summaryrefslogtreecommitdiffstats
path: root/crypto/heimdal/lib/kadm5/password_quality.c
diff options
context:
space:
mode:
Diffstat (limited to 'crypto/heimdal/lib/kadm5/password_quality.c')
-rw-r--r--crypto/heimdal/lib/kadm5/password_quality.c512
1 files changed, 0 insertions, 512 deletions
diff --git a/crypto/heimdal/lib/kadm5/password_quality.c b/crypto/heimdal/lib/kadm5/password_quality.c
deleted file mode 100644
index 2610ce8..0000000
--- a/crypto/heimdal/lib/kadm5/password_quality.c
+++ /dev/null
@@ -1,512 +0,0 @@
-/*
- * Copyright (c) 1997-2000, 2003-2005 Kungliga Tekniska Högskolan
- * (Royal Institute of Technology, Stockholm, Sweden).
- * All rights reserved.
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted provided that the following conditions
- * are met:
- *
- * 1. Redistributions of source code must retain the above copyright
- * notice, this list of conditions and the following disclaimer.
- *
- * 2. Redistributions in binary form must reproduce the above copyright
- * notice, this list of conditions and the following disclaimer in the
- * documentation and/or other materials provided with the distribution.
- *
- * 3. Neither the name of the Institute nor the names of its contributors
- * may be used to endorse or promote products derived from this software
- * without specific prior written permission.
- *
- * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
- * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
- * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
- * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
- * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
- * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
- * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
- * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
- * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
- * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
- * SUCH DAMAGE.
- */
-
-#include "kadm5_locl.h"
-#include "kadm5-pwcheck.h"
-
-RCSID("$Id: password_quality.c 17595 2006-05-30 21:51:55Z lha $");
-
-#ifdef HAVE_SYS_WAIT_H
-#include <sys/wait.h>
-#endif
-#ifdef HAVE_DLFCN_H
-#include <dlfcn.h>
-#endif
-
-static int
-min_length_passwd_quality (krb5_context context,
- krb5_principal principal,
- krb5_data *pwd,
- const char *opaque,
- char *message,
- size_t length)
-{
- uint32_t min_length = krb5_config_get_int_default(context, NULL, 6,
- "password_quality",
- "min_length",
- NULL);
-
- if (pwd->length < min_length) {
- strlcpy(message, "Password too short", length);
- return 1;
- } else
- return 0;
-}
-
-static const char *
-min_length_passwd_quality_v0 (krb5_context context,
- krb5_principal principal,
- krb5_data *pwd)
-{
- static char message[1024];
- int ret;
-
- message[0] = '\0';
-
- ret = min_length_passwd_quality(context, principal, pwd, NULL,
- message, sizeof(message));
- if (ret)
- return message;
- return NULL;
-}
-
-
-static int
-char_class_passwd_quality (krb5_context context,
- krb5_principal principal,
- krb5_data *pwd,
- const char *opaque,
- char *message,
- size_t length)
-{
- const char *classes[] = {
- "ABCDEFGHIJKLMNOPQRSTUVWXYZ",
- "abcdefghijklmnopqrstuvwxyz",
- "1234567890",
- "!@#$%^&*()/?<>,.{[]}\\|'~`\" "
- };
- int i, counter = 0, req_classes;
- size_t len;
- char *pw;
-
- req_classes = krb5_config_get_int_default(context, NULL, 3,
- "password_quality",
- "min_classes",
- NULL);
-
- len = pwd->length + 1;
- pw = malloc(len);
- if (pw == NULL) {
- strlcpy(message, "out of memory", length);
- return 1;
- }
- strlcpy(pw, pwd->data, len);
- len = strlen(pw);
-
- for (i = 0; i < sizeof(classes)/sizeof(classes[0]); i++) {
- if (strcspn(pw, classes[i]) < len)
- counter++;
- }
- memset(pw, 0, pwd->length + 1);
- free(pw);
- if (counter < req_classes) {
- snprintf(message, length,
- "Password doesn't meet complexity requirement.\n"
- "Add more characters from the following classes:\n"
- "1. English uppercase characters (A through Z)\n"
- "2. English lowercase characters (a through z)\n"
- "3. Base 10 digits (0 through 9)\n"
- "4. Nonalphanumeric characters (e.g., !, $, #, %%)");
- return 1;
- }
- return 0;
-}
-
-static int
-external_passwd_quality (krb5_context context,
- krb5_principal principal,
- krb5_data *pwd,
- const char *opaque,
- char *message,
- size_t length)
-{
- krb5_error_code ret;
- const char *program;
- char *p;
- pid_t child;
- int status;
- char reply[1024];
- FILE *in = NULL, *out = NULL, *error = NULL;
-
- if (memchr(pwd->data, pwd->length, '\n') != NULL) {
- snprintf(message, length, "password contains newline, "
- "not valid for external test");
- return 1;
- }
-
- program = krb5_config_get_string(context, NULL,
- "password_quality",
- "external_program",
- NULL);
- if (program == NULL) {
- snprintf(message, length, "external password quality "
- "program not configured");
- return 1;
- }
-
- ret = krb5_unparse_name(context, principal, &p);
- if (ret) {
- strlcpy(message, "out of memory", length);
- return 1;
- }
-
- child = pipe_execv(&in, &out, &error, program, p, NULL);
- if (child < 0) {
- snprintf(message, length, "external password quality "
- "program failed to execute for principal %s", p);
- free(p);
- return 1;
- }
-
- fprintf(in, "principal: %s\n"
- "new-password: %.*s\n"
- "end\n",
- p, (int)pwd->length, (char *)pwd->data);
-
- fclose(in);
-
- if (fgets(reply, sizeof(reply), out) == NULL) {
-
- if (fgets(reply, sizeof(reply), error) == NULL) {
- snprintf(message, length, "external password quality "
- "program failed without error");
-
- } else {
- reply[strcspn(reply, "\n")] = '\0';
- snprintf(message, length, "External password quality "
- "program failed: %s", reply);
- }
-
- fclose(out);
- fclose(error);
- waitpid(child, &status, 0);
- return 1;
- }
- reply[strcspn(reply, "\n")] = '\0';
-
- fclose(out);
- fclose(error);
-
- if (waitpid(child, &status, 0) < 0) {
- snprintf(message, length, "external program failed: %s", reply);
- free(p);
- return 1;
- }
- if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) {
- snprintf(message, length, "external program failed: %s", reply);
- free(p);
- return 1;
- }
-
- if (strcmp(reply, "APPROVED") != 0) {
- snprintf(message, length, "%s", reply);
- free(p);
- return 1;
- }
-
- free(p);
-
- return 0;
-}
-
-
-static kadm5_passwd_quality_check_func_v0 passwd_quality_check =
- min_length_passwd_quality_v0;
-
-struct kadm5_pw_policy_check_func builtin_funcs[] = {
- { "minimum-length", min_length_passwd_quality },
- { "character-class", char_class_passwd_quality },
- { "external-check", external_passwd_quality },
- { NULL }
-};
-struct kadm5_pw_policy_verifier builtin_verifier = {
- "builtin",
- KADM5_PASSWD_VERSION_V1,
- "Heimdal builtin",
- builtin_funcs
-};
-
-static struct kadm5_pw_policy_verifier **verifiers;
-static int num_verifiers;
-
-/*
- * setup the password quality hook
- */
-
-#ifndef RTLD_NOW
-#define RTLD_NOW 0
-#endif
-
-void
-kadm5_setup_passwd_quality_check(krb5_context context,
- const char *check_library,
- const char *check_function)
-{
-#ifdef HAVE_DLOPEN
- void *handle;
- void *sym;
- int *version;
- const char *tmp;
-
- if(check_library == NULL) {
- tmp = krb5_config_get_string(context, NULL,
- "password_quality",
- "check_library",
- NULL);
- if(tmp != NULL)
- check_library = tmp;
- }
- if(check_function == NULL) {
- tmp = krb5_config_get_string(context, NULL,
- "password_quality",
- "check_function",
- NULL);
- if(tmp != NULL)
- check_function = tmp;
- }
- if(check_library != NULL && check_function == NULL)
- check_function = "passwd_check";
-
- if(check_library == NULL)
- return;
- handle = dlopen(check_library, RTLD_NOW);
- if(handle == NULL) {
- krb5_warnx(context, "failed to open `%s'", check_library);
- return;
- }
- version = dlsym(handle, "version");
- if(version == NULL) {
- krb5_warnx(context,
- "didn't find `version' symbol in `%s'", check_library);
- dlclose(handle);
- return;
- }
- if(*version != KADM5_PASSWD_VERSION_V0) {
- krb5_warnx(context,
- "version of loaded library is %d (expected %d)",
- *version, KADM5_PASSWD_VERSION_V0);
- dlclose(handle);
- return;
- }
- sym = dlsym(handle, check_function);
- if(sym == NULL) {
- krb5_warnx(context,
- "didn't find `%s' symbol in `%s'",
- check_function, check_library);
- dlclose(handle);
- return;
- }
- passwd_quality_check = (kadm5_passwd_quality_check_func_v0) sym;
-#endif /* HAVE_DLOPEN */
-}
-
-#ifdef HAVE_DLOPEN
-
-static krb5_error_code
-add_verifier(krb5_context context, const char *check_library)
-{
- struct kadm5_pw_policy_verifier *v, **tmp;
- void *handle;
- int i;
-
- handle = dlopen(check_library, RTLD_NOW);
- if(handle == NULL) {
- krb5_warnx(context, "failed to open `%s'", check_library);
- return ENOENT;
- }
- v = dlsym(handle, "kadm5_password_verifier");
- if(v == NULL) {
- krb5_warnx(context,
- "didn't find `kadm5_password_verifier' symbol "
- "in `%s'", check_library);
- dlclose(handle);
- return ENOENT;
- }
- if(v->version != KADM5_PASSWD_VERSION_V1) {
- krb5_warnx(context,
- "version of loaded library is %d (expected %d)",
- v->version, KADM5_PASSWD_VERSION_V1);
- dlclose(handle);
- return EINVAL;
- }
- for (i = 0; i < num_verifiers; i++) {
- if (strcmp(v->name, verifiers[i]->name) == 0)
- break;
- }
- if (i < num_verifiers) {
- krb5_warnx(context, "password verifier library `%s' is already loaded",
- v->name);
- dlclose(handle);
- return 0;
- }
-
- tmp = realloc(verifiers, (num_verifiers + 1) * sizeof(*verifiers));
- if (tmp == NULL) {
- krb5_warnx(context, "out of memory");
- dlclose(handle);
- return 0;
- }
- verifiers = tmp;
- verifiers[num_verifiers] = v;
- num_verifiers++;
-
- return 0;
-}
-
-#endif
-
-krb5_error_code
-kadm5_add_passwd_quality_verifier(krb5_context context,
- const char *check_library)
-{
-#ifdef HAVE_DLOPEN
-
- if(check_library == NULL) {
- krb5_error_code ret;
- char **tmp;
-
- tmp = krb5_config_get_strings(context, NULL,
- "password_quality",
- "policy_libraries",
- NULL);
- if(tmp == NULL)
- return 0;
-
- while(tmp) {
- ret = add_verifier(context, *tmp);
- if (ret)
- return ret;
- tmp++;
- }
- }
- return add_verifier(context, check_library);
-#else
- return 0;
-#endif /* HAVE_DLOPEN */
-}
-
-/*
- *
- */
-
-static const struct kadm5_pw_policy_check_func *
-find_func(krb5_context context, const char *name)
-{
- const struct kadm5_pw_policy_check_func *f;
- char *module = NULL;
- const char *p, *func;
- int i;
-
- p = strchr(name, ':');
- if (p) {
- func = p + 1;
- module = strndup(name, p - name);
- if (module == NULL)
- return NULL;
- } else
- func = name;
-
- /* Find module in loaded modules first */
- for (i = 0; i < num_verifiers; i++) {
- if (module && strcmp(module, verifiers[i]->name) != 0)
- continue;
- for (f = verifiers[i]->funcs; f->name ; f++)
- if (strcmp(name, f->name) == 0) {
- if (module)
- free(module);
- return f;
- }
- }
- /* Lets try try the builtin modules */
- if (module == NULL || strcmp(module, "builtin") == 0) {
- for (f = builtin_verifier.funcs; f->name ; f++)
- if (strcmp(func, f->name) == 0) {
- if (module)
- free(module);
- return f;
- }
- }
- if (module)
- free(module);
- return NULL;
-}
-
-const char *
-kadm5_check_password_quality (krb5_context context,
- krb5_principal principal,
- krb5_data *pwd_data)
-{
- const struct kadm5_pw_policy_check_func *proc;
- static char error_msg[1024];
- const char *msg;
- char **v, **vp;
- int ret;
-
- /*
- * Check if we should use the old version of policy function.
- */
-
- v = krb5_config_get_strings(context, NULL,
- "password_quality",
- "policies",
- NULL);
- if (v == NULL) {
- msg = (*passwd_quality_check) (context, principal, pwd_data);
- krb5_set_error_string(context, "password policy failed: %s", msg);
- return msg;
- }
-
- error_msg[0] = '\0';
-
- msg = NULL;
- for(vp = v; *vp; vp++) {
- proc = find_func(context, *vp);
- if (proc == NULL) {
- msg = "failed to find password verifier function";
- krb5_set_error_string(context, "Failed to find password policy "
- "function: %s", *vp);
- break;
- }
- ret = (proc->func)(context, principal, pwd_data, NULL,
- error_msg, sizeof(error_msg));
- if (ret) {
- krb5_set_error_string(context, "Password policy "
- "%s failed with %s",
- proc->name, error_msg);
- msg = error_msg;
- break;
- }
- }
- krb5_config_free_strings(v);
-
- /* If the default quality check isn't used, lets check that the
- * old quality function the user have set too */
- if (msg == NULL && passwd_quality_check != min_length_passwd_quality_v0) {
- msg = (*passwd_quality_check) (context, principal, pwd_data);
- if (msg)
- krb5_set_error_string(context, "(old) password policy "
- "failed with %s", msg);
-
- }
- return msg;
-}
OpenPOWER on IntegriCloud