xref: /netbsd-src/lib/libcrypt/md5crypt.c (revision 481fca6e59249d8ffcf24fef7cfbe7b131bfb080)
1 /*	$NetBSD: md5crypt.c,v 1.1 2000/07/06 11:12:42 ad Exp $	*/
2 
3 /*
4  * ----------------------------------------------------------------------------
5  * "THE BEER-WARE LICENSE" (Revision 42):
6  * <phk@login.dknet.dk> wrote this file.  As long as you retain this notice you
7  * can do whatever you want with this stuff. If we meet some day, and you think
8  * this stuff is worth it, you can buy me a beer in return.   Poul-Henning Kamp
9  * ----------------------------------------------------------------------------
10  *
11  * from FreeBSD: crypt.c,v 1.5 1996/10/14 08:34:02 phk Exp
12  * via OpenBSD: md5crypt.c,v 1.9 1997/07/23 20:58:27 kstailey Exp
13  *
14  */
15 
16 #include <sys/cdefs.h>
17 #if !defined(lint)
18 __RCSID("$NetBSD: md5crypt.c,v 1.1 2000/07/06 11:12:42 ad Exp $");
19 #endif /* not lint */
20 
21 #include <unistd.h>
22 #include <stdio.h>
23 #include <string.h>
24 #include <md5.h>
25 #include <string.h>
26 
27 #define MD5_MAGIC	"$1$"
28 #define MD5_MAGIC_LEN	3
29 
30 char	*__md5crypt(const char *pw, const char *salt);	/* XXX */
31 
32 static unsigned char itoa64[] =		/* 0 ... 63 => ascii - 64 */
33 	"./0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
34 
35 static void to64(char *, u_int32_t, int);
36 
37 static void
38 to64(char *s, u_int32_t v, int n)
39 {
40 
41 	while (--n >= 0) {
42 		*s++ = itoa64[v & 0x3f];
43 		v >>= 6;
44 	}
45 }
46 
47 /*
48  * MD5 password encryption.
49  *
50  * XXX This is dumb. NetBSD includes it for NIS compatibility. [ad]
51  */
52 char *
53 __md5crypt(const char *pw, const char *salt)
54 {
55 	static char passwd[120], *p;
56 	const char *sp, *ep;
57 	unsigned char final[16];
58 	unsigned int i, sl, pwl;
59 	MD5_CTX	ctx, ctx1;
60 	u_int32_t l;
61 	int pl;
62 
63 	pwl = strlen(pw);
64 
65 	/* Refine the salt first */
66 	sp = salt;
67 
68 	/* If it starts with the magic string, then skip that */
69 	if(strncmp(sp, MD5_MAGIC, MD5_MAGIC_LEN) == 0)
70 		sp += MD5_MAGIC_LEN;
71 
72 	/* It stops at the first '$', max 8 chars */
73 	for(ep = sp; *ep != '\0' && *ep != '$' && ep < (sp + 8); ep++)
74 		continue;
75 
76 	/* get the length of the true salt */
77 	sl = ep - sp;
78 
79 	MD5Init(&ctx);
80 
81 	/* The password first, since that is what is most unknown */
82 	MD5Update(&ctx, (const unsigned char *)pw, pwl);
83 
84 	/* Then our magic string */
85 	MD5Update(&ctx, (const unsigned char *)MD5_MAGIC, MD5_MAGIC_LEN);
86 
87 	/* Then the raw salt */
88 	MD5Update(&ctx, (const unsigned char *)sp, sl);
89 
90 	/* Then just as many characters of the MD5(pw,salt,pw) */
91 	MD5Init(&ctx1);
92 	MD5Update(&ctx1, (const unsigned char *)pw, pwl);
93 	MD5Update(&ctx1, (const unsigned char *)sp, sl);
94 	MD5Update(&ctx1, (const unsigned char *)pw, pwl);
95 	MD5Final(final, &ctx1);
96 
97 	for(pl = pwl; pl > 0; pl -= 16)
98 		MD5Update(&ctx, final, (unsigned int)(pl > 16 ? 16 : pl));
99 
100 	/* Don't leave anything around in vm they could use. */
101 	memset(final, 0, sizeof(final));
102 
103 	/* Then something really weird... */
104 	for (i = pwl; i != 0; i >>= 1)
105 		if((i & 1) != 0)
106 		    MD5Update(&ctx, final, 1);
107 		else
108 		    MD5Update(&ctx, (const unsigned char *)pw, 1);
109 
110 	/* Now make the output string */
111 	memcpy(passwd, MD5_MAGIC, MD5_MAGIC_LEN);
112 	strncpy(passwd + MD5_MAGIC_LEN, sp, sl);
113 	strcat(passwd, "$");
114 
115 	MD5Final(final, &ctx);
116 
117 	/*
118 	 * And now, just to make sure things don't run too fast. On a 60 MHz
119 	 * Pentium this takes 34 msec, so you would need 30 seconds to build
120 	 * a 1000 entry dictionary...
121 	 */
122 	for(i = 0; i < 1000; i++) {
123 		MD5Init(&ctx1);
124 
125 		if((i & 1) != 0)
126 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
127 		else
128 			MD5Update(&ctx1, final, 16);
129 
130 		if((i % 3) != 0)
131 			MD5Update(&ctx1, (const unsigned char *)sp, sl);
132 
133 		if((i % 7) != 0)
134 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
135 
136 		if((i & 1) != 0)
137 			MD5Update(&ctx1, final, 16);
138 		else
139 			MD5Update(&ctx1, (const unsigned char *)pw, pwl);
140 
141 		MD5Final(final, &ctx1);
142 	}
143 
144 	p = passwd + sl + MD5_MAGIC_LEN + 1;
145 
146 	l = (final[ 0]<<16) | (final[ 6]<<8) | final[12]; to64(p,l,4); p += 4;
147 	l = (final[ 1]<<16) | (final[ 7]<<8) | final[13]; to64(p,l,4); p += 4;
148 	l = (final[ 2]<<16) | (final[ 8]<<8) | final[14]; to64(p,l,4); p += 4;
149 	l = (final[ 3]<<16) | (final[ 9]<<8) | final[15]; to64(p,l,4); p += 4;
150 	l = (final[ 4]<<16) | (final[10]<<8) | final[ 5]; to64(p,l,4); p += 4;
151 	l =		       final[11]		; to64(p,l,2); p += 2;
152 	*p = '\0';
153 
154 	/* Don't leave anything around in vm they could use. */
155 	memset(final, 0, sizeof(final));
156 	return (passwd);
157 }
158