Home | History | Annotate | Line # | Download | only in libcrypt
md5crypt.c revision 1.15.2.1
      1  1.15.2.1    martin /*	$NetBSD: md5crypt.c,v 1.15.2.1 2024/08/23 16:40:48 martin Exp $	*/
      2       1.1        ad 
      3       1.1        ad /*
      4       1.1        ad  * ----------------------------------------------------------------------------
      5       1.1        ad  * "THE BEER-WARE LICENSE" (Revision 42):
      6       1.1        ad  * <phk (at) login.dknet.dk> wrote this file.  As long as you retain this notice you
      7       1.1        ad  * can do whatever you want with this stuff. If we meet some day, and you think
      8       1.1        ad  * this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
      9       1.1        ad  * ----------------------------------------------------------------------------
     10       1.1        ad  *
     11       1.1        ad  * from FreeBSD: crypt.c,v 1.5 1996/10/14 08:34:02 phk Exp
     12       1.1        ad  * via OpenBSD: md5crypt.c,v 1.9 1997/07/23 20:58:27 kstailey Exp
     13       1.1        ad  *
     14       1.1        ad  */
     15       1.1        ad 
     16       1.1        ad #include <sys/cdefs.h>
     17       1.1        ad #if !defined(lint)
     18  1.15.2.1    martin __RCSID("$NetBSD: md5crypt.c,v 1.15.2.1 2024/08/23 16:40:48 martin Exp $");
     19       1.1        ad #endif /* not lint */
     20       1.1        ad 
     21       1.1        ad #include <unistd.h>
     22       1.1        ad #include <stdio.h>
     23       1.1        ad #include <string.h>
     24       1.1        ad #include <md5.h>
     25       1.1        ad 
     26       1.8       sjg #include "crypt.h"
     27       1.8       sjg 
     28       1.1        ad #define MD5_MAGIC	"$1$"
     29       1.1        ad #define MD5_MAGIC_LEN	3
     30       1.1        ad 
     31       1.5   thorpej #define	INIT(x)			MD5Init((x))
     32       1.5   thorpej #define	UPDATE(x, b, l)		MD5Update((x), (b), (l))
     33       1.5   thorpej #define	FINAL(v, x)		MD5Final((v), (x))
     34       1.1        ad 
     35       1.1        ad 
     36       1.1        ad /*
     37       1.1        ad  * MD5 password encryption.
     38       1.1        ad  */
     39      1.15       nia crypt_private char *
     40       1.1        ad __md5crypt(const char *pw, const char *salt)
     41       1.1        ad {
     42       1.1        ad 	static char passwd[120], *p;
     43       1.1        ad 	const char *sp, *ep;
     44       1.1        ad 	unsigned char final[16];
     45       1.1        ad 	unsigned int i, sl, pwl;
     46       1.1        ad 	MD5_CTX	ctx, ctx1;
     47       1.1        ad 	u_int32_t l;
     48       1.1        ad 	int pl;
     49  1.15.2.1    martin 
     50       1.1        ad 	pwl = strlen(pw);
     51  1.15.2.1    martin 
     52       1.1        ad 	/* Refine the salt first */
     53       1.1        ad 	sp = salt;
     54       1.1        ad 
     55       1.1        ad 	/* If it starts with the magic string, then skip that */
     56       1.2        ad 	if (strncmp(sp, MD5_MAGIC, MD5_MAGIC_LEN) == 0)
     57       1.1        ad 		sp += MD5_MAGIC_LEN;
     58       1.1        ad 
     59       1.1        ad 	/* It stops at the first '$', max 8 chars */
     60       1.2        ad 	for (ep = sp; *ep != '\0' && *ep != '$' && ep < (sp + 8); ep++)
     61       1.1        ad 		continue;
     62       1.1        ad 
     63       1.1        ad 	/* get the length of the true salt */
     64       1.1        ad 	sl = ep - sp;
     65       1.1        ad 
     66       1.5   thorpej 	INIT(&ctx);
     67       1.1        ad 
     68       1.1        ad 	/* The password first, since that is what is most unknown */
     69       1.5   thorpej 	UPDATE(&ctx, (const unsigned char *)pw, pwl);
     70       1.1        ad 
     71       1.1        ad 	/* Then our magic string */
     72       1.5   thorpej 	UPDATE(&ctx, (const unsigned char *)MD5_MAGIC, MD5_MAGIC_LEN);
     73       1.1        ad 
     74       1.1        ad 	/* Then the raw salt */
     75       1.5   thorpej 	UPDATE(&ctx, (const unsigned char *)sp, sl);
     76       1.1        ad 
     77       1.1        ad 	/* Then just as many characters of the MD5(pw,salt,pw) */
     78       1.5   thorpej 	INIT(&ctx1);
     79       1.5   thorpej 	UPDATE(&ctx1, (const unsigned char *)pw, pwl);
     80       1.5   thorpej 	UPDATE(&ctx1, (const unsigned char *)sp, sl);
     81       1.5   thorpej 	UPDATE(&ctx1, (const unsigned char *)pw, pwl);
     82       1.5   thorpej 	FINAL(final, &ctx1);
     83       1.1        ad 
     84       1.2        ad 	for (pl = pwl; pl > 0; pl -= 16)
     85       1.5   thorpej 		UPDATE(&ctx, final, (unsigned int)(pl > 16 ? 16 : pl));
     86       1.1        ad 
     87       1.1        ad 	/* Don't leave anything around in vm they could use. */
     88       1.1        ad 	memset(final, 0, sizeof(final));
     89       1.1        ad 
     90       1.1        ad 	/* Then something really weird... */
     91       1.1        ad 	for (i = pwl; i != 0; i >>= 1)
     92       1.2        ad 		if ((i & 1) != 0)
     93       1.5   thorpej 		    UPDATE(&ctx, final, 1);
     94       1.1        ad 		else
     95       1.5   thorpej 		    UPDATE(&ctx, (const unsigned char *)pw, 1);
     96       1.1        ad 
     97       1.1        ad 	/* Now make the output string */
     98       1.1        ad 	memcpy(passwd, MD5_MAGIC, MD5_MAGIC_LEN);
     99       1.4        ad 	strlcpy(passwd + MD5_MAGIC_LEN, sp, sl + 1);
    100       1.6    itojun 	strlcat(passwd, "$", sizeof(passwd));
    101       1.1        ad 
    102       1.5   thorpej 	FINAL(final, &ctx);
    103       1.1        ad 
    104      1.11  drochner 	/* memset(&ctx, 0, sizeof(ctx)); done by MD5Final() */
    105      1.10  drochner 
    106       1.1        ad 	/*
    107       1.1        ad 	 * And now, just to make sure things don't run too fast. On a 60 MHz
    108       1.1        ad 	 * Pentium this takes 34 msec, so you would need 30 seconds to build
    109       1.1        ad 	 * a 1000 entry dictionary...
    110       1.1        ad 	 */
    111       1.2        ad 	for (i = 0; i < 1000; i++) {
    112       1.5   thorpej 		INIT(&ctx1);
    113       1.1        ad 
    114       1.2        ad 		if ((i & 1) != 0)
    115       1.5   thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    116       1.1        ad 		else
    117       1.5   thorpej 			UPDATE(&ctx1, final, 16);
    118       1.1        ad 
    119       1.2        ad 		if ((i % 3) != 0)
    120       1.5   thorpej 			UPDATE(&ctx1, (const unsigned char *)sp, sl);
    121       1.1        ad 
    122       1.2        ad 		if ((i % 7) != 0)
    123       1.5   thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    124       1.1        ad 
    125       1.2        ad 		if ((i & 1) != 0)
    126       1.5   thorpej 			UPDATE(&ctx1, final, 16);
    127       1.1        ad 		else
    128       1.5   thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    129       1.1        ad 
    130       1.5   thorpej 		FINAL(final, &ctx1);
    131       1.1        ad 	}
    132       1.1        ad 
    133      1.11  drochner 	/* memset(&ctx1, 0, sizeof(ctx1)); done by MD5Final() */
    134      1.10  drochner 
    135       1.1        ad 	p = passwd + sl + MD5_MAGIC_LEN + 1;
    136       1.1        ad 
    137       1.8       sjg 	l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; __crypt_to64(p,l,4); p += 4;
    138       1.8       sjg 	l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; __crypt_to64(p,l,4); p += 4;
    139       1.8       sjg 	l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; __crypt_to64(p,l,4); p += 4;
    140       1.8       sjg 	l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; __crypt_to64(p,l,4); p += 4;
    141       1.8       sjg 	l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; __crypt_to64(p,l,4); p += 4;
    142       1.8       sjg 	l =		       final[11]		; __crypt_to64(p,l,2); p += 2;
    143       1.1        ad 	*p = '\0';
    144       1.1        ad 
    145       1.1        ad 	/* Don't leave anything around in vm they could use. */
    146      1.14  riastrad 	explicit_memset(final, 0, sizeof(final));
    147       1.1        ad 	return (passwd);
    148       1.1        ad }
    149