summaryrefslogtreecommitdiffstats
path: root/src/util/authtok-utils.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/util/authtok-utils.c')
-rw-r--r--src/util/authtok-utils.c277
1 files changed, 277 insertions, 0 deletions
diff --git a/src/util/authtok-utils.c b/src/util/authtok-utils.c
new file mode 100644
index 0000000..ac3c8bb
--- /dev/null
+++ b/src/util/authtok-utils.c
@@ -0,0 +1,277 @@
+/*
+ SSSD - auth utils helpers
+
+ Copyright (C) Sumit Bose <sbose@redhat.com> 2015
+
+ This program is free software; you can redistribute it and/or modify
+ it under the terms of the GNU General Public License as published by
+ the Free Software Foundation; either version 3 of the License, or
+ (at your option) any later version.
+
+ This program is distributed in the hope that it will be useful,
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ GNU General Public License for more details.
+
+ You should have received a copy of the GNU General Public License
+ along with this program. If not, see <http://www.gnu.org/licenses/>.
+*/
+
+/* This file is use by SSSD clients and the main daemons. Please do not add
+ * code which is specific to only one of them. */
+
+#include <errno.h>
+
+#include "sss_client/sss_cli.h"
+#include "sss_client/pam_message.h"
+
+errno_t sss_auth_pack_2fa_blob(const char *fa1, size_t fa1_len,
+ const char *fa2, size_t fa2_len,
+ uint8_t *buf, size_t buf_len,
+ size_t *_2fa_blob_len)
+{
+ size_t c;
+ uint32_t tmp_uint32_t;
+
+ if (fa1 == NULL || *fa1 == '\0' || fa1_len > UINT32_MAX
+ || fa2 == NULL || *fa2 == '\0' || fa2_len > UINT32_MAX
+ || (buf == NULL && buf_len != 0)) {
+ return EINVAL;
+ }
+
+ if (fa1_len == 0) {
+ fa1_len = strlen(fa1);
+ } else {
+ if (fa1[fa1_len] != '\0') {
+ return EINVAL;
+ }
+ }
+
+ if (fa2_len == 0) {
+ fa2_len = strlen(fa2);
+ } else {
+ if (fa2[fa2_len] != '\0') {
+ return EINVAL;
+ }
+ }
+
+ *_2fa_blob_len = fa1_len + fa2_len + 2 + 2 * sizeof(uint32_t);
+ if (buf == NULL || buf_len < *_2fa_blob_len) {
+ return EAGAIN;
+ }
+
+ c = 0;
+ tmp_uint32_t = (uint32_t) fa1_len + 1;
+ SAFEALIGN_COPY_UINT32(buf, &tmp_uint32_t, &c);
+ tmp_uint32_t = (uint32_t) fa2_len + 1;
+ SAFEALIGN_COPY_UINT32(buf + c, &tmp_uint32_t, &c);
+
+ memcpy(buf + c, fa1, fa1_len + 1);
+ c += fa1_len + 1;
+
+ memcpy(buf + c, fa2, fa2_len + 1);
+
+ return 0;
+}
+
+errno_t sss_auth_passkey_calc_size(const char *uv,
+ const char *key,
+ const char *pin,
+ size_t *_passkey_buf_len)
+{
+ size_t len = 0;
+
+ if (uv == NULL || key == NULL) {
+ return EINVAL;
+ }
+
+ len += strlen(key) + 1;
+ len += strlen(uv) + 1;
+
+ if (pin != NULL) {
+ len += strlen(pin) + 1;
+ }
+
+ *_passkey_buf_len = len;
+
+ return EOK;
+}
+
+errno_t sss_auth_pack_passkey_blob(uint8_t *buf,
+ const char *uv,
+ const char *key,
+ const char *pin)
+{
+ size_t len = 0;
+ size_t key_len;
+ size_t uv_len;
+ size_t pin_len;
+
+ if (uv == NULL || key == NULL) {
+ return EINVAL;
+ }
+
+ uv_len = strlen(uv) + 1;
+ memcpy(buf + len, uv, uv_len);
+ len += uv_len;
+
+ key_len = strlen(key) + 1;
+ memcpy(buf + len, key, key_len);
+ len += key_len;
+
+ /* Add provided PIN */
+ if (pin != NULL) {
+ pin_len = strlen(pin) + 1;
+ /* User verification is false */
+ } else {
+ pin = "";
+ pin_len = 0;
+ }
+ memcpy(buf + len, pin, pin_len);
+
+ return EOK;
+}
+
+errno_t sss_auth_pack_sc_blob(const char *pin, size_t pin_len,
+ const char *token_name, size_t token_name_len,
+ const char *module_name, size_t module_name_len,
+ const char *key_id, size_t key_id_len,
+ const char *label, size_t label_len,
+ uint8_t *buf, size_t buf_len,
+ size_t *_sc_blob_len)
+{
+ size_t c;
+ uint32_t tmp_uint32_t;
+
+ if (pin_len > UINT32_MAX || token_name_len > UINT32_MAX
+ || module_name_len > UINT32_MAX
+ || (pin_len != 0 && pin == NULL)
+ || (token_name_len != 0 && token_name == NULL)
+ || (module_name_len != 0 && module_name == NULL)
+ || (key_id_len != 0 && key_id == NULL)
+ || (label_len != 0 && label == NULL)) {
+ return EINVAL;
+ }
+
+ /* A missing pin is ok in the case of a reader with a keyboard */
+ if (pin == NULL) {
+ pin = "";
+ pin_len = 0;
+ }
+
+ if (token_name == NULL) {
+ token_name = "";
+ token_name_len = 0;
+ }
+
+ if (module_name == NULL) {
+ module_name = "";
+ module_name_len = 0;
+ }
+
+ if (key_id == NULL) {
+ key_id = "";
+ key_id_len = 0;
+ }
+
+ if (label == NULL) {
+ label = "";
+ label_len = 0;
+ }
+
+ /* len should not include the trailing \0 */
+ if (pin_len == 0 || pin[pin_len - 1] == '\0') {
+ pin_len = strlen(pin);
+ }
+
+ if (token_name_len == 0 || token_name[token_name_len - 1] == '\0') {
+ token_name_len = strlen(token_name);
+ }
+
+ if (module_name_len == 0 || module_name[module_name_len - 1] == '\0') {
+ module_name_len = strlen(module_name);
+ }
+
+ if (key_id_len == 0 || key_id[key_id_len - 1] == '\0') {
+ key_id_len = strlen(key_id);
+ }
+
+ if (label_len == 0 || label[label_len - 1] == '\0') {
+ label_len = strlen(label);
+ }
+
+ *_sc_blob_len = pin_len + token_name_len + module_name_len + key_id_len
+ + label_len + 5 + 5 * sizeof(uint32_t);
+ if (buf == NULL || buf_len < *_sc_blob_len) {
+ return EAGAIN;
+ }
+
+ c = 0;
+ tmp_uint32_t = (uint32_t) pin_len + 1;
+ SAFEALIGN_COPY_UINT32(buf, &tmp_uint32_t, &c);
+ tmp_uint32_t = (uint32_t) token_name_len + 1;
+ SAFEALIGN_COPY_UINT32(buf + c, &tmp_uint32_t, &c);
+ tmp_uint32_t = (uint32_t) module_name_len + 1;
+ SAFEALIGN_COPY_UINT32(buf + c, &tmp_uint32_t, &c);
+ tmp_uint32_t = (uint32_t) key_id_len + 1;
+ SAFEALIGN_COPY_UINT32(buf + c, &tmp_uint32_t, &c);
+ tmp_uint32_t = (uint32_t) label_len + 1;
+ SAFEALIGN_COPY_UINT32(buf + c, &tmp_uint32_t, &c);
+
+ memcpy(buf + c, pin, pin_len);
+ buf[c + pin_len] = '\0';
+ c += pin_len + 1;
+
+ memcpy(buf + c, token_name, token_name_len);
+ buf[c + token_name_len] = '\0';
+ c += token_name_len + 1;
+
+ memcpy(buf + c, module_name, module_name_len);
+ buf[c + module_name_len] = '\0';
+ c += module_name_len + 1;
+
+ memcpy(buf + c, key_id, key_id_len);
+ buf[c + key_id_len] = '\0';
+ c += key_id_len +1;
+
+ memcpy(buf + c, label, label_len);
+ buf[c + label_len] = '\0';
+
+ return 0;
+}
+
+const char *sss_auth_get_pin_from_sc_blob(uint8_t *blob, size_t blob_len)
+{
+ size_t c = 0;
+ uint32_t pin_len;
+ uint32_t token_name_len;
+ uint32_t module_name_len;
+ uint32_t key_id_len;
+ uint32_t label_len;
+
+ if (blob == NULL || blob_len == 0) {
+ return NULL;
+ }
+
+ SAFEALIGN_COPY_UINT32(&pin_len, blob, &c);
+ if (pin_len == 0) {
+ return NULL;
+ }
+
+ SAFEALIGN_COPY_UINT32(&token_name_len, blob + c, &c);
+ SAFEALIGN_COPY_UINT32(&module_name_len, blob + c, &c);
+ SAFEALIGN_COPY_UINT32(&key_id_len, blob + c, &c);
+ SAFEALIGN_COPY_UINT32(&label_len, blob + c, &c);
+
+ if (blob_len != 5 * sizeof(uint32_t) + pin_len + token_name_len
+ + module_name_len + key_id_len
+ + label_len) {
+ return NULL;
+ }
+
+ if (blob[c + pin_len - 1] != '\0') {
+ return NULL;
+ }
+
+ return (const char *) blob + c;
+}