Home | History | Annotate | Line # | Download | only in libcrypt
md5crypt.c revision 1.2
      1 /*	$NetBSD: md5crypt.c,v 1.2 2000/08/03 08:32:36 ad Exp $	*/
      2 
      3 /*
      4  * ----------------------------------------------------------------------------
      5  * "THE BEER-WARE LICENSE" (Revision 42):
      6  * <phk (at) login.dknet.dk> wrote this file.  As long as you retain this notice you
      7  * can do whatever you want with this stuff. If we meet some day, and you think
      8  * this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
      9  * ----------------------------------------------------------------------------
     10  *
     11  * from FreeBSD: crypt.c,v 1.5 1996/10/14 08:34:02 phk Exp
     12  * via OpenBSD: md5crypt.c,v 1.9 1997/07/23 20:58:27 kstailey Exp
     13  *
     14  */
     15 
     16 #include <sys/cdefs.h>
     17 #if !defined(lint)
     18 __RCSID("$NetBSD: md5crypt.c,v 1.2 2000/08/03 08:32:36 ad Exp $");
     19 #endif /* not lint */
     20 
     21 #include <unistd.h>
     22 #include <stdio.h>
     23 #include <string.h>
     24 #include <md5.h>
     25 #include <string.h>
     26 
     27 #define MD5_MAGIC	"$1$"
     28 #define MD5_MAGIC_LEN	3
     29 
     30 char	*__md5crypt(const char *pw, const char *salt);	/* XXX */
     31 
     32 static unsigned char itoa64[] =		/* 0 ... 63 => ascii - 64 */
     33 	"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
     34 
     35 static void to64(char *, u_int32_t, int);
     36 
     37 static void
     38 to64(char *s, u_int32_t v, int n)
     39 {
     40 
     41 	while (--n >= 0) {
     42 		*s++ = itoa64[v & 0x3f];
     43 		v >>= 6;
     44 	}
     45 }
     46 
     47 /*
     48  * MD5 password encryption.
     49  *
     50  * XXX This is dumb. NetBSD includes it for NIS compatibility. [ad]
     51  */
     52 char *
     53 __md5crypt(const char *pw, const char *salt)
     54 {
     55 	static char passwd[120], *p;
     56 	const char *sp, *ep;
     57 	unsigned char final[16];
     58 	unsigned int i, sl, pwl;
     59 	MD5_CTX	ctx, ctx1;
     60 	u_int32_t l;
     61 	int pl;
     62 
     63 	pwl = strlen(pw);
     64 
     65 	/* Refine the salt first */
     66 	sp = salt;
     67 
     68 	/* If it starts with the magic string, then skip that */
     69 	if (strncmp(sp, MD5_MAGIC, MD5_MAGIC_LEN) == 0)
     70 		sp += MD5_MAGIC_LEN;
     71 
     72 	/* It stops at the first '$', max 8 chars */
     73 	for (ep = sp; *ep != '\0' && *ep != '$' && ep < (sp + 8); ep++)
     74 		continue;
     75 
     76 	/* get the length of the true salt */
     77 	sl = ep - sp;
     78 
     79 	MD5Init(&ctx);
     80 
     81 	/* The password first, since that is what is most unknown */
     82 	MD5Update(&ctx, (const unsigned char *)pw, pwl);
     83 
     84 	/* Then our magic string */
     85 	MD5Update(&ctx, (const unsigned char *)MD5_MAGIC, MD5_MAGIC_LEN);
     86 
     87 	/* Then the raw salt */
     88 	MD5Update(&ctx, (const unsigned char *)sp, sl);
     89 
     90 	/* Then just as many characters of the MD5(pw,salt,pw) */
     91 	MD5Init(&ctx1);
     92 	MD5Update(&ctx1, (const unsigned char *)pw, pwl);
     93 	MD5Update(&ctx1, (const unsigned char *)sp, sl);
     94 	MD5Update(&ctx1, (const unsigned char *)pw, pwl);
     95 	MD5Final(final, &ctx1);
     96 
     97 	for (pl = pwl; pl > 0; pl -= 16)
     98 		MD5Update(&ctx, final, (unsigned int)(pl > 16 ? 16 : pl));
     99 
    100 	/* Don't leave anything around in vm they could use. */
    101 	memset(final, 0, sizeof(final));
    102 
    103 	/* Then something really weird... */
    104 	for (i = pwl; i != 0; i >>= 1)
    105 		if ((i & 1) != 0)
    106 		    MD5Update(&ctx, final, 1);
    107 		else
    108 		    MD5Update(&ctx, (const unsigned char *)pw, 1);
    109 
    110 	/* Now make the output string */
    111 	memcpy(passwd, MD5_MAGIC, MD5_MAGIC_LEN);
    112 	strncpy(passwd + MD5_MAGIC_LEN, sp, sl);
    113 	strcat(passwd, "$");
    114 
    115 	MD5Final(final, &ctx);
    116 
    117 	/*
    118 	 * And now, just to make sure things don't run too fast. On a 60 MHz
    119 	 * Pentium this takes 34 msec, so you would need 30 seconds to build
    120 	 * a 1000 entry dictionary...
    121 	 */
    122 	for (i = 0; i < 1000; i++) {
    123 		MD5Init(&ctx1);
    124 
    125 		if ((i & 1) != 0)
    126 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
    127 		else
    128 			MD5Update(&ctx1, final, 16);
    129 
    130 		if ((i % 3) != 0)
    131 			MD5Update(&ctx1, (const unsigned char *)sp, sl);
    132 
    133 		if ((i % 7) != 0)
    134 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
    135 
    136 		if ((i & 1) != 0)
    137 			MD5Update(&ctx1, final, 16);
    138 		else
    139 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
    140 
    141 		MD5Final(final, &ctx1);
    142 	}
    143 
    144 	p = passwd + sl + MD5_MAGIC_LEN + 1;
    145 
    146 	l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; to64(p,l,4); p += 4;
    147 	l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; to64(p,l,4); p += 4;
    148 	l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; to64(p,l,4); p += 4;
    149 	l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; to64(p,l,4); p += 4;
    150 	l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; to64(p,l,4); p += 4;
    151 	l =		       final[11]		; to64(p,l,2); p += 2;
    152 	*p = '\0';
    153 
    154 	/* Don't leave anything around in vm they could use. */
    155 	memset(final, 0, sizeof(final));
    156 	return (passwd);
    157 }
    158