/* Copyright (c) 2020 Roger Light All rights reserved. This program and the accompanying materials are made available under the terms of the Eclipse Public License 2.0 and Eclipse Distribution License v1.0 which accompany this distribution. The Eclipse Public License is available at https://www.eclipse.org/legal/epl-2.0/ and the Eclipse Distribution License is available at http://www.eclipse.org/org/documents/edl-v10.php. SPDX-License-Identifier: EPL-2.0 OR EDL-1.0 Contributors: Roger Light - initial implementation and documentation. */ #include "config.h" #include #include #include #include #include "dynamic_security.h" #include "mosquitto.h" #include "mosquitto_broker.h" /* ################################################################ * # * # Base64 encoding/decoding * # * ################################################################ */ int dynsec_auth__base64_encode(unsigned char *in, int in_len, char **encoded) { BIO *bmem, *b64; BUF_MEM *bptr = NULL; if(in_len < 0) return 1; b64 = BIO_new(BIO_f_base64()); if(b64 == NULL) return 1; BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); bmem = BIO_new(BIO_s_mem()); if(bmem == NULL){ BIO_free_all(b64); return 1; } b64 = BIO_push(b64, bmem); BIO_write(b64, in, in_len); if(BIO_flush(b64) != 1){ BIO_free_all(b64); return 1; } BIO_get_mem_ptr(b64, &bptr); *encoded = mosquitto_malloc(bptr->length+1); if(!(*encoded)){ BIO_free_all(b64); return 1; } memcpy(*encoded, bptr->data, bptr->length); (*encoded)[bptr->length] = '\0'; BIO_free_all(b64); return 0; } int dynsec_auth__base64_decode(char *in, unsigned char **decoded, int *decoded_len) { BIO *bmem, *b64; size_t slen; slen = strlen(in); b64 = BIO_new(BIO_f_base64()); if(!b64){ return 1; } BIO_set_flags(b64, BIO_FLAGS_BASE64_NO_NL); bmem = BIO_new(BIO_s_mem()); if(!bmem){ BIO_free_all(b64); return 1; } b64 = BIO_push(b64, bmem); BIO_write(bmem, in, (int)slen); if(BIO_flush(bmem) != 1){ BIO_free_all(b64); return 1; } *decoded = mosquitto_calloc(slen, 1); if(!(*decoded)){ BIO_free_all(b64); return 1; } *decoded_len = BIO_read(b64, *decoded, (int)slen); BIO_free_all(b64); if(*decoded_len <= 0){ mosquitto_free(*decoded); *decoded = NULL; *decoded_len = 0; return 1; } return 0; } /* ################################################################ * # * # Password functions * # * ################################################################ */ int dynsec_auth__pw_hash(struct dynsec__client *client, const char *password, unsigned char *password_hash, int password_hash_len, bool new_password) { const EVP_MD *digest; int iterations; if(new_password){ if(RAND_bytes(client->pw.salt, sizeof(client->pw.salt)) != 1){ return MOSQ_ERR_UNKNOWN; } iterations = PW_DEFAULT_ITERATIONS; }else{ iterations = client->pw.iterations; } if(iterations < 1){ return MOSQ_ERR_INVAL; } client->pw.iterations = iterations; digest = EVP_get_digestbyname("sha512"); if(!digest){ return MOSQ_ERR_UNKNOWN; } return !PKCS5_PBKDF2_HMAC(password, (int)strlen(password), client->pw.salt, sizeof(client->pw.salt), iterations, digest, password_hash_len, password_hash); } /* ################################################################ * # * # Username/password check * # * ################################################################ */ static int memcmp_const(const void *a, const void *b, size_t len) { size_t i; int rc = 0; if(!a || !b) return 1; for(i=0; iusername == NULL || ed->password == NULL) return MOSQ_ERR_PLUGIN_DEFER; client = dynsec_clients__find(ed->username); if(client){ if(client->disabled){ return MOSQ_ERR_AUTH; } if(client->clientid){ clientid = mosquitto_client_id(ed->client); if(clientid == NULL || strcmp(client->clientid, clientid)){ return MOSQ_ERR_AUTH; } } if(client->pw.valid && dynsec_auth__pw_hash(client, ed->password, password_hash, sizeof(password_hash), false) == MOSQ_ERR_SUCCESS){ if(memcmp_const(client->pw.password_hash, password_hash, sizeof(password_hash)) == 0){ return MOSQ_ERR_SUCCESS; }else{ return MOSQ_ERR_AUTH; } }else{ return MOSQ_ERR_PLUGIN_DEFER; } }else{ return MOSQ_ERR_PLUGIN_DEFER; } }