2002-06-23 09:54:25 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
|
|
|
/*
|
2008-12-07 06:46:34 +05:30
|
|
|
* Utility routines.
|
2002-06-23 09:54:25 +05:30
|
|
|
*
|
2004-03-15 13:59:22 +05:30
|
|
|
* Copyright (C) 1999-2004 by Erik Andersen <andersen@codepoet.org>
|
2002-06-23 09:54:25 +05:30
|
|
|
*
|
2010-08-16 23:44:46 +05:30
|
|
|
* Licensed under GPLv2 or later, see file LICENSE in this source tree.
|
2002-06-23 09:54:25 +05:30
|
|
|
*/
|
2006-06-19 01:50:07 +05:30
|
|
|
#include "libbb.h"
|
2002-06-23 09:54:25 +05:30
|
|
|
|
2016-04-22 21:39:21 +05:30
|
|
|
/* static const uint8_t ascii64[] ALIGN1 =
|
2008-12-07 06:46:34 +05:30
|
|
|
* "./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
|
2008-06-12 22:25:59 +05:30
|
|
|
*/
|
2008-11-11 00:22:35 +05:30
|
|
|
|
2008-12-07 06:46:34 +05:30
|
|
|
static int i64c(int i)
|
|
|
|
{
|
|
|
|
i &= 0x3f;
|
|
|
|
if (i == 0)
|
|
|
|
return '.';
|
|
|
|
if (i == 1)
|
|
|
|
return '/';
|
|
|
|
if (i < 12)
|
|
|
|
return ('0' - 2 + i);
|
|
|
|
if (i < 38)
|
|
|
|
return ('A' - 12 + i);
|
|
|
|
return ('a' - 38 + i);
|
|
|
|
}
|
|
|
|
|
2011-05-13 06:49:01 +05:30
|
|
|
int FAST_FUNC crypt_make_salt(char *p, int cnt /*, int x */)
|
2008-12-07 06:46:34 +05:30
|
|
|
{
|
2011-05-13 06:49:01 +05:30
|
|
|
/* was: x += ... */
|
2017-02-02 00:05:13 +05:30
|
|
|
unsigned x = getpid() + monotonic_us();
|
2008-12-07 06:46:34 +05:30
|
|
|
do {
|
|
|
|
/* x = (x*1664525 + 1013904223) % 2^32 generator is lame
|
|
|
|
* (low-order bit is not "random", etc...),
|
|
|
|
* but for our purposes it is good enough */
|
|
|
|
x = x*1664525 + 1013904223;
|
|
|
|
/* BTW, Park and Miller's "minimal standard generator" is
|
|
|
|
* x = x*16807 % ((2^31)-1)
|
|
|
|
* It has no problem with visibly alternating lowest bit
|
|
|
|
* but is also weak in cryptographic sense + needs div,
|
|
|
|
* which needs more code (and slower) on many CPUs */
|
|
|
|
*p++ = i64c(x >> 16);
|
|
|
|
*p++ = i64c(x >> 22);
|
|
|
|
} while (--cnt);
|
|
|
|
*p = '\0';
|
|
|
|
return x;
|
|
|
|
}
|
|
|
|
|
2011-05-13 06:49:01 +05:30
|
|
|
char* FAST_FUNC crypt_make_pw_salt(char salt[MAX_PW_SALT_LEN], const char *algo)
|
|
|
|
{
|
|
|
|
int len = 2/2;
|
|
|
|
char *salt_ptr = salt;
|
2015-12-18 23:31:14 +05:30
|
|
|
|
|
|
|
/* Standard chpasswd uses uppercase algos ("MD5", not "md5").
|
|
|
|
* Need to be case-insensitive in the code below.
|
|
|
|
*/
|
|
|
|
if ((algo[0]|0x20) != 'd') { /* not des */
|
2011-05-13 06:49:01 +05:30
|
|
|
len = 8/2; /* so far assuming md5 */
|
|
|
|
*salt_ptr++ = '$';
|
|
|
|
*salt_ptr++ = '1';
|
|
|
|
*salt_ptr++ = '$';
|
|
|
|
#if !ENABLE_USE_BB_CRYPT || ENABLE_USE_BB_CRYPT_SHA
|
2015-12-18 23:31:14 +05:30
|
|
|
if ((algo[0]|0x20) == 's') { /* sha */
|
|
|
|
salt[1] = '5' + (strcasecmp(algo, "sha512") == 0);
|
2011-05-13 06:49:01 +05:30
|
|
|
len = 16/2;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
crypt_make_salt(salt_ptr, len);
|
|
|
|
return salt_ptr;
|
|
|
|
}
|
|
|
|
|
2008-12-07 06:46:34 +05:30
|
|
|
#if ENABLE_USE_BB_CRYPT
|
|
|
|
|
2008-11-11 00:22:35 +05:30
|
|
|
static char*
|
|
|
|
to64(char *s, unsigned v, int n)
|
|
|
|
{
|
|
|
|
while (--n >= 0) {
|
2008-12-07 06:46:34 +05:30
|
|
|
/* *s++ = ascii64[v & 0x3f]; */
|
|
|
|
*s++ = i64c(v);
|
2008-11-11 00:22:35 +05:30
|
|
|
v >>= 6;
|
|
|
|
}
|
|
|
|
return s;
|
|
|
|
}
|
|
|
|
|
2008-12-07 06:46:34 +05:30
|
|
|
/*
|
|
|
|
* DES and MD5 crypt implementations are taken from uclibc.
|
|
|
|
* They were modified to not use static buffers.
|
|
|
|
*/
|
|
|
|
|
2008-06-12 22:25:59 +05:30
|
|
|
#include "pw_encrypt_des.c"
|
|
|
|
#include "pw_encrypt_md5.c"
|
2008-11-11 00:22:35 +05:30
|
|
|
#if ENABLE_USE_BB_CRYPT_SHA
|
|
|
|
#include "pw_encrypt_sha.c"
|
|
|
|
#endif
|
2008-06-12 22:25:59 +05:30
|
|
|
|
2008-11-11 00:22:35 +05:30
|
|
|
/* Other advanced crypt ids (TODO?): */
|
2008-11-07 19:06:46 +05:30
|
|
|
/* $2$ or $2a$: Blowfish */
|
2008-06-12 22:25:59 +05:30
|
|
|
|
|
|
|
static struct const_des_ctx *des_cctx;
|
|
|
|
static struct des_ctx *des_ctx;
|
|
|
|
|
|
|
|
/* my_crypt returns malloc'ed data */
|
|
|
|
static char *my_crypt(const char *key, const char *salt)
|
|
|
|
{
|
2008-11-11 00:22:35 +05:30
|
|
|
/* MD5 or SHA? */
|
|
|
|
if (salt[0] == '$' && salt[1] && salt[2] == '$') {
|
|
|
|
if (salt[1] == '1')
|
|
|
|
return md5_crypt(xzalloc(MD5_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
|
|
|
|
#if ENABLE_USE_BB_CRYPT_SHA
|
|
|
|
if (salt[1] == '5' || salt[1] == '6')
|
|
|
|
return sha_crypt((char*)key, (char*)salt);
|
|
|
|
#endif
|
2008-06-12 22:25:59 +05:30
|
|
|
}
|
|
|
|
|
2008-11-11 00:22:35 +05:30
|
|
|
if (!des_cctx)
|
|
|
|
des_cctx = const_des_init();
|
|
|
|
des_ctx = des_init(des_ctx, des_cctx);
|
|
|
|
return des_crypt(des_ctx, xzalloc(DES_OUT_BUFSIZE), (unsigned char*)key, (unsigned char*)salt);
|
2008-06-12 22:25:59 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* So far nobody wants to have it public */
|
|
|
|
static void my_crypt_cleanup(void)
|
|
|
|
{
|
|
|
|
free(des_cctx);
|
|
|
|
free(des_ctx);
|
|
|
|
des_cctx = NULL;
|
|
|
|
des_ctx = NULL;
|
|
|
|
}
|
|
|
|
|
2008-06-27 08:22:20 +05:30
|
|
|
char* FAST_FUNC pw_encrypt(const char *clear, const char *salt, int cleanup)
|
2002-06-23 09:54:25 +05:30
|
|
|
{
|
2008-06-12 22:26:52 +05:30
|
|
|
char *encrypted;
|
2002-06-23 09:54:25 +05:30
|
|
|
|
2008-06-12 22:26:52 +05:30
|
|
|
encrypted = my_crypt(clear, salt);
|
2008-06-12 22:25:59 +05:30
|
|
|
|
|
|
|
if (cleanup)
|
|
|
|
my_crypt_cleanup();
|
|
|
|
|
2008-06-12 22:26:52 +05:30
|
|
|
return encrypted;
|
2002-06-23 09:54:25 +05:30
|
|
|
}
|
2008-06-16 00:05:34 +05:30
|
|
|
|
|
|
|
#else /* if !ENABLE_USE_BB_CRYPT */
|
|
|
|
|
2008-06-27 08:22:20 +05:30
|
|
|
char* FAST_FUNC pw_encrypt(const char *clear, const char *salt, int cleanup)
|
2008-06-16 00:05:34 +05:30
|
|
|
{
|
2014-02-09 19:08:03 +05:30
|
|
|
char *s;
|
|
|
|
|
|
|
|
s = crypt(clear, salt);
|
|
|
|
/*
|
|
|
|
* glibc used to return "" on malformed salts (for example, ""),
|
|
|
|
* but since 2.17 it returns NULL.
|
|
|
|
*/
|
|
|
|
return xstrdup(s ? s : "");
|
2008-06-16 00:05:34 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
#endif
|