2 Unix SMB/CIFS implementation.
4 Functions to create reasonable random numbers for crypto use.
6 Copyright (C) Jeremy Allison 2001
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
18 You should have received a copy of the GNU General Public License
19 along with this program. If not, see <http://www.gnu.org/licenses/>.
23 #include "system/locale.h"
27 * @brief Random number generation
31 generate a single random uint32_t
33 _PUBLIC_
uint32_t generate_random(void)
36 generate_random_buffer(v
, 4);
42 Microsoft composed the following rules (among others) for quality
43 checks. This is an abridgment from
44 http://msdn.microsoft.com/en-us/subscriptions/cc786468%28v=ws.10%29.aspx:
46 Passwords must contain characters from three of the following five
49 - Uppercase characters of European languages (A through Z, with
50 diacritic marks, Greek and Cyrillic characters)
51 - Lowercase characters of European languages (a through z, sharp-s,
52 with diacritic marks, Greek and Cyrillic characters)
53 - Base 10 digits (0 through 9)
54 - Nonalphanumeric characters: ~!@#$%^&*_-+=`|\(){}[]:;"'<>,.?/
55 - Any Unicode character that is categorized as an alphabetic character
56 but is not uppercase or lowercase. This includes Unicode characters
59 Note: for now do not check if the unicode category is
62 _PUBLIC_
bool check_password_quality(const char *pwd
)
66 size_t num_digits
= 0;
69 size_t num_nonalpha
= 0;
70 size_t num_unicode
= 0;
71 size_t num_categories
= 0;
78 const char *s
= &pwd
[ofs
];
82 c
= next_codepoint(s
, &len
);
83 if (c
== INVALID_CODEPOINT
) {
92 const char *na
= "~!@#$%^&*_-+=`|\\(){}[]:;\"'<>,.?/";
115 * the rest does not belong to
132 * Note: for now do not check if the unicode category is
133 * alphabetic character
135 * We would have to import the details from
136 * ftp://ftp.unicode.org/Public/6.3.0/ucd/UnicodeData-6.3.0d1.txt
142 if (num_digits
> 0) {
151 if (num_nonalpha
> 0) {
154 if (num_unicode
> 0) {
158 if (num_categories
>= 3) {
166 Use the random number generator to generate a random string.
169 _PUBLIC_
char *generate_random_str_list(TALLOC_CTX
*mem_ctx
, size_t len
, const char *list
)
172 size_t list_len
= strlen(list
);
174 char *retstr
= talloc_array(mem_ctx
, char, len
+ 1);
175 if (!retstr
) return NULL
;
177 generate_random_buffer((uint8_t *)retstr
, len
);
178 for (i
= 0; i
< len
; i
++) {
179 retstr
[i
] = list
[retstr
[i
] % list_len
];
187 * Generate a random text string consisting of the specified length.
188 * The returned string will be allocated.
190 * Characters used are: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+_-#.,
193 _PUBLIC_
char *generate_random_str(TALLOC_CTX
*mem_ctx
, size_t len
)
196 const char *c_list
= "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+_-#.,";
199 retstr
= generate_random_str_list(mem_ctx
, len
, c_list
);
200 if (!retstr
) return NULL
;
202 /* we need to make sure the random string passes basic quality tests
203 or it might be rejected by windows as a password */
204 if (len
>= 7 && !check_password_quality(retstr
)) {
213 * Generate a random text password (based on printable ascii characters).
216 _PUBLIC_
char *generate_random_password(TALLOC_CTX
*mem_ctx
, size_t min
, size_t max
)
219 /* This list does not include { or } because they cause
220 * problems for our provision (it can create a substring
221 * ${...}, and for Fedora DS (which treats {...} at the start
222 * of a stored password as special
223 * -- Andrew Bartlett 2010-03-11
225 const char *c_list
= "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+_-#.,@$%&!?:;<=>()[]~";
239 generate_random_buffer((uint8_t *)&tmp
, sizeof(tmp
));
247 retstr
= generate_random_str_list(mem_ctx
, len
, c_list
);
248 if (!retstr
) return NULL
;
250 /* we need to make sure the random string passes basic quality tests
251 or it might be rejected by windows as a password */
252 if (len
>= 7 && !check_password_quality(retstr
)) {
261 * Generate a random machine password (based on random utf16 characters,
262 * converted to utf8). min must be at least 14, max must be at most 255.
264 * If 'unix charset' is not utf8, the password consist of random ascii
268 _PUBLIC_
char *generate_random_machine_password(TALLOC_CTX
*mem_ctx
, size_t min
, size_t max
)
270 TALLOC_CTX
*frame
= NULL
;
271 struct generate_random_machine_password_state
{
272 uint8_t password_buffer
[256 * 2];
277 char *utf8_pw
= NULL
;
279 char *unix_pw
= NULL
;
301 frame
= talloc_stackframe_pool(2048);
302 state
= talloc_zero(frame
, struct generate_random_machine_password_state
);
309 generate_random_buffer((uint8_t *)&tmp
, sizeof(tmp
));
317 * Create a random machine account password
318 * We create a random buffer and convert that to utf8.
319 * This is similar to what windows is doing.
321 * In future we may store the raw random buffer,
322 * but for now we need to pass the password as
323 * char pointer through some layers.
325 * As most kerberos keys are derived from the
326 * utf8 password we need to fallback to
327 * ASCII passwords if "unix charset" is not utf8.
329 generate_secret_buffer(state
->password_buffer
, len
* 2);
330 for (i
= 0; i
< len
; i
++) {
335 * both MIT krb5 and HEIMDAL only
336 * handle codepoints up to 0xffff.
338 * It means we need to avoid
339 * 0xD800 - 0xDBFF (high surrogate)
341 * 0xDC00 - 0xDFFF (low surrogate)
342 * in the random utf16 data.
344 * 55296 0xD800 0154000 0b1101100000000000
345 * 57343 0xDFFF 0157777 0b1101111111111111
346 * 8192 0x2000 020000 0b10000000000000
348 * The above values show that we can check
349 * for 0xD800 and just add 0x2000 to avoid
350 * the surrogate ranges.
352 * The rest will be handled by CH_UTF16MUNGED
353 * see utf16_munged_pull().
355 c
= SVAL(state
->password_buffer
, idx
);
359 SSVAL(state
->password_buffer
, idx
, c
);
361 ok
= convert_string_talloc(frame
,
362 CH_UTF16MUNGED
, CH_UTF8
,
363 state
->password_buffer
, len
* 2,
364 (void *)&utf8_pw
, &utf8_len
);
366 DEBUG(0, ("%s: convert_string_talloc() failed\n",
372 ok
= convert_string_talloc(frame
,
373 CH_UTF16MUNGED
, CH_UNIX
,
374 state
->password_buffer
, len
* 2,
375 (void *)&unix_pw
, &unix_len
);
380 if (utf8_len
!= unix_len
) {
384 cmp
= memcmp((const uint8_t *)utf8_pw
,
385 (const uint8_t *)unix_pw
,
391 new_pw
= talloc_strdup(mem_ctx
, utf8_pw
);
392 if (new_pw
== NULL
) {
396 talloc_set_name_const(new_pw
, __func__
);
401 for (i
= 0; i
< len
; i
++) {
405 state
->tmp
= state
->password_buffer
[i
] & 0x7f;
406 if (state
->tmp
== 0) {
407 state
->tmp
= state
->password_buffer
[i
] >> 1;
409 if (state
->tmp
== 0) {
412 state
->password_buffer
[i
] = state
->tmp
;
414 state
->password_buffer
[i
] = '\0';
416 new_pw
= talloc_strdup(mem_ctx
, (const char *)state
->password_buffer
);
417 if (new_pw
== NULL
) {
421 talloc_set_name_const(new_pw
, __func__
);
427 * Generate an array of unique text strings all of the same length.
428 * The returned string will be allocated.
429 * Returns NULL if the number of unique combinations cannot be created.
431 * Characters used are: abcdefghijklmnopqrstuvwxyz0123456789+_-#.,
433 _PUBLIC_
char** generate_unique_strs(TALLOC_CTX
*mem_ctx
, size_t len
,
436 const char *c_list
= "abcdefghijklmnopqrstuvwxyz0123456789+_-#.,";
437 const unsigned c_size
= 42;
442 if (num
== 0 || len
== 0)
445 strs
= talloc_array(mem_ctx
, char *, num
);
446 if (strs
== NULL
) return NULL
;
448 for (i
= 0; i
< num
; i
++) {
449 char *retstr
= (char *)talloc_size(strs
, len
+ 1);
450 if (retstr
== NULL
) {
455 for (j
= 0; j
< len
; j
++) {
456 retstr
[j
] = c_list
[rem
% c_size
];
462 /* we were not able to fit the number of
463 * combinations asked for in the length
465 DEBUG(0,(__location__
": Too many combinations %u for length %u\n",
466 num
, (unsigned)len
));