Copy scram.erl from upstream, renamed to scram2.erl
This commit is contained in:
parent
ff61b1a2e1
commit
db91c97614
|
@ -0,0 +1,191 @@
|
||||||
|
%%%----------------------------------------------------------------------
|
||||||
|
%%% File : scram.erl
|
||||||
|
%%% Author : Stephen Röttger <stephen.roettger@googlemail.com>
|
||||||
|
%%% Purpose : SCRAM (RFC 5802)
|
||||||
|
%%% Created : 7 Aug 2011 by Stephen Röttger <stephen.roettger@googlemail.com>
|
||||||
|
%%%
|
||||||
|
%%%
|
||||||
|
%%% ejabberd, Copyright (C) 2002-2013 ProcessOne
|
||||||
|
%%%
|
||||||
|
%%% This program is free software; you can redistribute it and/or
|
||||||
|
%%% modify it under the terms of the GNU General Public License as
|
||||||
|
%%% published by the Free Software Foundation; either version 2 of the
|
||||||
|
%%% License, or (at your option) any later version.
|
||||||
|
%%%
|
||||||
|
%%% This program is distributed in the hope that it will be useful,
|
||||||
|
%%% but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
%%% MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
||||||
|
%%% General Public License for more details.
|
||||||
|
%%%
|
||||||
|
%%% You should have received a copy of the GNU General Public License
|
||||||
|
%%% along with this program; if not, write to the Free Software
|
||||||
|
%%% Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA
|
||||||
|
%%% 02111-1307 USA
|
||||||
|
%%%
|
||||||
|
%%%----------------------------------------------------------------------
|
||||||
|
|
||||||
|
-module(scram).
|
||||||
|
|
||||||
|
-author('stephen.roettger@googlemail.com').
|
||||||
|
|
||||||
|
-include("ejabberd.hrl").
|
||||||
|
|
||||||
|
%% External exports
|
||||||
|
%% ejabberd doesn't implement SASLPREP, so we use the similar RESOURCEPREP instead
|
||||||
|
-export([ % Core SCRAM functions
|
||||||
|
salted_password/3,
|
||||||
|
stored_key/1,
|
||||||
|
server_key/1,
|
||||||
|
server_signature/2,
|
||||||
|
client_signature/2,
|
||||||
|
client_key/1,
|
||||||
|
client_key/2]).
|
||||||
|
|
||||||
|
-export([
|
||||||
|
enabled/1,
|
||||||
|
iterations/0,
|
||||||
|
iterations/1,
|
||||||
|
password_to_scram/1,
|
||||||
|
password_to_scram/2,
|
||||||
|
check_password/2,
|
||||||
|
check_digest/4
|
||||||
|
]).
|
||||||
|
|
||||||
|
-export([serialize/1, deserialize/1]).
|
||||||
|
|
||||||
|
-export([scram_to_tuple/1]).
|
||||||
|
|
||||||
|
-define(SALT_LENGTH, 16).
|
||||||
|
-define(SCRAM_DEFAULT_ITERATION_COUNT, 4096).
|
||||||
|
-define(SCRAM_SERIAL_PREFIX, "==SCRAM==,").
|
||||||
|
|
||||||
|
-spec salted_password(binary(), binary(), non_neg_integer()) -> binary().
|
||||||
|
salted_password(Password, Salt, IterationCount) ->
|
||||||
|
hi(jlib:resourceprep(Password), Salt, IterationCount).
|
||||||
|
|
||||||
|
-spec client_key(binary()) -> binary().
|
||||||
|
client_key(SaltedPassword) ->
|
||||||
|
crypto_hmac(sha, SaltedPassword, <<"Client Key">>).
|
||||||
|
|
||||||
|
-spec stored_key(binary()) -> binary().
|
||||||
|
stored_key(ClientKey) -> crypto:hash(sha, ClientKey).
|
||||||
|
|
||||||
|
-spec server_key(binary()) -> binary().
|
||||||
|
server_key(SaltedPassword) ->
|
||||||
|
crypto_hmac(sha, SaltedPassword, <<"Server Key">>).
|
||||||
|
|
||||||
|
-spec client_signature(binary(), binary()) -> binary().
|
||||||
|
client_signature(StoredKey, AuthMessage) ->
|
||||||
|
crypto_hmac(sha, StoredKey, AuthMessage).
|
||||||
|
|
||||||
|
-spec client_key(binary(), binary()) -> binary().
|
||||||
|
client_key(ClientProof, ClientSignature) ->
|
||||||
|
list_to_binary(lists:zipwith(fun (X, Y) -> X bxor Y end,
|
||||||
|
binary_to_list(ClientProof),
|
||||||
|
binary_to_list(ClientSignature))).
|
||||||
|
|
||||||
|
-spec server_signature(binary(), binary()) -> binary().
|
||||||
|
server_signature(ServerKey, AuthMessage) ->
|
||||||
|
crypto_hmac(sha, ServerKey, AuthMessage).
|
||||||
|
|
||||||
|
hi(Password, Salt, IterationCount) ->
|
||||||
|
U1 = crypto_hmac(sha, Password, <<Salt/binary, 0, 0, 0, 1>>),
|
||||||
|
list_to_binary(lists:zipwith(fun (X, Y) -> X bxor Y end,
|
||||||
|
binary_to_list(U1),
|
||||||
|
binary_to_list(hi_round(Password, U1,
|
||||||
|
IterationCount - 1)))).
|
||||||
|
|
||||||
|
hi_round(Password, UPrev, 1) ->
|
||||||
|
crypto_hmac(sha, Password, UPrev);
|
||||||
|
hi_round(Password, UPrev, IterationCount) ->
|
||||||
|
U = crypto_hmac(sha, Password, UPrev),
|
||||||
|
list_to_binary(lists:zipwith(fun (X, Y) -> X bxor Y end,
|
||||||
|
binary_to_list(U),
|
||||||
|
binary_to_list(hi_round(Password, U,
|
||||||
|
IterationCount - 1)))).
|
||||||
|
|
||||||
|
|
||||||
|
enabled(Host) ->
|
||||||
|
case ejabberd_config:get_local_option(auth_opts, Host) of
|
||||||
|
undefined ->
|
||||||
|
false;
|
||||||
|
AuthOpts ->
|
||||||
|
{password_format, scram} == lists:keyfind(password_format, 1, AuthOpts)
|
||||||
|
end.
|
||||||
|
|
||||||
|
iterations() -> ?SCRAM_DEFAULT_ITERATION_COUNT.
|
||||||
|
|
||||||
|
iterations(Host) ->
|
||||||
|
case ejabberd_config:get_local_option(auth_opts, Host) of
|
||||||
|
undefined ->
|
||||||
|
iterations();
|
||||||
|
AuthOpts ->
|
||||||
|
case lists:keyfind(scram_iterations, 1, AuthOpts) of
|
||||||
|
false -> iterations();
|
||||||
|
{_, Iterations} -> Iterations
|
||||||
|
end
|
||||||
|
end.
|
||||||
|
|
||||||
|
password_to_scram(Password) ->
|
||||||
|
password_to_scram(Password, ?SCRAM_DEFAULT_ITERATION_COUNT).
|
||||||
|
|
||||||
|
password_to_scram(#scram{} = Password, _) ->
|
||||||
|
Password;
|
||||||
|
password_to_scram(Password, IterationCount) ->
|
||||||
|
Salt = crypto:rand_bytes(?SALT_LENGTH),
|
||||||
|
SaltedPassword = salted_password(Password, Salt, IterationCount),
|
||||||
|
StoredKey = stored_key(scram:client_key(SaltedPassword)),
|
||||||
|
ServerKey = server_key(SaltedPassword),
|
||||||
|
#scram{storedkey = base64:encode(StoredKey),
|
||||||
|
serverkey = base64:encode(ServerKey),
|
||||||
|
salt = base64:encode(Salt),
|
||||||
|
iterationcount = IterationCount}.
|
||||||
|
|
||||||
|
check_password(Password, Scram) ->
|
||||||
|
IterationCount = Scram#scram.iterationcount,
|
||||||
|
Salt = base64:decode(Scram#scram.salt),
|
||||||
|
SaltedPassword = salted_password(Password, Salt, IterationCount),
|
||||||
|
StoredKey = stored_key(client_key(SaltedPassword)),
|
||||||
|
(base64:decode(Scram#scram.storedkey) == StoredKey).
|
||||||
|
|
||||||
|
serialize(#scram{storedkey = StoredKey, serverkey = ServerKey,
|
||||||
|
salt = Salt, iterationcount = IterationCount})->
|
||||||
|
IterationCountBin = integer_to_binary(IterationCount),
|
||||||
|
<< <<?SCRAM_SERIAL_PREFIX>>/binary,
|
||||||
|
StoredKey/binary,$,,ServerKey/binary,
|
||||||
|
$,,Salt/binary,$,,IterationCountBin/binary>>.
|
||||||
|
|
||||||
|
deserialize(<<?SCRAM_SERIAL_PREFIX, Serialized/binary>>) ->
|
||||||
|
case catch binary:split(Serialized, <<",">>, [global]) of
|
||||||
|
[StoredKey, ServerKey,Salt,IterationCount] ->
|
||||||
|
{ok, #scram{storedkey = StoredKey,
|
||||||
|
serverkey = ServerKey,
|
||||||
|
salt = Salt,
|
||||||
|
iterationcount = binary_to_integer(IterationCount)}};
|
||||||
|
_ ->
|
||||||
|
?WARNING_MSG("Incorrect serialized SCRAM: ~p, ~p", [Serialized]),
|
||||||
|
{error, incorrect_scram}
|
||||||
|
end;
|
||||||
|
deserialize(Bin) ->
|
||||||
|
?WARNING_MSG("Corrupted serialized SCRAM: ~p, ~p", [Bin]),
|
||||||
|
{error, corrupted_scram}.
|
||||||
|
|
||||||
|
-spec scram_to_tuple(scram()) -> {binary(), binary(), binary(), non_neg_integer()}.
|
||||||
|
scram_to_tuple(Scram) ->
|
||||||
|
{base64:decode(Scram#scram.storedkey),
|
||||||
|
base64:decode(Scram#scram.serverkey),
|
||||||
|
base64:decode(Scram#scram.salt),
|
||||||
|
Scram#scram.iterationcount}.
|
||||||
|
|
||||||
|
-spec check_digest(scram(), binary(), fun(), binary()) -> boolean().
|
||||||
|
check_digest(#scram{storedkey = StoredKey}, Digest, DigestGen, Password) ->
|
||||||
|
Passwd = base64:decode(StoredKey),
|
||||||
|
ejabberd_auth:check_digest(Digest, DigestGen, Password, Passwd).
|
||||||
|
|
||||||
|
-ifdef(no_crypto_hmac).
|
||||||
|
crypto_hmac(sha, Key, Data) ->
|
||||||
|
crypto:sha_mac(Key, Data).
|
||||||
|
-else.
|
||||||
|
crypto_hmac(sha, Key, Data) ->
|
||||||
|
crypto:hmac(sha, Key, Data).
|
||||||
|
-endif.
|
Loading…
Reference in New Issue