📄 rlm_cram.c
字号:
/* * rlm_cram.c * * Version: $Id: rlm_cram.c,v 1.3 2004/02/26 19:04:28 aland Exp $ * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * * Copyright 2002 The FreeRADIUS server project *//* * CRAM mail authentication (APOP, CRAM-MD5) * by 3APA3A * * rlm_cram module is a part of Mail authorization/authentication * support. * * Attributes used (Vendor Code/PEN: 11406, you may change it to your own) * 101 (Sandy-Mail-Authtype), selects CRAM protocol, possible values: * 2: CRAM-MD5 * 3: APOP * 8: CRAM-MD4 * 9: CRAM-SHA1 * 102 (Sandy-Mail-Challenge), contains server's challenge (usually * text banner) * 103 (Sandy-Mail-Response), contains client's response, 16 octets * for APOP/CRAM-MD5/CRAM-MD4, 20 octets for CRAM-SHA1 * * (c) 2002 by SANDY (http://www.sandy.ru/) under GPL */#include "autoconf.h"#include "libradius.h"#include <stdio.h>#include <stdlib.h>#include <string.h>#include <ctype.h>#include "radiusd.h"#include "modules.h"#include "md4.h"#include "md5.h"#include "sha1.h"#define SM_AUTHTYPE ((11406<<16)|101)#define SM_CHALLENGE ((11406<<16)|102)#define SM_RESPONSE ((11406<<16)|103)static void calc_apop_digest(char * buffer, const char * challenge, int challen, const char * password){ MD5_CTX Context; MD5Init(&Context); MD5Update(&Context,challenge,challen); MD5Update(&Context,password,strlen(password)); MD5Final(buffer,&Context);}static void calc_md5_digest(char * buffer, const char * challenge, int challen, const char * password){ char buf[1024]; int i; MD5_CTX Context; memset(buf, 0, 1024); memset(buf, 0x36, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; memcpy(buf+64, challenge, challen); MD5Init(&Context); MD5Update(&Context,buf,64+challen); memset(buf, 0x5c, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; MD5Final(buf+64,&Context); MD5Init(&Context); MD5Update(&Context,buf,64+16); MD5Final(buffer,&Context);}static void calc_md4_digest(char * buffer, const char * challenge, int challen, const char * password){ char buf[1024]; int i; MD4_CTX Context; memset(buf, 0, 1024); memset(buf, 0x36, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; memcpy(buf+64, challenge, challen); MD4Init(&Context); MD4Update(&Context,buf,64+challen); memset(buf, 0x5c, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; MD4Final(buf+64,&Context); MD4Init(&Context); MD4Update(&Context,buf,64+16); MD4Final(buffer,&Context);}static void calc_sha1_digest(char * buffer, const char * challenge, int challen, const char * password){ char buf[1024]; int i; SHA1_CTX Context; memset(buf, 0, 1024); memset(buf, 0x36, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; memcpy(buf+64, challenge, challen); SHA1Init(&Context); SHA1Update(&Context,buf,64+challen); memset(buf, 0x5c, 64); for(i=0; i<64 && password[i]; i++) buf[i]^=password[i]; SHA1Final(buf+64,&Context); SHA1Init(&Context); SHA1Update(&Context,buf,64+20); SHA1Final(buffer,&Context);}static int cram_authenticate(void * instance, REQUEST *request){ VALUE_PAIR *authtype, *challenge, *response, *password; char buffer[64]; password = pairfind(request->config_items, PW_PASSWORD); if(!password) { radlog(L_AUTH, "rlm_cram: Password is not configured for user"); return RLM_MODULE_INVALID; } authtype = pairfind(request->packet->vps, SM_AUTHTYPE); if(!authtype) { radlog(L_AUTH, "rlm_cram: Required attribute Sandy-Mail-Authtype missed"); return RLM_MODULE_INVALID; } challenge = pairfind(request->packet->vps, SM_CHALLENGE); if(!challenge) { radlog(L_AUTH, "rlm_cram: Required attribute Sandy-Mail-Challenge missed"); return RLM_MODULE_INVALID; } response = pairfind(request->packet->vps, SM_RESPONSE); if(!response) { radlog(L_AUTH, "rlm_cram: Required attribute Sandy-Mail-Response missed"); return RLM_MODULE_INVALID; } switch(authtype->lvalue){ case 2: /* CRAM-MD5 */ if(challenge->length < 5 || response->length != 16) { radlog(L_AUTH, "rlm_cram: invalid MD5 challenge/response length"); return RLM_MODULE_INVALID; } calc_md5_digest(buffer, challenge->strvalue, challenge->length, password->strvalue); if(!memcmp(buffer, response->strvalue, 16)) return RLM_MODULE_OK; break; case 3: /* APOP */ if(challenge->length < 5 || response->length != 16) { radlog(L_AUTH, "rlm_cram: invalid APOP challenge/response length"); return RLM_MODULE_INVALID; } calc_apop_digest(buffer, challenge->strvalue, challenge->length, password->strvalue); if(!memcmp(buffer, response->strvalue, 16)) return RLM_MODULE_OK; break; case 8: /* CRAM-MD4 */ if(challenge->length < 5 || response->length != 16) { radlog(L_AUTH, "rlm_cram: invalid MD4 challenge/response length"); return RLM_MODULE_INVALID; } calc_md4_digest(buffer, challenge->strvalue, challenge->length, password->strvalue); if(!memcmp(buffer, response->strvalue, 16)) return RLM_MODULE_OK; break; case 9: /* CRAM-SHA1 */ if(challenge->length < 5 || response->length != 20) { radlog(L_AUTH, "rlm_cram: invalid MD4 challenge/response length"); return RLM_MODULE_INVALID; } calc_sha1_digest(buffer, challenge->strvalue, challenge->length, password->strvalue); if(!memcmp(buffer, response->strvalue, 20)) return RLM_MODULE_OK; break; default: radlog(L_AUTH, "rlm_cram: unsupported Sandy-Mail-Authtype"); return RLM_MODULE_INVALID; } return RLM_MODULE_NOTFOUND;}module_t rlm_cram = { "CRAM", RLM_TYPE_THREAD_SAFE, /* type */ NULL, /* initialize */ NULL, /* instantiation */ { cram_authenticate, /* authenticate */ NULL, /* authorize */ NULL, /* pre-accounting */ NULL, /* accounting */ NULL, /* checksimul */ NULL, /* pre-proxy */ NULL, /* post-proxy */ NULL /* post-auth */ }, NULL, /* detach */ NULL, /* destroy */};
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -