diff options
author | Scott Long <scottl@FreeBSD.org> | 2007-07-24 15:35:02 +0000 |
---|---|---|
committer | Scott Long <scottl@FreeBSD.org> | 2007-07-24 15:35:02 +0000 |
commit | c5933b208668259c82612d99f4f1a6963fe29526 (patch) | |
tree | 2ea97a85d2ad3ef80513af697b1ce0fa11f34156 /sbin/iscontrol/auth_subr.c | |
parent | aa222db26f8866f556445ce647ba39da05f73bf9 (diff) | |
download | src-c5933b208668259c82612d99f4f1a6963fe29526.tar.gz src-c5933b208668259c82612d99f4f1a6963fe29526.zip |
Introduce Danny Braniss' iSCSI initiator, version 2.0.99. Please read the
included man pages on how to use it. This code is still somewhat experimental
but has been successfully tested on a number of targets. Many thanks to
Danny for contributing this.
Approved by: re
Notes
Notes:
svn path=/head/; revision=171568
Diffstat (limited to 'sbin/iscontrol/auth_subr.c')
-rw-r--r-- | sbin/iscontrol/auth_subr.c | 208 |
1 files changed, 208 insertions, 0 deletions
diff --git a/sbin/iscontrol/auth_subr.c b/sbin/iscontrol/auth_subr.c new file mode 100644 index 000000000000..8381687fca51 --- /dev/null +++ b/sbin/iscontrol/auth_subr.c @@ -0,0 +1,208 @@ +/*- + * Copyright (c) 2005-2007 Daniel Braniss <danny@cs.huji.ac.il> + * All rights reserved. + * + * Redistribution and use in source and binary forms, with or without + * modification, are permitted provided that the following conditions + * are met: + * 1. Redistributions of source code must retain the above copyright + * notice, this list of conditions and the following disclaimer. + * 2. Redistributions in binary form must reproduce the above copyright + * notice, this list of conditions and the following disclaimer in the + * documentation and/or other materials provided with the distribution. + * + * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND + * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE + * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE + * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE + * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL + * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS + * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT + * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY + * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF + * SUCH DAMAGE. + * + */ + +/* + | $Id: auth_subr.c,v 2.2 2007/06/01 08:09:37 danny Exp $ + */ + +#include <sys/cdefs.h> +__FBSDID("$FreeBSD$"); + +#include <sys/param.h> +#include <sys/types.h> +#include <sys/socket.h> +#include <sys/sysctl.h> + +#include <netinet/in.h> +#include <netinet/tcp.h> +#include <arpa/inet.h> +#if __FreeBSD_version < 500000 +#include <sys/time.h> +#endif +#include <unistd.h> +#include <stdlib.h> +#include <stdio.h> +#include <string.h> +#include <fcntl.h> + +#include <md5.h> +#include <sha.h> + +#include "iscsi.h" +#include "iscontrol.h" +#include "pdu.h" + +static int +chapMD5(char id, char *cp, char *chapSecret, unsigned char *digest) +{ + MD5_CTX ctx; + char *tmp; + int len; + + debug_called(3); + + MD5Init(&ctx); + + MD5Update(&ctx, &id, 1); + + if((len = str2bin(chapSecret, &tmp)) == 0) { + // print error + return -1; + } + MD5Update(&ctx, tmp, len); + free(tmp); + + if((len = str2bin(cp, &tmp)) == 0) { + // print error + return -1; + } + MD5Update(&ctx, tmp, len); + free(tmp); + + MD5Final(digest, &ctx); + + + return 0; +} + +static int +chapSHA1(char id, char *cp, char *chapSecret, unsigned char *digest) +{ + SHA1_CTX ctx; + char *tmp; + int len; + + debug_called(3); + + SHA1_Init(&ctx); + + SHA1_Update(&ctx, &id, 1); + + if((len = str2bin(chapSecret, &tmp)) == 0) { + // print error + return -1; + } + SHA1_Update(&ctx, tmp, len); + free(tmp); + + if((len = str2bin(cp, &tmp)) == 0) { + // print error + return -1; + } + SHA1_Update(&ctx, tmp, len); + free(tmp); + + SHA1_Final(digest, &ctx); + + return 0; + +} +/* + | the input text format can be anything that the rfc3270 defines + | (see section 5.1 and str2bin) + | digest length for md5 is 128bits, and for sha1 is 160bits. + | digest is an ASCII string which represents the bits in + | hexadecimal or base64 according to the challenge(cp) format + */ +char * +chapDigest(char *ap, char id, char *cp, char *chapSecret) +{ + int len; + unsigned char digest[20]; + char encoding[3]; + + debug_called(3); + + len = 0; + if(strcmp(ap, "5") == 0 && chapMD5(id, cp, chapSecret, digest) == 0) + len = 16; + else + if(strcmp(ap, "7") == 0 && chapSHA1(id, cp, chapSecret, digest) == 0) + len = 20; + + if(len) { + sprintf(encoding, "%.2s", cp); + return bin2str(encoding, digest, len); + } + + return NULL; +} + +char * +genChapChallenge(char *encoding, int len) +{ + int fd; + unsigned char tmp[1024]; + + if(len > sizeof(tmp)) + return NULL; + + if((fd = open("/dev/random", O_RDONLY)) != -1) { + read(fd, tmp, len); + close(fd); + return bin2str(encoding, tmp, len); + } + perror("/dev/random"); + // make up something ... + return NULL; +} + +#ifdef TEST_AUTH +static void +puke(char *str, unsigned char *dg, int len) +{ + printf("%3d] %s\n 0x", len, str); + while(len-- > 0) + printf("%02x", *dg++); + printf("\n"); +} + +main(int cc, char **vv) +{ + char *p, *ap, *ip, *cp, *chapSecret, *digest; + int len; + +#if 0 + ap = "5"; + chapSecret = "0xa5aff013dd839b1edd31ee73a1df0b1b"; +// chapSecret = "abcdefghijklmnop"; + len = str2bin(chapSecret, &cp); + puke(chapSecret, cp, len); + + ip = "238"; + cp = "0xbd456029"; + + + if((digest = chapDigest(ap, ip, cp, chapSecret)) != NULL) { + len = str2bin(digest, &cp); + puke(digest, cp, len); + } +#else + printf("%d] %s\n", 24, genChallenge("0X", 24)); +#endif +} +#endif |