202 lines
5.7 KiB
C++

/*
* Copyright (c) 2015, 2016, Oracle and/or its affiliates. All rights reserved.
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License as
* published by the Free Software Foundation; version 2 of the
* License.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA
*/
#ifdef HAVE_YASSL
#include <sha.hpp>
#include <openssl/ssl.h>
#else
#include <openssl/sha.h>
#include <openssl/rand.h>
#endif
#include <stdexcept>
#include <cstring>
#include "my_global.h"
#include "password_hasher.h"
#include "mysql41_hash.h"
#define PVERSION41_CHAR '*'
#define SCRAMBLE_LENGTH 20
const char *Password_hasher::_dig_vec_upper = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ";
static inline uint8_t char_val(uint8 X)
{
return (uint8_t) (X >= '0' && X <= '9' ? X - '0' :
X >= 'A' && X <= 'Z' ? X - 'A' + 10 : X - 'a' + 10);
}
std::string Password_hasher::compute_password_hash(const std::string &password)
{
if (0 == password.length())
return "";
uint8 hash_stage1[MYSQL41_HASH_SIZE];
std::string hash_stage2(MYSQL41_HASH_SIZE, '\0');
compute_two_stage_mysql41_hash(password.c_str(),
password.length(),
hash_stage1,
(uint8*)&hash_stage2[0]);
return get_password_from_salt(hash_stage2);
}
std::string Password_hasher::get_password_from_salt(const std::string &hash_stage2)
{
std::string result(2*MYSQL41_HASH_SIZE + 1, '\0');
if (hash_stage2.length() != MYSQL41_HASH_SIZE)
throw std::runtime_error("Wrong size of binary hash password");
result[0] = PVERSION41_CHAR;
octet2hex(&result[1], &hash_stage2[0], MYSQL41_HASH_SIZE);
return result;
}
std::string Password_hasher::get_salt_from_password(const std::string &password_hash)
{
const int32_t hex_characters = MYSQL41_HASH_SIZE * 2;
if (password_hash.length() != hex_characters + 1)
throw std::runtime_error("Wrong size of hashed password");
std::string result(MYSQL41_HASH_SIZE + 1, '\0');
hex2octet(&result[0], &password_hash[1] /* skip '*' */, hex_characters);
return result;
}
void Password_hasher::hex2octet(char *to, const char *str, size_t len)
{
const char *str_end= str + len;
while (str < str_end)
{
char tmp= char_val(*str++);
*to++= (tmp << 4) | char_val(*str++);
}
}
char *Password_hasher::octet2hex(char *to, const char *str, size_t len)
{
const char *str_end= str + len;
for (; str != str_end; ++str)
{
*to++= _dig_vec_upper[((uchar) *str) >> 4];
*to++= _dig_vec_upper[((uchar) *str) & 0x0F];
}
*to= '\0';
return to;
}
void Password_hasher::compute_two_stage_mysql41_hash(const char *password, size_t pass_len,
uint8_t *hash_stage1, uint8_t *hash_stage2)
{
/* Stage 1: hash pwd */
compute_mysql41_hash(hash_stage1, password, pass_len);
/* Stage 2 : hash first stage's output. */
compute_mysql41_hash(hash_stage2, (const char *) hash_stage1, MYSQL41_HASH_SIZE);
}
std::string Password_hasher::generate_user_salt()
{
std::string result(SCRAMBLE_LENGTH, '\0');
char *buffer = &result[0];
char *end = buffer + result.length() - 1;
#ifdef HAVE_YASSL
yaSSL::RAND_bytes((unsigned char *) buffer, SCRAMBLE_LENGTH);
#else
RAND_bytes((unsigned char *) buffer, SCRAMBLE_LENGTH);
#endif
/* Sequence must be a legal UTF8 string */
for (; buffer < end; buffer++)
{
*buffer &= 0x7f;
if (*buffer == '\0' || *buffer == '$')
*buffer= *buffer + 1;
}
return result;
}
bool Password_hasher::check_scramble_mysql41_hash(const char *scramble_arg, const char *message, const uint8_t *hash_stage2)
{
char buf[MYSQL41_HASH_SIZE];
uint8_t hash_stage2_reassured[MYSQL41_HASH_SIZE];
DBUG_ASSERT(MYSQL41_HASH_SIZE == SCRAMBLE_LENGTH);
/* create key to encrypt scramble */
compute_mysql41_hash_multi((uint8_t *)buf, message, SCRAMBLE_LENGTH, (const char *) hash_stage2, MYSQL41_HASH_SIZE);
/* encrypt scramble */
my_crypt(buf, (const uint8_t*)buf, (const uint8_t*)scramble_arg, SCRAMBLE_LENGTH);
/* now buf supposedly contains hash_stage1: so we can get hash_stage2 */
compute_mysql41_hash((uint8_t *)hash_stage2_reassured, (const char *) buf, MYSQL41_HASH_SIZE);
return 0 == memcmp(hash_stage2, hash_stage2_reassured, MYSQL41_HASH_SIZE);
}
void Password_hasher::my_crypt(char *to, const uint8_t *s1, const uint8_t *s2, size_t len)
{
const uint8_t *s1_end = s1 + len;
while (s1 < s1_end)
*to++= *s1++ ^ *s2++;
}
std::string Password_hasher::scramble(const char *message, const char *password)
{
uint8_t hash_stage1[MYSQL41_HASH_SIZE];
uint8_t hash_stage2[MYSQL41_HASH_SIZE];
std::string result(SCRAMBLE_LENGTH, '\0');
result.at(SCRAMBLE_LENGTH - 1) = '\0';
DBUG_ASSERT(MYSQL41_HASH_SIZE == SCRAMBLE_LENGTH);
/* Two stage SHA1 hash of the pwd */
compute_two_stage_mysql41_hash(password, strlen(password),
(uint8_t*)hash_stage1,
(uint8_t*)hash_stage2);
/* create crypt string as sha1(message, hash_stage2) */;
compute_mysql41_hash_multi((uint8_t*)&result[0], message, SCRAMBLE_LENGTH,
(const char *)hash_stage2, MYSQL41_HASH_SIZE);
my_crypt(&result[0], (const uint8_t*)&result[0], hash_stage1, SCRAMBLE_LENGTH);
return result;
}