Home | History | Annotate | Line # | Download | only in libcrypt
md5crypt.c revision 1.6
      1  1.6   itojun /*	$NetBSD: md5crypt.c,v 1.6 2003/07/14 12:37:13 itojun Exp $	*/
      2  1.1       ad 
      3  1.1       ad /*
      4  1.1       ad  * ----------------------------------------------------------------------------
      5  1.1       ad  * "THE BEER-WARE LICENSE" (Revision 42):
      6  1.1       ad  * <phk (at) login.dknet.dk> wrote this file.  As long as you retain this notice you
      7  1.1       ad  * can do whatever you want with this stuff. If we meet some day, and you think
      8  1.1       ad  * this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
      9  1.1       ad  * ----------------------------------------------------------------------------
     10  1.1       ad  *
     11  1.1       ad  * from FreeBSD: crypt.c,v 1.5 1996/10/14 08:34:02 phk Exp
     12  1.1       ad  * via OpenBSD: md5crypt.c,v 1.9 1997/07/23 20:58:27 kstailey Exp
     13  1.1       ad  *
     14  1.1       ad  */
     15  1.1       ad 
     16  1.1       ad #include <sys/cdefs.h>
     17  1.1       ad #if !defined(lint)
     18  1.6   itojun __RCSID("$NetBSD: md5crypt.c,v 1.6 2003/07/14 12:37:13 itojun Exp $");
     19  1.1       ad #endif /* not lint */
     20  1.1       ad 
     21  1.5  thorpej /*
     22  1.5  thorpej  * NOTE: We are also built for inclusion in libcrypto; when built for that
     23  1.5  thorpej  * environment, use the libcrypto versions of the MD5 routines, so save
     24  1.5  thorpej  * having to pull two versions into the same program.
     25  1.5  thorpej  */
     26  1.5  thorpej 
     27  1.1       ad #include <unistd.h>
     28  1.1       ad #include <stdio.h>
     29  1.1       ad #include <string.h>
     30  1.5  thorpej #ifdef libcrypto
     31  1.5  thorpej #include <openssl/md5.h>
     32  1.5  thorpej #else
     33  1.1       ad #include <md5.h>
     34  1.5  thorpej #endif
     35  1.1       ad #include <string.h>
     36  1.1       ad 
     37  1.1       ad #define MD5_MAGIC	"$1$"
     38  1.1       ad #define MD5_MAGIC_LEN	3
     39  1.1       ad 
     40  1.1       ad char	*__md5crypt(const char *pw, const char *salt);	/* XXX */
     41  1.1       ad 
     42  1.1       ad static unsigned char itoa64[] =		/* 0 ... 63 => ascii - 64 */
     43  1.1       ad 	"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
     44  1.1       ad 
     45  1.5  thorpej #ifdef libcrypto
     46  1.5  thorpej #define	INIT(x)			MD5_Init((x))
     47  1.5  thorpej #define	UPDATE(x, b, l)		MD5_Update((x), (b), (l))
     48  1.5  thorpej #define	FINAL(v, x)		MD5_Final((v), (x))
     49  1.5  thorpej #else
     50  1.5  thorpej #define	INIT(x)			MD5Init((x))
     51  1.5  thorpej #define	UPDATE(x, b, l)		MD5Update((x), (b), (l))
     52  1.5  thorpej #define	FINAL(v, x)		MD5Final((v), (x))
     53  1.5  thorpej #endif
     54  1.1       ad 
     55  1.1       ad static void
     56  1.1       ad to64(char *s, u_int32_t v, int n)
     57  1.1       ad {
     58  1.1       ad 
     59  1.1       ad 	while (--n >= 0) {
     60  1.1       ad 		*s++ = itoa64[v & 0x3f];
     61  1.1       ad 		v >>= 6;
     62  1.1       ad 	}
     63  1.1       ad }
     64  1.1       ad 
     65  1.1       ad /*
     66  1.1       ad  * MD5 password encryption.
     67  1.1       ad  */
     68  1.1       ad char *
     69  1.1       ad __md5crypt(const char *pw, const char *salt)
     70  1.1       ad {
     71  1.1       ad 	static char passwd[120], *p;
     72  1.1       ad 	const char *sp, *ep;
     73  1.1       ad 	unsigned char final[16];
     74  1.1       ad 	unsigned int i, sl, pwl;
     75  1.1       ad 	MD5_CTX	ctx, ctx1;
     76  1.1       ad 	u_int32_t l;
     77  1.1       ad 	int pl;
     78  1.1       ad 
     79  1.1       ad 	pwl = strlen(pw);
     80  1.1       ad 
     81  1.1       ad 	/* Refine the salt first */
     82  1.1       ad 	sp = salt;
     83  1.1       ad 
     84  1.1       ad 	/* If it starts with the magic string, then skip that */
     85  1.2       ad 	if (strncmp(sp, MD5_MAGIC, MD5_MAGIC_LEN) == 0)
     86  1.1       ad 		sp += MD5_MAGIC_LEN;
     87  1.1       ad 
     88  1.1       ad 	/* It stops at the first '$', max 8 chars */
     89  1.2       ad 	for (ep = sp; *ep != '\0' && *ep != '$' && ep < (sp + 8); ep++)
     90  1.1       ad 		continue;
     91  1.1       ad 
     92  1.1       ad 	/* get the length of the true salt */
     93  1.1       ad 	sl = ep - sp;
     94  1.1       ad 
     95  1.5  thorpej 	INIT(&ctx);
     96  1.1       ad 
     97  1.1       ad 	/* The password first, since that is what is most unknown */
     98  1.5  thorpej 	UPDATE(&ctx, (const unsigned char *)pw, pwl);
     99  1.1       ad 
    100  1.1       ad 	/* Then our magic string */
    101  1.5  thorpej 	UPDATE(&ctx, (const unsigned char *)MD5_MAGIC, MD5_MAGIC_LEN);
    102  1.1       ad 
    103  1.1       ad 	/* Then the raw salt */
    104  1.5  thorpej 	UPDATE(&ctx, (const unsigned char *)sp, sl);
    105  1.1       ad 
    106  1.1       ad 	/* Then just as many characters of the MD5(pw,salt,pw) */
    107  1.5  thorpej 	INIT(&ctx1);
    108  1.5  thorpej 	UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    109  1.5  thorpej 	UPDATE(&ctx1, (const unsigned char *)sp, sl);
    110  1.5  thorpej 	UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    111  1.5  thorpej 	FINAL(final, &ctx1);
    112  1.1       ad 
    113  1.2       ad 	for (pl = pwl; pl > 0; pl -= 16)
    114  1.5  thorpej 		UPDATE(&ctx, final, (unsigned int)(pl > 16 ? 16 : pl));
    115  1.1       ad 
    116  1.1       ad 	/* Don't leave anything around in vm they could use. */
    117  1.1       ad 	memset(final, 0, sizeof(final));
    118  1.1       ad 
    119  1.1       ad 	/* Then something really weird... */
    120  1.1       ad 	for (i = pwl; i != 0; i >>= 1)
    121  1.2       ad 		if ((i & 1) != 0)
    122  1.5  thorpej 		    UPDATE(&ctx, final, 1);
    123  1.1       ad 		else
    124  1.5  thorpej 		    UPDATE(&ctx, (const unsigned char *)pw, 1);
    125  1.1       ad 
    126  1.1       ad 	/* Now make the output string */
    127  1.1       ad 	memcpy(passwd, MD5_MAGIC, MD5_MAGIC_LEN);
    128  1.4       ad 	strlcpy(passwd + MD5_MAGIC_LEN, sp, sl + 1);
    129  1.6   itojun 	strlcat(passwd, "$", sizeof(passwd));
    130  1.1       ad 
    131  1.5  thorpej 	FINAL(final, &ctx);
    132  1.1       ad 
    133  1.1       ad 	/*
    134  1.1       ad 	 * And now, just to make sure things don't run too fast. On a 60 MHz
    135  1.1       ad 	 * Pentium this takes 34 msec, so you would need 30 seconds to build
    136  1.1       ad 	 * a 1000 entry dictionary...
    137  1.1       ad 	 */
    138  1.2       ad 	for (i = 0; i < 1000; i++) {
    139  1.5  thorpej 		INIT(&ctx1);
    140  1.1       ad 
    141  1.2       ad 		if ((i & 1) != 0)
    142  1.5  thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    143  1.1       ad 		else
    144  1.5  thorpej 			UPDATE(&ctx1, final, 16);
    145  1.1       ad 
    146  1.2       ad 		if ((i % 3) != 0)
    147  1.5  thorpej 			UPDATE(&ctx1, (const unsigned char *)sp, sl);
    148  1.1       ad 
    149  1.2       ad 		if ((i % 7) != 0)
    150  1.5  thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    151  1.1       ad 
    152  1.2       ad 		if ((i & 1) != 0)
    153  1.5  thorpej 			UPDATE(&ctx1, final, 16);
    154  1.1       ad 		else
    155  1.5  thorpej 			UPDATE(&ctx1, (const unsigned char *)pw, pwl);
    156  1.1       ad 
    157  1.5  thorpej 		FINAL(final, &ctx1);
    158  1.1       ad 	}
    159  1.1       ad 
    160  1.1       ad 	p = passwd + sl + MD5_MAGIC_LEN + 1;
    161  1.1       ad 
    162  1.1       ad 	l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; to64(p,l,4); p += 4;
    163  1.1       ad 	l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; to64(p,l,4); p += 4;
    164  1.1       ad 	l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; to64(p,l,4); p += 4;
    165  1.1       ad 	l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; to64(p,l,4); p += 4;
    166  1.1       ad 	l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; to64(p,l,4); p += 4;
    167  1.1       ad 	l =		       final[11]		; to64(p,l,2); p += 2;
    168  1.1       ad 	*p = '\0';
    169  1.1       ad 
    170  1.1       ad 	/* Don't leave anything around in vm they could use. */
    171  1.1       ad 	memset(final, 0, sizeof(final));
    172  1.1       ad 	return (passwd);
    173  1.1       ad }
    174