);
143*ebfedea0SLionel Sambuc 	return;
144*ebfedea0SLionel Sambuc     }
145*ebfedea0SLionel Sambuc     for(i = 0; i < len; i++) {
146*ebfedea0SLionel Sambuc 	int j;
147*ebfedea0SLionel Sambuc 	int x = RND(rbuf, sizeof(rbuf), &rleft) % (len - i);
148*ebfedea0SLionel Sambuc 	int t = 0;
149*ebfedea0SLionel Sambuc 	for(j = 0; j < num_classes; j++) {
150*ebfedea0SLionel Sambuc 	    if(x < t + classes[j].freq) {
151*ebfedea0SLionel Sambuc 		(*pw)[i] = classes[j].str[RND(rbuf, sizeof(rbuf), &rleft)
152*ebfedea0SLionel Sambuc 					 % classes[j].len];
153*ebfedea0SLionel Sambuc 		classes[j].freq--;
154*ebfedea0SLionel Sambuc 		break;
155*ebfedea0SLionel Sambuc 	    }
156*ebfedea0SLionel Sambuc 	    t += classes[j].freq;
157*ebfedea0SLionel Sambuc 	}
158*ebfedea0SLionel Sambuc     }
159*ebfedea0SLionel Sambuc     (*pw)[len] = '\0';
160*ebfedea0SLionel Sambuc     memset(rbuf, 0, sizeof(rbuf));
161*ebfedea0SLionel Sambuc     free(classes);
162*ebfedea0SLionel Sambuc }
163*ebfedea0SLionel Sambuc #endif
164