2 * Copyright (c) 2005-2008 Daniel Braniss <danny@cs.huji.ac.il>
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
14 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 | $Id: auth_subr.c,v 2.2 2007/06/01 08:09:37 danny Exp $
32 #include <sys/param.h>
33 #include <sys/types.h>
34 #include <sys/socket.h>
35 #include <sys/sysctl.h>
37 #include <netinet/in.h>
38 #include <netinet/tcp.h>
39 #include <arpa/inet.h>
50 #include "iscontrol.h"
53 chapMD5(char id
, char *cp
, char *chapSecret
, unsigned char *digest
)
63 MD5Update(&ctx
, &id
, 1);
65 if((len
= str2bin(chapSecret
, &tmp
)) == 0) {
69 MD5Update(&ctx
, tmp
, len
);
72 if((len
= str2bin(cp
, &tmp
)) == 0) {
76 MD5Update(&ctx
, tmp
, len
);
79 MD5Final(digest
, &ctx
);
86 chapSHA1(char id
, char *cp
, char *chapSecret
, unsigned char *digest
)
96 SHA1_Update(&ctx
, &id
, 1);
98 if((len
= str2bin(chapSecret
, &tmp
)) == 0) {
102 SHA1_Update(&ctx
, tmp
, len
);
105 if((len
= str2bin(cp
, &tmp
)) == 0) {
109 SHA1_Update(&ctx
, tmp
, len
);
112 SHA1_Final(digest
, &ctx
);
118 | the input text format can be anything that the rfc3270 defines
119 | (see section 5.1 and str2bin)
120 | digest length for md5 is 128bits, and for sha1 is 160bits.
121 | digest is an ASCII string which represents the bits in
122 | hexadecimal or base64 according to the challenge(cp) format
125 chapDigest(char *ap
, char id
, char *cp
, char *chapSecret
)
128 unsigned char digest
[20];
134 if(strcmp(ap
, "5") == 0 && chapMD5(id
, cp
, chapSecret
, digest
) == 0)
137 if(strcmp(ap
, "7") == 0 && chapSHA1(id
, cp
, chapSecret
, digest
) == 0)
141 sprintf(encoding
, "%.2s", cp
);
142 return bin2str(encoding
, digest
, len
);
149 genChapChallenge(char *encoding
, size_t len
)
152 unsigned char tmp
[1024];
154 if(len
> sizeof(tmp
))
157 if((fd
= open("/dev/random", O_RDONLY
)) != -1) {
160 return bin2str(encoding
, tmp
, len
);
162 perror("/dev/random");
163 // make up something ...
169 puke(char *str
, unsigned char *dg
, int len
)
171 printf("%3d] %s\n 0x", len
, str
);
173 printf("%02x", *dg
++);
177 main(int cc
, char **vv
)
179 char *p
, *ap
, *ip
, *cp
, *chapSecret
, *digest
;
184 chapSecret
= "0xa5aff013dd839b1edd31ee73a1df0b1b";
185 // chapSecret = "abcdefghijklmnop";
186 len
= str2bin(chapSecret
, &cp
);
187 puke(chapSecret
, cp
, len
);
193 if((digest
= chapDigest(ap
, ip
, cp
, chapSecret
)) != NULL
) {
194 len
= str2bin(digest
, &cp
);
195 puke(digest
, cp
, len
);
198 printf("%d] %s\n", 24, genChallenge("0X", 24));