5#include "authenticationrealm.h"
6#include "credentialpassword_p.h"
9#include <QLoggingCategory>
10#include <QMessageAuthenticationCode>
14using namespace Qt::StringLiterals;
16Q_LOGGING_CATEGORY(C_CREDENTIALPASSWORD,
"cutelyst.plugin.credentialpassword", QtWarningMsg)
20 , d_ptr(new CredentialPasswordPrivate)
37 if (d->checkPassword(_user, authinfo)) {
40 qCDebug(C_CREDENTIALPASSWORD) <<
"Password didn't match";
43 qCDebug(C_CREDENTIALPASSWORD)
44 <<
"Unable to locate a user matching user info provided in realm";
52 return d->passwordField;
58 d->passwordField = fieldName;
64 return d->passwordType;
70 d->passwordType = type;
76 return d->passwordPreSalt;
88 return d->passwordPostSalt;
98bool slowEquals(
const QByteArray &a,
const QByteArray &b)
100 int diff = a.size() ^ b.size();
101 for (
int i = 0; i < a.size() && i < b.size(); i++) {
108#define HASH_SECTIONS 4
109#define HASH_ALGORITHM_INDEX 0
110#define HASH_ITERATION_INDEX 1
111#define HASH_SALT_INDEX 2
112#define HASH_PBKDF2_INDEX 3
117 QByteArrayList params = correctHash.split(
':');
118 if (params.size() < HASH_SECTIONS) {
122 int method = CredentialPasswordPrivate::cryptoStrToEnum(params.at(HASH_ALGORITHM_INDEX));
127 QByteArray pbkdf2Hash = QByteArray::fromBase64(params.at(HASH_PBKDF2_INDEX));
128 return slowEquals(pbkdf2Hash,
129 pbkdf2(
static_cast<QCryptographicHash::Algorithm
>(method),
131 params.at(HASH_SALT_INDEX),
132 params.at(HASH_ITERATION_INDEX).toInt(),
133 pbkdf2Hash.length()));
137 QCryptographicHash::Algorithm method,
144 QFile random(u
"/dev/urandom"_s);
145 if (random.open(QIODevice::ReadOnly)) {
146 salt = random.read(saltByteSize).toBase64();
149 salt = QUuid::createUuid().toRfc4122().toBase64();
154 const QByteArray methodStr = CredentialPasswordPrivate::cryptoEnumToStr(method);
155 return methodStr +
':' + QByteArray::number(iterations) +
':' + salt +
':' +
156 pbkdf2(method, password, salt, iterations, hashByteSize).toBase64();
161 return createPassword(password, QCryptographicHash::Sha512, 10000, 16, 16);
169 const QByteArray &password,
170 const QByteArray &salt,
176 if (rounds <= 0 || keyLength <= 0) {
177 qCCritical(C_CREDENTIALPASSWORD,
"PBKDF2 ERROR: Invalid parameters.");
181 if (salt.size() == 0 || salt.size() > std::numeric_limits<int>::max() - 4) {
184 key.reserve(keyLength);
186 int saltSize = salt.size();
187 QByteArray asalt = salt;
188 asalt.resize(saltSize + 4);
193 QMessageAuthenticationCode code(method, password);
195 for (
int count = 1, remainingBytes = keyLength; remainingBytes > 0; ++count) {
196 asalt[saltSize + 0] =
static_cast<char>((count >> 24) & 0xff);
197 asalt[saltSize + 1] =
static_cast<char>((count >> 16) & 0xff);
198 asalt[saltSize + 2] =
static_cast<char>((count >> 8) & 0xff);
199 asalt[saltSize + 3] =
static_cast<char>(count & 0xff);
203 obuf = d1 = code.result();
205 for (
int i = 1; i < rounds; ++i) {
209 auto it = obuf.begin();
210 auto d1It = d1.cbegin();
211 while (d1It != d1.cend()) {
219 remainingBytes -= obuf.size();
222 key.truncate(keyLength);
227 const QByteArray &key,
228 const QByteArray &message)
230 return QMessageAuthenticationCode::hash(key, message, method);
236 const QString password = passwordPreSalt + authinfo.value(passwordField) + passwordPostSalt;
237 const QString storedPassword = user.
value(passwordField).toString();
242 return storedPassword == password;
244 qCDebug(C_CREDENTIALPASSWORD) <<
"CredentialPassword is set to ignore password check";
251QByteArray CredentialPasswordPrivate::cryptoEnumToStr(QCryptographicHash::Algorithm method)
253 QByteArray hashmethod;
255#ifndef QT_CRYPTOGRAPHICHASH_ONLY_SHA1
256 if (method == QCryptographicHash::Md4) {
257 hashmethod = QByteArrayLiteral(
"Md4");
258 }
else if (method == QCryptographicHash::Md5) {
259 hashmethod = QByteArrayLiteral(
"Md5");
262 if (method == QCryptographicHash::Sha1) {
263 hashmethod = QByteArrayLiteral(
"Sha1");
265#ifndef QT_CRYPTOGRAPHICHASH_ONLY_SHA1
266 if (method == QCryptographicHash::Sha224) {
267 hashmethod = QByteArrayLiteral(
"Sha224");
268 }
else if (method == QCryptographicHash::Sha256) {
269 hashmethod = QByteArrayLiteral(
"Sha256");
270 }
else if (method == QCryptographicHash::Sha384) {
271 hashmethod = QByteArrayLiteral(
"Sha384");
272 }
else if (method == QCryptographicHash::Sha512) {
273 hashmethod = QByteArrayLiteral(
"Sha512");
274 }
else if (method == QCryptographicHash::Sha3_224) {
275 hashmethod = QByteArrayLiteral(
"Sha3_224");
276 }
else if (method == QCryptographicHash::Sha3_256) {
277 hashmethod = QByteArrayLiteral(
"Sha3_256");
278 }
else if (method == QCryptographicHash::Sha3_384) {
279 hashmethod = QByteArrayLiteral(
"Sha3_384");
280 }
else if (method == QCryptographicHash::Sha3_512) {
281 hashmethod = QByteArrayLiteral(
"Sha3_512");
288int CredentialPasswordPrivate::cryptoStrToEnum(
const QByteArray &hashMethod)
290 QByteArray hashmethod = hashMethod;
293#ifndef QT_CRYPTOGRAPHICHASH_ONLY_SHA1
294 if (hashmethod ==
"Md4") {
295 method = QCryptographicHash::Md4;
296 }
else if (hashmethod ==
"Md5") {
297 method = QCryptographicHash::Md5;
300 if (hashmethod ==
"Sha1") {
301 method = QCryptographicHash::Sha1;
303#ifndef QT_CRYPTOGRAPHICHASH_ONLY_SHA1
304 if (hashmethod ==
"Sha224") {
305 method = QCryptographicHash::Sha224;
306 }
else if (hashmethod ==
"Sha256") {
307 method = QCryptographicHash::Sha256;
308 }
else if (hashmethod ==
"Sha384") {
309 method = QCryptographicHash::Sha384;
310 }
else if (hashmethod ==
"Sha512") {
311 method = QCryptographicHash::Sha512;
312 }
else if (hashmethod ==
"Sha3_224") {
313 method = QCryptographicHash::Sha3_224;
314 }
else if (hashmethod ==
"Sha3_256") {
315 method = QCryptographicHash::Sha3_256;
316 }
else if (hashmethod ==
"Sha3_384") {
317 method = QCryptographicHash::Sha3_384;
318 }
else if (hashmethod ==
"Sha3_512") {
319 method = QCryptographicHash::Sha3_512;
326#include "moc_credentialpassword.cpp"
AuthenticationCredential(QObject *parent=nullptr)
Combines user store and credential validation into a named realm.
virtual AuthenticationUser findUser(Context *c, const ParamsMultiMap &userinfo)
Container for user data retrieved from an AuthenticationStore.
QVariant value(const QString &key, const QVariant &defaultValue=QVariant()) const
void setPasswordType(PasswordType type)
QString passwordField() const
void setPasswordPostSalt(const QString &passwordPostSalt)
CredentialPassword(QObject *parent=nullptr)
virtual ~CredentialPassword() override
AuthenticationUser authenticate(Context *c, AuthenticationRealm *realm, const ParamsMultiMap &authinfo) final
static QByteArray pbkdf2(QCryptographicHash::Algorithm method, const QByteArray &password, const QByteArray &salt, int rounds, int keyLength)
static bool validatePassword(const QByteArray &password, const QByteArray &correctHash)
QString passwordPreSalt() const
PasswordType passwordType() const
QString passwordPostSalt() const
static QByteArray createPassword(const QByteArray &password, QCryptographicHash::Algorithm method, int iterations, int saltByteSize, int hashByteSize)
void setPasswordField(const QString &fieldName)
static QByteArray hmac(QCryptographicHash::Algorithm method, const QByteArray &key, const QByteArray &message)
void setPasswordPreSalt(const QString &passwordPreSalt)
QMultiMap< QString, QString > ParamsMultiMap
The Cutelyst namespace holds all public Cutelyst API.