hmac_openssl_wrapper.c 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381
  1. /* Wrapper for hmac openssl implementation.
  2. *
  3. * Copyright (c) 2021 Red Hat, Inc.
  4. * Written by Iker Pedrosa <ipedrosa@redhat.com>
  5. *
  6. * Redistribution and use in source and binary forms, with or without
  7. * modification, are permitted provided that the following conditions
  8. * are met:
  9. * 1. Redistributions of source code must retain the above copyright
  10. * notice, and the entire permission notice in its entirety,
  11. * including the disclaimer of warranties.
  12. * 2. Redistributions in binary form must reproduce the above copyright
  13. * notice, this list of conditions and the following disclaimer in the
  14. * documentation and/or other materials provided with the distribution.
  15. * 3. The name of the author may not be used to endorse or promote
  16. * products derived from this software without specific prior
  17. * written permission.
  18. *
  19. * ALTERNATIVELY, this product may be distributed under the terms of
  20. * the GNU Public License, in which case the provisions of the GPL are
  21. * required INSTEAD OF the above restrictions. (This clause is
  22. * necessary due to a potential bad interaction between the GPL and
  23. * the restrictions contained in a BSD-style copyright.)
  24. *
  25. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
  26. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
  27. * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  28. * DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT,
  29. * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
  30. * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
  31. * SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
  32. * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
  33. * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
  34. * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
  35. * OF THE POSSIBILITY OF SUCH DAMAGE.
  36. *
  37. */
  38. #include "config.h"
  39. #ifdef WITH_OPENSSL
  40. #include <sys/stat.h>
  41. #include <fcntl.h>
  42. #include <syslog.h>
  43. #include <unistd.h>
  44. #include <string.h>
  45. #include <errno.h>
  46. #include <openssl/evp.h>
  47. #include <openssl/params.h>
  48. #include <openssl/core_names.h>
  49. #include <security/pam_ext.h>
  50. #include <security/pam_modutil.h>
  51. #include "hmac_openssl_wrapper.h"
  52. #define LOGIN_DEFS "/etc/login.defs"
  53. #define CRYPTO_KEY "HMAC_CRYPTO_ALGO"
  54. #define DEFAULT_ALGORITHM "SHA512"
  55. #define MAX_HMAC_LENGTH 512
  56. #define MAX_KEY_LENGTH EVP_MAX_KEY_LENGTH
  57. static char *
  58. get_crypto_algorithm(pam_handle_t *pamh, int debug){
  59. char *config_value = NULL;
  60. config_value = pam_modutil_search_key(pamh, LOGIN_DEFS, CRYPTO_KEY);
  61. if (config_value == NULL) {
  62. config_value = strdup(DEFAULT_ALGORITHM);
  63. if (debug) {
  64. pam_syslog(pamh, LOG_DEBUG,
  65. "Key [%s] not found, falling back to default algorithm [%s]\n",
  66. CRYPTO_KEY, DEFAULT_ALGORITHM);
  67. }
  68. }
  69. return config_value;
  70. }
  71. static int
  72. generate_key(pam_handle_t *pamh, char **key, size_t key_size)
  73. {
  74. int fd = 0;
  75. size_t bytes_read = 0;
  76. char * tmp = NULL;
  77. fd = open("/dev/urandom", O_RDONLY);
  78. if (fd == -1) {
  79. pam_syslog(pamh, LOG_ERR, "Cannot open /dev/urandom: %m");
  80. return PAM_AUTH_ERR;
  81. }
  82. tmp = malloc(key_size);
  83. if (!tmp) {
  84. pam_syslog(pamh, LOG_CRIT, "Not enough memory");
  85. close(fd);
  86. return PAM_AUTH_ERR;
  87. }
  88. bytes_read = pam_modutil_read(fd, tmp, key_size);
  89. close(fd);
  90. if (bytes_read < key_size) {
  91. pam_syslog(pamh, LOG_ERR, "Short read on random device");
  92. free(tmp);
  93. return PAM_AUTH_ERR;
  94. }
  95. *key = tmp;
  96. return PAM_SUCCESS;
  97. }
  98. static int
  99. read_file(pam_handle_t *pamh, int fd, char **text, size_t *text_length)
  100. {
  101. struct stat st;
  102. size_t bytes_read = 0;
  103. char *tmp = NULL;
  104. if (fstat(fd, &st) == -1) {
  105. pam_syslog(pamh, LOG_ERR, "Unable to stat file: %m");
  106. close(fd);
  107. return PAM_AUTH_ERR;
  108. }
  109. if (st.st_size == 0) {
  110. pam_syslog(pamh, LOG_ERR, "Key file size cannot be 0");
  111. close(fd);
  112. return PAM_AUTH_ERR;
  113. }
  114. tmp = malloc(st.st_size);
  115. if (!tmp) {
  116. pam_syslog(pamh, LOG_CRIT, "Not enough memory");
  117. close(fd);
  118. return PAM_AUTH_ERR;
  119. }
  120. bytes_read = pam_modutil_read(fd, tmp, st.st_size);
  121. close(fd);
  122. if (bytes_read < (size_t)st.st_size) {
  123. pam_syslog(pamh, LOG_ERR, "Short read on key file");
  124. memset(tmp, 0, st.st_size);
  125. free(tmp);
  126. return PAM_AUTH_ERR;
  127. }
  128. *text = tmp;
  129. *text_length = st.st_size;
  130. return PAM_SUCCESS;
  131. }
  132. static int
  133. write_file(pam_handle_t *pamh, const char *file_name, char *text,
  134. size_t text_length, uid_t owner, gid_t group)
  135. {
  136. int fd = 0;
  137. size_t bytes_written = 0;
  138. fd = open(file_name,
  139. O_WRONLY | O_CREAT | O_TRUNC,
  140. S_IRUSR | S_IWUSR);
  141. if (fd == -1) {
  142. pam_syslog(pamh, LOG_ERR, "Unable to open [%s]: %m", file_name);
  143. memset(text, 0, text_length);
  144. free(text);
  145. return PAM_AUTH_ERR;
  146. }
  147. if (fchown(fd, owner, group) == -1) {
  148. pam_syslog(pamh, LOG_ERR, "Unable to change ownership [%s]: %m", file_name);
  149. memset(text, 0, text_length);
  150. free(text);
  151. close(fd);
  152. return PAM_AUTH_ERR;
  153. }
  154. bytes_written = pam_modutil_write(fd, text, text_length);
  155. close(fd);
  156. if (bytes_written < text_length) {
  157. pam_syslog(pamh, LOG_ERR, "Short write on %s", file_name);
  158. free(text);
  159. return PAM_AUTH_ERR;
  160. }
  161. return PAM_SUCCESS;
  162. }
  163. static int
  164. key_management(pam_handle_t *pamh, const char *file_name, char **text,
  165. size_t text_length, uid_t owner, gid_t group)
  166. {
  167. int fd = 0;
  168. fd = open(file_name, O_RDONLY | O_NOFOLLOW);
  169. if (fd == -1) {
  170. if (errno == ENOENT) {
  171. if (generate_key(pamh, text, text_length)) {
  172. pam_syslog(pamh, LOG_ERR, "Unable to generate key");
  173. return PAM_AUTH_ERR;
  174. }
  175. if (write_file(pamh, file_name, *text, text_length, owner, group)) {
  176. pam_syslog(pamh, LOG_ERR, "Unable to write key");
  177. return PAM_AUTH_ERR;
  178. }
  179. } else {
  180. pam_syslog(pamh, LOG_ERR, "Unable to open %s: %m", file_name);
  181. return PAM_AUTH_ERR;
  182. }
  183. } else {
  184. if (read_file(pamh, fd, text, &text_length)) {
  185. pam_syslog(pamh, LOG_ERR, "Error reading key file %s\n", file_name);
  186. return PAM_AUTH_ERR;
  187. }
  188. }
  189. return PAM_SUCCESS;
  190. }
  191. static int
  192. hmac_management(pam_handle_t *pamh, int debug, void **out, size_t *out_length,
  193. char *key, size_t key_length,
  194. const void *text, size_t text_length)
  195. {
  196. int ret = PAM_AUTH_ERR;
  197. EVP_MAC *evp_mac = NULL;
  198. EVP_MAC_CTX *ctx = NULL;
  199. unsigned char *hmac_message = NULL;
  200. size_t hmac_length;
  201. char *algo = NULL;
  202. OSSL_PARAM subalg_param[] = { OSSL_PARAM_END, OSSL_PARAM_END };
  203. algo = get_crypto_algorithm(pamh, debug);
  204. subalg_param[0] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
  205. algo,
  206. 0);
  207. evp_mac = EVP_MAC_fetch(NULL, "HMAC", NULL);
  208. if (evp_mac == NULL) {
  209. pam_syslog(pamh, LOG_ERR, "Unable to create hmac implementation");
  210. goto done;
  211. }
  212. ctx = EVP_MAC_CTX_new(evp_mac);
  213. if (ctx == NULL) {
  214. pam_syslog(pamh, LOG_ERR, "Unable to create hmac context");
  215. goto done;
  216. }
  217. ret = EVP_MAC_init(ctx, (const unsigned char *)key, key_length, subalg_param);
  218. if (ret == 0) {
  219. pam_syslog(pamh, LOG_ERR, "Unable to initialize hmac context");
  220. goto done;
  221. }
  222. ret = EVP_MAC_update(ctx, (const unsigned char *)text, text_length);
  223. if (ret == 0) {
  224. pam_syslog(pamh, LOG_ERR, "Unable to update hmac context");
  225. goto done;
  226. }
  227. hmac_message = (unsigned char*)malloc(sizeof(unsigned char) * MAX_HMAC_LENGTH);
  228. if (!hmac_message) {
  229. pam_syslog(pamh, LOG_CRIT, "Not enough memory");
  230. goto done;
  231. }
  232. ret = EVP_MAC_final(ctx, hmac_message, &hmac_length, MAX_HMAC_LENGTH);
  233. if (ret == 0) {
  234. pam_syslog(pamh, LOG_ERR, "Unable to calculate hmac message");
  235. goto done;
  236. }
  237. *out_length = hmac_length;
  238. *out = malloc(*out_length);
  239. if (*out == NULL) {
  240. pam_syslog(pamh, LOG_CRIT, "Not enough memory");
  241. goto done;
  242. }
  243. memcpy(*out, hmac_message, *out_length);
  244. ret = PAM_SUCCESS;
  245. done:
  246. if (hmac_message != NULL) {
  247. free(hmac_message);
  248. }
  249. if (key != NULL) {
  250. memset(key, 0, key_length);
  251. free(key);
  252. }
  253. if (ctx != NULL) {
  254. EVP_MAC_CTX_free(ctx);
  255. }
  256. if (evp_mac != NULL) {
  257. EVP_MAC_free(evp_mac);
  258. }
  259. free(algo);
  260. return ret;
  261. }
  262. int
  263. hmac_size(pam_handle_t *pamh, int debug, size_t *hmac_length)
  264. {
  265. int ret = PAM_AUTH_ERR;
  266. EVP_MAC *evp_mac = NULL;
  267. EVP_MAC_CTX *ctx = NULL;
  268. const unsigned char key[] = "ThisIsJustAKey";
  269. size_t key_length = MAX_KEY_LENGTH;
  270. char *algo = NULL;
  271. OSSL_PARAM subalg_param[] = { OSSL_PARAM_END, OSSL_PARAM_END };
  272. algo = get_crypto_algorithm(pamh, debug);
  273. subalg_param[0] = OSSL_PARAM_construct_utf8_string(OSSL_MAC_PARAM_DIGEST,
  274. algo,
  275. 0);
  276. evp_mac = EVP_MAC_fetch(NULL, "HMAC", NULL);
  277. if (evp_mac == NULL) {
  278. pam_syslog(pamh, LOG_ERR, "Unable to create hmac implementation");
  279. goto done;
  280. }
  281. ctx = EVP_MAC_CTX_new(evp_mac);
  282. if (ctx == NULL) {
  283. pam_syslog(pamh, LOG_ERR, "Unable to create hmac context");
  284. goto done;
  285. }
  286. ret = EVP_MAC_init(ctx, key, key_length, subalg_param);
  287. if (ret == 0) {
  288. pam_syslog(pamh, LOG_ERR, "Unable to initialize hmac context");
  289. goto done;
  290. }
  291. *hmac_length = EVP_MAC_CTX_get_mac_size(ctx);
  292. ret = PAM_SUCCESS;
  293. done:
  294. if (ctx != NULL) {
  295. EVP_MAC_CTX_free(ctx);
  296. }
  297. if (evp_mac != NULL) {
  298. EVP_MAC_free(evp_mac);
  299. }
  300. free(algo);
  301. return ret;
  302. }
  303. int
  304. hmac_generate(pam_handle_t *pamh, int debug, void **mac, size_t *mac_length,
  305. const char *key_file, uid_t owner, gid_t group,
  306. const void *text, size_t text_length)
  307. {
  308. char *key = NULL;
  309. size_t key_length = MAX_KEY_LENGTH;
  310. if (key_management(pamh, key_file, &key, key_length, owner, group)) {
  311. return PAM_AUTH_ERR;
  312. }
  313. if (hmac_management(pamh, debug, mac, mac_length, key, key_length,
  314. text, text_length)) {
  315. return PAM_AUTH_ERR;
  316. }
  317. return PAM_SUCCESS;
  318. }
  319. #endif /* WITH_OPENSSL */