123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209 |
- /*
- Copyright (c) 2020 Roger Light <roger@atchoo.org>
- All rights reserved. This program and the accompanying materials
- are made available under the terms of the Eclipse Public License 2.0
- and Eclipse Distribution License v1.0 which accompany this distribution.
- The Eclipse Public License is available at
- https://www.eclipse.org/legal/epl-2.0/
- and the Eclipse Distribution License is available at
- http://www.eclipse.org/org/documents/edl-v10.php.
- SPDX-License-Identifier: EPL-2.0 OR BSD-3-Clause
- Contributors:
- Roger Light - initial implementation and documentation.
- */
- #include "config.h"
- #include <openssl/bio.h>
- #include <openssl/buffer.h>
- #include <openssl/evp.h>
- #include <openssl/rand.h>
- #include "dynamic_security.h"
- #include "mosquitto.h"
- #include "mosquitto_broker.h"
- /* ################################################################
- * #
- * # Base64 encoding/decoding
- * #
- * ################################################################ */
- int dynsec_auth__base64_encode(unsigned char *in, int in_len, char **encoded)
- {
- BIO *bmem, *b64;
- BUF_MEM *bptr = NULL;
- if(in_len < 0) return 1;
- b64 = BIO_new(BIO_f_base64());
- if(b64 == NULL) return 1;
- BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
- bmem = BIO_new(BIO_s_mem());
- if(bmem == NULL){
- BIO_free_all(b64);
- return 1;
- }
- b64 = BIO_push(b64, bmem);
- BIO_write(b64, in, in_len);
- if(BIO_flush(b64) != 1){
- BIO_free_all(b64);
- return 1;
- }
- BIO_get_mem_ptr(b64, &bptr);
- *encoded = mosquitto_malloc(bptr->length+1);
- if(!(*encoded)){
- BIO_free_all(b64);
- return 1;
- }
- memcpy(*encoded, bptr->data, bptr->length);
- (*encoded)[bptr->length] = '\0';
- BIO_free_all(b64);
- return 0;
- }
- int dynsec_auth__base64_decode(char *in, unsigned char **decoded, int *decoded_len)
- {
- BIO *bmem, *b64;
- size_t slen;
- slen = strlen(in);
- b64 = BIO_new(BIO_f_base64());
- if(!b64){
- return 1;
- }
- BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL);
- bmem = BIO_new(BIO_s_mem());
- if(!bmem){
- BIO_free_all(b64);
- return 1;
- }
- b64 = BIO_push(b64, bmem);
- BIO_write(bmem, in, (int)slen);
- if(BIO_flush(bmem) != 1){
- BIO_free_all(b64);
- return 1;
- }
- *decoded = mosquitto_calloc(slen, 1);
- if(!(*decoded)){
- BIO_free_all(b64);
- return 1;
- }
- *decoded_len = BIO_read(b64, *decoded, (int)slen);
- BIO_free_all(b64);
- if(*decoded_len <= 0){
- mosquitto_free(*decoded);
- *decoded = NULL;
- *decoded_len = 0;
- return 1;
- }
- return 0;
- }
- /* ################################################################
- * #
- * # Password functions
- * #
- * ################################################################ */
- int dynsec_auth__pw_hash(struct dynsec__client *client, const char *password, unsigned char *password_hash, int password_hash_len, bool new_password)
- {
- const EVP_MD *digest;
- int iterations;
- if(new_password){
- if(RAND_bytes(client->pw.salt, sizeof(client->pw.salt)) != 1){
- return MOSQ_ERR_UNKNOWN;
- }
- iterations = PW_DEFAULT_ITERATIONS;
- }else{
- iterations = client->pw.iterations;
- }
- if(iterations < 1){
- return MOSQ_ERR_INVAL;
- }
- client->pw.iterations = iterations;
- digest = EVP_get_digestbyname("sha512");
- if(!digest){
- return MOSQ_ERR_UNKNOWN;
- }
- return !PKCS5_PBKDF2_HMAC(password, (int)strlen(password),
- client->pw.salt, sizeof(client->pw.salt), iterations,
- digest, password_hash_len, password_hash);
- }
- /* ################################################################
- * #
- * # Username/password check
- * #
- * ################################################################ */
- static int memcmp_const(const void *a, const void *b, size_t len)
- {
- size_t i;
- int rc = 0;
- if(!a || !b) return 1;
- for(i=0; i<len; i++){
- if( ((char *)a)[i] != ((char *)b)[i] ){
- rc = 1;
- }
- }
- return rc;
- }
- int dynsec_auth__basic_auth_callback(int event, void *event_data, void *userdata)
- {
- struct mosquitto_evt_basic_auth *ed = event_data;
- struct dynsec__client *client;
- unsigned char password_hash[64]; /* For SHA512 */
- const char *clientid;
- UNUSED(event);
- UNUSED(userdata);
- if(ed->username == NULL || ed->password == NULL) return MOSQ_ERR_PLUGIN_DEFER;
- client = dynsec_clients__find(ed->username);
- if(client){
- if(client->disabled){
- return MOSQ_ERR_AUTH;
- }
- if(client->clientid){
- clientid = mosquitto_client_id(ed->client);
- if(clientid == NULL || strcmp(client->clientid, clientid)){
- return MOSQ_ERR_AUTH;
- }
- }
- if(client->pw.valid && dynsec_auth__pw_hash(client, ed->password, password_hash, sizeof(password_hash), false) == MOSQ_ERR_SUCCESS){
- if(memcmp_const(client->pw.password_hash, password_hash, sizeof(password_hash)) == 0){
- return MOSQ_ERR_SUCCESS;
- }else{
- return MOSQ_ERR_AUTH;
- }
- }else{
- return MOSQ_ERR_PLUGIN_DEFER;
- }
- }else{
- return MOSQ_ERR_PLUGIN_DEFER;
- }
- }
|