123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- /*
- * Written by Solar Designer <solar at openwall.com> in 2000-2011.
- * No copyright is claimed, and the software is hereby placed in the public
- * domain. In case this attempt to disclaim copyright and place the software
- * in the public domain is deemed null and void, then the software is
- * Copyright (c) 2000-2011 Solar Designer and it is hereby released to the
- * general public under the following terms:
- *
- * Redistribution and use in source and binary forms, with or without
- * modification, are permitted.
- *
- * There's ABSOLUTELY NO WARRANTY, express or implied.
- *
- * See crypt_blowfish.c for more information.
- *
- * This file contains salt generation functions for the traditional and
- * other common crypt(3) algorithms, except for bcrypt which is defined
- * entirely in crypt_blowfish.c.
- */
- #include <string.h>
- #include <errno.h>
- #ifndef __set_errno
- #define __set_errno(val) errno = (val)
- #endif
- /* Just to make sure the prototypes match the actual definitions */
- #include "crypt_gensalt.h"
- unsigned char _crypt_itoa64[64 + 1] =
- "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
- char *_crypt_gensalt_traditional_rn(const char *prefix, unsigned long count,
- const char *input, int size, char *output, int output_size)
- {
- (void) prefix;
- if (size < 2 || output_size < 2 + 1 || (count && count != 25)) {
- if (output_size > 0) output[0] = '\0';
- __set_errno((output_size < 2 + 1) ? ERANGE : EINVAL);
- return NULL;
- }
- output[0] = _crypt_itoa64[(unsigned int)input[0] & 0x3f];
- output[1] = _crypt_itoa64[(unsigned int)input[1] & 0x3f];
- output[2] = '\0';
- return output;
- }
- char *_crypt_gensalt_extended_rn(const char *prefix, unsigned long count,
- const char *input, int size, char *output, int output_size)
- {
- unsigned long value;
- (void) prefix;
- /* Even iteration counts make it easier to detect weak DES keys from a look
- * at the hash, so they should be avoided */
- if (size < 3 || output_size < 1 + 4 + 4 + 1 ||
- (count && (count > 0xffffff || !(count & 1)))) {
- if (output_size > 0) output[0] = '\0';
- __set_errno((output_size < 1 + 4 + 4 + 1) ? ERANGE : EINVAL);
- return NULL;
- }
- if (!count) count = 725;
- output[0] = '_';
- output[1] = _crypt_itoa64[count & 0x3f];
- output[2] = _crypt_itoa64[(count >> 6) & 0x3f];
- output[3] = _crypt_itoa64[(count >> 12) & 0x3f];
- output[4] = _crypt_itoa64[(count >> 18) & 0x3f];
- value = (unsigned long)(unsigned char)input[0] |
- ((unsigned long)(unsigned char)input[1] << 8) |
- ((unsigned long)(unsigned char)input[2] << 16);
- output[5] = _crypt_itoa64[value & 0x3f];
- output[6] = _crypt_itoa64[(value >> 6) & 0x3f];
- output[7] = _crypt_itoa64[(value >> 12) & 0x3f];
- output[8] = _crypt_itoa64[(value >> 18) & 0x3f];
- output[9] = '\0';
- return output;
- }
- char *_crypt_gensalt_md5_rn(const char *prefix, unsigned long count,
- const char *input, int size, char *output, int output_size)
- {
- unsigned long value;
- (void) prefix;
- if (size < 3 || output_size < 3 + 4 + 1 || (count && count != 1000)) {
- if (output_size > 0) output[0] = '\0';
- __set_errno((output_size < 3 + 4 + 1) ? ERANGE : EINVAL);
- return NULL;
- }
- output[0] = '$';
- output[1] = '1';
- output[2] = '$';
- value = (unsigned long)(unsigned char)input[0] |
- ((unsigned long)(unsigned char)input[1] << 8) |
- ((unsigned long)(unsigned char)input[2] << 16);
- output[3] = _crypt_itoa64[value & 0x3f];
- output[4] = _crypt_itoa64[(value >> 6) & 0x3f];
- output[5] = _crypt_itoa64[(value >> 12) & 0x3f];
- output[6] = _crypt_itoa64[(value >> 18) & 0x3f];
- output[7] = '\0';
- if (size >= 6 && output_size >= 3 + 4 + 4 + 1) {
- value = (unsigned long)(unsigned char)input[3] |
- ((unsigned long)(unsigned char)input[4] << 8) |
- ((unsigned long)(unsigned char)input[5] << 16);
- output[7] = _crypt_itoa64[value & 0x3f];
- output[8] = _crypt_itoa64[(value >> 6) & 0x3f];
- output[9] = _crypt_itoa64[(value >> 12) & 0x3f];
- output[10] = _crypt_itoa64[(value >> 18) & 0x3f];
- output[11] = '\0';
- }
- return output;
- }
|