You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
98 lines
2.9 KiB
98 lines
2.9 KiB
3 years ago
|
// Copyright 2018 by David A. Golden. All rights reserved.
|
||
|
//
|
||
|
// Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||
|
// not use this file except in compliance with the License. You may obtain
|
||
|
// a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
package scram
|
||
|
|
||
|
import (
|
||
|
"crypto/hmac"
|
||
|
"crypto/rand"
|
||
|
"encoding/base64"
|
||
|
"strings"
|
||
|
)
|
||
|
|
||
|
// NonceGeneratorFcn defines a function that returns a string of high-quality
|
||
|
// random printable ASCII characters EXCLUDING the comma (',') character. The
|
||
|
// default nonce generator provides Base64 encoding of 24 bytes from
|
||
|
// crypto/rand.
|
||
|
type NonceGeneratorFcn func() string
|
||
|
|
||
|
// derivedKeys collects the three cryptographically derived values
|
||
|
// into one struct for caching.
|
||
|
type derivedKeys struct {
|
||
|
ClientKey []byte
|
||
|
StoredKey []byte
|
||
|
ServerKey []byte
|
||
|
}
|
||
|
|
||
|
// KeyFactors represent the two server-provided factors needed to compute
|
||
|
// client credentials for authentication. Salt is decoded bytes (i.e. not
|
||
|
// base64), but in string form so that KeyFactors can be used as a map key for
|
||
|
// cached credentials.
|
||
|
type KeyFactors struct {
|
||
|
Salt string
|
||
|
Iters int
|
||
|
}
|
||
|
|
||
|
// StoredCredentials are the values that a server must store for a given
|
||
|
// username to allow authentication. They include the salt and iteration
|
||
|
// count, plus the derived values to authenticate a client and for the server
|
||
|
// to authenticate itself back to the client.
|
||
|
//
|
||
|
// NOTE: these are specific to a given hash function. To allow a user to
|
||
|
// authenticate with either SCRAM-SHA-1 or SCRAM-SHA-256, two sets of
|
||
|
// StoredCredentials must be created and stored, one for each hash function.
|
||
|
type StoredCredentials struct {
|
||
|
KeyFactors
|
||
|
StoredKey []byte
|
||
|
ServerKey []byte
|
||
|
}
|
||
|
|
||
|
// CredentialLookup is a callback to provide StoredCredentials for a given
|
||
|
// username. This is used to configure Server objects.
|
||
|
//
|
||
|
// NOTE: these are specific to a given hash function. The callback provided
|
||
|
// to a Server with a given hash function must provide the corresponding
|
||
|
// StoredCredentials.
|
||
|
type CredentialLookup func(string) (StoredCredentials, error)
|
||
|
|
||
|
func defaultNonceGenerator() string {
|
||
|
raw := make([]byte, 24)
|
||
|
nonce := make([]byte, base64.StdEncoding.EncodedLen(len(raw)))
|
||
|
rand.Read(raw)
|
||
|
base64.StdEncoding.Encode(nonce, raw)
|
||
|
return string(nonce)
|
||
|
}
|
||
|
|
||
|
func encodeName(s string) string {
|
||
|
return strings.Replace(strings.Replace(s, "=", "=3D", -1), ",", "=2C", -1)
|
||
|
}
|
||
|
|
||
|
func decodeName(s string) (string, error) {
|
||
|
// TODO Check for = not followed by 2C or 3D
|
||
|
return strings.Replace(strings.Replace(s, "=2C", ",", -1), "=3D", "=", -1), nil
|
||
|
}
|
||
|
|
||
|
func computeHash(hg HashGeneratorFcn, b []byte) []byte {
|
||
|
h := hg()
|
||
|
h.Write(b)
|
||
|
return h.Sum(nil)
|
||
|
}
|
||
|
|
||
|
func computeHMAC(hg HashGeneratorFcn, key, data []byte) []byte {
|
||
|
mac := hmac.New(hg, key)
|
||
|
mac.Write(data)
|
||
|
return mac.Sum(nil)
|
||
|
}
|
||
|
|
||
|
func xorBytes(a, b []byte) []byte {
|
||
|
// TODO check a & b are same length, or just xor to smallest
|
||
|
xor := make([]byte, len(a))
|
||
|
for i := range a {
|
||
|
xor[i] = a[i] ^ b[i]
|
||
|
}
|
||
|
return xor
|
||
|
}
|