xref: /dflybsd-src/lib/libcrypt/deprecated-crypt-sha512.c (revision d8ee3b5d2d9ba12d8978a47bccb8e3945f96ea08)
1 /*
2  * Copyright (c) 2010
3  * 	The DragonFly Project.  All rights reserved.
4  *
5  * This code is derived from software contributed to The DragonFly Project
6  * by Nolan Lum <nol888@gmail.com>
7  *
8  * Redistribution and use in source and binary forms, with or without
9  * modification, are permitted provided that the following conditions
10  * are met:
11  *
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in
16  *    the documentation and/or other materials provided with the
17  *    distribution.
18  * 3. Neither the name of The DragonFly Project nor the names of its
19  *    contributors may be used to endorse or promote products derived
20  *    from this software without specific, prior written permission.
21  *
22  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
25  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE
26  * COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
27  * INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING,
28  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
29  * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
30  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
31  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
32  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33  * SUCH DAMAGE.
34  */
35 
36 #include <sys/types.h>
37 #include <string.h>
38 #include <sha512.h>
39 #include "crypt.h"
40 
41 /*
42  * New password crypt.
43  */
44 
45 #define SHA512_SIZE 64
46 
47 char*
48 crypt_deprecated_sha512(const char *pw, const char *salt)
49 {
50 	static const char *magic = "$4$"; /* Magic string for this
51 										 * algorithm. Easier to change
52 										 * when factored as constant.
53 										 */
54 	static char         passwd[120], *p;
55 	static const char *sp, *ep;
56 	unsigned char final[SHA512_SIZE];
57 	int sl, i;
58 	SHA512_CTX ctx;
59 	unsigned long l;
60 
61 	/* Refine the salt. */
62 	sp = salt;
63 
64 	/* If it starts with the magic string, then skip that. */
65 	if (!strncmp(sp, magic, strlen(magic)))
66 		sp += strlen(magic);
67 
68 	/* Stop at the first '$', max 8 chars. */
69 	for (ep = sp; *ep && *ep != '$' && ep < (sp + 8); ep++)
70 		continue;
71 
72 	/* Get the actual salt length. */
73 	sl = ep - sp;
74 
75 	SHA512_Init(&ctx);
76 
77 	/* Hash in the password first. */
78 	SHA512_Update(&ctx, pw, strlen(pw));
79 
80 	/* Then the magic string */
81 	SHA512_Update(&ctx, magic, sizeof(magic));
82 
83 	/* Then the raw salt. */
84 	SHA512_Update(&ctx, sp, sl);
85 
86 	/* Finish and create the output string. */
87 	SHA512_Final(final, &ctx);
88 	strcpy(passwd, magic);
89 	strncat(passwd, sp, sl);
90 	strcat(passwd, "$");
91 
92 	p = passwd + strlen(passwd);
93 
94 	/*
95 	 * For-loop form of the algorithm in sha256.c;
96 	 * breaks the final output up into 3cols and then base64's each row.
97 	 */
98 	for (i = 0; i < 20; i++) {
99 		l = (final[i] << 16) | (final[i + 21] << 8) | final[i + 42];
100 		_crypt_to64(p, l, 4); p += 4;
101 	}
102 	l = (final[20] << 16) | (final[41] << 8);
103 	_crypt_to64(p, l, 4); p += 4;
104 	*p = '\0';
105 
106 	/* Clear memory. */
107 	memset(final, 0, sizeof(final));
108 
109 	return (passwd);
110 }
111