2007-10-07 17:14:02 +05:30
|
|
|
/*
|
|
|
|
* salt.c - generate a random salt string for crypt()
|
|
|
|
*
|
|
|
|
* Written by Marek Michalkiewicz <marekm@i17linuxb.ists.pwr.wroc.pl>,
|
|
|
|
* public domain.
|
2007-11-16 18:06:21 +05:30
|
|
|
*
|
|
|
|
* l64a was Written by J.T. Conklin <jtc@netbsd.org>. Public domain.
|
2007-10-07 17:14:02 +05:30
|
|
|
*/
|
|
|
|
|
|
|
|
#include <config.h>
|
|
|
|
|
2007-11-11 05:16:11 +05:30
|
|
|
#ident "$Id$"
|
2007-10-07 17:17:01 +05:30
|
|
|
|
2007-10-07 17:16:07 +05:30
|
|
|
#include <sys/time.h>
|
|
|
|
#include <stdlib.h>
|
2007-11-24 02:21:43 +05:30
|
|
|
#include <assert.h>
|
2007-10-07 17:14:02 +05:30
|
|
|
#include "prototypes.h"
|
|
|
|
#include "defines.h"
|
|
|
|
#include "getdef.h"
|
2007-11-16 18:06:21 +05:30
|
|
|
|
|
|
|
#ifndef HAVE_L64A
|
|
|
|
char *l64a(long value)
|
|
|
|
{
|
|
|
|
static char buf[8];
|
|
|
|
char *s = buf;
|
|
|
|
int digit;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (value < 0) {
|
|
|
|
errno = EINVAL;
|
|
|
|
return(NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; value != 0 && i < 6; i++) {
|
|
|
|
digit = value & 0x3f;
|
|
|
|
|
|
|
|
if (digit < 2)
|
|
|
|
*s = digit + '.';
|
|
|
|
else if (digit < 12)
|
|
|
|
*s = digit + '0' - 2;
|
|
|
|
else if (digit < 38)
|
|
|
|
*s = digit + 'A' - 12;
|
|
|
|
else
|
|
|
|
*s = digit + 'a' - 38;
|
|
|
|
|
|
|
|
value >>= 6;
|
|
|
|
s++;
|
|
|
|
}
|
|
|
|
|
|
|
|
*s = '\0';
|
|
|
|
|
|
|
|
return(buf);
|
|
|
|
}
|
|
|
|
#endif /* !HAVE_L64A */
|
|
|
|
|
2007-10-07 17:14:02 +05:30
|
|
|
/*
|
2007-11-20 05:35:54 +05:30
|
|
|
* Add the salt prefix.
|
2007-10-07 17:14:02 +05:30
|
|
|
*/
|
2007-11-24 02:21:43 +05:30
|
|
|
#define MAGNUM(array,ch) (array)[0]=(array)[2]='$',(array)[1]=(ch),(array)[3]='\0'
|
2007-11-20 03:44:19 +05:30
|
|
|
|
2007-11-24 02:21:43 +05:30
|
|
|
#ifdef ENCRYPTMETHOD_SELECT
|
2007-11-20 05:35:54 +05:30
|
|
|
/*
|
|
|
|
* Return the salt size.
|
|
|
|
* The size of the salt string is between 8 and 16 bytes for the SHA crypt
|
|
|
|
* methods.
|
|
|
|
*/
|
|
|
|
static unsigned int SHA_salt_size (void)
|
|
|
|
{
|
2007-11-24 02:21:43 +05:30
|
|
|
srandom ((unsigned int)time (NULL));
|
|
|
|
return 8 + (double)random () * 9 / RAND_MAX;
|
2007-11-20 05:35:54 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
/* ! Arguments evaluated twice ! */
|
|
|
|
#define MAX(x,y) ((x) > (y) ? (x) : (y))
|
|
|
|
#define MIN(x,y) ((x) < (y) ? (x) : (y))
|
|
|
|
|
|
|
|
/* Default number of rounds if not explicitly specified. */
|
|
|
|
#define ROUNDS_DEFAULT 5000
|
|
|
|
/* Minimum number of rounds. */
|
|
|
|
#define ROUNDS_MIN 1000
|
|
|
|
/* Maximum number of rounds. */
|
|
|
|
#define ROUNDS_MAX 999999999
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return a salt prefix specifying the rounds number for the SHA crypt methods.
|
|
|
|
*/
|
2007-11-20 15:03:52 +05:30
|
|
|
static char *SHA_salt_rounds (int *prefered_rounds)
|
2007-11-20 05:35:54 +05:30
|
|
|
{
|
2007-11-20 15:03:52 +05:30
|
|
|
static char rounds_prefix[18];
|
2007-11-20 05:35:54 +05:30
|
|
|
long rounds;
|
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (NULL == prefered_rounds) {
|
|
|
|
long min_rounds = getdef_long ("SHA_CRYPT_MIN_ROUNDS", -1);
|
|
|
|
long max_rounds = getdef_long ("SHA_CRYPT_MAX_ROUNDS", -1);
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (-1 == min_rounds && -1 == max_rounds)
|
|
|
|
return "";
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (-1 == min_rounds)
|
|
|
|
min_rounds = max_rounds;
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (-1 == max_rounds)
|
|
|
|
max_rounds = min_rounds;
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (min_rounds > max_rounds)
|
|
|
|
max_rounds = min_rounds;
|
|
|
|
|
|
|
|
srand (time (NULL));
|
|
|
|
rounds = min_rounds +
|
|
|
|
(double)rand () * (max_rounds-min_rounds+1)/RAND_MAX;
|
|
|
|
} else if (0 == *prefered_rounds)
|
|
|
|
return "";
|
2007-11-21 01:30:16 +05:30
|
|
|
else
|
|
|
|
rounds = *prefered_rounds;
|
2007-11-20 05:35:54 +05:30
|
|
|
|
|
|
|
/* Sanity checks. The libc should also check this, but this
|
|
|
|
* protects against a rounds_prefix overflow. */
|
|
|
|
if (rounds < ROUNDS_MIN)
|
|
|
|
rounds = ROUNDS_MIN;
|
|
|
|
|
|
|
|
if (rounds > ROUNDS_MAX)
|
|
|
|
rounds = ROUNDS_MAX;
|
|
|
|
|
|
|
|
snprintf (rounds_prefix, 18, "rounds=%ld$", rounds);
|
|
|
|
|
|
|
|
/* Sanity checks. That should not be necessary. */
|
|
|
|
rounds_prefix[17] = '\0';
|
|
|
|
if ('$' != rounds_prefix[16])
|
|
|
|
rounds_prefix[17] = '$';
|
|
|
|
|
|
|
|
return rounds_prefix;
|
|
|
|
}
|
2007-11-20 14:50:34 +05:30
|
|
|
#endif
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-11-24 02:21:43 +05:30
|
|
|
/*
|
|
|
|
* Generate salt of size salt_size.
|
|
|
|
*/
|
|
|
|
#define MAX_SALT_SIZE 16
|
|
|
|
#define MIN_SALT_SIZE 8
|
|
|
|
|
|
|
|
char *gensalt (unsigned int salt_size) {
|
|
|
|
static char salt[32];
|
|
|
|
|
|
|
|
salt[0] = '\0';
|
|
|
|
|
2007-11-24 02:34:43 +05:30
|
|
|
assert (salt_size >= MIN_SALT_SIZE &&
|
|
|
|
salt_size <= MAX_SALT_SIZE);
|
|
|
|
srandom ((unsigned int)time(NULL));
|
2007-11-24 02:21:43 +05:30
|
|
|
strcat (salt, l64a (random()));
|
|
|
|
do {
|
|
|
|
strcat (salt, l64a (random()));
|
|
|
|
} while (strlen (salt) < salt_size);
|
|
|
|
salt[salt_size] = '\0';
|
|
|
|
|
|
|
|
return salt;
|
|
|
|
}
|
|
|
|
|
2007-11-20 05:35:54 +05:30
|
|
|
/*
|
|
|
|
* Generate 8 base64 ASCII characters of random salt. If MD5_CRYPT_ENAB
|
|
|
|
* in /etc/login.defs is "yes", the salt string will be prefixed by "$1$"
|
|
|
|
* (magic) and pw_encrypt() will execute the MD5-based FreeBSD-compatible
|
|
|
|
* version of crypt() instead of the standard one.
|
|
|
|
* Other methods can be set with ENCRYPT_METHOD
|
2007-11-20 15:03:52 +05:30
|
|
|
*
|
|
|
|
* The method can be forced with the meth parameter.
|
|
|
|
* If NULL, the method will be defined according to the MD5_CRYPT_ENAB and
|
|
|
|
* ENCRYPT_METHOD login.defs variables.
|
|
|
|
*
|
|
|
|
* If meth is specified, an additional parameter can be provided.
|
|
|
|
* * For the SHA256 and SHA512 method, this specifies the number of rounds
|
|
|
|
* (if not NULL).
|
2007-11-20 05:35:54 +05:30
|
|
|
*/
|
2007-11-20 15:03:52 +05:30
|
|
|
char *crypt_make_salt (char *meth, void *arg)
|
2007-10-07 17:14:02 +05:30
|
|
|
{
|
2007-11-20 05:35:54 +05:30
|
|
|
/* Max result size for the SHA methods:
|
|
|
|
* +3 $5$
|
|
|
|
* +17 rounds=999999999$
|
|
|
|
* +16 salt
|
|
|
|
* +1 \0
|
|
|
|
*/
|
2007-10-07 17:14:02 +05:30
|
|
|
static char result[40];
|
2007-11-24 02:21:43 +05:30
|
|
|
size_t salt_len = 8;
|
2007-11-20 15:03:52 +05:30
|
|
|
char *method = "DES";
|
2007-10-07 17:14:02 +05:30
|
|
|
|
2007-11-20 04:04:48 +05:30
|
|
|
result[0] = '\0';
|
|
|
|
|
2007-11-20 15:03:52 +05:30
|
|
|
if (NULL != meth)
|
|
|
|
method = meth;
|
|
|
|
else
|
2007-11-20 03:44:19 +05:30
|
|
|
#ifdef ENCRYPTMETHOD_SELECT
|
2007-11-20 15:03:52 +05:30
|
|
|
if ((method = getdef_str ("ENCRYPT_METHOD")) == NULL)
|
2007-10-07 17:17:01 +05:30
|
|
|
#endif
|
2007-11-20 15:03:52 +05:30
|
|
|
if (getdef_bool ("MD5_CRYPT_ENAB"))
|
|
|
|
method = "MD5";
|
|
|
|
|
2007-11-21 01:30:16 +05:30
|
|
|
if (!strcmp (method, "MD5")) {
|
2007-11-20 15:03:52 +05:30
|
|
|
MAGNUM(result, '1');
|
2007-11-20 03:44:19 +05:30
|
|
|
#ifdef ENCRYPTMETHOD_SELECT
|
2007-11-21 01:30:16 +05:30
|
|
|
} else if (!strcmp (method, "SHA256")) {
|
2007-11-20 15:03:52 +05:30
|
|
|
MAGNUM(result, '5');
|
|
|
|
strcat(result, SHA_salt_rounds((int *)arg));
|
2007-11-24 02:21:43 +05:30
|
|
|
salt_len = SHA_salt_size();
|
2007-11-21 01:30:16 +05:30
|
|
|
} else if (!strcmp (method, "SHA512")) {
|
2007-11-20 15:03:52 +05:30
|
|
|
MAGNUM(result, '6');
|
|
|
|
strcat(result, SHA_salt_rounds((int *)arg));
|
2007-11-24 02:21:43 +05:30
|
|
|
salt_len = SHA_salt_size();
|
2007-11-20 15:03:52 +05:30
|
|
|
#endif
|
2007-11-21 01:30:16 +05:30
|
|
|
} else if (0 != strcmp (method, "DES")) {
|
2007-11-20 15:03:52 +05:30
|
|
|
fprintf (stderr,
|
|
|
|
_("Invalid ENCRYPT_METHOD value: '%s'.\n"
|
|
|
|
"Defaulting to DES.\n"),
|
|
|
|
method);
|
|
|
|
result[0] = '\0';
|
2007-11-20 03:44:19 +05:30
|
|
|
}
|
2007-11-20 05:35:54 +05:30
|
|
|
|
2007-10-07 17:14:02 +05:30
|
|
|
/*
|
2007-11-20 05:35:54 +05:30
|
|
|
* Concatenate a pseudo random salt.
|
2007-10-07 17:14:02 +05:30
|
|
|
*/
|
2007-11-24 02:21:43 +05:30
|
|
|
assert (sizeof (result) > strlen (result) + salt_len);
|
|
|
|
strncat (result, gensalt (salt_len),
|
|
|
|
sizeof (result) - strlen (result) - 1);
|
2007-10-07 17:14:02 +05:30
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|